<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-radext-review-radius-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="A Review of RADIUS Security and Privacy">A Review of RADIUS Security and Privacy</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-radext-review-radius-00"/>
    <author initials="A." surname="DeKok" fullname="Alan DeKok">
      <organization>InkBridge Networks</organization>
      <address>
        <email>alan.dekok@inkbridge.io</email>
      </address>
    </author>
    <date year="2026" month="April" day="28"/>
    <area>Internet</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 153?>

<t>This document provides a comprehensive review of security issues
related to the RADIUS Protocol.  This review motivates the changes to
RADIUS security which are made in
<xref target="I-D.ietf-radext-deprecating-radius"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-radext-review-radius/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        RADEXT Working Group mailing list (<eref target="mailto:radext@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/radext/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/radext/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/freeradius/review-radius.git"/>.</t>
    </note>
  </front>
  <middle>
    <?line 160?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The RADIUS protocol <xref target="RFC2865"/> was first standardized in 1997, though its roots go back much earlier to 1993.  The protocol uses MD5 <xref target="RFC1321"/> to authenticate some packets, and to obfuscate certain attributes such as User-Password.  As originally designed, Access-Request packets were entirely unauthenticated, and could be trivially spoofed (<xref section="7.1" sectionFormat="comma" target="RFC2869"/> and <xref section="4.3.2" sectionFormat="comma" target="RFC3579"/>).  As much of the protocol data is sent in clear-text, packets can leak information about use names, devices, and locations.</t>
      <t>This document provides a comprehensive review of RADIUS security and privacy.  The discussion here motivates the changes to RADIUS security which are made in <xref target="I-D.ietf-radext-deprecating-radius"/>.  In order to simplify the protocol changes for implementers, this historical review is a separate document from the protocol changes.  While this document contains some operational recommendations, it does not change the RADIUS protocol.</t>
      <section anchor="history-of-radius-security">
        <name>History of RADIUS Security</name>
        <t>The insecurity of MD5 has been known for a long time.  It was first noted in relation to RADIUS in 1996 on the IETF RADIUS working group mailing list <xref target="MD5-1996"/>, which also discussed using an HMAC construct to increase security.  While it was common knowledge at the time, the earliest record of concerns about Access-Request packets spoofing was on the RADIUS working group mailing list <xref target="DATTACK"/> in 1998.  There was substantial further discussions about the lack of integrity checks on the list over the next few years.  The outcome of that process was the definition of Message-Authenticator as an optional HMAC-based attribute in <xref section="5.14" sectionFormat="comma" target="RFC2869"/>.</t>
        <t>Unfortunately, the use of Message-Authenticator was made optional.  This lack of integrity checks for Access-Request packets was deemed acceptable for some situations in <xref section="7.1" sectionFormat="comma" target="RFC2869"/>:</t>
        <ul empty="true">
          <li>
            <t>Access-Request packets with a User-Password establish the identity of
both the user and the NAS sending the Access-Request, because of the
way the shared secret between NAS and RADIUS server is used.</t>
          </li>
        </ul>
        <t>That conclusion now appears to be incorrect.  The text continues with an acknowledgment that:</t>
        <ul empty="true">
          <li>
            <t>Access-Request packets with CHAP-Password or EAP-Message do not have
a User-Password attribute, so the Message-Authenticator attribute
should be used in access-request packets that do not have a User-
Password, in order to establish the identity of the NAS sending the
request.</t>
          </li>
        </ul>
        <t>This text was non-normative due to the lowercase 'should'.  It appears that no implementation followed even this limited suggestion.</t>
        <t>The packet forgery issue was further discussed in 2004 in <xref section="4" sectionFormat="comma" target="RFC3579"/>, and again in 2007 in <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/>.  That document suggested that implementations require the use of Message-Authenticator in order to prevent forgery:</t>
        <ul empty="true">
          <li>
            <t>However, Access-Request packets not containing a Message-
Authenticator attribute ...  may
be trivially forged.  To avoid this issue, server implementations may
be configured to require the presence of a Message-Authenticator
attribute in Access-Request packets.  Requests not containing a
Message-Authenticator attribute MAY then be silently discarded.</t>
          </li>
        </ul>
        <t>It appears that only one RADIUS server implemented even this limited suggestion.  At the time of publication of <xref target="RFC5080"/>, there was no consensus to require the use of Message-Authenticator in all Access-Request packets.  If this recommendation had instead been made mandatory, then the recent BlastRADIUS attack <xref target="BLAST"/> would largely have been prevented.</t>
        <t>The state of MD5 security was again discussed in <xref target="RFC6151"/>, which states in Section 2:</t>
        <ul empty="true">
          <li>
            <t>MD5 is no longer acceptable where collision resistance is required such as digital signatures.</t>
          </li>
        </ul>
        <t>That statement led to RADIUS security being reviewed in <xref section="3" sectionFormat="comma" target="RFC6421"/>.  The outcome of that review was the text in the remainder of <xref target="RFC6421"/>, which created crypto-agility requirements for RADIUS.  The main outcome of those requirements was not any change to RADIUS, but instead the definition of RADIUS/TLS in <xref target="RFC6614"/>, and RADIUS/DTLS in <xref target="RFC7360"/>.  Another outcome was the consensus that adding crypto-agility to RADIUS was likely not a good idea, and that standardizing RADIUS over TLS instead was a significantly better path forward.</t>
        <t>RadSec has now been standardized in <xref target="I-D.ietf-radext-radiusdtls-bis"/>.  That document standardizes TLS and DTLS transporst for RADIUS, which gives implementors and operators a way to secure the RADIUS protocol.</t>
        <t>As for RADIUS/UDP and RADIUS/TCP, they still depend on MD5 for all security.  The insecurity of MD5 was noted in <xref target="RFC6151"/>, which is over a decade old as of the time of publication of this document.  The recommendation to use Message-Authenticator in <xref target="RFC5080"/> is almost two decades old.  The knowledge that Access-Request packets lack integrity checks is almost three decades old.  Over that entire span of time, there has been no mandate to increase the security of Access-Request packets. This document explains why that mandate is now being made in <xref target="I-D.ietf-radext-deprecating-radius"/>.</t>
        <t>It is no longer acceptable for RADIUS to rely on MD5 for security.  It is no longer acceptable to send device or location information in clear text across the wider Internet.  This document therefore explains why insecure uses of RADIUS need to be deprecated. <xref target="I-D.ietf-radext-deprecating-radius"/> mandates the use of secure practices in RADIUS, including the use of (D)TLS via <xref target="I-D.ietf-radext-radiusdtls-bis"/>.</t>
      </section>
      <section anchor="radiusudp-over-the-internet-is-insecure">
        <name>RADIUS/UDP over the Internet is insecure</name>
        <t>Since the insecurity of MD5 has been well known for decades, RADIUS traffic over the Internet was historically secured with IPsec as described in <xref section="4.2" sectionFormat="comma" target="RFC3579"/>:</t>
        <ul empty="true">
          <li>
            <t>To address the security vulnerabilities of RADIUS/EAP,
implementations of this specification SHOULD support IPsec
(RFC2401) along with IKE (RFC2409) for key management.  IPsec ESP
(RFC2406) with non-null transform SHOULD be supported, and IPsec
ESP with a non-null encryption transform and authentication
support SHOULD be used to provide per-packet confidentiality,
authentication, integrity and replay protection.  IKE SHOULD be
used for key management.</t>
          </li>
        </ul>
        <t>The use of IPsec allowed RADIUS to be sent privately, and securely, across the Internet.  However, experience showed that TLS was simpler than IPSec in many ways simpler for implementations and deployments.  While IPsec required operating system support, TLS was an application-space library.  This difference, coupled with the wide-spread adoption of TLS for HTTPS, ensures that it was often easier for applications such as RADIUS to use TLS than IPsec.</t>
        <t>RADIUS/TLS <xref target="RFC6614"/> and RADIUS/DTLS <xref target="RFC7360"/> were then defined in order to meet the crypto-agility requirements of <xref target="RFC6421"/>.  RADIUS/TLS has been in wide-spread use for about a decade, including in eduroam <xref target="EDUROAM"/> <xref target="RFC7593"/>, and more recently in OpenRoaming <xref target="OPENROAMING"/> and <xref target="I-D.tomas-openroaming"/>.  RADIUS/DTLS has seen less use across the public Internet, but it still has multiple implementations.</t>
        <t>However, RADIUS/UDP is still widely used, even though it depends on MD5 and "ad hoc" constructions for security.  The recent BlastRADIUS attack shows just how inadequate this dependency is.  The details of the BlastRADIUS attack are discussed in more detail below, in <xref target="blastradius"/>.</t>
      </section>
      <section anchor="radiusudp-has-security-and-privacy-problems">
        <name>RADIUS/UDP Has Security and Privacy Problems</name>
        <t>Even if we ignore the BlastRADIUS attack, problems with MD5 mean that a hobbyist attacker who can view RADIUS/UDP traffic can brute-force check all possible RADIUS shared secrets of eight characters in not much more than an hour.  A more resourceful attacker (e.g. a nation-state) can check all much longer shared secrets with only modest expenditures.  See <xref target="cracking"/> below for a longer discussion of this topic.</t>
        <t>Determining the shared secret will also result in compromise of all passwords carried in the User-Password attribute.  Even using CHAP-Password offers minimal protection, as the cost of cracking the underlying password is similar to the cost of cracking the shared secret.  MS-CHAP (<xref target="RFC2433"/> and MS-CHAPv2 <xref target="RFC2759"/>) are significantly worse in security than PAP, as they can be completely broken with minimal resources.  Attacks on MS-CHAP are described below in <xref target="ms-chap"/>.</t>
        <t>The use of Message-Authenticator does not change the cost of attacking the shared secret.  The Message-Authenticator attribute is a later addition to RADIUS, and does does not replace the original MD5-based packet signatures.  While that attribute provides stronger protection for packets, it does not change the cost of attacking the shared secret.  Moving to a stronger packet signatures (e.g. <xref target="RFC6218"/>) would still not fully address the issues with RADIUS, as the protocol still has privacy issues unrelated to the the security of the Authenticator field.</t>
        <t>Most attributes in RADIUS are sent in clear-text, with only a few attributes such as User-Password and Tunnel-Password have their contents hidden.  The hidden attributes rely on "ad hoc" obfuscation methods using MD5, which have not been successfully attacked, but have not proven to be secure.  Peoples locations can (and has) been accurately determined, and people have been tracked using location data sent insecurely across the Internet (<xref target="privacy"/>).</t>
        <t>The implications for security and individual safety are large, and negative.</t>
        <t>These issues are only partly mitigated when the data carried within RADIUS use their own methods for increased security and privacy.  For example, some authentication methods such EAP-TLS, EAP-TTLS, etc. allow for User-Name privacy and for more secure transport of passwords via the use of TLS.  Some privacy can be gained through MAC address randomization, which can also limit device information identification to a particular manufacturer, instead of to a unique device.</t>
        <t>However, these methods are not always used, or are not always available.  Even if these methods were used ubiquitously, they do not protect all of the information which is publicly available over RADIUS/UDP or RADIUS/TCP transports.  And even when TLS-based EAP methods are used, implementations have historically often skipped certificate validation, leading to password compromise (<xref target="SPOOFING"/>).  In many cases, users were not even aware that the server certificate was incorrect or spoofed, which meant that there was no way for the user to detect that anything was wrong.  Their passwords were simply handed to a spoofed server, with little possibility for the user to take any action to stop it.</t>
      </section>
      <section anchor="simply-using-ipsec-or-tls-is-not-enough">
        <name>Simply using IPsec or TLS is not enough</name>
        <t>The use of a secure transport such as IPsec or TLS ensures complete privacy and security for all RADIUS traffic.  An observer of encrypted traffic is limited to knowing rough activity levels of a client or server.  That is, an observer can tell if there are a few users on a NAS, or many users on a NAS.  All other information is hidden from all observers.  Even with those limitations, it is not enough to say "use IPsec" and then move on to other issues.  There are many issues which can only be addressed via an informed approach.</t>
        <t>For example, it is possible for an attacker to record the session traffic, and later crack the TLS session key or IPsec parameters.  This attack could comprise all traffic sent over that connection, including EAP session keys.  When the cryptographic methods provide forward secrecy (<xref section="6.3" sectionFormat="comma" target="RFC7525"/>), then breaking one session provides no information about other sessions.</t>
        <t>The final attack possible in a AAA system is where one party in a AAA conversation is compromised or run by a malicious party.  This attack is made more likely by the extensive use of RADIUS proxy forwarding chains.  In that situation, every RADIUS proxy has full visibility into, and control over, the traffic it transports.  The solution here is to minimize the number of proxies involved, such as by using Dynamic Peer Discovery, as defined in <xref target="RFC7585"/>.</t>
        <t>There are many more security issues in addition to the need for a secure transport. The rest of this document discusses those issues in detail.</t>
      </section>
      <section anchor="overview-of-this-document">
        <name>Overview of this document</name>
        <t>This document begins with a summary of issues with RADIUS, including showing just how trivial it is to crack RADIUS/UDP security.  We then explain why mandating a secure transport is necessary, and describe what that requirement means in practice.  We give recommendations on how current systems can be migrated to using TLS.  We give suggestions for increasing the security of existing RADIUS transports, including a discussion of the authentication protocols carried within RADIUS.  We conclude with security and privacy considerations.</t>
        <t>As IPsec has been discussed previously in the context of RADIUS, we do not discuss it more here, except to say it is an acceptable solution for securing RADIUS traffic.  As the bulk of the current efforts are focused on TLS, this document likewise focuses on TLS.  We note that all of the issues raised here about the RADIUS protocol also apply to IPsec transport.  That is, when the application is not in charge of protocol security, the application is vulnerable to transport misconfigurations or attacks.</t>
        <section anchor="a-comment-on-specifications">
          <name>A Comment on Specifications</name>
          <t>While this document tries to be comprehensive, it is necessarily imperfect.  There may be issues which should have been included here, but which were missed due to oversight or accident.  Any reader should be aware that there are good practices which are perhaps not documented in a specification, and bad behaviors which are likewise not forbidden.  For example, documents such as <xref target="RFC5080"/> were written to both correct errors in earlier documents, and to address harmful behaviors which had been seen in practice.</t>
          <t>These harmful behaviors can have a large impact both on security and on interoperability, even if they are not expressly forbidden in a specification.</t>
          <t>There is a regrettable belief in some readers that a particular practice is "allowed" by a specification, simply because the practice is not forbidden.  This belief is wrong.  That is, a behavior which is not even mentioned in the specification cannot honestly be said to be "permitted" or "allowed" by that specification.    The most charitable description would be that these behaviors are undefined, or perhaps not forbidden.</t>
          <t>By their very nature, documents include a small number of permitted, required, and/or forbidden behaviors.  There are a much larger set of behaviors which are undefined.  That is, behaviors which are neither permitted nor forbidden.  Those behaviors are unconstrained by the specification, and therefore may be good or bad.</t>
          <t>Outside of published specifications, there is also a large set of common practices and behaviors which have grown organically over time, but which have not been formally written down.  These practices have been found to be valuable by implementers and administrators.  Deviations from these practices generally results in instabilities and incompatibilities between systems.  As such, implementers should exercise caution when creating new behaviors which have not previously been seen in the industry.  Such behaviors are likely to cause problems, where there would have been no problems if common practices had been followed instead.</t>
          <t>It is RECOMMENDED that implementations and administrators follow widely accepted practices which have been proven to work and to be secure, even if those practices are not written down in a public specification.  Implementers SHOULD NOT create features which depend on undefined behavior; such features are very likely to be wrong.</t>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>
          <t>RADIUS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>The Remote Authentication Dial-In User Service protocol, as defined in <xref target="RFC2865"/>, <xref target="RFC2866"/>, and <xref target="RFC5176"/> among others.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/UDP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the User Datagram Protocol as define above.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/TCP</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Control Protocol <xref target="RFC6613"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/TLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Transport Layer Security protocol <xref target="RFC6614"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>RADIUS/DTLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>RADIUS over the Datagram Transport Layer Security protocol  <xref target="RFC7360"/></t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>TLS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>the Transport Layer Security protocol.  Generally when we refer to TLS in this document, we are referring to RADIUS/TLS and/or RADIUS/DTLS.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>NAS</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>Network Access Server, which is a RADIUS client.</t>
        </li>
      </ul>
      <t>In order to continue the terminology of <xref target="RFC2865"/>, we describe the Request Authenticator, Response Authenticator, and Message-Authenticator as "signing" the packets.  This terminology is not consistent with modern cryptographic terms, but using other terminology is inconsistent with historic RADIUS practices.  The reader is assured that no modern cryptographic methods are used with RADIUS/UDP.</t>
    </section>
    <section anchor="security-issues-with-radius">
      <name>Security Issues with RADIUS</name>
      <t>There are a large number of issues with RADIUS.   The most serious is the BlastRADIUS vulnerability, which means that subject to some limitations, attackers can leverage MD5 known-prefix collisions to cause any user to be authenticated, and then be given any authorization.  Multi-factor Authentication (MFA) systems can be bypassed, and in many cases the RADIUS server will not even be aware that an unauthorized user is on the network.</t>
      <t>Another issue is that RADIUS sends most information (but not passwords) "in the clear", with obvious privacy implications.  Publicly available data includes information such as names, MAC addresses, locations, etc.</t>
      <t>As for authenticating the packets themselves, even if Message-Authenticator is used for integrity checks, an average hobbyist who observes RADIUS traffic can perform brute-force attacks to crack even seemingly complex shared secrets.</t>
      <t>There is no way to fix the RADIUS protocol to address all of these issues.  The short-term fix is in <xref target="I-D.ietf-radext-deprecating-radius"/>, which requires the use of Message-Authenticator to authenticate Access-Request packets, and responses to them.  The long-term solution is in <xref target="I-D.ietf-radext-radiusdtls-bis"/>, which wraps the protocol in a secure transport.</t>
      <t>With the benefit of experience, <xref target="I-D.ietf-radext-deprecating-radius"/> errs on the side of security, while still allowing for backwards compatibility.  It is not acceptable to permit insecure practices in the RADIUS protocol simply because a small number of implementations or organizations find it difficult to upgrade.  Insecure implementations or practices have a concrete cost not only to the insecure organizations, but also to other organizations via secondary effects.  When insecure organizations demand that others follow insecure practices continue due to perceived local costs, they are effectively offloading their costs onto everyone else.  This practice both decreases security, and increases costs.</t>
      <t>We address these issues in more detail below.</t>
      <section anchor="the-blastradius-vulnerability">
        <name>The BlastRADIUS Vulnerability</name>
        <t>The BlastRADIUS vulnerability was first described in <xref target="BLAST"/>.  This section gives a short summary of why RADIUS is vulnerable to this attack.   <xref target="blastradius"/>, below, gives a longer explanation as to how the attack works, and why the mitigations defined in <xref target="I-D.ietf-radext-deprecating-radius"/> protect from the attack. The reader is referred to <xref target="BLAST"/> for a comprehensive description of the attack.</t>
        <t>The discussion below assumes that there exist plain texts "A", "B", "S".  Following the practice of <xref target="RFC2865"/>, we use "+" to denote concatenation.  The vulnerability then relies on the following property of MD5:</t>
        <ul empty="true">
          <li>
            <t>If MD5(A) == MD5(B), then MD5(A + S) == MD5(B + S)</t>
          </li>
        </ul>
        <t>This construction menas that if an attacker is given text "A", and can find text "B" which has the same MD5 hash, then the attacker can perform a chosen prefix attack.  The attack works even if the attacker does not know text "S".  That is, given M5(A + S), then the attacker can trivially calculate MD5(B + S): it has the same value.</t>
        <t>In RADIUS, the Response Authenticator field <xref section="3" sectionFormat="comma" target="RFC2865"/> is calculated via precisely this vulnerable construct:</t>
        <ul empty="true">
          <li>
            <t>Response Authenticator = MD5(packet + secret)</t>
          </li>
        </ul>
        <t>The attacker can generally observe or predict an Access-Reject packet, as they are generally empty.  Each valid Access-Reject
is signed with a shared secret unknown to the attacker.  With sufficient work, the attacker can create an Access-Accept which has the same MD5 hash as the Access-Reject.  The attacker then replaces the Access-Reject with this Access-Accept, using the Response Authenticator from the Access-Reject.</t>
        <t>The client will then receive the packet, calculate MD5(Access-Accept + secret), and verify that the Response Authenticator is correct.  The client will then follow the attackers instructions: give the user access, along with some authorization.</t>
        <t>This chosen prefix attack is root cause behind the BlastRADIUS vulnerability.</t>
        <t>We note also that this attack does not expose the contents of the User-Password attribute.  Instead, the attack simply bypasses all server-side authentication, and fools the client into accepting a forged response.</t>
        <t>While this attack requires that an attacker be "on path" and be able to intercept and modify packets, the meaning of "on path" is often "the entire Internet".  As such, the existence of this attack alone is sufficient reason to deprecate all uses of RADIUS/UDP and RADIUS/TCP.</t>
      </section>
      <section anchor="failed-attempts-to-improve-radius-security">
        <name>Failed Attempts to Improve RADIUS Security</name>
        <t>Independent of any cryptographic vulnerability, there are a number of factors which contributed to the ongoing failure to improve RADIUS security.</t>
        <t>A major factor is the continued use of MD5 for security, instead of mandating the use of an HMAC via Message-Authenticator.  This change could have been made in <xref target="RFC2869"/> in the year 2000.  The stated reason there for not mandating Message-Authenticator was the issue of backwards compatibility.  Unfortunately, experience shows that issues which are not fixed just grow larger over time.  The issue of backwards compatibility is significantly worse now than it was in the year 2000.</t>
        <t>The issue of unauthenticated Access-Request packets was raised again in <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/>, and again was widely ignored.  If vendors had implemented this recommendation in 2007, then the BlastRADIUS attack would have been impossible.</t>
      </section>
      <section anchor="failures-of-the-protocol-state-machine">
        <name>Failures of the Protocol State Machine</name>
        <t>Another contributing factor to the BlastRADIUS vulnerability is the principle of "be conservative in what you do, be liberal in what you accept from others", often known as Postel's law, after John Postel.  This principle means that a client will accept packets that are well-formed, but which contain invalid signaling.  Specifically, the Proxy-State attribute is intended for signalling between a proxy and a "next hop" server.  It offers no value for RADIUS clients.  A NAS which originates packets therefore does not send Proxy-State in an Access-Request, and should also not receive Proxy-State in any response packets.</t>
        <t>If a NAS does receive Proxy-State in a response, where the request did not contain Proxy-State, this is arguably a violation of the protocol state machine.  It would be useful if such a packet would either trigger a warning message, or instead be rejected entirely.</t>
        <t>That is, when a NAS sees Proxy-State in an Access-Accept, that is a failure of signaling in the RADIUS protocol.  It indicates either a serious failure of configuration, implementation, or as seen in this case, an active attack.  If the specifications had instructed clients to discard responses which contained unexpected Proxy-State attributes, then this attack would have been prevented.</t>
      </section>
      <section anchor="privacy">
        <name>Most information is sent in Clear Text</name>
        <t>Even ignoring security issues, the RADIUS protocol has fundamental problems with privacy.</t>
        <t>With the exception of a few attributes such as User-Password, all RADIUS traffic is sent "in the clear" when using UDP or TCP transports.  Even when TLS is used, all RADIUS traffic (including User-Password) is visible to proxies.  The resulting data exposure has a large number of privacy issues.  We refer to <xref target="RFC6973"/>, and specifically to <xref section="5" sectionFormat="comma" target="RFC6973"/> for detailed discussion, and to <xref section="6" sectionFormat="comma" target="RFC6973"/> for recommendations on threat mitigations.</t>
        <t>When RADIUS/UDP or RADIUS/TCP is used across the public Internet, common configurations allow the location of individuals to be tracked in real-time (usually 10 minute intervals), to within a small physical location.  The users devices can be identified, and also tracked. Even when the packets do not contain any <xref target="RFC5580"/> location information for the user, the packets usually contain the MAC address of the Wi-Fi access point.  The MAC address and physical location of the user device and often W-Fi access points are publicly available.  There are multiple services selling databases of Wi-Fi access point location.</t>
        <t>More discussion of location privacy is given in <xref target="RFC6280"/>, which defines an "Architecture for Location and Location Privacy in Internet Applications".  However, that work was published too late to have any practical impact on the design of location information attributes, as <xref target="RFC5580"/> had already been published.</t>
        <t>The effect of these design decisions is that any observer of non-TLS RADIUS traffic is able to obtain a substantial amount of personal identifiable information (PII) about users.  The observer can tell who is logging in to the network, what devices they are using, where they are logging in from, and their approximate location (usually city).  With location-based attributes as defined in <xref target="RFC5580"/>, a user's location may be determined to within 15 or so meters outdoors, and with "meter-level accuracy indoors" <xref target="WIFILOC"/>.  An observer can also use RADIUS accounting packets to determine how long a user is online, and to track a summary of their total traffic (upload and download totals).</t>
        <t>These issues are not theoretical.  Recently, <xref target="BRIGGS"/> noted for the Diameter <xref target="RFC6733"/> protocol that:</t>
        <ul empty="true">
          <li>
            <t>Overall, I think the above three examples are just the tip of the proverbial iceberg of SS7 and Diameter based location and monitoring exploits that have been used successfully against targeted people in the USA.</t>
          </li>
        </ul>
        <t><xref target="BRIGGS"/> continues with a statement that there have been:</t>
        <ul empty="true">
          <li>
            <t>... numerous other exploits based on SS7 and Diameter that go beyond location tracking. Some of these involve issues like (1) the monitoring of voice and text messages, (2) the delivery of spyware to targeted devices, and (3) the influencing of U.S. voters by overseas countries using text messages.</t>
          </li>
        </ul>
        <t>While these comments mention only Diameter, the same location tracking and monitoring is also possible with RADIUS.  There is every reason to believe that similar attacks on RADIUS have occurred, but are simply less publicized than similar attacks on Diameter.</t>
      </section>
      <section anchor="md5-has-been-broken">
        <name>MD5 has been broken</name>
        <t>Attacks on MD5 are summarized in part in <xref target="RFC6151"/>.  The BlastRADIUS work substantially improved the speed of finding MD5 collisions, and those improvements are publicly available at <xref target="HASHCLASH"/>.</t>
        <t>While there have not been many other new attacks in the decade since <xref target="RFC6151"/> was published, that does not mean that further attacks do not exist.  It is more likely instead that no one is looking for new attacks.</t>
      </section>
      <section anchor="cracking">
        <name>Cracking RADIUS shared secrets is not hard</name>
        <t>The cost of cracking a a shared secret can only go down over time as computation becomes cheaper.  The issue is made worse because of the way MD5 is used to authenticate RADIUS packets.  The attacker does not have to calculate the hash over the entire packet, as the hash prefix can be calculated once, and then cached.  The attacker can then begin the attack with that hash prefix, and brute-force only the shared secret portion.</t>
        <t>At the time of writing this document, an "off the shelf" commodity computer can calculate at least 100M MD5 hashes per second.  If we limit shared secrets to upper/lowercase letters, numbers, and a few "special" characters, we have 64 possible characters for shared secrets.  Which means that for 8-character secrets, there are 2^48 possible combinations.  The result is that using a consumer-grade machine, it can take about 32 days to brute-force the entire 8 octet / 64 character space for shared secrets.</t>
        <t>The problem is even worse when graphical processing units (GPUs) are used. A high-end GPU is capable of performing more than 64 billion hashes per second.  At that rate, the entire 8 character space described above can be searched in approximately 90 minutes.  This is an attack which is feasible today for a hobbyist.</t>
        <t>Increasing the size of the character set raises the cost of cracking, but not enough to be secure.  Increasing the character set to 93 characters means that the hobbyist using a GPU could search the entire 8 character space in about a day.</t>
        <t>Increasing the length of the shared secret has a larger impact on the cost of cracking.  For secrets ten characters long, the search space is approximately 2^60.  One GPU can search a 64-character space in about six months. A 93 character space (2^65 complexity) would take approximately 24 years.</t>
        <t>This brute-force attack is trivially parallelizable.  Nation-states have sufficient resources to deploy hundreds to thousands of systems dedicated to these attacks.  That reality means that a "time to crack" of 24 years means "24 CPU years", and does not mean "wall clock" time.  A thousand commodity CPUs are enough to reduce the crack time from 24 years to a little over a week.  This attack is feasible for any organisation with a modest amount of resources.</t>
        <t>Whether the above numbers are precise or only approximate is immaterial.  These attacks will only get better over time.  The cost to crack shared secrets will only go down over time.</t>
        <t>If the shared secret is long, then "cracking" the secret is expensive, and different trade-offs occur.  Rather than cracking the secret, it is cheaper to perform the BlastRADIUS attack at a cost of approximately 2^53 per packet, and less than $100 in purchased CPU time.  While cracking the shared secret would break all RADIUS packets using that secret, forging one packet is likely enough to give the attacker administrator access to a NAS, where the shared secret is likely to be visible in the administration interface.  The conclusion, then, is that increasing the security of the shared secret offers minimal protection when the Access-Request packets are unsigned.</t>
        <t>Even if the shared secrets were enough to secure all RADIUS packets, administrators do not always derive shared secrets from secure sources of random numbers.  The "time to crack" numbers given above are the absolute best case, assuming administrators follow best practices for creating secure shared secrets.  For shared secrets created manually by a person, the search space is orders of magnitude smaller than the best case outlined above.  Rather than brute-forcing all possible shared secrets, an attacker can create a local dictionary which contains common or expected values for the shared secret.  Where the shared secret used by an administrator is in the dictionary, the cost of the attack can drop by multiple orders of magnitude.</t>
        <t>Implementers and administrators should assume that a hobbyist attacker with modest resource can crack most shared secrets created by people in minutes, if not seconds.</t>
        <t>Despite the ease of attacking MD5, it is still a common practice for some "cloud" and other RADIUS providers to send RADIUS/UDP packets over the Internet.  It is also common practice for administrators to use "short" shared secrets, and to use shared secrets created by a person, or to use secrets that are derived from a limited character set.  Theses practice are simple to implement and to follow, but they are highly insecure, and do not provide adequate security.  Any system using these practices is vulnerable to all of the issues which are outlined in this document.</t>
        <t><xref target="I-D.ietf-radext-deprecating-radius"/> gives suggestions for how strong shared secrets can be created.</t>
      </section>
      <section anchor="tunnel-coa">
        <name>CoA-Request packets might leak Tunnel-Password contents</name>
        <t>There are a number of security problems with the use Tunnel-Password attribute in CoA-Request and Disconnect-Request packets.  A full explanation requires a review of the relevant specifications.</t>
        <t><xref target="RFC5176"/> Section 2.3 describes how to calculate the Request Authenticator field for these packets:</t>
        <artwork><![CDATA[
Request Authenticator

   In Request packets, the Authenticator value is a 16-octet MD5
   [RFC1321] checksum, called the Request Authenticator.  The
   Request Authenticator is calculated the same way as for an
   Accounting-Request, specified in [RFC2866].
]]></artwork>
        <t>Where <xref target="RFC2866"/> Section 3 says:</t>
        <artwork><![CDATA[
   The NAS and RADIUS accounting server share a secret.  The Request
   Authenticator field in Accounting-Request packets contains a one-
   way MD5 hash calculated over a stream of octets consisting of the
   Code + Identifier + Length + 16 zero octets + request attributes +
   shared secret (where + indicates concatenation).  The 16 octet MD5
   hash value is stored in the Authenticator field of the
   Accounting-Request packet.
]]></artwork>
        <t>Taken together, these definitions mean that for CoA-Request packets, all attribute obfuscation is calculated with the Reply Authenticator being all zeroes.  In contrast for Access-Request packets, the Request Authenticator is mandated to be 16 octets of random data.  This difference reduces the security of the obfuscation.</t>
        <t>For Tunnel-Password, <xref target="RFC5176"/> Section 3.6 allows it to appear in CoA-Request packets:</t>
        <artwork><![CDATA[
   ...
   Change-of-Authorization Messages
   
   Request   ACK      NAK   #   Attribute
   ...
   0+        0        0    69   Tunnel-Password (Note 5)
   ...
   (Note 5) When included within a CoA-Request, these attributes
   represent an authorization change request.  Where tunnel attributes
   are included within a successful CoA-Request, all existing tunnel
   attributes are removed and replaced by the new attribute(s).
]]></artwork>
        <t>However, <xref target="RFC2868"/> Section 3.5 says that Tunnel-Password is encrypted with the Request Authenticator:</t>
        <artwork><![CDATA[
   Call the shared secret S, the pseudo-random 128-bit Request
   Authenticator (from the corresponding Access-Request packet) R,
]]></artwork>
        <t>The assumption that the Request Authenticator is random data is true for Access-Request packets.  That assumption is not true for CoA-Request packets.</t>
        <t>That is, when the Tunnel-Password attribute is used in CoA-Request packets, the only source of randomness in the obfuscation is the salt, as defined in <xref target="RFC2868"/> Section 3.5;</t>
        <artwork><![CDATA[
 Salt
   The Salt field is two octets in length and is used to ensure the
   uniqueness of the encryption key used to encrypt each instance of
   the Tunnel-Password attribute occurring in a given Access-Accept
   packet.  The most significant bit (leftmost) of the Salt field
   MUST be set (1).  The contents of each Salt field in a given
   Access-Accept packet MUST be unique.
]]></artwork>
        <t>This chain of unfortunate definitions means that there is only 15 bits of entropy in the Tunnel-Password obfuscation (plus the RADIUS shared secret).  It is not currently known if this limitation makes it sufficiently easy for an attacker to determine the contents of the Tunnel-Password, as the obfuscated value still depends on the shared secret.  However, such limited entropy cannot be a good thing.</t>
        <t>Due to the above issues, the use obfuscated attributes in CoA-Request or Disconnect-Request packets needs to be avoided.</t>
      </section>
      <section anchor="secure-transports-can-still-leak-information">
        <name>Secure Transports Can Still Leak Information</name>
        <t>The above analysis as to security and privacy issues focuses on RADIUS/UDP and RADIUS/TCP.  These issues are partly mitigated through the use secure transports, but it is still possible for information to "leak".</t>
        <t>When TLS-based EAP methods such as TTLS or PEAP are used, they still transport passwords inside of the TLS tunnel.  It is possible for an authentication server to terminate the TLS tunnel, and then proxy the inner data over RADIUS/UDP.  The design of both TTLS and PEAP make this process fairly trivial.  The inner data for TTLS is in Diameter AVP format, which can be trivially transformed to RADIUS attributes.  The inner data for PEAP is commonly EAP-MSCHAPv2, which can also be trivially transformed to bare EAP, or to MS-CHAPv2.</t>
        <t>Similar issues apply for proxies even when RADIUS/TLS and IPsec are used.  A proxy which receives packets over IPsec will terminate the IPSec tunnel, but it then might forward the packets over an insecure transport protocol.  While this process could arguably be seen as a misconfiguration issue, it is never the less possible due to the design of the RADIUS protocol.  As RADIUS security is "hop by hop", there is no way for one "hop" to know anything about, or to control, the security of another "hop".</t>
        <t>The use of channel binding <xref target="RFC6677"/> does not prevent these attack, as they made by parties within the trusted RADIUS system.  Instead, channel binding protects from an unrelated attack by an untrusted third party.</t>
        <t>One solution to the above issues would be to create a new protocol which is secure by design, but that solution is not practical.</t>
      </section>
      <section anchor="all-short-shared-secrets-have-been-compromised">
        <name>All short Shared Secrets have been compromised</name>
        <t>As a result of the above analysis, administrators can assume that any shared secret of 8 characters or less has been compromised as soon as it is used in RADIUS/UDP or RADIUS/TCP.  Administrators can assume that any shared secret of 10 characters or less has been compromised by an attacker with significant resources.  Administrators can also assume that all private information (such as User-Password or Tunnel-Password) which depend on such shared secrets have also been compromised.</t>
        <t>As the analysis in [](#user-password} below shows, a strong shared secret protects the contents of User-Password, no matter how weak the end-users password is.  As such it is acceptable (for a short time) for RADIUS/UDP to continue to carry User-Password and Tunnel-Password, but only when a strong shared secret is used.</t>
        <t>Using a strong shared secret is only a partial protection from known attacks.  RADIUS can carry end-user credentials such as CHAP-Password and MS-CHAP which are not protected with the shared secret.  Many of those credentials have been compromised, too.</t>
      </section>
      <section anchor="many-end-user-passwords-have-been-compromised">
        <name>Many End-User Passwords Have Been Compromised</name>
        <t>The analyis in <xref target="ms-chap"/> below shows how the construction of MS-CHAP can allow attackers to determine the underyling password in milliseconds.  <xref target="chap-password"/> also shows how a different attack on CHAP-Password can recover the underlying password in milliseconds.  This section explains the effects of those attacks.</t>
        <t>As the security of CHAP-Password and MS-CHAP depends only on the strength of the end-users password, those methods can be safe only if the user chooses a strong password.  That is, a password which is 10 characters or more, and which is derived from a cryptograpically strong pseudo-random number generator. This requirement is unlikely to be met by a large percentage of end users.  As such, the use of CHAP-Password and MS-CHAP needs to be deprecated.</t>
        <t>To be perfectly clear: if a CHAP-Password, or MS-CHAP data has been sent over the Internet via RADIUS/UDP or RADIUS/TCP in the last decade, you should assume that the underlying passwords have been compromised.</t>
      </section>
    </section>
    <section anchor="blastradius">
      <name>The BlastRADIUS Attack</name>
      <t>This section gives more details on the BlastRADIUS attack, so that the reader can be informed as to why <xref target="I-D.ietf-radext-deprecating-radius"/> makes its recommendations.  In the interest of simplicity for implementers, {I-D.ietf-radext-deprecating-radius}} omits all explanation of the attack.  That document also gives minimal explanation for each of the protocol changes.  This document contains the full details instead.</t>
      <t>The attack depends on a few related factors.  If any one of these factors are not present, the attack is not possible.  These factors are outlined below:</t>
      <ul spacing="normal">
        <li>
          <t>The Access-Request packets are not authenticated, and can therefore be modified without detection.</t>
        </li>
        <li>
          <t>The use of MD5 within RADIUS is subject to known prefix attacks.</t>
        </li>
        <li>
          <t>The improvements to MD5 collisions in <xref target="HASHCLASH"/> make the attack feasible.</t>
        </li>
        <li>
          <t>The structure and behavior of Proxy-State makes it the perfect vector for an attacker to inject the "MD5 garbage" (<xref target="BLAST"/>) which is needed to force the MD5 collision.</t>
        </li>
      </ul>
      <t>The attack works by having An "on path" attacker who modifies an Access-Request packet, and injects one or more Proxy-State attributes with special contents. The Proxy-State attribute itself will not trigger any overflow or “out of bounds” issue with the RADIUS client or server.  Instead, the contents of the attributes allows the attacker to create an MD5 known-prefix collision when the server calculates the Response Authenticator.  In effect, the attacker uses the RADIUS server, and its knowledge of the shared secret, to unknowingly authenticate packets which it has not created.</t>
      <t>The behavior of the Proxy-State attribute is extremely useful to this attack.  The attribute is defined in <xref section="5.33" sectionFormat="comma" target="RFC2865"/> as an opaque token which is sent by a RADIUS proxy, and is echoed back by RADIUS servers.  That is, the contents of the attribute are never examined or interpreted by the RADIUS server.  Even better, testing shows that all known RADIUS clients will simply ignore any unexpected Proxy-State attributes which they receive.  Finally, implementations generally add Proxy-State to the end of response packets, which simplifies the attack.</t>
      <t>This attribute is therefore ideally suited to an attackers purpose of injecting arbitrary data into packets, without that data affecting client or server behavior.   The reasons for this behavior are outlined below in <xref target="proxy-state"/>.  While those reasons were transient and decades in the past, the impact of those decisions has continued to impact RADIUS until the present.</t>
      <t>While it is possible to use other attributes to achieve the same effect, the use of Proxy-State is simple, and is sufficient to trigger the issue.  For example, it is theoretically possible to use the User-Name attribute for this attack, so long as it is echoed back in an Access-Accept, or even as part of the the contents of a Reply-Message in an Access-Accept.  There is no much benefit in further researching that attack, as the mitigations for attacks using Proxy-State will also protect clients and servers from a similar attacks which use other attributes.</t>
      <t>The injected data and resulting MD5 collision allows the attacker to modify the packet contents almost at will, and the client will still accept the modified packet as being authentic.  The attack allows nearly arbitrary attributes to be added to the response.  Those attributes are simply part of the MD5 collision calculation, and do not substantially impact the cost of that calculation.</t>
      <t>We reiterate that since the RADIUS server can be convinced to authenticate packets using a prefix chosen by the attacker, there is no need for the attacker to know the shared secret.  This attack succeeds no matter how secure the shared secret is, the only mitigation against the attack for RADIUS systems to use TLS, or to require that packets contain a is valid Message-Authenticator.</t>
      <section anchor="detailed-description-of-the-attack">
        <name>Detailed Description of the Attack</name>
        <t>The specific details of the attack are outlined below, as steps which are numbered the same as in the original paper (<xref target="BLAST"/>).</t>
        <ol spacing="normal" type="1"><li>
            <t>The attacker requests network access from the RADIUS client (NAS).  This action triggers the NAS to send an Access-Request packet to the RADIUS server.</t>
          </li>
          <li>
            <t>The Access-Request is observed to obtain its contents, including the Request Authenticator field.  The attacker prevents this packet from reaching the server until the MD5 collision data has been calculated.  The NAS will retransmit the packet one or more times after a delay, giving the attacker time to calculate the chosen prefix.</t>
          </li>
          <li>
            <t>An external resource is used to calculate an MD5 collision using the Request Authenticator, along with the expected contents of an Access-Reject.  As Access-Reject packets are typically empty or can be observed, the expected packet contents are known in their entirety.</t>
          </li>
          <li>
            <t>Once an MD5 collision is found, the resulting "MD5 garbage" data is placed into one or more Proxy-State attributes in the previously seen Access-Request.  The attacker then sends this modified Access-Request to the RADIUS server.</t>
          </li>
          <li>
            <t>The RADIUS server responds with an Access-Reject, and includes the Proxy-State attributes from the modified Access-Request packets.  The packet contains the malicious Proxy-State(s), along with a Response Authenticator which depends on both those malicious attributes, and the shared secret.</t>
          </li>
          <li>
            <t>The attacker discards the original Access-Reject, and uses the chosen prefix data in the Proxy-State(s) to create a different (i.e. modified) response, such as an Access-Accept.  Other authorization attributes such as VLAN assignment can also be added, modified, or deleted.  This modified packet is sent to the NAS.</t>
          </li>
          <li>
            <t>The NAS receives the modified Access-Accept, verifies that the Response Authenticator is correct, and gives the user access, along with the attackers desired authorization.</t>
          </li>
        </ol>
        <t>The result of this attack is a near-total compromise of the RADIUS protocol.  The attacker can cause any user to be authenticated.  The attacker can give almost any authorization to any user.</t>
        <t>While the above description leverages Access-Reject responses, we reiterate that the root cause of the vulnerability is the unauthenticated Access-Request packets.  The attack will therefore succeed even if the server responds with Access-Accept, Access-Challenge, or Protocol-Error <xref target="RFC7930"/>.  The ability for the attacker to avoid Access-Challenge allows MFA to be bypassed, as the attacker simply replaces the Access-Challenge with an Access-Accept.</t>
        <t>In addition to forging an Access-Accept for a user who has no credentials, the attacker can control the traffic of known and authenticated users.  Many modern Broadband Network Gateways (BNG)s, Wireless LAN Controllers (WLCs), and Broadband Remote Access Servers (BRAS) support configuring a dynamic HTTP redirect using Vendor Specific Attributes (VSA)s.  These VSAs are not protected in any way, and could be injected into an Access-Accept in order to redirect a users traffic.  The attacker could then set up a malicious website to launch Zero-Day/Zero-Click attacks, driving subscribers to the website using an HTTP redirect.  This issue is compounded by the fact that many devices perform automatic HotSpot 1.0 style walled garden discovery.  The act of simply connecting to their home WiFi connect could be enough to compromise a subscriber's equipment.</t>
        <t><xref target="I-D.ietf-radext-deprecating-radius"/> defines mitigations which will protect clients and servers from this attack when using RADIUS/UDP or RADIUS/TCP.  However, we reiterate here, and in the rest of this document, that the only long-term solution is to deprecate insecure transports entirely.  In the long term, implementers need to remove all uses of RADIUS/UDP and RADIUS/TCP from their products.  Administrators need to stop using RADIUS/UDP and RADIUS/TCP.</t>
      </section>
      <section anchor="configuration-flags">
        <name>Mitigating the Attack</name>
        <t>While <xref target="I-D.ietf-radext-deprecating-radius"/> defines the mitigations that are mandated for clients and servers, we give a summary description of those mandates here for clarity.  These descriptions are not normative, and readers are instructed to refer to <xref target="I-D.ietf-radext-deprecating-radius"/> for the full list of normative changes to RADIUS.</t>
        <t>Clients</t>
        <ul empty="true">
          <li>
            <t>Clients are required to include Message-Authenticator as the first attribute in all Access-Request packets.</t>
            <t>Clients are required to have a new boolean configuration flag for each server, called "require Message-Authenticator".</t>
            <ul empty="true">
              <li>
                <t>When this flag is set to "false", client behavior remains unchanged from legacy RADIUS.</t>
                <t>When this flag is set to "true", clients discard all responses to Access-Request packets which do not contain a Message-Authenticator attribute.</t>
              </li>
            </ul>
            <t>Clients still need to validate the contents of Message-Authenticator when it is present.  Clients also need to accept valid and authenticated responses, no matter where the Message-Authenticator is located in the response.</t>
          </li>
        </ul>
        <t>Servers</t>
        <ul empty="true">
          <li>
            <t>Servers are required to include Message-Authenticor as the first attribute in all responses to Access-Request packets.</t>
            <t>Servers are required to have a new boolean configuration flag for each client, called "require Message-Authenticator".</t>
            <ul empty="true">
              <li>
                <t>When this flag is set to "false", their behavior remains unchanged from legacy RADIUS, except that the "limit Proxy-State" flag below is also checked.</t>
                <t>When this flag is set to "true", clients discard all Access-Request packets which do not contain a Message-Authenticator attribute.</t>
              </li>
            </ul>
            <t>Servers still need to validate the contents of Message-Authenticator when it is present.  Servers also need to accept valid and authenticated Access-Requests, no matter where the Message-Authenticator is located in the request.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Servers are required to have a new boolean configuration flag for each client, called "limit Proxy-State".</t>
            <ul empty="true">
              <li>
                <t>When this flag is set to "false", server behavior remains unchanged from legacy RADIUS.</t>
                <t>When this flag is set to "true", servers discard all Access-Request packets that contain a Proxy-State attribute.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="why-the-mitigiations-work">
        <name>Why the Mitigiations Work</name>
        <t>This section explains the rationale for the mitigations defined by <xref target="I-D.ietf-radext-deprecating-radius"/>.</t>
        <t>Adding Message-Authenticator as the first attribute in packets means that the first attribute contains data which is impossible for the attacker to predict.  That is, for the purposes of MD5 known prefix attacks, the unknown suffix begins with the Message-Authenticator, and continues for the remainder of the packet.  The attacker is therefore unable to leverage the attack using a known prefix, and the vulnerability is prevented.</t>
        <t>When this change is made on clients, it is necessary to prevent the attack, but it is not sufficient.  When a server does not require that Access-Request packets contain Message-Authenticator, an attacker can simply remove it from the Access-Request.  The attack can then proceed, as the server will receive, process, and respond to, an unauthenticated Access-Request packet.</t>
        <t>In contrast, when both clients and servers requires that packets contain a valid Message-Authenticator, the BlastRADIUS attack is impossible.  Therefore the "require Message-Authenticator" flag is needed on both clients and servers in order to secure the RADIUS protocol.  In order to enable compatibility with legacy systems, this protocol change must be enabled by a configuration flag.</t>
        <section anchor="protecting-clients">
          <name>Protecting Clients</name>
          <t>A client is fully protected from the attack if it requires that all responses to Access-Request contain a Message-Authenticator, and it validates the contents of Message-Authenticator.  The client is also protected when the server sends Message-Authenticator as the first attribute in all responses to Access-Request packets.</t>
          <t>That server behavior secures one client to server connection, even if the server does not require Message-Authenticator in Access-Request packets, and even if the client does not examine or validate the contents of the Message-Authenticator.  As noted above, this location of the Message-Authenticator ensures that the unknown suffix is the entire packet, and the attack is impossible.</t>
          <t>In contrast, when the Message-Authenticator is the last attribute in a packet (as was historically common in many implementations), the attacker can treat the Message-Authenticator itself as an unknown suffix, as it does with the shared secret.  The attacker can then proceed with the attack, with no additional effort.</t>
          <t>The analysis is similar if the Message-Authenticator is in the middle of the packet, with attributes existing both before an after the Message-Authenticator.  Attributes before the Message-Authenticator can be modified, discarded, or added, while attributes after the Message-Authenticator need to remain in the packet.  We direct the reader to <xref target="BLAST"/> Section 7.2 for a more complete description of these issues.</t>
          <t>In short, the only solution which mitigates the attack is that servers need to place Message-Authenticator as the first attribute in all responses to Access-Request packets.</t>
        </section>
        <section anchor="protecting-servers-and-proxies">
          <name>Protecting Servers and Proxies</name>
          <t>Ugrading all client equipment can be  difficult, if only because there are many more clients than servers.  Some client products may no longer be supported, or the relevant vendor may have gone out of business.  Even if upgraded software images are available, the upgrade process may impact production networks, which has a cost.  As a result, any mitigations must work even when clients have not been updated.</t>
          <t>A server is vulnerable to the attack when it proxies packets, even if it adds Message-Authenticator is added as the first attribute in responses to all Access-Request packets.  Due to the limitations of RADIUS, a proxy has no way of knowing whether or not a "next hop" RADIUS server has been upgraded.  It therefore has to protect itself from attacks when it is the only upgraded party in a RADIUS proxy chain.</t>
          <t>In this scenario, a legacy client sends Access-Request packets to an upgraded proxy, which in turn forwards the packets to a legacy next hhop server.  Responses from the next hop server are sent back to the proxy, and then to the client.</t>
          <t>Upgrading the proxy will protect only the responses from the proxy to the client.  The attacker can still modify packets from the client to the proxy, or it can modify all request and response packets that are sent between the proxy and next hop server.  The result is that the upgraded server is still vulnerable to the attack.</t>
          <t>The "limit Proxy-State" flag allows servers to detect and prevent attacks when Access-Request packets do not contain Message-Authenticator.  This configuration is only necessary when the server is a proxy.  When the server enables the "limit Proxy-State" flag, legacy clients to be used without substantially compromising security.</t>
          <t>The proxy is likely to still be vulnerable to attacks on the link between itself and the next hop server.  However, the proxy can use the client "require Message-Authenticator" flag defined above to protect itself.  Even when the proxy cannot set that flag, the link between the proxy and the next hop server is much more likely to be protected via TLS or IPSec than the link between the client and proxy.</t>
          <t>In addition, it is generally easier to upgrade servers than clients.  The focus of the mitigations, therefore, has been on securing the link between clients and servers, not between proxy servers.</t>
        </section>
        <section anchor="other-attributes">
          <name>Other Attributes</name>
          <t>While it is theoretically possible to perform the BlastRADIUS attack via attributes other than Proxy-State, no such exploits are known at this time.  Any such exploit would require that the server receive fields under the attackers control (e.g. User-Name), and echo those fields back in a response.  Such attacks are therefore only possible when the server is configured to echo back attacker-controlled data, which is not their default behavior.</t>
          <t>As a result, the configuration flags described above in <xref target="configuration-flags"/> allow the maximum amount of security while adding the minimum disruption to operational networks.  For the remaining attack vectors, is is RECOMMENDED that servers which echo back user-supplied data in responses do so only when their "require Message-Authenticator" flag is set to "true".  If such user-supplied data is echoed back in responses when the "require Message-Authenticator" flag is set "false", then the BlastRADIUS attack is theoretically still possible, even though no exploit is currently available.</t>
          <t>The server configuration flags will protect it even if clients have not been upgraded or been configured to be secure.  The server configuration flags will not protect clients (NASes or proxies) from servers which have not been upgraded or been configured to be secure.</t>
        </section>
        <section anchor="requirements-for-full-mitigation">
          <name>Requirements for Full Mitigation</name>
          <t>The attack will only be mitigated in either of the following two circumstances:</t>
          <ol spacing="normal" type="1"><li>
              <t>The client implements the "require Message-Authenticator" flag, and has set that flag to "true",</t>
            </li>
            <li>
              <t>The server places Message-Authenticator as the first attribute in all responses to Access-Request packets.</t>
            </li>
          </ol>
          <t>Since RADIUS has no feature negotiation, the server has no way of knowing whether or not the client has been configured securely.  The only remaining choice then for server behavior then, is the second item.  <xref target="I-D.ietf-radext-deprecating-radius"/> therefore mandates that all RADIUS servers send Message-Authenticator as the first attribute in all responses to Access-Request packets.  This change is the simplest possible fix to the RADIUS protocol which will protect systems from the attack.</t>
        </section>
      </section>
      <section anchor="limitations-of-the-mitigations">
        <name>Limitations of the Mitigations</name>
        <t>The above mitigations have some limitations.  The design of the mitigations had to allow for backwards compatibility with legacy RADIUS systems, while still allowing for (but not requiring) whole-sale network upgrades.  There is a trade-off to be made between perfectly secure networks which are unusable, and networks which are usable but somewhat insecure.  The mitigations defined in <xref target="I-D.ietf-radext-deprecating-radius"/> create as much security as possible, while still not breaking existing networks.</t>
        <t>The result is that there are situations where a network is functional, but insecure.  In addition, there are situations where existing client implementations are not compatible with the mitigations.  This section outlines those limitations.</t>
        <section anchor="vulnerable-systems">
          <name>Vulnerable Systems</name>
          <t>A RADIUS server is vulnerable to the attack if it does not require that all received Access-Request packets contain a Message-Authenticator attribute.  This vulnerability exists for many common uses of Access-Request, including packets containing PAP, CHAP, MS-CHAP, or packets containing “Service-Type = Authorize-Only”.   The vulnerability is also transitive.  If any one RADIUS server in a proxy chain is vulnerable, then the entire chain is vulnerable.  The attack can proceed on the vulnerable systems, and the attacker can gain unauthenticated and/or unauthorized access to any systems which depend on that proxy chain.</t>
          <t>Similarly, simply having the Message-Authenticator attribute present in Access-Request packets is not sufficient.  In order to be protected, a server must require that the attribute is present, and must also discard packets which are missing it.  Similarly, the client must also require that the attribute is present, and discard packets which are missing oit.</t>
          <t>Similarly, clients are vulnerable when they do not require that all responses to Access-Request packets contain Message-Authenticator.  Note that clients which validate Message-Authenticator are not vulnerable even if Message-Authenticator is the last attribute in a response.  The HMAC construct of Message-Authenticator makes the attack impossible in that situation.</t>
          <t>The requirement on servers to place Message-Authenticator as the first attribute in all responses to Access-Request is there only to protect legacy clients which do not validate Message-Authenticator.  There is no need for a client to discard responses where the Message-Authenticator is valid, but is also not the first attribute.  Such behavior is incorrect, and will cause interoperability problems.</t>
        </section>
        <section anchor="unaffected-systems">
          <name>Unaffected Systems</name>
          <t>There are a number of systems which are not vulnerable to this attack.  The most important ones are systems which only perform EAP authentication, such as with 802.1X / WPA Enterprise.  The EAP over RADIUS protocol is defined in <xref section="3.3" sectionFormat="comma" target="RFC3579"/> which states explicitly:</t>
          <ul empty="true">
            <li>
              <t>If any packet type contains an EAP-Message attribute it MUST also contain a Message-Authenticator.</t>
            </li>
          </ul>
          <t>This requirement reiterates that of <xref section="5.13" sectionFormat="comma" target="RFC2869"/>, which defines EAP-Message and Message-Authenticator, but which does not get into details about EAP.</t>
          <t>This requirement is enforced by all known RADIUS servers.  As a result, when roaming federations such as eduroam <xref target="EDUROAM"/> use RADIUS/UDP to transport EAP, the attack is not possible.</t>
          <t>Other roaming groups such as OpenRoaming <xref target="OPENROAMING"/> require the use of TLS, and are not vulnerable.  Other roaming providers generally use VPNs to connect disparate systems, and are also not vulnerable.</t>
          <t>802.1X / WPA enterprise systems have an additional layer of protection, due to the use of the master session keys (MSK) which are derived from the EAP authentication method.  These keys are normally carried in an Access-Accept, in the MS-MPPE-Recv-Key and MS-MPPE-Send-Key attributes, and are used to secure the link between the NAS and the supplicant.  The contents of the attributes are obfuscated via the same method used for Tunnel-Password, and are not visible to an "on-path" attacker.</t>
          <t>While an attacker could perhaps force an Access-Accept in some situations where EAP is used, or strip the Message-Authenticator from packets, it is not currently possible for an attacker to see, modify, or create the correct MSK for the EAP session.  As a result, when 802.1X / WPA enterprise is used, even a successful attack on the Access-Accept packet would likely not result in the attacker obtaining network access.</t>
        </section>
      </section>
      <section anchor="implementations-with-incorrect-mitigations">
        <name>Implementations with Incorrect Mitigations</name>
        <t>This section summarizes the various implementation issues, and the recommended fixes to them.  While this section does not contain normative text, it refers to normative requirements in <xref target="I-D.ietf-radext-deprecating-radius"/>.  This summary is necessary because multiple implementations failed to follow the normative requirements of that document. Instead, those systems either implemented behavior which was forbidden by the normative text, or else failed to implement behavior which was mandated by the normative text.</t>
        <t>It is therefore necessary to reiterate to the reader that the normative text in <xref target="I-D.ietf-radext-deprecating-radius"/> is, in fact, normative, and that the mandates of the normative text need to be respected.  The reader should understand that any non-normative text in this specification does not over-ride the clear mandates of the normative text in <xref target="I-D.ietf-radext-deprecating-radius"/>.</t>
        <t>The following list outlines the problems seen, in no particular order.</t>
        <ul spacing="normal">
          <li>
            <t>Some implementations discard packets which contain
Message-Authenticator.</t>
          </li>
          <li>
            <t>Some implementations discard responses where the
Message-Authenticator is not first, in violation of <xref section="5" sectionFormat="comma" target="RFC2865"/>.  It should be reiterated that the requirement in
<xref target="I-D.ietf-radext-deprecating-radius"/> "Server Responses" to place
Message-Authenticator first is a requirement on the server, and is
not a requirement on the client.</t>
          </li>
        </ul>
        <section anchor="discarding-packets-with-message-authenticator-is-wrong">
          <name>Discarding Packets with Message-Authenticator is Wrong</name>
          <t>Nearly all clients which do not validate Message-Authenticator are known to accept responses which contain it, due to the provisions of <xref section="5" sectionFormat="comma" target="RFC2866"/>:</t>
          <ul empty="true">
            <li>
              <t>A RADIUS client MAY ignore Attributes with an unknown Type.</t>
            </li>
          </ul>
          <t>These RADIUS clients are compatible with the protocol change outlined in this document.   We note also that Message-Authenticator has been defined for almost twenty-five (25) years, since <xref target="RFC2869"/>, so there are few reasons for equipment to not support it.</t>
          <t>Since the publication of the original BlastRADIUS notification, it has become known that some implementations do not behave as expected.  That is, instead of ignoring an unexpected Message-Authenticator attribute, they discard all responses with contain Message-Authenticator.  That behavior is entirely unreasonable, and is not required by any standard.</t>
          <t>The unfortunate reality is that the only way that RADIUS servers could be compatible with such systems is for them to never send Message-Authenticator in responses.  However, doing so would open up significantly more systems to the BlastRADIUS attack.  As such, there is no attempt made to be compatible with implementations that fail to implement RADIUS correctly.</t>
          <t>The only way to secure those systems is to upgrade them.  Failing that, the administrators of those systems will need to accept the fact that their systems are vulnerable.</t>
          <t>The solution adopted by <xref target="I-D.ietf-radext-deprecating-radius"/> is to declare that clients or servers which discard packets containing Message-Authenticator are not compliant with the RADIUS specifications.  It is not acceptable to decrease the security of the RADIUS protocol in order to be compatible with insecure and non-compliant implementations.  That specification attempts to prevent such issues from happening in the future, by mandating behavior for unknown attributes in <xref target="I-D.ietf-radext-deprecating-radius"/> "Unknown Attributes".  There is no reason for an implementation to discard response a packet simply because it does not recognize an attribute in the packet.</t>
        </section>
        <section anchor="checking-the-location-of-message-authenticator-is-wrong">
          <name>Checking the location of Message-Authenticator is Wrong</name>
          <t>Nothing in any previous RADIUS specification requires attributes to be placed in any particular location in a packet.  Nothing in any previous RADIUS specification requires implementations to discard packets which contain unrecognized attributes.</t>
          <t>Further, the construction of Message-Authenticator allows for a RADIUS implementation to authenticate packets (other than Access-Request), even if the Message-Authenticator is not validated.</t>
          <t>This issue is addressed in <xref section="TBD" sectionFormat="comma" target="I-D.ietf-radext-deprecating-radius"/>, which clarifies and extends the requirements on attribute ordering and location.  <xref section="TBD" sectionFormat="comma" target="I-D.ietf-radext-deprecating-radius"/> also clarifies and extends the requirements on receiving unknown attributes.</t>
        </section>
      </section>
      <section anchor="less-effective-mitigations">
        <name>Less Effective Mitigations</name>
        <t>There was substantial discussion around the design and effectiveness of the mitigations defined in <xref target="I-D.ietf-radext-deprecating-radius"/>.  This section outlines some obvious mitigations which were considered and rejected.  As protocol design is subject to a complex series of trade-offs, it is useful to explain what those alternative mitigations are, and why they were rejected.</t>
        <t>An alternative configuration flag with a similar effect to the “limit Proxy-State” flag could be one called “this client is a NAS, and will never send Proxy-State”.  The intention for such a flag would be to clearly separate RADIUS proxies (which always send Proxy-State), from NASes (which will never send Proxy-State).  When the flag is set for a client, the server could then discard Access-Request packets which contain Proxy-State.  Alternatively, the server could also discard Proxy-State from all responses sent to that client.</t>
        <t>Such a flag, however, depends on network topology, and fails to correct the underlying lack of packet authenticity and integrity.  The flag may also work for one NAS, but it is likely to be incorrect if the NAS is replaced by a proxy.  Where there are multiple different pieces of NAS equipment behind a NAT gateway, the flag is also likely to be correct for some packets, and incorrect for others.</t>
        <t>Using configuration flags which control the desired outcome is preferable to using flags which depend on network topology that is outside of the control of clients and servers.</t>
      </section>
      <section anchor="non-mitigations">
        <name>Non-Mitigations</name>
        <t>It may be tempting to come up with other "ad hoc" solutions to this vulnerability which are simpler than the ones outlined in <xref target="I-D.ietf-radext-deprecating-radius"/>.  Such solutions are likely to either break existing RADIUS deployments, or else they will not protect systems from the attack.  The mitigations described in <xref target="I-D.ietf-radext-deprecating-radius"/> not only prevent the attack, they do so without negatively affecting normal RADIUS operation.  There is therefore no reason to use any other methods.</t>
        <t>Other attempted mitigation factors are discussed in the BlastRADIUS document (<xref target="BLAST"/>).  For example, <xref target="BLAST"/> Section 7.4 explains why decreasing timeouts simply increases the cost of the attack without preventing it.  Decreasing timeouts also can negatively affect normal RADIUS traffic.</t>
        <t><xref target="BLAST"/> Section 7.7 explains why clients validating Proxy-State, or looking for unexpected Proxy-State does not protect them from the attack.  The attacker can just change the form of the attack, and bypass those checks.</t>
        <t>There is therefore no reason to implement “ad hoc” solutions when a solution exists which has passed reviews by both the BlastRADIUS cryptographers, and by the relevant RADIUS experts.  There is every reason to believe that cryptographic operations designed by experts and subject to rigorous peer review are better than random guesses made by programmers who lack the relevant cryptographic and RADIUS experience.</t>
        <section anchor="switch-to-other-protocols-is-not-appropriate">
          <name>Switch to Other Protocols is Not Appropriate</name>
          <t>Switching away from RADIUS to another protocol will not protect from the attack, as there is no other protocol which can replace RADIUS.  No other protocol is supported by medium to low-end networking devices for end-user authentication, authorization, and accounting.  Outside of situations where Diameter is used, the choice for nearly every use-case which controls network access is limited to one protocol: RADIUS.</t>
          <t>Despite this reality, some "security" sites have recommended "securing" the network by switching to "alternative" protocols.  Such recommendations are incorrect and inappropriate.</t>
          <t>Diameter <xref target="RFC6733"/> is the closest protocol in functionality to RADIUS, but the Diameter use-case is applicable to large-scale telecommunications and internet service providers (ISPs).  Support for Diameter is rarely present in equipment which is available to consumers or enterprises.  As such, replacing RADIUS with Diameter is not an option.</t>
          <t>Other proposals for protocols to replace RADIUS are even less effective.  TACACS+ <xref target="RFC8907"/> has some overlap with RADIUS for administrator login to network devices, but it cannot be used outside of that limited scope.  TACACS+ does not support 802.1X, end-user authentication, or end-user accounting.  It is therefore impossible for an ISP or enterprise to replace RADIUS with TACACS+.</t>
          <t>Kerberos <xref target="RFC4120"/> is also not a option.  It is most generally used to authenticate applications, when the underlying system already has network access.  Kerberos also does not support 802.1X, and does not support accounting.</t>
          <t>The situation is much the same with any proposal to replace RADIUS with IPsec.  While IPsec does authenticates devices prior to bringing up the VPN, those devices must already have network access.  IPsec also requires that the end-user traffic be transported over the IPsec connection, where RADIUS does not transport any end-user traffic.</t>
          <t>In conclusion, recommendations to use alternate protocols are, at best, misguided.  We do not recommend following any "security" advice which is based on a fundamental misunderstanding of networking protocols.</t>
        </section>
        <section anchor="intrusion-detection-rules">
          <name>Intrusion Detection Rules</name>
          <t>Intrusion detection systems can be updated to detect and/or warn about the BlastRADIUS attack with the following rules.  In the interests of brevity and generality, the rules are written as plain text.</t>
          <ol spacing="normal" type="1"><li>
              <t>Access-Request does not contain a Message-Authenticator attribute.  </t>
              <t>
Action: Warn the administrator that the system is vulnerable, and should be upgraded.</t>
            </li>
            <li>
              <t>Access-Accept, Access-Reject, or Access-Challenge does not contain a Message-Authenticator attribute.  </t>
              <t>
Action: Warn the administrator that the system is vulnerable, and should be upgraded.</t>
            </li>
            <li>
              <t>Access-Accept, Access-Reject, or Access-Challenge contains a Message-Authenticator attribute, but it is not the first attribute in the packet.  </t>
              <t>
Action: Warn the administrator that the system may be vulnerable, and should be upgraded.</t>
            </li>
            <li>
              <t>Access-Request packet received by a RADIUS server contains Proxy-State, when the RADIUS client is a NAS.  </t>
              <t>
Action: Alert that an attack is likely taking place.  </t>
              <t>
Note that the check should be for packets received by the RADIUS server, and not for packets sent by the NAS.  The attack involves packets being modified after they are sent by the NAS, and before they are received by the RADIUS server.</t>
            </li>
            <li>
              <t>Access-Accept, Access-Reject, or Access-Challenge sent by a RADIUS server contain Proxy-State, when the RADIUS client is a NAS.  </t>
              <t>
Action: Alert that an attack is likely taking place.  </t>
              <t>
Note that the check should be for packets sent by the RADIUS server, and not for packets received by the NAS.  The attacker can modify packets to "hide" Proxy-State in another attribute, such as Vendor-Specific.</t>
            </li>
            <li>
              <t>Any RADIUS traffic is sent over UDP or TCP transport, without IPsec or TLS.  </t>
              <t>
Action: Warn that the system uses deprecated transport protocols, and should be upgraded.</t>
            </li>
            <li>
              <t>Any RADIUS traffic is sent external to the organization over UDP or TCP transport, without IPsec or TLS.  </t>
              <t>
Action: Warn that this is an insecure configuration, and can expose users private data, identities, passwords, locations, etc. to unknown attackers.</t>
            </li>
          </ol>
          <t>These rules should assist administrators with ongoing security and monitoring.</t>
        </section>
      </section>
      <section anchor="summary">
        <name>Summary</name>
        <t>The RADIUS protocol as defined in <xref target="RFC2865"/> is vulnerable to an attack due to Access-Request packets being entirely unauthenticated.  This issue has been known and ignored for decades.  It was first raised as a vulnerability in 1998 <xref target="DATTACK"/>, and a fix was rejected in <xref target="RFC2869"/>.  A practicl fix was suggested in 2007 in <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/>, but it took until <xref target="I-D.ietf-radext-deprecating-radius"/> before a fix was mandated,  That mandate only occurred because an exploit was demonstrated in 2024, in <xref target="BLAST"/>.</t>
      </section>
    </section>
    <section anchor="other-radius-problems">
      <name>Other RADIUS Problems</name>
      <t>Independent of the above security and privacy issues, there are a large number of other problems with the RADIUS protocol, and with the historic practices around the use of RADIUS.  This section discusses those problems.</t>
      <section anchor="authentication-methods">
        <name>Authentication Methods</name>
        <t>There are a number of problems with authentication methods that are transported in RADIUS attributes.  Even independent of security issues with a particular authentication method, the choice of authentication method can in fact decrease security, as noted below in <xref target="password-security"/>.</t>
        <section anchor="ms-chap">
          <name>Attacks on MS-CHAP</name>
          <t>MS-CHAP (v1 in <xref target="RFC2433"/> and v2 in <xref target="RFC2759"/>) have major design flaws, and are not suitable for use outside of a secure tunnel such as PEAP, TEAP, or TTLS.  As MS-CHAPv1 is less commonly used, the discussion in this section will focus on MS-CHAPv2, but the same analysis applies to MS-CHAPv1.</t>
          <t>MS-CHAP has been broken since 2004, as seen in <xref target="ASLEAP"/>.  While the attack there mentions LEAP, the same attack applies to MS-CHAP.  This information was apparently insufficiently clear in the <xref target="ASLEAP"/> attack, as and no previous sp=ecification has deprecated MS-CHAP.  As a result, most implementations still support it.</t>
          <t>The attack relies on a vulnerability in the protocol design in <xref section="8.4" sectionFormat="comma" target="RFC2759"/>.  In that section, the response to the MS-CHAP challenge is calculated via three DES operations, which are based on the 16-octet NT-Hash form of the password.  However, the DES operation requires 7 octet keys, so the 16-octet NT-Hash cannot be divided evenly into the 21 octets of keys required for the DES operation.</t>
          <t>The solution in <xref target="RFC2759"/> Section 8.4 was to use the first 7 octets of the NT-Hash for the first DES key, the next 7 octets for the second DES key, leaving only 2 octets for the final DES key.  The final DES key is padded with zeros.  This construction means that an attacker who can observe the MS-CHAP2 exchange only needs to perform 2^16 DES operations in order to determine the final 2 octets of the original NT-Hash.</t>
          <t>If the attacker has a database which correlates known passwords to NT-Hashes, then those two octets can be used to returns a small subset (1/65536) of candidate hashes.  Those hashes are then checked via brute-force operations to see if they match the original MS-CHAPv2 data.  Limiting the number of candidate hashes allows the attacker to use greatly increase the size of precalculated hashes, with minimal additional cost.</t>
          <t>This process lowers the complexity of cracking MS-CHAP by nearly five orders of magnitude as compared to a brute-force attack.  The attack has been demonstrated using databases which contain hundreds of millions of passwords.  On a consumer-grade machine, the time required for such an attack to succeed is on the order of tens of milliseconds.</t>
          <t>While this attack requires a database of known passwords, such databases are easy to find online, or to create locally from generator functions.  Passwords created manually by people are notoriously predictable, and are highly likely to be found in a database of known passwords.  In the extreme case of strong passwords, they will not be found in the database, and the attacker is still required to perform a brute-force dictionary search.</t>
          <t>The result is that MS-CHAP has significantly lower security than PAP.  When the MS-CHAP data is not protected by TLS, it is visible to everyone who can observe the RADIUS traffic.  Attackers who can see the MS-CHAP data can therefore obtain the underlying NT-Hash with essentially zero effort as compared to cracking the RADIUS shared secret.  This attack means that from a cryptographic perspective, using MS-CHAP is essentially the same as sending passwords in clear-text.</t>
        </section>
        <section anchor="chap-password">
          <name>CHAP-Password</name>
          <t>This section describes a viable attack on CHAP, which does not appear to have been published before.</t>
          <t>The contents of CHAP-Password are calculated using MD5 to hash an identifier, a password, and a challenge.  From <xref target="RFC1994"/>:</t>
          <ul empty="true">
            <li>
              <t>The Response Value is the one-way hash calculated over a stream of
octets consisting of the Identifier, followed by (concatenated
with) the "secret", followed by (concatenated with) the Challenge
Value.</t>
            </li>
          </ul>
          <t>That is, the CHAP-Password contents are MD5(ID + password + challenge).  While this construction is different from the one used to sign the Authenticator fields, attacks on CHAP-Password have substantially the same cost as for cracking the RADIUS shared secret (<xref target="cracking"/>).</t>
          <t>That is, checking all 8 character passwords from a 93 character set is possible for a hobbyist in about day.</t>
          <t>The attack is made easier by the human practice of creating insecure passwords.  An attacker can create dictionaries of hashes of potential passwords.  For CHAP-Password, this also means a 256 times increase in dictionary size, due to the need to calculate the prefix of MD5(ID + password).  However, that calculation can be done once, and the results then stored on disk.  The only ongoing cost is the need for more disk space.</t>
          <t>Once the attacker sees a CHAP-Password, the ID field is used to select one of 256 dictionaries, and then every password hash in that dictionary extended with the challenge, and checked against the contents of CHAP-Password.  As these pre-calculated dictionaries generally contain hundreds of millions or low billions of passwords, that number bounds the total number of hashes which need to be checked.</t>
          <t>As noted above in <xref target="cracking"/>, a high-end retail GPU is capable of performing more than 64 billion hashes per second.  Which means that most CHAP-Password attributes can be turned into the equivalent clear-text passwords in sub-second time.  The main gating factor in this attack is the time taken to stream billions of candidate hashes from disk to the GPU.</t>
          <t>This attack means that from a cryptographic perspective, using CHAP-Password is essentially the same as sending passwords in clear-text.</t>
        </section>
        <section anchor="user-password">
          <name>User-Password</name>
          <t>While the obfuscation method used for the User-Password attribute has not been shown to be insecure, it has not been proven to be secure.  The obfuscation method depends on calculating MD5(secret + Request Authenticator), which has a few helpful properties for an attacker.  The cost of brute-forcing short secrets is not large, <xref target="cracking"/> discusses that cost in detail.  Even for longer secrets which are humanly generated, the MD5 state for hashing the secret can be pre-calculated and stored on disk.  This process is relatively inexpensive, even for billions of possible shared secrets.  The Request Authenticator can then be added to each pre-calculated state via brute-force, and compared to the obfuscated User-Password data.</t>
          <t>The MD5 digest is 16 octets long, and many passwords are shorter than that.  This difference means that the final octets of the digest are placed into the User-Password attribute without modification.  The result is that a brute-force attack does not need to decode the User-Password and see if the decoded password "looks reasonable".  Instead, the attacker simply needs to compare the final octets of the calculated digest with the final octets of the User-Password attribute.  The result is a signal which indicates with high probability that the guessed secret is correct.</t>
          <t>The only protection from this particular attack is to ensure that the secret is long, and is derived from a cryptographically strong pseudo-random number generator.  To put it more clearly, if the RADIUS packet is secure due to the use of a strong shared secret, then the User-Password attribute is also secure.</t>
        </section>
        <section anchor="eap">
          <name>EAP</name>
          <t>There are too many EAP methods for them to be discussed here in any detail.  Instead, we can make a few simple observations:</t>
          <ul spacing="normal">
            <li>
              <t>EAP-MD5 is essentially the same as CHAP-Password, and shares the same security analysis.  EAP-MD5 is not suitable for use outside of a secure tunnel such as PEAP, TEAP, or TTLS.</t>
            </li>
            <li>
              <t>EAP-MSCHAPv2 (any variant) is essentially the same as MS-CHAP, and shares the same security analysis.  EAP-MSCHAPv2  is not suitable for use outside of a secure tunnel such as PEAP, TEAP, or TTLS.</t>
            </li>
            <li>
              <t>TLS-based EAP methods (e.g. TTLS, PEAP, etc.) benefit from the security of TLS, and are therefore secure.</t>
            </li>
            <li>
              <t>Other EAP methods are not discussed here.</t>
            </li>
          </ul>
        </section>
        <section anchor="summary-1">
          <name>Summary</name>
          <t>There are no known security issues with User-Password, or with many EAP methods. In contrast, MS-CHAP and CHAP-Password are insecure, and can only be used safely within a TLS tunnel.</t>
          <t>While the "on the wire" encoding of User-Password is secure, the passwords still have to be stored somewhere, typically in a database.  The next section explains how the interaction between authentication methods and password storage methods can increase, or decrease, security of the system as a whole.</t>
        </section>
      </section>
      <section anchor="password-security">
        <name>Password Visibility and Storage</name>
        <t>An attacker can ignore the wire protocol entirely, and bypass all of the issues described earlier in this document.  One such attack is to focus on the database that holds user credentials such as account names and passwords.  At the time of this writing, databases such as <xref target="PWNED"/> claim to have records of over twelve billion user accounts which have been compromised.  User databases are therefore highly sought-after targets.</t>
        <t>The attack discussed in this section is dependent on vulnerabilities with the credential database, and does not assume an attacker can see or modify RADIUS traffic.  As a result, issues raised here apply equally well when TTLS, PEAP, or RADIUS/TLS are used.  The success of the attack depends only on how the credentials are stored in the database.  Since the choice of authentication method affects the way credentials are stored in the database, the security of that dependency needs to be discussed and explained.</t>
        <t>Some organizations may desire to increase the security of their network by avoiding PAP, and using CHAP or MS-CHAP, instead.  These attempts are misguided.  If simple password-based methods must be used, in almost all situations, the security of the network as a whole is increased by using PAP in preference to CHAP or MS-CHAP.  The reason is found through a straightforward risk analysis, which we explain in more detail below.</t>
        <section anchor="pap-security-analysis">
          <name>PAP Security Analysis</name>
          <t>When PAP is used, the User-Password is obfuscated "on the wire", but the RADIUS server sees a clear-text password from the user.  The server then compares that password to credentials which have been stored in a user database, and either accepts or rejects the user.</t>
          <t>In many cases, the credentials stored in the database can be salted and/or hashed in a form which is commonly referred to as being in "crypt"ed form.  The RADIUS server can take the users clear-text password, performs the same "crypt" transformation, and then compares the two "crypt"ed passwords.</t>
          <t>Any compromise of the RADIUS server can result in the compromise of clear-text passwords for users.  However, in most cases, the clear-text password is available only in the memory of the RADIUS server application (i.e. not "on the wire"), and then only for a short period of time.  An attacker who desires to obtain passwords for all users would have to wait for all users to log in, which can take a substantial amount of time.  During that time, an administrator may discover the breach, and resolve the issue.</t>
          <t>When PAP is used, the credentials in the database are stored securely "at rest", presuming that the administrator only stores "crypt"ed credentials.  Any compromise of the database results in the disclosure of minimal information to the attacker.  That is, an attacker cannot easily obtain the clear-text passwords from the compromised database.</t>
          <t>The result is that the user passwords are visible in clear-text only for a short time, and then only on the RADIUS server.  The security of this system is not as good as seen with EAP-pwd <xref target="RFC5931"/> for example, but it is not terrible.</t>
          <t>Storing passwords securely "at rest" is significantly more secure than storing clear-text passwords in a database, even when PAP authentication is used in RADIUS.</t>
        </section>
        <section anchor="chap-and-ms-chap-password-storage">
          <name>CHAP and MS-CHAP Password Storage</name>
          <t>In contrast with PAP, when CHAP or MS-CHAP is used, those methods do not expose a clear-text password to the RADIUS server, but instead a hashed transformation of it.  The design goal of those methods was to make the hash output secure even if an attacker can observe it.  However, as noted above, those methods have been shown to be insecure.</t>
          <t>For the purposes of this section, we will ignore the previous attacks, and instead focus on the implications of using these hashing methods.</t>
          <t>The hash transformations for CHAP and MS-CHAP depend on a random challenge.  The intent was to increase security, but their construction makes strong requirements on the form in which user credentials are stored.</t>
          <t>The process for performing CHAP and MS-CHAP is inverted from the process for PAP.  Using similar terminology as above for illustrative purposes, the "hash"ed passwords are carried in the CHAP method, and are sent to the server.  The server must obtain the clear-text (or NT hashed) password from the database, and then perform the "hash" operation on the password from the database. The two "hash"ed passwords are then compared as was done with PAP.  This inverted process decreases system security substantially.</t>
          <t>Critically, when CHAP or MS-CHAP are used, all credentials must be stored as clear-text (or clear-text equivalent) in the database, all of the time.  Even if the database contents are encrypted, the decryption keys are necessarily accessible to the application which reads that database.  Any compromise of the application means that the entire database can be immediately read and exfiltrated as a whole.  The attacker then has complete access to all user identities, and all associated clear-text passwords.</t>
          <t>It should go without saying that having an attacker obtain all clear-text passwords is more of an issue than having the same attacker obtain passwords in a "crypt"ed form.  Similarly, it is more secure for a RADIUS server to have limited clear-text passwords (i.e. some of the time), rather than having unlimited access to all of the clear-text passwords, all of the time.</t>
        </section>
        <section anchor="on-the-wire-user-password-versus-chap-password">
          <name>On-the-wire User-Password versus CHAP-Password</name>
          <t>There is one more security myth which should be put to rest about PAP versus CHAP.  There is a common belief that CHAP is more secure, because passwords are sent "in the clear" via the User-Password attribute.  This belief is false.</t>
          <t>The User-Password attribute is obfuscated when it is sent in an Access-Request packet, using keyed MD5 and the shared secret, as defined in <xref section="5.2" sectionFormat="comma" target="RFC2865"/>.  At the time of this writing, no attack better than brute force has been found which allows an attacker to reverse this obfuscation.</t>
          <t>There have been claims that it is preferable to use CHAP-Password as it does not "send the password in clear-text".  This preference is based on a misunderstanding of how CHAP-Password and User-Password attributes are calculated.</t>
          <t>The CHAP-Password attribute depends on the hash of a visible Request Authenticator (or CHAP-Challenge) and the users password.  The obfuscated User-Password depends on the same Request Authenticator, and on the RADIUS shared secret.  For an attacker, the difference between the two calculations is minimal.  Presuming that the user password has similar complexity to the shared secret, they can both be attacked with similar amounts of effort.   As a result, any security analysis which makes the claim that "User-Password insecure because it uses MD5" ignores the fact that the CHAP-Password attribute is constructed through substantially the same method.</t>
          <t>The difference in security between the two methods is due instead to the practice of people creating their own insecure password, versus a RADIUS administrator creating a strong shared secret.  The CHAP-Password contents depends only on the strength of the users chosen password.  The User-Password contents instead depends on both the RADIUS shared secret, and on the users password.  As such, even though their constructs are roughly similar, in practice User-Password is significantly more secure than CHAP-Password.</t>
          <t>An attacker who can crack one users password can gain network access as that user, or even administrator access to network devices.  In contrast, an attacker who can crack the shared secret can gain network access as any user, and perform any authorization.  The result is that it is more valuable to crack shared secrets, even if the underlying attacks are similar.</t>
        </section>
        <section anchor="pap-vs-chap">
          <name>PAP vs CHAP Conclusions</name>
          <t>A careful security analysis shows that for all of PAP, CHAP, and MS-CHAP, the RADIUS server must at some point have access to the clear-text version of the password.  As a result, there is minimal difference in risk exposure between the different authentication methods if a RADIUS server is compromised.</t>
          <t>However, when PAP is used, the user credentials can be stored securely "at rest" in a database, while this secure storage is impossible with CHAP and MS-CHAP.  There is therefore a substantial difference in risk exposure between the different authentication methods, with PAP offering substantially higher security due to its ability to secure passwords at rest via the "crypt" construct mentioned above.</t>
          <t>In contrast, CHAP or MS-CHAP are highly insecure, as any database compromise results in the immediate exposure of the clear-text passwords for all users.  The security of those methods are best described as near zero, independent of any database compromise.  The construction of MS-CHAP makes it easier to crack than CHAP-Password, which makes MS-CHAP the worst of all possible choices.</t>
          <t>This security difference is shown not just in the <xref target="PWNED"/> database, but also in attacks on RADIUS systems <xref target="EXPLOIT"/>, where attackers identified a vulnerable RADIUS system, and then:</t>
          <ul empty="true">
            <li>
              <t>utilized SQL commands to dump the credentials [T1555], which contained both clear-text and hashed passwords for user and administrative accounts.</t>
            </li>
          </ul>
          <t>The attack proceeded to leverage those passwords to gain more permissions:</t>
          <ul empty="true">
            <li>
              <t>Having gained credentials from the RADIUS server, PRC state-sponsored cyber actors used those credentials with custom automated scripts to authenticate to a router via Secure Shell (SSH), execute router commands, and save the output.</t>
            </li>
          </ul>
          <t>This attack is only possible when systems store clear-text passwords.</t>
          <t>The result is that when the system as a whole is taken into account, the risk of password compromise is substantially less with PAP than with CHAP or MS-CHAP.  Administrators should therefore prefer PAP over CHAP or MS-CHAP.  Administrators should also store passwords "at rest" in a secure form (salted, hashed), as with the "crypt" format discussed above.</t>
          <t>That being said, other authentication methods such as EAP-TLS <xref target="RFC9190"/> and EAP-pwd <xref target="RFC5931"/> do not expose clear-text passwords to the RADIUS server or to any intermediate proxy.  Those methods therefore lower the risk of password exposure even more than using PAP.</t>
          <t>The conclusion is that administrators should avoid password-based authentication methods where at all possible.  If passwords ahve to be used, wrap them in TLS (e.g. TTLS or PEAP).  Where TLS cannot be used, prefer User-Password to CHAP-Password or MS-CHAP.</t>
        </section>
        <section anchor="the-weakest-link">
          <name>The Weakest Link</name>
          <t>RADIUS security is done on a “hop by hop” basis, which means that an attacker can take advantage of the weakest link in a proxy chain in order to attack other systems which have fully implemented the above mitigations.  If the packets are passed through one or more proxies, then any one vulnerable proxy will still allow the attack to take place.</t>
          <t>If proxies are used, then the weakest link in the proxy chain limits the security of the entire chain. That is, it does not matter if one hop implements RadSec, if another hop implements RADIUS/UDP without sending or requiring Message-Authenticator.</t>
          <t>Even worse, proxies have full control over packet contents.  A malicious proxy can change a reject into an accept, and can add or delete any authorization attributes it desires.  While proxies are generally part of a trusted network, there is every benefit in limiting the number of participants in the RADIUS conversation.</t>
          <t>Proxy chains SHOULD therefore be avoided where possible, and <xref target="RFC7585"/> dynamic discovery should be used where possible.  RADIUS clients and servers SHOULD also be configured with static IP addresses, and with static routes.  This static configuration also protects the systems from DHCP related attacks where an attacker spoofs DHCP to cause clients or servers to route packets through the a system of the attackers choice.</t>
        </section>
      </section>
      <section anchor="proxy-state">
        <name>Note on Proxy-State</name>
        <t>As the BlastRADIUS paper points out in Appendix A:</t>
        <ul empty="true">
          <li>
            <t>The presence of this attribute makes the protocol vulnerability much simpler to exploit than it would have been otherwise.</t>
          </li>
        </ul>
        <t>To see why Proxy-State has this particular design, we go back to the original discussion in May 1995 <xref target="MAY-1995"/></t>
        <ul empty="true">
          <li>
            <t>The RADIUS proxy may place any state information (subject to the length
limitations of a RADIUS attribute) that it will need to transform a
reply from its server into a reply to its client.  This is typically
the original authenticator, identifier, IP address and UDP port number
of the proxy's RADIUS client.</t>
          </li>
        </ul>
        <t>There appear to be few, if any, RADIUS servers which implemented this suggestion.  In part because later discussions note:</t>
        <ul empty="true">
          <li>
            <t>This works only if the NAS is
prepared to accept replies from a proxy server for a request issued to
a different server.</t>
          </li>
        </ul>
        <t>This stateless proxy design has a number of additional issues, most notably violating the <xref target="RFC3539"/> "end-to-end" principle.  It therefore negatively impacts the stability of a RADIUS proxy system.</t>
        <t>This definition for Proxy-State later changed in <xref section="5.33" sectionFormat="comma" target="RFC2865"/> to</t>
        <ul empty="true">
          <li>
            <t>Usage of the Proxy-State Attribute is implementation dependent.  A
description of its function is outside the scope of this
specification.</t>
          </li>
        </ul>
        <t>In practice, the utility of Proxy-State is limited to detecting proxy loops.  Proxies can count the number of Proxy-State attributes in received packets, and if the total is more than some number, then a proxy loop is likely.  We offer no advice on what to do if a proxy loop is detected, as RADIUS has no ability to signal protocol-layer errors.</t>
        <t>It is likely that a "hop count" attribute would likely have been simpler to implement.  But even in 1996, it was likely difficult to change the behavior of proxies due to multiple implementations.</t>
      </section>
    </section>
    <section anchor="other-protocol-failures">
      <name>Other Protocol Failures</name>
      <t>There are many other issues with RADIUS which are not directly related to security or privacy, but still have negative affects on security, privacy, and on operation of the protocol.  At of the time of writing, those issues are being collated in <xref target="ISSUES"/>.</t>
      <t>Although the focus of this document is a review of RADIUS security, it is still important to discuss problems with the protocol in general.  For example, there is implicitly a RADIUS state machine which correlates multiple types of packets, but that state machine is not defined anywhere.  There are common practices which are secure but which are operationally expensive.  RADIUS accounting is known to be inaccurate and is often inconsistent, as seen in <xref target="WBA-ACCT"/></t>
      <t>Some of the issues noted in the above Wiki could potentially have security impact.  For example, if a RADIUS server is not implemented correctly, an attacker can perform a resource exhaustion attack on it, and effectively take it offline.  Proxies are subject to Denial of Service attacks even from trusted clients, because those clients originate packets at the request of untrusted and unknown users.  Rate limiting for RADIUS requests is a poorly tested or documented process, and largely relies on mutual trust of administrators.</t>
      <section anchor="accounting-is-imperfect">
        <name>Accounting Is Imperfect</name>
        <t>The use of RADIUS/UDP for accounting means that accounting is inherently unreliable.  Unreliable accounting means that different entities in the network can have different views of accounting traffic.  These differences can have multiple impacts, including incorrect views of who is on the network, to disagreements about financial obligations.  These issues are discussed in substantial detail in <xref target="RFC2975"/>, and we do not repeat those discussions here.  We do, however, summarize a few key issues.  Sites which use accounting SHOULD be aware of the issues raised in <xref target="RFC2975"/>, and the limitations of the suggested solutions.</t>
        <t>Using a reliable transport such as RADIUS/TLS makes it more likely that accounting packets are delivered, and that acknowledgments to those packets are received.  Reducing the number of proxies means that there are fewer disparate systems which need to have their accounting data reconciled.  Using non-volatile storage for accounting packets means that a system can reboot with minimal loss of accounting data.  Using interim accounting updates means that transient network issues or data losses can be corrected by later updates.</t>
        <t>As RADIUS does not provide for end-to-end signaling or transport, using RADIUS/TLS provides for reliable transport only when the client originating the accounting traffic is connected directly to the server which records it.  If there are instead one or more proxies involved, the proxies increase overall unreliability.</t>
        <t>Systems which perform accounting are also subject to significant operational loads.  Wheres authentication and authorization may use multiple packets, those packets are sent at session start, and then never again.  In contrast, accounting packets can be sent for the lifetime of a session, which may be hours or even days.  There is a large cost to receiving, processing, and storing volumes of accounting data.</t>
        <t>However, even with all of the above concerns addressed, accounting is still imperfect.  The obvious way to increase the accuracy of accounting data is to increase the rate at which interim updates are sent, but doing so also increases the load on the servers which process the accounting data.  At some point, the trade-off of cost versus benefit becomes negative.</t>
        <t>There is no perfect solution here.  Instead, there are simply a number of imperfect trade-offs.</t>
        <section anchor="incorrect-accounting-data">
          <name>Incorrect Accounting Data</name>
          <t>Even if all accounting packets were delivered and stored without error, there is no guarantee that the contents of those packets are in any way reasonable.  The Wireless Broadband Alliance RADIUS Accounting Assurance <xref target="WBA"/> group has been investigating these issues.  While the results are not yet public, a presentation on the topic was made at IETF 118 in the RADEXT working group <xref target="WBA-ACCT"/>.</t>
          <t>The data presented indicated that the WBA saw just about every possible counter attribute in RADIUS accounting packets as containing data which was blatantly wrong or contradictory.  One example is extremely short sessions which have impossibly large amounts of data being downloaded.  Other accounting packets allege that large amounts of data were downloaded via octet counters, while at the same time claiming negligible packet counters, leading to absurdly large packet sizes.</t>
          <t>The only conclusion from this analysis is that some RADIUS clients act as if it is better to produce incorrect accounting data rather than to produce no data at all.  This failure to follow reasonable practices is expensive for network operators.  In effect, vendors have offset their costs to produce quality data onto their customers, who have to take difficult and uncertain steps in order to sanitize or verify the confusing data which vendors provide in accounting packets.</t>
          <t>It should go without saying that accounting systems need to produce correct data.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The primary focus of this document is documenting historic privacy and security considerations for RADIUS.</t>
      <t>The use of insecure transport protocols for RADIUS means that personally identifying information is sent "in the clear".  As noted earlier in this document, such information can include MAC addresses, user identifiers, and user locations.</t>
      <t>In addition, this document suggests ways to increase privacy by minimizing the use and exchange of PII.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The primary focus of this document is documenting historic privacy and security considerations for RADIUS.</t>
      <t>The BlastRADIUS vulnerability is the result of RADIUS security being a low priority for decades.  Even the recommendation of <xref section="2.2.2" sectionFormat="comma" target="RFC5080"/> that all clients add Message-Authenticator to all Access-Request packets was ignored by nearly all implementers.  If that recommendation had been followed, then the BlastRADIUS vulnerability notification would have been little more than "please remember to set the require Message-Authenticator flag on all RADIUS servers."</t>
      <t>Similarly, the MS-CHAP, was not officially deprecated, even though it has been proven to be insecure for decades.  This continued use of MS-CHAP has likely resulted in the leaking of many the clear-text passwords for many users.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to the many reviewers and commenters for raising topics to discuss, and for providing insight into the issues related to increasing the security of RADIUS.  In no particular order, thanks to Margaret Cullen, Alexander Clouter, and Josh Howlett.</t>
      <t>Many thanks to Nadia Heninger and the rest of the BlastRADIUS team, along with Heikki Vatiainen, for extensive discussions and feedback about that issue.</t>
      <t>The author is deeply indebted to the late Bernard Aboba for decades of advice and guidance.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>00 - copy from draft-ietf-radext-deprecating-radius, and edit to contain only historical review contents.</t>
        </li>
        <li>
          <t>01 - word smithing and updated analysis of CHAP-Password.</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="BCP14">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC6421">
          <front>
            <title>Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS)</title>
            <author fullname="D. Nelson" initials="D." role="editor" surname="Nelson"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This memo describes the requirements for a crypto-agility solution for Remote Authentication Dial-In User Service (RADIUS). This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6421"/>
          <seriesInfo name="DOI" value="10.17487/RFC6421"/>
        </reference>
        <reference anchor="I-D.ietf-radext-radiusdtls-bis">
          <front>
            <title>RadSec: RADIUS over Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Jan-Frederik Rieckers" initials="J." surname="Rieckers">
              <organization>Deutsches Forschungsnetz | German National Research and Education Network</organization>
            </author>
            <author fullname="Margaret Cullen" initials="M." surname="Cullen">
              <organization>Painless Security</organization>
            </author>
            <author fullname="Stefan Winter" initials="S." surname="Winter">
              <organization>Fondation Restena | Restena Foundation</organization>
            </author>
            <date day="23" month="February" year="2026"/>
            <abstract>
              <t>   This document defines transport profiles for running RADIUS over
   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS), allowing the secure and reliable transport of RADIUS
   messages.  RADIUS/TLS and RADIUS/DTLS are collectively referred to as
   RadSec.

   This document obsoletes RFC6614 and RFC7360, which specified
   experimental versions of RADIUS over TLS and DTLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-radiusdtls-bis-15"/>
        </reference>
        <reference anchor="I-D.ietf-radext-deprecating-radius">
          <front>
            <title>Deprecating Insecure Practices in RADIUS</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>InkBridge Networks</organization>
            </author>
            <date day="15" month="March" year="2026"/>
            <abstract>
              <t>   RADIUS crypto-agility was first mandated as future work by RFC 6421.
   The outcome of that work was the publication of RADIUS over TLS (RFC
   6614) and RADIUS over DTLS (RFC 7360) as experimental documents.
   Those transport protocols have been in wide-spread use for many years
   in a wide range of networks, and have recently been standardized in
   [I-D.ietf-radext-radiusdtls-bis].  TLS has proven to be a useful
   replacment for UDP (RFC 2865) and TCP (RFC 6613) transports.  With
   that knowledge, the continued use of insecure transports for RADIUS
   has serious and negative implications for privacy and security.

   The publication of the "BlastRADIUS" exploit has also shown that
   RADIUS security needs to be updated.  It is no longer acceptable for
   RADIUS to rely on MD5 for security.  It is no longer acceptable to
   send device or location information in clear text across the wider
   Internet.  This document therefore deprecates many insecure practices
   in RADIUS, and mandates support for secure TLS-based transport
   layers.  Related security issues with RADIUS are discussed, and
   recommendations are made for practices which increase both security
   and privacy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-deprecating-radius-09"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1321">
          <front>
            <title>The MD5 Message-Digest Algorithm</title>
            <author fullname="R. Rivest" initials="R." surname="Rivest"/>
            <date month="April" year="1992"/>
            <abstract>
              <t>This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1321"/>
          <seriesInfo name="DOI" value="10.17487/RFC1321"/>
        </reference>
        <reference anchor="RFC2433">
          <front>
            <title>Microsoft PPP CHAP Extensions</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="S. Cobb" initials="S." surname="Cobb"/>
            <date month="October" year="1998"/>
            <abstract>
              <t>The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP defines an extensible Link Control Protocol and a family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2433"/>
          <seriesInfo name="DOI" value="10.17487/RFC2433"/>
        </reference>
        <reference anchor="RFC2759">
          <front>
            <title>Microsoft PPP CHAP Extensions, Version 2</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="January" year="2000"/>
            <abstract>
              <t>This document describes version two of Microsoft's PPP CHAP dialect (MS-CHAP-V2). MS-CHAP-V2 is similar to, but incompatible with, MS-CHAP version one (MS-CHAP-V1). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2759"/>
          <seriesInfo name="DOI" value="10.17487/RFC2759"/>
        </reference>
        <reference anchor="RFC2866">
          <front>
            <title>RADIUS Accounting</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying accounting information between a Network Access Server and a shared Accounting Server. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2866"/>
          <seriesInfo name="DOI" value="10.17487/RFC2866"/>
        </reference>
        <reference anchor="RFC2868">
          <front>
            <title>RADIUS Attributes for Tunnel Protocol Support</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="D. Leifer" initials="D." surname="Leifer"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="J. Shriver" initials="J." surname="Shriver"/>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
            <author fullname="I. Goyret" initials="I." surname="Goyret"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document defines a set of RADIUS (Remote Authentication Dial In User Service) attributes designed to support the provision of compulsory tunneling in dial-up networks. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2868"/>
          <seriesInfo name="DOI" value="10.17487/RFC2868"/>
        </reference>
        <reference anchor="RFC3579">
          <front>
            <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3579"/>
          <seriesInfo name="DOI" value="10.17487/RFC3579"/>
        </reference>
        <reference anchor="RFC5176">
          <front>
            <title>Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="M. Chiba" initials="M." surname="Chiba"/>
            <author fullname="G. Dommety" initials="G." surname="Dommety"/>
            <author fullname="M. Eklund" initials="M." surname="Eklund"/>
            <author fullname="D. Mitton" initials="D." surname="Mitton"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a currently deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products. This includes support for disconnecting users and changing authorizations applicable to a user session. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5176"/>
          <seriesInfo name="DOI" value="10.17487/RFC5176"/>
        </reference>
        <reference anchor="RFC5580">
          <front>
            <title>Carrying Location Objects in RADIUS and Diameter</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
              <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5580"/>
          <seriesInfo name="DOI" value="10.17487/RFC5580"/>
        </reference>
        <reference anchor="RFC6151">
          <front>
            <title>Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="L. Chen" initials="L." surname="Chen"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document updates the security considerations for the MD5 message digest algorithm. It also updates the security considerations for HMAC-MD5. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6151"/>
          <seriesInfo name="DOI" value="10.17487/RFC6151"/>
        </reference>
        <reference anchor="RFC6218">
          <front>
            <title>Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material</title>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="T. Zhang" initials="T." surname="Zhang"/>
            <author fullname="J. Walker" initials="J." surname="Walker"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines a set of vendor-specific RADIUS Attributes designed to allow both the secure transmission of cryptographic keying material and strong authentication of any RADIUS message. These attributes have been allocated from the Cisco vendor-specific space and have been implemented by multiple vendors. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6218"/>
          <seriesInfo name="DOI" value="10.17487/RFC6218"/>
        </reference>
        <reference anchor="RFC6613">
          <front>
            <title>RADIUS over TCP</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Server (RADIUS) protocol has, until now, required the User Datagram Protocol (UDP) as the underlying transport layer. This document defines RADIUS over the Transmission Control Protocol (RADIUS/TCP), in order to address handling issues related to RADIUS over Transport Layer Security (RADIUS/TLS). It permits TCP to be used as a transport protocol for RADIUS only when a transport layer such as TLS or IPsec provides confidentiality and security. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6613"/>
          <seriesInfo name="DOI" value="10.17487/RFC6613"/>
        </reference>
        <reference anchor="RFC6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Hansen" initials="M." surname="Hansen"/>
            <author fullname="R. Smith" initials="R." surname="Smith"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7360">
          <front>
            <title>Datagram Transport Layer Security (DTLS) as a Transport Layer for RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="September" year="2014"/>
            <abstract>
              <t>The RADIUS protocol defined in RFC 2865 has limited support for authentication and encryption of RADIUS packets. The protocol transports data in the clear, although some parts of the packets can have obfuscated content. Packets may be replayed verbatim by an attacker, and client-server authentication is based on fixed shared secrets. This document specifies how the Datagram Transport Layer Security (DTLS) protocol may be used as a fix for these problems. It also describes how implementations of this proposal can coexist with current RADIUS systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7360"/>
          <seriesInfo name="DOI" value="10.17487/RFC7360"/>
        </reference>
        <reference anchor="I-D.tomas-openroaming">
          <front>
            <title>WBA OpenRoaming Wireless Federation</title>
            <author fullname="Bruno Tomas" initials="B." surname="Tomas">
              <organization>Wireless Broadband Alliance, Inc.</organization>
            </author>
            <author fullname="Mark Grayson" initials="M." surname="Grayson">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Necati Canpolat" initials="N." surname="Canpolat">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Elizabeth A Cockrell" initials="B." surname="Cockrell">
              <organization>Independent</organization>
            </author>
            <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
              <organization>Cisco Systems</organization>
            </author>
            <date day="23" month="January" year="2026"/>
            <abstract>
              <t>   This document describes the Wireless Broadband Alliance's OpenRoaming
   system.  The OpenRoaming architecture enables a seamless onboarding
   experience for devices connecting to access networks that are part of
   the federation of access networks and identity providers.  The
   primary objective of this document is to describe the protocols that
   form the foundation for this architecture, enabling providers to
   correctly configure their equipment to support interoperable
   OpenRoaming signalling exchanges.  In addition, the topic of
   OpenRoaming has been raised in different IETF working groups, and
   therefore a secondary objective is to assist those discussions by
   describing the federation organization and framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tomas-openroaming-07"/>
        </reference>
        <reference anchor="BLAST" target="https://www.blastradius.fail/pdf/radius.pdf">
          <front>
            <title>RADIUS/UDP Considered Harmful</title>
            <author initials="" surname="Goldberg, S , et al" fullname="Golberg, Sharon, et. al">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DATTACK" target="https://www.ietf.org/ietf-ftp/ietf-mail-archive/radius/1998-11.mail">
          <front>
            <title>CHAP and Shared Secret</title>
            <author initials="A." surname="DeKok" fullname="Alan DeKok">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MD5-1996" target="https://www.ietf.org/ietf-ftp/ietf-mail-archive/radius/1998-02">
          <front>
            <title>MD5 Key recovery attack</title>
            <author initials="I. R. W." surname="group" fullname="IETF RADIUS Working group">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MAY-1995" target="http://ftp.cerias.purdue.edu/pub/doc/network/radius/archive/ietf-radius.9506">
          <front>
            <title>Proxy-State radius extension to support stateless proxies</title>
            <author initials="M." surname="O'Dell" fullname="Mike O'Dell">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EDUROAM" target="https://eduroam.org">
          <front>
            <title>eduroam</title>
            <author initials="" surname="eduroam" fullname="eduroam">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EXPLOIT" target="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-158a">
          <front>
            <title>People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices</title>
            <author initials="A. C. D." surname="Agency" fullname="America's Cyber Defense Agency">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BRIGGS" target="https://www.fcc.gov/ecfs/document/10427582404839/1">
          <front>
            <title>Comments on the FCC’s Public Notice DA 24-308 on SS7 and Diameter Vulnerabilities</title>
            <author initials="K." surname="Briggs" fullname="Kevin Briggs">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="HASHCLASH" target="https://github.com/cr-marcstevens/hashclash">
          <front>
            <title>Project HashClash - MD5 &amp; SHA-1 cryptanalytic toolbox</title>
            <author initials="M." surname="Stevens" fullname="Marc Stevens">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OPENROAMING" target="https://wballiance.com/openroaming/">
          <front>
            <title>OpenRoaming: One global Wi-Fi network</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WIFILOC" target="https://www.wi-fi.org/discover-wi-fi/wi-fi-location">
          <front>
            <title>Accurate indoor location with Wi-Fi connectivity</title>
            <author initials="W.-F." surname="Alliance" fullname="Wi-Fi Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPOOFING" target="https://networkradius.com/articles/2021/08/04/wifi-spoofing.html">
          <front>
            <title>Wi-Fi Spoofing for Fun and Profit</title>
            <author initials="A." surname="Cudbard-Bell" fullname="Arran Cudbard-Bell">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ASLEAP" target="https://github.com/joswr1ght/asleap">
          <front>
            <title>asleap - recovers weak LEAP and PPTP passwords</title>
            <author initials="J." surname="Wright" fullname="Joshua Wright">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WBA" target="https://wballiance.com/radius-accounting-assurance/">
          <front>
            <title>RADIUS Accounting Assurance</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WBA-ACCT" target="https://youtu.be/wwmYSItcQt0?t=3953">
          <front>
            <title>RADIUS Accounting Assurance at IETF 118</title>
            <author initials="W. B." surname="Alliance" fullname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PWNED" target="https://haveibeenpwned.com/">
          <front>
            <title>Have I been Pwned</title>
            <author initials="T." surname="Hunt" fullname="Troy Hunt">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ISSUES" target="https://github.com/radext-wg/issues-and-fixes-2/wiki">
          <front>
            <title>Issues and Fixes 2</title>
            <author initials="" surname="RADEXT" fullname="IETF RADEXT Working Group">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC5080">
          <front>
            <title>Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes</title>
            <author fullname="D. Nelson" initials="D." surname="Nelson"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="December" year="2007"/>
            <abstract>
              <t>This document describes common issues seen in Remote Authentication Dial In User Service (RADIUS) implementations and suggests some fixes. Where applicable, ambiguities and errors in previous RADIUS specifications are clarified. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5080"/>
          <seriesInfo name="DOI" value="10.17487/RFC5080"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="RFC7525">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="R. Holz" initials="R." surname="Holz"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC2869">
          <front>
            <title>RADIUS Extensions</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="W. Willats" initials="W." surname="Willats"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes additional attributes for carrying authentication, authorization and accounting information between a Network Access Server (NAS) and a shared Accounting Server using the Remote Authentication Dial In User Service (RADIUS) protocol described in RFC 2865 and RFC 2866. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2869"/>
          <seriesInfo name="DOI" value="10.17487/RFC2869"/>
        </reference>
        <reference anchor="RFC6280">
          <front>
            <title>An Architecture for Location and Location Privacy in Internet Applications</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Cooper" initials="A." surname="Cooper"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>Location-based services (such as navigation applications, emergency services, and management of equipment in the field) need geographic location information about Internet hosts, their users, and other related entities. These applications need to securely gather and transfer location information for location services, and at the same time protect the privacy of the individuals involved. This document describes an architecture for privacy-preserving location-based services in the Internet, focusing on authorization, security, and privacy requirements for the data formats and protocols used by these services. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="160"/>
          <seriesInfo name="RFC" value="6280"/>
          <seriesInfo name="DOI" value="10.17487/RFC6280"/>
        </reference>
        <reference anchor="RFC6733">
          <front>
            <title>Diameter Base Protocol</title>
            <author fullname="V. Fajardo" initials="V." role="editor" surname="Fajardo"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <author fullname="G. Zorn" initials="G." role="editor" surname="Zorn"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The Diameter base protocol is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations. This document specifies the message format, transport, error reporting, accounting, and security services used by all Diameter applications. The Diameter base protocol as defined in this document obsoletes RFC 3588 and RFC 5719, and it must be supported by all new Diameter implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6733"/>
          <seriesInfo name="DOI" value="10.17487/RFC6733"/>
        </reference>
        <reference anchor="RFC6677">
          <front>
            <title>Channel-Binding Support for Extensible Authentication Protocol (EAP) Methods</title>
            <author fullname="S. Hartman" initials="S." role="editor" surname="Hartman"/>
            <author fullname="T. Clancy" initials="T." surname="Clancy"/>
            <author fullname="K. Hoeper" initials="K." surname="Hoeper"/>
            <date month="July" year="2012"/>
            <abstract>
              <t>This document defines how to implement channel bindings for Extensible Authentication Protocol (EAP) methods to address the "lying Network Access Service (NAS)" problem as well as the "lying provider" problem. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6677"/>
          <seriesInfo name="DOI" value="10.17487/RFC6677"/>
        </reference>
        <reference anchor="RFC7930">
          <front>
            <title>Larger Packets for RADIUS over TCP</title>
            <author fullname="S. Hartman" initials="S." surname="Hartman"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The RADIUS-over-TLS experiment described in RFC 6614 has opened RADIUS to new use cases where the 4096-octet maximum size limit of a RADIUS packet proves problematic. This specification extends the RADIUS-over-TCP experiment (RFC 6613) to permit larger RADIUS packets. This specification compliments other ongoing work to permit fragmentation of RADIUS authorization information. This document registers a new RADIUS code, an action that required IESG approval.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7930"/>
          <seriesInfo name="DOI" value="10.17487/RFC7930"/>
        </reference>
        <reference anchor="RFC8907">
          <front>
            <title>The Terminal Access Controller Access-Control System Plus (TACACS+) Protocol</title>
            <author fullname="T. Dahm" initials="T." surname="Dahm"/>
            <author fullname="A. Ota" initials="A." surname="Ota"/>
            <author fullname="D.C. Medway Gash" initials="D.C." surname="Medway Gash"/>
            <author fullname="D. Carrel" initials="D." surname="Carrel"/>
            <author fullname="L. Grant" initials="L." surname="Grant"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document describes the Terminal Access Controller Access-Control System Plus (TACACS+) protocol, which is widely deployed today to provide Device Administration for routers, network access servers, and other networked computing devices via one or more centralized servers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8907"/>
          <seriesInfo name="DOI" value="10.17487/RFC8907"/>
        </reference>
        <reference anchor="RFC4120">
          <front>
            <title>The Kerberos Network Authentication Service (V5)</title>
            <author fullname="C. Neuman" initials="C." surname="Neuman"/>
            <author fullname="T. Yu" initials="T." surname="Yu"/>
            <author fullname="S. Hartman" initials="S." surname="Hartman"/>
            <author fullname="K. Raeburn" initials="K." surname="Raeburn"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document provides an overview and specification of Version 5 of the Kerberos protocol, and it obsoletes RFC 1510 to clarify aspects of the protocol and its intended use that require more detailed or clearer explanation than was provided in RFC 1510. This document is intended to provide a detailed description of the protocol, suitable for implementation, together with descriptions of the appropriate use of protocol messages and fields within those messages. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4120"/>
          <seriesInfo name="DOI" value="10.17487/RFC4120"/>
        </reference>
        <reference anchor="RFC1994">
          <front>
            <title>PPP Challenge Handshake Authentication Protocol (CHAP)</title>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="August" year="1996"/>
            <abstract>
              <t>This document defines a method for Authentication using PPP, which uses a random Challenge, with a cryptographically hashed Response which depends upon the Challenge and a secret key. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1994"/>
          <seriesInfo name="DOI" value="10.17487/RFC1994"/>
        </reference>
        <reference anchor="RFC5931">
          <front>
            <title>Extensible Authentication Protocol (EAP) Authentication Using Only a Password</title>
            <author fullname="D. Harkins" initials="D." surname="Harkins"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5931"/>
          <seriesInfo name="DOI" value="10.17487/RFC5931"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC3539">
          <front>
            <title>Authentication, Authorization and Accounting (AAA) Transport Profile</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Wood" initials="J." surname="Wood"/>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document discusses transport issues that arise within protocols for Authentication, Authorization and Accounting (AAA). It also provides recommendations on the use of transport by AAA protocols. This includes usage of standards-track RFCs as well as experimental proposals. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3539"/>
          <seriesInfo name="DOI" value="10.17487/RFC3539"/>
        </reference>
        <reference anchor="RFC2975">
          <front>
            <title>Introduction to Accounting Management</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <date month="October" year="2000"/>
            <abstract>
              <t>This document describes and discusses the issues involved in the design of the modern accounting systems. The field of Accounting Management is concerned with the collection the collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2975"/>
          <seriesInfo name="DOI" value="10.17487/RFC2975"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
