<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-radext-deprecating-radius-07" category="std" consensus="true" submissionType="IETF" updates="2865, 2866, 5176, 7585" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Deprecating Insecure RADIUS">Deprecating Insecure Practices in RADIUS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-radext-deprecating-radius-07"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>InkBridge Networks</organization>
      <address>
        <email>aland@inkbridgenetworks.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="27"/>
    <area>Internet</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 161?>

<t>RADIUS crypto-agility was first mandated as future work by RFC 6421.  The outcome of that work was the publication of RADIUS over TLS (RFC 6614) and RADIUS over DTLS (RFC 7360) as experimental documents.  Those transport protocols have been in wide-spread use for many years in a wide range of networks.  They have proven their utility as replacements for the previous UDP (RFC 2865) and TCP (RFC 6613) transports.  With that knowledge, the continued use of insecure transports for RADIUS has serious and negative implications for privacy and security.</t>
      <t>The publication of the "BlastRADIUS" exploit has also shown that RADIUS security needs to be updated.  It is no longer acceptable for RADIUS to rely on MD5 for security.  It is no longer acceptable to send device or location information in clear text across the wider Internet.  This document therefore deprecates many insecure practices in RADIUS, and mandates support for secure TLS-based transport layers.  We also discuss related security issues with RADIUS, and give recommendations for practices which increase both security and privacy.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RADEXT Working Group mailing list (<eref target="mailto:radext@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/radext/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/radext/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/deprecating-radius.git"/>.</t>
    </note>
  </front>
  <middle>
    <?line 167?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The RADIUS protocol <xref target="RFC2865"/> was first standardized in 1997, though its roots go back much earlier to 1993.  The protocol uses MD5 <xref target="RFC1321"/> to authenticate some packets types, and to obfuscate certain attributes such as User-Password.  As originally designed, Access-Request packets were entirely unauthenticated, and could be trivially spoofed (<xref section="7.1" sectionFormat="comma" target="RFC2869"/> and <xref section="4.3.2" sectionFormat="comma" target="RFC3579"/>).</t>
      <t>The insecurity of MD5 has been known for a long time.  It was first noted in relation to RADIUS in 1996 on the IETF RADIUS working group mailing list <xref target="MD5-1996"/>, which also discussed using an HMAC construct to increase security.  While it was common knowledge at the time, the earliest record of concerns about Access-Request packets spoofing was on the RADIUS working group mailing list <xref target="DATTACK"/> in 1998.  There was substantial further discussions about the lack of integrity checks on the list over the next few years.  The outcome of that process was the definition of Message-Authenticator as an optional HMAC-based attribute in <xref section="5.14" sectionFormat="comma" target="RFC2869"/>.</t>
      <t>Unfortunately, the use of Message-Authenticator was made optional.  This lack of integrity checks for Access-Request packets was deemed acceptable for some situations in <xref section="7.1" sectionFormat="comma" target="RFC2869"/>:</t>
      <ul empty="true">
        <li>
          <t>Access-Request packets with a User-Password establish the identity of
both the user and the NAS sending the Access-Request, because of the
way the shared secret between NAS and RADIUS server is used.</t>
        </li>
      </ul>
      <t>That conclusion now appears to be incorrect.  The text continues with an acknowledgment that:</t>
      <ul empty="true">
        <li>
          <t>Access-Request packets with CHAP-Password or EAP-Message do not have
a User-Password attribute, so the Message-Authenticator attribute
should be used in access-request packets that do not have a User-
Password, in order to establish the identity of the NAS sending the
request.</t>
        </li>
      </ul>
      <t>This text was non-normative due to the lowercase 'should'.  It appears that no implementation followed even this limited suggestion.</t>
      <t>The packet forgery issue was further discussed in 2004 in <xref section="4" sectionFormat="comma" target="RFC3579"/>, and again in 2007 in <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/>.  That document suggested that implementations require the use of Message-Authenticator in order to prevent forgery:</t>
      <ul empty="true">
        <li>
          <t>However, Access-Request packets not containing a Message-
Authenticator attribute ...  may
be trivially forged.  To avoid this issue, server implementations may
be configured to require the presence of a Message-Authenticator
attribute in Access-Request packets.  Requests not containing a
Message-Authenticator attribute MAY then be silently discarded.</t>
        </li>
      </ul>
      <t>To our knowledge, only one RADIUS server implemented even this limited suggestion.  At the time of publication of <xref target="RFC5080"/>, there was no consensus to require the use of Message-Authenticator in all Access-Request packets.  If this recommendation had instead been made mandatory, then the recent BlastRADIUS attack <xref target="BLAST"/> would largely have been prevented.</t>
      <t>The state of MD5 security was again discussed in <xref target="RFC6151"/>, which states in Section 2:</t>
      <ul empty="true">
        <li>
          <t>MD5 is no longer acceptable where collision resistance is required such as digital signatures.</t>
        </li>
      </ul>
      <t>That statement led to RADIUS security being reviewed in <xref section="3" sectionFormat="comma" target="RFC6421"/>.  The outcome of that review was the text in the remainder of <xref target="RFC6421"/>, which created crypto-agility requirements for RADIUS.  The main outcome of those requirements was not any change to RADIUS, but instead the definition of RADIUS/TLS in <xref target="RFC6614"/>, and RADIUS/DTLS in <xref target="RFC7360"/>.  The other outcome was a consensus that adding crypto-agility to RADIUS was likely not a good idea, and that standardizing RADIUS over TLS instead was a significantly better path forward.</t>
      <t>While the RADIUS/TLS work is ongoing at the time of this writing, there are still a large number of sites using RADIUS/UDP.  Those sites need to be supported and secured until they can migrate to TLS, while at the same time maintaining backwards compatibility.</t>
      <t>To summarize, <xref target="RFC6151"/> is over a decade old as of the time of this writing.  <xref target="RFC5080"/> is almost two decades old.  The knowledge that Access-Request packets lack integrity checks is almost three decades old.  Over that entire span of time, there has been no mandate to increase the security of Access-Request packets. This document provides that mandate.</t>
      <t>It is no longer acceptable for RADIUS to rely on MD5 for security.  It is no longer acceptable to send device or location information in clear text across the wider Internet.  This document therefore deprecates all insecure uses of RADIUS, and mandates the use of secure TLS-based transport layers.  We also discuss related security issues with RADIUS, and give many recommendations for practices which increase security and privacy.</t>
      <section anchor="radius-over-the-internet">
        <name>RADIUS over the Internet</name>
        <t>As the insecurity of MD5 has been well known for decades, RADIUS traffic over the Internet was historically secured with IPsec as described in <xref section="4.2" sectionFormat="comma" target="RFC3579"/>:</t>
        <ul empty="true">
          <li>
            <t>To address the security vulnerabilities of RADIUS/EAP,
implementations of this specification SHOULD support IPsec
(RFC2401) along with IKE (RFC2409) for key management.  IPsec ESP
(RFC2406) with non-null transform SHOULD be supported, and IPsec
ESP with a non-null encryption transform and authentication
support SHOULD be used to provide per-packet confidentiality,
authentication, integrity and replay protection.  IKE SHOULD be
used for key management.</t>
          </li>
        </ul>
        <t>The use of IPsec allowed RADIUS to be sent privately, and securely, across the Internet.  However, experience showed that TLS was in many ways simpler for implementations and deployment than IPsec.  While IPsec required operating system support, TLS was an application-space library.  This difference, coupled with the wide-spread adoption of TLS for HTTPS, ensures that it was often easier for applications to use TLS than IPsec.</t>
        <t>RADIUS/TLS <xref target="RFC6614"/> and RADIUS/DTLS <xref target="RFC7360"/> were then defined in order to meet the crypto-agility requirements of <xref target="RFC6421"/>.  RADIUS/TLS has been in wide-spread use for about a decade, including eduroam <xref target="EDUROAM"/> <xref target="RFC7593"/>, and more recently OpenRoaming <xref target="OPENROAMING"/> and <xref target="I-D.tomas-openroaming"/>.  RADIUS/DTLS has seen less use across the public Internet, but it still has multiple implementations.</t>
        <t>However, RADIUS/UDP is still widely used, even though it depends on MD5 and "ad hoc" constructions for security.  The recent "BlastRADIUS" attack shows just how inadequate this dependency is.  The BlastRADIUS attack is discussed in more detail below, in <xref target="blastradius"/>.</t>
        <t>Even if we ignore the BlastRADIUS attack, problems with MD5 mean that a hobbyist attacker who can view RADIUS/UDP traffic can brute-force test all possible RADIUS shared secrets of eight characters in not much more than an hour.  An more resourceful attacker (e.g. a nation-state) can check all much longer shared secrets with only modest expenditures.  See <xref target="cracking"/> below for a longer discussion of this topic.</t>
        <t>Determining the shared secret will also result in compromise of all passwords carried in the User-Password attribute.  Even using CHAP-Password offers minimal protection, as the cost of cracking the underlying password is similar to the cost of cracking the shared secret.  MS-CHAP (<xref target="RFC2433"/> and MS-CHAPv2 <xref target="RFC2759"/>) are significantly worse in security than PAP, as they can be completely broken with minimal resources, which <xref target="ms-chap"/> describes in more detail.</t>
        <t>The use of Message-Authenticator does not change the cost of attacking the shared secret.  The Message-Authenticator attribute is a later addition to RADIUS, and does does not replace the original MD5-based packet signatures.  While that attribute therefore offers a stronger protection, it does not change the cost of attacking the shared secret.  Moving to a stronger packet signatures (e.g. <xref target="RFC6218"/>) would still not fully address the issues with RADIUS, as the protocol still has privacy issues unrelated to the the security of packet authenticators.</t>
        <t>That is, most attributes in RADIUS are sent in clear-text, and only a few attributes such as User-Password and Tunnel-Password have their contents hidden.  Even the hidden attributes rely on "ad hoc" obfuscation methods using MD5, which have not been successfully attacked, but are not proven to be secure.  Peoples locations can (and has) been accurately determined, and people have been tracked using location data sent insecurely across the Internet (<xref target="privacy"/>).</t>
        <t>The implications for security and individual safety are large, and negative.</t>
        <t>These issues are only partly mitigated when the data carried within RADIUS use their own methods for increased security and privacy.  For example, some authentication methods such EAP-TLS, EAP-TTLS, etc. allow for User-Name privacy and for more secure transport of passwords via the use of TLS.  Some privacy can be gained through MAC address randomization, which can also limit device information identification to a particular manufacturer, instead of to a unique device.</t>
        <t>However, these methods are not always used, or are not always available.  Even if these methods were used ubiquitously, they do not protect all of the information which is publicly available over RADIUS/UDP or RADIUS/TCP transports.  And even when TLS-based EAP methods are used, implementations have historically often skipped certificate validation, leading to password compromise (<xref target="SPOOFING"/>).  In many cases, users were not even aware that the server certificate was incorrect or spoofed, which meant that there was no way for the user to detect that anything was wrong.  Their passwords were simply handed to a spoofed server, with little possibility for the user to take any action to stop it.</t>
      </section>
      <section anchor="simply-using-ipsec-or-tls-is-not-enough">
        <name>Simply using IPsec or TLS is not enough</name>
        <t>The use of a secure transport such as IPsec or TLS ensures complete privacy and security for all RADIUS traffic.  An observer of encrypted traffic is limited to knowing rough activity levels of a client or server.  That is, an observer can tell if there are a few users on a NAS, or many users on a NAS.  All other information is hidden from all observers.  Even with those limitations, it is not enough to say "use IPsec" and then move on to other issues.  There are many issues which can only be addressed via an informed approach.</t>
        <t>For example, it is possible for an attacker to record the session traffic, and later crack the TLS session key or IPsec parameters.  This attack could comprise all traffic sent over that connection, including EAP session keys.  If the cryptographic methods provide forward secrecy (<xref section="6.3" sectionFormat="comma" target="RFC7525"/>), then breaking one session provides no information about other sessions.  As such, it is RECOMMENDED that all cryptographic methods used to secure RADIUS conversations provide forward secrecy.  While forward secrecy will not protect individual sessions from attack, it will prevent attack on one session from being leveraged to attack other, unrelated, sessions.</t>
        <t>AAA servers SHOULD minimize the impact of such attacks by using a total throughput or time based limit before replacing the session keys.  The session keys can be replaced though a process of either re-keying the existing connection, or by opening a new connection and deprecating the use of the original connection.  Note that if the original connection if closed before a new connection is open, it can cause spurious errors in a proxy environment.</t>
        <t>The final attack possible in a AAA system is where one party in a AAA conversation is compromised or run by a malicious party.  This attack is made more likely by the extensive use of RADIUS proxy forwarding chains.  In that situation, every RADIUS proxy has full visibility into, and control over, the traffic it transports.  The solution here is to minimize the number of proxies involved, such as by using Dynamic Peer Discovery, as defined in <xref target="RFC7585"/>.</t>
        <t>There are many security issues in addition to simply adding a secure transport. The rest of this document addresses those issues in detail.</t>
      </section>
      <section anchor="overview">
        <name>Overview</name>
        <t>The rest of this document begins a summary of issues with RADIUS, including showing just how trivial it is to crack RADIUS/UDP security.  We then mandate the use of secure transport, and describe what that requirement means in practice.  We give recommendations on how current systems can be migrated to using TLS.  We give suggestions for increasing the security of existing RADIUS transports, including a discussion of the authentication protocols carried within RADIUS.  We conclude with security and privacy considerations.</t>
        <t>As IPsec has been discussed previously in the context of RADIUS, we do not discuss it more here, except to say it is an acceptable solution for securing RADIUS traffic.  As the bulk of the current efforts are focused on TLS, this document likewise focuses on TLS.  We note that all of the issues raised here about the RADIUS protocol also apply to IPsec transport.  That is, when the application is not in charge of protocol security, the application is vulnerable to transport misconfigurations or attacks.</t>
        <section anchor="a-comment-on-specifications">
          <name>A Comment on Specifications</name>
          <t>While this document tries to be comprehensive, it is necessarily imperfect.  There may be issues which should have been included here, but which were missed due to oversight or accident.  Any reader should be aware that there are good practices which are perhaps not documented in a specification, and bad behaviors which are likewise not forbidden.  For example, documents such as <xref target="RFC5080"/> were written to both correct errors in earlier documents, and to address harmful behaviors which had been seen in practice.</t>
          <t>These harmful behaviors can have a large impact both on security and on interoperability, even if they are not expressly forbidden in a specification.</t>
          <t>There is a regrettable belief that a particular practice is "allowed" by a specification, simply because the specification does not forbid that practice.  This belief is wrong.  That is, a behavior which is not even mentioned in the specification cannot honestly be said to be "permitted" or "allowed" by that specification.    The most charitable description would be that these behaviors are undefined, or at best, they are not forbidden.</t>
          <t>By their very nature, documents include a small number of permitted, required, and/or forbidden behaviors.  There are a much larger set of behaviors which are undefined.  That is, behaviors which are neither permitted nor forbidden.  Those behaviors may be good or bad, independent of what any specification says.</t>
          <t>Outside of published specifications, there is also a large set of common practices and behaviors which have grown organically over time, but which have not been written into a specification.  These practices have been found to be valuable by implementers and administrators.  Deviations from these practices generally result in instabilities and incompatibilities between systems.  As a result, implementers should exercise caution when creating new behaviors which have not previously been seen in the industry.  Such behaviors are likely to cause problems, where there would have been no problems if common practices had instead been followed.</t>
          <t>It is RECOMMENDED that implementations and administrators follow widely accepted practices which have been proven to work and to be secure, even if those practices are not written down in a public specification.  Implementers SHOULD NOT create features which depend on undefined behavior; such features are very likely to be wrong.</t>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <ul spacing="normal">
        <li>
          <t>RADIUS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>The Remote Authentication Dial-In User Service protocol, as defined in <xref target="RFC2865"/>, <xref target="RFC2866"/>, and <xref target="RFC5176"/> among others.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/UDP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the User Datagram Protocol as define above.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/TCP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Control Protocol <xref target="RFC6613"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/TLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Layer Security protocol <xref target="RFC6614"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/DTLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Datagram Transport Layer Security protocol  <xref target="RFC7360"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>TLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>the Transport Layer Security protocol.  Generally when we refer to TLS in this document, we are referring to RADIUS/TLS and/or RADIUS/DTLS.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>NAS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Network Access Server, which is a RADIUS client.</t>
        </li>
      </ul>
      <t>In order to continue the terminology of <xref target="RFC2865"/>, we describe the Request Authenticator, Response Authenticator, and Message-Authenticator as "signing" the packets.  This terminology is not consistent with modern cryptographic terms, but using other terminology could be misleading.  The reader is assured that no modern cryptographic methods are used with RADIUS/UDP.</t>
    </section>
    <section anchor="overview-of-issues-with-radius">
      <name>Overview of issues with RADIUS</name>
      <t>There are a large number of issues with RADIUS.   The most serious is the BlastRADIUS vulnerability, which means that subject to some limitations, attackers can leverage MD5 known-prefix collisions to cause any user to be authenticated, and then be given any authorization.  Multi-factor Authentication (MFA) systems can be bypassed, and the RADIUS server will in many cases not even be aware that an unauthorized user is on the network.</t>
      <t>Another issue is that RADIUS sends most information "in the clear", with obvious privacy implications.  Even if packets use Message-Authenticator for integrity checks, it is still possible for the average hobbyist who observes RADIUS traffic to perform brute-force attacks to crack even seemingly complex shared secrets.</t>
      <t>There is no way to fix the RADIUS protocol to address all of these issues.  The short-term fix is to require the use of Message-Authenticator for packet integrity checks.  The long-term solution is to wrap the protocol in a secure transport, such as TLS or IPsec.</t>
      <t>We address each of these issues in detail below.</t>
      <section anchor="the-blastradius-vulnerability">
        <name>The BlastRADIUS Vulnerability</name>
        <t>The BlastRADIUS vulnerability is discussed in detail in <xref target="BLAST"/>, and we only give a short summary here.  We refer the reader to the original paper for a more complete description of the issue.</t>
        <t>For the following description, we assume that we have texts "A", "B", "S".  Following the use in <xref target="RFC2865"/>, "+" denotes concatenation.  The vulnerability then relies on the following property of MD5:</t>
        <ul empty="true">
          <li>
            <t>If MD5(A) == MD5(B), then MD5(A + S) == MD5(B + S)</t>
          </li>
        </ul>
        <t>If an attacker is given text "A", and can find text "B" which has the same MD5 hash, then the attacker can perform a chosen prefix attack.  Even if the attacker does not know text "S", if given M5(A + S), then the attacker can trivially calculate MD5(B + S): it has the same value.</t>
        <t>In RADIUS, the Response Authenticator field <xref section="3" sectionFormat="comma" target="RFC2865"/> is calculated via precisely this vulnerable construct:</t>
        <ul empty="true">
          <li>
            <t>Response Authenticator = MD5(packet + secret)</t>
          </li>
        </ul>
        <t>The attacker can observe or predict a packet (e.g. Access-Reject), which is signed with a shared secret unknown to the attacker.  The attacker can then find an Access-Accept with the same MD5 hash as the Access-Reject, and replace the Access-Reject with the Access-Accept using the Response Authenticator from the Access-Reject.</t>
        <t>The client receives the packet, calculates MD5(Access-Accept + secret), verifies that the Response Authenticator is correct, and proceeds to follow the attackers instructions: give the user access, along with some authorization.</t>
        <t>This process is the basic concept behind the BlastRADIUS vulnerability.  We note that this attack does not expose the contents of the User-Password attribute.  Instead, it bypasses all server-side authentication, and simply fools the client into accepting a forged response.</t>
        <t>While this issue requires that an attacker be "on path" and be able to intercept and modify packets, the meaning of "on path" is often "the entire Internet".  As such, this attack alone is sufficient reason to deprecate all uses of RADIUS/UDP and RADIUS/TCP.</t>
      </section>
      <section anchor="privacy">
        <name>Information is sent in Clear Text</name>
        <t>With the exception of a few attributes such as User-Password, all RADIUS traffic is sent "in the clear" when using UDP or TCP transports.  Even when TLS is used, all RADIUS traffic (including User-Password) is visible to proxies.  The resulting data exposure has a large number of privacy issues.  We refer to <xref target="RFC6973"/>, and specifically to Section 5 of that document for detailed discussion, and to <xref section="6" sectionFormat="comma" target="RFC6973"/> for recommendations on threat mitigations.</t>
        <t>More discussion of location privacy is given in <xref target="RFC6280"/>, which defines an "Architecture for Location and Location Privacy in Internet Applications".  However, that work was too late to have any practical impact on the design of the RADIUS protocol, as <xref target="RFC5580"/> had already been published.</t>
        <t>The effect is that any observer of non-TLS RADIUS traffic is able to obtain a substantial amount of personal identifiable information (PII) about users.  The observer can tell who is logging in to the network, what devices they are using, where they are logging in from, and their approximate location (usually city).  With location-based attributes as defined in <xref target="RFC5580"/>, a user's location may be determined to within 15 or so meters outdoors, and with "meter-level accuracy indoors" <xref target="WIFILOC"/>.  An observer can also use RADIUS accounting packets to determine how long a user is online, and to track a summary of their total traffic (upload and download totals).</t>
        <t>When RADIUS/UDP is used across the public Internet, common Wi-Fi configurations allow the location of individuals to be tracked in real-time (usually 10 minute intervals), to within 15 meters.  The user devices can be identified, and also tracked.  Passwords can often be compromised by a resourceful attacker, or for MS-CHAP, by a hobbyist with a laptop.  Even when the packets do not contain any <xref target="RFC5580"/> location information for the user, the packets usually contain the MAC address of the Wi-Fi access point.  The MAC address and physical location of these devices are publicly available, and there are multiple services selling databases of this information.</t>
        <t>These issues are not theoretical.  Recently <xref target="BRIGGS"/> noted that:</t>
        <ul empty="true">
          <li>
            <t>Overall, I think the above three examples are just the tip of the proverbial iceberg of SS7 and Diameter based location and monitoring exploits that have been used successfully against targeted people in the USA.</t>
          </li>
        </ul>
        <t><xref target="BRIGGS"/> continues with a statement that there have been:</t>
        <ul empty="true">
          <li>
            <t>... numerous other exploits based on SS7 and Diameter that go beyond location tracking. Some of these involve issues like (1) the monitoring of voice and text messages, (2) the delivery of spyware to targeted devices, and (3) the influencing of U.S. voters by overseas countries using text messages.</t>
          </li>
        </ul>
        <t>While these comments apply to Diameter <xref target="RFC6733"/>, the same location tracking and monitoring is also possible with RADIUS.  There is every reason to believe that similar attacks on RADIUS have occurred, but are simply less publicized than similar attacks on Diameter.</t>
        <t>The use of clear-text protocols across insecure networks is no longer acceptable.  Using clear-text protocols in networks which are believed to be secure is not a significantly better solution.  The correct solution is to use secure protocols, to minimize the amount of private data which is being sent, and to minimize the number of third parties who can see any traffic.</t>
      </section>
      <section anchor="md5-has-been-broken">
        <name>MD5 has been broken</name>
        <t>Attacks on MD5 are summarized in part in <xref target="RFC6151"/>.  The BlastRADIUS work substantially improved the speed of finding MD5 collisions, and those improvements are publicly available at <xref target="HASHCLASH"/>.</t>
        <t>While there have not been many other new attacks in the decade since <xref target="RFC6151"/> was published, that does not mean that further attacks do not exist.  It is more likely that no one is looking for new attacks.</t>
      </section>
      <section anchor="cracking">
        <name>Cracking RADIUS shared secrets is not hard</name>
        <t>The cost of cracking a a shared secret can only go down over time as computation becomes cheaper.  The issue is made worse because of the way MD5 is used to authenticate RADIUS packets.  The attacker does not have to calculate the hash over the entire packet, as the hash prefix can be calculated once, and then cached.  The attacker can then begin the attack with that hash prefix, and brute-force only the shared secret portion.</t>
        <t>At the time of writing this document, an "off the shelf" commodity computer can calculate at least 100M MD5 hashes per second.  If we limit shared secrets to upper/lowercase letters, numbers, and a few "special" characters, we have 64 possible characters for shared secrets.  Which means that for 8-character secrets, there are 2^48 possible combinations.</t>
        <t>The result is that using consumer-grade machine, it takes approximately 32 days to brute-force the entire 8 octet / 64 character space for shared secrets.  The problem is even worse when graphical processing units (GPUs) are used. A high-end GPU is capable of performing more than 64 billion hashes per second.  At that rate, the entire 8 character space described above can be searched in approximately 90 minutes.</t>
        <t>This is an attack which is feasible today for a hobbyist. Increasing the size of the character set raises the cost of cracking, but not enough to be secure.  Increasing the character set to 93 characters means that the hobbyist using a GPU could search the entire 8 character space in about a day.</t>
        <t>Increasing the length of the shared secret has a larger impact on the cost of cracking.  For secrets ten characters long, the search space is approximately 2^60.  One GPU can search a 64-character space in about six months. A 93 character space (2^65 complexity) would take approximately 24 years.</t>
        <t>This brute-force attack is also trivially parallelizable.  Nation-states have sufficient resources to deploy hundreds to thousands of systems dedicated to these attacks.  That realization means that a "time to crack" of 24 years is simply expensive, but does not take much "wall clock" time.  A thousand commodity CPUs are enough to reduce the crack time from 24 years to a little over a week.</t>
        <t>Whether the above numbers are precise or only approximate is immaterial.  These attacks will only get better over time.  The cost to crack shared secrets will only go down over time.</t>
        <t>If the shared secret is long, then "cracking" the secret is expensive.  It is cheaper to perform the BlastRADIUS attack at a cost of approximately 2^53 per packet, and less than $100 in purchased CPU time.  While cracking the shared secret would break all RADIUS packets using that secret, forging one packet is often enough to give the attacker administrator access to a NAS, where the shared secret is visible in the administration interface.  The conclusion, then, is that increasing the security of the shared secret offers minimal protection when the Access-Request packets are unsigned.</t>
        <t>Even if the shared secrets were enough to secure all RADIUS packets, administrators do not always derive shared secrets from secure sources of random numbers.  The "time to crack" numbers given above are the absolute best case, assuming administrators follow best practices for creating secure shared secrets.  For shared secrets created manually by a person, the search space is orders of magnitude smaller than the best case outlined above.  Rather than brute-forcing all possible shared secrets, an attacker can create a local dictionary which contains common or expected values for the shared secret.  Where the shared secret used by an administrator is in the dictionary, the cost of the attack can drop by multiple orders of magnitude.</t>
        <t>Implementers and administrators SHOULD assume that a hobbyist attacker with modest resource can crack most shared secrets created by people in minutes, if not seconds.</t>
        <t>Despite the ease of attacking MD5, it is still a common practice for some "cloud" and other RADIUS providers to send RADIUS/UDP packets over the Internet "in the clear".  It is also common practice for administrators to use "short" shared secrets, and to use shared secrets created by a person, or secrets derived from a limited character set.  Theses practice are easy to implement and follow, but they are highly insecure and MUST NOT be used.</t>
        <t>Further requirements in shared secrets are given below in <xref target="shared-secrets"/>.</t>
      </section>
      <section anchor="tunnel-coa">
        <name>Tunnel-Password and CoA-Request packets</name>
        <t>There are a number of security problems with the use Tunnel-Password attribute in CoA-Request and Disconnect-Request packets.  A full explanation requires a review of the relevant specifications.</t>
        <t><xref target="RFC5176"/> Section 2.3 describes how to calculate the Request Authenticator field for these packets:</t>
        <artwork><![CDATA[
Request Authenticator

   In Request packets, the Authenticator value is a 16-octet MD5
   [RFC1321] checksum, called the Request Authenticator.  The
   Request Authenticator is calculated the same way as for an
   Accounting-Request, specified in [RFC2866].
]]></artwork>
        <t>Where <xref target="RFC2866"/> Section 3 says:</t>
        <artwork><![CDATA[
   The NAS and RADIUS accounting server share a secret.  The Request
   Authenticator field in Accounting-Request packets contains a one-
   way MD5 hash calculated over a stream of octets consisting of the
   Code + Identifier + Length + 16 zero octets + request attributes +
   shared secret (where + indicates concatenation).  The 16 octet MD5
   hash value is stored in the Authenticator field of the
   Accounting-Request packet.
]]></artwork>
        <t>Taken together, these definitions mean that for CoA-Request packets, all attribute obfuscation is calculated with the Reply Authenticator being all zeroes.  In contrast for Access-Request packets, the Request Authenticator is mandated to be 16 octets of random data.  This difference reduces the security of the obfuscation.</t>
        <t>For Tunnel-Password, <xref target="RFC5176"/> Section 3.6 allows it to appear in CoA-Request packets:</t>
        <artwork><![CDATA[
   ...
   Change-of-Authorization Messages
   
   Request   ACK      NAK   #   Attribute
   ...
   0+        0        0    69   Tunnel-Password (Note 5)
   ...
   (Note 5) When included within a CoA-Request, these attributes
   represent an authorization change request.  Where tunnel attributes
   are included within a successful CoA-Request, all existing tunnel
   attributes are removed and replaced by the new attribute(s).
]]></artwork>
        <t>However, <xref target="RFC2868"/> Section 3.5 says that Tunnel-Password is encrypted with the Request Authenticator:</t>
        <artwork><![CDATA[
   Call the shared secret S, the pseudo-random 128-bit Request
   Authenticator (from the corresponding Access-Request packet) R,
]]></artwork>
        <t>The assumption that the Request Authenticator is random data is true for Access-Request packets.  That assumption is not true for CoA-Request packets.</t>
        <t>That is, when the Tunnel-Password attribute is used in CoA-Request packets, the only source of randomness in the obfuscation is the salt, as defined in <xref target="RFC2868"/> Section 3.5;</t>
        <artwork><![CDATA[
 Salt
   The Salt field is two octets in length and is used to ensure the
   uniqueness of the encryption key used to encrypt each instance of
   the Tunnel-Password attribute occurring in a given Access-Accept
   packet.  The most significant bit (leftmost) of the Salt field
   MUST be set (1).  The contents of each Salt field in a given
   Access-Accept packet MUST be unique.
]]></artwork>
        <t>This chain of unfortunate definitions means that there is only 15 bits of entropy in the Tunnel-Password obfuscation (plus the secret).  It is not known if this limitation makes it sufficiently easy for an attacker to determine the contents of the Tunnel-Password, as the obfuscated value still depends on the shared secret.  However, such limited entropy cannot be a good thing, and it is one more reason to deprecate RADIUS/UDP and RADIUS/TCP.</t>
        <t>Due to the above issues, implementations and new specifications SHOULD NOT use obfuscated attributes in CoA-Request or Disconnect-Request packets.</t>
      </section>
      <section anchor="tls-based-eap-methods-radiustls-and-ipsec">
        <name>TLS-based EAP methods, RADIUS/TLS, and IPsec</name>
        <t>The above analysis as to security and privacy issues focuses on RADIUS/UDP and RADIUS/TCP.  These issues are partly mitigated through the use secure transports, but it is still possible for information to "leak".</t>
        <t>When TLS-based EAP methods such as TTLS or PEAP are used, they still transport passwords inside of the TLS tunnel.  It is possible for an authentication server to terminate the TLS tunnel, and then proxy the inner data over RADIUS/UDP.  The design of both TTLS and PEAP make this process fairly trivial.  The inner data for TTLS is in Diameter AVP format, which can be trivially transformed to RADIUS attributes.  The inner data for PEAP is commonly EAP-MSCHAPv2, which can also be trivially transformed to bare EAP, or to MS-CHAPv2.</t>
        <t>Similar issues apply to RADIUS/TLS and IPsec.  A proxy receiving packets over IPsec terminates the secure tunnel, but then might forward the packets over an insecure transport protocol.  While this process could arguably be seen as a misconfiguration issue, it is never the less possible due to the design of the RADIUS protocol.  The design of RADIUS security is that it is "hop by hop", and there is no way for one "hop" to know anything about, or to control, the security of another "hop".</t>
        <t>The only solution to either issue would be to create a new protocol which is secure by design.  Unfortunately that path is not possible, and we are left with the recommendations contained in this document.</t>
      </section>
      <section anchor="other-issues">
        <name>Other Issues</name>
        <t>There are many other issues with RADIUS which are unrelated to security or privacy.  As of the time of writing this document, those issues are being collated in <xref target="ISSUES"/>.  The bulk of the problems noted in that Wiki are operational considerations, along with inconsistencies in the previous RADIUS specifications.</t>
        <t>As the focus of this document is security, it does not address problems with the RADIUS protocol in general.  For example, there are known problems with the RADIUS state machine.  There are common practices which are secure but which are operationally expensive.  RADIUS accounting is known to be inaccurate and often inconsistent.</t>
        <t>Some of the issues noted in the above Wiki could potentially have security impact.  For example, if a RADIUS server is not implemented correctly, an attacker can perform a resource exhaustion attack on it, and effectively take it offline.  Proxies are subject to Denial of Service attacks even from trusted clients, because those clients originate packets at the request of untrusted and unknown users.  Rate limiting for RADIUS requests is a poorly tested or documented process, and largely relies on mutual trust of administrators.</t>
        <t>We hope that the above issues are addressed in a future document.  This document focuses on security issues related to transport protocols and authentication protocols, which will have to be sufficient for now.</t>
      </section>
    </section>
    <section anchor="all-short-shared-secrets-have-been-compromised">
      <name>All short Shared Secrets have been compromised</name>
      <t>Unless RADIUS packets are sent over a secure network (IPsec, TLS, etc.), administrators SHOULD assume that any shared secret of 8 characters or less has been compromised as soon as it is used.  Administrators SHOULD assume that any shared secret of 10 characters or less has been compromised by an attacker with significant resources.  Administrators SHOULD also assume that any private information (such as User-Password) which depends on such shared secrets has also been compromised.</t>
      <t>To be perfectly clear: if a User-Password, or CHAP-Password, or MS-CHAP password has been sent over the Internet via RADIUS/UDP or RADIUS/TCP in the last decade, you should assume that the underlying password has been compromised.</t>
    </section>
    <section anchor="blastradius">
      <name>The BlastRADIUS Attack</name>
      <t>This section gives some more detail on the attack, so that the reader can be informed as to why this document makes particular recommendations.</t>
      <t>An "on path" attacker can inject one or more Proxy-State attributes with special contents into an Access-Request packet. The Proxy-State attribute itself will not trigger any overflow or “out of bounds” issue with the RADIUS client or server.  Instead, the contents of the attributes will allow the attacker to create an MD5 known-prefix collision when the server calculates the Response Authenticator.  In effect, the attacker uses the RADIUS server, and its knowledge of the shared secret, to unknowingly authenticate packets which it has not created.</t>
      <t>The behavior of the Proxy-State attribute is extremely useful to this attack.  The attribute is defined in <xref section="5.33" sectionFormat="comma" target="RFC2865"/> as an opaque token which is sent by a RADIUS proxy, and is echoed back by RADIUS servers.  That is, the contents of the attribute are never examined or interpreted by the RADIUS server.  Even better, testing shows that all RADIUS clients will simply ignore any unexpected Proxy-State attributes which they receive.  Finally, implementations generally add Proxy-State to the end of response packets, which simplifies the attack.</t>
      <t>This attribute is therefore ideally suited to an attackers purpose of injecting arbitrary data into packets, without that data affecting client or server behavior.   The reasons for this behavior are outlined below in <xref target="proxy-state"/>.  While those reasons ended up being transient, the impact of those decisions has impacted RADIUS for decades.</t>
      <t>While it is possible to use other attributes to achieve the same effect, the use of Proxy-State is simple, and is sufficient to trigger the issue.  For example, it is theoretically possible to use the User-Name attribute for this attack, if it is echoed back in an Access-Accept, or even as part of the the contents of a Reply-Message in an Access-Accept.  There is no much benefit in further researching that attack, as the mitigations for attacks using Proxy-State will also protect clients and servers from a similar attacks which use other attributes.</t>
      <t>The injected data and resulting MD5 collision allows the attacker to modify the packet contents almost at will, and the client will still accept the modified packet as being authentic.  The attack allows nearly arbitrary attributes to be added to the response.  Those attributes are simply part of the MD5 collision calculation, and do not substantially impact the cost of that calculation.</t>
      <t>We reiterate that since the RADIUS server can be convinced to authenticate packets using a prefix chosen by the attacker, there is no need for the attacker to know the shared secret.  This attack succeeds no matter how secure the shared secret is, the only mitigation is to use Message-Authenticator or TLS.</t>
      <t>The attack is implemented via the following steps, which are numbered the same as in the original paper.</t>
      <ol spacing="normal" type="1"><li>
          <t>The attacker requests network access from the RADIUS client (NAS).  This action triggers the NAS to send an Access-Request packet to the RADIUS server.</t>
        </li>
        <li>
          <t>The Access-Request is observed to obtain its contents, including the Request Authenticator field.  The attacker prevents this packet from reaching the server until the MD5 collision data has been calculated..  The NAS will retransmit the packet one or more times after a delay, giving the attacker time to calculate the chosen prefix.</t>
        </li>
        <li>
          <t>Some external resources are used to calculate an MD5 collision using the Request Authenticator, and the expected contents of an Access-Reject.  As Access-Reject packets are typically empty (or can be observed), the expected packet contents are known in their entirety.</t>
        </li>
        <li>
          <t>Once an MD5 collision is found, the resulting data is placed into one or more Proxy-State attributes in the previously seen Access-Request.  The attacker then sends this modified Access-Request to the RADIUS server.</t>
        </li>
        <li>
          <t>The RADIUS server responds with an Access-Reject, and includes the Proxy-State attributes from the modified Access-Request packets.  The packet contains the malicious Proxy-State(s), along with a Response Authenticator which depends on both those malicious attributes, and the shared secret.</t>
        </li>
        <li>
          <t>The attacker discards the original Access-Reject, and uses the chosen prefix data in the Proxy-State(s) to create a different (i.e. modified) response, such as an Access-Accept.  Other authorization attributes such as VLAN assignment can also be add, modified, or deleted.  This modified packet is sent to the NAS.</t>
        </li>
        <li>
          <t>The NAS receives the modified Access-Accept, verifies that the Response Authenticator is correct, and gives the user access, along with the attackers desired authorization.</t>
        </li>
      </ol>
      <t>The result of this attack is a near-complete compromise of the RADIUS protocol.  The attacker can cause any user to be authenticated.  The attacker can give almost any authorization to any user.</t>
      <t>While the above description uses Access-Reject responses, we reiterate that the root cause of the vulnerability is in the Access-Request packets.  The attack will therefore succeed even if the server responds with Access-Accept, Access-Challenge, or Protocol-Error <xref target="RFC7930"/>.  The vulnerability in Access-Challenge allows MFA to be bypassed, as the attacker simply replaces the Access-Challenge with an Access-Accept.</t>
      <t>In addition to forging an Access-Accept for a user who has no credentials, the attacker can control the traffic of known and authenticated users.  Many modern Broadband Network Gateways (BNG)s, Wireless LAN Controllers (WLCs), and Broadband Remote Access Servers (BRAS) support configuring a dynamic HTTP redirect using Vendor Specific Attributes (VSA)s.  These VSAs are not protected by the shared secret, and could be injected into an Access-Accept in order to redirect a users traffic.  The attacker could then set up a malicious website to launch Zero-Day/Zero-Click attacks, driving subscribers to the website using an HTTP redirect.  This issue is compounded by the fact that many devices perform automatic HotSpot 1.0 style walled garden discovery.  The act of simply connecting to their home WiFi connect could be enough to compromise a subscriber's equipment.</t>
      <t>The following subsections define mitigations which can be used to protect clients and servers from this attack when using RADIUS/UDP or RADIUS/TCP.  However, we reiterate here, and in the rest of this document that the only long-term solution is to deprecate insecure transports entirely.  In the long term, implementers SHOULD remove all uses of RADIUS/UDP and RADIUS/TCP from their products.  Administrators SHOULD stop using RADIUS/UDP and RADIUS/TCP.</t>
      <section anchor="root-cause-of-the-attack">
        <name>Root Cause of the Attack</name>
        <t>Independent of any cryptographic vulnerability, there are a number of factors which led to this vulnerability being exploited.</t>
        <t>A major factor is the continued use of MD5 for security, instead of mandating the use of an HMAC with Message-Authenticator.  This change could have been made in <xref target="RFC2869"/> in the year 2000.  A reason for not mandating Message-Authenticator was the issue of backwards compatibility.  Unfortunately, issues which are not fixed only grow larger over time.  The issue of backwards compatibility is significantly worse now than it was in the year 2000.  History shows that a better approach is to fix issues immediately when they come up.</t>
        <t>Another factor is the principle of "be conservative in what you do, be liberal in what you accept from others", often known as Postel's law, after John Postel.  Looking at the Proxy-State attribute, it is intended for proxy to server signaling, and offers no other value for RADIUS clients.  A NAS does not send Proxy-State in an Access-Request, and should not receive Proxy-State in an Access-Accept.</t>
        <t>Reception of Proxy-State in an Access-Accept response is therefore a failure of signaling in the RADIUS protocol, and likely indicates a serious failure of configuration, implementation, or as seen in this case, an active attack.  If all clients had discarded responses which contained unexpected Proxy-State attributes, then this attack could have been prevented.</t>
        <t>With the benefit of experience, this specification errs on the side of security, while still allowing for backwards compatibility.  It is not acceptable to maintain insecure practices simply because a small number of implementations or organizations find it difficult to upgrade.  Insecure implementations or practices have a concrete cost not only to the insecure organizations, but also to other organizations via secondary effects.  When insecure organizations demand that others follow insecure practices continue due to perceived local costs, they are effectively offloading their costs onto everyone else.  This practice both decreases security, and increases costs.</t>
        <t>The solution here is to fix the protocol, and to mandate that everyone change to secure practices.  Implementations and/or organizations which do not update their systems will either be insecure, or will be incompatible with secure practices.</t>
      </section>
      <section anchor="interaction-with-dtls-and-tls">
        <name>Interaction with DTLS and TLS</name>
        <t>The new behaviors described in this section apply only when UDP or TCP transport is used.  Implementations MUST NOT use the mitigations outlined in this section when DTLS or TLS transport is used, as those transport protocols are not vulnerable to the BlastRADIUS attack.</t>
        <t>However, clients and servers SHOULD include Message-Authenticator in Access-Request packets, and in responses to those Access-Requests, even then those packets are sent over TLS or DTLS transports.  While the attribute serves no security purpose, we recommend including Message-Authenticator because of the behavior of some implementations.  Some RADIUS proxies are known to automatically include Message-Authenticator in forwarded packets when the attribute is seen in the packet received from the client.</t>
        <t>That is, such an implementation may receive packets over TLS transport, and then forward (or return) them over insecure transports such as UDP.  If such an implementation receives a packet over TLS which contains Message-Authenticator, it will add the Message-Authenticator attribute to the packet which is sent over UDP.  Including Message-Authenticator in packets sent over insecure transports is important for increasing RADIUS security.</t>
        <t>It is therefore useful for systems to always include Message-Authenticator in Access-Request packets, even when TLS is used.  While this practice does not increase the security of a particular TLS connection, it will increase the security of the larger RADIUS system.</t>
        <t>The long term solution to the BlastRADIUS attack is to stop using insecure transport protocols, and switch to secure ones such as TLS.  We recognize that switching to TLS transport may require a significant amount of effort.  There is a substantial amount of work to perform in updating implementations, performing interoperability tests, changing APIs, changing user interfaces, and updating documentation.  This effort cannot realistically be done in a short time frame.</t>
        <t>There is therefore a need for a short-term action which can be implemented by RADIUS clients and servers which is both simple to do, and which is known to be safe.  The recommendations in this section are known to protect implementations from the attack; to be simple to implement; and also to allow easy upgrade without breaking existing deployments.</t>
      </section>
      <section anchor="changes-to-radius">
        <name>Changes to RADIUS</name>
        <t>There are a number of changes required to both clients and servers in order for all possible attack vectors to be closed.  Implementing only some of these mitigations means that an attacker could bypass the partial mitigations, and therefore still perform the attack.</t>
        <t>This section outlines the mitigation methods which protect RADIUS/UDP and RADIUS/TCP systems from this attack, along with the motivation for those methods.</t>
        <t>We note that unless otherwise noted, the discussion here applies only to Access-Request packets, and to responses to Access-Request (i.e. Access-Accept, Access-Reject, Access-Challenge, and Protocol-Error packets).  All behavior involving other types of request and response packets MUST remain unchanged.</t>
        <t>The mitigation methods outlined here allow systems to both protect themselves from the attack, while not breaking existing networks.  There is no global “flag day” required for these changes.  Systems which implement these recommendations are fully compatible with legacy RADIUS implementations, and can help protect those legacy implementations.  However, when these mitigations are not implemented, systems are still vulnerable to the attack.</t>
        <t>Note that in some network architectures, the attack can be mitigated simply by upgrading the RADIUS server, so that it sends Message-Authenticator as the first attribute in all responses to Access-Request packets.  However, the goal of this specification is to fix all architectures supported by RADIUS systems, rather than a limited subset.  We therefore mandate new behavior for all RADIUS clients and servers, while acknowledging that some organizations may choose to not deploy all of the new functionality.  For overall network security and good practice, we still recommend that all RADIUS clients and servers be upgraded to use the new software which contains the mitigations, and also be configured with the highest level of security.</t>
        <section anchor="new-configuration-flags">
          <name>New Configuration Flags</name>
          <t>We define new configuration flags for clients and servers.  The behavior and meaning of these flags will be discussed below.  Introducing these flags before discussing their meaning makes the subsequent discussion simpler and easier to understand.</t>
          <t>The goal of these flags is to secure the RADIUS protocol without preventing client and server communication between legacy and upgraded systems.  These flags instead allow a gradual migration process from legacy RADIUS, to fully secure RADIUS with all of the mitigations in place.</t>
          <t>We mandate the following new configuration flags for RADIUS implementations when using UDP or TCP transport.  These flags MUST be ignored when DTLS or TLS transport is used.</t>
          <ul empty="true">
            <li>
              <t>Clients MUST have a per-server boolean configuration flag, which we call “require Message-Authenticator”.  The default value for this flag MUST be “false” in order to maintain compatibility with legacy servers.</t>
              <t>Servers MUST have a per-client boolean configuration flag, which we call “require Message-Authenticator”.  The default value for this flag MUST be “false” in order to maintain compatibility with legacy clients.</t>
              <t>Servers MUST have a per-client boolean configuration flag, which we call “limit Proxy-State”.  The default value for this flag MUST be “false” in order to maintain compatibility with legacy clients.</t>
            </li>
          </ul>
          <t>It is RECOMMENDED that implementations support both a global setting, and per-client or per-server setting for the above flags.  For example, an implementation could support a global setting which is over-ridden by a more specific per-client or per-server setting.  The global setting could also be used if there was no more specific setting defined.</t>
          <t>The combination of global and more narrow configuration allows administrators to upgrade systems gradually, without requiring a "flag day" when everything changes on a global basis.</t>
        </section>
        <section anchor="client-access-request">
          <name>Clients and Access-Request</name>
          <t>We mandate the following new behavior for RADIUS clients:</t>
          <ul empty="true">
            <li>
              <t>Clients MUST add Message-Authenticator to all Access-Request packets.</t>
            </li>
          </ul>
          <t>This behavior MUST NOT be configurable.  Disabling it would open the system up to attack, and would prevent the other mitigation methods from working.  The root cause of the attack is that Access-Request packets lack integrity checks, so the most important fix is to add integrity checks to those packets.</t>
          <t>The Message-Authenticator SHOULD be the first attribute in all Access-Request packets.  That is, it should be placed immediately after the packet header.  Implementations MAY place the Message-Authenticator elsewhere in an Access-Request packet.</t>
          <t>From a cryptographic point of view, the location of Message-Authenticator does not matter for Access-Request packets, it just needs to exist somewhere in the packet.  However, as discussed below for responses to Access-Request (Access-Accept, etc.), the location of Message-Authenticator does matter.  It is better to have consistent and clear messaging for addressing this attack, instead of having different recommendations for different kinds of packets.</t>
          <t>All RADIUS servers will validate the Message-Authenticator attribute correctly when that attribute is received in a packet.  We are not aware of any RADIUS servers which will reject or discard Access-Request packets if they unexpectedly contain a Message-Authenticator attribute.</t>
          <t>This behavior has been enabled in the FreeRADIUS server for over a decade, and there have been no reports of interoperability problems.  It is therefore safe for all clients to immediately implement this requirement.</t>
          <t>However, many existing RADIUS clients do not send Message-Authenticator.  It also may be difficult to upgrade some client equipment, as the relevant vendor may have gone out of business, or may have marked equipment as “end of life” and thus unsupported.  It is therefore necessary to both work with such systems by not breaking existing RADIUS deployments, while at the same time protecting them as much as practically possible.</t>
        </section>
        <section anchor="server-access-request">
          <name>Servers and Access-Request</name>
          <t>We mandate the following new behavior for RADIUS servers:</t>
          <ul empty="true">
            <li>
              <t>When receiving an Access-Request, servers MUST consult the value of the "require Message-Authenticator" flag prior to accepting the packet for processing.  This flag MUST NOT be consulted for other types of request packets.</t>
              <t>If "require Message-Authenticator" is set to “false”, RADIUS servers MUST follow legacy behavior for validating and enforcing the existence of Message-Authenticator in Access-Request packets.  For example, enforcing the requirement that all packets containing EAP-Message also contain a Message-Authenticator attributes, but otherwise accepting and validating the Message-Authenticator attribute if it is present, while taking no action if the attribute is missing.</t>
              <t>If "require Message-Authenticator" is set to "false", RADIUS servers MUST also check the value of the "limit Proxy-State" flag and either accept or discard the packet, based on the checks discussed in <xref target="limit-proxy-state"/>, below.</t>
              <t>If "require Message-Authenticator" is set to “true”, the server MUST examine the Access-Request packets for the existence of the Message-Authenticator attribute. Access-Request packets which do not contain Message-Authenticator MUST be silently discarded.  This discard process MUST occur before the Message-Authenticator or Request Authenticator have been validated.</t>
              <t>For packets which are not discarded by the preceding check, the server MUST then validate the contents of the Message-Authenticator and then discard packets which fail this validation (<xref section="5.14" sectionFormat="comma" target="RFC2869"/>).</t>
              <t>Servers MUST NOT discard a packet based on the location of the Message-Authenticator attribute.  We extend <xref section="5" sectionFormat="comma" target="RFC2865"/> to state that RADIUS clients and servers MUST NOT discard packets based on the order or location of any attribute.  If Message-Authenticator passes validation, then the packet is authentic and it has not been modified.  The location of Message-Authenticator within the packet does not matter for authenticated packets.</t>
            </li>
          </ul>
          <t>The default value for the "require Message-Authenticator" is “false” because many RADIUS clients do not send the Message-Authenticator attribute in all Access-Request packets.  Defaulting to a value of "true" would mean that the RADIUS server would be unable to accept packets from many legacy RADIUS clients, and existing networks would break.</t>
          <t>We note that if this flag is “false”, the server can be vulnerable to the attack, even if the client has been updated to always send Message-Authenticator in all Access-Requests.  An attacker could simply strip the Message-Authenticator from the Access-Request, and proceed with the attack as if client had not been updated.  The server then does not see Message-Authenticator in the Access-Request, and accepts the modified packet for processing.</t>
          <t>When the "require Message-Authenticator" flag is set to "true", the server is protected from the BlastRADIUS attack.  Any packet which has been modified by the attacker to remove Message-Authenticator will be discarded by the server.  Any packet containing Message-Authenticator will be validated using the HMAC-MD5 construct, which is not vulnerable to this attack.</t>
          <t>While servers must validate the contents of Message-Authenticator, we reiterate that they MUST NOT check the location of that attribute.  There is no different meaning in RADIUS if Message-Authenticator is the first, second, or last attribute in a packet.  Servers MUST accept a RADIUS packet as valid if it passes authentication checks, no matter where Message-Authenticator is located in the packet.</t>
          <t>Unfortunately, there is no way for clients and servers to negotiate protocol-layer features in RADIUS/UDP or RADIUS/TCP.  An implementation cannot determine if packets are discarded due to an attack, or if they are discarded due to a mismatched configuration between client and server.  Implementations SHOULD therefore log the fact that the packet was discarded (with rate limits) in order to inform the administrator that either an attack is underway, or that there is a configuration mismatch between client and server.</t>
          <t>As a special case for debugging purposes, instead of discarding the packet, servers MAY instead send a Protocol-Error or Access-Reject response packet.  This packet MUST contain a Message-Authenticator attribute as the first attribute in the packet, otherwise an attacker could turn this response into an Access-Accept.  The response MUST also contain an Error-Cause attribute with value 510 (Missing Message-Authenticator).  The server MUST not send this response by default, as it this could cause the server to respond to forged Access-Request packets.</t>
          <t>The purpose of this Protocol-Error packet is to allow administrators to signal misconfigurations between client and server.  It is intended to only be used temporarily when new client to server connections are being configured, and MUST be disabled permanently once the connection is verified to work.</t>
          <t>This behavior SHOULD only be enabled when specifically configured by an administrator.  It MUST also be rate-limited, as there is no need to signal this error on every packet received by the server.  It SHOULD be automatically disabled when the server receives an Access-Request from a client which contains Message-Authenticator.  Implementations MAY instead automate this process, by sending a few such responses when packets from a client are first seen, and then not sending responses thereafter.</t>
          <t>As RADIUS clients are upgraded over time, RADIUS server implementations SHOULD enable the “require Message-Authenticator” flag by default.</t>
          <t>We note that "Section 7.2 of <xref target="BLAST"/> has the following comment about the FreeRADIUS server, which has had this configuration option for clients since 2008:</t>
          <ul empty="true">
            <li>
              <t>If support for these old clients is not required, enabling this option would make our attacks infeasible.</t>
            </li>
          </ul>
          <t>The next question is how to protect systems when legacy clients do not send Message-Authenticator.</t>
        </section>
        <section anchor="limit-proxy-state">
          <name>Updated Servers and Legacy Clients</name>
          <t>We mandate the following new behavior for RADIUS servers:</t>
          <ul empty="true">
            <li>
              <t>When receiving an Access-Request which passes the above checks and the "require Message-Authenticator" flag is set to "false", servers MUST then consult the value of the "limit Proxy-State" flag for the client.</t>
              <t>If "limit Proxy-State" is set to "false", RADIUS servers MUST follow legacy behavior for validating and enforcing the existence of Message-Authenticator in Access-Request packets.  For example, enforcing the requirement that all packets containing EAP-Message also contain a Message-Authenticator attributes, but otherwise accepting and validating the Message-Authenticator attribute if it is present, while taking no action if the attribute is missing.  This behavior is the same as mandated by the previous section.</t>
              <t>If "limit Proxy-State" is set to "true",  RADIUS servers MUST require that all Access-Request packets which contain a Proxy-State attribute also contain a Message-Authenticator attribute.  Access-Request packets which contain Proxy-State but no Message-Authenticator MUST be silently discarded.</t>
              <t>If the packet does contain a Message-Authenticator. servers MUST validate its contents, and discard packets which fail this validation (<xref section="5.14" sectionFormat="comma" target="RFC2869"/>).</t>
            </li>
          </ul>
          <t>This flag is motivated by the realization that most NASes (i.e. not proxies) will never send Proxy-State in an Access-Request packet.  If a server sees Proxy-State in a packet from a NAS, it is a strong signal that an attacker is attempting the BlastRADIUS attack.  The BlastRADIUS attack depends on the construction and behavior of Proxy-State, and the attack is essentially impossible without using Proxy-State in an Access-Request.</t>
          <t>It is therefore safe to add a configuration flag which checks for Proxy-State, because well-behaving NASes will never send it.  The only time the server will see a Proxy-State from a NAS is when the attack is taking place.</t>
          <t>The behavior of this flag is not to simply discard Access-Request packets which contain an "unexpected" Proxy-State.  Instead, the behavior is to require such packets to be authenticated.  If a packet is authenticated via the existence of Message-Authenticator with validated contents, then the existence (or not) of Proxy-State does not matter; the packet should be accepted and processed by the server.</t>
          <t>On the other hand, if the packet cannot be authenticated via the use of Message-Authenticator, then the existence of an unexpected Proxy-State is suspicious, and the packet should be discarded.</t>
          <t>As with the previous section, servers SHOULD log a message when packets are discarded due to this flag.  Servers MAY also send an error response, subject to the caveats and considerations described in the previous section for those responses.</t>
        </section>
        <section anchor="further-explanation-and-comments">
          <name>Further Explanation and Comments</name>
          <t>This section provides further explanation of the issues, and the rationale for the requirements made by this specification.</t>
          <t>The "require Message-Authenticator" flag is needed in order to secure the RADIUS protocol.  Once all Access-Request packets are required to contain a valid Message-Authenticator, the BlastRADIUS attack is impossible.</t>
          <t>However, it may not be possible to upgrade all RADIUS clients.  Some products may no longer be supported, or some vendors have gone out of business.  Even if upgrades are available, the upgrade process may impact production networks, which has a cost.  There is therefore a need for RADIUS servers to protect themselves from to the BlastRADIUS attack, while at the same time being compatible with legacy RADIUS client implementations.</t>
          <t>Enabling the "limit Proxy-State" flag allows legacy (i.e. non-upgraded) clients to be used without substantially compromising on security.  While it is theoretically possible to perform the BlastRADIUS attack via attributes other than Proxy-State, no such exploits are known at this time.  Any such exploit would require that the server receive fields under the attackers control (e.g. User-Name), and echo them back in a response.  Such attacks are only possible when the server is configured to echo back attacker-controlled data, which is not the default behavior for most servers.</t>
          <t>As a result, these two flags allow the maximum amount of security while having the minimum disruption to operational networks.  For the remaining attack vectors, is is RECOMMENDED that servers which echo back user-supplied data in responses do so only when the "require Message-Authenticator" flag is set to "true".  If such user-supplied data is echoed back in responses when the "require Message-Authenticator" flag is set "false", then the BlastRADIUS attack is theoretically still possible, even though no exploit is currently available.</t>
          <t>The two configuration flags on the server will protect the server even if clients have not been upgraded or been configured to be secure.  The server configuration flags will not protect clients (NASes or proxies) from servers which have not been upgraded or been configured to be secure.  More behavior changes to servers and clients are required.</t>
        </section>
        <section anchor="server-responses">
          <name>Server Responses to Access-Request</name>
          <t>We mandate the following behavior for servers when sending responses to Access-Request packets:</t>
          <ul empty="true">
            <li>
              <t>Servers MUST add Message-Authenticator as the first attribute in all responses to Access-Request packets.  That is, all Access-Accept, Access-Reject, Access-Challenge, and Protocol-Error packets.  The attribute MUST be the first one in the packet, immediately after the 20 octet packet header.</t>
            </li>
          </ul>
          <t>Adding Message-Authenticator as the first attribute means that for the purposes of MD5 known prefix attacks, the unknown suffix begins with the Message-Authenticator, and continues for the remainder of the packet.  The attacker is therefore unable to leverage the attack using a known prefix, and the vulnerability is mitigated.</t>
          <t>The client will validate the Response Authenticator (<xref section="3" sectionFormat="comma" target="RFC2865"/>) before accepting response, and the attacker is unable to modify the response due to the location of the Message-Authenticator.  This behavior therefore protects one client to server hop, even if the server does not require Message-Authenticator in Access-Request packets, and even if the client does not examine or validate the contents of the Message-Authenticator.</t>
          <t>When the Message-Authenticator is the last attribute in a packet (as was historically common in many implementations), the attacker can treat the Message-Authenticator as an unknown suffix, as with the shared secret.  The attacker can then calculate the prefix as before, and have the RADIUS server authenticate the packet which contains the prefix.</t>
          <t>The analysis is similar if the Message-Authenticator is in the middle of the packet, with attributes existing both before an after the Message-Authenticator.  Attributes before the Message-Authenticator can be modified, discarded, or added, while attributes after the Message-Authenticator need to remain in the packet.  We direct the reader to Section 7.2 of <xref target="BLAST"/> for a more complete description of these issues.</t>
          <t>As a result, the attack will only be mitigated in one of two circumstances:</t>
          <ol spacing="normal" type="1"><li>
              <t>The client implements the "require Message-Authenticator" flag, and has set that flag to "true",</t>
            </li>
            <li>
              <t>The server places Message-Authenticator as the first attribute in all responses to Access-Request packets.</t>
            </li>
          </ol>
          <t>Since RADIUS has no feature negotiation, the server has no way of knowing whether or not the client has been configured securely.  The only remaining choice then for the server, is the second one.  This document therefore mandates that all RADIUS servers send Message-Authenticator as the first attribute in all responses to Access-Request packets.</t>
          <t>This mandate ensures that the RADIUS protocol is secured for both the client and the server.  We then need to verify that this change in behavior does not affect legacy clients which may not support Message-Authenticator.</t>
          <t>Nearly all clients which do not validate Message-Authenticator are known to accept responses which contain it, due to the provisions of <xref section="5" sectionFormat="comma" target="RFC2866"/>:</t>
          <ul empty="true">
            <li>
              <t>A RADIUS client MAY ignore Attributes with an unknown Type.</t>
            </li>
          </ul>
          <t>These RADIUS clients are therefore compatible with the protocol change outlined in this document.   We note also that Message-Authenticator has been defined for almost twenty-five (25) years, since <xref target="RFC2869"/>, so there are few reasons for equipment to not support it.</t>
          <t>Since the publication of the original BlastRADIUS notification, it has become known that some implementations do not behave as expected.  That is, instead of ignoring an unexpected Message-Authenticator attribute, they instead discard the response.  That behavior is entirely unreasonable, and is not required by any existing standard.  The only way for RADIUS servers could be compatible with such systems is to never send Message-Authenticator in responses.  However, doing so would open up significantly more systems to the BlastRADIUS attack.</t>
          <t>The only way to secure those systems is to upgrade them.  Failing that, the administrators of those systems will need to accept the fact that their systems are vulnerable.</t>
          <t>The solution adopted by this specification is to declare that clients or servers which discard packets containing Message-Authenticator are not compliant with the RADIUS specifications.  It is not acceptable to decrease the security of the RADIUS protocol in order to be compatible with insecure and non-compliant implementations.  This specification attempts to prevent such issues from happening in the future, by mandating behavior for unknown attributes in <xref target="unknown-attributes"/>, below.  There is no reason for an implementation to discard response a packet simply because it does not recognize an attribute in the packet.</t>
          <t>As it is difficult to upgrade both clients and servers simultaneously, we also need a method to protect clients when the server has not been updated.  That is, clients cannot depend on the Message-Authenticator existing in response packets.  Clients need to take additional steps to protect themselves, independent of any server updates.</t>
        </section>
        <section anchor="client-responses">
          <name>Clients Receiving Responses</name>
          <t>We mandate the following new behavior for RADIUS clients:</t>
          <ul empty="true">
            <li>
              <t>When receiving any response to an Access-Request packet (Access-Accept, Access-Challenge, Access-Reject, or Protocol-Error), clients MUST consult the value of the "require Message authenticator" flag prior to accepting the packet for processing.  This flag MUST NOT be consulted for responses to other types of request packets.</t>
              <t>If "require Message-Authenticator" is set to “false”, RADIUS clients MUST follow legacy behavior for validating and enforcing the existence of Message-Authenticator in response packets.  For example, enforcing the requirement that all packets containing EAP-Message also contain a Message-Authenticator attributes, but otherwise accepting and validating the Message-Authenticator attribute if it is present, while taking no action if the attribute is missing.</t>
              <t>If "require Message-Authenticator" is set to “true”, the client MUST examine the response packets for the existence of the Message-Authenticator attributes.  Response packets which do not contain Message-Authenticator MUST be silently discarded. This check MUST be done before the Response Authenticator or Message-
Authenticator has been verified.  No further processing of discarded packets should take place.</t>
              <t>The client MUST validate the contents of the Message-Authenticator and discard packets which fail this validation (<xref section="5.14" sectionFormat="comma" target="RFC2869"/>).</t>
              <t>Clients MUST NOT discard a packet based on the location of the Message-Authenticator attribute.  We extend <xref section="5" sectionFormat="comma" target="RFC2865"/> to state that RADIUS clients and servers MUST NOT discard packets based on the order or location of any attribute.  If Message-Authenticator passes validation, then the packet is authentic and it has not been modified.  The location of Message-Authenticator within the packet does not matter for authenticated packets.</t>
            </li>
          </ul>
          <t>When the response is discarded, the client MUST behave as if no response was received.  That is, any existing retransmission timers MUST NOT be modified as a result of receiving a packet which is silently discarded.</t>
          <t>Unfortunately, the client cannot determine if a packet was discarded due to an active attack, or if it was discarded due to a mismatched configuration between client and server (e.g. mis-matched shared secret).  The client SHOULD log the fact that the packet was discarded (with rate limits) in order to inform the administrator that either an attack is underway, or that there is a configuration mismatch between client and server.</t>
          <t>The above sections have now followed a complete path from client, to server, and back again.  If each client to server hop is secured via the above methods, then by construction, the RADIUS protocol is no longer vulnerable to the BlastRADIUS attack.</t>
        </section>
        <section anchor="status-server">
          <name>Status-Server</name>
          <t>While the attack works only for Access-Request packets, Access-Accept or Access-Reject can also be sent in response to Status-Server packets (<xref target="RFC5997"/>).  In order to simplify client implementations, we mandate the following new behavior with respect to Status-Server:</t>
          <ul empty="true">
            <li>
              <t>Servers MUST follow the above recommendations relating to Message-Authenticator when sending Access-Accept, Access-Challenge, or Access-Reject packets, even if the original request was Status-Server.</t>
            </li>
          </ul>
          <t>This requirement ensures that clients can examine responses independent of any requests.  That is, a client can perform a simple verification pass of response packets prior to doing any more complex correlation of responses to request.</t>
          <t>We note that <xref section="3" sectionFormat="comma" target="RFC5997"/> states:</t>
          <ul empty="true">
            <li>
              <t>.. all Status-Server packets MUST include a Message-Authenticator attribute.  Failure to do so would mean that the packets could be trivially spoofed.</t>
            </li>
          </ul>
          <t>As a result, compliant implementations of <xref target="RFC5997"/> do not need to change their behavior with respect to sending or receiving Status-Server packets: they are already protected against the BlastRADIUS attack.</t>
        </section>
        <section anchor="summary">
          <name>Summary</name>
          <t>The RADIUS protocol as defined in <xref target="RFC2865"/> is vulnerable to an attack due to Access-Request packets being unauthenticated.  This issue was first raised as a vulnerability in 1998 <xref target="DATTACK"/> , though it took until 2024 <xref target="BLAST"/> before an exploit was demonstrated.  This vulnerability, and the response to it, highlighted a number of issues with vendor implementations.</t>
          <t>This section summarizes the various implementation issues, and the recommended fixes to them.  While this section does not contain normative text, it refers to normative requirements earlier in this specification.  This summary is apparently necessary, because multiple implementations failed to follow the above normative requirements. Instead, those systems either implemented behavior which was forbidden by the normative text, or else failed to implement behavior which was required by the normative text.</t>
          <t>It is therefore sadly necessary to reiterate to the reader that the normative worss in <xref target="RFC8174"/> really are normative, and that they need to be respected.  The reader should not assume that other non-normative text in this specification over-rides the clear mandates of the normative text.</t>
          <t>The following list outlines the problems seen, in no particular order.</t>
          <ul spacing="normal">
            <li>
              <t>Some implementations discarded packets which contained Message-Authenticator.</t>
            </li>
          </ul>
          <t>The following list outlines the requirements on client implementations, and references the prior sections which contain the normative text.  While the following list does not contain normative text (in order to avoid potential conflict or confusion), the reader should follow the references to verify that the behavior described below is truly normative.</t>
          <ul spacing="normal">
            <li>
              <t>clients include Message-Authenticator in all Access-Request packets,
<xref target="client-access-request"/>  </t>
              <ul spacing="normal">
                <li>
                  <t>clients can place Message-Authenticator as the first attribute in
all Access-Request packets, but this placement is not required for
security.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>clients validate the contents of Message-Authenticator in all
packets that they receive, <xref section="5.14" sectionFormat="comma" target="RFC2869"/></t>
            </li>
            <li>
              <t>clients do take any steps to check the location of
Message-Authenticator in any response packet, <xref target="client-responses"/></t>
            </li>
            <li>
              <t>clients do not discard packets which contain unknown attributes,
<xref target="unknown-attributes"/></t>
            </li>
            <li>
              <t>clients implement a boolean configuration flag "require
Message-Authenticator", <xref target="new-configuration-flags"/>  </t>
              <ul spacing="normal">
                <li>
                  <t>If set to "false", clients do not take any additional steps.</t>
                </li>
                <li>
                  <t>if set to "true", clients discard all responses to Access-Request
which do not contain a Message-Authenticator attribute.  This
discard happens before the Response Authenticator or
Message-Authenticator are validated.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>The following list outlines requirements on server implementations, with the same explanations and caveats given above for the list of requirements on client implementations.</t>
          <ul spacing="normal">
            <li>
              <t>servers validate the contents of Message-Authenticator in all
packets that they receive, <xref target="server-access-request"/></t>
            </li>
            <li>
              <t>server do take any steps to check the location of
Message-Authenticator in any request packet, <xref target="server-responses"/></t>
            </li>
            <li>
              <t>servers do not discard packets which contain unknown attributes,
<xref target="unknown-attributes"/></t>
            </li>
            <li>
              <t>servers implement a boolean configuration flag "require
Message-Authenticator", <xref target="new-configuration-flags"/>  </t>
              <ul spacing="normal">
                <li>
                  <t>If set to "false", servers follow the behavior for the
"limit Proxy-State" flag.</t>
                </li>
                <li>
                  <t>if set to "true", servers discard all Access-Request packets
which do not contain a Message-Authenticator attribute.  This
discard happens before the Request Authenticator or
Message-Authenticator are validated.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>servers implement a boolean configuration flag "limit Proxy-State",
<xref target="new-configuration-flags"/> and <xref target="limit-proxy-state"/>.  </t>
              <ul spacing="normal">
                <li>
                  <t>servers check this flag only when the "require
Message-Authenticator" flag is set to "false".</t>
                </li>
                <li>
                  <t>If set to "false", servers take no further action.</t>
                </li>
                <li>
                  <t>If set to "true", servers discard all Access-Request packets which
contain one or more Proxy-State attributes.  This
discard happens before the Request Authenticator or
Message-Authenticator are validated.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>servers include Message-Authenticator in all responses to
Access-Request packets, <xref target="server-responses"/></t>
            </li>
            <li>
              <t>servers include Message-Authenticator in all Access-Accept,
Access-Reject, and Access-Challenge packets, <xref target="server-responses"/>
and <xref target="status-server"/></t>
            </li>
            <li>
              <t>servers place Message-Authenticator as the first attribute in all
responses to Access-Request packets, and in all Access-Accept,
Access-Reject, and Access-Challenge packets, <xref target="server-responses"/>.
This placement is required for security, in order to protect both
clients and servers from the BlastRADIUS attack.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="related-issues">
        <name>Related Issues</name>
        <t>This section contains discussions of issues related to the BlastRADIUS vulnerability which do not involve changes to the RADIUS protocol.  It also explains why some solutions which may seem appealing are instead inadequate or inappropriate.</t>
        <section anchor="documentation-and-logging">
          <name>Documentation and Logging</name>
          <t>It is RECOMMENDED that RADIUS server implementations document the behavior of these flags in detail, including how they help protect against this attack.  We believe that an informed administrator is more likely to engage in secure practices.</t>
          <t>Similarly, when either of the above flags cause a packet to be discarded, the RADIUS server SHOULD log a descriptive message (subject to rate limiting) about the problematic packet.  This log is extremely valuable to administrators who wish to determine if anything is going wrong, and what to do about it.</t>
        </section>
        <section anchor="alternative-solutions">
          <name>Alternative Solutions</name>
          <t>An alternative configuration flag with a similar effect to the “limit Proxy-State” flag could be one called “this client is a NAS, and will never send Proxy-State”.  The intention for such a flag would be to clearly separate RADIUS proxies (which always send Proxy-State), from NASes (which will never send Proxy-State).  When the flag is set for a client, the server could then discard Access-Request packets which contain Proxy-State.  Alternatively, the server could also discard Proxy-State from all responses sent to that client.</t>
          <t>Such a flag, however, depends on network topology, and fails to correct the underlying lack of packet authenticity and integrity.  The flag may also work for one NAS, but it is likely to be incorrect if the NAS is replaced by a proxy.  Where there are multiple different pieces of NAS equipment behind a NAT gateway, the flag is also likely to be correct for some packets, and incorrect for others.</t>
          <t>Setting configuration flags by the desired outcome is preferable to setting flags which attempt to control network topology.</t>
        </section>
        <section anchor="non-mitigations">
          <name>Non-Mitigations</name>
          <t>It may be tempting to come up with other "ad hoc" solutions to this vulnerability.  Such solutions are NOT RECOMMENDED, as they are likely to either break existing RADIUS deployments, or else they will not prevent the attack.  The mitigations described in this document not only prevent the attack, they do so without affecting normal RADIUS operation.  There is therefore no reason to use any other methods.</t>
          <t>Other attempted mitigation factors are discussed in the "BlastRADIUS" document.  For example, "BlastRADIUS" Section 7.4 explains why decreasing timeouts simply increases the cost of the attack without preventing it.  Decreasing timeouts also can negatively affect normal traffic.</t>
          <t><xref target="BLAST"/> Section 7.7 explains why clients validating Proxy-State, or looking for unexpected Proxy-State does not protect from the attack.  The attacker can likely just change the nature of the attack, and bypass those checks.</t>
          <t>There is no reason to implement “ad hoc” solutions when a solution exists which has passed reviews by both the BlastRADIUS cryptographers, and by the IETF RADEXT working group.  There is every reason to believe that cryptographic operations designed by experts and subject to rigorous peer review are better than random guesses made by programmers lacking relevant cryptographic and RADIUS experience.</t>
          <t>Similarly, switching away from RADIUS to another protocol will not protect from the attack, as there is no other protocol which can replace RADIUS.  No other protocol is supported by medium to low-end networking devices for end-user authentication, authorization, and accounting.  Outside of situations where Diameter is used, the choice for nearly every use-case which controls network access is limited to one protocol: RADIUS.</t>
          <t>Despite this reality, some "security" sites have recommended "securing" the network by switching to "alternative" protocols.  Such recommendations are incorrect and inappropriate.</t>
          <t>Diameter <xref target="RFC6733"/> is the closest protocol in functionality to RADIUS, but the Diameter use-case is applicable to large-scale telecommunications and internet service providers (ISPs).  Support for Diameter is not available in equipment available to consumers or enterprises.  As such, replacing RADIUS with Diameter is not an option.</t>
          <t>Other proposals for protocols to replace RADIUS are even less effective.  TACACS+ <xref target="RFC8907"/> has some overlap with RADIUS for administrator login to network devices, but it cannot be used outside of that limited scope.  TACACS+ does not support 802.1X, end-user authentication, or end-user accounting.  It is therefore impossible for an ISP or enterprise to replace RADIUS with TACACS+.</t>
          <t>Kerberos <xref target="RFC4120"/> is also not a option.  It is most generally used to authenticate applications, when the underlying system already has network access.  Kerberos also does not support 802.1X, and does not support accounting.</t>
          <t>The situation is much the same with any proposal to replace RADIUS with IPsec.  While IPsec does authenticates devices prior to bringing up the VPN, those devices must already have network access.  IPsec also requires that the end-user traffic be transported over the IPsec connection, where RADIUS does not transport any end-user traffic.</t>
          <t>In conclusion, recommendations to use alternate protocols are, at best, misguided.  We do not recommend following "security" advice which is based on a fundamental misunderstanding of networking protocols.</t>
        </section>
        <section anchor="network-operators">
          <name>Network Operators</name>
          <t>The most important outcome of this attack for network operators is that where possible, all RADIUS traffic should use TLS transport between client and server.</t>
          <t>Methods other than IPsec to mitigate the attack are less secure, they still fail at adding privacy, and are therefore less useful.  We recognize that not all networking equipment supports TLS transport, so we therefore give additional recommendations here which operators can follow to help mitigate the attack.</t>
          <t>All networking equipment should be physically secure.  There is no reason to have critical portions of networking infrastructure physically accessibly to the public.  Where networking equipment must be in public areas (e.g. access points), that equipment SHOULD NOT have any security role in the network.  Instead, any network security validation or enforcement SHOULD be done by separate equipment which is in a physically secure location.</t>
          <t>It is RECOMMENDED that all RADIUS traffic be sent over a management VLAN.  This recommendation should be followed even if TLS transport is used.  There is no reason to mix user traffic and management traffic on the same network.</t>
          <t>Using a management network for RADIUS traffic will generally prevent anyone other than trusted administrators from performing this attack.  We say “generally”, because security is limited by the least secure part of the network.  If a network device has some unrelated vulnerability, then an attacker could exploit that vulnerability to gain access to the management network.  The attacker would then be free to exploit this issue.</t>
          <t>Only the use of TLS will prevent such attacks from being chained together.</t>
          <t>Similarly, there are few reasons to use RADIUS/TCP.  Any system which supports RADIUS/TCP likely also supports TLS, and that should be used instead.</t>
          <t>Finally, any RADIUS/UDP or RADIUS/TCP traffic MUST NOT be sent over public networks such the Internet. This issue is discussed in more detail later in this document.</t>
        </section>
      </section>
      <section anchor="limitations-of-the-mitigations">
        <name>Limitations of the Mitigations</name>
        <t>The above mitigations have some limitations.  The design of the mitigations had to allow for backwards compatibility with legacy RADIUS systems, while still allowing for (but not requiring) whole-sale network upgrades.  There is a trade-off to be made between perfectly secure networks which are unusable, and networks which are usable but somewhat insecure.  The mitigations outlined here create as much security as possible, while still not breaking existing networks.</t>
        <t>The result is that there are situations where a network is functional, but insecure.  This section outlines those limitations.</t>
        <section anchor="vulnerable-systems">
          <name>Vulnerable Systems</name>
          <t>A RADIUS server is vulnerable to the attack if it does not require that all received Access-Request packets contain a Message-Authenticator attribute.  This vulnerability exists for many common uses of Access-Request, including packets containing PAP, CHAP, MS-CHAP, or packets containing “Service-Type = Authorize-Only”.   The vulnerability is also transitive.  If any one RADIUS server in a proxy chain is vulnerable, then the attack can succeed, and the attacker can gain unauthenticated and/or unauthorized access.</t>
          <t>Simply having the Message-Authenticator attribute present in Access-Request packets is not sufficient.  In order to be protected, a server must require that the attribute is present, and discard packets where it is missing.  Similarly, the client must also require that the attribute is present, and discard packets where it is missing.</t>
          <t>The attack is fully mitigated only when both sides of the RADIUS conversation are updated and configured correctly.</t>
        </section>
        <section anchor="unaffected-systems">
          <name>Unaffected Systems</name>
          <t>There are a number of systems which are not vulnerable to this attack.  The most important ones are systems which only perform EAP authentication, such as with 802.1X / WPA Enterprise.  The EAP over RADIUS protocol is defined in <xref section="3.3" sectionFormat="comma" target="RFC3579"/> which states explicitly:</t>
          <ul empty="true">
            <li>
              <t>If any packet type contains an EAP-Message attribute it MUST also contain a Message-Authenticator.</t>
            </li>
          </ul>
          <t>This requirement reiterates that of <xref section="5.13" sectionFormat="comma" target="RFC2869"/>, which defines EAP-Message and Message-Authenticator, but which does not get into details about EAP.</t>
          <t>This requirement is enforced by all known RADIUS servers.  As a result, when roaming federations such as eduroam use RADIUS/UDP, it is not possible for the attack to succeed.</t>
          <t>Other roaming groups such as OpenRoaming require the use of TLS, and are not vulnerable.  Other roaming providers generally use VPNs to connect disparate systems, and are also not vulnerable.</t>
          <t>802.1X / WPA enterprise systems have an additional layer of protection, due to the use of the master session keys (MSK) which are derived from the EAP authentication method.  These keys are normally carried in an Access-Accept, in the MS-MPPE-Recv-Key and MS-MPPE-Send-Key attributes, and are used to secure the link between the NAS and the supplicant.  The contents of the attributes are obfuscated via the same method used for Tunnel-Password, and are not visible to an "on-path" attacker.</t>
          <t>While an attacker can perhaps force an Access-Accept in some situations, or strip the Message-Authenticator from packets, it is not currently possible for an attacker to see, modify, or create the correct MSK for the EAP session.  As a result, when 802.1X / WPA enterprise is used, even a successful attack on the Access-Accept packet would likely not result in the attacker obtaining network access.</t>
        </section>
        <section anchor="the-weakest-link">
          <name>The Weakest Link</name>
          <t>RADIUS security is done on a “hop by hop” basis, which means that an attacker can take advantage of the weakest link in a proxy chain in order to attack other systems which have fully implemented the above mitigations.  If the packets are passed through one or more proxies, then any one vulnerable proxy will still allow the attack to take place.</t>
          <t>If proxies are used, then the weakest link in the proxy chain limits the security of the entire chain. That is, it does not matter if one hop implements RADIUS/TLS, if another hop implements RADIUS/UDP without sending or requiring Message-Authenticator.</t>
          <t>Even worse, proxies have full control over packet contents.  A malicious proxy can change a reject into an accept, and can add or delete any authorization attributes it desires.  While proxies are generally part of a trusted network, there is every benefit in limiting the number of participants in the RADIUS conversation.</t>
          <t>Proxy chains SHOULD therefore be avoided where possible, and <xref target="RFC7585"/> dynamic discovery should be used where possible.  RADIUS clients and servers SHOULD also be configured with static IP addresses, and with static routes.  This static configuration also protects the systems from DHCP related attacks where an attacker spoofs DHCP to cause clients or servers to route packets through the a system of the attackers choice.</t>
        </section>
      </section>
      <section anchor="proxy-state">
        <name>Note on Proxy-State</name>
        <t>As the BlastRADIUS paper points out in Appendix A:</t>
        <ul empty="true">
          <li>
            <t>The presence of this attribute makes the protocol vulnerability much simpler to exploit than it would have been otherwise.</t>
          </li>
        </ul>
        <t>To see why Proxy-State has this particular design, we go back to the original discussion in May 1995 <xref target="MAY-1995"/></t>
        <ul empty="true">
          <li>
            <t>The RADIUS proxy may place any state information (subject to the length
limitations of a RADIUS attribute) that it will need to transform a
reply from its server into a reply to its client.  This is typically
the original authenticator, identifier, IP address and UDP port number
of the proxy's RADIUS client.</t>
          </li>
        </ul>
        <t>There appear to be few, if any, RADIUS servers which implemented this suggestion.  In part because later discussions note:</t>
        <ul empty="true">
          <li>
            <t>This works only if the NAS is
prepared to accept replies from a proxy server for a request issued to
a different server.</t>
          </li>
        </ul>
        <t>This stateless proxy design has a number of additional issues, most notably violating the <xref target="RFC3539"/> "end-to-end" principle.  It therefore negatively impacts the stability of a RADIUS proxy system.</t>
        <t>This definition for Proxy-State later changed in <xref section="5.33" sectionFormat="comma" target="RFC2865"/> to</t>
        <ul empty="true">
          <li>
            <t>Usage of the Proxy-State Attribute is implementation dependent.  A
description of its function is outside the scope of this
specification.</t>
          </li>
        </ul>
        <t>In practice, the utility of Proxy-State is limited to detecting proxy loops.  Proxies can count the number of Proxy-State attributes in received packets, and if the total is more than some number, then a proxy loop is likely.  We offer no advice on what to do if a proxy loop is detected, as RADIUS has no ability to signal protocol-layer errors.</t>
        <t>It is likely that a "hop count" attribute would likely have been simpler to implement, but even in 1996, it was likely difficult to change the behavior of proxies due to multiple implementations.</t>
      </section>
      <section anchor="intrusion-detection-systems">
        <name>Intrusion Detection Systems</name>
        <t>Intrusion detection systems can be updated to detect and/or warn about the attack with the following rules.  In the interests of brevity and generality, the rules are written as plain text.</t>
        <ol spacing="normal" type="1"><li>
            <t>Access-Request does not contain a Message-Authenticator attribute.  </t>
            <t>
Action: Warn the administrator that the system is vulnerable, and should be upgraded.</t>
          </li>
          <li>
            <t>Access-Accept, Access-Reject, or Access-Challenge does not contain a Message-Authenticator attribute.  </t>
            <t>
Action: Warn the administrator that the system is vulnerable, and should be upgraded.</t>
          </li>
          <li>
            <t>Access-Accept, Access-Reject, or Access-Challenge contains a Message-Authenticator attribute, but it is not the first attribute in the packet.  </t>
            <t>
Action: Warn the administrator that the system may be vulnerable, and should be upgraded.</t>
          </li>
          <li>
            <t>Access-Request packet received by a RADIUS server contains Proxy-State, when the RADIUS client is a NAS.  </t>
            <t>
Action: Alert that an attack is likely taking place.  </t>
            <t>
Note that the check should be for packets received by the RADIUS server, and not for packets sent by the NAS.  The attack involves packets being modified after they are sent by the NAS, and before they are received by the RADIUS server.</t>
          </li>
          <li>
            <t>Access-Accept, Access-Reject, or Access-Challenge sent by a RADIUS server contain Proxy-State, when the RADIUS client is a NAS.  </t>
            <t>
Action: Alert that an attack is likely taking place.  </t>
            <t>
Note that the check should be for packets sent by the RADIUS server, and not for packets received by the NAS.  The attacker can modify packets to "hide" Proxy-State in another attribute, such as Vendor-Specific.</t>
          </li>
          <li>
            <t>Any RADIUS traffic is sent over UDP or TCP transport, without IPsec or TLS.  </t>
            <t>
Action: Warn that the system uses deprecated transport protocols, and should be upgraded.</t>
          </li>
          <li>
            <t>Any RADIUS traffic is sent external to the organization over UDP or TCP transport, without IPsec or TLS.  </t>
            <t>
Action: Warn that this is an insecure configuration, and can expose users private data, identities, passwords, locations, etc. to unknown attackers.</t>
          </li>
        </ol>
        <t>These rules should assist administrators with ongoing security and monitoring.</t>
      </section>
    </section>
    <section anchor="deprecating-insecure-transports">
      <name>Deprecating Insecure Transports</name>
      <t>The solution to an insecure protocol which uses thirty year-old cryptography is to deprecate the use insecure cryptography, and to mandate modern cryptographic transport.</t>
      <section anchor="deprecating-radiusudp-and-radiustcp">
        <name>Deprecating RADIUS/UDP and RADIUS/TCP</name>
        <t>RADIUS/UDP and RADIUS/TCP MUST NOT be used outside of secure networks.  A secure network is one which is believed to be safe from eavesdroppers, attackers, etc.  For example, if IPsec is used between two systems, then those systems may use RADIUS/UDP or RADIUS/TCP over the IPsec connection.</t>
        <t>However, administrators should not assume that such uses are always secure.  An attacker who breaks into a critical system could use that access to view RADIUS traffic, and thus be able to attack it.  Similarly, a network misconfiguration could result in the RADIUS traffic being sent over an insecure network.</t>
        <t>Neither the RADIUS client nor the RADIUS server would be aware of any network misconfiguration (e.g. such as could happen with IPsec).  Neither the RADIUS client nor the RADIUS server would be aware of any attacker snooping on RADIUS/UDP or RADIUS/TCP traffic.</t>
        <t>In contrast, when TLS is used, the RADIUS endpoints are aware of all security issues, and can enforce any necessary security policies.</t>
        <t>Any use of RADIUS/UDP and RADIUS/TCP is therefore NOT RECOMMENDED, even when the underlying network is believed to be secure.</t>
      </section>
      <section anchor="mandating-secure-transports">
        <name>Mandating Secure transports</name>
        <t>All systems which send RADIUS packets outside of secure networks MUST use either IPsec, RADIUS/TLS, or RADIUS/DTLS.  For operational and security reasons, it is RECOMMENDED to use RADIUS/TLS or RADIUS/DTLS instead of IPsec.</t>
        <t>Unlike (D)TLS, use of IPsec means that applications are generally unaware of transport-layer security. Any problem with IPsec such as configuration issues, negotiation or re-keying problems are typically  presented to the RADIUS servers as 100% packet loss.  These issues may occur at any time, independent of any changes to a RADIUS application using that transport.  Further, network misconfigurations which remove all security are completely transparent to the RADIUS application: packets can be sent over an insecure link, and the RADIUS server is unaware of the failure of the security layer.</t>
        <t>In contrast, (D)TLS gives the RADIUS application completely knowledge and control over transport-layer security.  The failure cases around (D)TLS are therefore often clearer, easier to diagnose and faster to resolve than failures in IPsec.   For example, a failed TLS connection may return a "connection refused" error to the application, or any one of many TLS errors indicating which exact part of the TLS conversion failed during negotiation.</t>
      </section>
      <section anchor="crypto-agility">
        <name>Crypto-Agility</name>
        <t>The crypto-agility requirements of <xref target="RFC6421"/> are addressed in <xref target="RFC6614"/> Appendix C, and in Section 10.1 of <xref target="RFC7360"/>.  For clarity, we repeat the text of <xref target="RFC7360"/> here, with some minor modifications to update references, without changing the content.</t>
        <t>Section 4.2 of <xref target="RFC6421"/> makes a number of recommendations about security properties of new RADIUS proposals.  All of those recommendations are satisfied by using TLS or DTLS as the transport layer.</t>
        <t>Section 4.3 of <xref target="RFC6421"/> makes a number of recommendations about backwards compatibility with RADIUS.  <xref target="RFC7360"/> Section 3 addresses these concerns in detail.</t>
        <t>Section 4.4 of <xref target="RFC6421"/> recommends that change control be ceded to the IETF, and that interoperability is possible.  Both requirements are satisfied.</t>
        <t>Section 4.5 of <xref target="RFC6421"/> requires that the new security methods apply to all packet types.  This requirement is satisfied by allowing TLS and DTLS to be used for all RADIUS traffic.  In addition, <xref target="RFC7360"/> Section 3, addresses concerns about documenting the transition from legacy RADIUS to crypto-agile RADIUS.</t>
        <t>Section 4.6 of <xref target="RFC6421"/> requires automated key management.  This requirement is satisfied by using TLS or DTLS key management.</t>
        <t>We can now finalize the work began in <xref target="RFC6421"/>.  This document updates <xref target="RFC2865"/> to state that any new RADIUS specification MUST NOT introduce new "ad hoc" cryptographic primitives to authenticate packets as was done with the Request / Response Authenticator, or to obfuscate attributes as was done with User-Password and Tunnel-Password.  We allow legacy RADIUS-specific cryptographic methods existing as of the publication of this document to be used for historical compatibility.  However, all new cryptographic work which is specific to the RADIUS protocol is forbidden.</t>
        <t>We recognize that RADIUS/UDP will still be in use for many years, and that new standards may require some modicum of privacy.  As the BlastRADIUS attack shows, RADIUS/UDP security is inadequate.  The solution is not to fix RADIUS/UDP.  The solution is to deprecate it entirely.</t>
        <t>All new security and privacy requirements in RADIUS MUST be provided by a secure transport layer such as TLS or IPsec.  As noted above, simply using IPsec is not always enough, as the use (or not) of IPsec is unknown to the RADIUS application.</t>
        <t>The restriction forbidding new cryptographic work in RADIUS does not apply to the data being transported in RADIUS attributes.  For example, a new authentication method could use new cryptographic methods, and would be permitted to be transported in RADIUS.  This authentication method could be a new EAP method, or any other data which is opaque to the RADIUS transport.  In those cases, RADIUS serves as a transport layer for the authentication method.  The authentication data is treated as opaque data for the purposes of Access-Request, Access-Challenge, etc. packets.  There would be no need for the RADIUS protocol to define any new cryptographic methods in order to transport this data.</t>
        <t>Similarly, new specifications MAY define new attributes which use the obfuscation methods for User-Password as defined in <xref target="RFC2865"/> Section 5.2, or for Tunnel-Password as defined in <xref target="RFC2868"/> Section 3.5.  However, due to the issues noted above in <xref target="tunnel-coa"/>, the Tunnel-Password obfuscation method MUST NOT be used for packets other than Access-Request, Access-Challenge, and Access-Accept.  If the attribute needs to be send in another type of packet, then the protocol design is likely wrong, and needs to be revisited.  It is again a difficult choice to forbid certain uses of the Tunnel-Password obfuscation method, but we believe that doing so is preferable to allowing sensitive data to be obfuscated with less security than the original design intent.</t>
      </section>
    </section>
    <section anchor="migration-path-and-recommendations">
      <name>Migration Path and Recommendations</name>
      <t>We recognize that it is difficult to upgrade legacy devices with new cryptographic protocols and user interfaces.  The problem is made worse because of the volume of RADIUS devices which are in use.  The exact number is unknown, and can only be approximated.  Our best guess is that at the time of this writing there are millions of devices supporting RADIUS/UDP in daily use.  It takes significant time and effort to correct the deficiencies of all of them.</t>
      <t>We therefore need to define a migration path to using secure transports.  In the following sections, we give a number of migration steps which could each be done independently.  We recommend increased entropy for shared secrets.  We also mandate the use of Message-Authenticator in all Access-Request packets for RADIUS/UDP and RADIUS/TCP.  Finally, where <xref target="RFC6614"/> Section 2.3 makes support for TLS-PSK optional, we suggest that RADIUS/TLS and RADIUS/DTLS implementations SHOULD support TLS-PSK.</t>
      <section anchor="shared-secrets">
        <name>Shared Secrets</name>
        <t><xref target="RFC2865"/> Section 3 says:</t>
        <ul empty="true">
          <li>
            <t>It is preferred that the secret be at least 16
octets.  This is to ensure a sufficiently large range for the
secret to provide protection against exhaustive search attacks.
The secret MUST NOT be empty (length 0) since this would allow
packets to be trivially forged.</t>
          </li>
        </ul>
        <t>This recommendation is no longer adequate, so we strengthen it here.</t>
        <t>RADIUS implementations MUST support shared secrets of at least 32 octets, and SHOULD support shared secrets of 64 octets.  Implementations MUST warn administrators that the shared secret is insecure if it is 12 octets or less in length.</t>
        <t>Administrators SHOULD use shared secrets of at least 24 octets, generated using a source of secure random numbers.   Any other practice is likely to lead to compromise of the shared secret, user information, and possibly of the entire network.</t>
        <t>Creating secure shared secrets is not difficult.  The following figure outlines four separate ways to create shared secrets.</t>
        <artwork><![CDATA[
    openssl rand -base64 16

    dd if=/dev/urandom bs=1 count=16 | base64

    dd if=/dev/urandom bs=1 count=16 | base32

    dd if=/dev/urandom bs=1 count=16 |
        (hexdump -ve '/1 "%02x"' && echo)
]]></artwork>
        <t>Only one of the above commands should be run, as they are functionally equivalent.  Each command reads 128 bits (16 octets) of random data from a secure source, and encodes it as printable / readable ASCII.  This form of PSK will be accepted by any implementation which supports at least 32 octets for PSKs.  Larger PSKs can be generated by changing the "16" number in the command to a larger value.  The above derivation assumes that the random source returns one bit of entropy for every bit of randomness which is returned.  Sources failing that assumption are NOT RECOMMENDED.</t>
        <t>Given the simplicity of creating strong secrets, there is no excuse for using weak shared secrets with RADIUS.  The management overhead of dealing with complex secrets is less than the management overhead of dealing with compromised networks.</t>
        <t>Over all, the security analysis of shared secrets is similar to that for TLS-PSK.  It is therefore RECOMMENDED that implementers manage shared secrets with same the practices which are recommended for TLS-PSK, as defined in <xref target="RFC8446"/> Section E.7 and <xref target="RFC9257"/> Section 4.</t>
        <t>On a practical node, RADIUS implementers SHOULD provide tools for administrators to help them create and manage secure shared secrets.  The cost to do so is minimal for an implementer.  Providing such tools can further enable and motivate administrators to use secure practices.</t>
      </section>
      <section anchor="message-authenticator">
        <name>Message-Authenticator</name>
        <t>The Message-Authenticator attribute was defined in <xref target="RFC3579"/> Section 3.2.  The "Note 1" paragraph at the bottom of <xref target="RFC3579"/> Section 3.2 required that Message-Authenticator be added to Access-Request packets when the EAP-Message as present, and suggested that it should be present in a few other situations.   The BlastRADIUS attack has shown that these recommendations are inadequate.</t>
        <t>While the text in <xref target="blastradius"/> goes into detail about the mitigations, we summarize them here.  Please see the previous section for a longer and more detailed explanation of the flags and their behavior.</t>
        <ul empty="true">
          <li>
            <t>RADIUS clients MUST include the Message-Authenticator in all Access-Request packets when UDP or TCP transport is used.</t>
            <t>RADIUS clients and servers MUST have a boolean flag which we call "require Message-Authenticator".</t>
            <t>When set to "true", implementations receiving Access-Request, Access-Accept, Access-Challenge, Access-Reject, and Protocol-Error packets which do not contain Message-Authenticator MUST silently discard those packets.</t>
            <t>Servers MUST have a boolean flag which we call "limit Proxy-State".</t>
            <t>This flag MUST be examined when the "require Message-Authenticator" flag is set to "false".</t>
            <t>When set to "true", servers receiving an Access-Request packet which contains Proxy-State but no Message-Authenticator MUST discard that packet.</t>
          </li>
        </ul>
        <t>In contrast, when TLS-based transports are used, the Message-Authenticator attribute serves no purpose, and could be omitted, even when the Access-Request packet contains an EAP-Message attribute.  However, implementations SHOULD include it, even if it servers no immediate purpose.  As noted earlier, including Message-Authenticator can increase the security of legacy proxies which do not implement the BlastRADIUS mitigations.</t>
        <t>Servers receiving Access-Request packets over TLS-based transports SHOULD NOT silently discard a packet if it is missing a Message-Authenticator attribute.  However, if the Message-Authenticator attribute is present, it still MUST be validated as discussed in <xref target="RFC7360"/>.</t>
      </section>
      <section anchor="recommending-tls-psk">
        <name>Recommending TLS-PSK</name>
        <t>Given the insecurity of RADIUS/UDP, the absolute minimum acceptable security is to use strong shared secrets.  However, administrator overhead for TLS-PSK is not substantially higher than for shared secrets, and TLS-PSK offers significantly increased security and privacy.</t>
        <t>It is therefore RECOMMENDED that implementations support TLS-PSK.  In some cases TLS-PSK is preferable to certificates.  It may be difficult for RADIUS clients to upgrade all of their interfaces to support the use of certificates, and TLS-PSK more closely mirrors the historical use of shared secrets, with similar operational considerations.</t>
        <t>Additional implementation and operational considerations for TLS-PSK are given in <xref target="I-D.ietf-radext-tls-psk"/>.</t>
      </section>
      <section anchor="guidelines-for-administrators">
        <name>Guidelines for Administrators</name>
        <t>The above text provides guidelines for implementers.  We also need to provide guidelines for administrators as to how, and when, to configure the above flags.  The guidelines provided in this section are suggestions only.  Administrators are free to take other actions as they see fit.</t>
        <t>However, the guidelines provided here are known to provide minimal outages while upgrading complex systems.  As such, it is RECOMMENDED that administrators follow the steps outlined here, in order, so that RADIUS systems can be upgraded with minimal impact to operational networks.</t>
        <ol spacing="normal" type="1"><li>
            <t>Administrators SHOULD upgrade servers before upgrading clients.  There are many fewer clients than servers, and upgrading servers can protect clients which are not upgraded.</t>
          </li>
          <li>
            <t>Administrators SHOULD configure servers to set "limit Proxy-State" to "true" for all clients which are NASes.  i.e. clients which are not proxies.</t>
          </li>
          <li>
            <t>Administrators of servers which proxy packets SHOULD verify that all "next hop" proxies have been upgraded, and that they return Message-Authenticator in all responses to Access-Request packets.</t>
          </li>
          <li>
            <t>Once step (4) has been validated, administrators SHOULD configure their proxy so that the outgoing client configuration, sets the "require Message-Authenticator" flag to "true".</t>
          </li>
          <li>
            <t>Administrators of servers which receive proxied packets (i.e. packets not from a NAS) SHOULD configure the server to set the the "require Message-Authenticator" flag to "true" for each client which is an upgraded proxy.</t>
          </li>
        </ol>
        <t>Once the above five steps are followed, the network should be secure, and any client upgrade and configuration can be done over time.</t>
        <t>For client upgrades, administrators can proceed with the following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>Administrators SHOULD upgrade clients individually, i.e. one at a time. Upgrading multiple clients at the same time is NOT RECOMMENDED.</t>
          </li>
          <li>
            <t>Once a client has been upgraded, administrators SHOULD verify that it sends Message-Authenticator in all Access-Request packets.</t>
          </li>
          <li>
            <t>Once step (2) has been validated, administrators SHOULD configure each server receiving packets from that client to set the "require Message-Authenticator" flag to "true" for that client.</t>
          </li>
          <li>
            <t>If a server has been updated, administrators SHOULD verify that it sends Message-Authenticator as the first attribute in all responses to Access-Request packets.</t>
          </li>
          <li>
            <t>Once step (4) has been validated, administrators SHOULD configure each client receiving packets from that server to set the "require Message-Authenticator" flag to "true" for that server.</t>
          </li>
        </ol>
        <t>Once all of the above steps are followed for all clients and servers, the network is secure from the BlastRADIUS attack.</t>
      </section>
    </section>
    <section anchor="increasing-the-security-of-radius">
      <name>Increasing the Security of RADIUS</name>
      <t>While we still permit the use of UDP and TCP transports in secure environments, there are opportunities for increasing the security of RADIUS when those transport protocols are used.  The amount of personal identifiable information (PII) sent in packets should be minimized.  Information about the size, structure, and nature of the visited network should be omitted or anonymized.  The choice of authentication method also has security and privacy impacts.</t>
      <t>The recommendations here for increasing the security of RADIUS transports also applies when TLS is used.  TLS transports protect the RADIUS packets from observation by from third-parties.  However, TLS does not hide the content of RADIUS packets from intermediate proxies, such as ones uses in a roaming environment.  As such, the best approach to minimizing the information sent to proxies is to minimize the number of proxies which see the RADIUS traffic, and to minimize the amount of PII which is sent.</t>
      <t>Implementers and administrators need to be aware of all of these issues, and then make the best choice for their local network which balances their requirements on privacy, security, and cost.  Any security approach based on a simple "checklist" of "good / bad" practices is likely to result in decreased security as compared to an end-to-end approach which is based on understanding the issues involved.</t>
      <section anchor="minimizing-personal-identifiable-information">
        <name>Minimizing Personal Identifiable Information</name>
        <t>One approach to increasing RADIUS privacy is to minimize the amount of PII which is sent in packets.  Implementers of RADIUS products and administrators of RADIUS systems SHOULD ensure that only the minimum necessary PII is sent in RADIUS.</t>
        <t>Where possible, identities should be anonymized (e.g. <xref target="RFC7542"/> Section 2.4).  The use of anonymized identities means that the the Chargeable-User-Identifier <xref target="RFC4372"/> should also be used.  Further discussion on this topic is below.</t>
        <t>Device information SHOULD be either omitted, or randomized.  e.g. MAC address randomization could be used on end-user devices.  The details behind this recommendation are the subject of ongoing research and development.  As such, we do not offer more specific recommendations here.</t>
        <t>Information about the visited network SHOULD be replaced or anonymized before packets are proxied outside of the local organization.  The attribute Operator-NAS-Identifier <xref target="RFC8559"/> can be used to anonymize information about NASes in the local network.</t>
        <t>Location information (<xref target="RFC5580"/> SHOULD either be omitted, or else it SHOULD be limited to the broadest possible information, such as country code. For example, <xref target="I-D.tomas-openroaming"/> says:</t>
        <ul empty="true">
          <li>
            <t>All OpenRoaming ANPs MUST support signaling of location information</t>
          </li>
        </ul>
        <t>This location information is required to include at the minimum the country code.  We suggest the country code SHOULD also be the maximum amount of location information which is sent over third-party networks.</t>
        <section anchor="chargeable-user-identity">
          <name>Chargeable-User-Identity</name>
          <t>Where the Chargeable-User-Identity (CUI) <xref target="RFC4372"/> is used, it SHOULD be unique per session.  This practice will help to maximize user privacy, as it will be more difficult to track users across multiple sessions.  Due to additional constraints which we will discuss below, we cannot require that the CUI change for every session.</t>
          <t>What we can do is to require that the home server MUST provide a unique CUI for each combination of user and visited network.  That is, if the same user visits multiple networks, the home server MUST provide different CUIs to each visited network for that user.  The CUI MAY be the same across multiple sessions for that user on one particular network.  The CUI MAY be the same for multiple devices used by that user on one particular network.</t>
          <t>We note that the MAC address is likely the same across multiple user sessions on one network.  Therefore changing the CUI offers little additional benefit, as the user can still be tracked by the unchanging MAC address.  Never the less, we believe that having a unique CUI per session can be useful, because there is ongoing work on increasing user privacy by allowing more MAC address randomization.  If we were to recommend that the CUI remain constant across multiple sessions, that would in turn negate much of the effort being put into MAC address randomization.</t>
          <t>One reason to have a constant CUI value for a user (or user devices) on one network is that network access providers may need to enforce limits on simultaneous logins.  Network providers may also need to correlate user behavior across multiple sessions in order to track and prevent abuse.  Both of these requirements are impossible if the CUI changes for every user session.</t>
          <t>The result is that there is a trade-off between user privacy and the needs of the local network.  While perfect user privacy is an admirable goal, perfect user privacy may also allow anonymous users to abuse the visited network.  The network would then likely simply refuse to provide network access.  Users may therefore have to accept some limitations on privacy, in order to obtain network access.</t>
          <t>Although the CUI contents are not directly related to security, we still give recommendations for creating and managing of the CUI.  We believe that these recommendations will help implementers satisfy the preceding requirements, while not imposing undue burden on the implementations.</t>
          <t>In general, the simplest way to track CUIs long term is to associate the CUI to user identity in some kind of cache or database.  This association could be created at the tail end of the authentication process, and before any accounting packets were received.  This association should generally be discarded after a period of time if no accounting packets are received.  If accounting packets are received, the CUI to user association should then be tracked along with the normal accounting data.</t>
          <t>The above method for tracking CUI works no matter how the CUI is generated.  If the CUI can be unique per session, or it could be tied to a particular user identity across a long period of time.  The same CUI could also be associated with multiple devices.</t>
          <t>Where the CUI is not unique for each session, the only minor issue is the cost of the above method is that the association is stored on a per-session basis when there is no need for that to be done.  Storing the CUI per session means that is it possible to arbitrarily change how the CUI is calculated, with no impact on anything else in the system.  Designs such as this which decouple unrelated architectural elements are generally worth the minor extra cost.</t>
          <t>For creating the CUI, that process should be done in a way which is scalable and efficient.  For a unique CUI per user, implementers SHOULD create a value which is unique both to the user, and to the visited network.  There is no reason to use the same CUI for multiple visited networks, as that would enable the tracking of a user across multiple networks.</t>
          <t>Before suggesting a method for creating the CUI, we note that <xref target="RFC4372"/> Section 2.1 defines the CUI as being of data type 'string' (<xref target="RFC8044"/> Section 3.5).  <xref target="RFC4372"/> Section 2.1 further suggests that the value of the CUI is interpreted as an opaque token, similar to the Class attribute (<xref target="RFC2865"/> Section 5.25).  Some organizations create CUI values which use the Network Access Identifier (NAI) format as defined in <xref target="RFC7542"/>.  This format can allow the home network to be identified to the visited network, where the User-Name does not contain a realm.  Such formats SHOULD NOT be used unless all parties involved have agreed to this behavior.</t>
          <t>The CUI SHOULD be created via a construct similar to what is given below, where "+" indicates concatenation:</t>
          <artwork><![CDATA[
CUI = HASH(Visited Network Data + User Identifier + Key)
]]></artwork>
          <t>This construct has the following functional parameters.</t>
          <ul empty="true">
            <li>
              <t>HASH</t>
              <ul empty="true">
                <li>
                  <t>A cryptographic hash function.  It is RECOMMENDED to use an HMAC instead of a hash function.</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>Visited Network Data</t>
              <ul empty="true">
                <li>
                  <t>Data which identifies the visited network.</t>
                  <t>This data could be the Operator-Name attribute (<xref target="RFC5580"/> Section 4.1).</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>User Identifier</t>
              <ul empty="true">
                <li>
                  <t>The site-local user identifier.  For tunneled EAP methods such as PEAP or TTLS, this could be the user identity which is sent inside of the TLS tunnel.</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>Key</t>
              <ul empty="true">
                <li>
                  <t>A secret known only to the local network.  The key is generally a large random string.  It is used to help prevent dictionary attacks on the CUI.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>Where the CUI needs to be constant across multiple user sessions or devices, the key can be a static value.  It is generated once by the home network, and then stored for use in further CUI derivations.</t>
          <t>Where the CUI needs to be unique per session, the above derivation SHOULD still be used, except that the "key" value will instead be a random number which is different for each session.  Using such a design again decouples the CUI creation from any requirement that it is unique per session, or constant per user.  That decision can be changed at any time, and the only piece which needs to be updated is the derivation of the "key" field.  In contrast, if the CUI is generated completely randomly per session, then it may be difficult for a system to later change that behavior to allow the CUI to be constant for a particular user.</t>
          <t>If an NAI format is desired, the hash output can be converted to printable text, truncated if necessary to meet length limitations, and then an "@" character and a realm appended to it.  The resulting text string is then in NAI form.</t>
          <t>We note that the above recommendation is not invertible.  That is, given a particular CUI, it is not possible to determine which visited network or user identifier was used to create it.  If it is necessary to use the CUI to look up a user, the home network needs to store the full set of CUI values which a user has been assigned.</t>
          <t>If this tracking is too complex for a network, it is possible to create the CUI via an invertible encryption process as follows:</t>
          <artwork><![CDATA[
CUI = ENCRYPT(Key + Visited Network Data + User Identifier)
]]></artwork>
          <t>This construct has the following functional parameters.</t>
          <ul empty="true">
            <li>
              <t>ENCRYPT</t>
              <ul empty="true">
                <li>
                  <t>A cryptographically secure encryption function.</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>Key</t>
              <ul empty="true">
                <li>
                  <t>The encryption key.  Note that the same key must not be used for more both hashing and encryption.</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>Visited Network Data</t>
              <ul empty="true">
                <li>
                  <t>Data which identifies the visited network.</t>
                  <t>This data could be the Operator-Name attribute (<xref target="RFC5580"/> Section 4.1).</t>
                </li>
              </ul>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>User Identifier</t>
              <ul empty="true">
                <li>
                  <t>The site-local user identifier.  For tunneled EAP methods such as PEAP or TTLS, this could be the user identity which is sent inside of the TLS tunnel.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>However, it is RECOMMENDED that HMAC based methods are used instead of methods based on reversible encryption.</t>
          <t>The intent is for CUI to leak as little information as possible, and ideally be different for every session.  However, business agreements, legal requirements, etc. may mandate different behavior.  The intention of this section is not to mandate complete CUI privacy, but instead to clarify the trade-offs between CUI privacy and business realities.</t>
        </section>
      </section>
      <section anchor="user-password-visibility">
        <name>User-Password Visibility</name>
        <t>The design of RADIUS means that when proxies receive Access-Request packets, the clear-text contents of the User-Password attribute are visible to the proxy.  Despite various claims to the contrary, the User-Password attribute is never sent "in the clear" over the network.  Instead, the password is protected by TLS (RADIUS/TLS) or via the obfuscation methods defined in <xref section="5.2" sectionFormat="comma" target="RFC2865"/>.  However, the nature of RADIUS means that each proxy must first undo the password obfuscation of <xref target="RFC2865"/>, and then re-do it when sending the outbound packet.  As such, the proxy has the clear-text password visible to it, and stored in its application memory.</t>
        <t>It is therefore possible for every intermediate proxy to snoop and record all User-Name and User-Password values which they see.  This exposure is most problematic when the proxies are administered by an organization other than the one which operates the home server.  Even when all of the proxies are operated by the same organization, the temporary existence of clear-text passwords on multiple machines is a security risk.</t>
        <t>It is therefore NOT RECOMMENDED for organizations to send the User-Password attribute in packets which are sent outside of the organization.  If RADIUS proxying is necessary, another authentication method which provides for end-to-end security of user information SHOULD be used, such as EAP-TLS, TTLS, or PEAP.</t>
        <t>Client and server implementations SHOULD use secure programming techniques to wipe passwords and other sensitive data from memory when they are no longer needed.</t>
        <t>Organizations MAY still use User-Password attributes within their own systems, for reasons which we will explain below in <xref target="password-security"/>.</t>
      </section>
      <section anchor="delaying-access-rejects">
        <name>Delaying Access-Rejects</name>
        <t>Anyone can cause a NAS to send Access-Request packets at will, simply by attempting to requesting network access, or login permissions from the NAS.  If this login process is not rate-limited, it can be abused by an attacker to perform dictionary attacks.</t>
        <t>In order to prevent these brute-force attacks, servers which originate Access-Reject packets MUST enforce a minimum delay between reception of the Access-Request, and transmission of a corresponding Access-Reject.  This delay SHOULD be configurable.  Experience shows that values between one (1) second and ten (10) seconds work well in practice.</t>
        <t>Systems which simply proxy Access-Reject packets MUST NOT add any artificial delays to those packets.  Doing so would result in delays accumulating across a chain of proxies.</t>
        <t>Servers SHOULD also add a small random jitter to the delay for a particular packet, in order to better protect themselves from timing attacks.</t>
      </section>
      <section anchor="use-constant-time-comparisons">
        <name>Use Constant Time Comparisons</name>
        <t>Both clients and servers SHOULD use constant-time operations to compare received versus calculated values which depend on secret information.  If comparison operations are stopped as soon as a difference is seen, an attacker could using timing attacks to determine the correct underlying values, even without seeing them.  A constant-time operation instead compares the entire value, accumulating the result along the way.  Only when the entire value has been examined does the comparison return a "match" or "no-match" result.</t>
        <t>Constant-time operations SHOULD be used for the Request Authenticator and Response Authenticator fields.  Constant time comparisons SHOULD be used for attributes which directly contain secret values (e.g. User-Password), or are derived from secret values (e.g. CHAP-Password, and Message-Authenticator).</t>
      </section>
      <section anchor="minimize-the-use-of-proxies">
        <name>Minimize the use of Proxies</name>
        <t>The design of RADIUS means that even when RADIUS/TLS is used, every intermediate proxy has access to all of the information in each packet.  The only way to secure the network from such observers is to minimize the use of proxies.</t>
        <t>Where it is still necessary to use intermediate proxies such as with eduroam <xref target="EDUROAM"/> and OpenRoaming <xref target="OPENROAMING"/>, it is RECOMMENDED to use EAP methods instead of bare PAP, CHAP, or MS-CHAP.  If passwords are used, they can be can be protected from being seen by proxies via TLS-based EAP methods such as EAP-TTLS or PEAP.  Passwords can also be omitted entirely from being sent over the network, as with EAP-TLS <xref target="RFC9190"/> or EAP-pwd <xref target="RFC5931"/>.</t>
        <t>In many cases, however, the existence of proxies is to either due contractual obligations, or to a need to solve "N by M" connection problems.  A centralized proxy system can often simplify overall network management and maintenance.</t>
        <section anchor="there-is-no-radius-routing-protocol">
          <name>There is no RADIUS Routing Protocol</name>
          <t>While <xref target="RFC7585"/> allows for a client to connect directly to a server, that configuration is not always used.  Historically, RADIUS systems implemented realm <xref target="RFC7542"/> roaming, where multiple visited networks were connected to multiple home via chains of intermediate proxies <xref target="RFC2194"/>.  As there is no RADIUS routing protocol to control realm forwarding through these proxies, there is therefore no way to automatically determine which realms are routable, or how best to route packets for known realms.</t>
          <t>The outcome of this limitation is that all such realm routing rules are largely configured statically, manually, and individually on multiple systems.  This process can be automated within one administrative system, but it is open to mistakes or abuse in multi-system networks.</t>
          <t>In RADIUS, each proxy which sees traffic is completely trusted.  It can modify, filter, or record any packets which transit the proxy.  This ability means that a proxy can engage in a large number of negative behaviors.  For example, a proxy could forge Access-Request packets for realms which it knows about, and potentially perform dictionary attacks on home networks.  A proxy could also alter or invent data in Accounting-Request packets, in order to defraud a home server of revenue.  A proxy could also observe Accounting-Request traffic, and use the obtained information to forge Disconnect-Request packets.</t>
          <t>Proxies can also inject traffic for realms which do not normally transit the proxy.  Without a routing protocol, there is no way for a home server to automatically control which set of realms is allowed to be sent from a particular client.  There is also no general way for a proxy to signal that a particular Access-Request or Accounting-Request is non-routable: it must be either rejected or discarded.</t>
          <t>Visited sites also have no control over proxies past the ones that they have relationships with.  Subsequent proxies are completely unknown, and unknowable to the visited network.  Despite these systems being completely unknown, they are completely trusted due to limitations in the RADIUS protocol.</t>
          <t>That is, there is no fine-grained way for a visited or home network to limit which intermediary systems see traffic for their realms, or what traffic can be seen by those systems.  While these filtering rules can be manually documented as seen in <xref target="FILTER"/>, this process is error-prone, and fragile.</t>
          <t>Administrators should be aware of the above issues: fraud, forgery, and filtering are all possible in a "trusted" RADIUS ecosystem.</t>
          <t>Historically, these issues do not appear to have been widely exploited.  The most common defense against these attacks is to limit RADIUS relationships to entities which share a contractual relationship.  This relationship can be direct between clients, servers, and proxies.  This relationship can also be indirect, as when multiple organizations are members of a shared consortium such as eduroam.</t>
          <t>Implementations therefore SHOULD provide methods by which routing information can be tied to particular clients and to particular home servers.  Implementations SHOULD allow packets to be filtered by some combination of realm and client or home server.  Administrators SHOULD take advantage of these filters to double-check that received traffic is coming from the expected sources, and contains the expected realms.</t>
        </section>
        <section anchor="dynamic-discovery-and-filtering">
          <name>Dynamic Discovery and Filtering</name>
          <t>When <xref target="RFC7585"/> dynamic discovery is used, intermediate proxy hops are avoided.  There are a number of possible attacks here, though <xref section="5" sectionFormat="comma" target="RFC7585"/> largely limits its discussion to rate limiting of connections.</t>
          <t>A client which supports dynamic discovery of home servers still has to perform filtering on NAI realms before doing any lookups.  When no filtering takes place, an attacker can cause a RADIUS client to do DNS lookups for arbitrary domains, and then cause it to connect to arbitrary servers.  As there is no RADIUS routing protocol, there is no general way for a client to determine which realms are part of a particular organization, and are thus permitted for dynamic DNS lookups.</t>
          <t>Organizations relying on dynamic discovery SHOULD have some way of automatically sharing which realms are valid, and which are not.  There are a number of possibilities here, and choosing the best one is up to each individual organization.</t>
          <t>Clients supporting dynamic discovery SHOULD require that servers use certificates from a private Certification Authority (CA).  Clients MUST NOT automatically accept server certificates rooted from public CAs (e.g. as is done for web servers).  Instead, clients MUST be configurable to use only a limited set of CAs.  The default list of accepted CAs SHOULD be empty.</t>
          <t>Similarly, servers SHOULD require that clients use certificates from a private Certification Authority (CA).  Servers MUST NOT accept client certificates rooted from a public CA.</t>
          <t>Servers which accept connections from dynamic discover are necessarily open to the Internet.  Administrators SHOULD limit the source IP of allowed connections.  Server SHOULD filter received packets by NAI, and close connections when the NAIs in incoming packets do not match the NAI(s) that the server expects.  This mismatch indicates either a misconfigured or malicious client.</t>
          <t>Both clients and servers can send any data inside of a TLS tunnel.  Implementations SHOULD take care to treat the data inside of a TLS tunnel as a potential source of attacks.</t>
          <t>Where multiple realms resolve to the same destination IP address, implementations MAY send packets for multiple realms across a connection to that IP address.  Clients SHOULD use SNI to indicate which realm they are connecting to.  Servers SHOULD present a certificate for the requested realm, instead of using a shared or "hosting" certificate which is owned by the hosting provider, and is used by multiple realms.  Such certificate sharing decreases security, and increases operational costs.</t>
          <t>Where systems do not have a pre-defined list of allowed realms, implementations MUST support negative caching.  That is, if the lookup for a particular realm fails, or a connection to that realm fails, then the implementation needs to cache that negative result for a period of time.  This cache needs to be examined prior to any new lookup or connection being made.  If there is an entry in the negative cache, then the server MUST skip the lookup or connection attempt, and instead return an immediate error.  This negative cache time SHOULD be configurable.</t>
          <t>Other attacks are possible.  If there are implementation bugs in a clients TLS library, an attacker could use dynamic discovery to cause the client to connect to a malicious server, and then use the server to attack the client.  A malicious server could also slow down its TCP connection to engage client resources for extended periods of time.  This process could even be done even before any TLS credentials are exchanged.</t>
          <t>In general, <xref target="RFC7585"/> dynamic discovery is substantially different from normal application protocols which use TLS.  There is substantial attack surface added by an unknown, and unauthenticated user who can cause a RADIUS client to connect to arbitrary systems under an attacker control.  Dynamic discovery should be used with care, and only with substantial amounts of filtering on the NAI realms which are allowed, and only with stringent limits on the number of lookups, connection attempts, open connections, etc.</t>
        </section>
      </section>
      <section anchor="ms-chap">
        <name>Do Not Use MS-CHAP</name>
        <t>MS-CHAP (v1 in <xref target="RFC2433"/> and v2 in <xref target="RFC2759"/>) have major design flaws, and should not be used outside of a secure tunnel such as PEAP or TTLS.  As MS-CHAPv1 is less commonly used, the discussion in this section will focus on MS-CHAPv2, but the same analysis applies to MS-CHAPv1.</t>
        <t>MS-CHAP has been broken since 2004, as seen in <xref target="ASLEAP"/>.  While the attack there mentions LEAP, the same attack applies to MS-CHAP.  This information was apparently insufficiently clear in the <xref target="ASLEAP"/> attack, as most implementations still support MS-CHAP, and no previous standard has deprecated it.</t>
        <t>The attack relies on a vulnerability in the protocol design in <xref section="8.4" sectionFormat="comma" target="RFC2759"/>.  In that section, the response to the MS-CHAP challenge is calculated via three DES operations, which are based on the 16-octet NT-Hash form of the password.  However, the DES operation requires 7 octet keys, so the 16-octet NT-Hash cannot be divided evenly into the 21 octets of keys required for the DES operation.</t>
        <t>The solution in <xref target="RFC2759"/> Section 8.4 is to use the first 7 octets of the NT-Hash for the first DES key, the next 7 octets for the second DES key, leaving only 2 octets for the final DES key.  The final DES key is padded with zeros.  This construction means that an attacker who can observe the MS-CHAP2 exchange only needs to perform 2^16 DES operations in order to determine the final 2 octets of the original NT-Hash.</t>
        <t>If the attacker has a database which correlates known passwords to NT-Hashes, then those two octets can be used as an index into that database, which returns a subset of candidate hashes.  Those hashes are then checked via brute-force operations to see if they match the original MS-CHAPv2 data.</t>
        <t>This process lowers the complexity of cracking MS-CHAP by nearly five orders of magnitude as compared to a brute-force attack.  The attack has been demonstrated using databases which contain tens to hundreds of millions of passwords.  On a consumer-grade machine, the time required for such an attack to succeed is on the order of tens of milliseconds.</t>
        <t>While this attack does require a database of known passwords, such databases are easy to find online, or to create locally from generator functions.  Passwords created manually by people are notoriously predictable, and are highly likely to be found in a database of known passwords.  In the extreme case of strong passwords, they will not be found in the database, and the attacker is still required to perform a brute-force dictionary search.</t>
        <t>The result is that MS-CHAP has significantly lower security than PAP.  When the MS-CHAP data is not protected by TLS, it is visible to everyone who can observe the RADIUS traffic.  Attackers who can see the MS-CHAP traffic can therefore obtain the underlying NT-Hash with essentially zero effort, as compared to cracking the RADIUS shared secret.  In contrast, the User-Password attribute is obfuscated with data derived from the Request Authenticator and the shared secret, and that method has not yet been successfully attacked.</t>
        <t>Implementers and administrators MUST therefore treat MS-CHAP and MS-CHAPv2 as being equivalent in security to sending passwords in the clear, without any encryption or obfuscation.  That is, the User-Password attribute with the <xref section="5.2" sectionFormat="comma" target="RFC2865"/> obfuscation is substantially more secure than MS-CHAP.  MS-CHAP offers little benefit over PAP, and has many drawbacks as discussed here, and in the next section.</t>
        <t>As MS-CHAP can be trivially broken by an observer, this document therefore mandates that MS-CHAP or MS-CHAPv2 authentication data carried in RADIUS MUST NOT be sent in situations where the that data is visible to an observer.  MS-CHAP or MS-CHAPv2 authentication data MUST NOT be sent over RADIUS/UDP or RADIUS/TCP.</t>
        <t>As MS-CHAP offers no practical benefits over PAP and has many downsides, MS-CHAP authentication SHOULD NOT be used even when the transport protocol is secure, as with IPsec or RADIUS over TLS.</t>
        <t>Existing RADIUS client implementations SHOULD deprecate the use of MS-CHAPv1 and MS-CHAPv2.  Clients SHOULD forbid new configurations from enabling MS-CHAP authentication.  New RADIUS clients MUST NOT implement the attributes used for MS-CHAPv1 and MS-CHAPv2 authentication (MS-CHAP-Challenge and MS-CHAP-Response).</t>
      </section>
      <section anchor="password-security">
        <name>Password Visibility and Storage</name>
        <t>An attacker may choose to ignore the wire protocol entirely, and bypass all of the issues described earlier in this document.  An attacker could instead focus on the database which holds user credentials such as account names and passwords.  At the time of this writing, databases such as <xref target="PWNED"/> claim to have records of over twelve billion user accounts which have been compromised.  User databases are therefore highly sought-after targets.</t>
        <t>The attack discussed in this section is dependent on vulnerabilities with the credential database, and does not assume an attacker can see or modify RADIUS traffic.  As a result, issues raised here apply equally well when TTLS, PEAP, or RADIUS/TLS are used.  The success of the attack depends only on how the credentials are stored in the database.  Since the choice of authentication method affects the way credentials are stored in the database, the security of that dependency needs to be discussed and explained.</t>
        <t>Some organizations may desire to increase the security of their network by avoiding PAP, and using CHAP or MS-CHAP, instead.  These attempts are misguided.  If simple password-based methods must be used, in almost all situations, the security of the network as a whole is increased by using PAP in preference to CHAP or MS-CHAP.  The reason is found through a straightforward risk analysis, which we explain in more detail below.</t>
        <section anchor="pap-security-analysis">
          <name>PAP Security Analysis</name>
          <t>When PAP is used, the RADIUS server sees a clear-text password from the user, and compares that password to credentials which have been stored in a user database.   The credentials stored in the database can be salted and/or hashed in a form which is commonly referred to as being in "crypt"ed form.  The RADIUS server takes the users clear-text password, performs the same "crypt" transformation, and then compares the two "crypt"ed passwords.</t>
          <t>Any compromise the RADIUS server will result in that clear-text password leaking.  However, in most cases, the clear-text password is available only in the memory of the RADIUS server application (i.e. not "on the wire"), and then only for a short period of time.  An attacker who desires to obtain passwords for all users would have to wait for all users to log in, which can take a substantial amount of time.  During that time, an administrator may discover the breach, and resolve the issue.</t>
          <t>When PAP is used, the credentials in the database are stored securely "at rest", presuming that the administrator only stores "crypt"ed credentials.  Any compromise of the database results in the disclosure of minimal information to the attacker.  That is, an attacker cannot easily obtain the clear-text passwords from the compromised database.</t>
          <t>The result is that the user passwords are visible in clear-text only for a short time, and then only on the RADIUS server.  The security of this system is not as good as seen with EAP-pwd <xref target="RFC5931"/> for example, but it is not terrible.</t>
          <t>While the obfuscation method used for the User-Password attribute has not been shown to be insecure, it has not been proven to be secure.  The obfuscation method depends on calculating MD5(secret + Request Authenticator), which has a few helpful properties for an attacker.  The cost of brute-forcing short secrets is not large, <xref target="cracking"/> discusses that cost in detail.  Even for longer secrets which are humanly generated, the MD5 state for hashing the secret can be pre-calculated and stored on disk.  This process is relatively inexpensive, even for billions of possible shared secrets.  The Request Authenticator can then be added to each pre-calculated state via brute-force, and compared to the obfuscated User-Password data.</t>
          <t>The MD5 digest is 16 octets long, and many passwords are shorter than that.  This difference means that the final octets of the digest are placed into the User-Password attribute without modification.  The result is that a brute-force attack does not need to decode the User-Password and see if the decoded password "looks reasonable".  Instead, the attacker simply needs to compare the final octets of the calculated digest with the final octets of the User-Password attribute.  The result is a signal which indicates with high probability that the guessed secret is correct.</t>
          <t>The only protection from this attack is to ensure that the secret is long, and derived from a cryptographically strong pseudo-random number generator.  <xref target="shared-secrets"/> discusses these issues in more detail.</t>
        </section>
        <section anchor="chap-and-ms-chap-password-storage">
          <name>CHAP and MS-CHAP Password Storage</name>
          <t>In contrast with PAP, when CHAP or MS-CHAP is used, those methods do not expose a clear-text password to the RADIUS server, but instead a hashed transformation of it.  That hash output is in theory secure even if an attacker can observe it.  While CHAP is still believed to be secure, MS-CHAP is not secure, as we saw earlier in <xref target="ms-chap"/>.  For the purposes of this section, we will focus on the construct of "hashed passwords", and will ignore any attacks specific to MS-CHAP.  We will also note that EAP-MD5 <xref section="5.4" sectionFormat="comma" target="RFC3748"/> is essentially CHAP, and has the same security analysis.</t>
          <t>The hash transformations for CHAP and MS-CHAP depend on a random challenge.  The intent was to increase security, but their construction makes strong requirements on the form in which user credentials are stored.</t>
          <t>The process for performing CHAP and MS-CHAP is inverted from the process for PAP.  Using similar terminology as above for illustrative purposes, the "hash"ed passwords are carried in the CHAP method, and are sent to the server.  The server must obtain the clear-text (or NT hashed) password from the database, and then perform the "hash" operation on the password from the database. The two "hash"ed passwords are then compared as was done with PAP.  This inverted process decreases system security substantially.</t>
          <t>When CHAP or MS-CHAP are used, all of credentials are stored as clear-text (or clear-text equivalent) in the database, all of the time.  Even if the database contents are encrypted, the decryption keys are necessarily accessible to the application which reads that database.  Any compromise of the application means that the entire database can be immediately read and exfiltrated as a whole.  The attacker then has complete access to all user identities, and all associated clear-text passwords.</t>
          <t>It should go without saying that having an attacker obtain all clear-text passwords is more of an issue than having the same attacker obtain "crypt"ed passwords.  Similarly, it is more secure for a RADIUS server to have access to some clear-text passwords, some of the time, rather than having access to all of the clear-text passwords, all of the time.</t>
        </section>
        <section anchor="on-the-wire-user-password-versus-chap-password">
          <name>On-the-wire User-Password versus CHAP-Password</name>
          <t>There is one more security myth which should be put to rest about PAP versus CHAP.  There is a common belief that CHAP is more secure, because passwords are sent "in the clear" via the User-Password attribute.  This belief is false.</t>
          <t>The User-Password attribute is obfuscated when it is sent in an Access-Request packet, using keyed MD5 and the shared secret, as defined in <xref section="5.2" sectionFormat="comma" target="RFC2865"/>.  At the time of this writing, no attack better than brute force has been found which allows an attacker to reverse this obfuscation.</t>
          <t>There have been claims that it is preferable to use CHAP-Password as it does not "send the password in clear-text".  This preference is based on a misunderstanding of how CHAP-Password and User-Password attributes are calculated.</t>
          <t>The CHAP-Password attribute depends on the hash of a visible Request Authenticator (or CHAP-Challenge) and the users password.  The obfuscated User-Password depends on the same Request Authenticator, and on the RADIUS shared secret.  For an attacker, the difference between the two calculations is minimal.  They can both be attacked with similar amounts of effort, as they use similar constructs.   As a result, any security analysis which makes the claim that "User-Password insecure because it uses MD5" ignores the fact that the CHAP-Password attribute is constructed through substantially the same method.</t>
          <t>An attacker who can observe the CHAP-Password and CHAP-Challenge can also perform an off-line dictionary attack on the observed values.  The complexity of cracking CHAP-Password is similar to that noted above for cracking RADIUS packets, which was discussed above in <xref target="cracking"/>.  The difference between the two attacks is that the shared secrets are more likely to be secure than passwords for an end-user.</t>
          <t>An attacker who can crack one users password can gain network access as that user, or even administrator access to network devices.  In contrast, an attacker who can crack the shared secret can gain network access as any user, and perform any authorization.  The result is that it is more valuable to crack shared secrets, even if the underlying attack process is essentially the same.</t>
        </section>
        <section anchor="pap-vs-chap">
          <name>PAP vs CHAP Conclusions</name>
          <t>A careful security analysis shows that for all of PAP, CHAP, and MS-CHAP, the RADIUS server must at some point have access to the clear-text version of the password.  As a result, there is minimal difference in risk exposure between the different authentication methods if a RADIUS server is compromised.</t>
          <t>However, when PAP is used, the user credentials can be stored securely "at rest" in a database, while such secure storage is impossible with CHAP and MS-CHAP.  There is therefore a substantial difference in risk exposure between the different authentication methods, with PAP offering substantially higher security due to its ability to secure passwords at rest via the "crypt" construct mentioned above.</t>
          <t>In contrast, CHAP is highly insecure, as any database compromise results in the immediate exposure of the clear-text passwords for all users.  The security of MS-CHAP is best described as near zero, independent of any database compromise.  This makes MS-CHAP the worst of all possible choices.</t>
          <t>This security difference is shown not just in the <xref target="PWNED"/> database, but also in attacks on RADIUS systems <xref target="EXPLOIT"/>, where attackers identified a vulnerable RADIUS system, and then:</t>
          <ul empty="true">
            <li>
              <t>utilized SQL commands to dump the credentials [T1555], which contained both clear-text and hashed passwords for user and administrative accounts.</t>
            </li>
          </ul>
          <t>The attack proceeded to leverage those passwords to gain more permissions:</t>
          <ul empty="true">
            <li>
              <t>Having gained credentials from the RADIUS server, PRC state-sponsored cyber actors used those credentials with custom automated scripts to authenticate to a router via Secure Shell (SSH), execute router commands, and save the output.</t>
            </li>
          </ul>
          <t>This attack is only possible when systems store clear-text passwords.</t>
          <t>The result is that when the system as a whole is taken into account, the risk of password compromise is substantially less with PAP than with CHAP or MS-CHAP.  It is therefore RECOMMENDED that administrators use PAP in preference to CHAP or MS-CHAP.  It is also RECOMMENDED that administrators store passwords "at rest" in a secure form (salted, hashed), as with the "crypt" format discussed above.</t>
          <t>That being said, other authentication methods such as EAP-TLS <xref target="RFC9190"/> and EAP-pwd <xref target="RFC5931"/> do not expose clear-text passwords to the RADIUS server or any intermediate proxy.  Thor methods therefore lower the risk of password exposure even more than using PAP.  It is RECOMMENDED that administrators avoid password-based authentication methods where at all possible.</t>
        </section>
      </section>
      <section anchor="use-eap-where-possible">
        <name>Use EAP Where Possible</name>
        <t>If more complex authentication methods are needed, there are a number of EAP methods which can be used.  These methods variously allow for the use of certificates (EAP-TLS), or passwords (EAP-TTLS <xref target="RFC5281"/>, PEAP <xref target="I-D.josefsson-pppext-eap-tls-eap"/>)) and EAP-pwd <xref target="RFC5931"/>.</t>
        <t>We also note that the TLS-based EAP methods which transport passwords also hide the passwords from intermediate RADIUS proxies, which also increases security.</t>
        <t>Finally, password-based EAP methods still send PAP / CHAP / MS-CHAP inside of the TLS tunnel.  As such, the security of a home server which checks those passwords is subject to the analysis above about PAP versus CHAP, along with the issues of storing passwords in a database.</t>
      </section>
      <section anchor="eliminating-proxies">
        <name>Eliminating Proxies</name>
        <t>The best way to avoid malicious proxies is to eliminate proxies entirely.  The use of dynamic peer discovery (<xref target="RFC7585"/>) means that the number of intermediate proxies is minimized.</t>
        <t>However, the server on the visited network still acts as a proxy between the NAS and the home network.  As a result, all of the above analysis still applies when <xref target="RFC7585"/> peer discovery is used.  There is an intermediate system which may have access to passwords or PII.  The only solution is using end-to-end security for AAA, which would involve a completely new protocol.</t>
      </section>
      <section anchor="accounting-is-imperfect">
        <name>Accounting Is Imperfect</name>
        <t>The use of RADIUS/UDP for accounting means that accounting is inherently unreliable.  Unreliable accounting means that different entities in the network can have different views of accounting traffic.  These differences can have multiple impacts, including incorrect views of who is on the network, to disagreements about financial obligations.  These issues are discussed in substantial detail in <xref target="RFC2975"/>, and we do not repeat those discussions here.  We do, however, summarize a few key issues.  Sites which use accounting SHOULD be aware of the issues raised in <xref target="RFC2975"/>, and the limitations of the suggested solutions.</t>
        <t>Using a reliable transport such as RADIUS/TLS makes it more likely that accounting packets are delivered, and that acknowledgments to those packets are received.  Reducing the number of proxies means that there are fewer disparate systems which need to have their accounting data reconciled.  Using non-volatile storage for accounting packets means that a system can reboot with minimal loss of accounting data.  Using interim accounting updates means that transient network issues or data losses can be corrected by later updates.</t>
        <t>As RADIUS does not provide for end-to-end signaling or transport, using RADIUS/TLS provides for reliable transport only when the client originating the accounting traffic is connected directly to the server which records it.  If there are instead one or more proxies involved, the proxies increase overall unreliability.</t>
        <t>Systems which perform accounting are also subject to significant operational loads.  Wheres authentication and authorization may use multiple packets, those packets are sent at session start, and then never again.  In contrast, accounting packets can be sent for the lifetime of a session, which may be hours or even days.  There is a large cost to receiving, processing, and storing volumes of accounting data.</t>
        <t>However, even with all of the above concerns addressed, accounting is still imperfect.  The obvious way to increase the accuracy of accounting data is to increase the rate at which interim updates are sent, but doing so also increases the load on the servers which process the accounting data.  At some point, the trade-off of cost versus benefit becomes negative.</t>
        <t>There is no perfect solution here.  Instead, there are simply a variety of imperfect trade-offs.</t>
        <section anchor="incorrect-accounting-data">
          <name>Incorrect Accounting Data</name>
          <t>Even if all accounting packets were delivered and stored without error, there is no guarantee that the contents of those packets are in any way reasonable.  The Wireless Broadband Alliance RADIUS Accounting Assurance <xref target="WBA"/> group has been investigating these issues.  While the results are not yet public, a presentation was made at IETF 118 in the RADEXT working group <xref target="RADEXT118"/>.</t>
          <t>The data presented indicated that the WBA saw just about every possible counter attribute in RADIUS accounting packets as containing data which was blatantly wrong or contradictory.  One example is extremely short sessions which have impossibly large amounts of data being downloaded.  Other accounting packets allege that large amounts of data were downloaded via octet counters, while at the same time claiming negligible packet counters, leading to absurdly large packet sizes.</t>
          <t>The only conclusion from this analysis is that RADIUS clients act as if it is better to produce incorrect accounting data rather than to produce no data at all.  This failure to follow reasonable practices is expensive.  In effect, vendors have offset their costs to produce quality data onto their customers, who have to take difficult and uncertain steps in order to sanitize or verify the confusing data which vendors provide in accounting packets.</t>
          <t>It should go without saying that accounting systems need to produce correct data.  However, <xref target="RFC2865"/> makes no requirement that the accounting data transported in RADIUS is correct, or is even vaguely realistic.  We therefore state here that systems which produce accounting data MUST generate correct, accurate, and reasonably precise data.  Vendors of networking equipment SHOULD test their systems to verify that the data they produce is accurate.</t>
        </section>
      </section>
      <section anchor="attribute-location">
        <name>Attribute Location and Ordering</name>
        <t>While <xref section="5" sectionFormat="comma" target="RFC2865"/> states that attribute ordering does not matter, some implementations would discard packets attributes were not received in a particular order chosen by the implementer.  Specifically, some implementations misunderstood the requirement (from the BlastRADIUS mitigations) that Message-Authenticator is sent as the first attribute in responses to Access-Request packets.  Despite the mandate that clients do not check the location of Message-Authenticator, non-compliant implementations would discard valid and authentic Access-Request packets where Message-Authenticator was not the first attribute.  This behavior is not appropriate.</t>
        <t>The <xref section="5" sectionFormat="comma" target="RFC2865"/> text defining attribute order (quoted below) does not cover all possible cases:</t>
        <artwork><![CDATA[
If multiple Attributes with the same Type are present, the order of
Attributes with the same Type MUST be preserved by any proxies.  The
order of Attributes of different Types is not required to be
preserved.  A RADIUS server or client MUST NOT have any dependencies
on the order of attributes of different types.  A RADIUS server or
client MUST NOT require attributes of the same type to be contiguous.
]]></artwork>
        <t>We add a missing case here.</t>
        <t>A RADIUS client or server MUST NOT have dependencies on the order or location of a particular attribute.  A RADIUS client or server MUST NOT discard otherwise valid packets which have attributes in an order which is unexpected to the implementation, but which is is valid by the above rules.</t>
        <t>For example, if Message-Authenticator passes validation, then the packet is authentic and it has not been modified. The location of Message-Authenticator within the packet does not matter for authenticated packets.  If can be the first, second, or last attribute.</t>
      </section>
      <section anchor="unknown-attributes">
        <name>Unknown Attributes</name>
        <t>An outcome of the BlastRADIUS mitigations was the discovery that some implementations would discard packets which contained an attribute that they did not recognize.  While this behavior is not explicitly permitted by previous specifications, we must admit that it is not explicitly forbidden, either.  This document corrects that failure.</t>
        <t>Unknown attributes are defined to be attributes which are well-formed, but which are not recognized by the implementation.  Processing of unknown attributes is discussed in <xref section="5" sectionFormat="comma" target="RFC2866"/>:</t>
        <ul empty="true">
          <li>
            <t>A RADIUS server MAY ignore Attributes with an unknown Type.</t>
            <t>A RADIUS client MAY ignore Attributes with an unknown Type.</t>
          </li>
        </ul>
        <t>We note this recommendation is to "ignore" these attributes, and not to discard the encapsulating packet. Instead of ignoring unknown attributes, some implementations instead discard those packets.  This behavior is incorrect, and leads to interoperability issues and network problems.</t>
        <t>With limited exceptions, implementations MUST NOT discard packets if they receive attributes with an unknown Type.  We update <xref target="RFC2865"/> to require that implementations MUST ignore Attributes with an unknown Type.   Those attributes MUST be treated in the same manner as an "Invalid Attribute" which is defined in <xref section="2.8" sectionFormat="comma" target="RFC6929"/>.</t>
        <t>The only exception to the above requirements is CoA-Request and Disconnect-Request packets, as discussed in <xref section="4.3.2" sectionFormat="comma" target="RFC8559"/>.</t>
        <t>This behavior is secure, so long as implementations follow some additional guidance for Access-Accept packets.  This guidance follows logically from existing text in <xref section="4.4" sectionFormat="comma" target="RFC2865"/> for similar situations with Access-Challenge:</t>
        <ul empty="true">
          <li>
            <t>If the NAS does not support challenge/response, it MUST treat an
Access-Challenge as though it had received an Access-Reject
instead.</t>
          </li>
        </ul>
        <t>And also for Service-Type in <xref section="5.6" sectionFormat="comma" target="RFC2865"/>:</t>
        <ul empty="true">
          <li>
            <t>A NAS is not
required to implement all of these service types, and MUST treat
unknown or unsupported Service-Types as though an Access-Reject
had been received instead.</t>
          </li>
        </ul>
        <t>A client is not required to implement all possible authorizations which can be sent in an Access-Accept.   We therefore extend the above scenarios to packets which contain unknown Types.  A client SHOULD treat Access-Accepts with no known or supported authorizations as though an Access-Reject had been received instead.</t>
        <t>This requirement for unknown Types is already met by most, if not all, RADIUS implementations.  That is, experience has shown that discarding packets for arbitrary reasons causes problems.  Existing implementations have largely chosen to follow reasonable practices, and the recommendation here simply documents that wide-spread practice.</t>
      </section>
    </section>
    <section anchor="practical-suggestions">
      <name>Practical Suggestions</name>
      <t>In the interest of simplifying the above explanations, this section provides a short-form checklist of recommendations.  Following this checklist does not guarantee that RADIUS systems are secure from all possible attacks.  However, systems which do not follow this checklist are likely to be vulnerable to known attacks, and are therefore less secure than they could be.</t>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Do not use RADIUS/UDP or RADIUS/TCP across the wider Internet</t>
            </li>
          </ul>
          <t>Exposing user identifiers, device identifiers, and locations is a privacy and security issue.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Avoid RADIUS/UDP or RADIUS/TCP in other networks, too.</t>
            </li>
          </ul>
          <t>It can take time to upgrade equipment, but the long-term goal is to entirely deprecate RADIUS/UDP.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Implement the BlastRADIUS mitigations</t>
            </li>
          </ul>
          <t>Both Implementers and administrators should implement the mitigations in order to secure Access-Request packets.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Use strong shared secrets</t>
            </li>
          </ul>
          <t>Shared secrets should be generated from a cryptographically strong pseudo-random number generator.  They should contain at least 128 bits of entropy.  Each RADIUS client should have a unique shared secret.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Minimize the use of RADIUS proxies.</t>
            </li>
          </ul>
          <t>More proxies means more systems which could be compromised, and more systems which can see private or secret data.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Do not proxy from secure to insecure transports</t>
            </li>
          </ul>
          <t>If user information (credentials or identities) is received over a secure transport (IPsec, RADIUS/TLS, TLS-based EAP method), then proxying the protected data over RADIUS/UDP or RADIUS/TCP degrades security and privacy.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Prefer EAP authentication methods to non-EAP methods.</t>
            </li>
          </ul>
          <t>EAP authentication methods are better at hiding user credentials from observers.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>For EAP, use anonymous outer identifiers</t>
            </li>
          </ul>
          <t>There are few reasons to use individual identities for EAP.  Identifying the realm is usually enough.</t>
          <t><xref target="RFC7542"/> Section 2.4 recommends that "@realm" is preferable to "anonymous@realm", which is in turn preferable to "user@realm".</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Prefer using PAP over CHAP or MS-CHAP.</t>
            </li>
          </ul>
          <t>PAP allows for credentials to be stored securely "at rest" in a user database.  CHAP and MS-CHAP do not.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Do not use MS-CHAP outside of TLS-based EAP methods.</t>
            </li>
          </ul>
          <t>MS-CHAP can be cracked with minimal effort.  This information has been known for two decades.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Store passwords in "crypt"ed form</t>
            </li>
          </ul>
          <t>Where is is necessary to store passwords, use systems such as PBKDF2 (<xref target="RFC8018"/>.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Regularly update to the latest cryptographic methods.</t>
            </li>
          </ul>
          <t>TLS 1.0 with RC4 was acceptable at one point in time.  It is no longer acceptable.  Similarly, the current cryptographic methods will at some point will be deprecated, and replaced by updated methods.  Upgrading to recent cryptographic methods should be a normal part of operating a RADIUS server.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Regularly deprecate older cryptographic methods.</t>
            </li>
          </ul>
          <t>Administrators should actively deprecate the use of older cryptographic methods.  If no system is using older methods, then those methods should be disabled or removed entirely.  Leaving old methods enabled makes the server more vulnerable to attacks.</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <ul spacing="normal">
            <li>
              <t>Send the minimum amount of information which is needed,.</t>
            </li>
          </ul>
          <t>Where proxying is used, it is a common practice is to simply forward all of the information from a NAS to other RADIUS servers.  Instead, the proxy closest to the NAS should filter out any attributes or data which are not needed by the "next hop" proxies, or by the home server.</t>
        </li>
      </ul>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The primary focus of this document is addressing privacy and security considerations for RADIUS.</t>
      <t>Deprecating insecure transport for RADIUS, and requiring secure transport means that personally identifying information is no longer sent "in the clear".  As noted earlier in this document, such information can include MAC addresses, user identifiers, and user locations.</t>
      <t>In addition, this document suggests ways to increase privacy by minimizing the use and exchange of PII.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The primary focus of this document is addressing privacy and security considerations for RADIUS.</t>
      <t>Deprecating insecure transports for RADIUS, and requiring secure transports, means that many historical security issues with the RADIUS protocol are mitigated.</t>
      <t>We reiterate the discussion above that any security analysis must be done on the system as a whole.  It is not reasonable to put an expensive lock on the front door of a house while leaving the window next to it open, and then somehow declare the house to be "secure".  Any approach to security based on a simple checklist is at best naive, and more truthfully is deeply misleading.  At worst, such practices will decrease security by causing people to follow false security practices, and to ignore real security practices.</t>
      <t>Implementers and administrators need to be aware of the issues raised in this document.  They can then make the best choice for their local network which balances their requirements on privacy, security, and cost.  Only informed choices will lead to the best security.</t>
      <section anchor="historical-considerations">
        <name>Historical Considerations</name>
        <t>The BlastRADIUS vulnerability is the result of RADIUS security being a low priority for decades.  Even the recommendation of <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/> that all clients add Message-Authenticator to all Access-Request packets was ignored by nearly all implementers.  If that recommendation had been followed, then the BlastRADIUS vulnerability notification would have been little more than "please remember to set the require Message-Authenticator flag on all RADIUS servers."</t>
        <t>For MS-CHAP, it has not previously been deprecated for similar reasons, even though it has been proven to be insecure for decades.  This continued use of MS-CHAP has likely resulted in the leaking of many users clear-text passwords.</t>
      </section>
      <section anchor="practical-implications">
        <name>Practical Implications</name>
        <t>This document either deprecates or forbids methods and behaviors which have been common practice for decades.  While insecure practices have been viewed as tolerable, they are no longer acceptable.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is instructed to update the RADIUS Types registry, and the "Values for RADIUS Attribute 101, Error-Cause Attribute" sub-registry with the following addition:</t>
      <artwork><![CDATA[
Value,Description,Reference
510,Missing Message-Authenticator,[THIS-DOCUMENT]
]]></artwork>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to the many reviewers and commenters for raising topics to discuss, and for providing insight into the issues related to increasing the security of RADIUS.  In no particular order, thanks to Margaret Cullen, Alexander Clouter, and Josh Howlett.</t>
      <t>Many thanks to Nadia Heninger and the rest of the BlastRADIUS team, along with Heikki Vatiainen, for extensive discussions and feedback about the issue.</t>
      <t>The author is deeply indebted to the late Bernard Aboba for decades of advice and guidance.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>01 - added more discussion of IPsec, and move TLS-PSK to its own document,</t>
        </li>
        <li>
          <t>02 - Added text on Increasing the Security of Insecure Transports</t>
        </li>
        <li>
          <t>03 - add text on CUI.  Add notes on PAP vs CHAP security</t>
        </li>
        <li>
          <t>04 - add text on security of MS-CHAP.  Rearrange and reword many sections for clarity.</t>
        </li>
        <li>
          <t>05 - Rework title to deprecating "insecure practices".  Clarifications based on WG feedback.</t>
        </li>
        <li>
          <t>00 - adoption by WG.</t>
        </li>
        <li>
          <t>01 - review from Bernard Aboba.  Added discussion on accounting, clarified and re-arranged text.  Added discussion of server behavior for missing Message-Authenticator</t>
        </li>
        <li>
          <t>02 - BlastRADIUS updates.</t>
        </li>
        <li>
          <t>03 - add delay Access-Reject, constant-time comparison, no routing protocol.  Updated the text significantly and made it more consistent with the BlastRADIUS recommendations.  Add "updates" other RFCs.</t>
        </li>
        <li>
          <t>04 - updates with review from Fabian Mauchle</t>
        </li>
        <li>
          <t>05 - merge in spelling fixes from Andrew Wood.  Update and rewrite BlastRADIUS mitigations to make them clearer.  Add section describing processes administrators can use to upgrade their networks.</t>
        </li>
        <li>
          <t>06 - updates and clarifications based on reviews.</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC6421">
          <front>
            <title>Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS)</title>
            <author fullname="D. Nelson" initials="D." role="editor" surname="Nelson"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This memo describes the requirements for a crypto-agility solution for Remote Authentication Dial-In User Service (RADIUS). This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6421"/>
          <seriesInfo name="DOI" value="10.17487/RFC6421"/>
        </reference>
        <reference anchor="RFC8044">
          <front>
            <title>Data Types in RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>RADIUS specifications have used data types for two decades without defining them as managed entities. During this time, RADIUS implementations have named the data types and have used them in attribute definitions. This document updates the specifications to better follow established practice. We do this by naming the data types defined in RFC 6158, which have been used since at least the publication of RFC 2865. We provide an IANA registry for the data types and update the "RADIUS Attribute Types" registry to include a Data Type field for each attribute. Finally, we recommend that authors of RADIUS specifications use these types in preference to existing practice. This document updates RFCs 2865, 3162, 4072, 6158, 6572, and 7268.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8044"/>
          <seriesInfo name="DOI" value="10.17487/RFC8044"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1321">
          <front>
            <title>The MD5 Message-Digest Algorithm</title>
            <author fullname="R. Rivest" initials="R." surname="Rivest"/>
            <date month="April" year="1992"/>
            <abstract>
              <t>This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1321"/>
          <seriesInfo name="DOI" value="10.17487/RFC1321"/>
        </reference>
        <reference anchor="RFC2433">
          <front>
            <title>Microsoft PPP CHAP Extensions</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="S. Cobb" initials="S." surname="Cobb"/>
            <date month="October" year="1998"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP defines an extensible Link Control Protocol and a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2433"/>
          <seriesInfo name="DOI" value="10.17487/RFC2433"/>
        </reference>
        <reference anchor="RFC2759">
          <front>
            <title>Microsoft PPP CHAP Extensions, Version 2</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="January" year="2000"/>
            <abstract>
              <t>This document describes version two of Microsoft's PPP CHAP dialect (MS-CHAP-V2). MS-CHAP-V2 is similar to, but incompatible with, MS-CHAP version one (MS-CHAP-V1). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2759"/>
          <seriesInfo name="DOI" value="10.17487/RFC2759"/>
        </reference>
        <reference anchor="RFC2866">
          <front>
            <title>RADIUS Accounting</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying accounting information between a Network Access Server and a shared Accounting Server. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2866"/>
          <seriesInfo name="DOI" value="10.17487/RFC2866"/>
        </reference>
        <reference anchor="RFC2868">
          <front>
            <title>RADIUS Attributes for Tunnel Protocol Support</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="D. Leifer" initials="D." surname="Leifer"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="J. Shriver" initials="J." surname="Shriver"/>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
            <author fullname="I. Goyret" initials="I." surname="Goyret"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document defines a set of RADIUS (Remote Authentication Dial In User Service) attributes designed to support the provision of compulsory tunneling in dial-up networks. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2868"/>
          <seriesInfo name="DOI" value="10.17487/RFC2868"/>
        </reference>
        <reference anchor="RFC3579">
          <front>
            <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3579"/>
          <seriesInfo name="DOI" value="10.17487/RFC3579"/>
        </reference>
        <reference anchor="RFC5176">
          <front>
            <title>Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="M. Chiba" initials="M." surname="Chiba"/>
            <author fullname="G. Dommety" initials="G." surname="Dommety"/>
            <author fullname="M. Eklund" initials="M." surname="Eklund"/>
            <author fullname="D. Mitton" initials="D." surname="Mitton"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a currently deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products. This includes support for disconnecting users and changing authorizations applicable to a user session. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5176"/>
          <seriesInfo name="DOI" value="10.17487/RFC5176"/>
        </reference>
        <reference anchor="RFC5580">
          <front>
            <title>Carrying Location Objects in RADIUS and Diameter</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
              <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5580"/>
          <seriesInfo name="DOI" value="10.17487/RFC5580"/>
        </reference>
        <reference anchor="RFC6151">
          <front>
            <title>Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="L. Chen" initials="L." surname="Chen"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document updates the security considerations for the MD5 message digest algorithm. It also updates the security considerations for HMAC-MD5. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6151"/>
          <seriesInfo name="DOI" value="10.17487/RFC6151"/>
        </reference>
        <reference anchor="RFC6218">
          <front>
            <title>Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="T. Zhang" initials="T." surname="Zhang"/>
            <author fullname="J. Walker" initials="J." surname="Walker"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines a set of vendor-specific RADIUS Attributes designed to allow both the secure transmission of cryptographic keying material and strong authentication of any RADIUS message. These attributes have been allocated from the Cisco vendor-specific space and have been implemented by multiple vendors. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6218"/>
          <seriesInfo name="DOI" value="10.17487/RFC6218"/>
        </reference>
        <reference anchor="RFC6613">
          <front>
            <title>RADIUS over TCP</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Server (RADIUS) protocol has, until now, required the User Datagram Protocol (UDP) as the underlying transport layer. This document defines RADIUS over the Transmission Control Protocol (RADIUS/TCP), in order to address handling issues related to RADIUS over Transport Layer Security (RADIUS/TLS). It permits TCP to be used as a transport protocol for RADIUS only when a transport layer such as TLS or IPsec provides confidentiality and security. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6613"/>
          <seriesInfo name="DOI" value="10.17487/RFC6613"/>
        </reference>
        <reference anchor="RFC6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7360">
          <front>
            <title>Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>The RADIUS protocol defined in RFC 2865 has limited support for authentication and encryption of RADIUS packets. The protocol transports data in the clear, although some parts of the packets can have obfuscated content. Packets may be replayed verbatim by an attacker, and client-server authentication is based on fixed shared secrets. This document specifies how the Datagram Transport Layer Security (DTLS) protocol may be used as a fix for these problems. It also describes how implementations of this proposal can coexist with current RADIUS systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7360"/>
          <seriesInfo name="DOI" value="10.17487/RFC7360"/>
        </reference>
        <reference anchor="I-D.ietf-radext-tls-psk">
          <front>
            <title>Operational Considerations for RADIUS and TLS-PSK</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>InkBridge Networks</organization>
            </author>
            <date day="21" month="January" year="2025"/>
            <abstract>
              <t>   This document provides implementation and operational considerations
   for using TLS-PSK with RADIUS/TLS (RFC6614) and RADIUS/DTLS
   (RFC7360).  The purpose of the document is to help smooth the
   operational transition from the use of the RADIUS/UDP to RADIUS/TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-tls-psk-12"/>
        </reference>
        <reference anchor="I-D.tomas-openroaming">
          <front>
            <title>WBA OpenRoaming Wireless Federation</title>
            <author fullname="Bruno Tomas" initials="B." surname="Tomas">
              <organization>Wireless Broadband Alliance, Inc.</organization>
            </author>
            <author fullname="Mark Grayson" initials="M." surname="Grayson">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Necati Canpolat" initials="N." surname="Canpolat">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Betty A. Cockrell" initials="B. A." surname="Cockrell">
              <organization>SingleDigits</organization>
            </author>
            <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
              <organization>Cisco Systems</organization>
            </author>
            <date day="15" month="April" year="2025"/>
            <abstract>
              <t>   This document describes the Wireless Broadband Alliance's OpenRoaming
   system.  The OpenRoaming architectures enables a seamless onboarding
   experience for devices connecting to access networks that are part of
   the federation of access networks and identity providers.  The
   primary objective of this document is to describe the protocols that
   form the foundation for this architecture, enabling providers to
   correctly configure their equipment to support interoperable
   OpenRoaming signalling exchanges.  In addition, the topic of
   OpenRoaming has been raised in different IETF working groups, and
   therefore a secondary objective is to assist those discussions by
   describing the federation organization and framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tomas-openroaming-05"/>
        </reference>
        <reference anchor="I-D.josefsson-pppext-eap-tls-eap">
          <front>
            <title>Protected EAP Protocol (PEAP) Version 2</title>
            <author fullname="Ashwin Palekar" initials="A." surname="Palekar">
              <organization>Microsoft Corporation</organization>
            </author>
            <author fullname="Simon Josefsson" initials="S." surname="Josefsson">
              <organization>Extundo</organization>
            </author>
            <author fullname="Daniel Simon" initials="D." surname="Simon">
              <organization>Microsoft Corporation</organization>
            </author>
            <author fullname="Glen Zorn" initials="G." surname="Zorn">
              <organization>Cisco Systems</organization>
            </author>
            <date day="21" month="October" year="2004"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP) provides support for
   multiple authentication methods. This document defines the Protected
   Extensible Authentication Protocol (PEAP) Version 2, which provides
   an encrypted and authenticated tunnel based on transport layer
   security (TLS) that encapsulates EAP authentication mechanisms.
   PEAPv2 uses TLS to protect against rogue authenticators, protect
   against various attacks on the confidentiality and integrity of the
   inner EAP method exchange and provide EAP peer identity privacy.
   PEAPv2 also provides support for chaining multiple EAP mechanisms,
   cryptographic binding between authentications performed by inner EAP
   mechanisms and the tunnel, exchange of arbitrary parameters (TLVs),
   and fragmentation and reassembly.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-josefsson-pppext-eap-tls-eap-10"/>
        </reference>
        <reference anchor="BLAST" target="https://www.blastradius.fail/pdf/radius.pdf">
          <front>
            <title>RADIUS/UDP Considered Harmful</title>
            <author initials="" surname="Goldberg, S , et al" fullname="Golberg, Sharon, et. al">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DATTACK" target="https://www.ietf.org/ietf-ftp/ietf-mail-archive/radius/1998-11.mail">
          <front>
            <title>CHAP and Shared Secret</title>
            <author initials="A." surname="DeKok" fullname="Alan DeKok">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MD5-1996" target="https://www.ietf.org/ietf-ftp/ietf-mail-archive/radius/1998-02">
          <front>
            <title>MD5 Key recovery attack</title>
            <author initials="I. R. W." surname="group" fullname="IETF RADIUS Working group">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MAY-1995" target="http://ftp.cerias.purdue.edu/pub/doc/network/radius/archive/ietf-radius.9506">
          <front>
            <title>Proxy-State radius extension to support stateless proxies</title>
            <author initials="M." surname="O'Dell" fullname="Mike O'Dell">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EDUROAM" target="https://eduroam.org">
          <front>
            <title>eduroam</title>
            <author initials="" surname="eduroam" fullname="eduroam">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EXPLOIT" target="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-158a">
          <front>
            <title>People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices</title>
            <author initials="A. C. D." surname="Agency" fullname="America's Cyber Defense Agency">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FILTER" target="https://community.jisc.ac.uk/library/janet-services-documentation/filtering-invalid-realms">
          <front>
            <title>Filtering of Invalid Realms</title>
            <author initials="J. I. S." surname="Committee" fullname="Joint Information Systems Committee">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BRIGGS" target="https://www.fcc.gov/ecfs/document/10427582404839/1">
          <front>
            <title>Comments on the FCC’s Public Notice DA 24-308 on SS7 and Diameter Vulnerabilities</title>
            <author initials="K." surname="Briggs" fullname="Kevin Briggs">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="HASHCLASH" target="https://github.com/cr-marcstevens/hashclash">
          <front>
            <title>Project HashClash - MD5 &amp; SHA-1 cryptanalytic toolbox</title>
            <author initials="M." surname="Stevens" fullname="Marc Stevens">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OPENROAMING" target="https://wballiance.com/openroaming/">
          <front>
            <title>OpenRoaming: One global Wi-Fi network</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WIFILOC" target="https://www.wi-fi.org/discover-wi-fi/wi-fi-location">
          <front>
            <title>Accurate indoor location with Wi-Fi connectivity</title>
            <author initials="W.-F." surname="Alliance" fullname="Wi-Fi Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPOOFING" target="https://networkradius.com/articles/2021/08/04/wifi-spoofing.html">
          <front>
            <title>Wi-Fi Spoofing for Fun and Profit</title>
            <author initials="A." surname="Cudbard-Bell" fullname="Arran Cudbard-Bell">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ASLEAP" target="https://github.com/joswr1ght/asleap">
          <front>
            <title>asleap - recovers weak LEAP and PPTP passwords</title>
            <author initials="J." surname="Wright" fullname="Joshua Wright">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WBA" target="https://wballiance.com/radius-accounting-assurance/">
          <front>
            <title>RADIUS Accounting Assurance</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RADEXT118" target="https://youtu.be/wwmYSItcQt0?t=3953">
          <front>
            <title>RADIUS Accounting Assurance at IETF 118</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PWNED" target="https://haveibeenpwned.com/">
          <front>
            <title>Have I been Pwned</title>
            <author initials="T." surname="Hunt" fullname="Troy Hunt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ISSUES" target="https://github.com/radext-wg/issues-and-fixes-2/wiki">
          <front>
            <title>Issues and Fixes 2</title>
            <author initials="" surname="RADEXT" fullname="IETF RADEXT Working Group">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC5080">
          <front>
            <title>Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes</title>
            <author fullname="D. Nelson" initials="D." surname="Nelson"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>This document describes common issues seen in Remote Authentication Dial In User Service (RADIUS) implementations and suggests some fixes. Where applicable, ambiguities and errors in previous RADIUS specifications are clarified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5080"/>
          <seriesInfo name="DOI" value="10.17487/RFC5080"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="RFC7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC6280">
          <front>
            <title>An Architecture for Location and Location Privacy in Internet Applications</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>Location-based services (such as navigation applications, emergency services, and management of equipment in the field) need geographic location information about Internet hosts, their users, and other related entities. These applications need to securely gather and transfer location information for location services, and at the same time protect the privacy of the individuals involved. This document describes an architecture for privacy-preserving location-based services in the Internet, focusing on authorization, security, and privacy requirements for the data formats and protocols used by these services. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="160"/>
          <seriesInfo name="RFC" value="6280"/>
          <seriesInfo name="DOI" value="10.17487/RFC6280"/>
        </reference>
        <reference anchor="RFC6733">
          <front>
            <title>Diameter Base Protocol</title>
            <author fullname="V. Fajardo" initials="V." role="editor" surname="Fajardo"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <author fullname="G. Zorn" initials="G." role="editor" surname="Zorn"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The Diameter base protocol is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations. This document specifies the message format, transport, error reporting, accounting, and security services used by all Diameter applications. The Diameter base protocol as defined in this document obsoletes RFC 3588 and RFC 5719, and it must be supported by all new Diameter implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6733"/>
          <seriesInfo name="DOI" value="10.17487/RFC6733"/>
        </reference>
        <reference anchor="RFC7930">
          <front>
            <title>Larger Packets for RADIUS over TCP</title>
            <author fullname="S. Hartman" initials="S." surname="Hartman"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The RADIUS-over-TLS experiment described in RFC 6614 has opened RADIUS to new use cases where the 4096-octet maximum size limit of a RADIUS packet proves problematic. This specification extends the RADIUS-over-TCP experiment (RFC 6613) to permit larger RADIUS packets. This specification compliments other ongoing work to permit fragmentation of RADIUS authorization information. This document registers a new RADIUS code, an action that required IESG approval.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7930"/>
          <seriesInfo name="DOI" value="10.17487/RFC7930"/>
        </reference>
        <reference anchor="RFC2869">
          <front>
            <title>RADIUS Extensions</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="W. Willats" initials="W." surname="Willats"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes additional attributes for carrying authentication, authorization and accounting information between a Network Access Server (NAS) and a shared Accounting Server using the Remote Authentication Dial In User Service (RADIUS) protocol described in RFC 2865 and RFC 2866. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2869"/>
          <seriesInfo name="DOI" value="10.17487/RFC2869"/>
        </reference>
        <reference anchor="RFC5997">
          <front>
            <title>Use of Status-Server Packets in the Remote Authentication Dial In User Service (RADIUS) Protocol</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document describes a deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, enabling clients to query the status of a RADIUS server. This extension utilizes the Status-Server (12) Code, which was reserved for experimental use in RFC 2865. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5997"/>
          <seriesInfo name="DOI" value="10.17487/RFC5997"/>
        </reference>
        <reference anchor="RFC8907">
          <front>
            <title>The Terminal Access Controller Access-Control System Plus (TACACS+) Protocol</title>
            <author fullname="T. Dahm" initials="T." surname="Dahm"/>
            <author fullname="A. Ota" initials="A." surname="Ota"/>
            <author fullname="D.C. Medway Gash" initials="D.C." surname="Medway Gash"/>
            <author fullname="D. Carrel" initials="D." surname="Carrel"/>
            <author fullname="L. Grant" initials="L." surname="Grant"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document describes the Terminal Access Controller Access-Control System Plus (TACACS+) protocol, which is widely deployed today to provide Device Administration for routers, network access servers, and other networked computing devices via one or more centralized servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8907"/>
          <seriesInfo name="DOI" value="10.17487/RFC8907"/>
        </reference>
        <reference anchor="RFC4120">
          <front>
            <title>The Kerberos Network Authentication Service (V5)</title>
            <author fullname="C. Neuman" initials="C." surname="Neuman"/>
            <author fullname="T. Yu" initials="T." surname="Yu"/>
            <author fullname="S. Hartman" initials="S." surname="Hartman"/>
            <author fullname="K. Raeburn" initials="K." surname="Raeburn"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document provides an overview and specification of Version 5 of the Kerberos protocol, and it obsoletes RFC 1510 to clarify aspects of the protocol and its intended use that require more detailed or clearer explanation than was provided in RFC 1510. This document is intended to provide a detailed description of the protocol, suitable for implementation, together with descriptions of the appropriate use of protocol messages and fields within those messages. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4120"/>
          <seriesInfo name="DOI" value="10.17487/RFC4120"/>
        </reference>
        <reference anchor="RFC3539">
          <front>
            <title>Authentication, Authorization and Accounting (AAA) Transport Profile</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Wood" initials="J." surname="Wood"/>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document discusses transport issues that arise within protocols for Authentication, Authorization and Accounting (AAA). It also provides recommendations on the use of transport by AAA protocols. This includes usage of standards-track RFCs as well as experimental proposals. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3539"/>
          <seriesInfo name="DOI" value="10.17487/RFC3539"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9257">
          <front>
            <title>Guidance for External Pre-Shared Key (PSK) Usage in TLS</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="J. Hoyland" initials="J." surname="Hoyland"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document provides usage guidance for external Pre-Shared Keys (PSKs) in Transport Layer Security (TLS) 1.3 as defined in RFC 8446. It lists TLS security properties provided by PSKs under certain assumptions, then it demonstrates how violations of these assumptions lead to attacks. Advice for applications to help meet these assumptions is provided. This document also discusses PSK use cases and provisioning processes. Finally, it lists the privacy and security properties that are not provided by TLS 1.3 when external PSKs are used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9257"/>
          <seriesInfo name="DOI" value="10.17487/RFC9257"/>
        </reference>
        <reference anchor="RFC7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="RFC4372">
          <front>
            <title>Chargeable User Identity</title>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity. This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4372"/>
          <seriesInfo name="DOI" value="10.17487/RFC4372"/>
        </reference>
        <reference anchor="RFC8559">
          <front>
            <title>Dynamic Authorization Proxying in the Remote Authentication Dial-In User Service (RADIUS) Protocol</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>RFC 5176 defines Change-of-Authorization (CoA) and Disconnect Message (DM) behavior for RADIUS. RFC 5176 also suggests that proxying these messages is possible, but it does not provide guidance as to how that is done. This specification updates RFC 5176 to correct that omission for scenarios where networks use realm-based proxying as defined in RFC 7542. This specification also updates RFC 5580 to allow the Operator-Name attribute in CoA-Request and Disconnect-Request packets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8559"/>
          <seriesInfo name="DOI" value="10.17487/RFC8559"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC5931">
          <front>
            <title>Extensible Authentication Protocol (EAP) Authentication Using Only a Password</title>
            <author fullname="D. Harkins" initials="D." surname="Harkins"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5931"/>
          <seriesInfo name="DOI" value="10.17487/RFC5931"/>
        </reference>
        <reference anchor="RFC2194">
          <front>
            <title>Review of Roaming Implementations</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Lu" initials="J." surname="Lu"/>
            <author fullname="J. Alsop" initials="J." surname="Alsop"/>
            <author fullname="J. Ding" initials="J." surname="Ding"/>
            <author fullname="W. Wang" initials="W." surname="Wang"/>
            <date month="September" year="1997"/>
            <abstract>
              <t>This document reviews the design and functionality of existing roaming implementations. Examples of cases where roaming capability might be required include ISP "confederations" and ISP-provided corporate network access support. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2194"/>
          <seriesInfo name="DOI" value="10.17487/RFC2194"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC5281">
          <front>
            <title>Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)</title>
            <author fullname="P. Funk" initials="P." surname="Funk"/>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>EAP-TTLS is an EAP (Extensible Authentication Protocol) method that encapsulates a TLS (Transport Layer Security) session, consisting of a handshake phase and a data phase. During the handshake phase, the server is authenticated to the client (or client and server are mutually authenticated) using standard TLS procedures, and keying material is generated in order to create a cryptographically secure tunnel for information exchange in the subsequent data phase. During the data phase, the client is authenticated to the server (or client and server are mutually authenticated) using an arbitrary authentication mechanism encapsulated within the secure tunnel. The encapsulated authentication mechanism may itself be EAP, or it may be another authentication protocol such as PAP, CHAP, MS-CHAP, or MS-CHAP-V2. Thus, EAP-TTLS allows legacy password-based authentication protocols to be used against existing authentication databases, while protecting the security of these legacy protocols against eavesdropping, man-in-the-middle, and other attacks. The data phase may also be used for additional, arbitrary data exchange. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5281"/>
          <seriesInfo name="DOI" value="10.17487/RFC5281"/>
        </reference>
        <reference anchor="RFC2975">
          <front>
            <title>Introduction to Accounting Management</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <date month="October" year="2000"/>
            <abstract>
              <t>This document describes and discusses the issues involved in the design of the modern accounting systems. The field of Accounting Management is concerned with the collection the collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2975"/>
          <seriesInfo name="DOI" value="10.17487/RFC2975"/>
        </reference>
        <reference anchor="RFC6929">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS) Protocol Extensions</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Service (RADIUS) protocol is nearing exhaustion of its current 8-bit Attribute Type space. In addition, experience shows a growing need for complex grouping, along with attributes that can carry more than 253 octets of data. This document defines changes to RADIUS that address all of the above problems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6929"/>
          <seriesInfo name="DOI" value="10.17487/RFC6929"/>
        </reference>
        <reference anchor="RFC8018">
          <front>
            <title>PKCS #5: Password-Based Cryptography Specification Version 2.1</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions, encryption schemes, message authentication schemes, and ASN.1 syntax identifying the techniques.</t>
              <t>This document represents a republication of PKCS #5 v2.1 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 2898.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8018"/>
          <seriesInfo name="DOI" value="10.17487/RFC8018"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
