<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.6.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekok-radext-sradius-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="SRADIUS">Secure RADIUS</title>
    <seriesInfo name="Internet-Draft" value="draft-dekok-radext-sradius-00"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>FreeRADIUS</organization>
      <address>
        <email>aland@freeradius.org</email>
      </address>
    </author>
    <date year="2022" month="October" day="13"/>
    <area>Internet</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines Secure RADIUS (SRADIUS), which is a transport profile for RADIUS.  There are three changes from traditional RADIUS transport protocols.  First, TLS transport is required and insecure transports are forbidden.  Second, the shared secret is no longer used, and all MD5-based packet signing and attribute obfuscation methods are therefore no longer necessary.  Finally, the now unused Authenticator field is repurposed to contain an explict request / response identifier, called a Token.</t>
      <t>SRADIUS connections can transport all RADIUS attributes.  Implementation of SRADIUS requires only minor changes to packet encoder and decoder functionality.  Nothing else is changed from traditional RADIUS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekok-radext-sradius/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RADEXT Working Group mailing list (<eref target="mailto:radext@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/radext/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/sradius.git"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The RADIUS protocol <xref target="RFC2865"/> uses MD5 <xref target="RFC1321"/> to sign packets, and to obfuscate certain attributes.  As noted in <xref target="RFC6151"/>, MD5 is insecure and should no longer be used.  In addition, the dependency on MD5 makes it impossible to use RADIUS in a FIPS-140 compliant system.</t>
      <t>This document proposes Secure RADIUS (SRADIUS), which is a transport profile for RADIUS.  Systems which implement SRADIUS are therefore capable of being FIPS-140 compliant.</t>
      <t>The changes from traditional RADIUS transports are as follows:</t>
      <ul spacing="normal">
        <li>TLS or DTLS transport is required,</li>
        <li>TLS 1.3 or later is required,</li>
        <li>As the security of the protocol now depends on TLS, all uses of the shared secret have been removed,</li>
        <li>The now-unused Request and Response Authenticator field can be repurposed to carry an opaque Token which identifies requests and responses,</li>
        <li>The Message-Authenticator attribute (<xref target="RFC3579"/> Section 3.2) is not sent in any packet, and if received is ignored,</li>
        <li>Attributes such as User-Password, Tunnel-Password, and MS-MPPE keys are sent without the previous MD5-based obfuscation, as the contents are protected by TLS,</li>
        <li>All other attributes including CHAP, MS-CHAP, and MS-CHAPv2 can still be carried inside of SRADIUS.</li>
      </ul>
      <t>If a home server chooses to implement SRADIUS, it can also choose to also require full FIPS-140 compliance.  In which case the home server will not support CHAP or MS-CHAP.  However, it is still possible for a FIPS-140 compliant home server to accept authentication methods which depend on MD4 or MD5, so long as those methods are passed somehow to a secondary server which supports them.</t>
      <t>We note that the decision to support (or not) any authentication method is entirely site local, and is not a requirement of the SRADIUS transport.  As a transport profile for RADIUS, SRADIUS explicitly does not modify the content or meaning of any RADIUS attribute.</t>
      <t>We also note that any proxies which accept or originate SRADIUS connections are able to transport CHAP and MS-CHAP without issue.</t>
      <t>Unless otherwise described in this document, all RADIUS requirements apply to SRADIUS.  That is, SRADIUS is a transport profile for RADIUS.  It is not a new protocol, and it is not an extension to the RADIUS protocol.  SRADIUS does not change the RADIUS packet format, attribute format, etc.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <ul spacing="normal">
        <li>RADIUS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>The Remote Authentication Dial-In User Service protocol, as defined in <xref target="RFC2865"/>, <xref target="RFC2865"/>, and <xref target="RFC5176"/> among others.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/UDP</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the User Datagram Protocol as define above.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/TCP</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transmission Control Protocol <xref target="RFC6613"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/TLS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Layer Security protocol <xref target="RFC6614"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>RADIUS/DTLS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Datagram Transport Layer Security protocol  <xref target="RFC7360"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>SRADIUS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>The Secure RADIUS protocol ("S" RADIUS), as defined in this document.  We use SRADIUS interchangeable for TLS and for DTLS transport.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>TLS</li>
      </ul>
      <ul empty="true">
        <li>
          <t>the Transport Layer Security protocol.  Generally when we refer to TLS in this document, we are referring to TLS or DTLS transport.</t>
        </li>
      </ul>
    </section>
    <section anchor="the-sradius-transport-profile-for-radius">
      <name>The SRADIUS Transport profile for RADIUS</name>
      <t>SRADIUS is a transport profile for RADIUS.   In addition to defining the transport, we also discuss how the encoding of some attributes is changed when transported in SRADIUS.  Any field or attribute not mentioned here is unchanged from RADIUS.</t>
      <section anchor="transport">
        <name>Transport</name>
        <t>SRADIUS connections MUST use TLS <xref target="RFC6614"/> or DTLS <xref target="RFC7360"/> transport protocols.  The insecure UDP <xref target="RFC2865"/> and TCP <xref target="RFC6613"/> transport protocols MUST NOT be used.</t>
        <t>SRADIUS implementations MUST require TLS version 1.3 or later.  There is no reason to use any earlier version of TLS.</t>
        <t>SRADIUS implementations MUST support TLS-PSK.  The default profile is to have as few changes as possible from RADIUS.</t>
      </section>
      <section anchor="request-and-response-authenticator-fields">
        <name>Request and Response Authenticator fields</name>
        <t>The Request and Response Authenticator fields MUST NOT be calculated as described in any previous RADIUS specification.  Instead, those fields are not used to sign packets.  That 16-octet portion of the packet header is now repurposed as two logical subfields:</t>
        <ul spacing="normal">
          <li>8 octets of opaque Token used to match requests and responses,</li>
          <li>8 octets of Reserved.  These octets MUST be set to zero when sending any SRADIUS packet.  These octets MUST be ignored when receiving any SRADIUS packet.  These octets are reserved for future protocol extensions.</li>
        </ul>
        <t><tt>
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Token ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                                                |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Reserved
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                                                |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</tt></t>
        <t>The Token field MUST be different for every unique packet sent over a particular SRADIUS connection.  This unique value can be used to match responses to requests, and to identify duplicate requests.  Other than those two requirements, there is no special meaning for the Token field.</t>
        <section anchor="sending-packets">
          <name>Sending Packets</name>
          <t>The Token field MUST change for every new SRADIUS packet which is sent.  For DTLS transport, it is possible to retransmit duplicate packets, in which case the Token MUST NOT be changed when a duplicate packet is sent.</t>
          <t>The Token MUST be different for different packets on the same connection.</t>
          <t>It is RECOMMENDED that the Token field be a implemented as a 64-bit counter.  Such a counter SHOULD be initialized from a random number generator whenever a client reboots.  It is NOT RECOMMENDED to use the current time as the seed for the random number generator, or for the initial Token value unless that time is carried forward across reboots via a hardware clock.  Without a hardware clock, the systems value for the current time is likely to reset to a pre-set fixed value.</t>
          <t>The counter SHOULD be unique per connection, and SHOULD be initialized to a different value for each connection.  The counter may be globally unique to an implementation, but having a unique counter per connection is acceptable.</t>
        </section>
        <section anchor="recieving-packets">
          <name>Recieving Packets</name>
          <t>A system which recieves SRADIUS packets MUST perform packet deduplication for all situations where it is required by RADIUS.  Where RADIUS does not require deduplication (e.g. TLS transport), the SRADIUS system SHOULD NOT do deduplication.</t>
          <t>In normal RADIUS, the Identifier field can be the same for different types of packets on the same connection, e.g. for Access-Request and Accounting-Request.  This overlap leads to increased complexity for RADIUS clients and servers, as the Identifier field is not, in fact, a unique identifier.  Implementations of RADIUS therefore need do deduplication across multiple fields of the RADIUS packet header, which can be complex.</t>
          <t>For SRADIUS, implementations MUST do deduplication solely on the Token field on a per-connection basis.  This change from RADIUS simplifies implementations.  In addition, a unique 64-bit counter is more than sufficient to uniquely identify packets.</t>
          <t>This change from RADIUS means that the Identifier field is no longer useful.  It is RECOMMENDED that the Identifier field be set to zero for all SRADIUS packets.  In order to stay close to RADIUS, replies MUST use the same Identifier as was seen in the corresponding request.  There is no reason to make major changes to the RADIUS packet header.</t>
        </section>
      </section>
    </section>
    <section anchor="attribute-handling-in-sradius">
      <name>Attribute handling in SRADIUS</name>
      <t>Most attributes in RADIUS have no special encoding "on the wire", or any special meaning between client and server.  Unless discussed in this section, all RADIUS attributes are unchanged in SRADIUS.  This requirement includes attributes which contain a tag <xref target="RFC2868"/>.</t>
      <section anchor="obfuscated-attributes-such-as-user-password-and-tunnel-password">
        <name>Obfuscated attributes such as User-Password and Tunnel-Password</name>
        <t>Attributes which are obfuscated with MD5 no longer have the obfuscation step applied in SRADIUS.  Instead, there are simply encoded as their values, as with any other attribute.  Their encoding method MUST follow the encoding for the underlying data type, with any encryption / obfuscation step omitted.</t>
        <t>We note that there is often concern in RADIUS that passwords are sent "in cleartext" across the network.  This allegation was never true for RADIUS, and is still untrue for SRADIUS.  While passwords are encoded in packets as strings, the packets (and thus passwords) are protected by TLS.  The same TLS which protects passwords used for web logins, e-mail reception and sending, etc.  As a result, any claims that passwords are sent "in the clear" are false.</t>
        <t>The User-Password attribute (<xref target="RFC2865"/> Section 5.2) MUST be encoded the same as any other attribute of data type 'text' (<xref target="RFC8044"/> Section 3.4), e.g. User-Name (<xref target="RFC2865"/> Section 5.1).</t>
        <t>The Tunnel-Password attribute (<xref target="RFC2868"/> Section 3.5) MUST be encoded the same as any other attribute of data type 'text' which contains a tag, such as Tunnel-Client-Endpoint (<xref target="RFC2868"/> Section 3.3).  Since the attribute is no longer obfuscated, there is no need for a salt field or Data-Length fields as described in <xref target="RFC2868"/> Section 3,5, and the textual value can simply be encoded as-is.</t>
        <t>Any Vendor-Specific attribute which uses similar obfuscation MUST be encoded as per their base data type.  Specifically, the MS-MPPE-Send-Key and MS-MPPE-Recv-Key attributes (<xref target="RFC2548"/> Section 2.4) MUST be encoded as any other attribute of data type 'string' (<xref target="RFC8044"/> Section 3.5).</t>
      </section>
      <section anchor="message-authenticator">
        <name>Message-Authenticator</name>
        <t>The Message-Authenticator attribute (<xref target="RFC3579"/> Section 3.2) MUST NOT be sent over an SRADIUS connection.  It is no longer used or needed.</t>
        <t>If the Message-Authenticator attribute is received over an SRADIUS connection, the attribute MUST be silently discarded, or treated an as "invalid attribute", as defined in <xref target="RFC6929"/>, Section 2.8.  That is, the Message-Authenticator attribute is no longer used to sign packets.  Its existence (or not) is meaningless in SRADIUS.</t>
        <t>However, any packet which contains a Message-Authenticator attribute can still be processed.  There is no need to discard the entire packet when a Message-Authenticator attribute is received.</t>
        <section anchor="message-authentication-code">
          <name>Message-Authentication-Code</name>
          <t>Similarly, the Message-Authentication-Code attribute defined in <xref target="RFC6218"/> Section 3.3 MUST NOT be sent over an SRADIUS connection.  It MUST be treated the same was as Message-Authenticator, above.</t>
          <t>As the Message-Authentication-Code attribute is no longer used, the related MAC-Randomizer attribute <xref target="RFC6218"/> Section 3.2 is also no longer used.  It MUST be treated the same was as Message-Authenticator, above.</t>
        </section>
      </section>
      <section anchor="chap-ms-chap-etc">
        <name>CHAP, MS-CHAP, etc.</name>
        <t>While some attributes such as CHAP-Password, etc. depend on insecure cryptographic primitives such as MD5, these attributes are treated as opaque blobs when sent between a RADIUS client and server.  The attributes are not obfuscated, and they do not depend on the shared secret.</t>
        <t>As a result, these attributes are unaffected by SRADIUS.  We reiterate that SRADIUS is a transport profile for RADIUS.  Other than Message-Authenticator, the meaning of all attributes in SRADIUS is identical to their meaning in RADIUS.  Only the "on the wire" encoding of some attributes change, and then only for attributes which are obfuscated using the shared secret.  Those obfuscated attributes are now protected by the modern cryptography in TLS, instead of an "ad hoc" approach using MD5.</t>
        <t>An SRADIUS server can proxy CHAP, MS-CHAP, etc. without any issue.  An SRADIUS home server can authenticate CHAP, MS-CHAP, etc. without any issue.</t>
      </section>
    </section>
    <section anchor="proxies">
      <name>Proxies</name>
      <t>We reiterate that SRADIUS is a transport profile for RADIUS.  A RADIUS proxy normally decodes, and then re-encodes attributes, included obfuscated ones.  A RADIUS proxy will not generally rewrite the content of the attributes it proxies.  While some attributes may be modified due to administrative / policy rules on the proxy, the proxy will generally not rewrite the contents of User-Password, CHAP-Password, MS-CHAP-Password, MS-MPPE keys, etc.</t>
      <t>The same requirement applies to a proxy which uses SRADIUS.  The proxy may receive RADIUS or SRADIUS, and it may send RADIUS or SRADIUS, in any combination.  As a result, SRADIUS is fully compatible with all past, present, and future RADIUS attributes.</t>
    </section>
    <section anchor="crypto-agility">
      <name>Crypto-Agility</name>
      <t>The crypto-agility requirements of <xref target="RFC6421"/> are addressed in <xref target="RFC6614"/> Appendix C, and in Section 10.1 of <xref target="RFC7360"/>.  SRADIUS makes no changes from, or additions to, those specifications.</t>
      <t>This document adds the requirement that any new RADIUS or SRADIUS specification MUST NOT introduce new cryptographic primitives as was done with User-Password and Tunnel-Password.  There is insufficient expertise in the RADIUS community to securely design new cryptography.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>SRADIUS is implemented in a branch of FreeRADIUS which is hosted on GitHub.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>SRADIUS requires secure transport for RADIUS, and this has all of the privacy benefits of RADIUS/TLS <xref target="RFC6614"/> and RADIUS/DTLS <xref target="RFC7360"/>.  All of the insecure uses of RADIUS bave been removed.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The primary focus of this document is addressing security considerations for RADIUS.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is request to allocate two new ports:</t>
      <t>SRADIUS/UDP - TBD</t>
      <t>SRADIUS/TCP - TBD</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>In hindsight, the decision to retain MD5 for RADIUS/TLS was likely wrong.  It was an easy decision in the short term, but it has caused ongoing problems which this document addresses.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BCP14" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2865" target="https://www.rfc-editor.org/info/rfc2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney">
              <organization/>
            </author>
            <author fullname="S. Willens" initials="S." surname="Willens">
              <organization/>
            </author>
            <author fullname="A. Rubens" initials="A." surname="Rubens">
              <organization/>
            </author>
            <author fullname="W. Simpson" initials="W." surname="Simpson">
              <organization/>
            </author>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC6421" target="https://www.rfc-editor.org/info/rfc6421">
          <front>
            <title>Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS)</title>
            <author fullname="D. Nelson" initials="D." role="editor" surname="Nelson">
              <organization/>
            </author>
            <date month="November" year="2011"/>
            <abstract>
              <t>This memo describes the requirements for a crypto-agility solution for Remote Authentication Dial-In User Service (RADIUS).  This  document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6421"/>
          <seriesInfo name="DOI" value="10.17487/RFC6421"/>
        </reference>
        <reference anchor="RFC6929" target="https://www.rfc-editor.org/info/rfc6929">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS) Protocol Extensions</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <author fullname="A. Lior" initials="A." surname="Lior">
              <organization/>
            </author>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Service (RADIUS) protocol is nearing exhaustion of its current 8-bit Attribute Type space.  In addition, experience shows a growing need for complex grouping, along with attributes that can carry more than 253 octets of data.  This document defines changes to RADIUS that address all of the above problems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6929"/>
          <seriesInfo name="DOI" value="10.17487/RFC6929"/>
        </reference>
        <reference anchor="RFC8044" target="https://www.rfc-editor.org/info/rfc8044">
          <front>
            <title>Data Types in RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>RADIUS specifications have used data types for two decades without defining them as managed entities.  During this time, RADIUS implementations have named the data types and have used them in attribute definitions.  This document updates the specifications to better follow established practice.  We do this by naming the data types defined in RFC 6158, which have been used since at least the publication of RFC 2865.  We provide an IANA registry for the data types and update the "RADIUS Attribute Types" registry to include a Data Type field for each attribute.  Finally, we recommend that authors of RADIUS specifications use these types in preference to existing practice.  This document updates RFCs 2865, 3162, 4072, 6158, 6572, and 7268.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8044"/>
          <seriesInfo name="DOI" value="10.17487/RFC8044"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC1321" target="https://www.rfc-editor.org/info/rfc1321">
          <front>
            <title>The MD5 Message-Digest Algorithm</title>
            <author fullname="R. Rivest" initials="R." surname="Rivest">
              <organization/>
            </author>
            <date month="April" year="1992"/>
            <abstract>
              <t>This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.  This memo provides information for the Internet community.  It does not specify an Internet standard.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1321"/>
          <seriesInfo name="DOI" value="10.17487/RFC1321"/>
        </reference>
        <reference anchor="RFC2548" target="https://www.rfc-editor.org/info/rfc2548">
          <front>
            <title>Microsoft Vendor-specific RADIUS Attributes</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn">
              <organization/>
            </author>
            <date month="March" year="1999"/>
            <abstract>
              <t>This document describes the set of Microsoft vendor-specific RADIUS attributes.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2548"/>
          <seriesInfo name="DOI" value="10.17487/RFC2548"/>
        </reference>
        <reference anchor="RFC2868" target="https://www.rfc-editor.org/info/rfc2868">
          <front>
            <title>RADIUS Attributes for Tunnel Protocol Support</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn">
              <organization/>
            </author>
            <author fullname="D. Leifer" initials="D." surname="Leifer">
              <organization/>
            </author>
            <author fullname="A. Rubens" initials="A." surname="Rubens">
              <organization/>
            </author>
            <author fullname="J. Shriver" initials="J." surname="Shriver">
              <organization/>
            </author>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege">
              <organization/>
            </author>
            <author fullname="I. Goyret" initials="I." surname="Goyret">
              <organization/>
            </author>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document defines a set of RADIUS (Remote Authentication Dial In User Service) attributes designed to support the provision of compulsory tunneling in dial-up networks.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2868"/>
          <seriesInfo name="DOI" value="10.17487/RFC2868"/>
        </reference>
        <reference anchor="RFC3579" target="https://www.rfc-editor.org/info/rfc3579">
          <front>
            <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun">
              <organization/>
            </author>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms.  In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes.  This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server.  While EAP was originally developed for use with PPP, it is now also in use with IEEE 802.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3579"/>
          <seriesInfo name="DOI" value="10.17487/RFC3579"/>
        </reference>
        <reference anchor="RFC5176" target="https://www.rfc-editor.org/info/rfc5176">
          <front>
            <title>Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="M. Chiba" initials="M." surname="Chiba">
              <organization/>
            </author>
            <author fullname="G. Dommety" initials="G." surname="Dommety">
              <organization/>
            </author>
            <author fullname="M. Eklund" initials="M." surname="Eklund">
              <organization/>
            </author>
            <author fullname="D. Mitton" initials="D." surname="Mitton">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a currently deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products.  This includes support for disconnecting users and changing authorizations applicable to a user session. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5176"/>
          <seriesInfo name="DOI" value="10.17487/RFC5176"/>
        </reference>
        <reference anchor="RFC6151" target="https://www.rfc-editor.org/info/rfc6151">
          <front>
            <title>Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms</title>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <author fullname="L. Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document updates the security considerations for the MD5 message digest algorithm.  It also updates the security considerations for HMAC-MD5.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6151"/>
          <seriesInfo name="DOI" value="10.17487/RFC6151"/>
        </reference>
        <reference anchor="RFC6218" target="https://www.rfc-editor.org/info/rfc6218">
          <front>
            <title>Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn">
              <organization/>
            </author>
            <author fullname="T. Zhang" initials="T." surname="Zhang">
              <organization/>
            </author>
            <author fullname="J. Walker" initials="J." surname="Walker">
              <organization/>
            </author>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines a set of vendor-specific RADIUS Attributes designed to allow both the secure transmission of cryptographic keying material and strong authentication of any RADIUS message. These attributes have been allocated from the Cisco vendor-specific space and have been implemented by multiple vendors.  This document  is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6218"/>
          <seriesInfo name="DOI" value="10.17487/RFC6218"/>
        </reference>
        <reference anchor="RFC6613" target="https://www.rfc-editor.org/info/rfc6613">
          <front>
            <title>RADIUS over TCP</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="May" year="2012"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Server (RADIUS) protocol has, until now, required the User Datagram Protocol (UDP) as the underlying transport layer.  This document defines RADIUS over the Transmission Control Protocol (RADIUS/TCP), in order to address handling issues related to RADIUS over Transport Layer Security (RADIUS/TLS).  It permits TCP to be used as a transport protocol for RADIUS only when a transport layer such as TLS or IPsec provides confidentiality and security.  This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6613"/>
          <seriesInfo name="DOI" value="10.17487/RFC6613"/>
        </reference>
        <reference anchor="RFC6614" target="https://www.rfc-editor.org/info/rfc6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter">
              <organization/>
            </author>
            <author fullname="M. McCauley" initials="M." surname="McCauley">
              <organization/>
            </author>
            <author fullname="S. Venaas" initials="S." surname="Venaas">
              <organization/>
            </author>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga">
              <organization/>
            </author>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="RFC7360" target="https://www.rfc-editor.org/info/rfc7360">
          <front>
            <title>Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="September" year="2014"/>
            <abstract>
              <t>The RADIUS protocol defined in RFC 2865 has limited support for authentication and encryption of RADIUS packets.  The protocol transports data in the clear, although some parts of the packets can have obfuscated content.  Packets may be replayed verbatim by an attacker, and client-server authentication is based on fixed shared secrets.  This document specifies how the Datagram Transport Layer Security (DTLS) protocol may be used as a fix for these problems.  It also describes how implementations of this proposal can coexist with current RADIUS systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7360"/>
          <seriesInfo name="DOI" value="10.17487/RFC7360"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
