<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.6.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dekok-radext-tls-psk-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="RADIUS and TLS-PSK">RADIUS and TLS-PSK</title>
    <seriesInfo name="Internet-Draft" value="draft-dekok-radext-tls-psk-00"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>FreeRADIUS</organization>
      <address>
        <email>aland@freeradius.org</email>
      </address>
    </author>
    <date year="2023" month="March" day="03"/>
    <area>Internet</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document gives implementation and operational considerations for using TLS-PSK with RADIUS/TLS (RFC6614) and RADIUS/DTLS (RFC7360).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dekok-radext-tls-psk/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RADEXT Working Group mailing list (<eref target="mailto:radext@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/radext/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/radext-tls-psk.git"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC6614"/> and <xref target="RFC7360"/> define TLS and DTLS transports for RADIUS <xref target="RFC2865"/>.  However, neither of those documents discuss how to use TLS-PSK.  This document gives implementation and operational considerations for using TLS-PSK with RADIUS.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>TBD</t>
    </section>
    <section anchor="history">
      <name>History</name>
      <t>Certificates are hard to manage, but there is no guidance in <xref target="RFC6614"/> and <xref target="RFC7360"/> for using TLS-PSK.</t>
    </section>
    <section anchor="guidance-for-radius-clients">
      <name>Guidance for RADIUS clients</name>
      <t>TLS uses certificates in most common uses.  However, we recognize that it may be difficult to fully upgrade client implementations to allow for certificates to be used with RADIUS/TLS and RADIUS/DTLS.  Client implementations therefore MUST allow the use of a pre-shared key (TLS-PSK).  The client implementation can then expose a flag "TLS yes / no", and then a shared secret (now PSK) entry field.</t>
      <t>Any shared secret used for RADIUS/UDP or RADIUS/TLS <xref target="RFC6613"/> MUST NOT be used for TLS-PSK.</t>
      <t>Implementations MUST support PSKs of at least 32 octets, and SHOULD support PSKs of 64 octets.  Implementations MUST require that PSKs be at least 16 octets in length.  That is, short PSKs MUST NOT be permitted to be used.</t>
      <t>Administrators SHOULD use PSKs of at least 24 octets, generated using a source of secure random numbers.  The script given above can again be used.</t>
      <t>We also incorporate by reference the requirements of Section 10.2 of <xref target="RFC7360"/> when using PSKs.</t>
      <t>The issue of using PSKs in multiple TLS versions is discussed in <xref target="RFC8446"/> Section E.7, which notes:</t>
      <t><tt>
Implementations can ensure safety from cross-protocol related output by not reusing PSKs between TLS 1.3 and TLS 1.2.
</tt></t>
      <t>It would be unnecessarily complex for management interfaces and administrators to manage multiple PSKs depending on the TLS version.  Therefore, we mandate that when TLS-PSK is used, TLS 1.3 or later MUST be used in RADIUS/TLS and RADIUS/DTLS.</t>
      <t>Implementations MUST use ECDH cipher suites:</t>
      <ul spacing="normal">
        <li>TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256</li>
        <li>TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256</li>
        <li>TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384</li>
        <li>TBD: other TLS ECDH PSK suites</li>
      </ul>
      <section anchor="psk-identities">
        <name>PSK Identities</name>
        <t><xref target="RFC6614"/> is silent on the subject of PSK identities, which is an issue that we correct here.  Guidance is required on the use of PSK identities, as the need to manage identities associated with PSK is a new requirement for NAS management interfaces, and is a new requirement for RADIUS servers.</t>
        <t>RADIUS systems implementing TLS-PSK MUST support identities as per <xref target="RFC4279"/> Section 5.3, and MUST enable configuring TLS-PSK identities in management interfaces as per <xref target="RFC4279"/> Section 5.4.</t>
        <t>A RADIUS client implementing TLS-PSK MUST update their management interfaces and application programming interfaces (APIs) to label the PSK field as "PSK" or "TLS-PKS, and MUST NOT label the PSK field as "shared secret".</t>
        <t>Where dynamic server lookups <xref target="RFC7585"/> are not used, RADIUS clients MUST still permit the configuration of a RADIUS server IP address.</t>
      </section>
    </section>
    <section anchor="guidance-for-radius-servers">
      <name>Guidance for RADIUS Servers</name>
      <t>The following section(s) describe guidance for RADIUS server implementationas and deployments.</t>
      <section anchor="identifying-and-filtering-clients">
        <name>Identifying and filtering clients</name>
        <t>When a RADIUS server implements TLS-PSK, it MUST use the PSK identity as the logical identifier for a RADIUS client instead of the IP address, as was done with RADIUS/UDP.  That is, instead of associating a source IP address with a shared secret, the RADIUS server instead associates a PSK identity with a pre-shared key.  In effect, the PSK identity replaces the source IP address of the connection as the client identifier.</t>
        <t>This requirement does not prevent the server from using source IP addresses for filtering or client identification.  Instead, it says that servers are no longer required to use solely the source IP address for client identification and filtering.</t>
        <t>RADIUS servers MUST be able to look up PSK identity in a subsystem which then returns the actual PSK.</t>
        <t>RADIUS servers MUST support IP address and network filtering of the source IP address for all TLS connections.  There is rarely a reason for a RADIUS server to allow connections from the entire Internet, and there are many reasons to limit permitted connections to a small list of networks.</t>
        <t>RADIUS servers SHOULD be able to limit certain PSK identifiers to certain network ranges or IP addresses.  This filtering can catch configuration errors.  That is, if a NAS is known to have a dynamic IP address within a particular subnet, the server should limit use of the NASes PSK to that subnet.</t>
        <t>Note that as some clients may have dynamic IP addresses, it is possible for a one PSK identity to appear at different source IP addresses over time.  In addition, as there may be many clients behind one NAT gateway, there may be multiple RADIUS clients using one public IP address.  RADIUS servers MUST support multiple PSKs at one source IP address, and MUST support a unique PSK identity for each unique client which is deployed in such a scenario.</t>
        <t>RADIUS servers SHOULD tie PSK identities to a particular permitted IP address or permitted network, as doing so will lower the risk if a PSK is leaked.  RADIUS servers MUST permit multiple clients to share one permitted IP address or network.</t>
        <t>A RADIUS server which accepts TLS-PSK MUST support a unique PSK identifier per RADIUS client.  There is no reason to use the same identifier for multiple clients.  A RADIUS server which accepts TLS-PSK MUST have a unique PSK per RADIUS client.</t>
      </section>
    </section>
    <section anchor="shared-secrets">
      <name>Shared Secrets</name>
      <t>Any shared secret used for RADIUS/UDP or RADIUS/TLS MUST NOT be used for TLS-PSK.</t>
      <t>It is RECOMMENDED that RADIUS clients and server track all used shared secrets and PSKs, and then verify that the following requirements all hold true:</t>
      <ul spacing="normal">
        <li>no shared secret is used for more than one RADIUS client</li>
        <li>no PSK is used for more than one RADIUS cleint</li>
        <li>no shared secret is used as a PSK</li>
        <li>no PSK is used as a shared secret</li>
      </ul>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>We make no changes over <xref target="RFC6614"/> and <xref target="RFC7360"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The primary focus of this document is addressing security considerations for RADIUS.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations in this document.</t>
      <t>RFC Editor: This section may be removed before final publication.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BCP14" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2865" target="https://www.rfc-editor.org/info/rfc2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney">
              <organization/>
            </author>
            <author fullname="S. Willens" initials="S." surname="Willens">
              <organization/>
            </author>
            <author fullname="A. Rubens" initials="A." surname="Rubens">
              <organization/>
            </author>
            <author fullname="W. Simpson" initials="W." surname="Simpson">
              <organization/>
            </author>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC4279" target="https://www.rfc-editor.org/info/rfc4279">
          <front>
            <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs).  These pre-shared keys are symmetric keys, shared in advance among the communicating parties.  The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4279"/>
          <seriesInfo name="DOI" value="10.17487/RFC4279"/>
        </reference>
        <reference anchor="RFC7585" target="https://www.rfc-editor.org/info/rfc7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter">
              <organization/>
            </author>
            <author fullname="M. McCauley" initials="M." surname="McCauley">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm.  It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6613" target="https://www.rfc-editor.org/info/rfc6613">
          <front>
            <title>RADIUS over TCP</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="May" year="2012"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Server (RADIUS) protocol has, until now, required the User Datagram Protocol (UDP) as the underlying transport layer.  This document defines RADIUS over the Transmission Control Protocol (RADIUS/TCP), in order to address handling issues related to RADIUS over Transport Layer Security (RADIUS/TLS).  It permits TCP to be used as a transport protocol for RADIUS only when a transport layer such as TLS or IPsec provides confidentiality and security.  This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6613"/>
          <seriesInfo name="DOI" value="10.17487/RFC6613"/>
        </reference>
        <reference anchor="RFC6614" target="https://www.rfc-editor.org/info/rfc6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter">
              <organization/>
            </author>
            <author fullname="M. McCauley" initials="M." surname="McCauley">
              <organization/>
            </author>
            <author fullname="S. Venaas" initials="S." surname="Venaas">
              <organization/>
            </author>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga">
              <organization/>
            </author>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="RFC7360" target="https://www.rfc-editor.org/info/rfc7360">
          <front>
            <title>Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok">
              <organization/>
            </author>
            <date month="September" year="2014"/>
            <abstract>
              <t>The RADIUS protocol defined in RFC 2865 has limited support for authentication and encryption of RADIUS packets.  The protocol transports data in the clear, although some parts of the packets can have obfuscated content.  Packets may be replayed verbatim by an attacker, and client-server authentication is based on fixed shared secrets.  This document specifies how the Datagram Transport Layer Security (DTLS) protocol may be used as a fix for these problems.  It also describes how implementations of this proposal can coexist with current RADIUS systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7360"/>
          <seriesInfo name="DOI" value="10.17487/RFC7360"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
