<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.6.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekok-radext-radiusv11-00" category="std" consensus="true" submissionType="IETF" updates="RFC6613,RFC7360" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="RADIUSv11">RADIUS/TLS Version 1.1</title>
    <seriesInfo name="Internet-Draft" value="draft-dekok-radext-radiusv11-00"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>FreeRADIUS</organization>
      <address>
        <email>aland@freeradius.org</email>
      </address>
    </author>
    <date year="2023" month="February" day="22"/>
    <area>Internet</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines Application-Layer Protocol Negotiation Extensions for use with RADIUS/TLS and RADIUS/DTLS.  These extensions permit the negotiation of an additional application protocol for RADIUS over (D)TLS.  No changes are made to RADIUS/UDP or RADIUS/TCP.  The extensions allow the negotiation of a transport profile where the RADIUS shared secret is no longer used, and all MD5-based packet signing and attribute obfuscation methods are removed.  When this extension is used, the previous Authenticator field is repurposed to contain an explicit request / response identifier, called a Token.  The Token also allows more than 256 packets to be outstanding on one connection.</t>
      <t>This extension can be seen as a transport profile for RADIUS, as it is not an entirely new protocol.  It uses the existing RADIUS packet layout and attribute format without change.  As such, it can carry all present and future RADIUS attributes.  Implementation of this extension requires only minor changes to the protocol encoder and decoder functionality.  The protocol defined by this extension is named "RADIUS version 1.1", or "radius/1.1".</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekok-radext-radiusv11/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RADEXT Working Group mailing list (<eref target="mailto:radext@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/radext/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/radiusv11.git"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The RADIUS protocol <xref target="RFC2865"/> uses MD5 <xref target="RFC1321"/> to sign packets, and to obfuscate certain attributes.  Current cryptographic research shows that MD5 is insecure, and recommends that MD5 should no longer be used.  In addition, the dependency on MD5 makes it impossible to use RADIUS in a FIPS-140 compliant system.  There are many prior discussions of MD5 insecurities which we will not repeat here.  These discussions are most notably in <xref target="RFC6151"/>, and in Section 3 of <xref target="RFC6421"/>, among many others.</t>
      <t>This document defines an Application-Layer Protocol Negotiation (ALPN) <xref target="RFC7301"/> extension for RADIUS which removes the dependency on MD5.  Systems which implement this transport profile are therefore capable of being FIPS-140 compliant.  This extension can best be understood as a transport profile for RADIUS, rather than a whole-sale revision of the RADIUS protocol.  To support this claim, a preliminary implementation of this extension was done in an Open Source RADIUS server was done.  Formatted as a "patch", the code changes comprised approximately 2,000 lines of code.</t>
      <t>The changes from traditional TLS-based transports for RADIUS are as follows:</t>
      <ul spacing="normal">
        <li>ALPN is used for negotiation of this extension,</li>
        <li>TLS 1.3 or later is required,</li>
        <li>all uses of the RADIUS shared secret have been removed,</li>
        <li>The now-unused Request and Response Authenticator fields have been repurposed to carry an opaque Token which identifies requests and responses,</li>
        <li>The Message-Authenticator attribute (<xref target="RFC3579"/> Section 3.2) is not sent in any packet, and if received is ignored,</li>
        <li>Attributes such as User-Password, Tunnel-Password, and MS-MPPE keys are sent encoded as "text" (<xref target="RFC8044"/> Section 3.4) or "octets" (<xref target="RFC8044"/> Section 3.5), without the previous MD5-based obfuscation.  This obfuscation is no longer necessary, as the data is secured and kept private through the use of TLS.</li>
      </ul>
      <t>The following items are left unchanged from traditional TLS-based transports for RADIUS:</t>
      <ul spacing="normal">
        <li>the RADIUS packet header is the same size, and the Code, Identifier, and Length fields (<xref target="RFC2865"/> Section 3) all have the same meaning as before</li>
        <li>All attributes which do not use MD5-based obfuscation methods are encoded using the normal RADIUS methods, and have the same meaning as before,</li>
        <li>As this extension is a transport profile for one "hop" (client to server connection), it does not impact any other connection used by a client or server.  The only systems which are aware that this transport profile is in use are the client and server which negotiate the extension for a connection that they share,</li>
        <li>This extension uses the same ports (2083/tcp and 2083/udp) as are defined for RADIUS/TLS <xref target="RFC6614"/> and RADIUS/DTLS <xref target="RFC7360"/>.</li>
      </ul>
      <t>A major benefit of this extenions is that a home server which implements it can also choose to also implement full FIPS-140 compliance,  That is, a home server can remove all uses of MD4 and MD5.  In that case, however, the home server will not support CHAP or MS-CHAP, or any authentication method which uses MD4 or MD5.  We note that the choice of which authentication method to accept is always left to the home server.  This specification does not change any authentication method carried in RADIUS, and does not mandate (or forbid) the use of any authentication method for any system.</t>
      <t>As for proxies, there was never a requirement that proxies implement CHAP or MS-CHAP authentication.  So far as a proxy is concerned, attributes relating to CHAP and MS-CHAP are simply opaque data that is transported unchanged to the next hop.  As such, it is possible for a FIPS-140 compliant proxy to transport authentication methods which depend on MD4 or MD5, so long as that data is forwarded to a home server which supports those methods.</t>
      <t>We reiterate that the decision to support (or not) any authentication method is entirely site local, and is not a requirement of this specification.  This specification does not not modify the content or meaning of any RADIUS attribute other than Message-Authenticator (and similar attributes), and the only change to the Message-Authenticator attribute is that is no longer used.</t>
      <t>Unless otherwise described in this document, all RADIUS requirements apply to this extension.  That is, this specification defines a transport profile for RADIUS.  It is not a new protocol, and it defines only minor changes to the RADIUS protocol.  It does not change the RADIUS packet format, attribute format, etc.  This specification is compatible with all RADIUS attributes, past, present, and future.  In short, it simply removes the need to use MD5 when signing packets, or obfuscating certain attributes.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <ul spacing="normal">
        <li>ALPN</li>
      </ul>
      <ul empty="true">
        <li>
          <t>Application-Layer Protocol Negotiation, as defined in <xref target="RFC7301"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>The Remote Authentication Dial-In User Service protocol, as defined in <xref target="RFC2865"/>, <xref target="RFC2865"/>, and <xref target="RFC5176"/> among others.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/UDP</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the User Datagram Protocol as define above.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/TCP</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transmission Control Protocol <xref target="RFC6613"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/TLS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Layer Security protocol <xref target="RFC6614"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/DTLS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Datagram Transport Layer Security protocol  <xref target="RFC7360"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUSv11</li>
      </ul>
      <ul empty="true">
        <li>
          <t>The ALPN protocol extenion defined in this document, which stands for "RADIUS version 1.1".  We use RADIUSv11 to refer interchangeably to TLS and for DTLS transport.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>TLS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>the Transport Layer Security protocol.  Generally when we refer to TLS in this document, we are referring to TLS or DTLS transport.</t>
        </li>
      </ul>
    </section>
    <section anchor="the-radiusv11-transport-profile-for-radius">
      <name>The RADIUSv11 Transport profile for RADIUS</name>
      <t>We define an ALPN extension for TLS-based RADIUS transports.   In addition to defining the extension, we also discuss how the encoding of some attributes are changed when this extension is used.  Any field or attribute not mentioned here is unchanged from RADIUS.</t>
    </section>
    <section anchor="defining-and-configuring-alpn">
      <name>Defining and configuring ALPN</name>
      <t>This document defines two ALPN protocol names which can be used to negotiate the use (or not) of this specification:</t>
      <ul spacing="normal">
        <li>radius/1</li>
      </ul>
      <ul empty="true">
        <li>
          <t>Traditional RADIUS/TLS or RADIUS/DTLS.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>radius/1.1</li>
      </ul>
      <ul empty="true">
        <li>
          <t>This protocol defined by specification.</t>
        </li>
      </ul>
      <t>Where ALPN is not configured or received in a TLS connection, systems supporting ALPN MUST assume that "radius/1" is being used.</t>
      <t>Where ALPN is configured, we have the following choices:</t>
      <ul spacing="normal">
        <li>use radius/1 only.</li>
      </ul>
      <ul empty="true">
        <li>
          <t>There is no need in this case to use ALPN, but this configuration is included for completeness</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>use radius/1.1 only</li>
      </ul>
      <ul empty="true">
        <li>
          <t>ALPN is required, and this configuration must be explicitly enabled by an administrator</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>negotiate either radius/1 or radius/1.1</li>
      </ul>
      <ul empty="true">
        <li>
          <t>Where both ends support radius/1.1, that extension MUST be used.  There is no reason to negotiate a feature and then not use it.</t>
        </li>
      </ul>
      <section anchor="configuration-of-alpn">
        <name>Configuration of ALPN</name>
        <t>Clients or servers supporting this specification do so by extending their TLS configuration through the addition of a new configuration flag, called "radius/1.1" here.  The exact name given below does not need to be used, but it is RECOMMENDED to use similar names in user interfaces, in order to provide consistent terminology for administrators.  This flag controls the use (or not) of the application-layer protocol defined by this specification.</t>
        <artwork><![CDATA[
Configuration Flag Name

> radius/1.1

Allowed Values

> forbid
>
>> Meaning
>>
>> Forbid the use of this specification.
>>
>> The system MAY signal ALPN via using only the "radius/1" protocol
>> name.  If ALPN is not used, the system MUST use RADIUS/TLS or
>> RADIUS/DTLS as per prior specifications.

> allow
>
>> Meaning
>>
>> Allow (or negotiate) the use of this specification.
>>
>> The system MUST use ALPN to signal that both "radius/1" and
>> "radius/1.1" can be used.
>
> require
>
>> Meaning
>>
>> Require the use of this specification.
>>
>> The system MUST use ALPN to signal that "radius/1.1" is being used.
>>
>> The "radius/1" ALPN protocol name MUST NOT be sent by the system.
>>
>> If no ALPN is received, or "radius/1.1" is not received via ALPN,
>> the system MUST log an informative message and close the TLS
>> connection.
]]></artwork>
        <t>Once a system has been configured to support ALPN, it is negotiated on a per-connection basis as per <xref target="RFC7301"/>.  The definition of the "radius/1.1" transport profile is given below.</t>
      </section>
      <section anchor="negotiation">
        <name>Negotiation</name>
        <t>If the "radius/1.1" flag is set to "allow", then both "radius/1" and "radius/1.1" application protocols MUST be signalled via ALPN.  Where a system sees that both ends of a connection support radius/1.1, then it MUST be used.  There is no reason to negotiate an extension and the refuse to use it.</t>
        <t>If a systems supports ALPN and does not receive any ALPN signalling from the other end, it MUST behave as if the other end had sent the ALPN protocol name "radius/1".</t>
        <t>If a system determines that there are no compatible application protocol names, then it MUST send a TLS alert of "no_application_protocol" (120), which signals the other end that there is no compatible application protocol.  The connection MUST then be torn down.</t>
        <t>It is RECOMMENDED that a descriptive error is logged in this situation, so that an administrator can determine why a particular connection failed.  The log message SHOULD include information about the other end of the connection, such as IP address, certificate information, etc.  Similarly, a system receiving a TLS alert of "no_application_protocol" SHOULD log a descriptive error message.  Such error messages are critical for helping administrators to diagnose connectivity issues.</t>
      </section>
      <section anchor="additional-tls-issues">
        <name>Additional TLS issues</name>
        <t>Implementations of this specification MUST require TLS version 1.3 or later.</t>
        <t>Implementations of this specification MUST support TLS-PSK.</t>
        <t>Any PSK used for TLS MUST NOT be used for attribute obfuscation in place of the RADIUS shared secret.  Any PSK used for TLS MUST NOT be the same as a RADIUS shared secret which is used for RADIUS/UDP or RADIUS/TLS.</t>
      </section>
    </section>
    <section anchor="definition-of-radius11">
      <name>Definition of radius/1.1</name>
      <t>This section describes the application-layer data which is sent inside of (D)TLS when using the radius/1.1 protocol.  Unless otherwise discussed herein, the application-layer data is unchanged from traditional RADIUS.  This protocol is only used when "radius/1.1" has been negotiated by both ends of a connection.</t>
      <section anchor="request-and-response-authenticator-fields">
        <name>Request and Response Authenticator fields</name>
        <t>As packets are no longer signed with MD5, the Request and Response Authenticator fields MUST NOT be calculated as described in any previous RADIUS specification.  That 16-octet portion of the packet header is now repurposed into two logical subfields, as given below:</t>
        <ul spacing="normal">
          <li>4 octets of opaque Token used to match requests and responses,</li>
          <li>12 octets of Reserved.</li>
        </ul>
        <figure anchor="Token">
          <name>The 16 octet Token plus Reserved field.</name>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Token                                                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                                
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        Reserved
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                                                |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>Token</t>
        <ul empty="true">
          <li>
            <t>The Token field is four octets, and aids in matching requests and
replies.  The RADIUS server can detect a duplicate request if it receives
the same Token value for two packets on a particular connection.</t>
            <t>All request / reply tracking MUST be done only on the Token field,
all other fields in the RADIUS packet header are ignored for the
purposes of deduplication.</t>
            <t>All deduplication MUST be done on a per-connection basis.  If two
RADIUS packets which are received on different connections contain
the same Token value, then those packets MUST be treated as distinct
(i.e. different) packets.</t>
            <t>The Token field MUST be different for every unique packet sent over
a particular connection.  This unique value can be used to
match responses to requests, and to identify duplicate requests.
Other than those two requirements, there is no special meaning for
the Token field.</t>
            <t>Systems generating a Token value for placement in a packet can do so
via any method they choose.  Systems receiving a Token value in a
packet MUST NOT interpret its value as anything other than an opaque
token.</t>
          </li>
        </ul>
        <t>Reserved</t>
        <ul empty="true">
          <li>
            <t>The Reserved field is twelve (12) octets in length.</t>
            <t>These octets MUST be set to zero when sending a packet.
These octets MUST be ignored when receiving a packet.
These octets are reserved for future protocol extensions.</t>
          </li>
        </ul>
        <section anchor="sending-packets">
          <name>Sending Packets</name>
          <t>The Token field MUST change for every new unique packet which is sent.  For DTLS transport, it is possible to retransmit duplicate packets, in which case the Token value MUST NOT be changed when a duplicate packet is sent.  When the contents of a retransmitted packet change for any reason (such changing Acct-Delay-Time as discussed in <xref target="RFC2866"/> Section 5.2), the Token value MUST be changed.</t>
          <t>The Token MUST be different for different packets on the same connection.  That is, if two packets are bit-for-bit identical (other than the Token field), then those two packets may have the same token value.  If the two packets have any differences, then the Token values for those two packets is required to be different.</t>
          <t>For simplicity, it is RECOMMENDED that the Token values be generated from a 32-bit counter which is unique to each connection.  Such a counter SHOULD be initialized from a random number generator whenever a new connection is opened.  The counter can then be incremented for every new packet which is sent.  As there is no special meaning for the Token, there is no meaning when a counter "wraps" around from a high value to zero.</t>
        </section>
        <section anchor="receiving-packets">
          <name>Receiving Packets</name>
          <t>A system which receives radius/1.1 packets MUST perform packet deduplication for all situations where it is required by RADIUS.  Where RADIUS does not require deduplication (e.g. TLS transport), the system SHOULD NOT do deduplication.</t>
          <t>In normal RADIUS, the Identifier field can be the same for different types of packets on the same connection, e.g. for Access-Request and Accounting-Request.  This overlap leads to increased complexity for RADIUS clients and servers, as the Identifier field is not unique in a connection, and different packet types can use the same identififer.  Implementations of RADIUS therefore need do deduplication across multiple fields of the RADIUS packet header, which adds complexity.</t>
          <t>When using radius/1.1, implementations MUST instead do deduplication solely on the Token field, on a per-connection basis.  A server MUST treat the Token as being an opaque field with no intrinsic meaning.  While the recommendation above is for the sender to use a counter, other implementations are possible, valid, and permitted.  For example, a system could use a pseudo-random number generator with a long period to generate unique values for the Token field.</t>
          <t>This change from RADIUS means that the Identifier field is no longer useful.  It is RECOMMENDED that the Identifier field be set to zero for all radius/1.1 packets.  In order to stay close to RADIUS, we still require that replies MUST use the same Identifier as was seen in the corresponding request.  There is no reason to make major changes to the RADIUS packet header.</t>
        </section>
      </section>
    </section>
    <section anchor="attribute-handling">
      <name>Attribute handling</name>
      <t>Most attributes in RADIUS have no special encoding "on the wire", or any special meaning between client and server.  Unless discussed in this section, all RADIUS attributes are unchanged in this specification.  This requirement includes attributes which contain a tag, as defined in <xref target="RFC2868"/>.</t>
      <section anchor="obfuscated-attributes">
        <name>Obfuscated Attributes</name>
        <t>As (D)TLS is used for this specification, there is no need to hide the contents of an attribute on a hop-by-hop basis.  The TLS transport ensures that all attribute contents are hidden from any observer</t>
        <t>Attributes which are obfuscated with MD5 no longer have the obfuscation step applied when radius/1.1 is used.  Instead, those attributes are simply encoded as their values, as with any other attribute.  Their encoding method MUST follow the encoding for the underlying data type, with any encryption / obfuscation step omitted.</t>
        <t>We understand that there is often concern in RADIUS that passwords are sent "in cleartext" across the network.  This allegation was never true for RADIUS, and definitely untrue when (D)TLS transport is used.  While passwords are encoded in packets as strings, the packets (and thus passwords) are protected by TLS.  For the unsure reader this is the same TLS which protects passwords used for web logins, e-mail reception and sending, etc.  As a result, any claims that passwords are sent "in the clear" are false.</t>
        <section anchor="user-password">
          <name>User-Password</name>
          <t>The User-Password attribute (<xref target="RFC2865"/> Section 5.2) MUST be encoded the same as any other attribute of data type 'text' (<xref target="RFC8044"/> Section 3.4), e.g. User-Name (<xref target="RFC2865"/> Section 5.1).</t>
        </section>
        <section anchor="tunnel-password">
          <name>Tunnel-Password</name>
          <t>The Tunnel-Password attribute (<xref target="RFC2868"/> Section 3.5) MUST be encoded the same as any other attribute of data type 'text' which contains a tag, such as Tunnel-Client-Endpoint (<xref target="RFC2868"/> Section 3.3).  Since the attribute is no longer obfuscated, there is no need for a Salt field or Data-Length fields as described in <xref target="RFC2868"/> Section 3,5, and the textual value of the password can simply be encoded as-is.</t>
        </section>
        <section anchor="vendor-specific-attributes">
          <name>Vendor-Specific Attributes</name>
          <t>Any Vendor-Specific attribute which uses similar obfuscation MUST be encoded as per their base data type.  Specifically, the MS-MPPE-Send-Key and MS-MPPE-Recv-Key attributes (<xref target="RFC2548"/> Section 2.4) MUST be encoded as any other attribute of data type 'string' (<xref target="RFC8044"/> Section 3.5).</t>
          <t>We note that as the RADIUS shared secret is no longer used, it is impossible for any Vendor-Specific attribute to be obfuscated using the previous methods defined for RADIUS.</t>
          <t>If a vendor wishes to hide the contents of a Vendor-Specific attribute, they are free to do so using vendor-defined methods.  However, such methods are unnecessary due to the use of (D)TLS transport.</t>
        </section>
      </section>
      <section anchor="message-authenticator">
        <name>Message-Authenticator</name>
        <t>The Message-Authenticator attribute (<xref target="RFC3579"/> Section 3.2) MUST NOT be sent over a radius/1.1 connection.  That attribute is no longer used or needed.</t>
        <t>If the Message-Authenticator attribute is received over a radius/1.1 connection, the attribute MUST be silently discarded, or treated an as "invalid attribute", as defined in <xref target="RFC6929"/>, Section 2.8.  That is, the Message-Authenticator attribute is no longer used to sign packets.  Its existence (or not) has become meaningless.</t>
        <t>We note that any packet which contains a Message-Authenticator attribute can still be processed.  There is no need to discard an entire packet simply because it contains a Message-Authenticator attribute.</t>
      </section>
      <section anchor="message-authentication-code">
        <name>Message-Authentication-Code</name>
        <t>Similarly, the Message-Authentication-Code attribute defined in <xref target="RFC6218"/> Section 3.3 MUST NOT be sent over a radius/1.1 connection.  That attribute MUST be treated the same as Message-Authenticator, above.</t>
        <t>As the Message-Authentication-Code attribute is no longer used, the related MAC-Randomizer attribute <xref target="RFC6218"/> Section 3.2 is also no longer used.  It MUST also be treated the same was as Message-Authenticator, above.</t>
      </section>
      <section anchor="chap-ms-chap-etc">
        <name>CHAP, MS-CHAP, etc.</name>
        <t>While some attributes such as CHAP-Password, etc. depend on insecure cryptographic primitives such as MD5, these attributes are treated as opaque blobs when sent between a RADIUS client and server.  The contents of the attributes are not obfuscated, and they do not depend on the RADIUS shared secret.</t>
        <t>As a result, these attributes are unchanged in radius/1.1.  We reiterate that this specification is largely a transport profile for RADIUS.  Other than a  few attributes such as Message-Authenticator, the meaning of all attributes in this specification is identical to their meaning in RADIUS.  Only the "on the wire" encoding of some attributes change, and then only for attributes which are obfuscated using the RADIUS shared secret.  Those obfuscated attributes are now protected by the modern cryptography in TLS, instead of an "ad hoc" approach using MD5.</t>
        <t>A server implementing this specification can proxy CHAP, MS-CHAP, etc. without any issue.  A home server implementing this specification can authenticate CHAP, MS-CHAP, etc. without any issue.</t>
      </section>
      <section anchor="original-packet-code">
        <name>Original-Packet-Code</name>
        <t>The Original-Packet-Code attribute (<xref target="RFC7930"/> Section 4) MUST NOT be sent over a radius/1.1 connection.  That attribute is no longer used or needed.</t>
        <t>If the Original-Packet-Code attribute is received over a radius/1.1 connection, the attribute MUST either be silently discarded, or be treated an as "invalid attribute", as defined in <xref target="RFC6929"/>, Section 2.8.  That is, existence of the Token field means that the Original-Packet-Code attribute is no longer needed to correlate Protocol-Error replies with outstanding requests.  As such, the Original-Packet-Code attribute is not used in radius/1.1.</t>
        <t>We note that any packet which contains an Original-Packet-Code attribute can still be processed.  There is no need to discard an entire packet simply because it contains an Original-Packet-Code attribute.</t>
      </section>
    </section>
    <section anchor="proxies">
      <name>Proxies</name>
      <t>A RADIUS proxy normally decodes and then re-encodes all attributes, included obfuscated ones.  A RADIUS proxy will not generally rewrite the content of the attributes it proxies (unless site-local policy requires such a rewrite).  While some attributes may be modified due to administrative or policy rules on the proxy, the proxy will generally not rewrite the contents of attributes such as User-Password, Tunnel-Password, CHAP-Password, MS-CHAP-Password, MS-MPPE keys, etc.  All attributes are therefore transported through a radius/1.1 connection without changing their values or contents.</t>
      <t>The proxy may negotiate radius/1.1 (or not) with a particular client or clients, and it may negotiate radius/1.1 (or not) with a server or servers it connect to, in any combination.  As a result, this specification is fully compatible with all past, present, and future RADIUS attributes.</t>
    </section>
    <section anchor="crypto-agility">
      <name>Crypto-Agility</name>
      <t>The crypto-agility requirements of <xref target="RFC6421"/> are addressed in <xref target="RFC6614"/> Appendix C, and in Section 10.1 of <xref target="RFC7360"/>.  This specification makes no changes from, or additions to, those specifications.</t>
      <t>This document adds the requirement that any new RADIUS specification MUST NOT introduce new "ad hoc" cryptographic primitives as was done with User-Password and Tunnel-Password.  There is insufficient expertise in the RADIUS community to securely design new cryptography.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>(This section to be removed by the RFC editor.)</t>
      <t>This specification is being implemented (client and server) in the FreeRADIUS project which is hosted on GitHub.  URL TBD.  The code implemention "diff" is approximately 2,000 lines, including build system changes and changes to configuration parsers.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This specification requires secure transport for RADIUS, and this has all of the privacy benefits of RADIUS/TLS <xref target="RFC6614"/> and RADIUS/DTLS <xref target="RFC7360"/>.  All of the insecure uses of RADIUS bave been removed.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The primary focus of this document is addressing security considerations for RADIUS.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is request to update the "TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs" registry with two new entries:</t>
      <artwork><![CDATA[
Protocol: radius/1.0
Id. Sequence: 0x72 0x61 0x64 0x69 0x75 0x73 0x2f 0x31 ("radius/1")
Reference: This document

Protocol:radius/1.1
Id. Sequence: 0x72 0x61 0x64 0x69 0x75 0x73 0x2f 0x31 0x2e 0x31
Reference: ("radius/1.1")  This document
]]></artwork>
    </section>
    <section anchor="issues-and-questions">
      <name>Issues and Questions</name>
      <t>Should we add a header flag which says "require TLS transport"?  This can be set by client to indicate that the data should not be sent over UDP/TCP at any stage of proxying.  It can also be added by a server to indicate that the packet contains similar data.</t>
      <t>One use-case for this is attributes which require the protection of TLS, but which do not have any RADIUS obfuscation methods defined.</t>
      <t>As a related note, do we want to allow new specifications to define attributes containing private information, but where we do not define RADIUS obfuscation?</t>
      <t>Maybe we want to reserve part of the attribute space (or extended attribute flags) for attributes which require TLS.</t>
      <t>It is difficult for a client to know when to set this flag, unless there is a specification which requires secure transport of clear-text private information.  Servers can set the flag in similar situations.</t>
      <t>Perhaps a home server could require that the flag is set for all packets sent to it?</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>In hindsight, the decision to retain MD5 for RADIUS/TLS was likely wrong.  It was an easy decision to make in the short term, but it has caused ongoing problems which this document addresses.</t>
      <t>Thanks to Bernard Aboba, Karri Huhtanen, and Alexander Clouter for reviews and feedback.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>draft-dekok-radext-sradius-00</li>
      </ul>
      <ul empty="true">
        <li>
          <t>Initial Revision</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>draft-dekok-radext-radiusv11-00</li>
      </ul>
      <ul empty="true">
        <li>
          <t>Use ALPN from RFC 7301, instead of defining a new port.  Drop the name "SRADIUS".</t>
          <t>Add discussion of Original-Packet-Code</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BCP14" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2865" target="https://www.rfc-editor.org/info/rfc2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney">
              <organization/>
            </author>
            <author fullname="S. Willens" initials="S." surname="Willens">
              <organization/>
            </author>
            <author fullname="A. Rubens" initials="A." surname="Rubens">
              <organization/>
            </author>
            <author fullname="W. Simpson" initials="W." surname="Simpson">
              <organization/>
            </author>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC6421" target="https://www.rfc-editor.org/info/rfc6421">
          <front>
            <title>Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS)</title>
            <author fullname="D. Nelson" initials="D." role="editor" surname="Nelson">
              <organization/>
            </author>
            <date month="November" year="2011"/>
            <abstract>
              <t>This memo describes the requirements for a crypto-agility solution for Remote Authentication Dial-In User Service (RADIUS).  This  document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6421"/>
          <seriesInfo name="DOI" value="10.17487/RFC6421"/>
        </reference>
        <reference anchor="RFC6929" target="https://www.rfc-editor.org/info/rfc6929">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS) Protocol Extensions</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <author fullname="A. Lior" initials="A." surname="Lior">
              <organization/>
            </author>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Service (RADIUS) protocol is nearing exhaustion of its current 8-bit Attribute Type space.  In addition, experience shows a growing need for complex grouping, along with attributes that can carry more than 253 octets of data.  This document defines changes to RADIUS that address all of the above problems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6929"/>
          <seriesInfo name="DOI" value="10.17487/RFC6929"/>
        </reference>
        <reference anchor="RFC7301" target="https://www.rfc-editor.org/info/rfc7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl">
              <organization/>
            </author>
            <author fullname="A. Popov" initials="A." surname="Popov">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="E. Stephan" initials="E." surname="Stephan">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC8044" target="https://www.rfc-editor.org/info/rfc8044">
          <front>
            <title>Data Types in RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>RADIUS specifications have used data types for two decades without defining them as managed entities.  During this time, RADIUS implementations have named the data types and have used them in attribute definitions.  This document updates the specifications to better follow established practice.  We do this by naming the data types defined in RFC 6158, which have been used since at least the publication of RFC 2865.  We provide an IANA registry for the data types and update the "RADIUS Attribute Types" registry to include a Data Type field for each attribute.  Finally, we recommend that authors of RADIUS specifications use these types in preference to existing practice.  This document updates RFCs 2865, 3162, 4072, 6158, 6572, and 7268.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8044"/>
          <seriesInfo name="DOI" value="10.17487/RFC8044"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC1321" target="https://www.rfc-editor.org/info/rfc1321">
          <front>
            <title>The MD5 Message-Digest Algorithm</title>
            <author fullname="R. Rivest" initials="R." surname="Rivest">
              <organization/>
            </author>
            <date month="April" year="1992"/>
            <abstract>
              <t>This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.  This memo provides information for the Internet community.  It does not specify an Internet standard.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1321"/>
          <seriesInfo name="DOI" value="10.17487/RFC1321"/>
        </reference>
        <reference anchor="RFC2548" target="https://www.rfc-editor.org/info/rfc2548">
          <front>
            <title>Microsoft Vendor-specific RADIUS Attributes</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn">
              <organization/>
            </author>
            <date month="March" year="1999"/>
            <abstract>
              <t>This document describes the set of Microsoft vendor-specific RADIUS attributes.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2548"/>
          <seriesInfo name="DOI" value="10.17487/RFC2548"/>
        </reference>
        <reference anchor="RFC2866" target="https://www.rfc-editor.org/info/rfc2866">
          <front>
            <title>RADIUS Accounting</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney">
              <organization/>
            </author>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying accounting information between a Network Access Server and a shared Accounting Server.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2866"/>
          <seriesInfo name="DOI" value="10.17487/RFC2866"/>
        </reference>
        <reference anchor="RFC2868" target="https://www.rfc-editor.org/info/rfc2868">
          <front>
            <title>RADIUS Attributes for Tunnel Protocol Support</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn">
              <organization/>
            </author>
            <author fullname="D. Leifer" initials="D." surname="Leifer">
              <organization/>
            </author>
            <author fullname="A. Rubens" initials="A." surname="Rubens">
              <organization/>
            </author>
            <author fullname="J. Shriver" initials="J." surname="Shriver">
              <organization/>
            </author>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege">
              <organization/>
            </author>
            <author fullname="I. Goyret" initials="I." surname="Goyret">
              <organization/>
            </author>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document defines a set of RADIUS (Remote Authentication Dial In User Service) attributes designed to support the provision of compulsory tunneling in dial-up networks.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2868"/>
          <seriesInfo name="DOI" value="10.17487/RFC2868"/>
        </reference>
        <reference anchor="RFC3579" target="https://www.rfc-editor.org/info/rfc3579">
          <front>
            <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun">
              <organization/>
            </author>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms.  In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes.  This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server.  While EAP was originally developed for use with PPP, it is now also in use with IEEE 802.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3579"/>
          <seriesInfo name="DOI" value="10.17487/RFC3579"/>
        </reference>
        <reference anchor="RFC5176" target="https://www.rfc-editor.org/info/rfc5176">
          <front>
            <title>Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="M. Chiba" initials="M." surname="Chiba">
              <organization/>
            </author>
            <author fullname="G. Dommety" initials="G." surname="Dommety">
              <organization/>
            </author>
            <author fullname="M. Eklund" initials="M." surname="Eklund">
              <organization/>
            </author>
            <author fullname="D. Mitton" initials="D." surname="Mitton">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a currently deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products.  This includes support for disconnecting users and changing authorizations applicable to a user session. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5176"/>
          <seriesInfo name="DOI" value="10.17487/RFC5176"/>
        </reference>
        <reference anchor="RFC6151" target="https://www.rfc-editor.org/info/rfc6151">
          <front>
            <title>Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms</title>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <author fullname="L. Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document updates the security considerations for the MD5 message digest algorithm.  It also updates the security considerations for HMAC-MD5.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6151"/>
          <seriesInfo name="DOI" value="10.17487/RFC6151"/>
        </reference>
        <reference anchor="RFC6218" target="https://www.rfc-editor.org/info/rfc6218">
          <front>
            <title>Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn">
              <organization/>
            </author>
            <author fullname="T. Zhang" initials="T." surname="Zhang">
              <organization/>
            </author>
            <author fullname="J. Walker" initials="J." surname="Walker">
              <organization/>
            </author>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines a set of vendor-specific RADIUS Attributes designed to allow both the secure transmission of cryptographic keying material and strong authentication of any RADIUS message. These attributes have been allocated from the Cisco vendor-specific space and have been implemented by multiple vendors.  This document  is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6218"/>
          <seriesInfo name="DOI" value="10.17487/RFC6218"/>
        </reference>
        <reference anchor="RFC6613" target="https://www.rfc-editor.org/info/rfc6613">
          <front>
            <title>RADIUS over TCP</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="May" year="2012"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Server (RADIUS) protocol has, until now, required the User Datagram Protocol (UDP) as the underlying transport layer.  This document defines RADIUS over the Transmission Control Protocol (RADIUS/TCP), in order to address handling issues related to RADIUS over Transport Layer Security (RADIUS/TLS).  It permits TCP to be used as a transport protocol for RADIUS only when a transport layer such as TLS or IPsec provides confidentiality and security.  This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6613"/>
          <seriesInfo name="DOI" value="10.17487/RFC6613"/>
        </reference>
        <reference anchor="RFC6614" target="https://www.rfc-editor.org/info/rfc6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter">
              <organization/>
            </author>
            <author fullname="M. McCauley" initials="M." surname="McCauley">
              <organization/>
            </author>
            <author fullname="S. Venaas" initials="S." surname="Venaas">
              <organization/>
            </author>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga">
              <organization/>
            </author>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="RFC7360" target="https://www.rfc-editor.org/info/rfc7360">
          <front>
            <title>Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="September" year="2014"/>
            <abstract>
              <t>The RADIUS protocol defined in RFC 2865 has limited support for authentication and encryption of RADIUS packets.  The protocol transports data in the clear, although some parts of the packets can have obfuscated content.  Packets may be replayed verbatim by an attacker, and client-server authentication is based on fixed shared secrets.  This document specifies how the Datagram Transport Layer Security (DTLS) protocol may be used as a fix for these problems.  It also describes how implementations of this proposal can coexist with current RADIUS systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7360"/>
          <seriesInfo name="DOI" value="10.17487/RFC7360"/>
        </reference>
        <reference anchor="RFC7930" target="https://www.rfc-editor.org/info/rfc7930">
          <front>
            <title>Larger Packets for RADIUS over TCP</title>
            <author fullname="S. Hartman" initials="S." surname="Hartman">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>The RADIUS-over-TLS experiment described in RFC 6614 has opened RADIUS to new use cases where the 4096-octet maximum size limit of a RADIUS packet proves problematic.  This specification extends the RADIUS-over-TCP experiment (RFC 6613) to permit larger RADIUS packets.  This specification compliments other ongoing work to permit fragmentation of RADIUS authorization information.  This document registers a new RADIUS code, an action that required IESG approval.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7930"/>
          <seriesInfo name="DOI" value="10.17487/RFC7930"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
