RADIUS EXTensions (radext) Internet Drafts


      
 RADIUS/1.1,Leveraging ALPN to remove MD5
 
 draft-ietf-radext-radiusv11-11.txt
 Date: 18/10/2024
 Authors: Alan DeKok
 Working Group: RADIUS EXTensions (radext)
This document defines Application-Layer Protocol Negotiation Extensions for use with RADIUS/TLS and RADIUS/DTLS. These extensions permit the negotiation of an application protocol variant of RADIUS, called "RADIUS/1.1". No changes are made to RADIUS/UDP or RADIUS/ TCP. The extensions allow the negotiation of a transport profile where the RADIUS shared secret is no longer used, and all MD5-based packet authentication and attribute obfuscation methods are removed. This document updates RFC2865, RFC2866, RFC5176, RFC6613, RFC6614, and RFC 7360.
 Operational Considerations for RADIUS and TLS-PSK
 
 draft-ietf-radext-tls-psk-11.txt
 Date: 17/10/2024
 Authors: Alan DeKok
 Working Group: RADIUS EXTensions (radext)
This document provides implementation and operational considerations for using TLS-PSK with RADIUS/TLS (RFC6614) and RADIUS/DTLS (RFC7360). The purpose of the document is to help smooth the operational transition from the use of the RADIUS/UDP to RADIUS/TLS.
 (Datagram) Transport Layer Security ((D)TLS Encryption for RADIUS
 
 draft-ietf-radext-radiusdtls-bis-03.txt
 Date: 21/10/2024
 Authors: Jan-Frederik Rieckers, Stefan Winter
 Working Group: RADIUS EXTensions (radext)
This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP or Datagram Transport Layer Security (DTLS) over UDP as the transport protocol. This enables encrypting the RADIUS traffic as well as dynamic trust relationships between RADIUS servers. The specification obsoletes the experimental specifications in RFC 6614 (RADIUS/TLS) and RFC 7360 (RADIUS/DTLS) and combines them in this specification.
 Deprecating Insecure Practices in RADIUS
 
 draft-ietf-radext-deprecating-radius-05.txt
 Date: 26/11/2024
 Authors: Alan DeKok
 Working Group: RADIUS EXTensions (radext)
RADIUS crypto-agility was first mandated as future work by RFC 6421. The outcome of that work was the publication of RADIUS over TLS (RFC 6614) and RADIUS over DTLS (RFC 7360) as experimental documents. Those transport protocols have been in wide-spread use for many years in a wide range of networks. They have proven their utility as replacements for the previous UDP (RFC 2865) and TCP (RFC 6613) transports. With that knowledge, the continued use of insecure transports for RADIUS has serious and negative implications for privacy and security. The recent publication of the "BlastRADIUS" exploit has also shown that RADIUS security needs to be updated. It is no longer acceptable for RADIUS to rely on MD5 for security. It is no longer acceptable to send device or location information in clear text across the wider Internet. This document therefore deprecates many insecure practices in RADIUS, and mandates support for secure TLS-based transport layers. We also discuss related security issues with RADIUS, and give recommendations for practices which increase both security and privacy.


data-group-menu-data-url="/group/groupmenu.json">

Skip to main content

RADIUS EXTensions (radext)

WG Name RADIUS EXTensions
Acronym radext
Area Security Area (sec)
State Active
Charter charter-ietf-radext-07 Approved
Document dependencies
Additional resources Github RADIUS repo
Issue tracker
Wiki
Wiki tracking problems with RADIUS
Personnel Chairs Margaret Cullen, Valery Smyslov
Area Director Paul Wouters
Delegate Alan DeKok
Mailing list Address radext@ietf.org
To subscribe https://www.ietf.org/mailman/listinfo/radext
Archive https://mailarchive.ietf.org/arch/browse/radext/
Chat Room address https://zulip.ietf.org/#narrow/stream/radext

Charter for Working Group

The RADIUS Extensions Working Group will focus on extensions to the
RADIUS protocol. To ensure backward compatibility with existing RADIUS
implementations, as well as compatibility between RADIUS and Diameter,
all documents produced must specify means of interoperation with legacy
RADIUS. Any non-backwards compatibility changes with existing RADIUS
RFCs, including RFCs 2865-2869, 3162, 3575, 3579, 3580, 4668-4673,4675,
5080, 5090, 5176 and 6158 must be justified. Transport profiles should
be compatible with RFC 3539, with any non-backwards compatibility changes
justified.

The WG will review its existing RFCs' document track categories and
where necessary or useful change document tracks, with minor changes in
the documents if needed.

Work Items

The immediate goals of the RADEXT working group are:

  • Deprecating the use of insecure transports outside of secure
    networks. This work updates RFC 6421.

  • Bring RFC 6614 (RADIUS/TLS), and RFC 7360 (RADIUS/DTLS) to
    Standards track.

  • Define best practices for using TLS-PSK with TLS-based transport.

  • Define best practices for RADIUS roaming, and roaming consortia
    based on experience with RADIUS/TLS.

  • Improve operations for multi-hop RADIUS networks: e.g. loop detection
    and prevention, a multi-hop Status-Server equivalent with ability to
    Trace the proxy steps a RADIUS message will follow.

  • Extend the 8-bit RADIUS ID space to allow more than 256 "in flight"
    packets across one connection.

  • Allow for CoA / Disconnect packets to be sent in "reverse" down a
    RADIUS/TLS or RADIUS/DTLS connection. This functionality assists with
    transit of NATs.

  • Defining Application-Layer Protocol Negotiation (ALPN) extensions for RADIUS/TLS and RADIUS/TLS
    which allow the use of those transports in a FIPS-140 compliant environment.

Timeline:

Much of this work should be completed by 2024 in order to be part of
the Wi-Fi 8 release, with products in 2026.

Milestones

Date Milestone Associated documents
May 2024 multi-hop status / traceroute, extend 8-bit ID space draft-cullen-radextra-status-realm
May 2024 Extend 8-bit ID Space to IESG
Jan 2024 Deprecating Insecure Uses of RADIUS to IESG draft-ietf-radext-deprecating-radius
Jan 2024 6614bis and 7360bis to IESG draft-ietf-radext-radiusdtls-bis
Aug 2023 reverse change of authorization (CoA)" path support for RADIUS draft-ietf-radext-reverse-coa

Done milestones

Date Milestone Associated documents
Done TLS-PSK Best Practices draft-ietf-radext-tls-psk
Done ALPN negotiation draft-ietf-radext-radiusv11