<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-tomas-openroaming-07" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="WBA OpenRoaming">WBA OpenRoaming Wireless Federation</title>

    <author initials="B." surname="Tomas" fullname="Bruno Tomas">
      <organization>Wireless Broadband Alliance, Inc.</organization>
      <address>
        <postal>
          <street>5000 Executive Parkway, Suite 302</street>
          <city>San Ramon</city>
          <code>94583</code>
          <country>US</country>
        </postal>
        <email>bruno@wballiance.com</email>
      </address>
    </author>
    <author initials="M." surname="Grayson" fullname="Mark Grayson">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>10 New Square Park</street>
          <city>Feltham</city>
          <code>TW14 8HA</code>
          <country>UK</country>
        </postal>
        <email>mgrayson@cisco.com</email>
      </address>
    </author>
    <author initials="N." surname="Canpolat" fullname="Necati Canpolat">
      <organization>Intel Corporation</organization>
      <address>
        <postal>
          <street>2111 NE. 25th Ave</street>
          <city>Hillsboro</city>
          <code>97124</code>
          <country>US</country>
        </postal>
        <email>necati.canpolat@intel.com</email>
      </address>
    </author>
    <author initials="B. A." surname="Cockrell" fullname="Betty A. Cockrell">
      <organization>Independent</organization>
      <address>
        <postal>
          <city>San Antonio</city>
          <country>US</country>
        </postal>
        <email>bcbeti@outlook.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>170 West Tasman Drive</street>
          <city>San Jose</city>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>sgundave@cisco.com</email>
      </address>
    </author>

    <date year="2026" month="January" day="23"/>

    <area>general</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>OpenRoaming</keyword> <keyword>Federation</keyword>

    <abstract>


<?line 181?>

<t>This document describes the Wireless Broadband Alliance's
OpenRoaming system. The OpenRoaming architecture enables a seamless
onboarding experience for devices connecting to access networks
that are part of the federation of access networks and identity providers.
The primary objective of this document is to describe the protocols that
form the foundation for this architecture, enabling providers to correctly configure
their equipment to support interoperable OpenRoaming signalling exchanges.
In addition, the topic of OpenRoaming has been raised in different IETF working
groups, and therefore a secondary objective is to assist those discussions by
describing the federation organization and framework.</t>



    </abstract>



  </front>

  <middle>


<?line 194?>

<section anchor="intro"><name>Introduction</name>

<t>WBA OpenRoaming is a roaming federation service of Access Network Providers (ANPs)
and Identity Providers (IDPs), enabling an automatic and secure
Wi-Fi experience globally. WBA OpenRoaming creates the framework to seamlessly
connect billions of users and things to millions of Wi-Fi networks.</t>

<figure title="OpenRoaming Federation" anchor="figfedarch"><artwork><![CDATA[
ANP-1 --\                    _----_                     /-- IDP-1
         \     Access      _( Open )_      Identity    /
ANP-2  ---<==  Network ---(  Roaming )---  Providers <==-- IDP-2
         /     Providers   (_      _)                  \
ANP-3 --/                    '----'                     \-- IDP-3

]]></artwork></figure>

<t>WBA OpenRoaming recognizes the benefits that the likes of eduroam <xref target="RFC7593"/> provides to the
education and research community. WBA OpenRoaming defines a global federation that is targeted at serving
all communities, while supporting both settlement-free use cases where "free" Wi-Fi is being offered to
end-users in order to support some
alternative value proposition, as well as traditional settled "paid" for Wi-Fi offered by some
cellular providers.</t>

<t>OpenRoaming is designed to deliver end-to-end security between a Network Access Server deployed by an
OpenRoaming Access Network Provider and an EAP Server <xref target="RFC3748"/> deployed by an OpenRoaming
Identity Provider. The security of the solution is based on mTLS using certificates
issued under Wireless Broadband Alliance's Public Key Infrastructure <xref target="RFC5280"/>.</t>

<section anchor="Requirements"><name>Requirements Language</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="Terminology"><name>Terminology</name>

<t>Access Network Query Protocol (ANQP):</t>

<ul empty="true"><li>
  <t>An IEEE 802.11 defined protocol that allows for access network information retrieval
in a pre-association state. ANQP has been further extended by the
Wi-Fi Alliance (WFA) as part of its Passpoint program <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>Access Network Provider (ANP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and serves OpenRoaming end-users by configuring the OpenRoaming RCOI(s) on its Wi-Fi equipment.</t>
</li></ul>

<t>Broker:</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and performs certain specific roles to help scale the operation of the federation. The separate roles of a broker can include:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t><list style="numbers" type="1">
      <t>Assigning WBA identities (WBAIDs) to ANPs and IDPs.</t>
      <t>Operating an issuing intermediate certificate authority under the WBA's PKI and issuing certificates to ANPs and IDPs.</t>
      <t>Operating a registration authority to a third party operated issuing intermediate certificate authority under WBA's PKI to enable certificates to be issued to ANPs and IDPs.</t>
    </list></t>
  </li></ul>
</li></ul>

<t>Closed Access Group (CAG):</t>

<ul empty="true"><li>
  <t>The definition of the 12 most significant bits of an OUI-36 RCOI to indicate OpenRoaming policy controls that
can be enforced by ANPs and IDPs.</t>
</li></ul>

<t>Identity Provider (IDP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and
includes the OpenRoaming RCOI(s) in the Passpoint profile of its end-user devices and
authenticates end-user devices on OpenRoaming ANP networks.</t>
</li></ul>

<t>Level of Assurance (LoA):</t>

<ul empty="true"><li>
  <t>An ISO/IEC 29115 term that is used to define equivalent levels for handling of end-user enrollment, credential management
and authentication amongst different IDPs.</t>
</li></ul>

<t>OpenRoaming-Settled:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of BA-A2-D0 that is used to indicate that the ANP expects to receive payment for
providing OpenRoaming service to end-users.</t>
</li></ul>

<t>OpenRoaming-Settlement-Free:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of 5A-03-BA that is used to indicate that the ANP provides the OpenRoaming service to end-users at
no cost to the IDP.</t>
</li></ul>

<t>Passpoint Profile:</t>

<ul empty="true"><li>
  <t>Passpoint is a Wi-Fi Alliance (WFA) certification program that defines the use a Passpoint profile, that includes the user's credentials
and the access network identifiers, that enables Wi-Fi devices to automatically discover and authenticate to Wi-Fi hotspots
that provide Internet access <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>PLMN Id:</t>

<ul empty="true"><li>
  <t>A unique identifier for a mobile network (cellular) operator. The identifier consists of a MCC (Mobile Country Code) and a MNC (Mobile Network Code). ITU-T Recommendation <xref target="E212"/> defines both MCC and MNC. The ITU allocates MCC values to national regulators who are then responsible for allocating MNC values to individual mobile network operators.  <xref target="PASSPOINT"/> defines how the PLMN Id can be sent in ANQP messages.</t>
</li></ul>

<t>Roaming Consortium Identifier (RCOI):</t>

<ul empty="true"><li>
  <t>RCOI identifies the groups of identity providers that are supported by the network.
It is a 3-octet, or a 5-octet value carried in the 802.11 beacon information element (IE).
It is also sent in the ANQP messages. Based on the access technologies, the specific link-layer
protocols will be used for carrying the RCOI. RCOI is also part of the Passpoint profile.</t>
</li></ul>

<ul empty="true"><li>
  <t>NOTE: OpenRoaming only uses 5-octet RCOIs.</t>
</li></ul>

<t>Subscriber Identity Module (SIM):</t>

<ul empty="true"><li>
  <t>The SIM is traditionally a smart card distributed by a mobile operator.</t>
</li></ul>

<t>WBA Identity (WBAID):</t>

<ul empty="true"><li>
  <t>A hierarchical namespace that is used to uniquely identify every OpenRoaming entity.</t>
</li></ul>

<t>Wireless Roaming Intermediary eXchange (WRIX):</t>

<ul empty="true"><li>
  <t>A framework, aimed at facilitating
  interconnectivity between operators and the Wi-Fi roaming hub services.</t>
</li></ul>

</section>
</section>
<section anchor="wireless-broadband-alliance"><name>Wireless Broadband Alliance</name>

<t>The Wireless Broadband Alliance (WBA) defines the Wireless
Roaming Intermediary eXchange (WRIX) framework, aimed at facilitating
interconnectivity between Wi-Fi operators and the Wi-Fi roaming hub services,
as well as the Carrier Wi-Fi Services program that provides guidelines to
improve customer experience on Carrier Wi-Fi networks. Both of these
programs leverage the Wi-Fi Alliance specified Passpoint functionality
<xref target="PASSPOINT"/> to enable automatic and secure connectivity to Wi-Fi networks, allowing devices
to be provisioned with network access credentials with minimal user interaction.</t>

<t>WBA programs have traditionally focussed on "offloading"
cell phone data from cellular networks onto Wi-Fi networks.
Deployments of such systems have seen uneven
adoption across geographies, with cellular operators frequently limiting
their engagement to premier locations that have deployed Wi-Fi and experience
a significant footfall of operator's customers.</t>

<t>Whereas conventional Carrier Wi-Fi has focused on premier locations, the
last decade has seen a continued increase in the requirements of private Wi-Fi
networks to be able to serve visitors, contractors and guest users. Moreover, in
most of these scenarios, the Wi-Fi network is primarily being used to support some
alternative value proposition; an improved retail experience in a shopping
mall, a more efficient meeting in a carpeted office, a superior stay in a
hospitality venue, or a better fan experience in a sporting arena. Traditionally,
this segment has made wide-scale use of captive portals and unencrypted Wi-Fi links
to onboard end-users onto their networks <xref target="RFC8952"/>. However, increasing concerns
around sending Internet traffic over open, untrusted networks, together with the
decreasing costs for cellular data, mean that
end-users are less motivated to search out and attach to such "free" Wi-Fi
networks, and as a consequence, captive portal conversion rates continue to decrease.</t>

<t>As a consequence, in 2020 WBA launched its OpenRoaming federation,
designed to provide a better on-boarding experience to end-users, that is seamless, scalable and secure.</t>

</section>
<section anchor="orarch"><name>OpenRoaming Architecture</name>

<t><xref target="figwifiarch"/> contrasts a conventional carrier Wi-Fi roaming system with OpenRoaming.
As illustrated, conventional Wi-Fi roaming has typically been based on:</t>

<t><list style="numbers" type="1">
  <t>IPSec <xref target="RFC6071"/> tunnels established between access networks, hub providers and identity providers used to protect exchanged signalling.</t>
  <t>Static routing of RADIUS signalling <xref target="RFC2865"/> based on realm routing tables populated according to agreements between access networks and hub providers.</t>
  <t>Passpoint primarily used with SIM based identifiers, where individual PLMN Ids are configured on the access networks WLAN equipment enabling them to be sent in ANQP messages, and cellular providers enable Passpoint based SIM authentication in end-user devices.</t>
  <t>EAP-AKA <xref target="RFC4187"/> based Passpoint authentication exchanged between the Supplicant in the end-user device and the EAP Server in the cellular provider's network.</t>
  <t>A primary focus on carrier based identities where the end-user has a billing relationship with the carrier.</t>
</list></t>

<t>In contrast, OpenRoaming is based on:</t>

<t><list style="numbers" type="1">
  <t>RadSec signalling <xref target="RFC6614"/> secured using mTLS with certificates issued under WBA's private certificate authority.</t>
  <t>Dynamic routing of RADIUS based on DNS-based discovery of signalling peers <xref target="RFC7585"/></t>
  <t>Passpoint based network selection based on 36-bit Roaming Consortium Organization Identifiers (RCOIs), where WBA defines the use of the 12 most significant bits of the 36-bit RCOI to embed closed access group policies.</t>
  <t>Passpoint authentication that can use any suitable EAP method.</t>
  <t>Encompassing new identity providers who do not necessarily have a billing relationship with their end-users.</t>
</list></t>

<t>Example EAP methods used with Passpoint include EAP-TLS, EAP-SIM, EAP-AKA, EAP-AKA' and EAP-TTLS with MS-CHAP-V2 that are included in Table 4 of the Passpoint specification <xref target="PASSPOINT"/>. In addition to these 5 EAP methods, Wi-Fi devices are available that can be configured to use different EAP type with Passpoint, including Passpoint with Protected EAP (PEAP) <xref target="PEAP"/>, EAP-TEAP <xref target="RFC7170"/> and EAP-FAST <xref target="RFC4851"/> outer methods, together with alternative inner methods to MS-CHAP-V2 used inside EAP-TTLS, including EAP-TLS.
Because OpenRoaming ANPs have no direct relationship with OpenRoaming IDPs that decide the credential type and EAP method to use when authenticating End-User devices, OpenRoaming ANPs SHOULD ensure that all EAP Methods compatible with Passpoint can be used to authenticate End-User devices.</t>

<figure title="Contrasting Carrier Wi-Fi and OpenRoaming Architectures" anchor="figwifiarch"><artwork><![CDATA[
+---------+        +--------+        +--------+        +--------+              
| Visited |        | Wi-Fi  |        | Wi-Fi  |        |Cellular|              
|  Wi-Fi  |        |  Hub   |        |  Hub   |        |Provider|              
| Network |<------>|Provider|<------>|Provider|<------>|Network |              
|         | RADIUS |        | RADIUS |        | RADIUS |        |              
|   NAS   |        | RADIUS |        | RADIUS |        | RADIUS |              
|         |<------>| proxy  |<------>| proxy  |<------>| Server |              
|Passpoint| IPSec  +--------+ IPSec  +--------+ IPSec  +--------+              
|PLMNId(s)|                                                                    
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+         A) Conventional Carrier Wi-Fi                              
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| PLMN-Id |                                                                    
| profile |                                                                    
+---------+                                                                    


+---------+                   +---+                    +--------+              
| Visited |<----------------->|DNS|<------------------>|Identity|              
|  Wi-Fi  |   DNS based peer  +---+  Configure NAPTR,  |Provider|              
| Network |      discovery            SRV and A/AAAA   |Network |              
|         |                              records       |        |              
|   NAS   |                                            | RADIUS |              
|         |<------------------------------------------>| Server |              
|Passpoint|        RadSec/TLS secured using mTLS       +--------+              
| RCOI(s) |               and WBA PKI                                          
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+              B) OpenRoaming                                        
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| RCOI(s) |                                                                    
| profile |                                                                    
+---------+                                                                    

]]></artwork></figure>

</section>
<section anchor="wbaid"><name>Identifying OpenRoaming Entities</name>

<t>All OpenRoaming providers and OpenRoaming brokers are allocated a WBA Identity (WBAID). The
WBAID is defined to be transported in the RADIUS Operator-Name attribute (#126) <xref target="RFC5580"/>.
WBA has been allocated the Operator Namespace identifier 0x34 "4" to identify
an Operator-Name attribute carrying a WBAID.</t>

<t>The WBAID is a hierarchical namespace that comprises at its top level the
identity allocated by WBA to a WBA Member and is of the form shown in <xref target="figwbaid"/>
where the optional 2 upper case characters represent an ISO-3166 Alpha-2 country code <xref target="ISO3166"/> e.g.,
"WBAMEMBER:US".</t>

<figure title="ABNF definition of Primary WBAID Structure" anchor="figwbaid"><artwork><![CDATA[
WBAID         = member-string [ ":" country-code ]

member-string = 1*( member-char )

member-char   = UPPERALPHA / DIGIT / SPECIAL

country-code  = 2UPPERALPHA

UPPERALPHA    = %x41-5A  ; "A"-"Z"
DIGIT         = %x30-39  ; "0"-"9"

; SPECIAL: permitted special characters
; excludes ":", ".", "_", "#", pound (%xA3), "*", '"'

SPECIAL       = %x21 / %x24-26 / %x28-29 / %x2B-2D /
                %x2F / %x3C-40 / %x5B-5E / %x7B-7E

]]></artwork></figure>

<t>When operating as an OpenRoaming broker, the WBA Member
is able to allocate subordinate identities to OpenRoaming providers
who are not WBA members by pre-pending a subordinate identity ,
plus "." (%x2e) to the Member's WBAID, e.g., "OPENROAMINGPROVIDER.WBAMEMBER:US".
In this way, any receiving entity of a WBAID can identify the WBA Member who
is acting as an OpenRoaming broker to the provider by assigning it an identity.</t>

</section>
<section anchor="sss"><name>Scaling Secured Signalling</name>

<t>As described in <xref target="legal"/>, the OpenRoaming legal framework does not assume
any direct relationship between ANP and IDP. In order to scale the
secured signalling between providers, the federation makes use of a
Public Key Infrastructure using a private Certificate Authority specifically
designed to secure the operations of the roaming federation. WBA
and its members have published the WBA Certificate Policy <xref target="WBAPKICP"/> that defines the
policies which govern the operations of the PKI components by all
individuals and entities within the infrastructure. The OID for Wireless
Broadband Alliance is:</t>

<t>{ iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) The Wireless Broadband Alliance(14122) }</t>

<t>The Wireless Broadband Alliance organizes its OID arcs for the Certificates
Policy Documents using the object identifier 1.3.6.1.4.1.14122.1.1. At the time of writing,
the current certificate policy is 1.3.6.1.4.1.14122.1.1.7.</t>

<t>This Certificate Policy is based on a 4-level hierarchy, as illustrated in <xref target="figpki"/>.</t>

<figure title="OpenRoaming PKI Hierarchy" anchor="figpki"><artwork><![CDATA[
+---------+---------------------------+----------------------------+
|         |                           |                            |
| Level   | Description               |  Comment                   |
|         |                           |                            |
+---------+---------------------------+----------------------------+
| Level 1 | OpenRoaming Root          | Operation managed by WBA   |
|         | Certificate Authority     |                            |
+---------+---------------------------+----------------------------+
| Level 2 | OpenRoaming Policy        | Operation managed by WBA.  |
|         | Intermediate Certificate  | Instantiates WBA policy OID|
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Issuing       | Operated by an OpenRoaming |
|         | Intermediate Certificate  | broker                     |
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Registration  | Optional and when used,    |
|         | Authority                 | operated by an OpenRoaming |
|         |                           | broker                     |
+---------+---------------------------+----------------------------+
| Level 4 | OpenRoaming Entity        | A WBA member or non-member.|
|         |                           | WBA's Certificate Policy   |
|         |                           | requires the Entity's      |
|         |                           | WBAID is included in the   |
|         |                           | Subject UID field in the   |
|         |                           | certificate.               |
+---------+---------------------------+----------------------------+

]]></artwork></figure>

<t>Certificates issued under the WBA PKI are used by Entities to perform mutual
authentication with other Entities and to secure RadSec
signalling <xref target="RFC6614"/> that carries EAP-based Passpoint authentication. This is typically between a
RadSec client in the OpenRoaming ANPs network and an RadSec Server in the OpenRoaming
IDPs network, although a provider can decide to outsource the operation of the RadSec
endpoint to a third party provider.</t>

<t>OpenRoaming is a distributed federation that lacks a centralized RADIUS element for identifying
and troubleshooting signalling issues. Instead, the WBA operates cloud-based systems capable of verifying
the correct configuration of DNS and TLS endpoints for OpenRoaming IDPs that have registered their realms with the WBA.
This baseline testing by the WBA ensures that ANPs and IDPs can establish a TLS connection,
such as when an end-user from an IDP roams into the coverage area of Wi-Fi networks operated by an ANP.</t>

<t>To provide a scalable system that enables access and identity providers to collaboratively troubleshoot and resolve issues, the WBA Certificate Practice Statement <xref target="WBAPKICPS"/> mandates that the Subject Alternative Name (SAN) attribute in
issued end-entity certificates includes a contact email address responsible for handling issues raised by third-party providers. The OpenRoaming legal framework requires ANPs and IDPs to make reasonable efforts to support troubleshooting procedures. This includes monitoring the email address listed in the SAN attribute of the certificate and responding to any issues raised by legitimate third parties.</t>

</section>
<section anchor="dpd"><name>IDP Discovery</name>

<section anchor="dynamic-discovery"><name>Dynamic Discovery</name>

<t>OpenRoaming defines the use of dynamic discover <xref target="RFC7585"/> by which an ANP discovers the
IP address of the IDP's RadSec server.</t>

</section>
<section anchor="discovery-of-eap-akaaka-servers"><name>Discovery of EAP-AKA/AKA' Servers</name>

<t>Passpoint defines the use of EAP-AKA' based authentication <xref target="RFC5448"/> which uses the
3GPP 23.003 <xref target="TS23003"/> defined realm of wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, where
&lt;mcc&gt; represent an E.212 Mobile Country Code and &lt;mnc&gt; represents the E.212
Mobile Network Code allocated to the IDP. GSMA is responsible for
operating the 3gppnetwork.org domain and GSMA IR.67 <xref target="GSMAIR67"/> limits access to
the DNS systems supporting such records to those systems connected to the inter-PLMN IP
backbone (known as "GRX/IPX"). As OpenRoaming ANPs do not connect to this inter-PLMN backbone,
then conventional realm based lookup cannot be used over the Internet to discover the RadSec server
supporting EAP-AKA' authentication.</t>

<t>GSMA IR.67 does allow systems to be discoverable
from the public Internet, specifically calling out the use of the
pub.3gppnetwork.org sub-domain name for such procedures. In order for ANPs
to dynamically discover the RadSec server supporting EAP-AKA' authentication,
GSMA has defined the use of the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org by
OpenRoaming systems. This means that whenever a RadSec client receives a user-name
containing an NAI formatted as user@wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, the dynamic
peer detection functionality MUST insert ".pub" into the realm and perform
DNS based dynamic discovery using the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org
domain name. The RADIUS user-name attribute MUST NOT be similarly modified.</t>

<t>IR.67 defines the procedure by which a cellular operator can request the delegation
of their mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org sub-domain.  GSMA PRD IR.67 also allows an MNO
to delegate the entire mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org sub-domain
which could have already occurred, e.g., to enable use of the
epdg.epc.mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org used with 3GPP's Wi-Fi calling service. Using this approach,
a cellular operator operating as an OpenRoaming IDP can authenticate their end-users on
third party ANP Wi-Fi networks.</t>

</section>
<section anchor="proving-a-discovered-radsec-server-is-authoritative-for-a-realm"><name>Proving a discovered RadSec server is authoritative for a realm</name>

<t>The OpenRoaming preferred approach to dynamically discover the RadSec server
IP address serving a particular realm or set of realms is to
use DNS records that are protected with DNSSEC <xref target="RFC9364"/>. However, GSMA
has not enabled DNSSEC on its 3gppnetwork.org domain, meaning that DNSSEC
cannot be applied on the publicly resolvable domains under pub.3gppnetwork.org.
Because of this situation, OpenRoaming does not currently mandate operation of DNSSEC.</t>

<t>If the DNS records for a realm are not protected with DNSSEC, because the realm
has been provided directly by the OpenRoaming End-User, the
IDP SHOULD ensure that the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the realm(s)
used in the dynamic peer detection in the certificate SubjectAltName.</t>

<t>Where the DNS records are protected with DNSSEC, the IDP SHOULD ensure that
the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the secured DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

<t>Where the OpenRoaming IDP has offloaded the operation of RadSec termination to a
third party hub-provider that is responsible for supporting a number of independent realms,
the hub-provider SHOULD ensure that the discovered RadSec server(s) supporting
the independent realms from its partner IDPs
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

</section>
<section anchor="co-existence-with-other-federations"><name>Co-existence with other Federations</name>

<t>Other federations which want to interface to the OpenRoaming federation may use
dynamic discovery with distinct NAPTR application service tags to facilitate integration.
For example, an eduroam service provider can use the use the "x-eduroam"
application service tag, specified in <xref target="RFC7593"/>, to discover the home institution's
RadSec peer for authentication, and OpenRoaming ANPs can use the "aaa+auth" tag to discover
a separate RadSec peer that can be defined for handling all inter-domain authentications.</t>

<t>Where a separate inter-federation RadSec peer is not used, the other federation AAA operating
as an OpenRoaming IDP needs to determine which certificate chain to return in its ServerHello message.
An OpenRoaming ANP operating with TLS 1.3 SHOULD use the "certificate_authorities" extension <xref target="RFC8446"/>
in its ClientHello message to indicate that the ANP supports the WBA PKI Certificate Authority trust anchor.
Similarly, an OpenRoaming ANP operating using TLS 1.2 SHOULD use the "trusted_ca_keys" extension <xref target="RFC6066"/> in its ClientHello message to indicate the DistinguishedName of the WBA PKI Certificate Authority whose root keys the ANP possesses. The federation AAA operating as an OpenRoaming IDP MAY use information in the ClientHello extension to guide its certificate selection.</t>

</section>
</section>
<section anchor="PASSPOINT-SEC"><name>OpenRoaming Passpoint Profile</name>

<section anchor="openroaming-policy-controls"><name>OpenRoaming Policy Controls</name>

<t>In order to avoid possible fragmentation of roaming federations, OpenRoaming recognizes
that there is a need to permit OpenRoaming to be integrated into a variety of
different use-cases and value propositions. These use-cases include scenarios where
providers are able to enforce policy controls of which end-users are authorized to access the service.
The realization of authorization policy controls in the OpenRoaming federation is a balance
between the requirements for fine grain policy enforcement versus the potential
impact of policy enforcement on the user experience.</t>

<t>Such a level of control is realized using Closed Access Group (CAG) based policies.
A Closed Access Group identifies a group of OpenRoaming users who are permitted
to access one or more OpenRoaming access networks configured with a particular CAG policy.
These Closed Access Group policies are encoded using one or more
Roaming Consortium Organization Identifiers (RCOIs), first defined
in Passpoint Release 1.0, and well supported
across the smartphone device ecosystem.</t>

<t>Note, encoding CAG policies in OpenRoaming using one or more RCOIs is aimed at
delivering an equivalent functionality to the CAG policies encoded in 3GPP using one or more CAG-IDs.</t>

</section>
<section anchor="CAG"><name>OpenRoaming Closed Access Group Policies</name>

<t>OpenRoaming defines the use of multiple RCOIs to facilitate the implementation of
closed access group policies across the federation. The currently defined RCOIs are:</t>

<t><list style="symbols">
  <t>OpenRoaming-Settled:  BA-A2-D0-xx-x</t>
  <t>OpenRoaming-Settlement-Free:  5A-03-BA-xx-x</t>
</list></t>

<t><xref target="figrcoi"/> shows how the 24-bit length OpenRoaming RCOIs are further extended into 36-bit length OUI-36s
with additional context dependent identifiers used to encode specific closed access group
policies. Following Passpoint Release 1.0 specification, only when there is a bitwise match of
all 36 bits of the configured RCOI in the WLAN equipment and the Passpoint profile configured in the
end-user device will an EAP authentication be triggered.</t>

<t>The encoding of closed access group policies is defined so that the "no-restrictions" policy is
encoded using the 12-bit value "00-0", i.e., 54-03-BA-00-0 represents a policy
that accepts all OpenRoaming settlement-free users onto a particular ANP installation.</t>

<figure title="Extension of Octets 4 and 5 for OpenRoaming Context Dependent RCOI Field " anchor="figrcoi"><artwork><![CDATA[
+---------------------------------------+-------------------+
|               OUI-36 Octet 4          |  OUI-36 Octet 5   |
+---------------------------------------+-------------------+
| B7 | B6 | B5 | B4 | B3 | B2 | B1 | B0 | B7 | B6 | B5 | B4 |
+----+---------+----+-------------------+-------------------+
| LoA|   QoS   |PID |     ID-Type       |On-b|  Reserved -  |
|    |         |    |                   |oard|   set to 0   |
+----+---------+----+-------------------+-------------------+

]]></artwork></figure>

<section anchor="level-of-assurance-policies"><name>Level of Assurance Policies</name>

<t>The format of the Level of Assurance (LoA) field is as shown in <xref target="figloa"/>.</t>

<figure title="OpenRoaming CAG LoA Field " anchor="figloa"><artwork><![CDATA[
+------------------------------------------------------------+
|  LoA Field  |           Description                        |
+------------------------------------------------------------+
|     B7      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline Identity Proofing                 |
+------------------------------------------------------------+
|     1       |   Enhanced Identity Proofing                 |
+------------------------------------------------------------+

]]></artwork></figure>

<t>The baseline identity proofing requirement on IDPs ensures that all
OpenRoaming identities are managed with at least a medium level of
assurance (LoA level 2) for end-user enrollment, credential management
and authentication, as specified in ISO/IEC 29115 <xref target="ISO29115"/>.</t>

<t>Any IDP that manages its identities according to ISO/IEC 29115 LoA level 2
MUST NOT configure any RCOI in their end-users' Passpoint profile
with the LoA field set to "1". Conversely, an IDP that manages its identities
according to ISO/IEC 29115 LoA level 3 MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the LoA field
set to "0" and RCOIs with the LoA field set to "1".</t>

<t>The LoA field is used to support ANPs which operate in regulatory
regimes that require enhanced identity proofing to be used in the
provision of credentials on OpenRoaming devices, equivalent to LoA level
3 in ISO/IEC29115 <xref target="ISO29115"/>. In such a scenario, the ANP can set the LoA bit
field to 1 in all configured RCOIs to ensure that only identities
provisioned using enhanced LoA 3 procedures can access via the ANP's network.</t>

</section>
<section anchor="quality-of-service-policies"><name>Quality of Service Policies</name>

<section anchor="access-network-requirements"><name>Access Network Requirements</name>

<t>One of the challenges faced by users of Wi-Fi hotspots is when the Wi-Fi network
is configured sub-optimally and results in a poor user experience. Often the only
remedy open to a user it to disable the Wi-Fi interface on their smartphone and
continue to use cellular data. This is especially the case where the Wi-Fi hotspot
has been automatically selected with no user intervention. As a consequence, OpenRoaming defines specific
service tiers across the federation and uses the QoS field to differentiate between different tiers.
The format of the QoS field is shown in <xref target="figqos"/>.</t>

<figure title="OpenRoaming CAG QoS Field " anchor="figqos"><artwork><![CDATA[
+------------------------------------------------------------+
|            QoS Field              |      Description       |
+------------------------------------------------------------+
|        B6       |        B5       |                        |
+------------------------------------------------------------+
|        0        |        0        |        Bronze          |
+------------------------------------------------------------+
|        0        |        1        |        Silver          |
+------------------------------------------------------------+
|        1        |        0        |       Reserved         |
+------------------------------------------------------------+
|        1        |        1        |       Reserved         |
+------------------------------------------------------------+
]]></artwork></figure>

<t>The "Bronze" and "Silver" values of QoS field are used to identify
specific quality of service policy aspects.</t>

<t>The bronze service tier corresponds to the following:</t>

<t><list style="numbers" type="1">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 90% over any one month period.</t>
  <t>The ANP shall ensure that the maximum download speed that End Users
can access the Internet shall be at least 50 megabits per second.</t>
  <t>During the busy hour, the aggregate bandwidth used to receive
Internet service on the ANP's network is sufficient to enable
each and every authenticated and authorized OpenRoaming end-user to simultaneously receive a
sustained 256 kilobits per second connection.</t>
</list></t>

<t>The silver service tier corresponds to the following:</t>

<t><list style="numbers" type="1">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 95% over any one month period.</t>
  <t>The ANP shall ensure that the maximum download speed that End Users
can access the Internet shall be at least 100 megabits per second.</t>
  <t>During the busy hour, the aggregate bandwidth used to receive
Internet service on the ANP's network is be sufficient to enable
each and every authenticated and authorized end-user to receive a
sustained 512 kilobits per second connection.</t>
  <t>At least 10% of authenticated and authorized users are able
to stream video content at a downlink rate of at least 5 megabits per
second (when measured over a one-minute interval) over all of the ANP's
OpenRoaming enabled Wi-Fi networks.</t>
  <t>The authenticated and authorized end-users are
able to stream video from one or more third party content distribution
networks with an end-to-end latency of less than 150ms from all of the
ANP's OpenRoaming enabled Wi-Fi networks.</t>
</list></t>

<t>The QoS field can be used by those IDPs that are only interested in providing
their end-users with a higher quality service level when automatically authenticated
onto an OpenRoaming network. For example, an IDP configures the QoS field
as bronze in a Passpoint profile that uses the "5A-03-BA" settlement free RCOI and
configures the QoS field as silver in a Passpoint profile that uses the
"BA-A2-D0" OpenRoaming-settled paid service.</t>

<t>ANPs that only support the bronze service tier MUST set the QoS Field to "00" in
all RCOIs configured on their WLAN equipment. ANPs that support the silver service
tier MAY configure multiple RCOIs on their WLAN equipment that include values where
the QoS field is set to "01" and values where the QoS field is set to "00".</t>

<t>Exceptionally, ANPs that operate OpenRoaming installations on moving platforms
are permitted to deviate from normal OpenRoaming service level requirements. This is
because such installations may necessitate use of cellular-based backhaul and/or
backhaul via Non-Terrestrial Networks (NTN) which may not be able to meet the
OpenRoaming minimum "bronze" service level requirements.
If an ANP wants to benefit from such deviations, it MUST signal using the WLAN-Venue-Info
attribute <xref target="RFC7268"/> that it is operating in a venue category identified using
a Venue Group value of "10", which is defined in Section 8.4.1.34 of <xref target="IEEE80211"/>
as being used for vehicular installations. In such cases, the OpenRoaming ANP MAY
signal one or more WBA-Custom-SLA vendor specific attributes <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

</section>
<section anchor="identity-provider-requirements"><name>Identity Provider Requirements</name>

<t>Irrespective of the service-levels supported by their users, the IDP shall ensure
that the availability of their authentication service measured during scheduled
operations shall exceed 99% over any one month period.</t>

</section>
<section anchor="rationale-for-busy-hour-sustained-throughput-values"><name>Rationale for busy hour sustained throughput values</name>

<t>The ANP requirements for sustained busy hour throughput requirements above are based on equating a notional per month consumption to a sustained busy hour throughput. The following calculation represents the mapping of sustained throughput to monthly consumption.</t>

<t><list style="symbols">
  <t>Busy hour sustained throughput = 256 kilobits per second</t>
  <t>Busy hour consumption = 256 x 1024 x 3600 / 8 = 118 megabytes per hour</t>
  <t>Daily consumption, assuming 7% consumed in busy hour = 118 / 0.07 = 1.69 gigabytes</t>
  <t>Monthly consumption, assuming 22 busy days per month = 1.69 x 22 = 37.1 gigabytes/month</t>
</list></t>

<t>Comparing to a cellular usage, we need to use smartphone consumption figures that precludes Wi-Fi as well as broadband specific fixed wireless access subscriptions.</t>

<t>Using an example 10 gigabytes/month consumption per cellular subscription, it is evident that OpenRoaming bronze is dimensioned to accommodate 3.7 times the example cellular traffic, or 78% of total traffic when cellular and Wi-Fi are combined. Similarly, OpenRoaming silver is dimensioned to carry 88% of total traffic when cellular and Wi-Fi are combined.</t>

</section>
</section>
<section anchor="privacy-policies"><name>Privacy Policies</name>

<t>The baseline privacy policy of OpenRoaming ensures
the identities of end-users remain anonymous when using the
service. The WBA WRIX specification specifies that where supplicants use EAP methods
that support user-name privacy, i.e., which are compatible with the "@realm" (or "anonymous@realm") (outer) EAP-Identifier,
then the supplicant SHOULD use the anonymized outer EAP identifier. Supplicants supporting
other EAP methods SHOULD support EAP method specific techniques for masking the
end-user's permanent identifier, for example pseudonym support in EAP-AKA/AKA' <xref target="RFC4187"/>
and/or enhanced IMSI privacy protection <xref target="WBAEIPP"/>. OpenRoaming IDPs SHOULD support and
enable the corresponding server-side functionality to ensure end-user privacy is protected.</t>

<t>The WBA WRIX specification also recognizes that the privacy of end-users can be
unintentionally weakened by the use of correlation identifiers signalled using the
Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and/or the Class attribute (#25) <xref target="RFC2865"/>
in the RADIUS Access-Accept packet. The WBA WRIX Specification recommends that the
default IDP policy SHOULD ensure that, when used, such correlation identifiers are unique for
each combination of end-user/ANP and that the keys and/or initialization vectors
used in creating such correlation identifiers SHOULD be refreshed at least every 48 hours,
but not more frequently than every 2 hours.</t>

<t>This 2 hour limit is designed to assist the ANP in performing autonomous troubleshooting
of connectivity issues from authentic users/devices that are repeatedly re-initiating
connectivity to the ANP's network and/or to assist the ANP in identifying a new session
originated by an authentic user/device that has previously been identified by the ANP as having violated the OpenRoaming
end-user terms and conditions. When using typical public Wi-Fi session durations, it is
estimated that, with this 2 hour restriction, the ANP will be able to correlate an
Access-Request/Access-Accept exchange that immediately follows an Accounting-Request
stop message in over 50% of the sessions.</t>

<t>In contrast to this default policy, there can be scenarios where the ANP
desires to derive value from its OpenRoaming settlement-free service by analysing
aggregate end-user behaviour. Whereas the use of aggregated end-user information does not
violate the OpenRoaming privacy policy, the derivation of such can benefit from the
ANP being able to uniquely identify end-users. In order to support such scenarios, the
OpenRoaming closed access group policies include the PID field.</t>

<t>The PID field can be used to support scenarios where the user has consented
with their IDP that an immutable end-user identifier can be signalled to the
ANP in the RADIUS Access-Accept. The format of the PID field is
illustrated in <xref target="figpid"/>. The PID
field can be configured to "1" in the RCOIs used by those ANPs that
want to be be able to account for unique OpenRoaming end-users.</t>

<t>The OpenRoaming IDP terms ensure subscribers MUST
explicitly give their permission before an immutable end-user identity
is shared with a third party ANP. When such permission has
not been granted, an IDP MUST NOT set the PID field to "1" in any
of the RCOIs in its end-user Passpoint profiles. When such permission has
been granted, an IDP MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the PID field
set to "0" and RCOIs with the PID field set to "1".</t>

<figure title="OpenRoaming CAG PID Field " anchor="figpid"><artwork><![CDATA[
+------------------------------------------------------------+
|  PID Field  |                 Description                  |
+------------------------------------------------------------+
|     B4      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline ID Policy applies, i.e., users    |
|             |   remain anonymous whilst using the service. |
+------------------------------------------------------------+
|     1       |   An immutable end-user ID will be returned  |
|             |   by the IDP in the Access-Accept packet.    |
+------------------------------------------------------------+

]]></artwork></figure>

</section>
<section anchor="id-type-policies"><name>ID-Type Policies</name>

<t>The ID-Type field can be used to realize policies which are based
on the business sector associated with the identity used by the IDP.
The format of the ID-Type
field is illustrated in <xref target="figidtype"/>.</t>

<t>All IDPs configure at least one RCOI in their end-user's
Passpoint profile with ID-Type set to "0000" (Any identity type is permitted).
An IDP MAY configure additional RCOIs in their end-users' Passpoint profile
with an ID-Type representing the sector type of IDP.</t>

<t>An ANP what wants to serve all end-users, irrespective of sector,
configures RCOIs in the WLAN equipment with ID-Type set to "0000".
Alternatively, an ANP which operates a sector specific business that
only desires to serve a subset of OpenRoaming end-users MAY set the ID-Type
to their desired sector in all configured RCOIs.</t>

<figure title="OpenRoaming CAG ID-Type Field " anchor="figidtype"><artwork><![CDATA[
+------------------------------------------------------------+
|       ID-Type Field       |           Description          |
+------------------------------------------------------------+
|  B3  |  B2  |  B1  |  B0  |                                |
+------------------------------------------------------------+
|  0   |  0   |  0   |  0   | Any identity type is permitted |
+------------------------------------------------------------+
|  0   |  0   |  0   |  1   | A service provider identity    |
+------------------------------------------------------------+
|  0   |  0   |  1   |  0   | A cloud provider identity      |
+------------------------------------------------------------+
|  0   |  0   |  1   |  1   | A generic enterprise identity  |
+------------------------------------------------------------+
|  0   |  1   |  0   |  0   | A government identity, e.g.,   |
|      |      |      |      | including city                 |
+------------------------------------------------------------+
|  0   |  1   |  0   |  1   | An automotive identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  0   | A hospitality identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  1   | An aviation industry identity  |
+------------------------------------------------------------+
|  1   |  0   |  0   |  0   | An education or research       |
|      |      |      |      | identity                       |
+------------------------------------------------------------+
|  1   |  0   |  0   |  1   | A cable industry identity      |
+------------------------------------------------------------+
|  1   |  0   |  1   |  0   | A manufacturer identity(note 1)|
+------------------------------------------------------------+
|  1   |  0   |  1   |  1   | A retail identity              |
+------------------------------------------------------------+
|        other values       | Reserved                       |
+------------------------------------------------------------+
| NOTE 1: A manufacturer identity closed access group policy |
| applies to IoT credentials corresponding to manufacturer   |
| installed identities as well as IoT credentials            |
| corresponding to owner installed identities.               |
+------------------------------------------------------------+

]]></artwork></figure>

</section>
<section anchor="OBCP"><name>On-boarding Credential Policies</name>

<t>The format of the on-boarding credential policy (On-board) field is as shown in <xref target="figonboard"/>.</t>

<figure title="OpenRoaming CAG On-board Field " anchor="figonboard"><artwork><![CDATA[
+------------------------------------------------------------+
| On-board Field  |               Description                |
+------------------------------------------------------------+
|  B7 Octet 5     |                                          |
+------------------------------------------------------------+
|     0           |   A long-lived identity                  |
+------------------------------------------------------------+
|     1           |   A short-lived identity                 |
+------------------------------------------------------------+

]]></artwork></figure>

<t>The On-board field is used to identify closed access group
policy aspects related to whether the identity/profile is
long-lived, or whether the identity/profile is short-lived.
Short-lived profiles are intended to only be used to provide
connectivity such that the procedure for configuring a
long-lived identity/profile can be performed.</t>

<t>Sessions authorized with short-lived credentials MUST have a
session-timeout value of less than 300 seconds.</t>

</section>
</section>
<section anchor="prioritizing-policies"><name>Prioritizing Policies</name>

<t>The  definition of OpenRoaming closed access group policies assumes
the configuration of multiple RCOIs in ANP WLAN equipment and IDP end-user devices.</t>

<t>When a device has multiple Passpoint profiles matching the ANP's RCOI policy,
an OpenRoaming ANP may want to prefer OpenRoaming subscribers use a particular IDP's
profile when attaching to its access network. Such a preference can be because
the OpenRoaming ANP has a preferential relationship with certain OpenRoaming IDPs.</t>

<t>The OpenRoaming ANP is able to use the Home SP preference functionality defined in
Passpoint <xref target="PASSPOINT"/> to prioritize the use of a particular profile by a Passpoint enabled device.
In such a scenario, the ANP configures the Domain Name list to include the
FQDN(s) associated with the profile(s) to be prioritized.</t>

</section>
</section>
<section anchor="RADIUS"><name>OpenRoaming RADIUS Profile</name>

<t>The OpenRoaming RADIUS profile is based on the WBA WRIX Specification which in turn
are derived from <xref target="RFC3580"/> and <xref target="RFC3579"/>. All ANPs MUST support RADIUS Accounting
for all OpenRoaming sessions, irrespective of which RCOIs are supported, i.e., for both
settled and settlement free service. All IDPs MUST respond to any RADIUS Access-Request
and Accounting-Request packet received.</t>

<t>Additionally, OpenRoaming defines the use of the following RADIUS attributes.</t>

<section anchor="operator-name"><name>Operator-Name</name>

<t>As described in <xref target="wbaid"/>, OpenRoaming uses the Operator-Name (#126) <xref target="RFC5580"/> attribute to signal
the WBAID of the OpenRoaming ANP. All ANPs MUST support the Operator-Name attribute and use it to signal the
WBAID of the OpenRoaming ANP.</t>

</section>
<section anchor="chargeable-user-identity"><name>Chargeable-User-Identity</name>

<t>All OpenRoaming ANPs MUST support the Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and
indicate such by including a CUI attribute in all RADIUS Access-Request packets. An ANP that has configured the OpenRoaming-Context PID Field set to "1" MAY treat a RADIUS Access-Accept received without a CUI attribute as an Access-Reject. An ANP that has configured the OpenRoaming-Context PID Field set to "0" MUST NOT treat any RADIUS Access-Accept received without a CUI attribute as an Access-Reject.</t>

<t>When an end-user has explicitly given their permission to share an immutable end-user identifier
with third party ANPs, the CUI returned by the IDP is invariant over subsequent
end-user authentication exchanges between the IDP and the ANP.</t>

</section>
<section anchor="location-datalocation-information"><name>Location-Data/Location-Information</name>

<t>All OpenRoaming ANPs MUST support signalling of location information using <xref target="RFC5580"/>.
As a minimum, all OpenRoaming IDPs need to be able to determine the country in which the
OpenRoaming ANP operates. The OpenRoaming legal framework described in <xref target="legal"/> serves as an "out-of-band agreement" as
specified in clause 3.1 of <xref target="RFC5580"/>. Hence, all OpenRoaming ANPs MUST include the Location-Data
attribute (#128) in the RADIUS Access-Request packet, where the location profile is the civic location profile
that includes the country code where the ANP is located <xref target="RFC5580"/>.</t>

<t>When the OpenRoaming ANP supports the OpenRoaming-Settled RCOI ("BA-A2-D0"),
the RADIUS Access-Request packet MUST include the Location-Data attribute (#128) where the location profile
is the civic location profile containing Civic Address Type information that
is sufficient to identify the financial regulatory regime that defines the
taxable rates associated with consumption of the ANP's service.</t>

<t>OpenRoaming also defines the optional use the geospatial location profile as specified in
<xref target="RFC5580"/>. ANPs MAY signal coordinate-based geographic location of
the NAS or end-user device.</t>

<t>The OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> restricts the use of all location information signalled to an IDP for either:</t>

<t><list style="numbers" type="1">
  <t>Making service authorization decisions based on the location of the ANP's wireless network; or</t>
  <t>Compliance with applicable law, or law enforcement requests.</t>
</list></t>

</section>
<section anchor="session-timeout"><name>Session-Timeout</name>

<t>An OpenRoaming ANP receiving a RADIUS Access Accept message including a
Session-Timeout attribute MUST operate according to <xref target="RFC3580"/>.</t>

<t>An IDP authenticating using a credential associated with a Passpoint profile with an RCOI where the On-board value is set to 1, as defined in <xref target="OBCP"/>, MUST set the session-timeout value to less than 300 seconds in the Access-Accept message.</t>

</section>
<section anchor="acct-session-id"><name>Acct-Session-Id</name>

<t>All OpenRoaming enabled ANPs MUST support attribute Acct-Session-Id <xref target="RFC2866"/>.
If an OpenRoaming IDP receives a RADIUS Access-Request message without an Acct-Session-Id, it should reject the Access-Request.</t>

<t>The Acct-Session-Id attribute SHOULD be temporally unique within an ANP's access network.</t>

<t>An OpenRoaming IDP that receives an Accounting-Request message without either an Acct-Session-Id or an Acct-Multi-Session-Id corresponding to an authenticated RADIUS session SHOULD create a log of the message non-compliance, including the WBAID of the ANP.</t>

</section>
<section anchor="acct-multi-session-id"><name>Acct-Multi-Session-Id</name>

<t>All OpenRoaming enabled ANPs configured to generate multiple related accounting sessions for a single EAP-Supplicant roaming between Wi-Fi Access points MUST support attribute Acct-Multi-Session-Id <xref target="RFC2866"/>.</t>

<t>The Acct-Multi-Session-Id attribute SHOULD be temporally unique within an ANP's access network.</t>

<t>An OpenRoaming IDP that receives an Accounting-Request message without either an Acct-Session-Id or an Acct-Multi-Session-Id corresponding to an authenticated RADIUS session SHOULD create a log of the message non-compliance, including the WBAID of the ANP.</t>

</section>
<section anchor="event-timestamp"><name>Event-Timestamp</name>

<t>All OpenRoaming ANPs MUST include the Event-Timestamp attribute <xref target="RFC2869"/> in all RADIUS Accounting-Request messages.</t>

</section>
<section anchor="enhanced-reply-message"><name>Enhanced Reply-Message</name>
<t>Reply-Message was originally defined in <xref target="RFC3579"/> as being forbidden from being
included in any RADIUS message containing an EAP-Message attribute. This was to prevent
earlier systems from attempting to interwork the Reply-Message text into an
EAP Notification packet.</t>

<t>In contrast to using Reply-Message to signal a displayable
text string to authenticating users, WBA's WRIX framework defines the re-use of
the attribute in WRIX-based Passpoint networks to signal additional
information from the IDP to the ANP, specifically regarding why a connection has been rejected.
The message received MUST NOT be shown to end users.</t>

<t>The enhanced reply-message is encoded using UTF-8 characters. The WBA defines additional
information is appended after the NUL ASCII character (0x00). The ABNF syntax of the
Reply-Message is shown in <xref target="figreply"/>.</t>

<figure title="WBA Enhanced Reply-Message Syntax" anchor="figreply"><artwork><![CDATA[
Reply-message      = [ displayable-string ] %x00 [ wba-info ]
displayable-string = *CHAR
wba-info           =  "Reject-Reason=" cause-code

cause-code =  "10" ; failed user authentication
cause-code =/ "11" ; invalid user identity
cause-code =/ "12" ; expired client certificate
cause-code =/ "20" ; generic AAA failure
cause-code =/ "21" ; backend failure
cause-code =/ "22" ; protocol timeout
cause-code =/ "30" ; failure due to badly formatted request
cause-code =/ "31" ; rejected - missing charging model
cause-code =/ "32" ; rejected - missing geospatial location
cause-code =/ "40" ; failure due to subscription - permanent
cause-code =/ "41" ; authorization rejected -
                   ; no service subscription
cause-code =/ "42" ; authorization rejected -
                   ; roaming not allowed in this network
cause-code =/ "43" ; authorization rejected -
                   ; offered charging model not acceptable
cause-code =/ "44" ; authorization rejected -
                   ; roaming to this location not allowed
cause-code =/ "45" ; authorization rejected -
                   ; offered service level not acceptable                 
cause-code =/ "50" ; failure due to subscription -
                   ; temporary
cause-code =/ "51" ; authorization rejected -
                   ; offered charging model not acceptable at this time
cause-code =/ "52" ; authorization rejected -
                   ; roaming to this location not allowed at this time
cause-code =/ "53" ; authorization rejected -
                   ; concurrency limits exceeded
cause-code =/ "54" ; authorization rejected - insufficient credit

]]></artwork></figure>

</section>
<section anchor="wba-identity-provider"><name>WBA-Identity-Provider</name>

<t>The Operator-Name attribute allows the WBAID of the ANP to be signalled to the IDP.
In the reverse direction, the IDP MUST use the WBA-Identity-Provider vendor
specific attribute <xref target="WBAVSA"/> to signal the WBAID of the IDP back to the ANP.</t>

</section>
<section anchor="wba-offered-service"><name>WBA-Offered-Service</name>

<t>The ANP MAY use the WBA-Offered-Service vendor specific attribute to signal the
highest OpenRoaming service tier supported on its network <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wlan-venue-info"><name>WLAN-Venue-Info</name>

<t>The ANP MAY use the WLAN-Venue-Info attribute <xref target="RFC7268"/> to signal the
category of venue hosting the WLAN.</t>

</section>
<section anchor="wba-custom-sla"><name>WBA-Custom-SLA</name>

<t>When the ANP uses the WLAN-Venue-Info attribute to signal that the venue
hosting the WLAN is a vehicular installation, the  ANP MAY use the
WBA-Custom-SLA vendor specific attribute <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

</section>
<section anchor="additional-attributes-related-to-openroaming-settled"><name>Additional attributes related to OpenRoaming settled</name>

<t>OpenRoaming settled defines the use of additional RADIUS attributes.</t>

<section anchor="wba-financial-clearing-provider"><name>WBA-Financial-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service
MUST use the WBA-Financial-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of financial clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-data-clearing-provider"><name>WBA-Data-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service MAY
use the WBA-Data-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of data clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-linear-volume-rate"><name>WBA-Linear-Volume-Rate</name>

<t>In cellular roaming, inter-operator tariff information is exchanged in
the roaming agreements between operators. In OpenRoaming, as there is no
direct agreement between ANPs and IDPs, the tariff information is
exchanged in RADIUS messages. All OpenRoaming ANPs that support
the OpenRoaming settled service MUST use the WBA-Linear-Volume-Rate
vendor specific attribute to signal the charging model being offered
by the ANP <xref target="WBAVSA"/>. An IDP that authorizes an offered charging model MUST include
the agreed WBA-Linear-Volume-Rate in the Access-Accept packet.</t>

</section>
<section anchor="openroaming-session-mediation"><name>OpenRoaming Session Mediation</name>

<t>OpenRoaming-Settled necessarily requires end-entities, which may include ANPs,
IDPs and/or their respective hubs, to be able to perform session mediation between
RADIUS Access-Request/Access-Accept and RADIUS Accounting-Request messages.
This can be performed using RADIUS attributes Acct-Session-Id (#44) and
Acct-Multi-Session-Id (#50) together with Operator-Name (#126).</t>

<t>To allow for possible non-uniqueness of Acct-Session-Id and/or Acct-Multi-Session-Id
attributes between different Network Access Servers (NAS) within the same ANP, it is
recommended to additionally use the attribute NAS-Identifier (#32) or NAS-IP-Address
(#4) or NAS-IPv6-Address (#95) or Called-Station-Id (#30) in the matching process.</t>

</section>
</section>
</section>
<section anchor="Security"><name>Security Considerations</name>

<section anchor="network-selection-and-triggering-authentication"><name>Network Selection and Triggering Authentication</name>

<t>OpenRoaming defines the use of Passpoint with Roaming Consortium Organization Identifiers.
A bit-wise match between an RCOI configured in the Passpoint profile of an end-user's device and the RCOI signalled
by WLAN equipment will trigger a Passpoint defined EAP-based authentication exchange.
The security associated with the Passpoint RCOI
information element is identical to other PLMN Id and Realm information elements, allowing an
unauthorized system to configure the OpenRoaming RCOI with the aim of triggering a Passpoint authentication.
Because such an unauthorized system will not have been issued with a certificate using WBA's PKI, the
unauthorized system is unable to communicate with any other OpenRoaming provider.
In such a scenario, after successive multiple failed authentications, the device's supplicant
SHOULD add the Access Point's BSSID to a deny list
to avoid future triggering of an authentication exchange with the unauthorized system.</t>

</section>
<section anchor="anp-radsec-connectivity"><name>ANP RadSec Connectivity</name>

<t>The ANP's RadSec client connects to the IDP's RadSec server over the public Internet.
Recommended best practice for firewall deployment on public Internet facing interfaces
SHOULD be followed. Firewall rules SHOULD permit outbound RadSec traffic (TCP destination port 2083)
and allow return traffic for the same TCP connections while denying any TCP socket initiation from outside of the ANP's network.</t>

</section>
<section anchor="dynamic-discovery-of-radsec-peers"><name>Dynamic Discovery of RadSec Peers</name>

<t>Whereas the dynamic discovery
mechanisms specified in <xref target="RFC7585"/> permit the IDP to use their DNS SRV record to indicate a non-standard TCP
port to be used in a RadSec connection, IDPs SHOULD recognize that ANP systems
may only be configured to permit outbound connections on the standardized RadSec port of 2083.</t>

<t>OpenRoaming recommends the use of DNSSEC to ensure a dynamically discovered RadSec server
is authoritative for a particular realm or set of realms. Where this is not possible, e.g.,
when using dynamic resolution with the pub.3gppnetwork.org sub-domain, the OpenRoaming
certificate policy permits the configuration of supported realm(s) in the SubjectAltName
of the certificate(s) issued to the IDP.</t>

<t>An ANP MAY decide to continue with the RadSec establishment, even if a server cannot prove it is
authoritative for a realm. As the ANP's RadSec client uses a dedicated trust store corresponding to the WBA's private Certificate
Authority, if DNS is hijacked by a third-party non-federation member
who has not been issued a certificate under WBA's PKI, the subsequent TLS establishment will fail.</t>

<t>In order to prevent denial of service/brute force attacks, IDPs SHOULD implement intrusion prevention
functionality that monitors systems to identify TLS mutual authentication failures and temporarily
block source IP addresses that are the source of TLS authentication failures using firewall functionality.</t>

</section>
<section anchor="end-user-traffic"><name>End-User Traffic</name>

<t>The OpenRoaming federation ensures RADIUS traffic is secured between ANP and IDP and ensures Wi-Fi traffic is protected
between the end-user device and the WLAN equipment of the ANP. The ANP is therefore able to observe IP
traffic to/from end-users who have performed a successful authentication with their IDP. The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the ANP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the personally identifiable information collected
as part of providing the ANP service.</t>

<t>The Open-Roaming end-user terms and conditions <xref target="ORTERMS"/> ensure that end-users are aware that the federation does not provide a
secure end-to-end service. The end-user MUST NOT rely on the encryption delivered by OpenRoaming for providing security of services accessed using the ANP's Wi-Fi network.</t>

</section>
<section anchor="anp-inspection-of-end-user-traffic"><name>ANP Inspection of End-User Traffic</name>

<t>All OpenRoaming ANPs MUST implement layer 2 traffic inspection and filtering,
as specified in clause 5.1 of the <xref target="PASSPOINT"/> specification. ANPs MUST
prohibit the delivery of any packet received from an OpenRoaming device
directly to another OpenRoaming device.</t>

<t>All ANPs MUST use traffic inspection and filtering to help protect
OpenRoaming users from malicious activity on the Internet as well as possible
malicious activity by other authenticated OpenRoaming users. ANP traffic
filtering function SHOULD NOT block ports associated with Wi-Fi calling,
including UDP ports 500 and 4500 used by Internet Key Exchange (IKE),
Internet Security Association and Key Management Protocol (ISAKMP) and IPSec <xref target="RFC7296"/>.
Recommended best practice for firewall deployment on public Internet facing interfaces
SHOULD be followed, including configuring the traffic inspection and filtering using
information derived from reliable sources of threat intelligence.</t>

</section>
<section anchor="end-user-location"><name>End-User Location</name>

<t>The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the IDP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the location-based personally identifiable information collected
as part of providing the IDP service. Unless the IDP has agreed a separate privacy policy with the End-User, the IDP MUST only use location information signalled by an ANP for either:</t>

<t><list style="numbers" type="1">
  <t>Making service authorization decisions based on the location of the ANP's wireless network; or</t>
  <t>Compliance with applicable law, or law enforcement requests.</t>
</list></t>

</section>
</section>
<section anchor="future-enhancements"><name>Future Enhancements</name>

<t>WBA announced the launch of its OpenRoaming Federation in June 2020. Since then, WBA members have continued to enhance the technical framework to address new market requirements that are reflected in the Closed Access Group policies described in <xref target="CAG"/> and the RADIUS profile described in <xref target="RADIUS"/>. WBA encourages those parties interested in adapting OpenRoaming to address new requirements to join the Alliance and help drive the definition of OpenRoaming forward.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2865">
  <front>
    <title>Remote Authentication Dial In User Service (RADIUS)</title>
    <author fullname="C. Rigney" initials="C." surname="Rigney"/>
    <author fullname="S. Willens" initials="S." surname="Willens"/>
    <author fullname="A. Rubens" initials="A." surname="Rubens"/>
    <author fullname="W. Simpson" initials="W." surname="Simpson"/>
    <date month="June" year="2000"/>
    <abstract>
      <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2865"/>
  <seriesInfo name="DOI" value="10.17487/RFC2865"/>
</reference>
<reference anchor="RFC2866">
  <front>
    <title>RADIUS Accounting</title>
    <author fullname="C. Rigney" initials="C." surname="Rigney"/>
    <date month="June" year="2000"/>
    <abstract>
      <t>This document describes a protocol for carrying accounting information between a Network Access Server and a shared Accounting Server. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2866"/>
  <seriesInfo name="DOI" value="10.17487/RFC2866"/>
</reference>
<reference anchor="RFC2869">
  <front>
    <title>RADIUS Extensions</title>
    <author fullname="C. Rigney" initials="C." surname="Rigney"/>
    <author fullname="W. Willats" initials="W." surname="Willats"/>
    <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
    <date month="June" year="2000"/>
    <abstract>
      <t>This document describes additional attributes for carrying authentication, authorization and accounting information between a Network Access Server (NAS) and a shared Accounting Server using the Remote Authentication Dial In User Service (RADIUS) protocol described in RFC 2865 and RFC 2866. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2869"/>
  <seriesInfo name="DOI" value="10.17487/RFC2869"/>
</reference>
<reference anchor="RFC3579">
  <front>
    <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
    <date month="September" year="2003"/>
    <abstract>
      <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3579"/>
  <seriesInfo name="DOI" value="10.17487/RFC3579"/>
</reference>
<reference anchor="RFC3580">
  <front>
    <title>IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines</title>
    <author fullname="P. Congdon" initials="P." surname="Congdon"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="A. Smith" initials="A." surname="Smith"/>
    <author fullname="G. Zorn" initials="G." surname="Zorn"/>
    <author fullname="J. Roese" initials="J." surname="Roese"/>
    <date month="September" year="2003"/>
    <abstract>
      <t>This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators. The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3580"/>
  <seriesInfo name="DOI" value="10.17487/RFC3580"/>
</reference>
<reference anchor="RFC3748">
  <front>
    <title>Extensible Authentication Protocol (EAP)</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="L. Blunk" initials="L." surname="Blunk"/>
    <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
    <author fullname="J. Carlson" initials="J." surname="Carlson"/>
    <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
    <date month="June" year="2004"/>
    <abstract>
      <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3748"/>
  <seriesInfo name="DOI" value="10.17487/RFC3748"/>
</reference>
<reference anchor="RFC4187">
  <front>
    <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
      <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4187"/>
  <seriesInfo name="DOI" value="10.17487/RFC4187"/>
</reference>
<reference anchor="RFC4372">
  <front>
    <title>Chargeable User Identity</title>
    <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
    <author fullname="A. Lior" initials="A." surname="Lior"/>
    <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
    <author fullname="J. Loughney" initials="J." surname="Loughney"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity. This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4372"/>
  <seriesInfo name="DOI" value="10.17487/RFC4372"/>
</reference>
<reference anchor="RFC4851">
  <front>
    <title>The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST)</title>
    <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
    <author fullname="D. McGrew" initials="D." surname="McGrew"/>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="H. Zhou" initials="H." surname="Zhou"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document defines the Extensible Authentication Protocol (EAP) based Flexible Authentication via Secure Tunneling (EAP-FAST) protocol. EAP-FAST is an EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Within the tunnel, Type-Length-Value (TLV) objects are used to convey authentication related data between the peer and the EAP server. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4851"/>
  <seriesInfo name="DOI" value="10.17487/RFC4851"/>
</reference>
<reference anchor="RFC5448">
  <front>
    <title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <date month="May" year="2009"/>
    <abstract>
      <t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t>
      <t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5448"/>
  <seriesInfo name="DOI" value="10.17487/RFC5448"/>
</reference>
<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>
<reference anchor="RFC5580">
  <front>
    <title>Carrying Location Objects in RADIUS and Diameter</title>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="A. Lior" initials="A." surname="Lior"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <date month="August" year="2009"/>
    <abstract>
      <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
      <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5580"/>
  <seriesInfo name="DOI" value="10.17487/RFC5580"/>
</reference>
<reference anchor="RFC6066">
  <front>
    <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <date month="January" year="2011"/>
    <abstract>
      <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6066"/>
  <seriesInfo name="DOI" value="10.17487/RFC6066"/>
</reference>
<reference anchor="RFC6071">
  <front>
    <title>IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap</title>
    <author fullname="S. Frankel" initials="S." surname="Frankel"/>
    <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
    <date month="February" year="2011"/>
    <abstract>
      <t>Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated. This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.</t>
      <t>This document is a snapshot of IPsec- and IKE-related RFCs. It includes a brief description of each RFC, along with background information explaining the motivation and context of IPsec's outgrowths and extensions. It obsoletes RFC 2411, the previous "IP Security Document Roadmap."</t>
      <t>The obsoleted IPsec roadmap (RFC 2411) briefly described the interrelationship of the various classes of base IPsec documents. The major focus of RFC 2411 was to specify the recommended contents of documents specifying additional encryption and authentication algorithms. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6071"/>
  <seriesInfo name="DOI" value="10.17487/RFC6071"/>
</reference>
<reference anchor="RFC6614">
  <front>
    <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="M. McCauley" initials="M." surname="McCauley"/>
    <author fullname="S. Venaas" initials="S." surname="Venaas"/>
    <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
    <date month="May" year="2012"/>
    <abstract>
      <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6614"/>
  <seriesInfo name="DOI" value="10.17487/RFC6614"/>
</reference>
<reference anchor="RFC7268">
  <front>
    <title>RADIUS Attributes for IEEE 802 Networks</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="J. Malinen" initials="J." surname="Malinen"/>
    <author fullname="P. Congdon" initials="P." surname="Congdon"/>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="July" year="2014"/>
    <abstract>
      <t>RFC 3580 provides guidelines for the use of the Remote Authentication Dial-In User Service (RADIUS) within IEEE 802 local area networks (LANs). This document defines additional attributes for use within IEEE 802 networks and clarifies the usage of the EAP-Key-Name Attribute and the Called-Station-Id Attribute. This document updates RFCs 3580 and 4072.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7268"/>
  <seriesInfo name="DOI" value="10.17487/RFC7268"/>
</reference>
<reference anchor="RFC7296">
  <front>
    <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
    <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="Y. Nir" initials="Y." surname="Nir"/>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
    <date month="October" year="2014"/>
    <abstract>
      <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="79"/>
  <seriesInfo name="RFC" value="7296"/>
  <seriesInfo name="DOI" value="10.17487/RFC7296"/>
</reference>
<reference anchor="RFC7585">
  <front>
    <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="M. McCauley" initials="M." surname="McCauley"/>
    <date month="October" year="2015"/>
    <abstract>
      <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7585"/>
  <seriesInfo name="DOI" value="10.17487/RFC7585"/>
</reference>
<reference anchor="RFC7593">
  <front>
    <title>The eduroam Architecture for Network Roaming</title>
    <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
    <date month="September" year="2015"/>
    <abstract>
      <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7593"/>
  <seriesInfo name="DOI" value="10.17487/RFC7593"/>
</reference>
<reference anchor="RFC7170">
  <front>
    <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
    <author fullname="H. Zhou" initials="H." surname="Zhou"/>
    <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="S. Hanna" initials="S." surname="Hanna"/>
    <date month="May" year="2014"/>
    <abstract>
      <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7170"/>
  <seriesInfo name="DOI" value="10.17487/RFC7170"/>
</reference>
<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>
<reference anchor="RFC8952">
  <front>
    <title>Captive Portal Architecture</title>
    <author fullname="K. Larose" initials="K." surname="Larose"/>
    <author fullname="D. Dolson" initials="D." surname="Dolson"/>
    <author fullname="H. Liu" initials="H." surname="Liu"/>
    <date month="November" year="2020"/>
    <abstract>
      <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8952"/>
  <seriesInfo name="DOI" value="10.17487/RFC8952"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="TS23003" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.003/23003-i10.zip">
  <front>
    <title>3GPP 23.003: Numbering, addressing and identification v18.1.0</title>
    <author initials="" surname="3GPP">
      <organization></organization>
    </author>
    <date year="2023" month="March" day="28"/>
  </front>
</reference>
<reference anchor="GSMAIR67" target="https://www.gsma.com/newsroom/wp-content/uploads//IR.67-v21.0.pdf">
  <front>
    <title>GSMA IR.67: DNS Guidelines for Service Providers and GRX and IPX Providers</title>
    <author initials="" surname="GSMA">
      <organization></organization>
    </author>
    <date year="2022" month="November" day="25"/>
  </front>
</reference>
<reference anchor="PASSPOINT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
  <front>
    <title>Wi-Fi Alliance Passpoint</title>
    <author initials="" surname="Wi-Fi Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ISO3166" target="https://www.iso.org/standard/72483.html">
  <front>
    <title>Codes for the representation of names of countries and their subdivisions</title>
    <author initials="" surname="ISO 3166-2:2020">
      <organization></organization>
    </author>
    <date year="2020" month="August"/>
  </front>
</reference>
<reference anchor="ISO29115" >
  <front>
    <title>Information technology - Security techniques: Entity authentication assurance framework</title>
    <author initials="" surname="ISO/IEC 29115">
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>
<reference anchor="ORPRIVACY" target="https://wballiance.com/openroaming/privacy-policy/">
  <front>
    <title>OpenRoaming End-User Privacy Policy</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ORTERMS" target="https://wballiance.com/openroaming/toc/">
  <front>
    <title>OpenRoaming End User Terms and Conditions</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="PEAP" target="https://winprotocoldocs-bhdugrdyduf5h2e4.b02.azurefd.net/MS-PEAP/%5bMS-PEAP%5d.pdf">
  <front>
    <title>Protected Extensible Authentication Protocol (PEAP)</title>
    <author initials="" surname="Microsoft Corporation">
      <organization></organization>
    </author>
    <date year="2024" month="April"/>
  </front>
</reference>
<reference anchor="WBAVSA" target="https://github.com/wireless-broadband-alliance/RADIUS-VSA">
  <front>
    <title>Vendor Specific Attributes</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IEEE80211" target="https://standards.ieee.org/ieee/802.11/5536/">
  <front>
    <title>Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
    <author initials="" surname="IEEE">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WBAEIPP" target="https://wballiancec.wpenginepowered.com/wp-content/uploads/2021/02/IMSI_Privacy_Protection_for_Wi-Fi_Technical_Specification_v1.1.0_Revision_FINAL.pdf">
  <front>
    <title>WBA Enhanced IMSI Privacy Protection</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="2022" month="August"/>
  </front>
</reference>
<reference anchor="E212" target="https://www.itu.int/itu-t/recommendations/rec.aspx?rec=E.212">
  <front>
    <title>The international identification plan for public networks and subscriptions</title>
    <author initials="" surname="ITU-T Study Group 2">
      <organization></organization>
    </author>
    <date year="2024" month="June"/>
  </front>
</reference>
<reference anchor="WBAPKICP" target="https://wballiance.com/openroaming/pki-repository/">
  <front>
    <title>WBA PKI Certificate Policy v4.0.0</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="2024" month="April"/>
  </front>
</reference>
<reference anchor="WBAPKICPS" target="https://wballiance.com/openroaming/pki-repository/">
  <front>
    <title>WBA PKI Certificate Practise Statement v1.0.0</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="2025" month="September"/>
  </front>
</reference>


    </references>

</references>


<?line 1339?>

<section anchor="sig"><name>Example OpenRoaming Signalling Flow</name>

<t>An example signalling flow for OpenRoaming is illustrated in <xref target="figsigflow"/>.</t>

<t><list style="numbers" type="1">
  <t>In step 1, the WLAN is configured with Passpoint information and includes
configured RCOIs in its beacon.</t>
  <t>The beacon can only contain 3 RCOIs and so if none of the RCOIs match a
profile provisioned in the device, the device queries for the list of RCOIs supported.</t>
  <t>If the list includes an RCOI that matches a configured profile in the device, then device
sends an EAPOL Start message to the authenticator.</t>
  <t>The authenticator in the AP/WLC requests the EAP-Identity of the device.</t>
  <t>The device responds with its EAP-Identity, which is a user@realm Network Access Identifier (NAI)</t>
  <t>The NAS in the WLC/AP embeds the NAI in the user-name attribute in a RADIUS Access-Request packet and forwards to the configured RadSec client.</t>
  <t>The RadSec client recovers the realm from the NAI/user-name attribute and performs a DNS-based dynamic peer discovery.</t>
  <t>The RadSec client established an mTLS authenticated TLS session with the discovered peer using certificates issued by the WBA PKI.</t>
  <t>Once TLS is established, the RadSec client forwards the Access-Request to the RadSec server.</t>
  <t>If the EAP Server is not co-located with the RadSec server, the RadSec server proxies the Access-Request to the EAP-Server.</t>
  <t>The EAP-Server continues the EAP dialogue with the EAP Supplicant in the device using a Passpoint defined EAP method.</t>
  <t>Following successful authentication, the EAP-Server responds with an Access-Accept packet containing the EAP-SUCCESS message and the keying material generated through the EAP method to secure the Wi-Fi session.</t>
  <t>The Access-Accept packet is forwarded back to the RadSec client.</t>
  <t>The RadSec client forwards the Access-Accept packet to the NAS in the AP/WLC.</t>
  <t>The AP/WLC recovers the keying material from the Access-Accept packet and forwards the EAP-SUCCESS message to the device.</t>
  <t>The keying material is used to secure the Wi-Fi interface between the device and AP/WLC.</t>
  <t>The AP/WLC generates a RADIUS Accounting-Request packet with Acct-Status-Type Start which is forwarded to the RadSec client.</t>
  <t>The RadSec client forwards the Accounting-Request packet over the TLS tunnel to the RadSec server.</t>
  <t>The RadSec server can forward the Accounting-Request packet to the EAP-Server.</t>
</list></t>

<ul empty="true"><li>
  <t>20-22. After the Wi-Fi session terminates, an Accounting-Request message with Acct-Status-Type Stop is proxied towards the RadSec Server.</t>
</li></ul>

<figure title="Example OpenRoaming Signalling Flow" anchor="figsigflow"><artwork><![CDATA[
+------+    +------+    +------+    +------+    +------+    +------+
|      |    |Wi-Fi |    |RadSec|    |      |    |RadSec|    |  EAP |
|Device|    |AP/WLC|    |Client|    | DNS  |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
   | 1) Beacon |           |           |           |           |
   |<----------|           |           |           |           |
   | 2) ANQP   |           |           |           |           |   
   | Query     |           |           |           |           |   
   |<--------->|           |           |           |           |   
   | 3) EAPOL  |           |           |           |           |
   | Start     |           |           |           |           |
   |---------->|           |           |           |           |
   | 4) EAP-ID |           |           |           |           |
   | Request   |           |           |           |           |
   |<----------|           |           |           |           |
   | 5) EAP-ID | 6) RADIUS |           |           |           |
   | Response  | Access-   | 7) DNS    |           |           |
   |---------->| Request   | Query     |           |           |
   |           |---------->| NAPTR,SRV,|           |           |
   |           |           | A/AAAA    |           |           |
   |           |           | Records   |           |           |
   |           |           |<--------->|           |           |
   |           |           | 8) mTLS   |           |           |
   |           |           |<--------------------->|           |
   |           |           | 9) RadSec |           |           |
   |           |           | Access-Request        |           |
   |           |           |---------------------->|           |
   |           |           |           |           | 10) RADIUS|
   |           |           |           |           | Access-   |
   |           |           |           |           | Request   |
   |           |           |           |           |---------->|
   |           |         11) EAP Dialogue          |           |
   |<--------------------------------------------------------->|
   |           |           |           |           | 12) RADIUS|
   |           |           |           |           | Access-   |
   |           | 14) RADIUS|           |           | Accept    |
   |           | Access-   |           |           | (EAP-     |
   |           | Accept    | 13) RadSec Access-    | SUCCESS)  |   
   |           | (EAP-     | Accept (EAP-SUCCESS)  |<----------|
   | 15) EAP-  | SUCCESS)  |<----------------------|           |
   | SUCCESS   |<----------|           |           |           |
   |<----------|           |           |           |           |
 +---------------+         |           |           |           |
 | 16) Secured   |         |           |           |           |
 |  OpenRoaming  17) RADIUS|           |           |           |
 |    Service    Accounting|           |           |           |
 |               Request   |           |           | 19) RADIUS|
 |               (Start)   | 18) RadSec Accounting | Accounting|
 |               |-------->| -Request (Start)      | Request   |
 |               |         |---------------------->| (Start)   |
 |               |         |           |           |---------->|
 +---------------+         |           |           |           |
   |           | 20) RADIUS|           |           |           |
   |           | Accounting|           |           |           |
   |           | Request   |           |           | 22) RADIUS|
   |           | (Stop)    | 21) RadSec Accounting | Accounting|
   |           |---------->| -Request (Stop)       | Request   |
   |           |           |---------------------->| (Stop)    |
   |           |           |           |           |---------->|   
+------+    +------+    +------+    +------+    +------+    +------+
|Device|    |Wi-Fi |    |RadSec|    | DNS  |    |RadSec|    |  EAP |
|      |    |AP/WLC|    |Client|    |      |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
]]></artwork></figure>

</section>
<section anchor="rcoi"><name>Example OpenRoaming RCOI Usage</name>

<t>This Annex illustrates the use of OpenRoaming RCOIs to enforce different policies
in the OpenRoaming federation, ensuring that when there is a policy mismatch
between the device and access network, that the device will avoid triggering
an authentication exchange that would subsequently have to be rejected because
of policy enforcement decisions.</t>

<section anchor="openroaming-rcoi-based-policy-for-supporting-qos-tiers"><name>OpenRoaming RCOI based policy for supporting QoS tiers</name>

<t><xref target="figqosrcoi"/> illustrates the use of OpenRoaming RCOIs for
supporting the standard (bronze) and silver QoS tiers across the federation.
The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by its IDP to require the basic bronze QoS policy.</t>
  <t>Device 2 has been provisioned by its IDP to require the silver tier of QoS handling.</t>
</list></t>

<t>The figure also shows illustrates the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is configured to support the silver tier of QoS handling corresponding to the silver RCOI. Because the network requirements associated with the silver tier are a superset of the bronze QoS tier, the ANP also configures the bronze RCOI on its Wi-Fi access network.</t>
  <t>ANP#2 is only configured to support the standard (bronze) QoS tier and as such only configures the RCOI corresponding to the bronze QoS tier on its Wi-Fi access network.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required QoS tier according to the device's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize QoS policies" anchor="figqosrcoi"><artwork><![CDATA[

+----------------------+      +----------------------+  
|OpenRoaming Device #1 |      |OpenRoaming Device #2 |  
| Bronze Service Level |      | Silver Service Level |   
| +------------------+ |      | +------------------+ |      
| |Passpoint Profile | |      | |Passpoint Profile | |     
| |   Bronze RCOI    | |      | |   Silver RCOI    | |              
| +------------------+ |      | +------------------+ |           
|     /|\        /|\   |      |           /|\        |      
+------|----------|----+      +------------|---------+         
       |          |                        |                   
       |          |                        |                    
       |          |                        | RCOI                
       |          |                        | Match                 
       |     +-----------------------------+                 
  RCOI |     |    |                                          
 Match |     |    |                                              
       |     |    |                                        
       |     |    +------------------------+                  
       |     |                             | RCOI           
       |     |                             | Match         
       |     |                             |              
      \|/   \|/                           \|/           
+----------------------+       +----------------------+   
|  OpenRoaming ANP#1   |       |  OpenRoaming ANP#2   |  
|      Silver QoS      |       |      Bronze QoS      |     
|   +--------------+   |       |   +--------------+   |   
|   |     WLAN     |   |       |   |     WLAN     |   |   
|   | Bronze RCOI  |   |       |   | Bronze RCOI  |   |    
|   | Silver RCOI  |   |       |   |              |   |   
|   +--------------+   |       |   +--------------+   |  
+----------------------+       +----------------------+

]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-identity-type-policies"><name>OpenRoaming RCOI based policy for supporting identity type policies</name>

<t><xref target="figidtypercoi"/> illustrates the use of OpenRoaming RCOIs for supporting different identity type policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device#1 has been provisioned by an IDP corresponding to a service provider. It provisions the device's Passpoint profile with the RCOI policy identifying the service provider ID-type policy as well as the "any ID-type"  RCOI policy.</t>
  <t>Device 2 has been provisioned by a IDP corresponding to a hospitality provider. It provisions the device's Passpoint profile with the RCOI policy identifying the hospitality ID-type policy as well as the "any ID-type" RCOI policy.</t>
</list></t>

<t>The figure also shows the RCOI configuration of three different ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 only supports access using service provider type-IDs and so has configured the service provider ID-type policy RCOI.</t>
  <t>ANP#2 supports access from all identity types and so has configured the any ID-type policy RCOI.</t>
  <t>ANP#3 only supports access using hospitality type IDs and so has configured the hospitality ID-type policy RCOI.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity types according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize ID-Type policies" anchor="figidtypercoi"><artwork><![CDATA[


+----------------------------+   +-----------------------------+                                                 
|   OpenRoaming Device #1    |   |    OpenRoaming Device #2    |                                                 
|  IDP is Service Provider   |   | IDP is Hospitality Provider |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|| Passpoint  || Passpoint  ||   || Passpoint  || Passpoint  | |                                                 
||  Profile   ||  Profile   ||   ||  Profile   ||  Profile   | |                                                 
||     SP     ||Any ID-Type ||   ||Any ID-Type || Hospitality| |                                                 
||ID-Type RCOI||    RCOI    ||   ||   RCOI     ||ID-Type RCOI| |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|      /|\          /|\      |   |       /|\        /|\        |                                                 
+-------|------------|-------+   +-------------------|---------+                                                 
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        | RCOI       | RCOI               | RCOI     | RCOI                                                      
        | Match      | Match              | Match    | Match                                                     
        |            |                    |          |                                                           
        |            +-----+        +-----+          |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
       \|/                \|/      \|/              \|/                                                          
+------------------+  +------------------+  +------------------+                                                 
|OpenRoaming ANP#1 |  |OpenRoaming ANP#2 |  |OpenRoaming ANP#3 |                                                 
|  Only accepts    |  |    Accepts all   |  |   Only accepts   |                                                 
| Service Provider |  |     ID-Types     |  |    Hospitality   |                                                 
|     ID-Types     |  |                  |  |     ID-Types     |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
| |     WLAN     | |  | |     WLAN     | |  | |     WLAN     | |                                                 
| |  SP ID-Type  | |  | | Any ID-Type  | |  | |  Hospitality | |                                                 
| |     RCOI     | |  | |     RCOI     | |  | | ID-Type RCOI | |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
+------------------+  +------------------+  +------------------+    


]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-different-identity-proofing-policies"><name>OpenRoaming RCOI based policy for supporting different identity proofing policies</name>

<t><xref target="figidproofrcoi"/> illustrates the use of OpenRoaming RCOIs for supporting different
identity proofing policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by an IDP that uses enhanced identity proofing controls that meet the enhanced OpenRoaming requirements, equivalent to LoA 3 in <xref target="ISO29115"/>. Because the enhanced identity proofing requirements are a superset of the requirements of the baseline identity proofing policy, the IDP also configures the use of the RCOI with baseline identity proofing.</t>
  <t>Device 2 has been provisioned by an IDP that uses identity proofing with controls that meet the baseline OpenRoaming requirements.</t>
</list></t>

<t>The figure also shows the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is operated in a geography where regulations require support of enhanced identity proofing.</t>
  <t>ANP#2 is operated in a geography where regulations permit support of authentications with identities managed using the OpenRoaming baseline identity proofing requirements.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity proofing according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize identity proofing policies" anchor="figidproofrcoi"><artwork><![CDATA[

+----------------------------+   +-----------------------------+                                                 
|    OpenRoaming Device #1   |   |    OpenRoaming Device #2    |                                                 
|     IDP uses enhanced      |   |     IDP uses baseline       |                                                 
|     identity proofing      |   |     identity proofing       |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|| Passpoint  ||  Passpoint ||   |       |  Passpoint |        |                                                 
||  Profile   ||   Profile  ||   |       |   Profile  |        |                                                 
||Enhanced LoA||Baseline LoA||   |       |Baseline LoA|        |                                                 
||    RCOI    ||    RCOI    ||   |       |    RCOI    |        |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|      /|\          /|\      |   |             /|\             |                                                 
+-------|------------|-------+   +--------------|--------------+                                                 
        |            |                          |                                                                
        |            |                          |                                                                
        |            |                          |                                                                
        | RCOI       | RCOI                     | RCOI                                                           
        | Match      | Match                    | Match                                                          
        |            |                          |                                                                
        |            |                          |                                                                
        |            +--------------------+     +-----+                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
       \|/                               \|/         \|/                                                         
   +------------------------+       +------------------------+                                                   
   |   OpenRoaming ANP#1    |       |   OpenRoaming ANP#2    |                                                   
   | Operates in a country  |       | Operates in a country  |                                                   
   |  where the regulator   |       |  where the regulator   |                                                   
   |   requires enhanced    |       |   permits baseline     |                                                   
   |   identity proofing    |       |   identity proofing    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   |    |     WLAN     |    |       |    |     WLAN     |    |                                                   
   |    | Enhanced LoA |    |       |    | Baseline LoA |    |                                                   
   |    |     RCOI     |    |       |    |     RCOI     |    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   +------------------------+       +------------------------+                                                     


]]></artwork></figure>

</section>
</section>
<section anchor="legal"><name>OpenRoaming legal framework</name>

<section anchor="seamless-experience"><name>Seamless experience</name>

<t>In order for OpenRoaming to avoid the need for end-users to
be presented with and accept legal terms and conditions covering their
use of the Wi-Fi hotspot service, there needs to be a legal framework in place.</t>

</section>
<section anchor="openroaming-organization"><name>OpenRoaming Organization</name>

<t>The federation is based on a legal framework that comprises a set of policies,
templated agreements and immutable terms as agreed to by the WBA and its membership.
The framework defines a hierarchy of roles, responsibilities and relationships that
are designed to enable the federation to scale to millions of Wi-Fi access networks.</t>

<t><xref target="figorg"/> shows the
relationships between WBA, OpenRoaming Brokers, who are members of the WBA that
have agreed terms with WBA to perform the OpenRoaming broker role and the OpenRoaming providers.
OpenRoaming brokers agree terms with OpenRoaming Providers that can act as Access Network
Providers (ANPs) and/or Identity Providers (IDPs). OpenRoaming providers do not have
to be members of the WBA to provide OpenRoaming services. Finally, OpenRoaming IDPs
agree terms with OpenRoaming end-users who then benefit from seamless authentication onto
the Wi-Fi networks deployed by the different OpenRoaming ANPs.</t>

<figure title="Organization of the OpenRoaming Federation" anchor="figorg"><artwork><![CDATA[
                            +----------+                   
                            | Wireless |                      
                            | Broadband|                        
                            | Alliance |                         
                            +----------+                       
                              /|\  /|\                        
                               |    |                         
                          Agrees terms with                    
                               |    |                              
          +-----------+        |    |        +-----------+        
          |OpenRoaming|<-------+    +------->|OpenRoaming|       
          |Broker     |                      |Broker     |      
          +-----------+                      +-----------+       
             /|\  /|\                           /|\  /|\         
              |    |                             |    |        
         Agrees terms with                  Agrees terms with     
              |    |                             |    |           
        +-----+    +-----+                 +-----+    +-----+     
        |                |                 |                |    
       \|/              \|/               \|/              \|/     
+-----------+     +-----------+     +-----------+     +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|     |OpenRoaming|
|Access     |     |Identity   |     |Identity   |     |Access     |
|Network    |     |Provider   |     |Provider   |     |Network    |
|Provider   |     |           |     |           |     |Provider   |
+-----------+     +-----------+     +-----------+     +-----------+
                   /|\  /|\            /|\  /|\      
                    |    |              |    |       
               Agrees terms with   Agrees terms with
                    |    |              |    |       
      +-------------+    |              |    +-------------+       
      |                  |              |                  |       
     \|/                \|/            \|/                \|/      
+-----------+     +-----------+     +-----------+      +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|      |OpenRoaming|
|End-User   |     |End-User   |     |End-User   |      |End-User   |
+-----------+     +-----------+     +-----------+      +-----------+

]]></artwork></figure>

</section>
<section anchor="openroaming-legal-terms"><name>OpenRoaming legal terms</name>

<t>In OpenRoaming there is no direct agreement between individual ANPs and individual
IDPs or between end-users and ANPs. As a consequence, OpenRoaming brokers
agree to use certain federation-specific terms in their agreements with
OpenRoaming providers.</t>

<t>This arrangement ensures that all ANPs agree to abide by the OpenRoaming
privacy policy <xref target="ORPRIVACY"/> and all end-users agree to abide by the
OpenRoaming end-user Terms and Conditions <xref target="ORTERMS"/>.</t>

<t>If an ANP detects service abuse by an end-user in contravention of the end-user Terms and Conditions,
the ANP SHOULD record logs relevant to the abuse and use the email address embedded
in the Subject Alternative Name (SAN) attribute in IDP's issued end-entity certificate to
contact the abuser's IDP, indicating the nature of the abuse together with any relevant logs.
The immutable terms of OpenRoaming require IDPs to make reasonable efforts to address the
service abuse experienced by the ANP, which may include the withdrawal of the OpenRoaming
service from the identified abusive end-user.</t>

</section>
</section>
<section numbered="false" anchor="Changelog"><name>Changelog</name>
<t><list style="symbols">
  <t>01 - added details of WBA-Custom-SLA for OpenRoaming ANP networks that signal using
<xref target="RFC7268"/> that they operate on a vehicular platform. Added clarifications regarding use
of direct and indirect names in certificate validation.</t>
  <t>02 - added details of OpenRoaming protection of end-user privacy, including WRIX recommendations
on use of correlation identifiers in RADIUS Access-Accept packet that may unintentionally weaken
end-user privacy.</t>
  <t>03 - updated DNSsec reference. Added section on interworking with other federations.</t>
  <t>04 - updated PKI Policy OID to reflect new certificate chain. Added IDP availability requirements.
Added session-timeout requirements. Added new onboarding capabilities for short lived credentials. Added text concerning OpenRoaming Privacy Policy and restrictions on location usage.</t>
  <t>05 - added new section on use of Reply-Message, added new text on troubleshooting, clarified RADIUS accounting handling, clarified CUI usage in Access-Accept, clarified use of EAP types.</t>
  <t>06 - corrected ePDG FQDN. Added missing enhanced Reply-Message for cause-code = 45. Added new text regarding recommended best practice for firewall deployment on public Internet facing interfaces should be followed for ANP RADSEC connections and for protecting End-Users.</t>
  <t>07 - added details of service abuse handling. Added further details of RADIUS attributes. Added rationale for busy hour sustained throughput values. Introduced requirements on minimum speeds for OpenRoaming bronze and silver tiers. Corrected WBAID ABNF by adding in permitted special characters.</t>
</list></t>

</section>
<section numbered="false" anchor="Acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank all the members of the WBA's OpenRoaming Workgroup
who help define the OpenRoaming specifications.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

