<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.6.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekok-radext-deprecating-radius-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="Deprecating RADIUS">Deprecating RADIUS/UDP and RADIUS/TCP</title>
    <seriesInfo name="Internet-Draft" value="draft-dekok-radext-deprecating-radius-00"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>FreeRADIUS</organization>
      <address>
        <email>aland@freeradius.org</email>
      </address>
    </author>
    <date year="2022" month="October" day="04"/>
    <area>Internet</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>RADIUS crypto-agility was first mandated as future work by RFC 6421.  The outcome of that work was the publication of RADIUS over TLS (RFC 6614) and RADIUS over DTLS (RFC 7360) as experimental documents.  Those transport protocols have been in wide-spread use for many years in a wide range of networks.  They have proven their utility as replacements for the previous UDP (RFC 2865) and TCP (RFC 6613) transports.  With that knowledge, the continued use of insecure transports for RADIUS has serious and negative implications for privacy and security.</t>
      <t>This document formally deprecates the use of the User Datagram Protocol (UDP) and of the Transport Congestion Protocol (TCP) as transport protocols for RADIUS. These transports are permitted inside of secure networks, but their use even in that environment is strongly discouraged.  For all other environments, the use of TLS-based transports is mandated.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekok-radext-deprecating-radius/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RADEXT Working Group mailing list (<eref target="mailto:radext@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/radext/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/deprecating-radius.git"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The RADIUS protocol <xref target="RFC2865"/> was first standardized in 1997, though its roots go back much earlier to 1993.  The protocol uses MD5 <xref target="RFC1321"/> to sign some packets types, and to obfsucate certain attributes such as User-Password.  As originally designed, Access-Request packets were entirely unauthenticated, and could be trivially spoofed as discussed in <xref target="RFC3579"/> Section 4.3.2.  In order to prevent such spoofing, that specification defined the Message-Authenticator attribute (<xref target="RFC3579"/> Section 3.2) which allowed for packets to carry a signature based on HMAC-MD5.</t>
      <t>The state of MD5 security was discussed in <xref target="RFC6151"/>, which led to the state of RADIUS security being reviewed in <xref target="RFC6421"/> Section 3.  The outcome of that review was the remainder of <xref target="RFC6421"/>, which created crypto-agility requirements for RADIUS.</t>
      <t>RADIUS/TLS <xref target="RFC6614"/> and RADIUS/DTLS <xref target="RFC7360"/> were then defined in order to meet the crypto-agility requirements of <xref target="RFC6421"/>.  RADIUS/TLS has been in wide-spread use for about a decade, including Eduroam, and more recently OpenRoaming.  RADIUS/DTLS has seen less use across the public Internet, but it nonetheless has multiple implementations.</t>
      <t>As of the writing of this specification, RADIUS/UDP is still widely used, even though it depends on MD5 and "ad hoc" constructions for security.  While MD5 has been broken, it is a testament to the design of RADIUS that there have been (as yet) no attacks on RADIUS Authenticator signatures which are stronger than brute-force.</t>
      <t>However, the probmens with MD5 means that if a someone can view unencrypted RADIUS traffic, even a hobbyist attacker can crack all possible RADIUS shared secrets of eight characters or less.  Such attacks can also result in compromise of all passwords carried in the User-Password attribute.</t>
      <t>Even if a stronger packet signature method was used as in <xref target="RFC6218"/>, it would not fully address the issues with RADIUS.  Most information in RADIUS is sent in cleartext, and only a few attributes are hidden via obfuscation methods which rely on more "ad hoc" MD5 constructions.  The privacy implications of this openness are severe.</t>
      <t>Any observer of non-TLS RADIUS traffic is able to tell who is logging in to the network, what devices they are using, where they are logging in from, and their approximate location (usually city).  With location-based attributes as defined in <xref target="RFC5580"/>, a users location may be determined to within 15 or so meters.  An observer can use RADIUS accounting packets to determine how long a user is online, and to track a summary of their total traffic (upload and download totals).</t>
      <t>When RADIUS/UDP is used across the public Internet, the location of corporate executives can potentially be tracked in real-time (usually 10 minute intervals), to within 15 meters.  Their devices can be identified, and tracked.  Any passwords they send via the User-Password attribute can be be compromised.  The negative implications for security and individual safety are obvious.</t>
      <t>These issues are only partly mitigated when the attributes RADIUS is carrying define their own increased security and privacy.  For example, some authentication methods such EAP-TLS, EAP-TTLS, etc. allow for User-Name privacy and for more secure transport of passwords.  The use of MAC address randomization can limit device informationidentification to a particular manufacterer, instead of to a unique device.</t>
      <t>However, these authentication methods are not always used or are not always available.  Even if these methods were used ubiquitously, they do not protect all of the information which is publicly available when RADIUS/UDP or RADIUS/TCP is used.</t>
      <t>It is no longer acceptable for RADIUS to rely on MD5 for security.  It is no longer acceptable to send device or location information in clear text.  This document therefore deprecates insecure uses of RADIUS, and mandates the use of secure TLS-based transport layers.</t>
      <t>The use of TLS-based transport ensures complete privacy and security for all RADIUS traffic.  An observer is limited to knowing rough activity levels of a client or server.  That is, an observer can tell if there are a few users on a NAS, or many users on a NAS.  All other information is hidden from all observers.</t>
      <section anchor="overview">
        <name>Overview</name>
        <t>The rest of this document begins a summary of issues with RADIUS, and shows just how trivial it is to crack RADIUS/UDP security.  We then mandate the use of TLS transport, and describe what that means.  We give recommendations on how current systems can be migrated to using TLS.  We conclude with privacy and security considerations.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <ul spacing="normal">
        <li>RADIUS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>The Remote Authentication Dial-In User Service protocol, as defined in <xref target="RFC2865"/>, <xref target="RFC2865"/>, and <xref target="RFC5176"/> among others.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/UDP</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the User Datagram Protocol as define above.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/TCP</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Congestion Protocol <xref target="RFC6613"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/TLS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Layer Security protocol <xref target="RFC6614"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/DTLS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Datagram Transport Layer Security protocol  <xref target="RFC7360"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>TLS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>the Transport Layer Security protocol.  Generally when we refer to TLS in this document, we are referring to RADIUS/TLS and/or RADIUS/DTLS.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>NAS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>Network Access Server, which is a RADIUS client.</t>
        </li>
      </ul>
    </section>
    <section anchor="overview-of-issues-with-radius">
      <name>Overview of issues with RADIUS</name>
      <t>There are a number of issues with RADIUS.   For one, RADIUS sends most information "in the clear", with obvious privacy implications.</t>
      <t>Further, MD5 has been broken for over a decade, as summarized in <xref target="RFC6151"/>.  No protocol should be using MD5 for anything.  Even if MD5 was not broken, computers have gotten substantially faster in the past thirty years.  This speed increase makes it possible for the average hobbyist to perform brute-force attacks to crack even seemingly complex shared secrets.</t>
      <t>We address each of these issues in detail below.</t>
      <section anchor="information-is-sent-in-clear-text">
        <name>Information is sent in Clear Text</name>
        <t>Other than a few attributes such as User-Password, all RADIUS traffic is sent "in the clear".  The resulting traffic has a large number of privacy issues.  We refer to <xref target="RFC6973"/>, and specifically to Section 5 of that document for detailed discussion.  RADIUS is vulnerable to all of the issues raised by <xref target="RFC6973"/>.</t>
        <t>There are clear privacy and security information with sending user identifiers, and user locations <xref target="RFC5580"/> in clear-text across the Internet.  As such, the use of clear-text protocols across insecure networks is no longer acceptable.</t>
      </section>
      <section anchor="md5-has-been-broken">
        <name>MD5 has been broken</name>
        <t>Attacks on MD5 are summarized in part in <xref target="RFC6151"/>. While there have not been many new attacks in the decade since <xref target="RFC6151"/> was published, that does not mean that further attacks do not exist.  It is more likely that no one is looking for new attacks.</t>
        <t>It is reasonable to expect that new research can further break MD5, but also that such research may not be publicly available.</t>
      </section>
      <section anchor="complexity-of-cracking-radius-shared-secrets">
        <name>Complexity of cracking RADIUS shared secrets</name>
        <t>The cost of cracking a a shared secret can only go down over time as computation becomes cheaper.  The issue is made worse because of the way MD5 is used in RADIUS.  The attacker does not have to calculate the hash over the entire packet, as that can be precalculated, and cached.  The attacker can simply begin with that precalculated portion, and brute-force only the shared secret portion.</t>
        <t>At the time of writing this document, an "off the shelf" commodity computer can calculate at least 100M MD5 hashes per second.  If we limit shared secrets to upper/lowercase letters, numbers, and a few "special" characters, we have 64 possible characters for shared secrets.  Which means that for 8-character passwords, there are 2^48 possible password combinations.</t>
        <t>The result is that using one readily available machine, it takes approximately 32 days to brute-force the entire 8 octet / 64 character password space.  The problem is even worse when graphical processing units (GPUs) are used. A high-end GPU is capable of performing more than 64 billion hashes per second.  (https://gist.github.com/Chick3nman/e4fcee00cb6d82874dace72106d73f).  At that rate, the entire 8 character space described above can be searched in approximately 90 minutes.</t>
        <t>This is an attack which is feasible today for a hobbyist. Increasing the size of the character set raises the cost of cracking, but not enough to be secure.  Increasing the character set to 93 characters means that the hobbyist using a GPU could search the entire 8 character space in about a day.</t>
        <t>Increasing the length of the shared secret a bit helps.  For secrets ten characters long, a GPU can search a 64-character space in about six months, and a 93 character space would take approximately 24 years.</t>
        <t>The brute-force attack is also trivially parallelizable.  Nation-states have sufficient resources to deploy hundreds to thousands of systems dedicated to these attacks.  That realization means that a "time to crack" of 24 years is simply expensive, but is not particularly difficult.</t>
        <t>Whether the above numbers  exactly correct, or only approximate is immaterial.  These attacks will only get better over time.  The cost to crack shared secrets will only go down.</t>
        <t>Even worse, administrators do not always derive shared secrets from secure sources of random numbers.  The "time to crack" numbers given above are the absolute best case, assuming administrators follow best practices for creating secure shared secrets.  For shared secrets created manually by a person, the search space is orders of magnitude smaller than the best case outlined above.</t>
        <t>It should be assumed that an average attacker with modest resource can crack most human-derived shared secrets in minutes, if not seconds.</t>
        <t>Despite the ease of attacking MD5, it is still a common practice for some "cloud" and other RADIUS providers to send RADIUS/UDP packets over the Internet "in the clear".  It is also common practice for administrators to use "short" shared secrets, and to use shared secrets created by a person, or derived from a limited character set.  Theses practice are followed for ease of use of administrators, but they are also highly insecure.</t>
      </section>
      <section anchor="tunnel-password-and-coa-request-packets">
        <name>Tunnel-Password and CoA-Request packets</name>
        <t>There are similar security issues for the Tunnel-Password attribute, at least in CoA-Request and Disconnect-Request packets.</t>
        <t><xref target="RFC5176"/> Section 2.3 says:</t>
        <artwork><![CDATA[
Request Authenticator

   In Request packets, the Authenticator value is a 16-octet MD5
   [RFC1321] checksum, called the Request Authenticator.  The
   Request Authenticator is calculated the same way as for an
   Accounting-Request, specified in [RFC2866].
]]></artwork>
        <t>Where <xref target="RFC2866"/> Section 3 says:</t>
        <artwork><![CDATA[
  The NAS and RADIUS accounting server share a secret.  The Request
  Authenticator field in Accounting-Request packets contains a one-
  way MD5 hash calculated over a stream of octets consisting of the
  Code + Identifier + Length + 16 zero octets + request attributes +
  shared secret (where + indicates concatenation).  The 16 octet MD5
  hash value is stored in the Authenticator field of the
  Accounting-Request packet.
]]></artwork>
        <t>Taken together, these defintions means that for CoA-Request packets, all attribute obfuscation is calculated with the Reply Authenticator being all zeroes.</t>
        <t><xref target="RFC5176"/> Section 3.6 allows for Tunnel-Password in CoA-Request packets:</t>
        <artwork><![CDATA[
  ...
  Change-of-Authorization Messages
  
  Request   ACK      NAK   #   Attribute
  ...
  0+        0        0    69   Tunnel-Password (Note 5)
  ...
  (Note 5) When included within a CoA-Request, these attributes
  represent an authorization change request.  Where tunnel attributes
  are included within a successful CoA-Request, all existing tunnel
  attributes are removed and replaced by the new attribute(s).
]]></artwork>
        <t>However, <xref target="RFC2868"/> Section 3.5 says that Tunnel-Password is encrypted with the Request Authenticator:</t>
        <artwork><![CDATA[
  Call the shared secret S, the pseudo-random 128-bit Request
  Authenticator (from the corresponding Access-Request packet) R,
]]></artwork>
        <t>The assumption that the Request Authenticator is random data is true for Access-Request packets.  It is not true for CoA-Request packets</t>
        <t>That is, when the Tunnel-Password attribute is used in CoA-Request packets, the only source of randomness in the obfuscation is the salt, as defined in <xref target="RFC2868"/> Section 3.5;</t>
        <artwork><![CDATA[
Salt
  The Salt field is two octets in length and is used to ensure the
  uniqueness of the encryption key used to encrypt each instance of
  the Tunnel-Password attribute occurring in a given Access-Accept
  packet.  The most significant bit (leftmost) of the Salt field
  MUST be set (1).  The contents of each Salt field in a given
  Access-Accept packet MUST be unique.
]]></artwork>
        <t>Which means that there is only 15 bits of entropy in the Tunnel-Password obfuscation (plus the secret).  It is not known if this limitation makes it easier to determine the contents of the Tunnel-Password.  However, it cannot be a good thing, and it is one more reason to deprecate RADIUS/UDP.</t>
      </section>
    </section>
    <section anchor="all-short-shared-secrets-have-been-compromised">
      <name>All short Shared Secrets have been compromised</name>
      <t>Unless RADIUS packets are sent over a secure network (IPSec, TLS, etc.), administrators should assume that any shared secret of 8 characters or less has been immediately compromised.  Administrators should assume that any shared secret of 10 characters or less has been compromised by an attacker with significant resources.  Administrators should also assume that any private information (such as User-Password) which depends on such shared secrets has also been compromised.</t>
      <t>Further, if a User-Password has been sent over the Internet via RADIUS/UDP or RADIUS/TCP in the last decade, you should assume that password has been compromised by an attacker with sufficient resources.</t>
    </section>
    <section anchor="deprecating-radius-and-mandating-tls">
      <name>Deprecating RADIUS, and mandating TLS.</name>
      <t>The solution to an insecure protocol using thirty year-old cryptography is to deprecate the insecure cryptography, and to mandate modern cryptographic transport.</t>
      <section anchor="deprecating-udp-and-tcp-as-transports">
        <name>Deprecating UDP and TCP as transports</name>
        <t>RADIUS/UDP and RADIUS/TCP MUST NOT be used outside of secure networks.  A secure network is one which is known to be safe from eavesdroppers, attackers, etc.</t>
        <t>For example, if IPSec is used between two systems, then those systems may use RADIUS/UDP or RADIUS/TCP over the IPSec connection.</t>
        <t>Similarly, RADIUS/UDP and RADIUS/TCP may be used in secure management networks.  However, administrators should not assume that such uses are secure.</t>
        <t>Using RADIUS/UDP and RADIUS/TCP in any environment is still NOT RECOMMENDED.  A network misconfiguration could result in the RADIUS traffic being sent over an insecure network.  Neither the RADIUS client nor the RADIUS server would be aware of this misconfiguration.</t>
        <t>In contrast, when TLS is used, the RADIUS endpoints are aware of all security issues, and can enforce security for themselves.</t>
      </section>
      <section anchor="mandating-tls-transport">
        <name>Mandating TLS transport</name>
        <t>All RADIUS systems MUST support RADIUS/TLS and/or RADIUS/DTLS.</t>
      </section>
      <section anchor="crypto-agility">
        <name>Crypto-Agility</name>
        <t>The crypto-agility requirements of <xref target="RFC6421"/> are addressed in <xref target="RFC6614"/> Appendix C, and in Section 10.1 of <xref target="RFC7360"/>.  For clarity, we repeat the text of <xref target="RFC7360"/> here, with some minor modifications to update references, but not content.</t>
        <t>Section 4.2 of <xref target="RFC6421"/> makes a number of recommendations about security properties of new RADIUS proposals.  All of those recommendations are satisfied by using TLS or DTLS as the transport layer.</t>
        <t>Section 4.3 of <xref target="RFC6421"/> makes a number of recommendations about backwards compatibility with RADIUS.  <xref target="RFC7360"/> Section 3 addresses these concerns in detail.</t>
        <t>Section 4.4 of <xref target="RFC6421"/> recommends that change control be ceded to the IETF, and that interoperability is possible.  Both requirements are satisfied.</t>
        <t>Section 4.5 of <xref target="RFC6421"/> requires that the new security methods apply to all packet types.  This requirement is satisfied by allowing TLS and DTLS to be used for all RADIUS traffic.  In addition, <xref target="RFC7360"/> Section 3, addresses concerns about documenting the transition from legacy RADIUS to crypto-agile RADIUS.</t>
        <t>Section 4.6 of <xref target="RFC6421"/> requires automated key management.  This requirement is satisfied by using TLS or DTLS key management.</t>
        <t>We can now finalize the work began in <xref target="RFC6421"/>.  We now state that new RADIUS specifications MUST NOT create any new cryptographic primitives to sign individual packets, or to obfscate the contents of any attributes.  All security and privacy MUST instead be provided by a secure transport layer such as TLS.  Simply using IPSec is not enough, as the use (or not) of IPSec is unknown to the RADIUS application.</t>
        <t>It is NOT RECOMMENDED to define new attributes which use the content obfuscation methods defined for User-Password or Tunnel-Password.  We would like to forbid such constructs entirely.  We recognize that RADIUS/UDP will still be in use for many years, and that new standards may require some modicrum of privacy.  As a result, it is difficult to forbid the use of these constructs.</t>
        <t>hat being said, there has been no need since <xref target="RFC2868"/> in 2000 for new attribute which use these obfuscation methods.  We believe therefore that there will be no demand for this kind of new attribute.</t>
      </section>
    </section>
    <section anchor="migration-path-and-recommendations">
      <name>Migration Path and Recommendations</name>
      <t>We recognize that it is difficult to upgrade legacy devices with new cryptographic protocols and user interfaces.  The problem is made worse because the volume of RADIUS devices which are in use.  The exact number is unknown, and can only be approximated.  Our best guesses would be in the order of hundreds of thousands, if not millions of RADIUS/UDP devices are in daily use.</t>
      <t>We therefore need to define a migration path to using secure transports.  We give a few migration steps by making stronger recommendations for shared secrets.  Where <xref target="RFC6614"/> Section 2.3 makes support for TLS-PSK optional, we now require support for TLS-PSK.</t>
      <section anchor="shared-secrets">
        <name>Shared Secrets</name>
        <t><xref target="RFC2865"/> Section 3 says:</t>
        <ul empty="true">
          <li>
            <t>It is preferred that the secret be at least 16
octets.  This is to ensure a sufficiently large range for the
secret to provide protection against exhaustive search attacks.
The secret MUST NOT be empty (length 0) since this would allow
packets to be trivially forged.</t>
          </li>
        </ul>
        <t>This recommendation is no longer adequate, so we strengthen it here.</t>
        <t>RADIUS implementations MUST support shared secrets of at least 32 octets, and SHOULD support shared secrets of 64 octets.  Implementations MUST warn administrators that the shared secret is insecure if it is 10 octets or less in length.</t>
        <t>Administrators SHOULD use shared secrets of at least 24 octets, generated using a source of secure random numbers.   Any other practice is likely to lead to compromise of the shared secret, user information, and possibly of the entire network.</t>
        <t>Creating secure shared secrets is not difficult.  One solution is to use a simple script given below.</t>
        <ul empty="true">
          <li>
            <t>#!/usr/bin/env perl
use MIME::Base32;
use Crypt::URandom();
print join('-', unpack("(A4)*", lc encode_base32(Crypt::URandom::urandom(12)))), "\n";</t>
          </li>
        </ul>
        <t>This script reads 96 bits of random data from a secure source, encodes it in Base32, and then makes it easier for people to work with.  The generated secrets are of the form "2nw2-4cfi-nicw-3g2i-5vxq".  This form of secret will be accepted by any known implementation which supports at least 24 octets for shared secrets.</t>
        <t>Given the simplicity of creating strong secrets, there is no excuse for using weak shared secrets with RADIUS.</t>
        <t>RADIUS implementors SHOULD provide tools for administrators which automatically create secure shared secrets.</t>
        <t>Given the insecurity of RADIUS, the absolute minimum acceptable security is to use strong shared secrets.  However, TLS-PSK is not substantially more complex, and offers significantly increased security and privacy.</t>
      </section>
      <section anchor="tls-psk">
        <name>TLS-PSK</name>
        <t>TLS uses certificates in most common uses.  However, we recognize that it may be difficult to fully upgrade client implementations to allow for certificates to be used with RADIUS/TLS and RADIUS/DTLS.  It is therefore RECOMMENDED that client implementations allow the use of a pre-shared key (TLS-PSK).  The client implementation can then expose a flag "TLS yes / no", and then a shared secret (now PSK) entry field.</t>
        <t>Any shared secret used for RADIUS/UDP MUST NOT be used for TLS-PSK.</t>
        <t>Implementations MUST support PSKs of at least 32 octets, and SHOULD support PSKs of 64 octets.  Implementations MUST require that PSKs be at least 16 octets in length.  That is, short PSKs MUST NOT be permitted to be used.</t>
        <t>Administrators SHOULD use PSKs of at least 24 octets, generated using a source of secure random numbers.  The script given above can again be used.</t>
        <t>We also incorporate by reference the requirements of Section 10.2 of <xref target="RFC7360"/> when using PSKs.</t>
        <section anchor="psk-identities">
          <name>PSK Identities</name>
          <t><xref target="RFC6614"/> is silent on the subject of PSK identities, which is an issue that we correct here.</t>
          <t>The need to manage identities associated with PSK is a new requirement for NAS management interfaces, and is a new requirement for RADIUS servers.  As such, implementors and operators require guidance.</t>
          <t>RADIUS systems implementing TLS-PSK MUST support identities as per <xref target="RFC4279"/> Section 5.3, and MUST enable configuring TLS-PSK identities in management interfaces as per <xref target="RFC4279"/> Section 5.4.</t>
          <t>A RADIUS client implementing TLS-PSK MUST update their management interfaces and application programming interfaces (APIs) to label the PSK field as "PSK" or "TLS-PKS, and MUST NOT label the PSK field as "shared secret".</t>
          <t>Where dynamic server lookups <xref target="RFC7585"/> are not used, RADIUS clients MUST still permit the configuration of a RADIUS server IP address.</t>
          <t>When a RADIUS server implements TLS-PSK, the PSK identity replaces the IP address as the logical identifier for a RADIUS client.  RADIUS servers MUST be able to look up PSK identity in a subsystem which then returns the actual PSK.</t>
          <t>We note that due to NAT, etc. there may be multiple RADIUS clients using one public IP address.  RADIUS servers MUST support such a configuration, and MUST support unique PSK identities for each client which is deployed in such a scenario.</t>
          <t>RADIUS servers SHOULD tie PSK identities to a particular permitted IP address or permitted network, as doing so will lower the risk if a PSK is leaked.  RADIUS servers MUST permit multiple clients to share one permitted IP address or network.</t>
          <t>A RADIUS server which accepts TLS-PSK MUST support a unique PSK identifier per RADIUS client.  There is no reason to use the same identifier for multiple clients.  A RADIUS server which accepts TLS-PSK MUST have a unique PSK per RADIUS client.</t>
          <t>It is RECOMMENDED that RADIUS clients and server track all used shared secrets and PSKs, and then verify that the following requirements all hold true:</t>
          <ul spacing="normal">
            <li>no shared secret is used for more than one RADIUS client</li>
            <li>no PSK is used for more than one RADIUS cleint</li>
            <li>no shared secret is used as a PSK</li>
            <li>no PSK is used as a shared secret</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The primary focus of this document is addressing privacy considerations for RADIUS.</t>
      <t>Deprecating insecure transport for RADIUS, and requiring secure transport means that personally identifying information is no longer sent "in the clear".  As noted earlier in this document, such information can include MAC addresses, user identifiers, and user locations.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The primary focus of this document is addressing security considerations for RADIUS.</t>
      <t>Deprecating insecure transport for RADIUS, and requiring secure transport means that historical and/or future security issues with the RADIUS protocol no longer apply.</t>
      <t>Experience has shown that it can be difficult to configure and update certificates in a RADIUS environment.  Public Certification Authorities (CAs) will not issue certificates specifically for use by RADIUS servers.  As for updates, certificates may be valid for many years.  By the time a certificate is up for renewal, the people and processes responsible for it may have changed.  Which means that updating certificates can be a complex and error-prone task.</t>
      <t>Therefore while <xref target="RFC6614"/> suggested that TLS-PSK was optional, we mandate support for TLS-PSK here.  We also correct the omission of any discussion related to TLS-PSK identies in that specification, and explain how those identities are used on clients and servers.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations in this document.</t>
      <t>RFC Editor: This section may be removed before final publication.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BCP14" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2865" target="https://www.rfc-editor.org/info/rfc2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney">
              <organization/>
            </author>
            <author fullname="S. Willens" initials="S." surname="Willens">
              <organization/>
            </author>
            <author fullname="A. Rubens" initials="A." surname="Rubens">
              <organization/>
            </author>
            <author fullname="W. Simpson" initials="W." surname="Simpson">
              <organization/>
            </author>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC4279" target="https://www.rfc-editor.org/info/rfc4279">
          <front>
            <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs).  These pre-shared keys are symmetric keys, shared in advance among the communicating parties.  The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4279"/>
          <seriesInfo name="DOI" value="10.17487/RFC4279"/>
        </reference>
        <reference anchor="RFC6421" target="https://www.rfc-editor.org/info/rfc6421">
          <front>
            <title>Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS)</title>
            <author fullname="D. Nelson" initials="D." role="editor" surname="Nelson">
              <organization/>
            </author>
            <date month="November" year="2011"/>
            <abstract>
              <t>This memo describes the requirements for a crypto-agility solution for Remote Authentication Dial-In User Service (RADIUS).  This  document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6421"/>
          <seriesInfo name="DOI" value="10.17487/RFC6421"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC1321" target="https://www.rfc-editor.org/info/rfc1321">
          <front>
            <title>The MD5 Message-Digest Algorithm</title>
            <author fullname="R. Rivest" initials="R." surname="Rivest">
              <organization/>
            </author>
            <date month="April" year="1992"/>
            <abstract>
              <t>This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.  This memo provides information for the Internet community.  It does not specify an Internet standard.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1321"/>
          <seriesInfo name="DOI" value="10.17487/RFC1321"/>
        </reference>
        <reference anchor="RFC2866" target="https://www.rfc-editor.org/info/rfc2866">
          <front>
            <title>RADIUS Accounting</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney">
              <organization/>
            </author>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying accounting information between a Network Access Server and a shared Accounting Server.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2866"/>
          <seriesInfo name="DOI" value="10.17487/RFC2866"/>
        </reference>
        <reference anchor="RFC2868" target="https://www.rfc-editor.org/info/rfc2868">
          <front>
            <title>RADIUS Attributes for Tunnel Protocol Support</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn">
              <organization/>
            </author>
            <author fullname="D. Leifer" initials="D." surname="Leifer">
              <organization/>
            </author>
            <author fullname="A. Rubens" initials="A." surname="Rubens">
              <organization/>
            </author>
            <author fullname="J. Shriver" initials="J." surname="Shriver">
              <organization/>
            </author>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege">
              <organization/>
            </author>
            <author fullname="I. Goyret" initials="I." surname="Goyret">
              <organization/>
            </author>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document defines a set of RADIUS (Remote Authentication Dial In User Service) attributes designed to support the provision of compulsory tunneling in dial-up networks.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2868"/>
          <seriesInfo name="DOI" value="10.17487/RFC2868"/>
        </reference>
        <reference anchor="RFC3579" target="https://www.rfc-editor.org/info/rfc3579">
          <front>
            <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun">
              <organization/>
            </author>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms.  In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes.  This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server.  While EAP was originally developed for use with PPP, it is now also in use with IEEE 802.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3579"/>
          <seriesInfo name="DOI" value="10.17487/RFC3579"/>
        </reference>
        <reference anchor="RFC5176" target="https://www.rfc-editor.org/info/rfc5176">
          <front>
            <title>Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="M. Chiba" initials="M." surname="Chiba">
              <organization/>
            </author>
            <author fullname="G. Dommety" initials="G." surname="Dommety">
              <organization/>
            </author>
            <author fullname="M. Eklund" initials="M." surname="Eklund">
              <organization/>
            </author>
            <author fullname="D. Mitton" initials="D." surname="Mitton">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a currently deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products.  This includes support for disconnecting users and changing authorizations applicable to a user session. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5176"/>
          <seriesInfo name="DOI" value="10.17487/RFC5176"/>
        </reference>
        <reference anchor="RFC5580" target="https://www.rfc-editor.org/info/rfc5580">
          <front>
            <title>Carrying Location Objects in RADIUS and Diameter</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi">
              <organization/>
            </author>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="A. Lior" initials="A." surname="Lior">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
              <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5580"/>
          <seriesInfo name="DOI" value="10.17487/RFC5580"/>
        </reference>
        <reference anchor="RFC6151" target="https://www.rfc-editor.org/info/rfc6151">
          <front>
            <title>Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms</title>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <author fullname="L. Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document updates the security considerations for the MD5 message digest algorithm.  It also updates the security considerations for HMAC-MD5.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6151"/>
          <seriesInfo name="DOI" value="10.17487/RFC6151"/>
        </reference>
        <reference anchor="RFC6218" target="https://www.rfc-editor.org/info/rfc6218">
          <front>
            <title>Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn">
              <organization/>
            </author>
            <author fullname="T. Zhang" initials="T." surname="Zhang">
              <organization/>
            </author>
            <author fullname="J. Walker" initials="J." surname="Walker">
              <organization/>
            </author>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines a set of vendor-specific RADIUS Attributes designed to allow both the secure transmission of cryptographic keying material and strong authentication of any RADIUS message. These attributes have been allocated from the Cisco vendor-specific space and have been implemented by multiple vendors.  This document  is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6218"/>
          <seriesInfo name="DOI" value="10.17487/RFC6218"/>
        </reference>
        <reference anchor="RFC6613" target="https://www.rfc-editor.org/info/rfc6613">
          <front>
            <title>RADIUS over TCP</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="May" year="2012"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Server (RADIUS) protocol has, until now, required the User Datagram Protocol (UDP) as the underlying transport layer.  This document defines RADIUS over the Transmission Control Protocol (RADIUS/TCP), in order to address handling issues related to RADIUS over Transport Layer Security (RADIUS/TLS).  It permits TCP to be used as a transport protocol for RADIUS only when a transport layer such as TLS or IPsec provides confidentiality and security.  This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6613"/>
          <seriesInfo name="DOI" value="10.17487/RFC6613"/>
        </reference>
        <reference anchor="RFC6614" target="https://www.rfc-editor.org/info/rfc6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter">
              <organization/>
            </author>
            <author fullname="M. McCauley" initials="M." surname="McCauley">
              <organization/>
            </author>
            <author fullname="S. Venaas" initials="S." surname="Venaas">
              <organization/>
            </author>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga">
              <organization/>
            </author>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="RFC6973" target="https://www.rfc-editor.org/info/rfc6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="J. Peterson" initials="J." surname="Peterson">
              <organization/>
            </author>
            <author fullname="J. Morris" initials="J." surname="Morris">
              <organization/>
            </author>
            <author fullname="M. Hansen" initials="M." surname="Hansen">
              <organization/>
            </author>
            <author fullname="R. Smith" initials="R." surname="Smith">
              <organization/>
            </author>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7360" target="https://www.rfc-editor.org/info/rfc7360">
          <front>
            <title>Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="September" year="2014"/>
            <abstract>
              <t>The RADIUS protocol defined in RFC 2865 has limited support for authentication and encryption of RADIUS packets.  The protocol transports data in the clear, although some parts of the packets can have obfuscated content.  Packets may be replayed verbatim by an attacker, and client-server authentication is based on fixed shared secrets.  This document specifies how the Datagram Transport Layer Security (DTLS) protocol may be used as a fix for these problems.  It also describes how implementations of this proposal can coexist with current RADIUS systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7360"/>
          <seriesInfo name="DOI" value="10.17487/RFC7360"/>
        </reference>
        <reference anchor="RFC7585" target="https://www.rfc-editor.org/info/rfc7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter">
              <organization/>
            </author>
            <author fullname="M. McCauley" initials="M." surname="McCauley">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm.  It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
