<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" docName="draft-wkumari-rfc8110-to-ieee-02" number="9672" category="info" consensus="true" submissionType="IETF" obsoletes="" updates="8110" tocInclude="true" sortRefs="true" symRefs="true" xml:lang="en" prepTime="2024-12-28T10:37:25" indexInclude="true" scripts="Common,Latin" tocDepth="3">
  <link href="https://datatracker.ietf.org/doc/draft-wkumari-rfc8110-to-ieee-02" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9672" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="RFC 8110 to IEEE">Transferring Opportunistic Wireless Encryption to the IEEE 802.11 Working Group</title>
    <seriesInfo name="RFC" value="9672" stream="IETF"/>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization showOnFrontPage="true">Google, LLC</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>
    <author initials="D." surname="Harkins" fullname="Dan Harkins">
      <organization showOnFrontPage="true">Hewlett-Packard Enterprise</organization>
      <address>
        <email>daniel.harkins@hpe.com</email>
      </address>
    </author>
    <date month="12" year="2024"/>
    <keyword>IEEE</keyword>
    <keyword>OWE</keyword>
    <keyword>Opportunistic Wireless Encryption</keyword>
    <keyword>RFC8110</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">RFC 8110 describes Opportunistic Wireless Encryption (OWE), a mode that allows
unauthenticated clients to connect to a network using encrypted traffic. This
document transfers the ongoing maintenance and further development of the protocol to the IEEE 802.11 Working Group.</t>
      <t indent="0" pn="section-abstract-2">This document updates RFC 8110 by noting that future work on the protocol described therein will occur in the IEEE 802.11 Working Group.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.  
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by the
            Internet Engineering Steering Group (IESG).  Not all documents
            approved by the IESG are candidates for any level of Internet
            Standard; see Section 2 of RFC 7841. 
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9672" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2024 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-transfer-of-maintenance">Transfer of Maintenance</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">Opportunistic Wireless Encryption (OWE) <xref target="RFC8110" format="default" sectionFormat="of" derivedContent="RFC8110"/> is a mode of
opportunistic security <xref target="RFC7435" format="default" sectionFormat="of" derivedContent="RFC7435"/> for IEEE Std 802.11 that provides encryption
of the wireless medium without authentication.</t>
      <t indent="0" pn="section-1-2">Since publication, <xref target="RFC8110" format="default" sectionFormat="of" derivedContent="RFC8110"/> (also known as "<xref target="Wi-Fi_Enhanced_Open" format="default" sectionFormat="of" derivedContent="Wi-Fi_Enhanced_Open"/>") has been widely implemented and deployed.</t>
      <t indent="0" pn="section-1-3">The IEEE 802.11 Working Group <xref target="IEEE_802.11" format="default" sectionFormat="of" derivedContent="IEEE_802.11"/> has requested the ability to maintain and develop OWE (see <xref target="IEEE_LS" format="default" sectionFormat="of" derivedContent="IEEE_LS"/>) to ensure that the protocol remains in sync with the IEEE protocols.  This document represents concurrence that future work on OWE <xref target="RFC8110" format="default" sectionFormat="of" derivedContent="RFC8110"/> will now occur in 
the IEEE 802.11 Working Group.  
</t>
    </section>
    <section anchor="transfer-of-maintenance" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-transfer-of-maintenance">Transfer of Maintenance</name>
      <t indent="0" pn="section-2-1">
   This document represents concurrence that future work on OWE <xref target="RFC8110" format="default" sectionFormat="of" derivedContent="RFC8110"/> will now occur in the IEEE 802.11 Working Group <xref target="IEEE_802.11" format="default" sectionFormat="of" derivedContent="IEEE_802.11"/> to ensure that the protocol remains in sync with the IEEE protocols.  </t>
      <t indent="0" pn="section-2-2">
   The OWE protocol <xref target="RFC8110" format="default" sectionFormat="of" derivedContent="RFC8110"/> will be duplicated by the IEEE 802.11 Working 
   Group <xref target="IEEE_802.11" format="default" sectionFormat="of" derivedContent="IEEE_802.11"/> such that the document alone will be enough to implement, 
   maintain, and modify the protocol within the IEEE under its policies and
   procedures.
</t>
    </section>
    <section anchor="security-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-3-1">This document simply notes that future work on the protocol described in
<xref target="RFC8110" format="default" sectionFormat="of" derivedContent="RFC8110"/> will now occur in the IEEE. As such, it does not introduce any new
security considerations.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-4-1">This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references" pn="section-5">
      <name slugifiedName="name-references">References</name>
      <references anchor="sec-normative-references" pn="section-5.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC8110" target="https://www.rfc-editor.org/info/rfc8110" quoteTitle="true" derivedAnchor="RFC8110">
          <front>
            <title>Opportunistic Wireless Encryption</title>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <author fullname="W. Kumari" initials="W." role="editor" surname="Kumari"/>
            <date month="March" year="2017"/>
            <abstract>
              <t indent="0">This memo specifies an extension to IEEE Std 802.11 to provide for opportunistic (unauthenticated) encryption to the wireless media.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8110"/>
          <seriesInfo name="DOI" value="10.17487/RFC8110"/>
        </reference>
      </references>
      <references anchor="sec-informative-references" pn="section-5.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="IEEE_802.11" target="https://www.ieee802.org/11/" quoteTitle="false" derivedAnchor="IEEE_802.11">
          <front>
            <title>IEEE 802.11 Working Group</title>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IEEE_LS" target="https://datatracker.ietf.org/liaison/1929/" quoteTitle="true" derivedAnchor="IEEE_LS">
          <front>
            <title>Liaison statement: OWE (RFC8110) now in 802.11</title>
            <author>
              <organization showOnFrontPage="true"/>
            </author>
            <date month="May" year="2024"/>
          </front>
          <refcontent>IETF Liaison Statement</refcontent>
        </reference>
        <reference anchor="RFC7435" target="https://www.rfc-editor.org/info/rfc7435" quoteTitle="true" derivedAnchor="RFC7435">
          <front>
            <title>Opportunistic Security: Some Protection Most of the Time</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
            <date month="December" year="2014"/>
            <abstract>
              <t indent="0">This document defines the concept "Opportunistic Security" in the context of communications protocols. Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7435"/>
          <seriesInfo name="DOI" value="10.17487/RFC7435"/>
        </reference>
        <reference anchor="Wi-Fi_Enhanced_Open" target="https://www.wi-fi.org/beacon/dan-harkins/wi-fi-certified-enhanced-open-transparent-wi-fi-protections-without-complexity" quoteTitle="true" derivedAnchor="Wi-Fi_Enhanced_Open">
          <front>
            <title>Wi-Fi CERTIFIED Enhanced Open: Transparent Wi-Fi protections without complexity</title>
            <author fullname="Dan Harkins">
              <organization showOnFrontPage="true"/>
            </author>
          </front>
          <refcontent>Wi-Fi Alliance, The Beacon Blog</refcontent>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.a-1">The authors would like to thank the IEEE 802.11 Working Group for their work,
and for taking on the responsibility for future work on the protocol
described in RFC 8110.</t>
      <t indent="0" pn="section-appendix.a-2">In addition, we would like to thank <contact fullname="Stephen Farrell"/>, the AD that sponsored the
original work, as well as <contact fullname="Clemens Schimpe"/>, <contact fullname="Dorothy Stanley"/>, <contact fullname="Paul Wouters"/>, <contact fullname="Eric Vyncke"/>,
<contact fullname="Mike Montemurro"/>, and <contact fullname="Peter Yee"/>.</t>
      <t indent="0" pn="section-appendix.a-3">Apologies to anyone we forgot to acknowledge; RFC 8110 was written 7+ years ago
and we have had many conversations with many people since then...</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="W." surname="Kumari" fullname="Warren Kumari">
        <organization showOnFrontPage="true">Google, LLC</organization>
        <address>
          <email>warren@kumari.net</email>
        </address>
      </author>
      <author initials="D." surname="Harkins" fullname="Dan Harkins">
        <organization showOnFrontPage="true">Hewlett-Packard Enterprise</organization>
        <address>
          <email>daniel.harkins@hpe.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
