<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-radext-deprecating-radius-06" category="std" consensus="true" submissionType="IETF" updates="2865, 2866, 5176, 7585" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Deprecating Insecure RADIUS">Deprecating Insecure Practices in RADIUS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-radext-deprecating-radius-06"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>InkBridge Networks</organization>
      <address>
        <email>aland@inkbridgenetworks.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="25"/>
    <area>Internet</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 161?>

<t>RADIUS crypto-agility was first mandated as future work by RFC 6421.  The outcome of that work was the publication of RADIUS over TLS (RFC 6614) and RADIUS over DTLS (RFC 7360) as experimental documents.  Those transport protocols have been in wide-spread use for many years in a wide range of networks.  They have proven their utility as replacements for the previous UDP (RFC 2865) and TCP (RFC 6613) transports.  With that knowledge, the continued use of insecure transports for RADIUS has serious and negative implications for privacy and security.</t>
      <t>The recent publication of the "BlastRADIUS" exploit has also shown that RADIUS security needs to be updated.  It is no longer acceptable for RADIUS to rely on MD5 for security.  It is no longer acceptable to send device or location information in clear text across the wider Internet.  This document therefore deprecates many insecure practices in RADIUS, and mandates support for secure TLS-based transport layers.  We also discuss related security issues with RADIUS, and give recommendations for practices which increase both security and privacy.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RADEXT Working Group mailing list (<eref target="mailto:radext@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/radext/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/radext/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/deprecating-radius.git"/>.</t>
    </note>
  </front>
  <middle>
    <?line 167?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The RADIUS protocol <xref target="RFC2865"/> was first standardized in 1997, though its roots go back much earlier to 1993.  The protocol uses MD5 <xref target="RFC1321"/> to authenticate some packets types, and to obfuscate certain attributes such as User-Password.  As originally designed, Access-Request packets were entirely unauthenticated, and could be trivially spoofed (<xref section="7.1" sectionFormat="comma" target="RFC2869"/> and <xref section="4.3.2" sectionFormat="comma" target="RFC3579"/>).</t>
      <t>The insecurity of MD5 has been known for a long time.  It was first noted in relation to RADIUS in 1996 on the IETF RADIUS working group mailing list <xref target="MD5-1996"/>, which also discussed using an HMAC construct to increase security.  While it was common knowledge at the time, the earliest record of concerns about Access-Request packets spoofing was on the RADIUS working group mailing list <xref target="DATTACK"/> in 1998.  There was substantial further discussions about the lack of integrity checks on the list over the next few years.  The outcome of that process was the definition of Message-Authenticator as an optional HMAC-based attribute in <xref section="5.14" sectionFormat="comma" target="RFC2869"/>.</t>
      <t>Unfortunately, the use of Message-Authenticator was made optional.  This lack of integrity checks for Access-Request packets was deemed acceptable for some situations in <xref section="7.1" sectionFormat="comma" target="RFC2869"/>:</t>
      <ul empty="true">
        <li>
          <t>Access-Request packets with a User-Password establish the identity of
both the user and the NAS sending the Access-Request, because of the
way the shared secret between NAS and RADIUS server is used.</t>
        </li>
      </ul>
      <t>That conclusion now appears to be incorrect.  The text continues with an acknowledgment that:</t>
      <ul empty="true">
        <li>
          <t>Access-Request packets with CHAP-Password or EAP-Message do not have
a User-Password attribute, so the Message-Authenticator attribute
should be used in access-request packets that do not have a User-
Password, in order to establish the identity of the NAS sending the
request.</t>
        </li>
      </ul>
      <t>This text was non-normative due to the lowercase 'should'.  It appears that no implementation followed even this limited suggestion.</t>
      <t>The packet forgery issue was further discussed in 2004 in <xref section="4" sectionFormat="comma" target="RFC3579"/>, and again in 2007 in <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/>.  That document suggested that implementations require the use of Message-Authenticator in order to prevent forgery:</t>
      <ul empty="true">
        <li>
          <t>However, Access-Request packets not containing a Message-
Authenticator attribute ...  may
be trivially forged.  To avoid this issue, server implementations may
be configured to require the presence of a Message-Authenticator
attribute in Access-Request packets.  Requests not containing a
Message-Authenticator attribute MAY then be silently discarded.</t>
        </li>
      </ul>
      <t>To our knowledge, only one RADIUS server implemented even this limited suggestion.  At the time of publication of <xref target="RFC5080"/>, there was no consensus to require the use of Message-Authenticator in all Access-Request packets.  If this recommendation had instead been made mandatory, then the recent BlastRADIUS attack <xref target="BLAST"/> would largely have been prevented.</t>
      <t>The state of MD5 security was again discussed in <xref target="RFC6151"/>, which states in Section 2:</t>
      <ul empty="true">
        <li>
          <t>MD5 is no longer acceptable where collision resistance is required such as digital signatures.</t>
        </li>
      </ul>
      <t>That statement led to RADIUS security being reviewed in <xref section="3" sectionFormat="comma" target="RFC6421"/>.  The outcome of that review was the text in the remainder of <xref target="RFC6421"/>, which created crypto-agility requirements for RADIUS.  The main outcome of those requirements was not any change to RADIUS, but instead the definition of RADIUS/TLS in <xref target="RFC6614"/>, and RADIUS/DTLS in <xref target="RFC7360"/>.  The other outcome was a consensus that adding crypto-agility to RADIUS was likely not a good idea, and that standardizing RADIUS over TLS instead was a significantly better path forward.</t>
      <t>While the RADIUS/TLS work is ongoing at the time of this writing, there are still a large number of sites using RADIUS/UDP.  Those sites need to be supported and secured until they can migrate to TLS, while at the same time maintaining backwards compatibility.</t>
      <t>To summarize, <xref target="RFC6151"/> is over a decade old as of the time of this writing.  <xref target="RFC5080"/> is almost two decades old.  The knowledge that Access-Request packets lack integrity checks is almost three decades old.  Over that entire span of time, there has been no mandate to increase the security of Access-Request packets. This document provides that mandate.</t>
      <t>It is no longer acceptable for RADIUS to rely on MD5 for security.  It is no longer acceptable to send device or location information in clear text across the wider Internet.  This document therefore deprecates all insecure uses of RADIUS, and mandates the use of secure TLS-based transport layers.  We also discuss related security issues with RADIUS, and give many recommendations for practices which increase security and privacy.</t>
      <section anchor="radius-over-the-internet">
        <name>RADIUS over the Internet</name>
        <t>As the insecurity of MD5 has been well known for decades, RADIUS traffic over the Internet was historically secured with IPsec as described in <xref section="4.2" sectionFormat="comma" target="RFC3579"/>:</t>
        <ul empty="true">
          <li>
            <t>To address the security vulnerabilities of RADIUS/EAP,
implementations of this specification SHOULD support IPsec
(RFC2401) along with IKE (RFC2409) for key management.  IPsec ESP
(RFC2406) with non-null transform SHOULD be supported, and IPsec
ESP with a non-null encryption transform and authentication
support SHOULD be used to provide per-packet confidentiality,
authentication, integrity and replay protection.  IKE SHOULD be
used for key management.</t>
          </li>
        </ul>
        <t>The use of IPsec allowed RADIUS to be sent privately, and securely, across the Internet.  However, experience showed that TLS was in many ways simpler for implementations and deployment than IPsec.  While IPsec required operating system support, TLS was an application-space library.  This difference, coupled with the wide-spread adoption of TLS for HTTPS, ensures that it was often easier for applications to use TLS than IPsec.</t>
        <t>RADIUS/TLS <xref target="RFC6614"/> and RADIUS/DTLS <xref target="RFC7360"/> were then defined in order to meet the crypto-agility requirements of <xref target="RFC6421"/>.  RADIUS/TLS has been in wide-spread use for about a decade, including eduroam <xref target="EDUROAM"/> <xref target="RFC7593"/>, and more recently OpenRoaming <xref target="OPENROAMING"/> and <xref target="I-D.tomas-openroaming"/>.  RADIUS/DTLS has seen less use across the public Internet, but it still has multiple implementations.</t>
        <t>However, RADIUS/UDP is still widely used, even though it depends on MD5 and "ad hoc" constructions for security.  The recent "BlastRADIUS" attack shows just how inadequate this dependency is.  The BlastRADIUS attack is discussed in more detail below, in <xref target="blastradius"/>.</t>
        <t>Even if we ignore the BlastRADIUS attack, problems with MD5 mean that a hobbyist attacker who can view RADIUS/UDP traffic can brute-force test all possible RADIUS shared secrets of eight characters in not much more than an hour.  An more resourceful attacker (e.g. a nation-state) can check all much longer shared secrets with only modest expenditures.  See <xref target="cracking"/> below for a longer discussion of this topic.</t>
        <t>Determining the shared secret will also result in compromise of all passwords carried in the User-Password attribute.  Even using CHAP-Password offers minimal protection, as the cost of cracking the underlying password is similar to the cost of cracking the shared secret.  MS-CHAP (<xref target="RFC2433"/> and MS-CHAPv2 <xref target="RFC2759"/>) are significantly worse in security than PAP, as they can be completely broken with minimal resources, which <xref target="ms-chap"/> describes in more detail.</t>
        <t>The use of Message-Authenticator does not change the cost of attacking the shared secret.  The Message-Authenticator attribute is a later addition to RADIUS, and does does not replace the original MD5-based packet signatures.  While that attribute therefore offers a stronger protection, it does not change the cost of attacking the shared secret.  Moving to a stronger packet signatures (e.g. <xref target="RFC6218"/>) would still not fully address the issues with RADIUS, as the protocol still has privacy issues unrelated to the the security of packet authenticators.</t>
        <t>That is, most attributes in RADIUS are sent in clear-text, and only a few attributes such as User-Password and Tunnel-Password have their contents hidden.  Even the hidden attributes rely on "ad hoc" obfuscation methods using MD5, which have not been successfully attacked, but are not proven to be secure.  Peoples locations can (and has) been accurately determined, and people have been tracked using location data sent insecurely across the Internet (<xref target="privacy"/>).</t>
        <t>The implications for security and individual safety are large, and negative.</t>
        <t>These issues are only partly mitigated when the data carried within RADIUS use their own methods for increased security and privacy.  For example, some authentication methods such EAP-TLS, EAP-TTLS, etc. allow for User-Name privacy and for more secure transport of passwords via the use of TLS.  Some privacy can be gained through MAC address randomization, which can also limit device information identification to a particular manufacturer, instead of to a unique device.</t>
        <t>However, these methods are not always used, or are not always available.  Even if these methods were used ubiquitously, they do not protect all of the information which is publicly available over RADIUS/UDP or RADIUS/TCP transports.  And even when TLS-based EAP methods are used, implementations have historically often skipped certificate validation, leading to password compromise (<xref target="SPOOFING"/>).  In many cases, users were not even aware that the server certificate was incorrect or spoofed, which meant that there was no way for the user to detect that anything was wrong.  Their passwords were simply handed to a spoofed server, with little possibility for the user to take any action to stop it.</t>
      </section>
      <section anchor="simply-using-ipsec-or-tls-is-not-enough">
        <name>Simply using IPsec or TLS is not enough</name>
        <t>The use of a secure transport such as IPsec or TLS ensures complete privacy and security for all RADIUS traffic.  An observer of encrypted traffic is limited to knowing rough activity levels of a client or server.  That is, an observer can tell if there are a few users on a NAS, or many users on a NAS.  All other information is hidden from all observers.  Even with those limitations, it is not enough to say "use IPsec" and then move on to other issues.  There are many issues which can only be addressed via an informed approach.</t>
        <t>For example, it is possible for an attacker to record the session traffic, and later crack the TLS session key or IPsec parameters.  This attack could comprise all traffic sent over that connection, including EAP session keys.  If the cryptographic methods provide forward secrecy (<xref section="6.3" sectionFormat="comma" target="RFC7525"/>), then breaking one session provides no information about other sessions.  As such, it is RECOMMENDED that all cryptographic methods used to secure RADIUS conversations provide forward secrecy.  While forward secrecy will not protect individual sessions from attack, it will prevent attack on one session from being leveraged to attack other, unrelated, sessions.</t>
        <t>AAA servers SHOULD minimize the impact of such attacks by using a total throughput or time based limit before replacing the session keys.  The session keys can be replaced though a process of either re-keying the existing connection, or by opening a new connection and deprecating the use of the original connection.  Note that if the original connection if closed before a new connection is open, it can cause spurious errors in a proxy environment.</t>
        <t>The final attack possible in a AAA system is where one party in a AAA conversation is compromised or run by a malicious party.  This attack is made more likely by the extensive use of RADIUS proxy forwarding chains.  In that situation, every RADIUS proxy has full visibility into, and control over, the traffic it transports.  The solution here is to minimize the number of proxies involved, such as by using Dynamic Peer Discovery, as defined in <xref target="RFC7585"/>.</t>
        <t>There are many security issues in addition to simply adding a secure transport. The rest of this document addresses those issues in detail.</t>
      </section>
      <section anchor="overview">
        <name>Overview</name>
        <t>The rest of this document begins a summary of issues with RADIUS, including showing just how trivial it is to crack RADIUS/UDP security.  We then mandate the use of secure transport, and describe what that requirement means in practice.  We give recommendations on how current systems can be migrated to using TLS.  We give suggestions for increasing the security of existing RADIUS transports, including a discussion of the authentication protocols carried within RADIUS.  We conclude with security and privacy considerations.</t>
        <t>As IPsec has been discussed previously in the context of RADIUS, we do not discuss it more here, except to say it is an acceptable solution for securing RADIUS traffic.  As the bulk of the current efforts are focused on TLS, this document likewise focuses on TLS.  We note that all of the issues raised here about the RADIUS protocol also apply to IPsec transport.  That is, when the application is not in charge of protocol security, the application is vulnerable to transport misconfigurations or attacks.</t>
        <section anchor="a-comment-on-specifications">
          <name>A Comment on Specifications</name>
          <t>While this document tries to be comprehensive, it is necessarily imperfect.  There may be issues which should have been included here, but which were missed due to oversight or accident.  Any reader should be aware that there are good practices which are perhaps not documented in a specification, and bad behaviors which are likewise not forbidden.  For example, documents such as <xref target="RFC5080"/> were written to both correct errors in earlier documents, and to address harmful behaviors which had been seen in practice.</t>
          <t>These harmful behaviors can have a large impact both on security and on interoperability, even if they are not expressly forbidden in a specification.</t>
          <t>There is a regrettable belief that a particular practice is "allowed" by a specification, simply because the specification does not forbid that practice.  This belief is wrong.  That is, a behavior which is not even mentioned in the specification cannot honestly be said to be "permitted" or "allowed" by that specification.    The most charitable description would be that these behaviors are undefined, or at best, they are not forbidden.</t>
          <t>By their very nature, documents include a small number of permitted, required, and/or forbidden behaviors.  There are a much larger set of behaviors which are undefined.  That is, behaviors which are neither permitted nor forbidden.  Those behaviors may be good or bad, independent of what any specification says.</t>
          <t>Outside of published specifications, there is also a large set of common practices and behaviors which have grown organically over time, but which have not been written into a specification.  These practices have been found to be valuable by implementers and administrators.  Deviations from these practices generally result in instabilities and incompatibilities between systems.  As a result, implementers should exercise caution when creating new behaviors which have not previously been seen in the industry.  Such behaviors are likely to cause problems, where there would have been no problems if common practices had instead been followed.</t>
          <t>It is RECOMMENDED that implementations and administrators follow widely accepted practices which have been proven to work and to be secure, even if those practices are not written down in a public specification.  Implementers SHOULD NOT create features which depend on undefined behavior; such features are very likely to be wrong.</t>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <ul spacing="normal">
        <li>
          <t>RADIUS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>The Remote Authentication Dial-In User Service protocol, as defined in <xref target="RFC2865"/>, <xref target="RFC2866"/>, and <xref target="RFC5176"/> among others.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/UDP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the User Datagram Protocol as define above.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/TCP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Control Protocol <xref target="RFC6613"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/TLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Layer Security protocol <xref target="RFC6614"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/DTLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Datagram Transport Layer Security protocol  <xref target="RFC7360"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>TLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>the Transport Layer Security protocol.  Generally when we refer to TLS in this document, we are referring to RADIUS/TLS and/or RADIUS/DTLS.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>NAS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Network Access Server, which is a RADIUS client.</t>
        </li>
      </ul>
      <t>In order to continue the terminology of <xref target="RFC2865"/>, we describe the Request Authenticator, Response Authenticator, and Message-Authenticator as "signing" the packets.  This terminology is not consistent with modern cryptographic terms, but using other terminology could be misleading.  The reader is assured that no modern cryptographic methods are used with RADIUS/UDP.</t>
    </section>
    <section anchor="overview-of-issues-with-radius">
      <name>Overview of issues with RADIUS</name>
      <t>There are a large number of issues with RADIUS.   The most serious is the BlastRADIUS vulnerability, which means that subject to some limitations, attackers can leverage MD5 known-prefix collisions to cause any user to be authenticated, and then be given any authorization.  Multi-factor Authentication (MFA) systems can be bypassed, and the RADIUS server will in many cases not even be aware that an unauthorized user is on the network.</t>
      <t>Another issue is that RADIUS sends most information "in the clear", with obvious privacy implications.  Even if packets use Message-Authenticator for integrity checks, it is still possible for the average hobbyist who observes RADIUS traffic to perform brute-force attacks to crack even seemingly complex shared secrets.</t>
      <t>There is no way to fix the RADIUS protocol to address all of these issues.  The short-term fix is to require the use of Message-Authenticator for packet integrity checks.  The long-term solution is to wrap the protocol in a secure transport, such as TLS or IPsec.</t>
      <t>We address each of these issues in detail below.</t>
      <section anchor="the-blastradius-vulnerability">
        <name>The BlastRADIUS Vulnerability</name>
        <t>The BlastRADIUS vulnerability is discussed in detail in <xref target="BLAST"/>, and we only give a short summary here.  We refer the reader to the original paper for a more complete description of the issue.</t>
        <t>For the following description, we assume that we have texts "A", "B", "S".  Following the use in <xref target="RFC2865"/>, "+" denotes concatenation.  The vulnerability then relies on the following property of MD5:</t>
        <ul empty="true">
          <li>
            <t>If MD5(A) == MD5(B), then MD5(A + S) == MD5(B + S)</t>
          </li>
        </ul>
        <t>If an attacker is given text "A", and can find text "B" which has the same MD5 hash, then the attacker can perform a chosen prefix attack.  Even if the attacker does not know text "S", if given M5(A + S), then the attacker can trivially calculate MD5(B + S): it has the same value.</t>
        <t>In RADIUS, the Response Authenticator field <xref section="3" sectionFormat="comma" target="RFC2865"/> is calculated via precisely this vulnerable construct:</t>
        <ul empty="true">
          <li>
            <t>Response Authenticator = MD5(packet + secret)</t>
          </li>
        </ul>
        <t>The attacker can observe or predict a packet (e.g. Access-Reject), which is signed with a shared secret unknown to the attacker.  The attacker can then find an Access-Accept with the same MD5 hash as the Access-Reject, and replace the Access-Reject with the Access-Accept using the Response Authenticator from the Access-Reject.</t>
        <t>The client receives the packet, calculates MD5(Access-Accept + secret), verifies that the Response Authenticator is correct, and proceeds to follow the attackers instructions: give the user access, along with some authorization.</t>
        <t>This process is the basic concept behind the BlastRADIUS vulnerability.  We note that this attack does not expose the contents of the User-Password attribute.  Instead, it bypasses all server-side authentication, and simply fools the client into accepting a forged response.</t>
        <t>While this issue requires that an attacker be "on path" and be able to intercept and modify packets, the meaning of "on path" is often "the entire Internet".  As such, this attack alone is sufficient reason to deprecate all uses of RADIUS/UDP and RADIUS/TCP.</t>
      </section>
      <section anchor="privacy">
        <name>Information is sent in Clear Text</name>
        <t>With the exception of a few attributes such as User-Password, all RADIUS traffic is sent "in the clear" when using UDP or TCP transports.  Even when TLS is used, all RADIUS traffic (including User-Password) is visible to proxies.  The resulting data exposure has a large number of privacy issues.  We refer to <xref target="RFC6973"/>, and specifically to Section 5 of that document for detailed discussion, and to <xref section="6" sectionFormat="comma" target="RFC6973"/> for recommendations on threat mitigations.</t>
        <t>More discussion of location privacy is given in <xref target="RFC6280"/>, which defines an "Architecture for Location and Location Privacy in Internet Applications".  However, that work was too late to have any practical impact on the design of the RADIUS protocol, as <xref target="RFC5580"/> had already been published.</t>
        <t>The effect is that any observer of non-TLS RADIUS traffic is able to obtain a substantial amount of personal identifiable information (PII) about users.  The observer can tell who is logging in to the network, what devices they are using, where they are logging in from, and their approximate location (usually city).  With location-based attributes as defined in <xref target="RFC5580"/>, a user's location may be determined to within 15 or so meters outdoors, and with "meter-level accuracy indoors" <xref target="WIFILOC"/>.  An observer can also use RADIUS accounting packets to determine how long a user is online, and to track a summary of their total traffic (upload and download totals).</t>
        <t>When RADIUS/UDP is used across the public Internet, common Wi-Fi configurations allow the location of individuals to be tracked in real-time (usually 10 minute intervals), to within 15 meters.  The user devices can be identified, and also tracked.  Passwords can often be compromised by a resourceful attacker, or for MS-CHAP, by a hobbyist with a laptop.  Even when the packets do not contain any <xref target="RFC5580"/> location information for the user, the packets usually contain the MAC address of the Wi-Fi access point.  The MAC address and physical location of these devices are publicly available, and there are multiple services selling databases of this information.</t>
        <t>These issues are not theoretical.  Recently <xref target="BRIGGS"/> noted that:</t>
        <ul empty="true">
          <li>
            <t>Overall, I think the above three examples are just the tip of the proverbial iceberg of SS7 and Diameter based location and monitoring exploits that have been used successfully against targeted people in the USA.</t>
          </li>
        </ul>
        <t><xref target="BRIGGS"/> continues with a statement that there have been:</t>
        <ul empty="true">
          <li>
            <t>... numerous other exploits based on SS7 and Diameter that go beyond location tracking. Some of these involve issues like (1) the monitoring of voice and text messages, (2) the delivery of spyware to targeted devices, and (3) the influencing of U.S. voters by overseas countries using text messages.</t>
          </li>
        </ul>
        <t>While these comments apply to Diameter <xref target="RFC6733"/>, the same location tracking and monitoring is also possible with RADIUS.  There is every reason to believe that similar attacks on RADIUS have occurred, but are simply less publicized than similar attacks on Diameter.</t>
        <t>The use of clear-text protocols across insecure networks is no longer acceptable.  Using clear-text protocols in networks which are believed to be secure is not a significantly better solution.  The correct solution is to use secure protocols, to minimize the amount of private data which is being sent, and to minimize the number of third parties who can see any traffic.</t>
      </section>
      <section anchor="md5-has-been-broken">
        <name>MD5 has been broken</name>
        <t>Attacks on MD5 are summarized in part in <xref target="RFC6151"/>.  The BlastRADIUS work substantially improved the speed of finding MD5 collisions, and those improvements are publicly available at <xref target="HASHCLASH"/>.</t>
        <t>While there have not been many other new attacks in the decade since <xref target="RFC6151"/> was published, that does not mean that further attacks do not exist.  It is more likely that no one is looking for new attacks.</t>
      </section>
      <section anchor="cracking">
        <name>Cracking RADIUS shared secrets is not hard</name>
        <t>The cost of cracking a a shared secret can only go down over time as computation becomes cheaper.  The issue is made worse because of the way MD5 is used to authenticate RADIUS packets.  The attacker does not have to calculate the hash over the entire packet, as the hash prefix can be calculated once, and then cached.  The attacker can then begin the attack with that hash prefix, and brute-force only the shared secret portion.</t>
        <t>At the time of writing this document, an "off the shelf" commodity computer can calculate at least 100M MD5 hashes per second.  If we limit shared secrets to upper/lowercase letters, numbers, and a few "special" characters, we have 64 possible characters for shared secrets.  Which means that for 8-character secrets, there are 2^48 possible combinations.</t>
        <t>The result is that using consumer-grade machine, it takes approximately 32 days to brute-force the entire 8 octet / 64 character space for shared secrets.  The problem is even worse when graphical processing units (GPUs) are used. A high-end GPU is capable of performing more than 64 billion hashes per second.  At that rate, the entire 8 character space described above can be searched in approximately 90 minutes.</t>
        <t>This is an attack which is feasible today for a hobbyist. Increasing the size of the character set raises the cost of cracking, but not enough to be secure.  Increasing the character set to 93 characters means that the hobbyist using a GPU could search the entire 8 character space in about a day.</t>
        <t>Increasing the length of the shared secret has a larger impact on the cost of cracking.  For secrets ten characters long, the search space is approximately 2^60.  One GPU can search a 64-character space in about six months. A 93 character space (2^65 complexity) would take approximately 24 years.</t>
        <t>This brute-force attack is also trivially parallelizable.  Nation-states have sufficient resources to deploy hundreds to thousands of systems dedicated to these attacks.  That realization means that a "time to crack" of 24 years is simply expensive, but does not take much "wall clock" time.  A thousand commodity CPUs are enough to reduce the crack time from 24 years to a little over a week.</t>
        <t>Whether the above numbers are precise or only approximate is immaterial.  These attacks will only get better over time.  The cost to crack shared secrets will only go down over time.</t>
        <t>If the shared secret is long, then "cracking" the secret is expensive.  It is cheaper to perform the BlastRADIUS attack at a cost of approximately 2^53 per packet, and less than $100 in purchased CPU time.  While cracking the shared secret would break all RADIUS packets using that secret, forging one packet is often enough to give the attacker administrator access to a NAS, where the shared secret is visible in the administration interface.  The conclusion, then, is that increasing the security of the shared secret offers minimal protection when the Access-Request packets are unsigned.</t>
        <t>Even if the shared secrets were enough to secure all RADIUS packets, administrators do not always derive shared secrets from secure sources of random numbers.  The "time to crack" numbers given above are the absolute best case, assuming administrators follow best practices for creating secure shared secrets.  For shared secrets created manually by a person, the search space is orders of magnitude smaller than the best case outlined above.  Rather than brute-forcing all possible shared secrets, an attacker can create a local dictionary which contains common or expected values for the shared secret.  Where the shared secret used by an administrator is in the dictionary, the cost of the attack can drop by multiple orders of magnitude.</t>
        <t>Implementers and administrators SHOULD assume that a hobbyist attacker with modest resource can crack most shared secrets created by people in minutes, if not seconds.</t>
        <t>Despite the ease of attacking MD5, it is still a common practice for some "cloud" and other RADIUS providers to send RADIUS/UDP packets over the Internet "in the clear".  It is also common practice for administrators to use "short" shared secrets, and to use shared secrets created by a person, or secrets derived from a limited character set.  Theses practice are easy to implement and follow, but they are highly insecure and MUST NOT be used.</t>
        <t>Further requirements in shared secrets are given below in <xref target="shared-secrets"/>.</t>
      </section>
      <section anchor="tunnel-coa">
        <name>Tunnel-Password and CoA-Request packets</name>
        <t>There are a number of security problems with the use Tunnel-Password attribute in CoA-Request and Disconnect-Request packets.  A full explanation requires a review of the relevant specifications.</t>
        <t><xref target="RFC5176"/> Section 2.3 describes how to calculate the Request Authenticator field for these packets:</t>
        <artwork><![CDATA[
Request Authenticator

   In Request packets, the Authenticator value is a 16-octet MD5
   [RFC1321] checksum, called the Request Authenticator.  The
   Request Authenticator is calculated the same way as for an
   Accounting-Request, specified in [RFC2866].
]]></artwork>
        <t>Where <xref target="RFC2866"/> Section 3 says:</t>
        <artwork><![CDATA[
   The NAS and RADIUS accounting server share a secret.  The Request
   Authenticator field in Accounting-Request packets contains a one-
   way MD5 hash calculated over a stream of octets consisting of the
   Code + Identifier + Length + 16 zero octets + request attributes +
   shared secret (where + indicates concatenation).  The 16 octet MD5
   hash value is stored in the Authenticator field of the
   Accounting-Request packet.
]]></artwork>
        <t>Taken together, these definitions mean that for CoA-Request packets, all attribute obfuscation is calculated with the Reply Authenticator being all zeroes.  In contrast for Access-Request packets, the Request Authenticator is mandated to be 16 octets of random data.  This difference reduces the security of the obfuscation.</t>
        <t>For Tunnel-Password, <xref target="RFC5176"/> Section 3.6 allows it to appear in CoA-Request packets:</t>
        <artwork><![CDATA[
   ...
   Change-of-Authorization Messages
   
   Request   ACK      NAK   #   Attribute
   ...
   0+        0        0    69   Tunnel-Password (Note 5)
   ...
   (Note 5) When included within a CoA-Request, these attributes
   represent an authorization change request.  Where tunnel attributes
   are included within a successful CoA-Request, all existing tunnel
   attributes are removed and replaced by the new attribute(s).
]]></artwork>
        <t>However, <xref target="RFC2868"/> Section 3.5 says that Tunnel-Password is encrypted with the Request Authenticator:</t>
        <artwork><![CDATA[
   Call the shared secret S, the pseudo-random 128-bit Request
   Authenticator (from the corresponding Access-Request packet) R,
]]></artwork>
        <t>The assumption that the Request Authenticator is random data is true for Access-Request packets.  That assumption is not true for CoA-Request packets.</t>
        <t>That is, when the Tunnel-Password attribute is used in CoA-Request packets, the only source of randomness in the obfuscation is the salt, as defined in <xref target="RFC2868"/> Section 3.5;</t>
        <artwork><![CDATA[
 Salt
   The Salt field is two octets in length and is used to ensure the
   uniqueness of the encryption key used to encrypt each instance of
   the Tunnel-Password attribute occurring in a given Access-Accept
   packet.  The most significant bit (leftmost) of the Salt field
   MUST be set (1).  The contents of each Salt field in a given
   Access-Accept packet MUST be unique.
]]></artwork>
        <t>This chain of unfortunate definitions means that there is only 15 bits of entropy in the Tunnel-Password obfuscation (plus the secret).  It is not known if this limitation makes it sufficiently easy for an attacker to determine the contents of the Tunnel-Password, as the obfuscated value still depends on the shared secret.  However, such limited entropy cannot be a good thing, and it is one more reason to deprecate RADIUS/UDP and RADIUS/TCP.</t>
        <t>Due to the above issues, implementations and new specifications SHOULD NOT use obfuscated attributes in CoA-Request or Disconnect-Request packets.</t>
      </section>
      <section anchor="tls-based-eap-methods-radiustls-and-ipsec">
        <name>TLS-based EAP methods, RADIUS/TLS, and IPsec</name>
        <t>The above analysis as to security and privacy issues focuses on RADIUS/UDP and RADIUS/TCP.  These issues are partly mitigated through the use secure transports, but it is still possible for information to "leak".</t>
        <t>When TLS-based EAP methods such as TTLS or PEAP are used, they still transport passwords inside of the TLS tunnel.  It is possible for an authentication server to terminate the TLS tunnel, and then proxy the inner data over RADIUS/UDP.  The design of both TTLS and PEAP make this process fairly trivial.  The inner data for TTLS is in Diameter AVP format, which can be trivially transformed to RADIUS attributes.  The inner data for PEAP is commonly EAP-MSCHAPv2, which can also be trivially transformed to bare EAP, or to MS-CHAPv2.</t>
        <t>Similar issues apply to RADIUS/TLS and IPsec.  A proxy receiving packets over IPsec terminates the secure tunnel, but then might forward the packets over an insecure transport protocol.  While this process could arguably be seen as a misconfiguration issue, it is never the less possible due to the design of the RADIUS protocol.  The design of RADIUS security is that it is "hop by hop", and there is no way for one "hop" to know anything about, or to control, the security of another "hop".</t>
        <t>The only solution to either issue would be to create a new protocol which is secure by design.  Unfortunately that path is not possible, and we are left with the recommendations contained in this document.</t>
      </section>
      <section anchor="other-issues">
        <name>Other Issues</name>
        <t>There are many other issues with RADIUS which are unrelated to security or privacy.  As of the time of writing this document, those issues are being collated in <xref target="ISSUES"/>.  The bulk of the problems noted in that Wiki are operational considerations, along with inconsistencies in the previous RADIUS specifications.</t>
        <t>As the focus of this document is security, it does not address problems with the RADIUS protocol in general.  For example, there are known problems with the RADIUS state machine.  There are common practices which are secure but which are operationally expensive.  RADIUS accounting is known to be inaccurate and often inconsistent.</t>
        <t>Some of the issues noted in the above Wiki could potentially have security impact.  For example, if a RADIUS server is not implemented correctly, an attacker can perform a resource exhaustion attack on it, and effectively take it offline.  Proxies are subject to Denial of Service attacks even from trusted clients, because those clients originate packets at the request of untrusted and unknown users.  Rate limiting for RADIUS requests is a poorly tested or documented process, and largely relies on mutual trust of administrators.</t>
        <t>We hope that the above issues are addressed in a future document.  This document focuses on security issues related to transport protocols and authentication protocols, which will have to be sufficient for now.</t>
      </section>
    </section>
    <section anchor="all-short-shared-secrets-have-been-compromised">
      <name>All short Shared Secrets have been compromised</name>
      <t>Unless RADIUS packets are sent over a secure network (IPsec, TLS, etc.), administrators SHOULD assume that any shared secret of 8 characters or less has been compromised as soon as it is used.  Administrators SHOULD assume that any shared secret of 10 characters or less has been compromised by an attacker with significant resources.  Administrators SHOULD also assume that any private information (such as User-Password) which depends on such shared secrets has also been compromised.</t>
      <t>To be perfectly clear: if a User-Password, or CHAP-Password, or MS-CHAP password has been sent over the Internet via RADIUS/UDP or RADIUS/TCP in the last decade, you should assume that the underlying password has been compromised.</t>
    </section>
    <section anchor="blastradius">
      <name>The BlastRADIUS Attack</name>
      <t>This section gives some more detail on the attack, so that the reader can be informed as to why this document makes particular recommendations.</t>
      <t>An "on path" attacker can inject one or more Proxy-State attributes with special contents into an Access-Request packet. The Proxy-State attribute itself will not trigger any overflow or “out of bounds” issue with the RADIUS client or server.  Instead, the contents of the attributes will allow the attacker to create an MD5 known-prefix collision when the server calculates the Response Authenticator.  In effect, the attacker uses the RADIUS server, and its knowledge of the shared secret, to unknowingly authenticate packets which it has not created.</t>
      <t>The behavior of the Proxy-State attribute is extremely useful to this attack.  The attribute is defined in <xref section="5.33" sectionFormat="comma" target="RFC2865"/> as an opaque token which is sent by a RADIUS proxy, and is echoed back by RADIUS servers.  That is, the contents of the attribute are never examined or interpreted by the RADIUS server.  Even better, testing shows that all RADIUS clients will simply ignore any unexpected Proxy-State attributes which they receive.  Finally, implementations generally add Proxy-State to the end of response packets, which simplifies the attack.</t>
      <t>This attribute is therefore ideally suited to an attackers purpose of injecting arbitrary data into packets, without that data affecting client or server behavior.   The reasons for this behavior are outlined below in <xref target="proxy-state"/>.  While those reasons ended up being transient, the impact of those decisions has impacted RADIUS for decades.</t>
      <t>While it is possible to use other attributes to achieve the same effect, the use of Proxy-State is simple, and is sufficient to trigger the issue.  For example, it is theoretically possible to use the User-Name attribute for this attack, if it is echoed back in an Access-Accept, or even as part of the the contents of a Reply-Message in an Access-Accept.  There is no much benefit in further researching that attack, as the mitigations for attacks using Proxy-State will also protect clients and servers from a similar attacks which use other attributes.</t>
      <t>The injected data and resulting MD5 collision allows the attacker to modify the packet contents almost at will, and the client will still accept the modified packet as being authentic.  The attack allows nearly arbitrary attributes to be added to the response.  Those attributes are simply part of the MD5 collision calculation, and do not substantially impact the cost of that calculation.</t>
      <t>We reiterate that since the RADIUS server can be convinced to authenticate packets using a prefix chosen by the attacker, there is no need for the attacker to know the shared secret.  This attack succeeds no matter how secure the shared secret is, the only mitigation is to use Message-Authenticator or TLS.</t>
      <t>The attack is implemented via the following steps, which are numbered the same as in the original paper.</t>
      <ol spacing="normal" type="1"><li>
          <t>The attacker requests network access from the RADIUS client (NAS).  This action triggers the NAS to send an Access-Request packet to the RADIUS server.</t>
        </li>
        <li>
          <t>The Access-Request is observed to obtain its contents, including the Request Authenticator field.  The attacker prevents this packet from reaching the server until the MD5 collision data has been calculated..  The NAS will retransmit the packet one or more times after a delay, giving the attacker time to calculate the chosen prefix.</t>
        </li>
        <li>
          <t>Some external resources are used to calculate an MD5 collision using the Request Authenticator, and the expected contents of an Access-Reject.  As Access-Reject packets are typically empty (or can be observed), the expected packet contents are known in their entirety.</t>
        </li>
        <li>
          <t>Once an MD5 collision is found, the resulting data is placed into one or more Proxy-State attributes in the previously seen Access-Request.  The attacker then sends this modified Access-Request to the RADIUS server.</t>
        </li>
        <li>
          <t>The RADIUS server responds with an Access-Reject, and includes the Proxy-State attributes from the modified Access-Request packets.  The packet contains the malicious Proxy-State(s), along with a Response Authenticator which depends on both those malicious attributes, and the shared secret.</t>
        </li>
        <li>
          <t>The attacker discards the original Access-Reject, and uses the chosen prefix data in the Proxy-State(s) to create a different (i.e. modified) response, such as an Access-Accept.  Other authorization attributes such as VLAN assignment can also be add, modified, or deleted.  This modified packet is sent to the NAS.</t>
        </li>
        <li>
          <t>The NAS receives the modified Access-Accept, verifies that the Response Authenticator is correct, and gives the user access, along with the attackers desired authorization.</t>
        </li>
      </ol>
      <t>The result of this attack is a near-complete compromise of the RADIUS protocol.  The attacker can cause any user to be authenticated.  The attacker can give almost any authorization to any user.</t>
      <t>While the above description uses Access-Reject responses, we reiterate that the root cause of the vulnerability is in the Access-Request packets.  The attack will therefore succeed even if the server responds with Access-Accept, Access-Challenge, or Protocol-Error <xref target="RFC7930"/>.  The vulnerability in Access-Challenge allows MFA to be bypassed, as the attacker simply replaces the Access-Challenge with an Access-Accept.</t>
      <t>In addition to forging an Access-Accept for a user who has no credentials, the attacker can control the traffic of known and authenticated users.  Many modern Broadband Network Gateways (BNG)s, Wireless LAN Controllers (WLCs), and Broadband Remote Access Servers (BRAS) support configuring a dynamic HTTP redirect using Vendor Specific Attributes (VSA)s.  These VSAs are not protected by the shared secret, and could be injected into an Access-Accept in order to redirect a users traffic.  The attacker could then set up a malicious website to launch Zero-Day/Zero-Click attacks, driving subscribers to the website using an HTTP redirect.  This issue is compounded by the fact that many devices perform automatic HotSpot 1.0 style walled garden discovery.  The act of simply connecting to their home WiFi connect could be enough to compromise a subscriber's equipment.</t>
      <t>The following subsections define mitigations which can be used to protect clients and servers from this attack when using RADIUS/UDP or RADIUS/TCP.  However, we reiterate here, and in the rest of this document that the only long-term solution is to deprecate insecure transports entirely.  In the long term, implementers SHOULD remove all uses of RADIUS/UDP and RADIUS/TCP from their products.  Administrators SHOULD stop using RADIUS/UDP and RADIUS/TCP.</t>
      <section anchor="root-cause-of-the-attack">
        <name>Root Cause of the Attack</name>
        <t>Independent of any cryptographic vulnerability, there are a number of factors which led to this vulnerability being exploited.</t>
        <t>A major factor is the continued use of MD5 for security, instead of mandating the use of an HMAC with Message-Authenticator.  This change could have been made in <xref target="RFC2869"/> in the year 2000.  A reason for not mandating Message-Authenticator was the issue of backwards compatibility.  Unfortunately, issues which are not fixed only grow larger over time.  The issue of backwards compatibility is significantly worse now than it was in the year 2000.  History shows that a better approach is to fix issues immediately when they come up.</t>
        <t>Another factor is the principle of "be conservative in what you do, be liberal in what you accept from others", often known as Postel's law, after John Postel.  Looking at the Proxy-State attribute, it is intended for proxy to server signaling, and offers no other value for RADIUS clients.  A NAS does not send Proxy-State in an Access-Request, and should not receive Proxy-State in an Access-Accept.</t>
        <t>Reception of Proxy-State in an Access-Accept response is therefore a failure of signaling in the RADIUS protocol, and likely indicates a serious failure of configuration, implementation, or as seen in this case, an active attack.  If all clients had discarded responses which contained unexpected Proxy-State attributes, then this attack could have been prevented.</t>
        <t>With the benefit of experience, this specification errs on the side of security, while still allowing for backwards compatibility.  It is not acceptable to maintain insecure practices simply because a small number of implementations or organizations find it difficult to upgrade.  Insecure implementations or practices have a concrete cost not only to the insecure organizations, but also to other organizations via secondary effects.  When insecure organizations demand that others follow insecure practices continue due to perceived local costs, they are effectively offloading their costs onto everyone else.  This practice both decreases security, and increases costs.</t>
        <t>The solution here is to fix the protocol, and to mandate that everyone change to secure practices.  Implementations and/or organizations which do not update their systems will either be insecure, or will be incompatible with secure practices.</t>
      </section>
      <section anchor="interaction-with-dtls-and-tls">
        <name>Interaction with DTLS and TLS</name>
        <t>The new behaviors described in this section apply only when UDP or TCP transport is used.  Implementations MUST NOT use the mitigations outlined in this section when DTLS or TLS transport is used, as those transport protocols are not vulnerable to the BlastRADIUS attack.</t>
        <t>However, clients and servers SHOULD include Message-Authenticator in Access-Request packets, and in responses to those Access-Requests, even then those packets are sent over TLS or DTLS transports.  While the attribute serves no security purpose, we recommend including Message-Authenticator because of the behavior of some implementations.  Some RADIUS proxies are known to automatically include Message-Authenticator in forwarded packets when the attribute is seen in the packet received from the client.</t>
        <t>That is, such an implementation may receive packets over TLS transport, and then forward (or return) them over insecure transports such as UDP.  If such an implementation receives a packet over TLS which contains Message-Authenticator, it will add the Message-Authenticator attribute to the packet which is sent over UDP.  Including Message-Authenticator in packets sent over insecure transports is important for increasing RADIUS security.</t>
        <t>It is therefore useful for systems to always include Message-Authenticator in Access-Request packets, even when TLS is used.  While this practice does not increase the security of a particular TLS connection, it will increase the security of the larger RADIUS system.</t>
        <t>The long term solution to the BlastRADIUS attack is to stop using insecure transport protocols, and switch to secure ones such as TLS.  We recognize that switching to TLS transport may require a significant amount of effort.  There is a substantial amount of work to perform in updating implementations, performing interoperability tests, changing APIs, changing user interfaces, and updating documentation.  This effort cannot realistically be done in a short time frame.</t>
        <t>There is therefore a need for a short-term action which can be implemented by RADIUS clients and servers which is both simple to do, and which is known to be safe.  The recommendations in this section are known to protect implementations from the attack; to be simple to implement; and also to allow easy upgrade without breaking existing deployments.</t>
      </section>
      <section anchor="changes-to-radius">
        <name>Changes to RADIUS</name>
        <t>There are a number of changes required to both clients and servers in order for all possible attack vectors to be closed.  Implementing only some of these mitigations means that an attacker could bypass the partial mitigations, and therefore still perform the attack.</t>
        <t>This section outlines the mitigation methods which protect RADIUS/UDP and RADIUS/TCP systems from this attack, along with the motivation for those methods.</t>
        <t>We note that unless otherwise noted, the discussion here applies only to Access-Request packets, and to responses to Access-Request (i.e. Access-Accept, Access-Reject, Access-Challenge, and Protocol-Error packets).  All behavior involving other types of request and response packets MUST remain unchanged.</t>
        <t>The mitigation methods outlined here allow systems to both protect themselves from the attack, while not breaking existing networks.  There is no global “flag day” required for these changes.  Systems which implement these recommendations are fully compatible with legacy RADIUS implementations, and can help protect those legacy implementations.  However, when these mitigations are not implemented, systems are still vulnerable to the attack.</t>
        <t>Note that in some network architectures, the attack can be mitigated simply by upgrading the RADIUS server, so that it sends Message-Authenticator as the first attribute in all responses to Access-Request packets.  However, the goal of this specification is to fix all architectures supported by RADIUS systems, rather than a limited subset.  We therefore mandate new behavior for all RADIUS clients and servers, while acknowledging that some organizations may choose to not deploy all of the new functionality.  For overall network security and good practice, we still recommend that all RADIUS clients and servers be upgraded to use the new software which contains the mitigations, and also be configured with the highest level of security.</t>
        <section anchor="new-configuration-flags">
          <name>New Configuration Flags</name>
          <t>We define new configuration flags for clients and servers.  The behavior and meaning of these flags will be discussed below.  Introducing these flags before discussing their meaning makes the subsequent discussion simpler and easier to understand.</t>
          <t>The goal of these flags is to secure the RADIUS protocol without preventing client and server communication between legacy and upgraded systems.  These flags instead allow a gradual migration process from legacy RADIUS, to fully secure RADIUS with all of the mitigations in place.</t>
          <t>We mandate the following new configuration flags for RADIUS implementations when using UDP or TCP transport.  These flags MUST be ignored when DTLS or TLS transport is used.</t>
          <ul empty="true">
            <li>
              <t>Clients MUST have a per-server boolean configuration flag, which we call “require Message-Authenticator”.  The default value for this flag MUST be “false” in order to maintain compatibility with legacy servers.</t>
              <t>Servers MUST have a per-client boolean configuration flag, which we call “require Message-Authenticator”.  The default value for this flag MUST be “false” in order to maintain compatibility with legacy clients.</t>
              <t>Servers MUST have a per-client boolean configuration flag, which we call “limit Proxy-State”.  The default value for this flag MUST be “false” in order to maintain compatibility with legacy clients.</t>
            </li>
          </ul>
          <t>It is RECOMMENDED that implementations support both a global setting, and per-client or per-server setting for the above flags.  For example, an implementation could support a global setting which is over-ridden by a more specific per-client or per-server setting.  The global setting could also be used if there was no more specific setting defined.</t>
          <t>The combination of global and more narrow configuration allows administrators to upgrade systems gradually, without requiring a "flag day" when everything changes on a global basis.</t>
        </section>
        <section anchor="clients-and-access-request">
          <name>Clients and Access-Request</name>
          <t>We mandate the following new behavior for RADIUS clients:</t>
          <ul empty="true">
            <li>
              <t>Clients MUST add Message-Authenticator to all Access-Request packets.</t>
            </li>
          </ul>
          <t>This behavior MUST NOT be configurable.  Disabling it would open the system up to attack, and would prevent the other mitigation methods from working.  The root cause of the attack is that Access-Request packets lack integrity checks, so the most important fix is to add integrity checks to those packets.</t>
          <t>The Message-Authenticator SHOULD be the first attribute in all Access-Request packets.  That is, it should be placed immediately after the packet header.  Implementations MAY place the Message-Authenticator elsewhere in an Access-Request packet.</t>
          <t>From a cryptographic point of view, the location of Message-Authenticator does not matter for Access-Request packets, it just needs to exist somewhere in the packet.  However, as discussed below for responses to Access-Request (Access-Accept, etc.), the location of Message-Authenticator does matter.  It is better to have consistent and clear messaging for addressing this attack, instead of having different recommendations for different kinds of packets.</t>
          <t>All RADIUS servers will validate the Message-Authenticator attribute correctly when that attribute is received in a packet.  We are not aware of any RADIUS servers which will reject or discard Access-Request packets if they unexpectedly contain a Message-Authenticator attribute.</t>
          <t>This behavior has been enabled in the FreeRADIUS server for over a decade, and there have been no reports of interoperability problems.  It is therefore safe for all clients to immediately implement this requirement.</t>
          <t>However, many existing RADIUS clients do not send Message-Authenticator.  It also may be difficult to upgrade some client equipment, as the relevant vendor may have gone out of business, or may have marked equipment as “end of life” and thus unsupported.  It is therefore necessary to both work with such systems by not breaking existing RADIUS deployments, while at the same time protecting them as much as practically possible.</t>
        </section>
        <section anchor="servers-and-access-request">
          <name>Servers and Access-Request</name>
          <t>We mandate the following new behavior for RADIUS servers:</t>
          <ul empty="true">
            <li>
              <t>When receiving an Access-Request, servers MUST consult the value of the "require Message-Authenticator" flag prior to accepting the packet for processing.  This flag MUST NOT be consulted for other types of request packets.</t>
              <t>If "require Message-Authenticator" is set to “false”, RADIUS servers MUST follow legacy behavior for validating and enforcing the existence of Message-Authenticator in Access-Request packets.  For example, enforcing the requirement that all packets containing EAP-Message also contain a Message-Authenticator attributes, but otherwise accepting and validating the Message-Authenticator attribute if it is present, while taking no action if the attribute is missing.</t>
              <t>If "require Message-Authenticator" is set to "false", RADIUS servers MUST also check the value of the "limit Proxy-State" flag and either accept or discard the packet, based on the checks discussed in <xref target="limit-proxy-state"/>, below.</t>
              <t>If "require Message-Authenticator" is set to “true”, the server MUST examine the Access-Request packets for the existence of the Message-Authenticator attribute. Access-Request packets which do not contain Message-Authenticator MUST be silently discarded.  This discard process MUST occur before the Message-Authenticator or Request Authenticator have been validated.</t>
              <t>For packets which are not discarded by the preceding check, the server MUST then validate the contents of the Message-Authenticator and then discard packets which fail this validation (<xref section="5.14" sectionFormat="comma" target="RFC2869"/>).</t>
              <t>Servers MUST NOT discard a packet based on the location of the Message-Authenticator attribute.  We extend <xref section="5" sectionFormat="comma" target="RFC2865"/> to state that RADIUS clients and servers MUST NOT discard packets based on the order or location of any attribute.  If Message-Authenticator passes validation, then the packet is authentic and it has not been modified.  The location of Message-Authenticator within the packet does not matter for authenticated packets.</t>
            </li>
          </ul>
          <t>The default value for the "require Message-Authenticator" is “false” because many RADIUS clients do not send the Message-Authenticator attribute in all Access-Request packets.  Defaulting to a value of "true" would mean that the RADIUS server would be unable to accept packets from many legacy RADIUS clients, and existing networks would break.</t>
          <t>We note that if this flag is “false”, the server can be vulnerable to the attack, even if the client has been updated to always send Message-Authenticator in all Access-Requests.  An attacker could simply strip the Message-Authenticator from the Access-Request, and proceed with the attack as if client had not been updated.  The server then does not see Message-Authenticator in the Access-Request, and accepts the modified packet for processing.</t>
          <t>When the "require Message-Authenticator" flag is set to "true", the server is protected from the BlastRADIUS attack.  Any packet which has been modified by the attacker to remove Message-Authenticator will be discarded by the server.  Any packet containing Message-Authenticator will be validated using the HMAC-MD5 construct, which is not vulnerable to this attack.</t>
          <t>While servers must validate the contents of Message-Authenticator, we reiterate that they MUST NOT check the location of that attribute.  There is no different meaning in RADIUS if Message-Authenticator is the first, second, or last attribute in a packet.  Servers MUST accept a RADIUS packet as valid if it passes authentication checks, no matter where Message-Authenticator is located in the packet.</t>
          <t>Unfortunately, there is no way for clients and servers to negotiate protocol-layer features in RADIUS/UDP or RADIUS/TCP.  An implementation cannot determine if packets are discarded due to an attack, or if they are discarded due to a mismatched configuration between client and server.  Implementations SHOULD therefore log the fact that the packet was discarded (with rate limits) in order to inform the administrator that either an attack is underway, or that there is a configuration mismatch between client and server.</t>
          <t>As a special case for debugging purposes, instead of discarding the packet, servers MAY instead send a Protocol-Error or Access-Reject response packet.  This packet MUST contain a Message-Authenticator attribute as the first attribute in the packet, otherwise an attacker could turn this response into an Access-Accept.  The response MUST also contain an Error-Cause attribute with value 510 (Missing Message-Authenticator).  The server MUST not send this response by default, as it this could cause the server to respond to forged Access-Request packets.</t>
          <t>The purpose of this Protocol-Error packet is to allow administrators to signal misconfigurations between client and server.  It is intended to only be used temporarily when new client to server connections are being configured, and MUST be disabled permanently once the connection is verified to work.</t>
          <t>This behavior SHOULD only be enabled when specifically configured by an administrator.  It MUST also be rate-limited, as there is no need to signal this error on every packet received by the server.  It SHOULD be automatically disabled when the server receives an Access-Request from a client which contains Message-Authenticator.  Implementations MAY instead automate this process, by sending a few such responses when packets from a client are first seen, and then not sending responses thereafter.</t>
          <t>As RADIUS clients are upgraded over time, RADIUS server implementations SHOULD enable the “require Message-Authenticator” flag by default.</t>
          <t>We note that "Section 7.2 of <xref target="BLAST"/> has the following comment about the FreeRADIUS server, which has had this configuration option for clients since 2008:</t>
          <ul empty="true">
            <li>
              <t>If support for these old clients is not required, enabling this option would make our attacks infeasible.</t>
            </li>
          </ul>
          <t>The next question is how to protect systems when legacy clients do not send Message-Authenticator.</t>
        </section>
        <section anchor="limit-proxy-state">
          <name>Updated Servers and Legacy Clients</name>
          <t>We mandate the following new behavior for RADIUS servers:</t>
          <ul empty="true">
            <li>
              <t>When receiving an Access-Request which passes the above checks and the "require Message-Authenticator" flag is set to "false", servers MUST then consult the value of the "limit Proxy-State" flag for the client.</t>
              <t>If "limit Proxy-State" is set to "false", RADIUS servers MUST follow legacy behavior for validating and enforcing the existence of Message-Authenticator in Access-Request packets.  For example, enforcing the requirement that all packets containing EAP-Message also contain a Message-Authenticator attributes, but otherwise accepting and validating the Message-Authenticator attribute if it is present, while taking no action if the attribute is missing.  This behavior is the same as mandated by the previous section.</t>
              <t>If "limit Proxy-State" is set to "true",  RADIUS servers MUST require that all Access-Request packets which contain a Proxy-State attribute also contain a Message-Authenticator attribute.  Access-Request packets which contain Proxy-State but no Message-Authenticator MUST be silently discarded.</t>
              <t>If the packet does contain a Message-Authenticator. servers MUST validate its contents, and discard packets which fail this validation (<xref section="5.14" sectionFormat="comma" target="RFC2869"/>).</t>
            </li>
          </ul>
          <t>This flag is motivated by the realization that most NASes (i.e. not proxies) will never send Proxy-State in an Access-Request packet.  If a server sees Proxy-State in a packet from a NAS, it is a strong signal that an attacker is attempting the BlastRADIUS attack.  The BlastRADIUS attack depends on the construction and behavior of Proxy-State, and the attack is essentially impossible without using Proxy-State in an Access-Request.</t>
          <t>It is therefore safe to add a configuration flag which checks for Proxy-State, because well-behaving NASes will never send it.  The only time the server will see a Proxy-State from a NAS is when the attack is taking place.</t>
          <t>The behavior of this flag is not to simply discard Access-Request packets which contain an "unexpected" Proxy-State.  Instead, the behavior is to require such packets to be authenticated.  If a packet is authenticated via the existence of Message-Authenticator with validated contents, then the existence (or not) of Proxy-State does not matter; the packet should be accepted and processed by the server.</t>
          <t>On the other hand, if the packet cannot be authenticated via the use of Message-Authenticator, then the existence of an unexpected Proxy-State is suspicious, and the packet should be discarded.</t>
          <t>As with the previous section, servers SHOULD log a message when packets are discarded due to this flag.  Servers MAY also send an error response, subject to the caveats and considerations described in the previous section for those responses.</t>
        </section>
        <section anchor="further-explanation-and-comments">
          <name>Further Explanation and Comments</name>
          <t>The "require Message-Authenticator" flag is needed in order to secure the RADIUS protocol.  Once all Access-Request packets are required to contain a valid Message-Authenticator, the BlastRADIUS attack is impossible.</t>
          <t>However, it may not be possible to upgrade all RADIUS clients.  Some products may no longer be supported, or some vendors have gone out of business.  Even if upgrades are available, the upgrade process may impact production networks, which has a cost.  There is therefore a need for RADIUS servers to protect themselves from to the BlastRADIUS attack, while at the same time being compatible with legacy RADIUS client implementations.</t>
          <t>Enabling the "limit Proxy-State" flag allows legacy (i.e. non-upgraded) clients to be used without substantially compromising on security.  While it is theoretically possible to perform the BlastRADIUS attack via attributes other than Proxy-State, no such exploits are known at this time.  Any such exploit would require that the server receive fields under the attackers control (e.g. User-Name), and echo them back in a response.  Such attacks are only possible when the server is configured to echo back attacker-controlled data, which is not the default behavior for most servers.</t>
          <t>As a result, these two flags allow the maximum amount of security while having the minimum disruption to operational networks.  For the remaining attack vectors, is is RECOMMENDED that servers which echo back user-supplied data in responses do so only when the "require Message-Authenticator" flag is set to "true".  If such user-supplied data is echoed back in responses when the "require Message-Authenticator" flag is set "false", then the BlastRADIUS attack is theoretically still possible, even though no exploit is currently available.</t>
          <t>The two configuration flags on the server will protect the server even if clients have not been upgraded or been configured to be secure.  The server configuration flags will not protect clients (NASes or proxies) from servers which have not been upgraded or been configured to be secure.  More behavior changes to servers and clients are required.</t>
        </section>
        <section anchor="server-responses-to-access-request">
          <name>Server Responses to Access-Request</name>
          <t>We mandate the following behavior for servers when sending responses to Access-Request packets:</t>
          <ul empty="true">
            <li>
              <t>Servers MUST add Message-Authenticator as the first attribute in all responses to Access-Request packets.  That is, all Access-Accept, Access-Reject, Access-Challenge, and Protocol-Error packets.  The attribute MUST be the first one in the packet, immediately after the 20 octet packet header.</t>
            </li>
          </ul>
          <t>Adding Message-Authenticator as the first attribute means that for the purposes of MD5 known prefix attacks, the unknown suffix begins with the Message-Authenticator, and continues for the remainder of the packet.  The attacker is therefore unable to leverage the attack using a known prefix, and the vulnerability is mitigated.</t>
          <t>The client will validate the Response Authenticator (<xref section="3" sectionFormat="comma" target="RFC2865"/>) before accepting response, and the attacker is unable to modify the response due to the location of the Message-Authenticator.  This behavior therefore protects one client to server hop, even if the server does not require Message-Authenticator in Access-Request packets, and even if the client does not examine or validate the contents of the Message-Authenticator.</t>
          <t>When the Message-Authenticator is the last attribute in a packet (as was historically common in many implementations), the attacker can treat the Message-Authenticator as an unknown suffix, as with the shared secret.  The attacker can then calculate the prefix as before, and have the RADIUS server authenticate the packet which contains the prefix.</t>
          <t>The analysis is similar if the Message-Authenticator is in the middle of the packet, with attributes existing both before an after the Message-Authenticator.  Attributes before the Message-Authenticator can be modified, discarded, or added, while attributes after the Message-Authenticator need to remain in the packet.  We direct the reader to Section 7.2 of <xref target="BLAST"/> for a more complete description of these issues.</t>
          <t>As a result, adding a Message-Authenticator anywhere other than as the first one will only mitigate the attack if the client implements the "require Message-Authenticator" flag, and has set that flag to "true".  Since there is no feature negotiation in RADIUS, the server has no way of knowing the clients configuration, and therefore needs to behave as if the client has the most insecure configuration.</t>
          <t>The location of the Message-Authenticator attribute is therefore critical to protect legacy clients which do not check for its existence or validate its contents.  Many legacy clients do not send Message-Authenticator in Access-Request packets, and therefore are highly likely to not validate it in responses to those Access-Requests.  Upgrading all of these clients may be difficult, or in some cases impossible.  It is therefore important to have mitigation factors which protect those systems.</t>
          <t>We note that Message-Authenticator has been defined for almost twenty-five (25) years, since <xref target="RFC2869"/>.  All standards-compliant clients will validate Message-Authenticator; or if they do not validate it, should ignore it.  Since the publication of the original BlastRADIUS notification, it has become clear that some implementations do not behave as expected.  That is, they discard packets which contain an unexpected Message-Authenticator attribute, even though that behavior is entirely unreasonable, and is not required by any existing standard.</t>
          <t>There is very little to be done for such systems.  The behavior mandated by this specification causes problems for such systems.   The only way for RADIUS servers to be compatible with those systems is to never send Message-Authenticator in responses.  However, doing so would open up significantly more systems to the BlastRADIUS attack.</t>
          <t>In the end, the only safe solution is to declare that systems which discard packets containing Message-Authenticator are not compliant with the RADIUS specifications.  We do not decrease the security of the RADIUS protocol in order to allow the continued existence of insecure and non-compliant implementations.  In order to prevent such issues from happening in the future, we now define mandated behavior for unknown attributes in <xref target="unknown-attributes"/>, below.  In short, there is no reason for implementations to discard response packets, simply because they do not recognize an attribute contained therein.</t>
          <t>As it is difficult to upgrade both clients and servers simultaneously, we also need a method to protect clients when the server has not been updated.  That is, clients cannot depend on the Message-Authenticator existing in response packets.  Clients need to take additional steps to protect themselves, independent of any server updates.</t>
        </section>
        <section anchor="clients-receiving-responses">
          <name>Clients Receiving Responses</name>
          <t>We mandate the following new behavior for RADIUS clients:</t>
          <ul empty="true">
            <li>
              <t>When receiving any response to an Access-Request packet (Access-Accept, Access-Challenge, Access-Reject, or Protocol-Error), clients MUST consult the value of the "require Message authenticator" flag prior to accepting the packet for processing.  This flag MUST NOT be consulted for responses to other types of request packets.</t>
              <t>If "require Message-Authenticator" is set to “false”, RADIUS clients MUST follow legacy behavior for validating and enforcing the existence of Message-Authenticator in response packets.  For example, enforcing the requirement that all packets containing EAP-Message also contain a Message-Authenticator attributes, but otherwise accepting and validating the Message-Authenticator attribute if it is present, while taking no action if the attribute is missing.</t>
              <t>If "require Message-Authenticator" is set to “true”, the client MUST examine the response packets for the existence of the Message-Authenticator attributes.  Response packets which do not contain Message-Authenticator MUST be silently discarded. This check MUST be done before the Response Authenticator or Message-
Authenticator has been verified.  No further processing of discarded packets should take place.</t>
              <t>The client MUST validate the contents of the Message-Authenticator and discard packets which fail this validation (<xref section="5.14" sectionFormat="comma" target="RFC2869"/>).</t>
              <t>Clients MUST NOT discard a packet based on the location of the Message-Authenticator attribute.  We extend <xref section="5" sectionFormat="comma" target="RFC2865"/> to state that RADIUS clients and servers MUST NOT discard packets based on the order or location of any attribute.  If Message-Authenticator passes validation, then the packet is authentic and it has not been modified.  The location of Message-Authenticator within the packet does not matter for authenticated packets.</t>
            </li>
          </ul>
          <t>When the response is discarded, the client MUST behave as if no response was received.  That is, any existing retransmission timers MUST NOT be modified as a result of receiving a packet which is silently discarded.</t>
          <t>Unfortunately, the client cannot determine if a packet was discarded due to an active attack, or if it was discarded due to a mismatched configuration between client and server (e.g. mis-matched shared secret).  The client SHOULD log the fact that the packet was discarded (with rate limits) in order to inform the administrator that either an attack is underway, or that there is a configuration mismatch between client and server.</t>
          <t>The above sections have now followed a complete path from client, to server, and back again.  If each client to server hop is secured via the above methods, then by construction, the RADIUS protocol is no longer vulnerable to the BlastRADIUS attack.</t>
        </section>
        <section anchor="status-server">
          <name>Status-Server</name>
          <t>While the attack works only for Access-Request packets, Access-Accept or Access-Reject can also be sent in response to Status-Server packets (<xref target="RFC5997"/>).  In order to simplify client implementations, we mandate the following new behavior with respect to Status-Server:</t>
          <ul empty="true">
            <li>
              <t>Servers MUST follow the above recommendations relating to Message-Authenticator when sending Access-Accept, Access-Challenge, or Access-Reject packets, even if the original request was Status-Server.</t>
            </li>
          </ul>
          <t>This requirement ensures that clients can examine responses independent of any requests.  That is, a client can perform a simple verification pass of response packets prior to doing any more complex correlation of responses to request.</t>
          <t>We note that <xref section="3" sectionFormat="comma" target="RFC5997"/> states:</t>
          <ul empty="true">
            <li>
              <t>.. all Status-Server packets MUST include a Message-Authenticator attribute.  Failure to do so would mean that the packets could be trivially spoofed.</t>
            </li>
          </ul>
          <t>As a result, compliant implementations of <xref target="RFC5997"/> do not need to change their behavior with respect to sending or receiving Status-Server packets: they are already protected against the BlastRADIUS attack.</t>
        </section>
      </section>
      <section anchor="related-issues">
        <name>Related Issues</name>
        <t>This section contains discussions of issues related to the BlastRADIUS vulnerability which do not involve changes to the RADIUS protocol.  It also explains why some solutions which may seem appealing are instead inadequate or inappropriate.</t>
        <section anchor="documentation-and-logging">
          <name>Documentation and Logging</name>
          <t>It is RECOMMENDED that RADIUS server implementations document the behavior of these flags in detail, including how they help protect against this attack.  We believe that an informed administrator is more likely to engage in secure practices.</t>
          <t>Similarly, when either of the above flags cause a packet to be discarded, the RADIUS server SHOULD log a descriptive message (subject to rate limiting) about the problematic packet.  This log is extremely valuable to administrators who wish to determine if anything is going wrong, and what to do about it.</t>
        </section>
        <section anchor="alternative-solutions">
          <name>Alternative Solutions</name>
          <t>An alternative configuration flag with a similar effect to the “limit Proxy-State” flag could be one called “this client is a NAS, and will never send Proxy-State”.  The intention for such a flag would be to clearly separate RADIUS proxies (which always send Proxy-State), from NASes (which will never send Proxy-State).  When the flag is set for a client, the server could then discard Access-Request packets which contain Proxy-State.  Alternatively, the server could also discard Proxy-State from all responses sent to that client.</t>
          <t>Such a flag, however, depends on network topology, and fails to correct the underlying lack of packet authenticity and integrity.  The flag may also work for one NAS, but it is likely to be incorrect if the NAS is replaced by a proxy.  Where there are multiple different pieces of NAS equipment behind a NAT gateway, the flag is also likely to be correct for some packets, and incorrect for others.</t>
          <t>Setting configuration flags by the desired outcome is preferable to setting flags which attempt to control network topology.</t>
        </section>
        <section anchor="non-mitigations">
          <name>Non-Mitigations</name>
          <t>It may be tempting to come up with other "ad hoc" solutions to this vulnerability.  Such solutions are NOT RECOMMENDED, as they are likely to either break existing RADIUS deployments, or else they will not prevent the attack.  The mitigations described in this document not only prevent the attack, they do so without affecting normal RADIUS operation.  There is therefore no reason to use any other methods.</t>
          <t>Other attempted mitigation factors are discussed in the "BlastRADIUS" document.  For example, "BlastRADIUS" Section 7.4 explains why decreasing timeouts simply increases the cost of the attack without preventing it.  Decreasing timeouts also can negatively affect normal traffic.</t>
          <t><xref target="BLAST"/> Section 7.7 explains why clients validating Proxy-State, or looking for unexpected Proxy-State does not protect from the attack.  The attacker can likely just change the nature of the attack, and bypass those checks.</t>
          <t>There is no reason to implement “ad hoc” solutions when a solution exists which has passed reviews by both the BlastRADIUS cryptographers, and by the IETF RADEXT working group.  There is every reason to believe that cryptographic operations designed by experts and subject to rigorous peer review are better than random guesses made by programmers lacking relevant cryptographic and RADIUS experience.</t>
          <t>Similarly, switching away from RADIUS to another protocol will not protect from the attack, as there is no other protocol which can replace RADIUS.  No other protocol is supported by medium to low-end networking devices for end-user authentication, authorization, and accounting.  Outside of situations where Diameter is used, the choice for nearly every use-case which controls network access is limited to one protocol: RADIUS.</t>
          <t>Despite this reality, some "security" sites have recommended "securing" the network by switching to "alternative" protocols.  Such recommendations are incorrect and inappropriate.</t>
          <t>Diameter <xref target="RFC6733"/> is the closest protocol in functionality to RADIUS, but the Diameter use-case is applicable to large-scale telecommunications and internet service providers (ISPs).  Support for Diameter is not available in equipment available to consumers or enterprises.  As such, replacing RADIUS with Diameter is not an option.</t>
          <t>Other proposals for protocols to replace RADIUS are even less effective.  TACACS+ <xref target="RFC8907"/> has some overlap with RADIUS for administrator login to network devices, but it cannot be used outside of that limited scope.  TACACS+ does not support 802.1X, end-user authentication, or end-user accounting.  It is therefore impossible for an ISP or enterprise to replace RADIUS with TACACS+.</t>
          <t>Kerberos <xref target="RFC4120"/> is also not a option.  It is most generally used to authenticate applications, when the underlying system already has network access.  Kerberos also does not support 802.1X, and does not support accounting.</t>
          <t>The situation is much the same with any proposal to replace RADIUS with IPsec.  While IPsec does authenticates devices prior to bringing up the VPN, those devices must already have network access.  IPsec also requires that the end-user traffic be transported over the IPsec connection, where RADIUS does not transport any end-user traffic.</t>
          <t>In conclusion, recommendations to use alternate protocols are, at best, misguided.  We do not recommend following "security" advice which is based on a fundamental misunderstanding of networking protocols.</t>
        </section>
        <section anchor="network-operators">
          <name>Network Operators</name>
          <t>The most important outcome of this attack for network operators is that where possible, all RADIUS traffic should use TLS transport between client and server.</t>
          <t>Methods other than IPsec to mitigate the attack are less secure, they still fail at adding privacy, and are therefore less useful.  We recognize that not all networking equipment supports TLS transport, so we therefore give additional recommendations here which operators can follow to help mitigate the attack.</t>
          <t>All networking equipment should be physically secure.  There is no reason to have critical portions of networking infrastructure physically accessibly to the public.  Where networking equipment must be in public areas (e.g. access points), that equipment SHOULD NOT have any security role in the network.  Instead, any network security validation or enforcement SHOULD be done by separate equipment which is in a physically secure location.</t>
          <t>It is RECOMMENDED that all RADIUS traffic be sent over a management VLAN.  This recommendation should be followed even if TLS transport is used.  There is no reason to mix user traffic and management traffic on the same network.</t>
          <t>Using a management network for RADIUS traffic will generally prevent anyone other than trusted administrators from performing this attack.  We say “generally”, because security is limited by the least secure part of the network.  If a network device has some unrelated vulnerability, then an attacker could exploit that vulnerability to gain access to the management network.  The attacker would then be free to exploit this issue.</t>
          <t>Only the use of TLS will prevent such attacks from being chained together.</t>
          <t>Similarly, there are few reasons to use RADIUS/TCP.  Any system which supports RADIUS/TCP likely also supports TLS, and that should be used instead.</t>
          <t>Finally, any RADIUS/UDP or RADIUS/TCP traffic MUST NOT be sent over public networks such the Internet. This issue is discussed in more detail later in this document.</t>
        </section>
      </section>
      <section anchor="limitations-of-the-mitigations">
        <name>Limitations of the Mitigations</name>
        <t>The above mitigations have some limitations.  The design of the mitigations had to allow for backwards compatibility with legacy RADIUS systems, while still allowing for (but not requiring) whole-sale network upgrades.  There is a trade-off to be made between perfectly secure networks which are unusable, and networks which are usable but somewhat insecure.  The mitigations outlined here create as much security as possible, while still not breaking existing networks.</t>
        <t>The result is that there are situations where a network is functional, but insecure.  This section outlines those limitations.</t>
        <section anchor="vulnerable-systems">
          <name>Vulnerable Systems</name>
          <t>A RADIUS server is vulnerable to the attack if it does not require that all received Access-Request packets contain a Message-Authenticator attribute.  This vulnerability exists for many common uses of Access-Request, including packets containing PAP, CHAP, MS-CHAP, or packets containing “Service-Type = Authorize-Only”.   The vulnerability is also transitive.  If any one RADIUS server in a proxy chain is vulnerable, then the attack can succeed, and the attacker can gain unauthenticated and/or unauthorized access.</t>
          <t>Simply having the Message-Authenticator attribute present in Access-Request packets is not sufficient.  In order to be protected, a server must require that the attribute is present, and discard packets where it is missing.  Similarly, the client must also require that the attribute is present, and discard packets where it is missing.</t>
          <t>The attack is fully mitigated only when both sides of the RADIUS conversation are updated and configured correctly.</t>
        </section>
        <section anchor="unaffected-systems">
          <name>Unaffected Systems</name>
          <t>There are a number of systems which are not vulnerable to this attack.  The most important ones are systems which only perform EAP authentication, such as with 802.1X / WPA Enterprise.  The EAP over RADIUS protocol is defined in <xref section="3.3" sectionFormat="comma" target="RFC3579"/> which states explicitly:</t>
          <ul empty="true">
            <li>
              <t>If any packet type contains an EAP-Message attribute it MUST also contain a Message-Authenticator.</t>
            </li>
          </ul>
          <t>This requirement reiterates that of <xref section="5.13" sectionFormat="comma" target="RFC2869"/>, which defines EAP-Message and Message-Authenticator, but which does not get into details about EAP.</t>
          <t>This requirement is enforced by all known RADIUS servers.  As a result, when roaming federations such as eduroam use RADIUS/UDP, it is not possible for the attack to succeed.</t>
          <t>Other roaming groups such as OpenRoaming require the use of TLS, and are not vulnerable.  Other roaming providers generally use VPNs to connect disparate systems, and are also not vulnerable.</t>
          <t>802.1X / WPA enterprise systems have an additional layer of protection, due to the use of the master session keys (MSK) which are derived from the EAP authentication method.  These keys are normally carried in an Access-Accept, in the MS-MPPE-Recv-Key and MS-MPPE-Send-Key attributes, and are used to secure the link between the NAS and the supplicant.  The contents of the attributes are obfuscated via the same method used for Tunnel-Password, and are not visible to an "on-path" attacker.</t>
          <t>While an attacker can perhaps force an Access-Accept in some situations, or strip the Message-Authenticator from packets, it is not currently possible for an attacker to see, modify, or create the correct MSK for the EAP session.  As a result, when 802.1X / WPA enterprise is used, even a successful attack on the Access-Accept packet would likely not result in the attacker obtaining network access.</t>
        </section>
        <section anchor="the-weakest-link">
          <name>The Weakest Link</name>
          <t>RADIUS security is done on a “hop by hop” basis, which means that an attacker can take advantage of the weakest link in a proxy chain in order to attack other systems which have fully implemented the above mitigations.  If the packets are passed through one or more proxies, then any one vulnerable proxy will still allow the attack to take place.</t>
          <t>If proxies are used, then the weakest link in the proxy chain limits the security of the entire chain. That is, it does not matter if one hop implements RADIUS/TLS, if another hop implements RADIUS/UDP without sending or requiring Message-Authenticator.</t>
          <t>Even worse, proxies have full control over packet contents.  A malicious proxy can change a reject into an accept, and can add or delete any authorization attributes it desires.  While proxies are generally part of a trusted network, there is every benefit in limiting the number of participants in the RADIUS conversation.</t>
          <t>Proxy chains SHOULD therefore be avoided where possible, and <xref target="RFC7585"/> dynamic discovery should be used where possible.  RADIUS clients and servers SHOULD also be configured with static IP addresses, and with static routes.  This static configuration also protects the systems from DHCP related attacks where an attacker spoofs DHCP to cause clients or servers to route packets through the a system of the attackers choice.</t>
        </section>
      </section>
      <section anchor="proxy-state">
        <name>Note on Proxy-State</name>
        <t>As the BlastRADIUS paper points out in Appendix A:</t>
        <ul empty="true">
          <li>
            <t>The presence of this attribute makes the protocol vulnerability much simpler to exploit than it would have been otherwise.</t>
          </li>
        </ul>
        <t>To see why Proxy-State has this particular design, we go back to the original discussion in May 1995 <xref target="MAY-1995"/></t>
        <ul empty="true">
          <li>
            <t>The RADIUS proxy may place any state information (subject to the length
limitations of a RADIUS attribute) that it will need to transform a
reply from its server into a reply to its client.  This is typically
the original authenticator, identifier, IP address and UDP port number
of the proxy's RADIUS client.</t>
          </li>
        </ul>
        <t>There appear to be few, if any, RADIUS servers which implemented this suggestion.  In part because later discussions note:</t>
        <ul empty="true">
          <li>
            <t>This works only if the NAS is
prepared to accept replies from a proxy server for a request issued to
a different server.</t>
          </li>
        </ul>
        <t>This stateless proxy design has a number of additional issues, most notably violating the <xref target="RFC3539"/> "end-to-end" principle.  It therefore negatively impacts the stability of a RADIUS proxy system.</t>
        <t>This definition for Proxy-State later changed in <xref section="5.33" sectionFormat="comma" target="RFC2865"/> to</t>
        <ul empty="true">
          <li>
            <t>Usage of the Proxy-State Attribute is implementation dependent.  A
description of its function is outside the scope of this
specification.</t>
          </li>
        </ul>
        <t>In practice, the utility of Proxy-State is limited to detecting proxy loops.  Proxies can count the number of Proxy-State attributes in received packets, and if the total is more than some number, then a proxy loop is likely.  We offer no advice on what to do if a proxy loop is detected, as RADIUS has no ability to signal protocol-layer errors.</t>
        <t>It is likely that a "hop count" attribute would likely have been simpler to implement, but even in 1996, it was likely difficult to change the behavior of proxies due to multiple implementations.</t>
      </section>
      <section anchor="intrusion-detection-systems">
        <name>Intrusion Detection Systems</name>
        <t>Intrusion detection systems can be updated to detect and/or warn about the attack with the following rules.  In the interests of brevity and generality, the rules are written as plain text.</t>
        <ol spacing="normal" type="1"><li>
            <t>Access-Request does not contain a Message-Authenticator attribute.  </t>
            <t>
Action: Warn the administrator that the system is vulnerable, and should be upgraded.</t>
          </li>
          <li>
            <t>Access-Accept, Access-Reject, or Access-Challenge does not contain a Message-Authenticator attribute.  </t>
            <t>
Action: Warn the administrator that the system is vulnerable, and should be upgraded.</t>
          </li>
          <li>
            <t>Access-Accept, Access-Reject, or Access-Challenge contains a Message-Authenticator attribute, but it is not the first attribute in the packet.  </t>
            <t>
Action: Warn the administrator that the system may be vulnerable, and should be upgraded.</t>
          </li>
          <li>
            <t>Access-Request packet received by a RADIUS server contains Proxy-State, when the RADIUS client is a NAS.  </t>
            <t>
Action: Alert that an attack is likely taking place.  </t>
            <t>
Note that the check should be for packets received by the RADIUS server, and not for packets sent by the NAS.  The attack involves packets being modified after they are sent by the NAS, and before they are received by the RADIUS server.</t>
          </li>
          <li>
            <t>Access-Accept, Access-Reject, or Access-Challenge sent by a RADIUS server contain Proxy-State, when the RADIUS client is a NAS.  </t>
            <t>
Action: Alert that an attack is likely taking place.  </t>
            <t>
Note that the check should be for packets sent by the RADIUS server, and not for packets received by the NAS.  The attacker can modify packets to "hide" Proxy-State in another attribute, such as Vendor-Specific.</t>
          </li>
          <li>
            <t>Any RADIUS traffic is sent over UDP or TCP transport, without IPsec or TLS.  </t>
            <t>
Action: Warn that the system uses deprecated transport protocols, and should be upgraded.</t>
          </li>
          <li>
            <t>Any RADIUS traffic is sent external to the organization over UDP or TCP transport, without IPsec or TLS.  </t>
            <t>
Action: Warn that this is an insecure configuration, and can expose users private data, identities, passwords, locations, etc. to unknown attackers.</t>
          </li>
        </ol>
        <t>These rules should assist administrators with ongoing security and monitoring.</t>
      </section>
    </section>
    <section anchor="deprecating-insecure-transports">
      <name>Deprecating Insecure Transports</name>
      <t>The solution to an insecure protocol which uses thirty year-old cryptography is to deprecate the use insecure cryptography, and to mandate modern cryptographic transport.</t>
      <section anchor="deprecating-radiusudp-and-radiustcp">
        <name>Deprecating RADIUS/UDP and RADIUS/TCP</name>
        <t>RADIUS/UDP and RADIUS/TCP MUST NOT be used outside of secure networks.  A secure network is one which is believed to be safe from eavesdroppers, attackers, etc.  For example, if IPsec is used between two systems, then those systems may use RADIUS/UDP or RADIUS/TCP over the IPsec connection.</t>
        <t>However, administrators should not assume that such uses are always secure.  An attacker who breaks into a critical system could use that access to view RADIUS traffic, and thus be able to attack it.  Similarly, a network misconfiguration could result in the RADIUS traffic being sent over an insecure network.</t>
        <t>Neither the RADIUS client nor the RADIUS server would be aware of any network misconfiguration (e.g. such as could happen with IPsec).  Neither the RADIUS client nor the RADIUS server would be aware of any attacker snooping on RADIUS/UDP or RADIUS/TCP traffic.</t>
        <t>In contrast, when TLS is used, the RADIUS endpoints are aware of all security issues, and can enforce any necessary security policies.</t>
        <t>Any use of RADIUS/UDP and RADIUS/TCP is therefore NOT RECOMMENDED, even when the underlying network is believed to be secure.</t>
      </section>
      <section anchor="mandating-secure-transports">
        <name>Mandating Secure transports</name>
        <t>All systems which send RADIUS packets outside of secure networks MUST use either IPsec, RADIUS/TLS, or RADIUS/DTLS.  For operational and security reasons, it is RECOMMENDED to use RADIUS/TLS or RADIUS/DTLS instead of IPsec.</t>
        <t>Unlike (D)TLS, use of IPsec means that applications are generally unaware of transport-layer security. Any problem with IPsec such as configuration issues, negotiation or re-keying problems are typically  presented to the RADIUS servers as 100% packet loss.  These issues may occur at any time, independent of any changes to a RADIUS application using that transport.  Further, network misconfigurations which remove all security are completely transparent to the RADIUS application: packets can be sent over an insecure link, and the RADIUS server is unaware of the failure of the security layer.</t>
        <t>In contrast, (D)TLS gives the RADIUS application completely knowledge and control over transport-layer security.  The failure cases around (D)TLS are therefore often clearer, easier to diagnose and faster to resolve than failures in IPsec.   For example, a failed TLS connection may return a "connection refused" error to the application, or any one of many TLS errors indicating which exact part of the TLS conversion failed during negotiation.</t>
      </section>
      <section anchor="crypto-agility">
        <name>Crypto-Agility</name>
        <t>The crypto-agility requirements of <xref target="RFC6421"/> are addressed in <xref target="RFC6614"/> Appendix C, and in Section 10.1 of <xref target="RFC7360"/>.  For clarity, we repeat the text of <xref target="RFC7360"/> here, with some minor modifications to update references, without changing the content.</t>
        <t>Section 4.2 of <xref target="RFC6421"/> makes a number of recommendations about security properties of new RADIUS proposals.  All of those recommendations are satisfied by using TLS or DTLS as the transport layer.</t>
        <t>Section 4.3 of <xref target="RFC6421"/> makes a number of recommendations about backwards compatibility with RADIUS.  <xref target="RFC7360"/> Section 3 addresses these concerns in detail.</t>
        <t>Section 4.4 of <xref target="RFC6421"/> recommends that change control be ceded to the IETF, and that interoperability is possible.  Both requirements are satisfied.</t>
        <t>Section 4.5 of <xref target="RFC6421"/> requires that the new security methods apply to all packet types.  This requirement is satisfied by allowing TLS and DTLS to be used for all RADIUS traffic.  In addition, <xref target="RFC7360"/> Section 3, addresses concerns about documenting the transition from legacy RADIUS to crypto-agile RADIUS.</t>
        <t>Section 4.6 of <xref target="RFC6421"/> requires automated key management.  This requirement is satisfied by using TLS or DTLS key management.</t>
        <t>We can now finalize the work began in <xref target="RFC6421"/>.  This document updates <xref target="RFC2865"/> to state that any new RADIUS specification MUST NOT introduce new "ad hoc" cryptographic primitives to authenticate packets as was done with the Request / Response Authenticator, or to obfuscate attributes as was done with User-Password and Tunnel-Password.  We allow legacy RADIUS-specific cryptographic methods existing as of the publication of this document to be used for historical compatibility.  However, all new cryptographic work which is specific to the RADIUS protocol is forbidden.</t>
        <t>We recognize that RADIUS/UDP will still be in use for many years, and that new standards may require some modicum of privacy.  As the BlastRADIUS attack shows, RADIUS/UDP security is inadequate.  The solution is not to fix RADIUS/UDP.  The solution is to deprecate it entirely.</t>
        <t>All new security and privacy requirements in RADIUS MUST be provided by a secure transport layer such as TLS or IPsec.  As noted above, simply using IPsec is not always enough, as the use (or not) of IPsec is unknown to the RADIUS application.</t>
        <t>The restriction forbidding new cryptographic work in RADIUS does not apply to the data being transported in RADIUS attributes.  For example, a new authentication method could use new cryptographic methods, and would be permitted to be transported in RADIUS.  This authentication method could be a new EAP method, or any other data which is opaque to the RADIUS transport.  In those cases, RADIUS serves as a transport layer for the authentication method.  The authentication data is treated as opaque data for the purposes of Access-Request, Access-Challenge, etc. packets.  There would be no need for the RADIUS protocol to define any new cryptographic methods in order to transport this data.</t>
        <t>Similarly, new specifications MAY define new attributes which use the obfuscation methods for User-Password as defined in <xref target="RFC2865"/> Section 5.2, or for Tunnel-Password as defined in <xref target="RFC2868"/> Section 3.5.  However, due to the issues noted above in <xref target="tunnel-coa"/>, the Tunnel-Password obfuscation method MUST NOT be used for packets other than Access-Request, Access-Challenge, and Access-Accept.  If the attribute needs to be send in another type of packet, then the protocol design is likely wrong, and needs to be revisited.  It is again a difficult choice to forbid certain uses of the Tunnel-Password obfuscation method, but we believe that doing so is preferable to allowing sensitive data to be obfuscated with less security than the original design intent.</t>
      </section>
    </section>
    <section anchor="migration-path-and-recommendations">
      <name>Migration Path and Recommendations</name>
      <t>We recognize that it is difficult to upgrade legacy devices with new cryptographic protocols and user interfaces.  The problem is made worse because of the volume of RADIUS devices which are in use.  The exact number is unknown, and can only be approximated.  Our best guess is that at the time of this writing there are millions of devices supporting RADIUS/UDP in daily use.  It takes significant time and effort to correct the deficiencies of all of them.</t>
      <t>We therefore need to define a migration path to using secure transports.  In the following sections, we give a number of migration steps which could each be done independently.  We recommend increased entropy for shared secrets.  We also mandate the use of Message-Authenticator in all Access-Request packets for RADIUS/UDP and RADIUS/TCP.  Finally, where <xref target="RFC6614"/> Section 2.3 makes support for TLS-PSK optional, we suggest that RADIUS/TLS and RADIUS/DTLS implementations SHOULD support TLS-PSK.</t>
      <section anchor="shared-secrets">
        <name>Shared Secrets</name>
        <t><xref target="RFC2865"/> Section 3 says:</t>
        <ul empty="true">
          <li>
            <t>It is preferred that the secret be at least 16
octets.  This is to ensure a sufficiently large range for the
secret to provide protection against exhaustive search attacks.
The secret MUST NOT be empty (length 0) since this would allow
packets to be trivially forged.</t>
          </li>
        </ul>
        <t>This recommendation is no longer adequate, so we strengthen it here.</t>
        <t>RADIUS implementations MUST support shared secrets of at least 32 octets, and SHOULD support shared secrets of 64 octets.  Implementations MUST warn administrators that the shared secret is insecure if it is 12 octets or less in length.</t>
        <t>Administrators SHOULD use shared secrets of at least 24 octets, generated using a source of secure random numbers.   Any other practice is likely to lead to compromise of the shared secret, user information, and possibly of the entire network.</t>
        <t>Creating secure shared secrets is not difficult.  The following figure outlines four separate ways to create shared secrets.</t>
        <artwork><![CDATA[
    openssl rand -base64 16

    dd if=/dev/urandom bs=1 count=16 | base64

    dd if=/dev/urandom bs=1 count=16 | base32

    dd if=/dev/urandom bs=1 count=16 |
        (hexdump -ve '/1 "%02x"' && echo)
]]></artwork>
        <t>Only one of the above commands should be run, as they are functionally equivalent.  Each command reads 128 bits (16 octets) of random data from a secure source, and encodes it as printable / readable ASCII.  This form of PSK will be accepted by any implementation which supports at least 32 octets for PSKs.  Larger PSKs can be generated by changing the "16" number in the command to a larger value.  The above derivation assumes that the random source returns one bit of entropy for every bit of randomness which is returned.  Sources failing that assumption are NOT RECOMMENDED.</t>
        <t>Given the simplicity of creating strong secrets, there is no excuse for using weak shared secrets with RADIUS.  The management overhead of dealing with complex secrets is less than the management overhead of dealing with compromised networks.</t>
        <t>Over all, the security analysis of shared secrets is similar to that for TLS-PSK.  It is therefore RECOMMENDED that implementers manage shared secrets with same the practices which are recommended for TLS-PSK, as defined in <xref target="RFC8446"/> Section E.7 and <xref target="RFC9257"/> Section 4.</t>
        <t>On a practical node, RADIUS implementers SHOULD provide tools for administrators to help them create and manage secure shared secrets.  The cost to do so is minimal for an implementer.  Providing such tools can further enable and motivate administrators to use secure practices.</t>
      </section>
      <section anchor="message-authenticator">
        <name>Message-Authenticator</name>
        <t>The Message-Authenticator attribute was defined in <xref target="RFC3579"/> Section 3.2.  The "Note 1" paragraph at the bottom of <xref target="RFC3579"/> Section 3.2 required that Message-Authenticator be added to Access-Request packets when the EAP-Message as present, and suggested that it should be present in a few other situations.   The BlastRADIUS attack has shown that these recommendations are inadequate.</t>
        <t>While the text in <xref target="blastradius"/> goes into detail about the mitigations, we summarize them here.  Please see the previous section for a longer and more detailed explanation of the flags and their behavior.</t>
        <ul empty="true">
          <li>
            <t>RADIUS clients MUST include the Message-Authenticator in all Access-Request packets when UDP or TCP transport is used.</t>
            <t>RADIUS clients and servers MUST have a boolean flag which we call "require Message-Authenticator".</t>
            <t>When set to "true", implementations receiving Access-Request, Access-Accept, Access-Challenge, Access-Reject, and Protocol-Error packets which do not contain Message-Authenticator MUST silently discard those packets.</t>
            <t>Servers MUST have a boolean flag which we call "limit Proxy-State".</t>
            <t>This flag MUST be examined when the "require Message-Authenticator" flag is set to "false".</t>
            <t>When set to "true", servers receiving an Access-Request packet which contains Proxy-State but no Message-Authenticator MUST discard that packet.</t>
          </li>
        </ul>
        <t>In contrast, when TLS-based transports are used, the Message-Authenticator attribute serves no purpose, and could be omitted, even when the Access-Request packet contains an EAP-Message attribute.  However, implementations SHOULD include it, even if it servers no immediate purpose.  As noted earlier, including Message-Authenticator can increase the security of legacy proxies which do not implement the BlastRADIUS mitigations.</t>
        <t>Servers receiving Access-Request packets over TLS-based transports SHOULD NOT silently discard a packet if it is missing a Message-Authenticator attribute.  However, if the Message-Authenticator attribute is present, it still MUST be validated as discussed in <xref target="RFC7360"/>.</t>
      </section>
      <section anchor="recommending-tls-psk">
        <name>Recommending TLS-PSK</name>
        <t>Given the insecurity of RADIUS/UDP, the absolute minimum acceptable security is to use strong shared secrets.  However, administrator overhead for TLS-PSK is not substantially higher than for shared secrets, and TLS-PSK offers significantly increased security and privacy.</t>
        <t>It is therefore RECOMMENDED that implementations support TLS-PSK.  In some cases TLS-PSK is preferable to certificates.  It may be difficult for RADIUS clients to upgrade all of their interfaces to support the use of certificates, and TLS-PSK more closely mirrors the historical use of shared secrets, with similar operational considerations.</t>
        <t>Additional implementation and operational considerations for TLS-PSK are given in <xref target="I-D.ietf-radext-tls-psk"/>.</t>
      </section>
      <section anchor="guidelines-for-administrators">
        <name>Guidelines for Administrators</name>
        <t>The above text provides guidelines for implementers.  We also need to provide guidelines for administrators as to how, and when, to configure the above flags.  The guidelines provided in this section are suggestions only.  Administrators are free to take other actions as they see fit.</t>
        <t>However, the guidelines provided here are known to provide minimal outages while upgrading complex systems.  As such, it is RECOMMENDED that administrators follow the steps outlined here, in order, so that RADIUS systems can be upgraded with minimal impact to operational networks.</t>
        <ol spacing="normal" type="1"><li>
            <t>Administrators SHOULD upgrade servers before upgrading clients.  There are many fewer clients than servers, and upgrading servers can protect clients which are not upgraded.</t>
          </li>
          <li>
            <t>Administrators SHOULD configure servers to set "limit Proxy-State" to "true" for all clients which are NASes.  i.e. clients which are not proxies.</t>
          </li>
          <li>
            <t>Administrators of servers which proxy packets SHOULD verify that all "next hop" proxies have been upgraded, and that they return Message-Authenticator in all responses to Access-Request packets.</t>
          </li>
          <li>
            <t>Once step (4) has been validated, administrators SHOULD configure their proxy so that the outgoing client configuration, sets the "require Message-Authenticator" flag to "true".</t>
          </li>
          <li>
            <t>Administrators of servers which receive proxied packets (i.e. packets not from a NAS) SHOULD configure the server to set the the "require Message-Authenticator" flag to "true" for each client which is an upgraded proxy.</t>
          </li>
        </ol>
        <t>Once the above five steps are followed, the network should be secure, and any client upgrade and configuration can be done over time.</t>
        <t>For client upgrades, administrators can proceed with the following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>Administrators SHOULD upgrade clients individually, i.e. one at a time. Upgrading multiple clients at the same time is NOT RECOMMENDED.</t>
          </li>
          <li>
            <t>Once a client has been upgraded, administrators SHOULD verify that it sends Message-Authenticator in all Access-Request packets.</t>
          </li>
          <li>
            <t>Once step (2) has been validated, administrators SHOULD configure each server receiving packets from that client to set the "require Message-Authenticator" flag to "true" for that client.</t>
          </li>
          <li>
            <t>If a server has been updated, administrators SHOULD verify that it sends Message-Authenticator as the first attribute in all responses to Access-Request packets.</t>
          </li>
          <li>
            <t>Once step (4) has been validated, administrators SHOULD configure each client receiving packets from that server to set the "require Message-Authenticator" flag to "true" for that server.</t>
          </li>
        </ol>
        <t>Once all of the above steps are followed for all clients and servers, the network is secure from the BlastRADIUS attack.</t>
      </section>
    </section>
    <section anchor="increasing-the-security-of-radius">
      <name>Increasing the Security of RADIUS</name>
      <t>While we still permit the use of UDP and TCP transports in secure environments, there are opportunities for increasing the security of RADIUS when those transport protocols are used.  The amount of personal identifiable information (PII) sent in packets should be minimized.  Information about the size, structure, and nature of the visited network should be omitted or anonymized.  The choice of authentication method also has security and privacy impacts.</t>
      <t>The recommendations here for increasing the security of RADIUS transports also applies when TLS is used.  TLS transports protect the RADIUS packets from observation by from third-parties.  However, TLS does not hide the content of RADIUS packets from intermediate proxies, such as ones uses in a roaming environment.  As such, the best approach to minimizing the information sent to proxies is to minimize the number of proxies which see the RADIUS traffic, and to minimize the amount of PII which is sent.</t>
      <t>Implementers and administrators need to be aware of all of these issues, and then make the best choice for their local network which balances their requirements on privacy, security, and cost.  Any security approach based on a simple "checklist" of "good / bad" practices is likely to result in decreased security as compared to an end-to-end approach which is based on understanding the issues involved.</t>
      <section anchor="minimizing-personal-identifiable-information">
        <name>Minimizing Personal Identifiable Information</name>
        <t>One approach to increasing RADIUS privacy is to minimize the amount of PII which is sent in packets.  Implementers of RADIUS products and administrators of RADIUS systems SHOULD ensure that only the minimum necessary PII is sent in RADIUS.</t>
        <t>Where possible, identities should be anonymized (e.g. <xref target="RFC7542"/> Section 2.4).  The use of anonymized identities means that the the Chargeable-User-Identifier <xref target="RFC4372"/> should also be used.  Further discussion on this topic is below.</t>
        <t>Device information SHOULD be either omitted, or randomized.  e.g. MAC address randomization could be used on end-user devices.  The details behind this recommendation are the subject of ongoing research and development.  As such, we do not offer more specific recommendations here.</t>
        <t>Information about the visited network SHOULD be replaced or anonymized before packets are proxied outside of the local organization.  The attribute Operator-NAS-Identifier <xref target="RFC8559"/> can be used to anonymize information about NASes in the local network.</t>
        <t>Location information (<xref target="RFC5580"/> SHOULD either be omitted, or else it SHOULD be limited to the broadest possible information, such as country code. For example, <xref target="I-D.tomas-openroaming"/> says:</t>
        <ul empty="true">
          <li>
            <t>All OpenRoaming ANPs MUST support signaling of location information</t>
          </li>
        </ul>
        <t>This location information is required to include at the minimum the country code.  We suggest the country code SHOULD also be the maximum amount of location information which is sent over third-party networks.</t>
        <section anchor="chargeable-user-identity">
          <name>Chargeable-User-Identity</name>
          <t>Where the Chargeable-User-Identity (CUI) <xref target="RFC4372"/> is used, it SHOULD be unique per session.  This practice will help to maximize user privacy, as it will be more difficult to track users across multiple sessions.  Due to additional constraints which we will discuss below, we cannot require that the CUI change for every session.</t>
          <t>What we can do is to require that the home server MUST provide a unique CUI for each combination of user and visited network.  That is, if the same user visits multiple networks, the home server MUST provide different CUIs to each visited network for that user.  The CUI MAY be the same across multiple sessions for that user on one particular network.  The CUI MAY be the same for multiple devices used by that user on one particular network.</t>
          <t>We note that the MAC address is likely the same across multiple user sessions on one network.  Therefore changing the CUI offers little additional benefit, as the user can still be tracked by the unchanging MAC address.  Never the less, we believe that having a unique CUI per session can be useful, because there is ongoing work on increasing user privacy by allowing more MAC address randomization.  If we were to recommend that the CUI remain constant across multiple sessions, that would in turn negate much of the effort being put into MAC address randomization.</t>
          <t>One reason to have a constant CUI value for a user (or user devices) on one network is that network access providers may need to enforce limits on simultaneous logins.  Network providers may also need to correlate user behavior across multiple sessions in order to track and prevent abuse.  Both of these requirements are impossible if the CUI changes for every user session.</t>
          <t>The result is that there is a trade-off between user privacy and the needs of the local network.  While perfect user privacy is an admirable goal, perfect user privacy may also allow anonymous users to abuse the visited network.  The network would then likely simply refuse to provide network access.  Users may therefore have to accept some limitations on privacy, in order to obtain network access.</t>
          <t>Although the CUI contents are not directly related to security, we still give recommendations for creating and managing of the CUI.  We believe that these recommendations will help implementers satisfy the preceding requirements, while not imposing undue burden on the implementations.</t>
          <t>In general, the simplest way to track CUIs long term is to associate the CUI to user identity in some kind of cache or database.  This association could be created at the tail end of the authentication process, and before any accounting packets were received.  This association should generally be discarded after a period of time if no accounting packets are received.  If accounting packets are received, the CUI to user association should then be tracked along with the normal accounting data.</t>
          <t>The above method for tracking CUI works no matter how the CUI is generated.  If the CUI can be unique per session, or it could be tied to a particular user identity across a long period of time.  The same CUI could also be associated with multiple devices.</t>
          <t>Where the CUI is not unique for each session, the only minor issue is the cost of the above method is that the association is stored on a per-session basis when there is no need for that to be done.  Storing the CUI per session means that is it possible to arbitrarily change how the CUI is calculated, with no impact on anything else in the system.  Designs such as this which decouple unrelated architectural elements are generally worth the minor extra cost.</t>
          <t>For creating the CUI, that process should be done in a way which is scalable and efficient.  For a unique CUI per user, implementers SHOULD create a value which is unique both to the user, and to the visited network.  There is no reason to use the same CUI for multiple visited networks, as that would enable the tracking of a user across multiple networks.</t>
          <t>Before suggesting a method for creating the CUI, we note that <xref target="RFC4372"/> Section 2.1 defines the CUI as being of data type 'string' (<xref target="RFC8044"/> Section 3.5).  <xref target="RFC4372"/> Section 2.1 further suggests that the value of the CUI is interpreted as an opaque token, similar to the Class attribute (<xref target="RFC2865"/> Section 5.25).  Some organizations create CUI values which use the Network Access Identifier (NAI) format as defined in <xref target="RFC7542"/>.  This format can allow the home network to be identified to the visited network, where the User-Name does not contain a realm.  Such formats SHOULD NOT be used unless all parties involved have agreed to this behavior.</t>
          <t>The CUI SHOULD be created via a construct similar to what is given below, where "+" indicates concatenation:</t>
          <artwork><![CDATA[
CUI = HASH(Visited Network Data + User Identifier + Key)
]]></artwork>
          <t>This construct has the following functional parameters.</t>
          <ul empty="true">
            <li>
              <t>HASH</t>
              <ul empty="true">
                <li>
                  <t>A cryptographic hash function.  It is RECOMMENDED to use an HMAC instead of a hash function.</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>Visited Network Data</t>
              <ul empty="true">
                <li>
                  <t>Data which identifies the visited network.</t>
                  <t>This data could be the Operator-Name attribute (<xref target="RFC5580"/> Section 4.1).</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>User Identifier</t>
              <ul empty="true">
                <li>
                  <t>The site-local user identifier.  For tunneled EAP methods such as PEAP or TTLS, this could be the user identity which is sent inside of the TLS tunnel.</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>Key</t>
              <ul empty="true">
                <li>
                  <t>A secret known only to the local network.  The key is generally a large random string.  It is used to help prevent dictionary attacks on the CUI.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>Where the CUI needs to be constant across multiple user sessions or devices, the key can be a static value.  It is generated once by the home network, and then stored for use in further CUI derivations.</t>
          <t>Where the CUI needs to be unique per session, the above derivation SHOULD still be used, except that the "key" value will instead be a random number which is different for each session.  Using such a design again decouples the CUI creation from any requirement that it is unique per session, or constant per user.  That decision can be changed at any time, and the only piece which needs to be updated is the derivation of the "key" field.  In contrast, if the CUI is generated completely randomly per session, then it may be difficult for a system to later change that behavior to allow the CUI to be constant for a particular user.</t>
          <t>If an NAI format is desired, the hash output can be converted to printable text, truncated if necessary to meet length limitations, and then an "@" character and a realm appended to it.  The resulting text string is then in NAI form.</t>
          <t>We note that the above recommendation is not invertible.  That is, given a particular CUI, it is not possible to determine which visited network or user identifier was used to create it.  If it is necessary to use the CUI to look up a user, the home network needs to store the full set of CUI values which a user has been assigned.</t>
          <t>If this tracking is too complex for a network, it is possible to create the CUI via an invertible encryption process as follows:</t>
          <artwork><![CDATA[
CUI = ENCRYPT(Key + Visited Network Data + User Identifier)
]]></artwork>
          <t>This construct has the following functional parameters.</t>
          <ul empty="true">
            <li>
              <t>ENCRYPT</t>
              <ul empty="true">
                <li>
                  <t>A cryptographically secure encryption function.</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>Key</t>
              <ul empty="true">
                <li>
                  <t>The encryption key.  Note that the same key must not be used for more both hashing and encryption.</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>Visited Network Data</t>
              <ul empty="true">
                <li>
                  <t>Data which identifies the visited network.</t>
                  <t>This data could be the Operator-Name attribute (<xref target="RFC5580"/> Section 4.1).</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>User Identifier</t>
              <ul empty="true">
                <li>
                  <t>The site-local user identifier.  For tunneled EAP methods such as PEAP or TTLS, this could be the user identity which is sent inside of the TLS tunnel.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>However, it is RECOMMENDED that HMAC based methods are used instead of methods based on reversible encryption.</t>
          <t>The intent is for CUI to leak as little information as possible, and ideally be different for every session.  However, business agreements, legal requirements, etc. may mandate different behavior.  The intention of this section is not to mandate complete CUI privacy, but instead to clarify the trade-offs between CUI privacy and business realities.</t>
        </section>
      </section>
      <section anchor="user-password-visibility">
        <name>User-Password Visibility</name>
        <t>The design of RADIUS means that when proxies receive Access-Request packets, the clear-text contents of the User-Password attribute are visible to the proxy.  Despite various claims to the contrary, the User-Password attribute is never sent "in the clear" over the network.  Instead, the password is protected by TLS (RADIUS/TLS) or via the obfuscation methods defined in <xref section="5.2" sectionFormat="comma" target="RFC2865"/>.  However, the nature of RADIUS means that each proxy must first undo the password obfuscation of <xref target="RFC2865"/>, and then re-do it when sending the outbound packet.  As such, the proxy has the clear-text password visible to it, and stored in its application memory.</t>
        <t>It is therefore possible for every intermediate proxy to snoop and record all User-Name and User-Password values which they see.  This exposure is most problematic when the proxies are administered by an organization other than the one which operates the home server.  Even when all of the proxies are operated by the same organization, the temporary existence of clear-text passwords on multiple machines is a security risk.</t>
        <t>It is therefore NOT RECOMMENDED for organizations to send the User-Password attribute in packets which are sent outside of the organization.  If RADIUS proxying is necessary, another authentication method which provides for end-to-end security of user information SHOULD be used, such as EAP-TLS, TTLS, or PEAP.</t>
        <t>Client and server implementations SHOULD use secure programming techniques to wipe passwords and other sensitive data from memory when they are no longer needed.</t>
        <t>Organizations MAY still use User-Password attributes within their own systems, for reasons which we will explain below in <xref target="password-security"/>.</t>
      </section>
      <section anchor="delaying-access-rejects">
        <name>Delaying Access-Rejects</name>
        <t>Anyone can cause a NAS to send Access-Request packets at will, simply by attempting to requesting network access, or login permissions from the NAS.  If this login process is not rate-limited, it can be abused by an attacker to perform dictionary attacks.</t>
        <t>In order to prevent these brute-force attacks, servers which originate Access-Reject packets MUST enforce a minimum delay between reception of the Access-Request, and transmission of a corresponding Access-Reject.  This delay SHOULD be configurable.  Experience shows that values between one (1) second and ten (10) seconds work well in practice.</t>
        <t>Systems which simply proxy Access-Reject packets MUST NOT add any artificial delays to those packets.  Doing so would result in delays accumulating across a chain of proxies.</t>
        <t>Servers SHOULD also add a small random jitter to the delay for a particular packet, in order to better protect themselves from timing attacks.</t>
      </section>
      <section anchor="use-constant-time-comparisons">
        <name>Use Constant Time Comparisons</name>
        <t>Both clients and servers SHOULD use constant-time operations to compare received versus calculated values which depend on secret information.  If comparison operations are stopped as soon as a difference is seen, an attacker could using timing attacks to determine the correct underlying values, even without seeing them.  A constant-time operation instead compares the entire value, accumulating the result along the way.  Only when the entire value has been examined does the comparison return a "match" or "no-match" result.</t>
        <t>Constant-time operations SHOULD be used for the Request Authenticator and Response Authenticator fields.  Constant time comparisons SHOULD be used for attributes which directly contain secret values (e.g. User-Password), or are derived from secret values (e.g. CHAP-Password, and Message-Authenticator).</t>
      </section>
      <section anchor="minimize-the-use-of-proxies">
        <name>Minimize the use of Proxies</name>
        <t>The design of RADIUS means that even when RADIUS/TLS is used, every intermediate proxy has access to all of the information in each packet.  The only way to secure the network from such observers is to minimize the use of proxies.</t>
        <t>Where it is still necessary to use intermediate proxies such as with eduroam <xref target="EDUROAM"/> and OpenRoaming <xref target="OPENROAMING"/>, it is RECOMMENDED to use EAP methods instead of bare PAP, CHAP, or MS-CHAP.  If passwords are used, they can be can be protected from being seen by proxies via TLS-based EAP methods such as EAP-TTLS or PEAP.  Passwords can also be omitted entirely from being sent over the network, as with EAP-TLS <xref target="RFC9190"/> or EAP-pwd <xref target="RFC5931"/>.</t>
        <t>In many cases, however, the existence of proxies is to either due contractual obligations, or to a need to solve "N by M" connection problems.  A centralized proxy system can often simplify overall network management and maintenance.</t>
        <section anchor="there-is-no-radius-routing-protocol">
          <name>There is no RADIUS Routing Protocol</name>
          <t>While <xref target="RFC7585"/> allows for a client to connect directly to a server, that configuration is not always used.  Historically, RADIUS systems implemented realm <xref target="RFC7542"/> roaming, where multiple visited networks were connected to multiple home via chains of intermediate proxies <xref target="RFC2194"/>.  As there is no RADIUS routing protocol to control realm forwarding through these proxies, there is therefore no way to automatically determine which realms are routable, or how best to route packets for known realms.</t>
          <t>The outcome of this limitation is that all such realm routing rules are largely configured statically, manually, and individually on multiple systems.  This process can be automated within one administrative system, but it is open to mistakes or abuse in multi-system networks.</t>
          <t>In RADIUS, each proxy which sees traffic is completely trusted.  It can modify, filter, or record any packets which transit the proxy.  This ability means that a proxy can engage in a large number of negative behaviors.  For example, a proxy could forge Access-Request packets for realms which it knows about, and potentially perform dictionary attacks on home networks.  A proxy could also alter or invent data in Accounting-Request packets, in order to defraud a home server of revenue.  A proxy could also observe Accounting-Request traffic, and use the obtained information to forge Disconnect-Request packets.</t>
          <t>Proxies can also inject traffic for realms which do not normally transit the proxy.  Without a routing protocol, there is no way for a home server to automatically control which set of realms is allowed to be sent from a particular client.  There is also no general way for a proxy to signal that a particular Access-Request or Accounting-Request is non-routable: it must be either rejected or discarded.</t>
          <t>Visited sites also have no control over proxies past the ones that they have relationships with.  Subsequent proxies are completely unknown, and unknowable to the visited network.  Despite these systems being completely unknown, they are completely trusted due to limitations in the RADIUS protocol.</t>
          <t>That is, there is no fine-grained way for a visited or home network to limit which intermediary systems see traffic for their realms, or what traffic can be seen by those systems.  While these filtering rules can be manually documented as seen in <xref target="FILTER"/>, this process is error-prone, and fragile.</t>
          <t>Administrators should be aware of the above issues: fraud, forgery, and filtering are all possible in a "trusted" RADIUS ecosystem.</t>
          <t>Historically, these issues do not appear to have been widely exploited.  The most common defense against these attacks is to limit RADIUS relationships to entities which share a contractual relationship.  This relationship can be direct between clients, servers, and proxies.  This relationship can also be indirect, as when multiple organizations are members of a shared consortium such as eduroam.</t>
          <t>Implementations therefore SHOULD provide methods by which routing information can be tied to particular clients and to particular home servers.  Implementations SHOULD allow packets to be filtered by some combination of realm and client or home server.  Administrators SHOULD take advantage of these filters to double-check that received traffic is coming from the expected sources, and contains the expected realms.</t>
        </section>
        <section anchor="dynamic-discovery-and-filtering">
          <name>Dynamic Discovery and Filtering</name>
          <t>When <xref target="RFC7585"/> dynamic discovery is used, intermediate proxy hops are avoided.  There are a number of possible attacks here, though <xref section="5" sectionFormat="comma" target="RFC7585"/> largely limits its discussion to rate limiting of connections.</t>
          <t>A client which supports dynamic discovery of home servers still has to perform filtering on NAI realms before doing any lookups.  When no filtering takes place, an attacker can cause a RADIUS client to do DNS lookups for arbitrary domains, and then cause it to connect to arbitrary servers.  As there is no RADIUS routing protocol, there is no general way for a client to determine which realms are part of a particular organization, and are thus permitted for dynamic DNS lookups.</t>
          <t>Organizations relying on dynamic discovery SHOULD have some way of automatically sharing which realms are valid, and which are not.  There are a number of possibilities here, and choosing the best one is up to each individual organization.</t>
          <t>Clients supporting dynamic discovery SHOULD require that servers use certificates from a private Certification Authority (CA).  Clients MUST NOT automatically accept server certificates rooted from public CAs (e.g. as is done for web servers).  Instead, clients MUST be configurable to use only a limited set of CAs.  The default list of accepted CAs SHOULD be empty.</t>
          <t>Similarly, servers SHOULD require that clients use certificates from a private Certification Authority (CA).  Servers MUST NOT accept client certificates rooted from a public CA.</t>
          <t>Servers which accept connections from dynamic discover are necessarily open to the Internet.  Administrators SHOULD limit the source IP of allowed connections.  Server SHOULD filter received packets by NAI, and close connections when the NAIs in incoming packets do not match the NAI(s) that the server expects.  This mismatch indicates either a misconfigured or malicious client.</t>
          <t>Both clients and servers can send any data inside of a TLS tunnel.  Implementations SHOULD take care to treat the data inside of a TLS tunnel as a potential source of attacks.</t>
          <t>Where multiple realms resolve to the same destination IP address, implementations MAY send packets for multiple realms across a connection to that IP address.  Clients SHOULD use SNI to indicate which realm they are connecting to.  Servers SHOULD present a certificate for the requested realm, instead of using a shared or "hosting" certificate which is owned by the hosting provider, and is used by multiple realms.  Such certificate sharing decreases security, and increases operational costs.</t>
          <t>Where systems do not have a pre-defined list of allowed realms, implementations MUST support negative caching.  That is, if the lookup for a particular realm fails, or a connection to that realm fails, then the implementation needs to cache that negative result for a period of time.  This cache needs to be examined prior to any new lookup or connection being made.  If there is an entry in the negative cache, then the server MUST skip the lookup or connection attempt, and instead return an immediate error.  This negative cache time SHOULD be configurable.</t>
          <t>Other attacks are possible.  If there are implementation bugs in a clients TLS library, an attacker could use dynamic discovery to cause the client to connect to a malicious server, and then use the server to attack the client.  A malicious server could also slow down its TCP connection to engage client resources for extended periods of time.  This process could even be done even before any TLS credentials are exchanged.</t>
          <t>In general, <xref target="RFC7585"/> dynamic discovery is substantially different from normal application protocols which use TLS.  There is substantial attack surface added by an unknown, and unauthenticated user who can cause a RADIUS client to connect to arbitrary systems under an attacker control.  Dynamic discovery should be used with care, and only with substantial amounts of filtering on the NAI realms which are allowed, and only with stringent limits on the number of lookups, connection attempts, open connections, etc.</t>
        </section>
      </section>
      <section anchor="ms-chap">
        <name>Do Not Use MS-CHAP</name>
        <t>MS-CHAP (v1 in <xref target="RFC2433"/> and v2 in <xref target="RFC2759"/>) have major design flaws, and should not be used outside of a secure tunnel such as PEAP or TTLS.  As MS-CHAPv1 is less commonly used, the discussion in this section will focus on MS-CHAPv2, but the same analysis applies to MS-CHAPv1.</t>
        <t>MS-CHAP has been broken since 2004, as seen in <xref target="ASLEAP"/>.  While the attack there mentions LEAP, the same attack applies to MS-CHAP.  This information was apparently insufficiently clear in the <xref target="ASLEAP"/> attack, as most implementations still support MS-CHAP, and no previous standard has deprecated it.</t>
        <t>The attack relies on a vulnerability in the protocol design in <xref section="8.4" sectionFormat="comma" target="RFC2759"/>.  In that section, the response to the MS-CHAP challenge is calculated via three DES operations, which are based on the 16-octet NT-Hash form of the password.  However, the DES operation requires 7 octet keys, so the 16-octet NT-Hash cannot be divided evenly into the 21 octets of keys required for the DES operation.</t>
        <t>The solution in <xref target="RFC2759"/> Section 8.4 is to use the first 7 octets of the NT-Hash for the first DES key, the next 7 octets for the second DES key, leaving only 2 octets for the final DES key.  The final DES key is padded with zeros.  This construction means that an attacker who can observe the MS-CHAP2 exchange only needs to perform 2^16 DES operations in order to determine the final 2 octets of the original NT-Hash.</t>
        <t>If the attacker has a database which correlates known passwords to NT-Hashes, then those two octets can be used as an index into that database, which returns a subset of candidate hashes.  Those hashes are then checked via brute-force operations to see if they match the original MS-CHAPv2 data.</t>
        <t>This process lowers the complexity of cracking MS-CHAP by nearly five orders of magnitude as compared to a brute-force attack.  The attack has been demonstrated using databases which contain tens to hundreds of millions of passwords.  On a consumer-grade machine, the time required for such an attack to succeed is on the order of tens of milliseconds.</t>
        <t>While this attack does require a database of known passwords, such databases are easy to find online, or to create locally from generator functions.  Passwords created manually by people are notoriously predictable, and are highly likely to be found in a database of known passwords.  In the extreme case of strong passwords, they will not be found in the database, and the attacker is still required to perform a brute-force dictionary search.</t>
        <t>The result is that MS-CHAP has significantly lower security than PAP.  When the MS-CHAP data is not protected by TLS, it is visible to everyone who can observe the RADIUS traffic.  Attackers who can see the MS-CHAP traffic can therefore obtain the underlying NT-Hash with essentially zero effort, as compared to cracking the RADIUS shared secret.  In contrast, the User-Password attribute is obfuscated with data derived from the Request Authenticator and the shared secret, and that method has not yet been successfully attacked.</t>
        <t>Implementers and administrators MUST therefore treat MS-CHAP and MS-CHAPv2 as being equivalent in security to sending passwords in the clear, without any encryption or obfuscation.  That is, the User-Password attribute with the <xref section="5.2" sectionFormat="comma" target="RFC2865"/> obfuscation is substantially more secure than MS-CHAP.  MS-CHAP offers little benefit over PAP, and has many drawbacks as discussed here, and in the next section.</t>
        <t>As MS-CHAP can be trivially broken by an observer, this document therefore mandates that MS-CHAP or MS-CHAPv2 authentication data carried in RADIUS MUST NOT be sent in situations where the that data is visible to an observer.  MS-CHAP or MS-CHAPv2 authentication data MUST NOT be sent over RADIUS/UDP or RADIUS/TCP.</t>
        <t>As MS-CHAP offers no practical benefits over PAP and has many downsides, MS-CHAP authentication SHOULD NOT be used even when the transport protocol is secure, as with IPsec or RADIUS over TLS.</t>
        <t>Existing RADIUS client implementations SHOULD deprecate the use of MS-CHAPv1 and MS-CHAPv2.  Clients SHOULD forbid new configurations from enabling MS-CHAP authentication.  New RADIUS clients MUST NOT implement the attributes used for MS-CHAPv1 and MS-CHAPv2 authentication (MS-CHAP-Challenge and MS-CHAP-Response).</t>
      </section>
      <section anchor="password-security">
        <name>Password Visibility and Storage</name>
        <t>An attacker may choose to ignore the wire protocol entirely, and bypass all of the issues described earlier in this document.  An attacker could instead focus on the database which holds user credentials such as account names and passwords.  At the time of this writing, databases such as <xref target="PWNED"/> claim to have records of over twelve billion user accounts which have been compromised.  User databases are therefore highly sought-after targets.</t>
        <t>The attack discussed in this section is dependent on vulnerabilities with the credential database, and does not assume an attacker can see or modify RADIUS traffic.  As a result, issues raised here apply equally well when TTLS, PEAP, or RADIUS/TLS are used.  The success of the attack depends only on how the credentials are stored in the database.  Since the choice of authentication method affects the way credentials are stored in the database, the security of that dependency needs to be discussed and explained.</t>
        <t>Some organizations may desire to increase the security of their network by avoiding PAP, and using CHAP or MS-CHAP, instead.  These attempts are misguided.  If simple password-based methods must be used, in almost all situations, the security of the network as a whole is increased by using PAP in preference to CHAP or MS-CHAP.  The reason is found through a straightforward risk analysis, which we explain in more detail below.</t>
        <section anchor="pap-security-analysis">
          <name>PAP Security Analysis</name>
          <t>When PAP is used, the RADIUS server sees a clear-text password from the user, and compares that password to credentials which have been stored in a user database.   The credentials stored in the database can be salted and/or hashed in a form which is commonly referred to as being in "crypt"ed form.  The RADIUS server takes the users clear-text password, performs the same "crypt" transformation, and then compares the two "crypt"ed passwords.</t>
          <t>Any compromise the RADIUS server will result in that clear-text password leaking.  However, in most cases, the clear-text password is available only in the memory of the RADIUS server application (i.e. not "on the wire"), and then only for a short period of time.  An attacker who desires to obtain passwords for all users would have to wait for all users to log in, which can take a substantial amount of time.  During that time, an administrator may discover the breach, and resolve the issue.</t>
          <t>When PAP is used, the credentials in the database are stored securely "at rest", presuming that the administrator only stores "crypt"ed credentials.  Any compromise of the database results in the disclosure of minimal information to the attacker.  That is, an attacker cannot easily obtain the clear-text passwords from the compromised database.</t>
          <t>The result is that the user passwords are visible in clear-text only for a short time, and then only on the RADIUS server.  The security of this system is not as good as seen with EAP-pwd <xref target="RFC5931"/> for example, but it is not terrible.</t>
          <t>While the obfuscation method used for the User-Password attribute has not been shown to be insecure, it has not been proven to be secure.  The obfuscation method depends on calculating MD5(secret + Request Authenticator), which has a few helpful properties for an attacker.  The cost of brute-forcing short secrets is not large, <xref target="cracking"/> discusses that cost in detail.  Even for longer secrets which are humanly generated, the MD5 state for hashing the secret can be pre-calculated and stored on disk.  This process is relatively inexpensive, even for billions of possible shared secrets.  The Request Authenticator can then be added to each pre-calculated state via brute-force, and compared to the obfuscated User-Password data.</t>
          <t>The MD5 digest is 16 octets long, and many passwords are shorter than that.  This difference means that the final octets of the digest are placed into the User-Password attribute without modification.  The result is that a brute-force attack does not need to decode the User-Password and see if the decoded password "looks reasonable".  Instead, the attacker simply needs to compare the final octets of the calculated digest with the final octets of the User-Password attribute.  The result is a signal which indicates with high probability that the guessed secret is correct.</t>
          <t>The only protection from this attack is to ensure that the secret is long, and derived from a cryptographically strong pseudo-random number generator.  <xref target="shared-secrets"/> discusses these issues in more detail.</t>
        </section>
        <section anchor="chap-and-ms-chap-password-storage">
          <name>CHAP and MS-CHAP Password Storage</name>
          <t>In contrast with PAP, when CHAP or MS-CHAP is used, those methods do not expose a clear-text password to the RADIUS server, but instead a hashed transformation of it.  That hash output is in theory secure even if an attacker can observe it.  While CHAP is still believed to be secure, MS-CHAP is not secure, as we saw earlier in <xref target="ms-chap"/>.  For the purposes of this section, we will focus on the construct of "hashed passwords", and will ignore any attacks specific to MS-CHAP.  We will also note that EAP-MD5 <xref section="5.4" sectionFormat="comma" target="RFC3748"/> is essentially CHAP, and has the same security analysis.</t>
          <t>The hash transformations for CHAP and MS-CHAP depend on a random challenge.  The intent was to increase security, but their construction makes strong requirements on the form in which user credentials are stored.</t>
          <t>The process for performing CHAP and MS-CHAP is inverted from the process for PAP.  Using similar terminology as above for illustrative purposes, the "hash"ed passwords are carried in the CHAP method, and are sent to the server.  The server must obtain the clear-text (or NT hashed) password from the database, and then perform the "hash" operation on the password from the database. The two "hash"ed passwords are then compared as was done with PAP.  This inverted process decreases system security substantially.</t>
          <t>When CHAP or MS-CHAP are used, all of credentials are stored as clear-text (or clear-text equivalent) in the database, all of the time.  Even if the database contents are encrypted, the decryption keys are necessarily accessible to the application which reads that database.  Any compromise of the application means that the entire database can be immediately read and exfiltrated as a whole.  The attacker then has complete access to all user identities, and all associated clear-text passwords.</t>
          <t>It should go without saying that having an attacker obtain all clear-text passwords is more of an issue than having the same attacker obtain "crypt"ed passwords.  Similarly, it is more secure for a RADIUS server to have access to some clear-text passwords, some of the time, rather than having access to all of the clear-text passwords, all of the time.</t>
        </section>
        <section anchor="on-the-wire-user-password-versus-chap-password">
          <name>On-the-wire User-Password versus CHAP-Password</name>
          <t>There is one more security myth which should be put to rest about PAP versus CHAP.  There is a common belief that CHAP is more secure, because passwords are sent "in the clear" via the User-Password attribute.  This belief is false.</t>
          <t>The User-Password attribute is obfuscated when it is sent in an Access-Request packet, using keyed MD5 and the shared secret, as defined in <xref section="5.2" sectionFormat="comma" target="RFC2865"/>.  At the time of this writing, no attack better than brute force has been found which allows an attacker to reverse this obfuscation.</t>
          <t>There have been claims that it is preferable to use CHAP-Password as it does not "send the password in clear-text".  This preference is based on a misunderstanding of how CHAP-Password and User-Password attributes are calculated.</t>
          <t>The CHAP-Password attribute depends on the hash of a visible Request Authenticator (or CHAP-Challenge) and the users password.  The obfuscated User-Password depends on the same Request Authenticator, and on the RADIUS shared secret.  For an attacker, the difference between the two calculations is minimal.  They can both be attacked with similar amounts of effort, as they use similar constructs.   As a result, any security analysis which makes the claim that "User-Password insecure because it uses MD5" ignores the fact that the CHAP-Password attribute is constructed through substantially the same method.</t>
          <t>An attacker who can observe the CHAP-Password and CHAP-Challenge can also perform an off-line dictionary attack on the observed values.  The complexity of cracking CHAP-Password is similar to that noted above for cracking RADIUS packets, which was discussed above in <xref target="cracking"/>.  The difference between the two attacks is that the shared secrets are more likely to be secure than passwords for an end-user.</t>
          <t>An attacker who can crack one users password can gain network access as that user, or even administrator access to network devices.  In contrast, an attacker who can crack the shared secret can gain network access as any user, and perform any authorization.  The result is that it is more valuable to crack shared secrets, even if the underlying attack process is essentially the same.</t>
        </section>
        <section anchor="pap-vs-chap">
          <name>PAP vs CHAP Conclusions</name>
          <t>A careful security analysis shows that for all of PAP, CHAP, and MS-CHAP, the RADIUS server must at some point have access to the clear-text version of the password.  As a result, there is minimal difference in risk exposure between the different authentication methods if a RADIUS server is compromised.</t>
          <t>However, when PAP is used, the user credentials can be stored securely "at rest" in a database, while such secure storage is impossible with CHAP and MS-CHAP.  There is therefore a substantial difference in risk exposure between the different authentication methods, with PAP offering substantially higher security due to its ability to secure passwords at rest via the "crypt" construct mentioned above.</t>
          <t>In contrast, CHAP is highly insecure, as any database compromise results in the immediate exposure of the clear-text passwords for all users.  The security of MS-CHAP is best described as near zero, independent of any database compromise.  This makes MS-CHAP the worst of all possible choices.</t>
          <t>This security difference is shown not just in the <xref target="PWNED"/> database, but also in attacks on RADIUS systems <xref target="EXPLOIT"/>, where attackers identified a vulnerable RADIUS system, and then:</t>
          <ul empty="true">
            <li>
              <t>utilized SQL commands to dump the credentials [T1555], which contained both clear-text and hashed passwords for user and administrative accounts.</t>
            </li>
          </ul>
          <t>The attack proceeded to leverage those passwords to gain more permissions:</t>
          <ul empty="true">
            <li>
              <t>Having gained credentials from the RADIUS server, PRC state-sponsored cyber actors used those credentials with custom automated scripts to authenticate to a router via Secure Shell (SSH), execute router commands, and save the output.</t>
            </li>
          </ul>
          <t>This attack is only possible when systems store clear-text passwords.</t>
          <t>The result is that when the system as a whole is taken into account, the risk of password compromise is substantially less with PAP than with CHAP or MS-CHAP.  It is therefore RECOMMENDED that administrators use PAP in preference to CHAP or MS-CHAP.  It is also RECOMMENDED that administrators store passwords "at rest" in a secure form (salted, hashed), as with the "crypt" format discussed above.</t>
          <t>That being said, other authentication methods such as EAP-TLS <xref target="RFC9190"/> and EAP-pwd <xref target="RFC5931"/> do not expose clear-text passwords to the RADIUS server or any intermediate proxy.  Thor methods therefore lower the risk of password exposure even more than using PAP.  It is RECOMMENDED that administrators avoid password-based authentication methods where at all possible.</t>
        </section>
      </section>
      <section anchor="use-eap-where-possible">
        <name>Use EAP Where Possible</name>
        <t>If more complex authentication methods are needed, there are a number of EAP methods which can be used.  These methods variously allow for the use of certificates (EAP-TLS), or passwords (EAP-TTLS <xref target="RFC5281"/>, PEAP <xref target="I-D.josefsson-pppext-eap-tls-eap"/>)) and EAP-pwd <xref target="RFC5931"/>.</t>
        <t>We also note that the TLS-based EAP methods which transport passwords also hide the passwords from intermediate RADIUS proxies, which also increases security.</t>
        <t>Finally, password-based EAP methods still send PAP / CHAP / MS-CHAP inside of the TLS tunnel.  As such, the security of a home server which checks those passwords is subject to the analysis above about PAP versus CHAP, along with the issues of storing passwords in a database.</t>
      </section>
      <section anchor="eliminating-proxies">
        <name>Eliminating Proxies</name>
        <t>The best way to avoid malicious proxies is to eliminate proxies entirely.  The use of dynamic peer discovery (<xref target="RFC7585"/>) means that the number of intermediate proxies is minimized.</t>
        <t>However, the server on the visited network still acts as a proxy between the NAS and the home network.  As a result, all of the above analysis still applies when <xref target="RFC7585"/> peer discovery is used.  There is an intermediate system which may have access to passwords or PII.  The only solution is using end-to-end security for AAA, which would involve a completely new protocol.</t>
      </section>
      <section anchor="accounting-is-imperfect">
        <name>Accounting Is Imperfect</name>
        <t>The use of RADIUS/UDP for accounting means that accounting is inherently unreliable.  Unreliable accounting means that different entities in the network can have different views of accounting traffic.  These differences can have multiple impacts, including incorrect views of who is on the network, to disagreements about financial obligations.  These issues are discussed in substantial detail in <xref target="RFC2975"/>, and we do not repeat those discussions here.  We do, however, summarize a few key issues.  Sites which use accounting SHOULD be aware of the issues raised in <xref target="RFC2975"/>, and the limitations of the suggested solutions.</t>
        <t>Using a reliable transport such as RADIUS/TLS makes it more likely that accounting packets are delivered, and that acknowledgments to those packets are received.  Reducing the number of proxies means that there are fewer disparate systems which need to have their accounting data reconciled.  Using non-volatile storage for accounting packets means that a system can reboot with minimal loss of accounting data.  Using interim accounting updates means that transient network issues or data losses can be corrected by later updates.</t>
        <t>As RADIUS does not provide for end-to-end signaling or transport, using RADIUS/TLS provides for reliable transport only when the client originating the accounting traffic is connected directly to the server which records it.  If there are instead one or more proxies involved, the proxies increase overall unreliability.</t>
        <t>Systems which perform accounting are also subject to significant operational loads.  Wheres authentication and authorization may use multiple packets, those packets are sent at session start, and then never again.  In contrast, accounting packets can be sent for the lifetime of a session, which may be hours or even days.  There is a large cost to receiving, processing, and storing volumes of accounting data.</t>
        <t>However, even with all of the above concerns addressed, accounting is still imperfect.  The obvious way to increase the accuracy of accounting data is to increase the rate at which interim updates are sent, but doing so also increases the load on the servers which process the accounting data.  At some point, the trade-off of cost versus benefit becomes negative.</t>
        <t>There is no perfect solution here.  Instead, there are simply a variety of imperfect trade-offs.</t>
        <section anchor="incorrect-accounting-data">
          <name>Incorrect Accounting Data</name>
          <t>Even if all accounting packets were delivered and stored without error, there is no guarantee that the contents of those packets are in any way reasonable.  The Wireless Broadband Alliance RADIUS Accounting Assurance <xref target="WBA"/> group has been investigating these issues.  While the results are not yet public, a presentation was made at IETF 118 in the RADEXT working group <xref target="RADEXT118"/>.</t>
          <t>The data presented indicated that the WBA saw just about every possible counter attribute in RADIUS accounting packets as containing data which was blatantly wrong or contradictory.  One example is extremely short sessions which have impossibly large amounts of data being downloaded.  Other accounting packets allege that large amounts of data were downloaded via octet counters, while at the same time claiming negligible packet counters, leading to absurdly large packet sizes.</t>
          <t>The only conclusion from this analysis is that RADIUS clients act as if it is better to produce incorrect accounting data rather than to produce no data at all.  This failure to follow reasonable practices is expensive.  In effect, vendors have offset their costs to produce quality data onto their customers, who have to take difficult and uncertain steps in order to sanitize or verify the confusing data which vendors provide in accounting packets.</t>
          <t>It should go without saying that accounting systems need to produce correct data.  However, <xref target="RFC2865"/> makes no requirement that the accounting data transported in RADIUS is correct, or is even vaguely realistic.  We therefore state here that systems which produce accounting data MUST generate correct, accurate, and reasonably precise data.  Vendors of networking equipment SHOULD test their systems to verify that the data they produce is accurate.</t>
        </section>
      </section>
      <section anchor="attribute-location">
        <name>Attribute Location and Ordering</name>
        <t>While <xref section="5" sectionFormat="comma" target="RFC2865"/> states that attribute ordering does not matter, some implementations would discard packets attributes were not received in a particular order chosen by the implementer.  Specifically, some implementations misunderstood the requirement (from the BlastRADIUS mitigations) that Message-Authenticator is sent as the first attribute in responses to Access-Request packets.  Despite the mandate that clients do not check the location of Message-Authenticator, non-compliant implementations would discard valid and authentic Access-Request packets where Message-Authenticator was not the first attribute.  This behavior is not appropriate.</t>
        <t>The <xref section="5" sectionFormat="comma" target="RFC2865"/> text defining attribute order (quoted below) does not cover all possible cases:</t>
        <artwork><![CDATA[
If multiple Attributes with the same Type are present, the order of
Attributes with the same Type MUST be preserved by any proxies.  The
order of Attributes of different Types is not required to be
preserved.  A RADIUS server or client MUST NOT have any dependencies
on the order of attributes of different types.  A RADIUS server or
client MUST NOT require attributes of the same type to be contiguous.
]]></artwork>
        <t>We add a missing case here.</t>
        <t>A RADIUS client or server MUST NOT have dependencies on the order or location of a particular attribute.  A RADIUS client or server MUST NOT discard otherwise valid packets which have attributes in an order which unexpected to the implementation, but which is is valid by the above rules.</t>
        <t>For example, if Message-Authenticator passes validation, then the packet is authentic and it has not been modified. The location of Message-Authenticator within the packet does not matter for authenticated packets.  If can be the first, second, or last attribute.</t>
      </section>
      <section anchor="unknown-attributes">
        <name>Unknown Attributes</name>
        <t>An outcome of the BlastRADIUS mitigations was the discovery that some implementations would discard packets which contained an attribute that they did not recognize.  While this behavior is not explicitly permitted by previous specifications, we must admit that it is not explicitly forbidden, either.  This document corrects that failure.</t>
        <t>Unknown attributes are defined to be attributes which are well-formed, but which are not recognized by the implementation.  Processing of unknown attributes is discussed in <xref section="5" sectionFormat="comma" target="RFC2866"/>:</t>
        <ul empty="true">
          <li>
            <t>A RADIUS server MAY ignore Attributes with an unknown Type.</t>
            <t>A RADIUS client MAY ignore Attributes with an unknown Type.</t>
          </li>
        </ul>
        <t>We note this recommendation is to "ignore" these attributes, and not to discard the encapsulating packet. Instead of ignoring unknown attributes, some implementations instead discard those packets.  This behavior is incorrect, and leads to interoperability issues and network problems.</t>
        <t>With limited exceptions, implementations MUST NOT discard packets if they receive attributes with an unknown Type.  We update <xref target="RFC2865"/> to require that implementations MUST ignore Attributes with an unknown Type.   Those attributes MUST be treated in the same manner as an "Invalid Attribute" which is defined in <xref section="2.8" sectionFormat="comma" target="RFC6929"/>.</t>
        <t>The only exception to the above requirements is CoA-Request and Disconnect-Request packets, as discussed in <xref section="4.3.2" sectionFormat="comma" target="RFC8559"/>.</t>
        <t>This behavior is secure, so long as implementations follow some additional guidance for Access-Accept packets.  This guidance follows logically from existing text in <xref section="4.4" sectionFormat="comma" target="RFC2865"/> for similar situations with Access-Challenge:</t>
        <ul empty="true">
          <li>
            <t>If the NAS does not support challenge/response, it MUST treat an
Access-Challenge as though it had received an Access-Reject
instead.</t>
          </li>
        </ul>
        <t>And also for Service-Type in <xref section="5.6" sectionFormat="comma" target="RFC2865"/>:</t>
        <ul empty="true">
          <li>
            <t>A NAS is not
required to implement all of these service types, and MUST treat
unknown or unsupported Service-Types as though an Access-Reject
had been received instead.</t>
          </li>
        </ul>
        <t>A client is not required to implement all possible authorizations which can be sent in an Access-Accept.   We therefore extend the above scenarios to packets which contain unknown Types.  A client SHOULD treat Access-Accepts with no known or supported authorizations as though an Access-Reject had been received instead.</t>
        <t>This requirement for unknown Types is already met by most, if not all, RADIUS implementations.  That is, experience has shown that discarding packets for arbitrary reasons causes problems.  Existing implementations have largely chosen to follow reasonable practices, and the recommendation here simply documents that wide-spread practice.</t>
      </section>
    </section>
    <section anchor="practical-suggestions">
      <name>Practical Suggestions</name>
      <t>In the interest of simplifying the above explanations, this section provides a short-form checklist of recommendations.  Following this checklist does not guarantee that RADIUS systems are secure from all possible attacks.  However, systems which do not follow this checklist are likely to be vulnerable to known attacks, and are therefore less secure than they could be.</t>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Do not use RADIUS/UDP or RADIUS/TCP across the wider Internet</t>
            </li>
          </ul>
          <t>Exposing user identifiers, device identifiers, and locations is a privacy and security issue.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Avoid RADIUS/UDP or RADIUS/TCP in other networks, too.</t>
            </li>
          </ul>
          <t>It can take time to upgrade equipment, but the long-term goal is to entirely deprecate RADIUS/UDP.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Implement the BlastRADIUS mitigations</t>
            </li>
          </ul>
          <t>Both Implementers and administrators should implement the mitigations in order to secure Access-Request packets.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Use strong shared secrets</t>
            </li>
          </ul>
          <t>Shared secrets should be generated from a cryptographically strong pseudo-random number generator.  They should contain at least 128 bits of entropy.  Each RADIUS client should have a unique shared secret.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Minimize the use of RADIUS proxies.</t>
            </li>
          </ul>
          <t>More proxies means more systems which could be compromised, and more systems which can see private or secret data.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Do not proxy from secure to insecure transports</t>
            </li>
          </ul>
          <t>If user information (credentials or identities) is received over a secure transport (IPsec, RADIUS/TLS, TLS-based EAP method), then proxying the protected data over RADIUS/UDP or RADIUS/TCP degrades security and privacy.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Prefer EAP authentication methods to non-EAP methods.</t>
            </li>
          </ul>
          <t>EAP authentication methods are better at hiding user credentials from observers.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>For EAP, use anonymous outer identifiers</t>
            </li>
          </ul>
          <t>There are few reasons to use individual identities for EAP.  Identifying the realm is usually enough.</t>
          <t><xref target="RFC7542"/> Section 2.4 recommends that "@realm" is preferable to "anonymous@realm", which is in turn preferable to "user@realm".</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Prefer using PAP over CHAP or MS-CHAP.</t>
            </li>
          </ul>
          <t>PAP allows for credentials to be stored securely "at rest" in a user database.  CHAP and MS-CHAP do not.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Do not use MS-CHAP outside of TLS-based EAP methods.</t>
            </li>
          </ul>
          <t>MS-CHAP can be cracked with minimal effort.  This information has been known for two decades.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Store passwords in "crypt"ed form</t>
            </li>
          </ul>
          <t>Where is is necessary to store passwords, use systems such as PBKDF2 (<xref target="RFC8018"/>.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Regularly update to the latest cryptographic methods.</t>
            </li>
          </ul>
          <t>TLS 1.0 with RC4 was acceptable at one point in time.  It is no longer acceptable.  Similarly, the current cryptographic methods will at some point will be deprecated, and replaced by updated methods.  Upgrading to recent cryptographic methods should be a normal part of operating a RADIUS server.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Regularly deprecate older cryptographic methods.</t>
            </li>
          </ul>
          <t>Administrators should actively deprecate the use of older cryptographic methods.  If no system is using older methods, then those methods should be disabled or removed entirely.  Leaving old methods enabled makes the server more vulnerable to attacks.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Send the minimum amount of information which is needed,.</t>
            </li>
          </ul>
          <t>Where proxying is used, it is a common practice is to simply forward all of the information from a NAS to other RADIUS servers.  Instead, the proxy closest to the NAS should filter out any attributes or data which are not needed by the "next hop" proxies, or by the home server.</t>
        </li>
      </ul>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The primary focus of this document is addressing privacy and security considerations for RADIUS.</t>
      <t>Deprecating insecure transport for RADIUS, and requiring secure transport means that personally identifying information is no longer sent "in the clear".  As noted earlier in this document, such information can include MAC addresses, user identifiers, and user locations.</t>
      <t>In addition, this document suggests ways to increase privacy by minimizing the use and exchange of PII.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The primary focus of this document is addressing privacy and security considerations for RADIUS.</t>
      <t>Deprecating insecure transports for RADIUS, and requiring secure transports, means that many historical security issues with the RADIUS protocol are mitigated.</t>
      <t>We reiterate the discussion above that any security analysis must be done on the system as a whole.  It is not reasonable to put an expensive lock on the front door of a house while leaving the window next to it open, and then somehow declare the house to be "secure".  Any approach to security based on a simple checklist is at best naive, and more truthfully is deeply misleading.  At worst, such practices will decrease security by causing people to follow false security practices, and to ignore real security practices.</t>
      <t>Implementers and administrators need to be aware of the issues raised in this document.  They can then make the best choice for their local network which balances their requirements on privacy, security, and cost.  Only informed choices will lead to the best security.</t>
      <section anchor="historical-considerations">
        <name>Historical Considerations</name>
        <t>The BlastRADIUS vulnerability is the result of RADIUS security being a low priority for decades.  Even the recommendation of <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/> that all clients add Message-Authenticator to all Access-Request packets was ignored by nearly all implementers.  If that recommendation had been followed, then the BlastRADIUS vulnerability notification would have been little more than "please remember to set the require Message-Authenticator flag on all RADIUS servers."</t>
        <t>For MS-CHAP, it has not previously been deprecated for similar reasons, even though it has been proven to be insecure for decades.  This continued use of MS-CHAP has likely resulted in the leaking of many users clear-text passwords.</t>
      </section>
      <section anchor="practical-implications">
        <name>Practical Implications</name>
        <t>This document either deprecates or forbids methods and behaviors which have been common practice for decades.  While insecure practices have been viewed as tolerable, they are no longer acceptable.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is instructed to update the RADIUS Types registry, and the "Values for RADIUS Attribute 101, Error-Cause Attribute" sub-registry with the following addition:</t>
      <artwork><![CDATA[
Value,Description,Reference
510,Missing Message-Authenticator,[THIS-DOCUMENT]
]]></artwork>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to the many reviewers and commenters for raising topics to discuss, and for providing insight into the issues related to increasing the security of RADIUS.  In no particular order, thanks to Margaret Cullen, Alexander Clouter, and Josh Howlett.</t>
      <t>Many thanks to Nadia Heninger and the rest of the BlastRADIUS team, along with Heikki Vatiainen, for extensive discussions and feedback about the issue.</t>
      <t>The author is deeply indebted to the late Bernard Aboba for decades of advice and guidance.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>01 - added more discussion of IPsec, and move TLS-PSK to its own document,</t>
        </li>
        <li>
          <t>02 - Added text on Increasing the Security of Insecure Transports</t>
        </li>
        <li>
          <t>03 - add text on CUI.  Add notes on PAP vs CHAP security</t>
        </li>
        <li>
          <t>04 - add text on security of MS-CHAP.  Rearrange and reword many sections for clarity.</t>
        </li>
        <li>
          <t>05 - Rework title to deprecating "insecure practices".  Clarifications based on WG feedback.</t>
        </li>
        <li>
          <t>00 - adoption by WG.</t>
        </li>
        <li>
          <t>01 - review from Bernard Aboba.  Added discussion on accounting, clarified and re-arranged text.  Added discussion of server behavior for missing Message-Authenticator</t>
        </li>
        <li>
          <t>02 - BlastRADIUS updates.</t>
        </li>
        <li>
          <t>03 - add delay Access-Reject, constant-time comparison, no routing protocol.  Updated the text significantly and made it more consistent with the BlastRADIUS recommendations.  Add "updates" other RFCs.</t>
        </li>
        <li>
          <t>04 - updates with review from Fabian Mauchle</t>
        </li>
        <li>
          <t>05 - merge in spelling fixes from Andrew Wood.  Update and rewrite BlastRADIUS mitigations to make them clearer.  Add section describing processes administrators can use to upgrade their networks.</t>
        </li>
        <li>
          <t>06 - updates and clarifications based on reviews.</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC6421">
          <front>
            <title>Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS)</title>
            <author fullname="D. Nelson" initials="D." role="editor" surname="Nelson"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This memo describes the requirements for a crypto-agility solution for Remote Authentication Dial-In User Service (RADIUS). This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6421"/>
          <seriesInfo name="DOI" value="10.17487/RFC6421"/>
        </reference>
        <reference anchor="RFC8044">
          <front>
            <title>Data Types in RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>RADIUS specifications have used data types for two decades without defining them as managed entities. During this time, RADIUS implementations have named the data types and have used them in attribute definitions. This document updates the specifications to better follow established practice. We do this by naming the data types defined in RFC 6158, which have been used since at least the publication of RFC 2865. We provide an IANA registry for the data types and update the "RADIUS Attribute Types" registry to include a Data Type field for each attribute. Finally, we recommend that authors of RADIUS specifications use these types in preference to existing practice. This document updates RFCs 2865, 3162, 4072, 6158, 6572, and 7268.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8044"/>
          <seriesInfo name="DOI" value="10.17487/RFC8044"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1321">
          <front>
            <title>The MD5 Message-Digest Algorithm</title>
            <author fullname="R. Rivest" initials="R." surname="Rivest"/>
            <date month="April" year="1992"/>
            <abstract>
              <t>This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1321"/>
          <seriesInfo name="DOI" value="10.17487/RFC1321"/>
        </reference>
        <reference anchor="RFC2433">
          <front>
            <title>Microsoft PPP CHAP Extensions</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="S. Cobb" initials="S." surname="Cobb"/>
            <date month="October" year="1998"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP defines an extensible Link Control Protocol and a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2433"/>
          <seriesInfo name="DOI" value="10.17487/RFC2433"/>
        </reference>
        <reference anchor="RFC2759">
          <front>
            <title>Microsoft PPP CHAP Extensions, Version 2</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="January" year="2000"/>
            <abstract>
              <t>This document describes version two of Microsoft's PPP CHAP dialect (MS-CHAP-V2). MS-CHAP-V2 is similar to, but incompatible with, MS-CHAP version one (MS-CHAP-V1). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2759"/>
          <seriesInfo name="DOI" value="10.17487/RFC2759"/>
        </reference>
        <reference anchor="RFC2866">
          <front>
            <title>RADIUS Accounting</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying accounting information between a Network Access Server and a shared Accounting Server. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2866"/>
          <seriesInfo name="DOI" value="10.17487/RFC2866"/>
        </reference>
        <reference anchor="RFC2868">
          <front>
            <title>RADIUS Attributes for Tunnel Protocol Support</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="D. Leifer" initials="D." surname="Leifer"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="J. Shriver" initials="J." surname="Shriver"/>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
            <author fullname="I. Goyret" initials="I." surname="Goyret"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document defines a set of RADIUS (Remote Authentication Dial In User Service) attributes designed to support the provision of compulsory tunneling in dial-up networks. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2868"/>
          <seriesInfo name="DOI" value="10.17487/RFC2868"/>
        </reference>
        <reference anchor="RFC3579">
          <front>
            <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3579"/>
          <seriesInfo name="DOI" value="10.17487/RFC3579"/>
        </reference>
        <reference anchor="RFC5176">
          <front>
            <title>Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="M. Chiba" initials="M." surname="Chiba"/>
            <author fullname="G. Dommety" initials="G." surname="Dommety"/>
            <author fullname="M. Eklund" initials="M." surname="Eklund"/>
            <author fullname="D. Mitton" initials="D." surname="Mitton"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a currently deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products. This includes support for disconnecting users and changing authorizations applicable to a user session. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5176"/>
          <seriesInfo name="DOI" value="10.17487/RFC5176"/>
        </reference>
        <reference anchor="RFC5580">
          <front>
            <title>Carrying Location Objects in RADIUS and Diameter</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
              <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5580"/>
          <seriesInfo name="DOI" value="10.17487/RFC5580"/>
        </reference>
        <reference anchor="RFC6151">
          <front>
            <title>Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="L. Chen" initials="L." surname="Chen"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document updates the security considerations for the MD5 message digest algorithm. It also updates the security considerations for HMAC-MD5. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6151"/>
          <seriesInfo name="DOI" value="10.17487/RFC6151"/>
        </reference>
        <reference anchor="RFC6218">
          <front>
            <title>Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="T. Zhang" initials="T." surname="Zhang"/>
            <author fullname="J. Walker" initials="J." surname="Walker"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines a set of vendor-specific RADIUS Attributes designed to allow both the secure transmission of cryptographic keying material and strong authentication of any RADIUS message. These attributes have been allocated from the Cisco vendor-specific space and have been implemented by multiple vendors. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6218"/>
          <seriesInfo name="DOI" value="10.17487/RFC6218"/>
        </reference>
        <reference anchor="RFC6613">
          <front>
            <title>RADIUS over TCP</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Server (RADIUS) protocol has, until now, required the User Datagram Protocol (UDP) as the underlying transport layer. This document defines RADIUS over the Transmission Control Protocol (RADIUS/TCP), in order to address handling issues related to RADIUS over Transport Layer Security (RADIUS/TLS). It permits TCP to be used as a transport protocol for RADIUS only when a transport layer such as TLS or IPsec provides confidentiality and security. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6613"/>
          <seriesInfo name="DOI" value="10.17487/RFC6613"/>
        </reference>
        <reference anchor="RFC6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7360">
          <front>
            <title>Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>The RADIUS protocol defined in RFC 2865 has limited support for authentication and encryption of RADIUS packets. The protocol transports data in the clear, although some parts of the packets can have obfuscated content. Packets may be replayed verbatim by an attacker, and client-server authentication is based on fixed shared secrets. This document specifies how the Datagram Transport Layer Security (DTLS) protocol may be used as a fix for these problems. It also describes how implementations of this proposal can coexist with current RADIUS systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7360"/>
          <seriesInfo name="DOI" value="10.17487/RFC7360"/>
        </reference>
        <reference anchor="I-D.ietf-radext-tls-psk">
          <front>
            <title>Operational Considerations for RADIUS and TLS-PSK</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>InkBridge Networks</organization>
            </author>
            <date day="21" month="January" year="2025"/>
            <abstract>
              <t>   This document provides implementation and operational considerations
   for using TLS-PSK with RADIUS/TLS (RFC6614) and RADIUS/DTLS
   (RFC7360).  The purpose of the document is to help smooth the
   operational transition from the use of the RADIUS/UDP to RADIUS/TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-tls-psk-12"/>
        </reference>
        <reference anchor="I-D.tomas-openroaming">
          <front>
            <title>WBA OpenRoaming Wireless Federation</title>
            <author fullname="Bruno Tomas" initials="B." surname="Tomas">
              <organization>Wireless Broadband Alliance, Inc.</organization>
            </author>
            <author fullname="Mark Grayson" initials="M." surname="Grayson">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Necati Canpolat" initials="N." surname="Canpolat">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Betty A. Cockrell" initials="B. A." surname="Cockrell">
              <organization>SingleDigits</organization>
            </author>
            <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
              <organization>Cisco Systems</organization>
            </author>
            <date day="15" month="April" year="2025"/>
            <abstract>
              <t>   This document describes the Wireless Broadband Alliance's OpenRoaming
   system.  The OpenRoaming architectures enables a seamless onboarding
   experience for devices connecting to access networks that are part of
   the federation of access networks and identity providers.  The
   primary objective of this document is to describe the protocols that
   form the foundation for this architecture, enabling providers to
   correctly configure their equipment to support interoperable
   OpenRoaming signalling exchanges.  In addition, the topic of
   OpenRoaming has been raised in different IETF working groups, and
   therefore a secondary objective is to assist those discussions by
   describing the federation organization and framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tomas-openroaming-05"/>
        </reference>
        <reference anchor="I-D.josefsson-pppext-eap-tls-eap">
          <front>
            <title>Protected EAP Protocol (PEAP) Version 2</title>
            <author fullname="Ashwin Palekar" initials="A." surname="Palekar">
              <organization>Microsoft Corporation</organization>
            </author>
            <author fullname="Simon Josefsson" initials="S." surname="Josefsson">
              <organization>Extundo</organization>
            </author>
            <author fullname="Daniel Simon" initials="D." surname="Simon">
              <organization>Microsoft Corporation</organization>
            </author>
            <author fullname="Glen Zorn" initials="G." surname="Zorn">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2004"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for
   multiple authentication methods. This document defines the Protected
   Extensible Authentication Protocol (PEAP) Version 2, which provides
   an encrypted and authenticated tunnel based on transport layer
   security (TLS) that encapsulates EAP authentication mechanisms.
   PEAPv2 uses TLS to protect against rogue authenticators, protect
   against various attacks on the confidentiality and integrity of the
   inner EAP method exchange and provide EAP peer identity privacy.
   PEAPv2 also provides support for chaining multiple EAP mechanisms,
   cryptographic binding between authentications performed by inner EAP
   mechanisms and the tunnel, exchange of arbitrary parameters (TLVs),
   and fragmentation and reassembly.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-josefsson-pppext-eap-tls-eap-10"/>
        </reference>
        <reference anchor="BLAST" target="https://www.blastradius.fail/pdf/radius.pdf">
          <front>
            <title>RADIUS/UDP Considered Harmful</title>
            <author initials="" surname="Goldberg, S , et al" fullname="Golberg, Sharon, et. al">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DATTACK" target="https://www.ietf.org/ietf-ftp/ietf-mail-archive/radius/1998-11.mail">
          <front>
            <title>CHAP and Shared Secret</title>
            <author initials="A." surname="DeKok" fullname="Alan DeKok">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MD5-1996" target="https://www.ietf.org/ietf-ftp/ietf-mail-archive/radius/1998-02">
          <front>
            <title>MD5 Key recovery attack</title>
            <author initials="I. R. W." surname="group" fullname="IETF RADIUS Working group">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MAY-1995" target="http://ftp.cerias.purdue.edu/pub/doc/network/radius/archive/ietf-radius.9506">
          <front>
            <title>Proxy-State radius extension to support stateless proxies</title>
            <author initials="M." surname="O'Dell" fullname="Mike O'Dell">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EDUROAM" target="https://eduroam.org">
          <front>
            <title>eduroam</title>
            <author initials="" surname="eduroam" fullname="eduroam">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EXPLOIT" target="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-158a">
          <front>
            <title>People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices</title>
            <author initials="A. C. D." surname="Agency" fullname="America's Cyber Defense Agency">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FILTER" target="https://community.jisc.ac.uk/library/janet-services-documentation/filtering-invalid-realms">
          <front>
            <title>Filtering of Invalid Realms</title>
            <author initials="J. I. S." surname="Committee" fullname="Joint Information Systems Committee">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BRIGGS" target="https://www.fcc.gov/ecfs/document/10427582404839/1">
          <front>
            <title>Comments on the FCC’s Public Notice DA 24-308 on SS7 and Diameter Vulnerabilities</title>
            <author initials="K." surname="Briggs" fullname="Kevin Briggs">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="HASHCLASH" target="https://github.com/cr-marcstevens/hashclash">
          <front>
            <title>Project HashClash - MD5 &amp; SHA-1 cryptanalytic toolbox</title>
            <author initials="M." surname="Stevens" fullname="Marc Stevens">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OPENROAMING" target="https://wballiance.com/openroaming/">
          <front>
            <title>OpenRoaming: One global Wi-Fi network</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WIFILOC" target="https://www.wi-fi.org/discover-wi-fi/wi-fi-location">
          <front>
            <title>Accurate indoor location with Wi-Fi connectivity</title>
            <author initials="W.-F." surname="Alliance" fullname="Wi-Fi Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPOOFING" target="https://networkradius.com/articles/2021/08/04/wifi-spoofing.html">
          <front>
            <title>Wi-Fi Spoofing for Fun and Profit</title>
            <author initials="A." surname="Cudbard-Bell" fullname="Arran Cudbard-Bell">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ASLEAP" target="https://github.com/joswr1ght/asleap">
          <front>
            <title>asleap - recovers weak LEAP and PPTP passwords</title>
            <author initials="J." surname="Wright" fullname="Joshua Wright">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WBA" target="https://wballiance.com/radius-accounting-assurance/">
          <front>
            <title>RADIUS Accounting Assurance</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RADEXT118" target="https://youtu.be/wwmYSItcQt0?t=3953">
          <front>
            <title>RADIUS Accounting Assurance at IETF 118</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PWNED" target="https://haveibeenpwned.com/">
          <front>
            <title>Have I been Pwned</title>
            <author initials="T." surname="Hunt" fullname="Troy Hunt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ISSUES" target="https://github.com/radext-wg/issues-and-fixes-2/wiki">
          <front>
            <title>Issues and Fixes 2</title>
            <author initials="" surname="RADEXT" fullname="IETF RADEXT Working Group">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC5080">
          <front>
            <title>Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes</title>
            <author fullname="D. Nelson" initials="D." surname="Nelson"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>This document describes common issues seen in Remote Authentication Dial In User Service (RADIUS) implementations and suggests some fixes. Where applicable, ambiguities and errors in previous RADIUS specifications are clarified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5080"/>
          <seriesInfo name="DOI" value="10.17487/RFC5080"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="RFC7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC6280">
          <front>
            <title>An Architecture for Location and Location Privacy in Internet Applications</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>Location-based services (such as navigation applications, emergency services, and management of equipment in the field) need geographic location information about Internet hosts, their users, and other related entities. These applications need to securely gather and transfer location information for location services, and at the same time protect the privacy of the individuals involved. This document describes an architecture for privacy-preserving location-based services in the Internet, focusing on authorization, security, and privacy requirements for the data formats and protocols used by these services. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="160"/>
          <seriesInfo name="RFC" value="6280"/>
          <seriesInfo name="DOI" value="10.17487/RFC6280"/>
        </reference>
        <reference anchor="RFC6733">
          <front>
            <title>Diameter Base Protocol</title>
            <author fullname="V. Fajardo" initials="V." role="editor" surname="Fajardo"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <author fullname="G. Zorn" initials="G." role="editor" surname="Zorn"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The Diameter base protocol is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations. This document specifies the message format, transport, error reporting, accounting, and security services used by all Diameter applications. The Diameter base protocol as defined in this document obsoletes RFC 3588 and RFC 5719, and it must be supported by all new Diameter implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6733"/>
          <seriesInfo name="DOI" value="10.17487/RFC6733"/>
        </reference>
        <reference anchor="RFC7930">
          <front>
            <title>Larger Packets for RADIUS over TCP</title>
            <author fullname="S. Hartman" initials="S." surname="Hartman"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The RADIUS-over-TLS experiment described in RFC 6614 has opened RADIUS to new use cases where the 4096-octet maximum size limit of a RADIUS packet proves problematic. This specification extends the RADIUS-over-TCP experiment (RFC 6613) to permit larger RADIUS packets. This specification compliments other ongoing work to permit fragmentation of RADIUS authorization information. This document registers a new RADIUS code, an action that required IESG approval.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7930"/>
          <seriesInfo name="DOI" value="10.17487/RFC7930"/>
        </reference>
        <reference anchor="RFC2869">
          <front>
            <title>RADIUS Extensions</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="W. Willats" initials="W." surname="Willats"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes additional attributes for carrying authentication, authorization and accounting information between a Network Access Server (NAS) and a shared Accounting Server using the Remote Authentication Dial In User Service (RADIUS) protocol described in RFC 2865 and RFC 2866. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2869"/>
          <seriesInfo name="DOI" value="10.17487/RFC2869"/>
        </reference>
        <reference anchor="RFC5997">
          <front>
            <title>Use of Status-Server Packets in the Remote Authentication Dial In User Service (RADIUS) Protocol</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document describes a deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, enabling clients to query the status of a RADIUS server. This extension utilizes the Status-Server (12) Code, which was reserved for experimental use in RFC 2865. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5997"/>
          <seriesInfo name="DOI" value="10.17487/RFC5997"/>
        </reference>
        <reference anchor="RFC8907">
          <front>
            <title>The Terminal Access Controller Access-Control System Plus (TACACS+) Protocol</title>
            <author fullname="T. Dahm" initials="T." surname="Dahm"/>
            <author fullname="A. Ota" initials="A." surname="Ota"/>
            <author fullname="D.C. Medway Gash" initials="D.C." surname="Medway Gash"/>
            <author fullname="D. Carrel" initials="D." surname="Carrel"/>
            <author fullname="L. Grant" initials="L." surname="Grant"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document describes the Terminal Access Controller Access-Control System Plus (TACACS+) protocol, which is widely deployed today to provide Device Administration for routers, network access servers, and other networked computing devices via one or more centralized servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8907"/>
          <seriesInfo name="DOI" value="10.17487/RFC8907"/>
        </reference>
        <reference anchor="RFC4120">
          <front>
            <title>The Kerberos Network Authentication Service (V5)</title>
            <author fullname="C. Neuman" initials="C." surname="Neuman"/>
            <author fullname="T. Yu" initials="T." surname="Yu"/>
            <author fullname="S. Hartman" initials="S." surname="Hartman"/>
            <author fullname="K. Raeburn" initials="K." surname="Raeburn"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document provides an overview and specification of Version 5 of the Kerberos protocol, and it obsoletes RFC 1510 to clarify aspects of the protocol and its intended use that require more detailed or clearer explanation than was provided in RFC 1510. This document is intended to provide a detailed description of the protocol, suitable for implementation, together with descriptions of the appropriate use of protocol messages and fields within those messages. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4120"/>
          <seriesInfo name="DOI" value="10.17487/RFC4120"/>
        </reference>
        <reference anchor="RFC3539">
          <front>
            <title>Authentication, Authorization and Accounting (AAA) Transport Profile</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Wood" initials="J." surname="Wood"/>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document discusses transport issues that arise within protocols for Authentication, Authorization and Accounting (AAA). It also provides recommendations on the use of transport by AAA protocols. This includes usage of standards-track RFCs as well as experimental proposals. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3539"/>
          <seriesInfo name="DOI" value="10.17487/RFC3539"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9257">
          <front>
            <title>Guidance for External Pre-Shared Key (PSK) Usage in TLS</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="J. Hoyland" initials="J." surname="Hoyland"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document provides usage guidance for external Pre-Shared Keys (PSKs) in Transport Layer Security (TLS) 1.3 as defined in RFC 8446. It lists TLS security properties provided by PSKs under certain assumptions, then it demonstrates how violations of these assumptions lead to attacks. Advice for applications to help meet these assumptions is provided. This document also discusses PSK use cases and provisioning processes. Finally, it lists the privacy and security properties that are not provided by TLS 1.3 when external PSKs are used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9257"/>
          <seriesInfo name="DOI" value="10.17487/RFC9257"/>
        </reference>
        <reference anchor="RFC7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="RFC4372">
          <front>
            <title>Chargeable User Identity</title>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity. This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4372"/>
          <seriesInfo name="DOI" value="10.17487/RFC4372"/>
        </reference>
        <reference anchor="RFC8559">
          <front>
            <title>Dynamic Authorization Proxying in the Remote Authentication Dial-In User Service (RADIUS) Protocol</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>RFC 5176 defines Change-of-Authorization (CoA) and Disconnect Message (DM) behavior for RADIUS. RFC 5176 also suggests that proxying these messages is possible, but it does not provide guidance as to how that is done. This specification updates RFC 5176 to correct that omission for scenarios where networks use realm-based proxying as defined in RFC 7542. This specification also updates RFC 5580 to allow the Operator-Name attribute in CoA-Request and Disconnect-Request packets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8559"/>
          <seriesInfo name="DOI" value="10.17487/RFC8559"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC5931">
          <front>
            <title>Extensible Authentication Protocol (EAP) Authentication Using Only a Password</title>
            <author fullname="D. Harkins" initials="D." surname="Harkins"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5931"/>
          <seriesInfo name="DOI" value="10.17487/RFC5931"/>
        </reference>
        <reference anchor="RFC2194">
          <front>
            <title>Review of Roaming Implementations</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Lu" initials="J." surname="Lu"/>
            <author fullname="J. Alsop" initials="J." surname="Alsop"/>
            <author fullname="J. Ding" initials="J." surname="Ding"/>
            <author fullname="W. Wang" initials="W." surname="Wang"/>
            <date month="September" year="1997"/>
            <abstract>
              <t>This document reviews the design and functionality of existing roaming implementations. Examples of cases where roaming capability might be required include ISP "confederations" and ISP-provided corporate network access support. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2194"/>
          <seriesInfo name="DOI" value="10.17487/RFC2194"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5281">
          <front>
            <title>Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)</title>
            <author fullname="P. Funk" initials="P." surname="Funk"/>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>EAP-TTLS is an EAP (Extensible Authentication Protocol) method that encapsulates a TLS (Transport Layer Security) session, consisting of a handshake phase and a data phase. During the handshake phase, the server is authenticated to the client (or client and server are mutually authenticated) using standard TLS procedures, and keying material is generated in order to create a cryptographically secure tunnel for information exchange in the subsequent data phase. During the data phase, the client is authenticated to the server (or client and server are mutually authenticated) using an arbitrary authentication mechanism encapsulated within the secure tunnel. The encapsulated authentication mechanism may itself be EAP, or it may be another authentication protocol such as PAP, CHAP, MS-CHAP, or MS-CHAP-V2. Thus, EAP-TTLS allows legacy password-based authentication protocols to be used against existing authentication databases, while protecting the security of these legacy protocols against eavesdropping, man-in-the-middle, and other attacks. The data phase may also be used for additional, arbitrary data exchange. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5281"/>
          <seriesInfo name="DOI" value="10.17487/RFC5281"/>
        </reference>
        <reference anchor="RFC2975">
          <front>
            <title>Introduction to Accounting Management</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <date month="October" year="2000"/>
            <abstract>
              <t>This document describes and discusses the issues involved in the design of the modern accounting systems. The field of Accounting Management is concerned with the collection the collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2975"/>
          <seriesInfo name="DOI" value="10.17487/RFC2975"/>
        </reference>
        <reference anchor="RFC6929">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS) Protocol Extensions</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Service (RADIUS) protocol is nearing exhaustion of its current 8-bit Attribute Type space. In addition, experience shows a growing need for complex grouping, along with attributes that can carry more than 253 octets of data. This document defines changes to RADIUS that address all of the above problems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6929"/>
          <seriesInfo name="DOI" value="10.17487/RFC6929"/>
        </reference>
        <reference anchor="RFC8018">
          <front>
            <title>PKCS #5: Password-Based Cryptography Specification Version 2.1</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions, encryption schemes, message authentication schemes, and ASN.1 syntax identifying the techniques.</t>
              <t>This document represents a republication of PKCS #5 v2.1 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 2898.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8018"/>
          <seriesInfo name="DOI" value="10.17487/RFC8018"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
