<?xml version="1.0" encoding="UTF-8"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
    which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs),
    please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that
    most I-Ds might want to use.
    (Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space
    (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="std" docName="draft-yl-radext-quic-transport-03"
ipr="trust200902" consensus="true">
  <!-- category values: std, bcp, info, exp, and historic
    ipr values: full3667, noModification3667, noDerivatives3667
    you can add the attributes updates="NNNN" and obsoletes="NNNN"
    they will automatically be output with "(if approved)" -->

  <!-- ***** FRONT MATTER ***** -->

  <front>

    <title abbrev="RADIUS over QUIC">RADIUS over QUIC</title>

    <!-- add 'role="editor"' below for the editors if appropriate -->

    <!-- Another author who claims to be an editor -->

    <author fullname="Shengnan Yue" initials="S."
            surname="Yue">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <!-- Reorder these if your country does things differently -->

          <city>Beijing</city>

          <country>China</country>
        </postal>

        <email>yueshengnan@chinamobile.com</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>
    <author fullname="Changwang Lin" initials="C."
            surname="Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <!-- Reorder these if your country does things differently -->

          <city>Beijing</city>

          <country>China</country>
        </postal>

        <email>linchangwang.04414@h3c.com</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>
    <author fullname="Feng Yang" initials="F."
            surname="Yang">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <!-- Reorder these if your country does things differently -->

          <city>Beijing</city>

          <country>China</country>
        </postal>

        <email>yangfeng@chinamobile.com</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>

    <date year="2025" />

    <!-- Meta-data Declarations -->

    <area>General</area>

    <workgroup>RADEXT</workgroup>

    <keyword>RADEXT</keyword>
    <keyword>RADIUS</keyword>
    <keyword>QUIC</keyword>

<abstract>
<t>
	The Remote Authentication Dial-In User Server (RADIUS) Protocol can use the User Datagram Protocol (UDP) and
  the Transport Control Protocol (TCP) as its underlying transport layer. But it permits TCP to be used
  as a transport protocol for RADIUS only when a transport layer such as TLS or IPsec provides confidentiality and security.
  QUIC inherently supports encryption (using TLS 1.3), which could provide a higher level of security.
  And QUIC supports multiple streams over a single connection, enhancing throughput and efficiency.
  This document defines RADIUS over the QUIC transport protocol, named RADIUSoQUIC.
</t>

</abstract>

  </front>

  <middle>

<section anchor="Introduction" title="Introduction">
<t>
	RADIUS (Remote Authentication Dial-In User Service) is a networking protocol
  that provides centralized authentication, authorization, and accounting for users
  who connect and use a network service. It is typically used in environments
  such as Internet service providers (ISPs), corporate networks, and other places
  where secure access management is required.
</t>
<t>
   The RADIUS protocol was originally defined in <xref target="RFC2865"/> as
   using the User Datagram Protocol (UDP) for the underlying transport layer.
   Since UDP has some limitations (such as unreliable transport, packet fragmentation,
   connectionless transport, and lack of congestion control),
   the TCP transport is recommended to be used <xref target="RFC6613"/>
   when another method such as IPsec <xref target="RFC4301"/> or
   RADIUS/TLS <xref target="RFC6614"/> is used to provide additional confidentiality
   and security of RADIUS in inter-server communications scenarios,
   such as inter-domain communication between proxies.
</t>
<t>
   QUIC is developed based on the UDP protocol and aims to address certain limitations of TCP.
   Compared with the traditional TCP/UDP protocol used by RADIUS,
   QUIC provides the following enhancements:
</t>
<t>
  <list style="symbols">
  <t>
		Improved Security. QUIC inherently supports encryption (using TLS 1.3),
    which could provide a higher level of security for RADIUS communications compared
    to the standard RADIUS protocol that relies heavily on IPsec or TLS over TCP for encryption.
    This can also greatly simplify security-related configurations.
	</t>
  <t>
		Enhanced Performance. QUIC reduces connection establishment time
    with its zero-round-trip setup for repeat connections,
    potentially speeding up the authentication process significantly.
	</t>
  <t>
		Reliability and Robustness. QUIC's congestion control, loss recovery,
    and reduced latency features could make RADIUS communications more reliable,
    especially over less-stable network connections.
	</t>
  <t>
		Connection Migration. The ability of QUIC to handle connection migrations seamlessly
    could enhance RADIUS network mobility between client (running on Network Access Server) and server,
    allowing client to change networks without disrupting authentication sessions.
	</t>
  <t>
		Multiplexing. QUIC's support for multiple streams over a single connection
    could enable multiple RADIUS transactions to be processed simultaneously,
    enhancing throughput and efficiency. This can alleviate the congestion problem of large-scale
    authentication messages and provide users with faster authentication services and
    higher authentication success rate via fewer connections.
    Independent streams can also prevent Head-of-Line (HoL) blocking between different RADIUS transaction messages.
	</t>
  </list>
</t>
<t>
   Therefore, for inter-server communication scenarios that require secure connections
   and reliable data transmission, QUIC is a competitive transport
   protocol for the message transmission mechanism of RADIUS Protocol.
   This document specifies how to use QUIC as the transport protocol for RADIUS Protocol,
   named RADIUSoQUIC.
</t>
</section>

<section anchor="Terminology-definitions" title="Terminology and Definitions">
<t>
  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
  NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
  "MAY", and "OPTIONAL" in this document are to be interpreted as
  described in BCP 14 <xref target="RFC2119"/> <xref
  target="RFC8174"/> when, and only when, they appear in all
  capitals, as shown here.
</t>
<t>
  In this document, the terms "client" and "server" are used to refer to
  the two ends of the QUIC connection. The client actively initiates the QUIC connection.
  The terms "RADIUS client" and "RADIUS server" are used to refer to the two ends of
  the RADIUS Protocol session. Generally, an "RADIUS client" provides an access service
  for a user to a network, meanwhile a "RADIUS server" provides one or more of
  authentication, authorization, and/or accounting (AAA) services to
  a Network Access Server (NAS). In addition, A RADIUS Proxy acts as a RADIUS server to
  the NAS, and a RADIUS client to the RADIUS server.
</t>
<t>
  <list style="symbols">
  <t>
		Client: The endpoint that initiates a QUIC connection, the RADIUS client or RADIUS proxy.
	</t>
  <t>
		Server: The endpoint that accepts a QUIC connection, the RADIUS server or RADIUS proxy.
	</t>
  </list>
</t>
</section>

<section anchor="Connection-management" title="Connection Management">

  <section anchor="Connection-establishment" title="Connection Establishment">
  <t>
    QUIC connection establishment is described in <xref target="RFC9000"/>.
    During establishing connection, RADIUSoQUIC support is indicated by
    selecting the Application-Layer Protocol Negotiation (ALPN) <xref target="RFC7301"/>
    token as listed in the IANA Section 7 in the TLS handshake.
  </t>
  <t>
    The RADIUS Client or Proxy as client should be the initiator of the QUIC connection
    to the RADIUS Server meanwhile the RADIUS Server or
    Proxy as server acts as a connection acceptor.
  </t>
  </section>

  <section anchor="Connection-termination" title="Connection Termination">

    <section anchor="QUIC-termination-process" title="QUIC Connection Termination Process">
      <t>
        The typical QUIC connection termination process is described in <xref target="RFC9000"/>.
      </t>
    </section>

    <section anchor="RADIUSoQUIC-termination-considerations" title="RADIUSoQUIC Considerations for Connection Termination">
      <t>
        When an RADIUS session is implemented based on a QUIC connection,
        the idle timeout should be disabled or the QUIC max_idle_timeout
        should be set appropriately in order to keep the QUIC connection
        persistent even if the RADIUS session is idle.
      </t>
      <t>
        If the QUIC connection is broken or closed, retransmissions over new connections
        are permissible. RADIUS request packets that have not yet received
        a response MAY be transmitted by a RADIUS client over a new QUIC connection.
        Since this procedure involves using a new source port,
        the ID of the packet MAY change. If the ID changes, any security attributes
        such as Message-Authenticator MUST be recalculated.
      </t>
      <t>
        If a QUIC connection is broken or closed, any cached RADIUS response packets
        (<xref target="RFC5080"/>, Section 2.2.2) associated with that connection MUST be discarded.
        A RADIUS server SHOULD stop the processing of any requests associated
        with that QUIC connection. No response to these requests can be sent over
        the QUIC connection, so any further processing is pointless.
        This requirement applies not only to RADIUS servers, but also to proxies.
        When a client's connection to a proxy server is closed, there may be responses
        from a home server that were supposed to be sent by the proxy back
        over that connection to the client. Since the client connection is closed,
        those responses from the home server to the proxy server
        SHOULD be silently discarded by the proxy.
      </t>
      <t>
       RADIUS clients using QUIC MUST mark a connection DOWN
       if the network stack indicates that the connection is no longer active.
       If the network stack indicates that the connection is still active, clients MUST NOT decide that it is down
       until the application-layer watchdog algorithm has marked it DOWN (<xref target="RFC3539"/>, Appendix A).
       RADIUS clients using QUIC MUST NOT decide that
       a RADIUS server is unresponsive until all QUIC connections to it have been marked DOWN.
      </t>
      <t>
      A client should proactively close connections or mark a server as DOWN due to an administrative decision.
      </t>
    </section>

  </section>

</section>

<section anchor="Stream-mapping-usage" title="Stream Mapping and Usage">
  <t>
    QUIC <xref target="RFC9000"/> uses multiple simultaneous streams to
    carry data in one direction. QUIC Streams provide a lightweight,
    ordered byte-stream abstraction to an application. Streams can be
    unidirectional or bidirectional meanwhile streams can be initiated
    by either the client or the server. Unidirectional streams carry data
    in one direction: from the initiator of the stream to its peer.
    Bidirectional streams allow for data to be sent in both directions.
  </t>
  <t>
    QUIC uses Stream ID to identify the stream. The least significant bit (0x1) of
    the stream ID identifies the initiator of the stream
    (client with the bit set to 0). The second least significant bit (0x2) of
    the stream ID distinguishes between bidirectional streams
    (with the bit set to 0) and unidirectional streams <xref target="RFC9000"/>.
  </t>
  <t>
    RADIUS packets include request packets and response packets. RADIUS request packet
    is a packet originated by a RADIUS client to a
    RADIUS server. For example, Access-Request, Accounting-Request, CoA-Request,
    or Disconnect-Request. RADIUS response packet is a packet
    sent by a RADIUS server to a RADIUS client, in response to a RADIUS request packet.
    For example, Access-Accept, Access-Reject,
    Access-Challenge, Accounting-Response, or CoA-ACK <xref target="RFC6613"/>.
  </t>
  <section anchor="Bidirectional-stream" title="Bidirectional Stream between Client and Server">
    <t>
      If RADIUS request packets are carried via transport protocol
      from RADIUS client to RADIUS server,
      RADIUS response packet are needed to be sent from RADIUS server
      to RADIUS client in response to the RADIUS request packets.
      Therefore, the RADIUS connection should be bidirectional between Client and Server.
    </t>
    <t>
      Based on the above description, The RADIUS request messages are initiated
      by the Client and the replies are needed from the Server.
      So the RADIUS messages MAY be mapped into one bidirectional stream
      whose stream type is 0x0 according to section 2.1 of <xref target="RFC9000"/>.
    </t>
    <t>
      To enhance transmission performance during large-scale processing of authentication,
      accounting, and authorization requests, RADIUS messages can be transmitted
      over multiple configurable bidirectional streams.
    </t>
    <t>
      When using multiple streams, all messages belonging to the same RADIUS transaction must remain
      within a single stream to maintain protocol integrity.
      A RADIUS transaction refers to a complete protocol interaction process,
      including all message exchanges between the client (such as NAS) and the server (such as RADIUS server)
      from the request to the final response. RADIUS transactions can be divided into
      authentication transactions, accounting transactions, and dynamic authorization transactions.
    </t>
    <section anchor="Multi-Stream Use Case" title="Multi-Stream Use Case">
      <t>
        As described above, there are three types of RADIUS transactions;
        therefore, the client can create three QUIC bidirectional streams to
        carry these three RADIUS transactions, as shown in Figure 1. Stream 0 is used for authentication,
        stream 1 for accounting, and stream 2 for authorization transactions.
      </t>
          <t><figure>
      <artwork align="center" name="Figure 1"><![CDATA[
          Client                                   Server
+------------------------+    Stream 0   +-------------------------+
| Authentication Request |<------------->| Authentication Response |
+------------------------+               +-------------------------+
+------------------------+    Stream 1   +-------------------------+
|   Accounting Request   |<------------->|   Accounting Response   |
+------------------------+               +-------------------------+
+------------------------+    Stream 2   +-------------------------+
| Authorization Request  |<------------->| Authorization Response  |
+------------------------+               +-------------------------+

          Figure 1: Multiple Stream Use Case]]></artwork>
      </figure></t>
    </section>
  </section>
</section>

<section anchor="Authentication" title="Endpoint Authentication">
<t>
  RADIUSoQUIC uses QUIC which uses TLS version 1.3 or greater. Therefore,
  the TLS handshake process can be used for RADIUSoQUIC endpoint authentication.
  A third-party authentication mechanism can also be applied for RADIUSoQUIC
  endpoint authentication, such as a TLS client certificate.
</t>
</section>

<section anchor="Operational" title="Operational Considerations">
<section anchor="Parameter" title="Configuration Parameters">
<t>
  The decision to use RADIUSoQUIC instead of the TCP-based/UDP-based mechanism is an operational decision,
  and an implementation MUST provide a configuration mechanism to enable RADIUSoQUIC on the RADIUS session.
</t>
<t>
  A configuration option SHOULD be provided to enable the use of multiple streams,
  and the number of streams also SHOULD be configurable.
</t>
<t>
  As QUIC is a reliable transport, if there is no response
  to a RADIUS packet over one QUIC connection,
  implementations MUST NOT retransmit that packet over
  a different QUIC connection to the same destination IP address and port,
  while the first connection is in the OKAY state (<xref target="RFC3539"/>, Appendix A).
</t>
</section>
<section anchor="Foramt" title="Packet Format">
<t>
  RADIUSoQUIC MUST strictly preserve all specifications of <xref target="RFC2865"/>,
  <xref target="RFC2866"/>, and <xref target="RFC5176"/>,
  including packet format, attribute encoding, and security computations
  (authenticators, dynamic or encrypted attributes).
</t>
<t>
  The use of QUIC transport does not change the calculation of
  security-related fields (such as the Response-Authenticator)
  in RADIUS <xref target="RFC2865"/> or RADIUS Dynamic Authorization
  <xref target="RFC5176"/>. Calculation of attributes such as User-Password <xref target="RFC2865"/> or
  Message-Authenticator <xref target="RFC3579"/> also does not change.
  In addition, Clients and servers MUST be able to store and manage secrets based on the key described
  at the section 5 of <xref target="RFC9001"/>.
</t>
<t>
   The changes required to implement this specification primarily affect the RADIUS components
   responsible for sending and receiving network packets.
</t>
</section>
<section anchor="Port" title="QUIC Port">
<t>
  The default destination port for RADIUSoQUIC is UDP/TBD (assigned by IANA),
  which handles authentication, accounting, and dynamic authorization
  without port differentiation. Source ports may be arbitrarily chosen.
</t>
<t>
  RADIUS over UDP or TCP <xref target="RFC2865"/> <xref target="RFC6613"/>
  uses distinct ports for authentication, accounting, and dynamic authorization.
  In contrast, RADIUSoQUIC utilizes a single port for all packet types.
  However, RADIUSoQUIC maintains the fundamental client-server model where:
  <list style="symbols">
  <t>
    Clients send authentication requests and process replies for user sessions.
  </t>
  <t>
    Servers receive requests, process them, and return responses.
  </t>
  </list>
</t>
<t>
  The normative rules defining acceptable packet types for clients and servers 
  maintain identical packet flow behavior to RADIUS over UDP or TCP.
</t>
</section>
<section anchor="MIB" title="Management Information Base (MIB)">
<t>
  The MIB modules defined in <xref target="RFC4668"/>, <xref target="RFC4669"/>,
  <xref target="RFC4670"/>, <xref target="RFC4671"/>, <xref target="RFC4672"/>,
  and <xref target="RFC4673"/> were specifically designed for RADIUS over UDP transport
  and therefore do not support either RADIUS over TCP <xref target="RFC6613"/> or RADIUSoQUIC implementations.
  These existing MIB modules should not be reused for RADIUSoQUIC connection statistics monitoring,
  as they lack the necessary constructs to properly track QUIC-specific features
  such as connection migration, cryptographic handshakes, and stream multiplexing.
  Future updates to the MIB specifications will be required to adequately support these newer transport protocols.
</t>
</section>
<section anchor="Detect-Live-Servers" title="Detecting Live Servers">
<t>
  In RADIUS' hop-by-hop architecture, proxies inherently isolate clients from downstream server information,
  preventing direct awareness of backend server states. While clients can assess their immediate
  proxy's operational status, they lack visibility into subsequent hops since proxies primarily function
  as transparent forwarders between NAS and RADIUS servers without generating independent responses (per <xref target="RFC2865"/>).
  This opacity creates ambiguity when requests go unanswered, as failures could stem from multiple points:
  packet loss in either the NAS-proxy or proxy-server segments, proxy malfunctions, or actual server outages,
  with no built-in mechanism to distinguish between these scenarios.
</t>
<t>
  RADIUS clients using RADIUSoQUIC must consider a connection DOWN when either:
  (1)All active QUIC Connection IDs enter DRAINING state, or
  (2)The connection receives a valid CONNECTION_CLOSE frame.
  However, if any Connection ID remains ACTIVE, clients should continue treating the connection as operational until:
  (1)Path validation fails for all available Connection IDs, and
  (2)The application-layer watchdog timer expires (as specified in <xref target="RFC3539"/> Appendix A).
  A RADIUS server should only be declared unresponsive when:
  (1)All existing QUIC connections have terminated, and
  (2)No new connections can be established using remaining Connection IDs.
</t>
<t>
  The RADIUSoQUIC do not forbid the practice of a client proactively closing connections
  or marking a server as DOWN due to an administrative decision.
</t>
</section>
<section anchor="Error Handling" title="Malformed Packets and Unknown Clients">
<t>
  For RADIUSoQUIC implementations, due to QUIC's stream-based reliable delivery,
  when encountering any condition that would require closing a TCP connection under Section 2.6.4 of <xref target="RFC6613"/>,
  implementations MUST terminate the affected QUIC stream immediately. Additionally,
  implementations MAY choose to terminate the entire QUIC connection based on local policy.
</t>
<t>
  For two exceptional cases permitting silent discarding for TCP under Section 2.6.4 of <xref target="RFC6613"/>,
  RADIUSoQUIC performs the same operation.
</t>
<t>
  Implementations MAY either close only the offending stream while maintaining the QUIC connection,
  or terminate the entire QUIC connection.
  In all cases, the invalid packet MUST be discarded without processing.
  This approach maintains security while leveraging QUIC's ability to isolate stream failures
  - a compromised stream won't necessarily disrupt other concurrent RADIUS transactions.
</t>
</section>
<section anchor="ID Limitations" title="Limitations of the ID Field">
<t>
  For RADIUSoQUIC, the one-octet RADIUS ID field similarly limits each QUIC connection to 256 simultaneous
  in-flight RADIUS transactions. However, QUIC's stream multiplexing allows multiple independent transactions
  to coexist efficiently on a single connection without head-of-line blocking.
</t>
<t>
  To scale beyond 256 concurrent RADIUS transactions, implementations should establish additional
  QUIC connections as needed. This approach benefits from QUIC's efficient connection establishment,
  particularly its 0-RTT resumption capability, which minimizes latency overhead when creating new connections.
  While the ID space limitation remains per connection (as described in Section 2.4 of <xref target="RFC3539"/>),
  QUIC's reduced connection overhead makes the multi-connection strategy more practical compared to TCP.
</t>
</section>
<section anchor="EAP Sessions" title="EAP Sessions">
<t>
  For RADIUSoQUIC implementations handling Extensible Authentication Protocol (EAP) sessions <xref target="RFC3579"/>,
  clients SHOULD use the same QUIC stream for all packets within a single EAP session to ensure in-order delivery
  through QUIC's stream sequencing while maintaining fault isolation and efficient multiplexing.
  Regarding retransmissions: EAP-level retransmissions
  MUST NOT cause RADIUS packet retransmissions on the same QUIC stream, though alternative streams or connections
  may be used if the original becomes unavailable; importantly, QUIC's native loss recovery handles all necessary
  transport-layer retransmissions automatically.
</t>
</section>
</section>

<section anchor="IANA" title="IANA Considerations">
<t>
    This document creates a new registration for the identification of RADIUSoQUIC
    in the "Application Layer Protocol Negotiation (ALPN) Protocol IDs" registry
    established in <xref target="RFC7301"/>.
</t>
<t>
	The "RADIUSoQ" string identifies RADIUSoQUIC:
</t>
<list style="symbols">
  <t>
		Protocol: RADIUSoQUIC
	</t>
  <t>
		Identification Sequence: 0x52 0x41 0x44 0x49 0x55 0x53 0x6f 0x51 ("RADIUSoQ")
	</t>
  <t>
		Specification: This document
	</t>
</list>
<t>
	In addition, it is requested for IANA to reserve a UDP port TBD for 'RADIUS over QUIC'.
</t>
</section>

<section anchor="Security" title="Security Considerations">
<t>
  This document replaces the transport protocol layer of RADIUS
  from other transport protocols to QUIC.
  The basic protocol specification of RADIUS is not modified,
  and therefore the new security risks are not
  introduced to the basic RADIUS protocol. RADIUSoQUIC enhances
  transport-layer security for RADIUS session according to <xref target="RFC9000"/>.
</t>
<t>
  This document does not require to support third-party authentication (e.g., backend Authentication)
  due to the fact that TLS does not specify this way of authentication. If third-party authentication is needed,
  TLS client certificates are recommended to be used here.
</t>
</section>

<!-- <section anchor="Acknowledgements" title="Acknowledgements">
<t>
	The author would like to thank Jeff Haas for his valuable input.
</t>
</section> -->

  </middle>

  <!--  *****BACK MATTER ***** -->

  <back>
  <references title="References" xmlns:xi="http://www.w3.org/2001/XInclude">
    <references title="Normative References">
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2865.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.3539.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.9000.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.9001.xml"/>
    </references>
    <references title="Informative References">
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2866.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.3579.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4301.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4668.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4669.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4670.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4671.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4672.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4673.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.5080.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.5176.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.6613.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.6614.xml"/>
        <xi:include href="http://xml.resource.org/public/rfc/bibxml/reference.RFC.7301.xml"/>
    </references>
  </references>
  </back>
</rfc>
