Skip to main content

RadSec: RADIUS over Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
draft-ietf-radext-radiusdtls-bis-15

Document Type Active Internet-Draft (radext WG)
Authors Jan-Frederik Rieckers , Margaret Cullen , Stefan Winter
Last updated 2026-03-05 (Latest revision 2026-02-23)
Replaces draft-janfred-radext-radiusdtls-bis
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status Proposed Standard
Formats
Reviews
Additional resources Mailing list discussion
Stream WG state Submitted to IESG for Publication
Associated WG milestone
Jan 2024
6614bis and 7360bis to IESG
On agenda radext at IETF-125
Document shepherd Valery Smyslov
Shepherd write-up Show Last changed 2026-02-09
IESG IESG state IESG Evaluation::Revised I-D Needed
Action Holders
Consensus boilerplate Yes
Telechat date (None)
Has 3 DISCUSSes. Needs one more YES or NO OBJECTION position to pass.
Responsible AD Paul Wouters
Send notices to mrcullen42@gmail.com, valery@smyslov.net
IANA IANA review state IANA OK - Actions Needed
IANA expert review state Expert Reviews OK
draft-ietf-radext-radiusdtls-bis-15
RADIUS EXTensions                                         J.-F. Rieckers
Internet-Draft                                                       DFN
Obsoletes: 6614, 7360 (if approved)                       M. Cullen, Ed.
Intended status: Standards Track                       Painless Security
Expires: 27 August 2026                                        S. Winter
                                                                 RESTENA
                                                        23 February 2026

    RadSec: RADIUS over Transport Layer Security (TLS) and Datagram
                    Transport Layer Security (DTLS)
                  draft-ietf-radext-radiusdtls-bis-15

Abstract

   This document defines transport profiles for running RADIUS over
   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS), allowing the secure and reliable transport of RADIUS
   messages.  RADIUS/TLS and RADIUS/DTLS are collectively referred to as
   RadSec.

   This document obsoletes RFC6614 and RFC7360, which specified
   experimental versions of RADIUS over TLS and DTLS.

About This Document

   This note is to be removed before publishing as an RFC.

   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-ietf-radext-radiusdtls-bis/.

   Discussion of this document takes place on the RADIUS EXTensions
   Working Group mailing list (mailto:radext@ietf.org), which is
   archived at https://mailarchive.ietf.org/arch/browse/radext/.
   Subscribe at https://www.ietf.org/mailman/listinfo/radext/.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

Rieckers, et al.         Expires 27 August 2026                 [Page 1]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 27 August 2026.

Copyright Notice

   Copyright (c) 2026 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   4
   2.  Conventions and Terminology . . . . . . . . . . . . . . . . .   4
   3.  RadSec Packet and Connection Handling . . . . . . . . . . . .   5
     3.1.  RadSec Packet Format, Default ports and shared secrets  .   5
     3.2.  (D)TLS requirements . . . . . . . . . . . . . . . . . . .   6
     3.3.  Mutual authentication . . . . . . . . . . . . . . . . . .   7
       3.3.1.  Authentication using X.509 certificates with PKIX trust
               model (TLS-X.509-PKIX)  . . . . . . . . . . . . . . .   7
       3.3.2.  Authentication using TLS-PSK (TLS-PSK)  . . . . . . .  10
     3.4.  Connecting Client Identity  . . . . . . . . . . . . . . .  10
     3.5.  TLS Session Resumption  . . . . . . . . . . . . . . . . .  11
     3.6.  RADIUS packets  . . . . . . . . . . . . . . . . . . . . .  12
     3.7.  Detecting Live Servers  . . . . . . . . . . . . . . . . .  13
     3.8.  Client Timers . . . . . . . . . . . . . . . . . . . . . .  14
       3.8.1.  Reconnection attempts . . . . . . . . . . . . . . . .  15
       3.8.2.  RADIUS packet retransmission  . . . . . . . . . . . .  15
     3.9.  (D)TLS connection limits and timeout  . . . . . . . . . .  16
     3.10. Behavior on (D)TLS connection closure of incoming
            connections  . . . . . . . . . . . . . . . . . . . . . .  17
     3.11. Malformed Packets and Unknown clients . . . . . . . . . .  18
     3.12. Cross Protocol Considerations . . . . . . . . . . . . . .  20
   4.  RADIUS/TLS-specific specifications  . . . . . . . . . . . . .  20
     4.1.  Sending and receiving RADIUS traffic  . . . . . . . . . .  21
     4.2.  Duplicates and Retransmissions  . . . . . . . . . . . . .  21
   5.  RADIUS/DTLS-specific specifications . . . . . . . . . . . . .  22

Rieckers, et al.         Expires 27 August 2026                 [Page 2]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

     5.1.  RADIUS packet handling  . . . . . . . . . . . . . . . . .  22
     5.2.  Server behavior . . . . . . . . . . . . . . . . . . . . .  23
     5.3.  Client behavior . . . . . . . . . . . . . . . . . . . . .  23
   6.  Implementation Considerations . . . . . . . . . . . . . . . .  23
     6.1.  RADIUS Implementation Changes . . . . . . . . . . . . . .  24
       6.1.1.  Differences from RFC 6614 unwanted RADIUS packet
               handling  . . . . . . . . . . . . . . . . . . . . . .  25
     6.2.  Forwarding RADIUS packets between UDP and TCP based
           transports  . . . . . . . . . . . . . . . . . . . . . . .  25
       6.2.1.  Throughput Differences lead to Network Collapse . . .  26
       6.2.2.  Differing Retransmission Requirements . . . . . . . .  26
       6.2.3.  Acct-Delay-Time and Event-Timestamp . . . . . . . . .  27
     6.3.  Additional Verification of Peers  . . . . . . . . . . . .  28
     6.4.  TCP Applications Are Not UDP Applications . . . . . . . .  29
     6.5.  DTLS Session Management . . . . . . . . . . . . . . . . .  30
       6.5.1.  Server Session Management . . . . . . . . . . . . . .  30
       6.5.2.  Client Session Management . . . . . . . . . . . . . .  32
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  32
     7.1.  Mixing Secure and Insecure Traffic  . . . . . . . . . . .  33
     7.2.  RADIUS Proxies  . . . . . . . . . . . . . . . . . . . . .  33
       7.2.1.  Loopback-Attack on endpoints acting as Server and
               Client  . . . . . . . . . . . . . . . . . . . . . . .  34
     7.3.  Usage of NULL encryption cipher suites for debugging  . .  35
     7.4.  Possibility of Denial-of-Service attacks  . . . . . . . .  35
     7.5.  TLS Connection Lifetime and Key Rotation  . . . . . . . .  36
     7.6.  Connection Closing On Malformed Packets . . . . . . . . .  37
     7.7.  Migrating from RADIUS/UDP to RadSec . . . . . . . . . . .  37
     7.8.  Client Subsystems . . . . . . . . . . . . . . . . . . . .  38
   8.  Design Decisions  . . . . . . . . . . . . . . . . . . . . . .  39
     8.1.  Mandatory-to-implement transports . . . . . . . . . . . .  39
     8.2.  Mandatory-to-implement trust profiles . . . . . . . . . .  39
     8.3.  Changes in application of TLS . . . . . . . . . . . . . .  40
   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  40
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  40
     10.1.  Normative References . . . . . . . . . . . . . . . . . .  40
     10.2.  Informative References . . . . . . . . . . . . . . . . .  42
   Appendix A.  Changes from RFC6614 (RADIUS/TLS) and RFC7360 (RADIUS/
           DTLS) . . . . . . . . . . . . . . . . . . . . . . . . . .  44
   Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . .  45
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  46

Rieckers, et al.         Expires 27 August 2026                 [Page 3]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

1.  Introduction

   This document defines transport profiles for running RADIUS over
   Transport Layer Security (TLS) [RFC8446] [RFC5246] over TCP, and
   Datagram Transport Layer Security (DTLS) [RFC9147] [RFC6347] over
   UDP, allowing secure and reliable transport of RADIUS messages.
   RADIUS/TLS and RADIUS/DTLS are collectively referred to as RadSec.
   This document obsoletes [RFC6614] and [RFC7360], which specified
   experimental versions of RADIUS over TLS and DTLS.

   RADIUS is a widely deployed Authentication, Authorization and
   Accounting (AAA) protocol defined in [RFC2865], [RFC2866], and
   [RFC5176], among others.  Deployment experience has shown several
   shortcomings, such as dependency on the unreliable transport
   protocol, UDP, and a lack of confidentiality for large parts of
   RADIUS messages.  Additionally, the confidentiality and integrity
   mechanisms in RADIUS rely on the MD5 algorithm [RFC1321], which does
   not meet modern security expectations.  Although RadSec does not
   remove the MD5-based mechanisms, it adds confidentiality and
   integrity protection through the TLS layer.  For an experimental
   version of RadSec without the need for MD5 see [RFC9765].

2.  Conventions and Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

   The following terminology is used in this document:

   RadSec:  A collective term for RADIUS/TLS and RADIUS/DTLS.

   RADIUS/TLS:  A RADIUS exchange transmitted using TLS over TCP.

   RADIUS/DTLS:  A RADIUS exchange transmitted using DTLS over UDP.

   RADIUS/UDP:  RADIUS transported over UDP as defined in [RFC2865].

   RADIUS packet:  As defined in [RFC2865], Section 3.

   RADIUS packet type:  As defined in [RFC2865], Section 4.

   (D)TLS handshake message:  As defined in TLS [RFC8446] and DTLS
      [RFC9147].

   TLS record:  As defined in TLS [RFC8446].

Rieckers, et al.         Expires 27 August 2026                 [Page 4]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   DTLS record:  As defined in DTLS [RFC9147].  A DTLS record is always
      contained in one UDP datagram.

   (D)TLS connection:  A single (D)TLS communication channel (with DTLS
      this is a synonym for association).

   UDP datagram:  A UDP packet, including the header and data.

   UDP (datagram) data:  The data payload of a UDP datagram.

   RadSec client:  A RadSec instance that initiates a new connection.

   RadSec server:  A RadSec instance that listens on a RADIUS-
      over-(D)TLS port and accepts new connections.

   RadSec endpoint:  A RadSec client or server

   RadSec peer:  A RadSec endpoint connected to the RadSec endpoint that
      is the primary subject of discussion.

   Whenever "(D)TLS", "RADIUS/(D)TLS" or "RadSec" is mentioned, the
   specification applies for both RADIUS/TLS and RADIUS/DTLS.  Where
   "TLS" or "RADIUS/TLS" is mentioned, the specification applies only
   for RADIUS/TLS.  Where "DTLS" or "RADIUS/DTLS" is mentioned, it only
   applies to RADIUS/DTLS.

3.  RadSec Packet and Connection Handling

   This section defines the behavior of RadSec endpoints for the
   handling of establishment of a (D)TLS connection and sending and
   receiving RADIUS packets.

   Server implementations MUST support both RADIUS/TLS and RADIUS/DTLS.
   Client implementations SHOULD implement both, but MUST implement at
   least one of RADIUS/TLS or RADIUS/DTLS.

3.1.  RadSec Packet Format, Default ports and shared secrets

   The format of RADIUS packets in RadSec is unchanged from the format
   specified in [RFC2865], [RFC2866] and [RFC5176].

   IANA has reserved server ports for RADIUS/TLS and RADIUS/DTLS.  Since
   authentication of peers, confidentiality, and integrity protection
   are provided by the (D)TLS layer, the shared secret for the RADIUS
   packets is set to a static string, which is different for each of TLS
   and DTLS.  The calculation of security-related fields such as
   Response-Authenticator, Message-Authenticator or encrypted attributes
   MUST be performed using the static shared secret.

Rieckers, et al.         Expires 27 August 2026                 [Page 5]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

               +=============+=============+===============+
               | Protocol    | Server Port | Shared Secret |
               +=============+=============+===============+
               | RADIUS/TLS  | 2083/tcp    | "radsec"      |
               +-------------+-------------+---------------+
               | RADIUS/DTLS | 2083/udp    | "radius/dtls" |
               +-------------+-------------+---------------+

                                  Table 1

   RadSec does not use separate ports for authentication, accounting and
   dynamic authorization changes.  The client source port used for
   RadSec connections is not fixed -- it is typically an ephemeral port
   picked by the client Operating System.  For considerations regarding
   the multi-purpose use of one port for authentication and accounting
   see Section 3.6.

   RadSec clients MAY open multiple connections to the same RadSec
   server and RadSec servers MUST be able to accept multiple connections
   from a single client.

   RadSec endpoints MUST NOT use the old RADIUS/UDP or RADIUS/TCP ports
   for RADIUS/DTLS or RADIUS/TLS.

3.2.  (D)TLS requirements

   RadSec clients MUST establish a (D)TLS session immediately upon
   connecting to a new server.  All data received over a TCP or UDP port
   assigned for RadSec is opaque for the RADIUS client or server
   application and must be handled by the TLS or DTLS implementation.
   Closing TLS connections and discarding invalid UDP datagrams are done
   by the (D)TLS implementation.

   RadSec does not provide for negotiation of (D)TLS in ongoing RADIUS
   communication.  Instead, a server port is configured to always
   require (D)TLS.  Connection attempts to a (D)TLS port which do not
   use (D)TLS are not accepted by the server.  As RADIUS has no
   provisions for capability signaling, there is also no way for a
   server to indicate to a client that it should transition to using TLS
   or DTLS.  Servers and clients therefore need to be preconfigured to
   use RADIUS/(D)TLS for a given endpoint.  This action has to be taken
   by the administrators of the two systems.

   Implementations MUST follow the recommendations given in [RFC9325],
   especially in regards to TLS versions, recommended cipher suites, and
   TLS session resumption.  Additionally, the following requirements
   have to be met for the (D)TLS connection:

Rieckers, et al.         Expires 27 August 2026                 [Page 6]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   *  Negotiation of a cipher suite providing for confidentiality as
      well as integrity protection is REQUIRED.

   *  The endpoints MUST NOT negotiate compression.

   *  The connection MUST be mutually authenticated (see Section 3.3).

   RadSec endpoints MUST NOT use the 0-RTT feature of (D)TLS.

3.3.  Mutual authentication

   RadSec servers MUST authenticate clients, and RadSec clients MUST
   authenticate servers.  RADIUS is designed to be used by mutually
   trusted systems.  Allowing anonymous clients would ensure privacy for
   RadSec traffic, but would negate all other security aspects of the
   protocol, including security aspects of RADIUS itself, due to the
   fixed shared secret.

   RADIUS/(D)TLS allows for the following modes of mutual
   authentication, which will be further specified in this section:

   *  TLS-X.509-PKIX

   *  TLS-PSK

   Independent of the chosen mode of authentication, the mutual
   authentication MUST be performed during the initial handshake.
   Alternative methods, such as post-handshake certificate-based client
   authentication (see [RFC8446], Section 4.6.2) with TLS 1.3 or
   renegotiation with TLS 1.2, MUST NOT be used to achieve mutual
   authentication.

3.3.1.  Authentication using X.509 certificates with PKIX trust model
        (TLS-X.509-PKIX)

   All RadSec server implementations MUST implement this model.  RadSec
   client implementations SHOULD implement this model, but MUST
   implement either this model or TLS-PSK.

   If implemented, the following rules apply:

   *  Implementations MUST allow the configuration of a trust base
      (i.e., a set of trusted Certification Authorities (CAs)[RFC5280])
      for new TLS connections.  This list SHOULD be application-specific
      and not use a global system trust store.

   *  Certificate validation MUST include the verification rules as per
      [RFC5280].

Rieckers, et al.         Expires 27 August 2026                 [Page 7]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   *  Implementations MAY indicate their trust anchors when opening or
      accepting TLS connections.  See [RFC5246], Section 7.4.4 and
      [RFC6066], Section 6 for TLS 1.2 and [RFC8446], Section 4.2.4 for
      TLS 1.3.

   *  When the configured trust base changes (e.g., removal of a CA from
      the set of trust anchors; issuance of a new CRL for a CA in the
      set of trust anchors), implementations SHOULD reassess the
      continued validity of the certificate path of all connected peers.
      This can either be done by caching the peer's certificate for the
      duration of the connection and re-evaluating the cached
      certificate or by renegotiating the (D)TLS connection, either
      directly or by opening a new (D)TLS connection and closing the old
      one.

   *  Implementations SHOULD NOT keep a connection open beyond the
      validity period of the peer certificate.  At the time the peer
      certificate expires, the connection SHOULD be closed and then
      possibly re-opened with updated credentials.

   RadSec endpoints SHOULD NOT be pre-configured with a set of trusted
   CAs by the vendor or manufacturer that are enabled by default.
   Instead, the endpoints SHOULD start off with an empty CA set as the
   trust base.  The addition of a CA SHOULD be done only when manually
   configured by the administrator.  This does not preclude vendors or
   manufacturers including their set of trusted CAs in their products,
   but the enabling of those lists should require an explicit act by an
   administrator.

   RadSec clients MUST follow [RFC9525] when validating RadSec server
   identities.  RadSec servers also follow [RFC9525] when validating
   RadSec client identities with some additional rules.

   Specific details are provided below:

   *  Certificates MAY include a single wildcard in the identifiers of
      DNS names and realm names, but only as the complete, left-most
      label.

   *  RadSec clients validate the server's identity to match their local
      configuration, accepting the identity on the first match:

      -  If the expected RadSec server is associated with a specific NAI
         realm, e.g., by dynamic discovery [RFC7585] or static
         configuration, that realm is matched against the presented
         identifiers of any subjectAltName entry of type otherName whose
         name form is NAIRealm as defined in [RFC7585], Section 2.2.

Rieckers, et al.         Expires 27 August 2026                 [Page 8]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

      -  If the expected RadSec server was configured as a hostname, or
         the hostname was yielded by a dynamic discovery procedure, that
         name is matched against the presented identifiers of any
         subjectAltName entry of type dNSName [RFC5280].  Since a
         dynamic discovery might by itself not be secured,
         implementations MAY require the use of DNSSEC [RFC4033] to
         ensure the authenticity of the DNS result before considering
         this identity as valid.

      -  If the expected RadSec server was configured as an IP address,
         the configured IP address is matched against the presented
         identifier in any subjectAltName entry of type iPAddress
         [RFC5280].

      -  The Common Name RDN MUST NOT be used to identify a server.

      -  Clients MAY use other attributes of the certificate to validate
         the server's identity, but they MUST NOT accept any certificate
         without validation.

      -  Clients which also act as servers (i.e., proxies) may be
         susceptible to security issues when a ClientHello is mirrored
         back to themselves.  More details on this issue are discussed
         in Section 7.

   *  RadSec servers validate the certificate of the RadSec client
      against a local database of acceptable clients.  The database may
      enumerate acceptable clients either by IP address or by a name
      component in the certificate.

      -  For clients configured by DNS name, the configured name is
         matched against the presented identifiers of any subjectAltName
         entry of type dNSName [RFC5280].

      -  For clients configured by their source IP address, the
         configured IP address is matched against the presented
         identifiers of any subjectAltName entry of type iPAddress
         [RFC5280].

      -  Some servers MAY be configured to accept a client coming from a
         range or set of IP addresses.  In this case, the server MUST
         verify that the client IP address of the current connection is
         a member of the range or set of IP addresses, and the server
         MUST match the client IP address of the current connection
         against the presented identifiers of any subjectAltName entry
         of type iPAddress [RFC5280].

Rieckers, et al.         Expires 27 August 2026                 [Page 9]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

      -  Implementations MAY consider additional subjectAltName
         extensions to identify a client.

      -  If configured by the administrator, the identity check MAY be
         omitted after a successful [RFC5280] certification path
         validation, e.g., if the client used dynamic lookup there is no
         configured client identity to verify.  The client's
         authorization MUST then be validated using a certificate policy
         extension [RFC5280], Section 4.2.1.4 unless both endpoints are
         part of a trusted network.

   *  Implementations MAY allow configuration of a set of additional
      properties of the certificate to check for a peer's authorization
      to communicate (e.g., a set of allowed values presented in
      subjectAltName entries of type uniformResourceIdentifier [RFC5280]
      or a set of allowed X.509v3 Certificate Policies).

3.3.2.  Authentication using TLS-PSK (TLS-PSK)

   RadSec server implementations MUST support the use of TLS-PSK.
   RadSec client implementations SHOULD support the use of TLS-PSK, but
   MUST implement either this model or TLS-X.509-PKIX.

   Further guidance on the usage of TLS-PSK in RadSec is given in
   [RFC9813].

3.4.  Connecting Client Identity

   In RADIUS/UDP, clients are uniquely identified by their IP addresses,
   as the shared secret is associated with the origin IP address.  With
   RadSec, the shared secret has a fixed value and multiple distinct
   RadSec clients can connect from the same IP address.  This requires
   changing the method of identifying individual clients from RADIUS/
   UDP.

   Depending on the trust model used, the RadSec client identity is
   determined as follows.

   With TLS-PSK, a client is uniquely identified by its TLS-PSK
   identifier ([RFC9813], Section 6.2).

   With TLS-X.509-PKIX, a client is uniquely identified by the tuple of
   the serial number of the presented client certificate and the issuer.

Rieckers, et al.         Expires 27 August 2026                [Page 10]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   In practice, identification of unique clients is not always necessary
   and could be based on the subject of the presented certificate or a
   subjectAltName entry.  While this identification technique could
   match multiple distinct certificates and therefore distinct clients,
   it is often sufficient, e.g., for the purpose of applying policies.

   Note well: having identified a connecting entity does not mean the
   server necessarily wants to communicate with that client.  For
   example, if the Issuer is not in a trusted set of Issuers, the server
   may decline to perform RADIUS transactions with this client.

   Additionally, a server MAY restrict individual or groups of clients
   to certain IP addresses or ranges.  One example of this can be to
   restrict clients configured by DNS name to only the IP address(es)
   that this DNS name resolves to.

   A client connecting from outside the allowed range would be rejected,
   even if the mutual authentication otherwise would have been
   successful.  To reduce server load and to prevent probing the
   validity of stolen credentials, the server SHOULD abort the (D)TLS
   handshake immediately with a TLS alert access_denied(49) after the
   client transmitted identifying information, i.e., the client
   certificate or the PSK identifier, and the server recognizes that the
   client connects from outside the allowed IP range.

   See [RFC9813], Section 6.2.1 for further discussion on this topic.

3.5.  TLS Session Resumption

   Session resumption lowers the time and effort required to start a
   (D)TLS connection and increases network responsiveness.  This is
   especially helpful when using short idle timeouts.

   RadSec clients and servers SHOULD implement session resumption.
   Implementations supporting session resumption MUST cache data during
   the initial full handshake, sufficient to allow authorization
   decisions to be made during resumption.  For RadSec servers, this
   should preferably be done using stateless session resumption as
   specified in [RFC5077] for TLS 1.2 or [RFC8446] for TLS 1.3, to
   reduce the resource usage for cached data.

   When establishing a (D)TLS connection with session resumption, both
   client and server MUST re-authorize the connection by using the
   original, cached data.  In particular, this includes the X.509
   certificate (when using a PKIX trust model) as well as any policies
   associated with that identity such as restrictions on source IP
   address.  The re-authorization MUST give the same result as if a full
   handshake was performed at the time of resumption.

Rieckers, et al.         Expires 27 August 2026                [Page 11]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   If cached data cannot be retrieved securely, resumption MUST NOT be
   done, by either immediately closing the connection or reverting to a
   full handshake.  If a connection that used session resumption is
   closed by the server before the resumed DTLS session can be
   established, the RadSec client MUST NOT re-attempt session resumption
   but perform a full TLS handshake instead.

3.6.  RADIUS packets

   The use of (D)TLS transport does not change the calculation of
   security-related fields (such as the Response-Authenticator) in
   RADIUS [RFC2865] or RADIUS Dynamic Authorization [RFC5176].
   Calculation of attributes such as User-Password [RFC2865] or Message-
   Authenticator [RFC3579] also does not change.

   The changes to RADIUS implementations required to implement this
   specification are largely limited to the portions that send and
   receive packets on the network and the establishment of the (D)TLS
   connection.

   The RadSec specification does not change the client/server
   architecture of RADIUS.  RadSec clients transmit the same packet
   types on the connection they initiated as a RADIUS/UDP client would,
   and RadSec servers transmit the same packet types on the connections
   the server has accepted as a RADIUS/UDP server would.  As noted in
   Section 3.1, RadSec uses the same port for Authentication and
   Accounting packets.  As non-exhaustive example, a RadSec client can
   transmit packets of type Access-Request, Accounting-Request, Status-
   Server, Disconnect-ACK over the same connection, and a RadSec server
   can transmit packets of type Access-Accept, Access-Reject, Access-
   Challenge, Accounting-Response, Disconnect-Request.

   However, special considerations apply for mixing Authentication and
   Accounting packets over the same connection.  Traditional RADIUS/UDP
   uses different ports for Authentication and Accounting, where RadSec
   uses the same connection for all RADIUS packets.  Due to the use of
   one single port for all packet types, clients might send packets to
   the server which it cannot process.  Without a response from the
   server, the client has to wait for the requests to time out before
   reusing the request id, leading to resource exhaustion of the limited
   id space.

Rieckers, et al.         Expires 27 August 2026                [Page 12]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   A server MAY therefore respond with a Protocol-Error packet as
   defined in [RFC7930], Section 4, to alleviate this situation and
   signal that it was unable to process a packet.  The Error-Cause
   attribute of this packet SHOULD be set to the value 406 ("Unsupported
   Extension"), if the server does not support the packet type, or the
   value 502 ("Request Not Routable (Proxy)"), if the request cannot be
   routed.  Future specifications may recommend other Error-Cause
   attribute values for specific scenarios.

   RadSec clients MUST accept Protocol-Error as a valid response and
   thus stop any retransmission of the original packet over the current
   connection.  Further details of handling the Protocol-Error reply on
   the client side are outside of the scope of this document, see
   [I-D.dekok-protocol-error] for a more detailed description of
   Protocol-Error.

   Note that sending Protocol-Error in response to unwanted packets
   replaces the use of CoA-NAK, Disconnect-NAK and Accounting-Response
   in these situations as specified in [RFC6614].  See further details
   in Section 6.1.1 below.

   RadSec clients, for both reliability and compatibility reasons,
   SHOULD NOT mix authentication and accounting requests within the same
   connection.  RadSec clients SHOULD use a separate pool of connections
   on which to send accounting packets in the event the RadSec server
   does not support sending Protocol-Error.

3.7.  Detecting Live Servers

   RadSec implementations MUST utilize the existence of a TCP, TLS or
   DTLS connection where applicable in addition to the application-layer
   watchdog defined in [RFC3539], Section 3.4 when determining the
   liveness of each connection.

   As RADIUS is a "hop-by-hop" protocol, proxies hide information about
   the topology downstream to the client.  While the client may be able
   to deduce the operational state of the next-hop (i.e., proxy), it is
   unable to determine the operational state of any hops beyond it.
   This is particularly problematic for topologies that aggregate
   multiple routes for differing realms behind a proxy where the absence
   of a reply could lead to a client to incorrectly deduce that the
   proxy is unavailable when the cause was an unresponsive downstream
   hop for a single realm.  A similar effect may also be seen on home
   servers that uses different credential backends for each realm they
   service.

Rieckers, et al.         Expires 27 August 2026                [Page 13]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   To avoid these issues, RadSec clients MUST only mark a connection
   'DOWN' (as labeled by [RFC3539], Section 3.4) if one or more of the
   following conditions are met:

   *  The network stack indicates that the connection is no longer
      viable; such as the destination being no longer routable or the
      underlying TCP connection being closed by the peer.

   *  The transport layer, D(TLS), provides no usable connection

   *  The application-layer watchdog algorithm has marked it 'DOWN'.

   When a client opens multiple connections to a server, it is also
   possible that only one of the connections is unresponsive, e.g.,
   because the server deleted the DTLS connection shared state or the
   connection was load balanced on the server side to a backend server
   that is now unresponsive.  Therefore, the liveness check MUST be done
   on a per-connection basis, and a failure on one connection MUST NOT
   lead to all connections to this server being marked down.

   RadSec clients MUST implement the Status-Server extension as
   described in [RFC5997] as the application level watchdog to detect
   the liveness of the peer in the absence of responses.  RadSec servers
   MUST be able to answer to Status-Server requests.  Since RADIUS has a
   limitation of 256 simultaneous "in flight" packets due to the length
   of the ID field ([RFC3539], Section 2.4), it is RECOMMENDED that
   RadSec clients reserve ID zero (0) on each connection for Status-
   Server packets.  This value was picked arbitrarily, as there is no
   reason to choose any other value over another for this use.

   For RADIUS/TLS, the endpoints MAY send TCP keepalives as described in
   [RFC9293], Section 3.8.4.  For RADIUS/DTLS connections, the endpoints
   MAY send periodic keepalives as defined in [RFC6520].  This is a way
   of proactively and rapidly triggering a 'Connection DOWN'
   notification from the network stack.  These liveness checks are
   essentially redundant in the presence of an application-layer
   watchdog, but may provide more rapid notifications of connectivity
   issues.

3.8.  Client Timers

   RadSec clients may need to reconnect to a server that rejected their
   connection attempt and retry RADIUS packets which did not get an
   answer.  The following sections define the client behavior.

Rieckers, et al.         Expires 27 August 2026                [Page 14]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

3.8.1.  Reconnection attempts

   RadSec endpoints establish a (D)TLS connection before transmitting
   any RADIUS packets.  Therefore, in addition to retransmission of
   RADIUS packets, RadSec clients also have to perform connection
   retries.

   Except in cases where a connection attempt with session resumption
   was closed by the RadSec server, RadSec clients MUST NOT immediately
   reconnect to a server after a failed connection attempt.  A
   connection attempt is treated as failed if it fails at any point
   until a (D)TLS connection is established successfully.  Typical
   reconnections MUST have a lower bound for the time in between
   retries.  The lower bound SHOULD be configurable, but MUST NOT be
   less than 0.5 seconds.  In cases where the server closes the
   connection on an attempted TLS session resumption, the client MUST
   NOT use TLS session resumption for the following connection attempt.

   RadSec clients MUST implement an algorithm for handling the timing of
   such reconnection attempts that includes an exponential back-off.
   Using an algorithm similar to the retransmission algorithm defined in
   [RFC5080], Section 2.2.1 is RECOMMENDED.  If a different algorithm is
   used, it SHOULD include a configurable lower and upper bound for the
   time between retries, a configurable timeout after which the client
   gives up reconnecting, and a jitter.

   When a reconnection attempt is queued on a reconnection timer, adding
   subsequent RADIUS packets to be sent SHOULD NOT trigger an immediate
   reconnection attempt or reset the reconnection timer.  Instead, the
   algorithm SHOULD continue as it would have without the new RADIUS
   packet.  However, a client MAY reset the timeout for giving up
   reconnecting when a new RADIUS packet is queued.

   Where the connection to a RadSec server is configured to be static
   and always kept open, the reconnect algorithm SHOULD have an upper
   limit for the time between retries (e.g., 60 seconds) and not give up
   trying to reconnect.

3.8.2.  RADIUS packet retransmission

   RadSec clients MUST implement timers for managing packet
   retransmissions and timeouts, such as the ones defined in [RFC5080],
   Section 2.2.1.  Other algorithms than the one defined in [RFC5080]
   are possible, but any timer implementation MUST have similar
   properties of including jitter, exponential backoff and a maximum
   retransmission count (MRC) and/or maximum retransmission duration
   (MRD).

Rieckers, et al.         Expires 27 August 2026                [Page 15]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   For the following description, we use "retransmission" to mean the
   sending of the exact same packet over the same connection and "retry"
   to mean the sending of a new RADIUS packet with the same logical
   contents, but over a different connection or with other details
   changed.  When a packet is retransmitted, the previously encoded
   packet contents are sent without change.  When a packet is retried,
   it goes through the usual RADIUS processing (e.g., allocation of a
   new RADIUS ID, new Authenticator) and is re-encoded and re-signed.

   When a connection fails or is closed, a RadSec client SHOULD retry
   packets over a different connection, either a different connection to
   the same server or a different configured server in the same load-
   balancing/failover pool.  In order to keep the timers consistent, the
   timers associated with a packet SHOULD NOT be changed when a packet
   is moved from one connection to another.  At least the MRD timer
   SHOULD be preserved to prevent packets staying in the queue
   indefinitely due to regular connection closure.  A RadSec client MUST
   associate a packet with exactly one connection until either the
   connection is closed, in which case the association moves to a new
   connection, or the timers reach MRC or MRD, in which case the packet
   is discarded.

   The requirements for actions from timers differ for RADIUS/TLS and
   RADIUS/DTLS.

   As UDP is not a reliable transport, RADIUS/DTLS clients MUST
   retransmit packets when indicated by the timers to deal with packets
   dropped by the network.  When the timers reach MRC or MRD, the packet
   is discarded.

   Since TCP is a reliable transport, RADIUS/TLS clients MUST NOT
   retransmit packets when indicated by the timers.  They SHOULD still
   run the full timer algorithm to determine if the maximum
   retransmission count (MRC) has been reached.  RADIUS/TLS clients will
   then use MRC or MRD to determine that a packet has not received a
   response and the ID of this packet can be re-used for new packets.

   See Section 4.2 for more discussion on retransmission behavior.

3.9.  (D)TLS connection limits and timeout

   While RADIUS/UDP could be implemented mostly stateless (except for
   the requests in flight and possibly [RFC5080], Section 2.2.2
   deduplication), both TCP/TLS as well as DTLS require additional state
   tracking of the underlying (D)TLS connection and are thus subject to
   potential resource exhaustion.  This is aggravated by the fact that
   RADIUS client/servers are often statically configured and thus form
   long-running peer relationships with long-running connections.

Rieckers, et al.         Expires 27 August 2026                [Page 16]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   Implementations SHOULD have configurable limits on the number of open
   connections.  When this maximum is reached and a new (D)TLS
   connection is needed, the server MUST either drop an old connection
   in order to open the new one or else not create a new connection.

   The close notification of (D)TLS or underlying connections are not
   fully reliable, or connections might be unnecessarily kept alive by
   heartbeat or watchdog traffic, occupying resources.  Therefore, both
   RadSec clients and servers MAY close connections after they have been
   idle for some time (no traffic except application layer watchdog).
   This idle timeout SHOULD be configurable within reasonable limits and
   it SHOULD be possible to disable idle timeouts completely.

   On the server side, this mostly helps avoid resource exhaustion.  For
   clients, proactively closing connections can also help mitigate
   situations where watchdog mechanisms are unavailable or fail to
   detect non-functional connections.  Some scenarios or RADIUS protocol
   extensions could also require that a connection be kept open at all
   times, so clients MAY immediately re-open the connection.  These
   scenarios could be related to monitoring the infrastructure or to
   allow the server to proactively send packets to the clients without a
   preceding request.

   The value of the idle timeout to use depends on the exact deployment
   and is a trade-off between resource usage on clients/servers and the
   overhead of opening new connections.  Very short timeouts that are at
   or below the timeouts used for application layer watchdogs, typically
   in the range of 30-60s can be considered unreasonable.  In contrast,
   the upper limit is much more difficult to define but may be in the
   range of 10 to 15min, depending on the available resources, or never
   (disabling idle timeout) in scenarios where a permanently open
   connection is required.

3.10.  Behavior on (D)TLS connection closure of incoming connections

   If an incoming (D)TLS connection or the underlying transport channel
   is closed or broken, then there is no way to send a RADIUS response
   packet to the client.  The RadSec server behavior then depends on the
   types of packets being processed, and on the role of the server.

   A RadSec server MUST discard or stop all requests that are associated
   with the closed connection.  This requirement also applies to proxied
   requests which are associated with the incoming request.  As no
   response can be sent over the now-closed (D)TLS connection, any
   further processing of those requests is pointless.  A discarded
   request may have a cached RADIUS response packet ([RFC5080],
   Section 2.2.2), in which case the cached response also MUST be
   discarded.  If there is no cached response packet, then the request

Rieckers, et al.         Expires 27 August 2026                [Page 17]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   might still be processed by the home server.  The RADIUS proxy MUST
   discard any response to these requests and SHOULD stop processing the
   requests.

   A home server which receives Access-Request packets MUST behave as
   defined above for a proxy and discard those requests and stop
   processing them.  Where a RADIUS packet is part of a multi-packet
   authentication session (e.g., EAP), the underlying authentication
   session could be continued, or the underlying authentication session
   data could be discarded.  The server may be able to receive and
   process another packet for that authentication session via a
   different incoming connection.  It is difficult to make more
   recommendations for managing partially processed authentication
   sessions, as such recommendations depend strongly on the
   authentication method being used.  As a result, further behavior is
   implementation defined and outside the scope of this specification.

   A home server which receives other kinds of packets (for example
   Accounting-Request, CoA-Request, Disconnect-Request) MAY finish
   processing outstanding requests, and then discard any response.  This
   behavior ensures that the desired action is still taken, even if the
   home server cannot inform the client of the result of that action.

3.11.  Malformed Packets and Unknown clients

   The RADIUS specifications say that an implementation should "silently
   discard" a packet in a number of circumstances.  This action has no
   further consequences for UDP based transports, as the "next" packet
   is completely independent of the previous one.

   When TLS is used as transport, decoding the "next" packet on a
   connection depends on the proper decoding of the previous packet.  As
   a result the behavior with respect to discarded packets has to
   change, since a malformed RADIUS packet could impact the decoding of
   succeeding packets.

   With DTLS, the "next" packet does not depend on proper decoding of
   the previous packet, since the RADIUS packets are sent in independent
   DTLS records (see Section 5.1).  However, since both TLS and DTLS
   provide integrity protection and ensure that the packet was sent by
   the peer, a protocol violation at this stage implies that the peer is
   misbehaving.

Rieckers, et al.         Expires 27 August 2026                [Page 18]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   Subject to the discussion below, implementations of this
   specification SHOULD treat the text on "silently discard" packets in
   the RADIUS specifications as "silently discard the packet and close
   the connection".  That is, the implementation SHOULD send a TLS close
   notification and, in the case of RADIUS/TLS, the underlying TCP
   connection MUST be closed if any of the following circumstances are
   seen:

   *  Connection from an unknown client

   *  Packet where the RADIUS Length field is less than the minimum
      RADIUS packet length

   *  Packet where the RADIUS Length field is more than the maximum
      RADIUS packet length

   *  Packet where an Attribute Length field has the value of zero or
      one (0 or 1)

   *  Packet where the attributes do not exactly fill the packet

   *  Packet where the Request Authenticator fails validation (where
      validation is required)

   *  Packet where the Response Authenticator fails validation (where
      validation is required)

   *  Packet where the Message-Authenticator attribute fails validation
      (when it occurs in a packet)

   After applying the above rules, there are still situations where the
   previous specifications allow a packet to be "silently discarded"
   upon receipt, but in which it is reasonable that a connection MAY
   remain open:

   *  Packet with an invalid code field (see Section 3.6 for details)

   *  Response packets that do not match any outstanding request

   *  A server lacking the resources to process a request

   These requirements reduce the possibility for a misbehaving client or
   server to wreak havoc on the network.

Rieckers, et al.         Expires 27 August 2026                [Page 19]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

3.12.  Cross Protocol Considerations

   A client may be configured to use multiple servers, and therefore
   needs to be able to distinguish servers from one another.  Those
   servers may use different transport protocols, in any combination.
   For example, a client may be configured with a RADIUS/UDP server, and
   RADIUS/DTLS server, and a RADIUS/TLS server all at the same time.
   These servers may share IP addresses, but not the same UDP or TCP
   ports.  These considerations also affect RADIUS servers.

   RADIUS implementations MUST be able to distinguish servers by at
   least the 3-tuple of:

   *  protocol (one of RADIUS/UDP, RADIUS/DTLS, or RADIUS/TLS)

   *  server IP,

   *  server port.

   Implementations MUST NOT exchange both insecure and secure traffic on
   the same UDP or TCP port.  It is RECOMMENDED that implementations
   make it impossible for such a configuration to be created.

   Where a server accepts packets on multiple different 3-tuples
   (protocol, server IP, server port), it MUST track clients
   independently for each 3-tuple combination.  A RADIUS client has no
   way of knowing if different 3-tuple combinations are all managed by
   the same RADIUS server.  Therefore, the server behavior has to be
   compatible with the clients expectations.

   When a server receives a packet from a source IP address on a
   3-tuple, it MUST process that packet according to the profile for
   that 3-tuple.  This requirement means that (for example), a server
   can be configured to accept RADIUS/UDP traffic on multiple UDP ports,
   and then have a completely different (and non-overlapping) set of
   clients configured for each port.

   While this behavior is not required by previous specifications, it
   codifies long-standing practices.  As such, existing server
   implementations likely do not need to do anything in order to support
   the requirements of this section.

4.  RADIUS/TLS-specific specifications

   This section discusses all specifications that are only relevant for
   RADIUS/TLS.

Rieckers, et al.         Expires 27 August 2026                [Page 20]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

4.1.  Sending and receiving RADIUS traffic

   The TLS layer of RADIUS/TLS provides a stream-based communication
   between the two peers instead of the traditional packet-based
   communication as with RADIUS/UDP.  As a result, the way RADIUS
   packets are sent and received has to change.

   Instead of relying on the underlying transport protocol to indicate
   the start of a new packet, the RADIUS/TLS endpoints have to keep
   track of the packet borders by examining the header of the received
   RADIUS packets.

   After the TLS connection is established, a RADIUS/TLS endpoint MUST
   NOT send any data except for RADIUS packets over the connection.
   Since the RADIUS packet header contains a Length field, the end of
   the current RADIUS packet can be deduced.  The next RADIUS packet
   MUST be sent directly after the current RADIUS packet, that is, the
   endpoints MUST NOT add padding before, between, or after RADIUS
   packets.

   When receiving RADIUS packets, a RADIUS/TLS endpoint MUST determine
   the borders of RADIUS packet based on the Length field in the RADIUS
   header.  Note that, due to the stream architecture of TLS, it is
   possible that a RADIUS packet is first received only partially, and
   the remainder of the packet is contained in following fragments.
   Therefore, RADIUS/TLS endpoints MUST NOT assume that the packet
   length is invalid solely based on the currently available data in the
   stream.  More data may come at a later time.

   It is RECOMMENDED that RADIUS/TLS implementations pass a RADIUS
   packet to the TLS library as one unit, instead of in multiple
   fragments.  This behavior avoids unnecessary overhead when sending or
   receiving (especially if every new write generates a new TLS record)
   and wait times on the other endpoint.

4.2.  Duplicates and Retransmissions

   As TCP is a reliable transport, RADIUS/TLS endpoints MUST NOT
   retransmit RADIUS packets over a given TCP connection.  However, if
   the TLS connection or TCP connection is closed or broken, retries
   over new connections are permissible.  RADIUS request packets that
   have not yet received a response MAY be transmitted by a RADIUS/TLS
   client over a new connection.  As this procedure involves using a new
   connection, the ID of the packet MAY change.  If the ID changes, any
   security attributes such as Message-Authenticator MUST be
   recalculated.

Rieckers, et al.         Expires 27 August 2026                [Page 21]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   Despite the above discussion, RADIUS/TLS servers SHOULD still perform
   duplicate detection on received packets, as described in [RFC5080],
   Section 2.2.2.  This detection can prevent duplicate processing of
   packets from non-conforming clients.

   RADIUS clients MUST NOT perform retries by sending a packet on a
   different protocol or connection (i.e., switching from TLS to DTLS or
   vice versa).  However, when a connection fails, a RADIUS client MAY
   send packets associated with that connection over a different
   configured connection or server.  This requirement does not,
   therefore, forbid the practice of putting servers with the same IP
   address and port but different protocols into a failover or load-
   balancing pool.  In that situation, RADIUS requests MAY be sent to
   another server that is known to be part of the same pool.

5.  RADIUS/DTLS-specific specifications

   This section discusses all specifications that are only relevant for
   RADIUS/DTLS.

5.1.  RADIUS packet handling

   The DTLS encryption adds an additional overhead to each packet sent.
   RADIUS/DTLS implementations MUST support sending and receiving RADIUS
   packets of 4096 bytes in length, with a corresponding increase in the
   maximum size of the encapsulated DTLS packets.  This larger packet
   size may cause the UDP packet to be larger than the Path MTU (PMTU),
   which causes the packet to be fragmented.  Implementers and operators
   should be aware of the possibility of fragmented UDP packets.  For
   details about issues with fragmentation see [RFC8900].

   RADIUS/DTLS endpoints MUST send exactly one RADIUS packet per DTLS
   record.  This ensures that the RADIUS packets do not get fragmented
   at a point where a re-ordering of UDP packets would result in
   decoding failures.  The DTLS specification mandates that a DTLS
   record must not span multiple UDP datagrams.  We note that a single
   UDP datagram may, however, contain multiple DTLS records.  RADIUS/
   DTLS endpoints MAY use this behavior to send multiple RADIUS packets
   in one UDP packet.

   For the receiving RADIUS/DTLS endpoint, the length checks defined in
   [RFC2865], Section 3 still apply.  That is, a receiving RADIUS/DTLS
   endpoint MUST perform all the length checks, but MUST use the length
   of the decrypted payload of the DTLS record instead of the UDP packet
   length.  Exactly one RADIUS packet is encapsulated in a DTLS record,
   and any data outside the range of the RADIUS length field within the
   decrypted payload of a single DTLS record MUST be treated as padding,
   as it would be with a RADIUS/UDP packet, and be ignored.  RADIUS

Rieckers, et al.         Expires 27 August 2026                [Page 22]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   implementations MUST NOT discard packets simply due to the existence
   of padding.  For UDP datagrams containing multiple DTLS records, each
   DTLS record MUST be parsed individually.

   If a RADIUS packet needs to be re-transmitted, either as
   retransmission due to a missing response by the client or as
   retransmission of a cached response by the server, the RADIUS/DTLS
   endpoints MUST re-process the RADIUS packet through DTLS.  That is,
   for the purpose of retransmissions, RADIUS/DTLS endpoints cache the
   RADIUS packet, as a RADIUS/UDP endpoint would, and do not cache the
   DTLS record that contains the RADIUS packet.

5.2.  Server behavior

   When a RADIUS/DTLS server receives packets on the configured RADIUS/
   DTLS port, all received packets MUST be treated as being RADIUS/DTLS.
   RADIUS/UDP packets MUST NOT be accepted on this port.

   Some servers maintain a list of allowed clients per destination port.
   Others maintain a global list of clients that are permitted to send
   packets to any port.  As such, a RADIUS/DTLS server MUST maintain a
   "DTLS Required" flag per client.

   This flag indicates whether or not that client is required to use
   DTLS.  When set, the flag indicates that the only traffic accepted
   from the client is over the RADIUS/DTLS port.  All non-DTLS traffic
   MUST be silently discarded.

   This flag is normally set by an administrator.  However, if the
   server receives DTLS traffic from a client, it SHOULD notify the
   administrator that DTLS is available for that client.  A server MAY
   automatically mark the client as "DTLS Required".

5.3.  Client behavior

   When a RADIUS/DTLS client sends packet to a RADIUS/DTLS port, all
   packets MUST be DTLS.  RADIUS/UDP packets MUST NOT be sent to this
   port.

   RADIUS/DTLS clients SHOULD NOT probe servers to see if they support
   DTLS transport.  Instead, clients SHOULD use DTLS as a transport
   layer only when administratively configured.

6.  Implementation Considerations

   This section discusses topics related to the internal behavior of
   RadSec implementations that should be considered by RadSec
   implementers.

Rieckers, et al.         Expires 27 August 2026                [Page 23]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

6.1.  RADIUS Implementation Changes

   The RADIUS packet format is unchanged from [RFC2865], [RFC2866] and
   [RFC5176].  Specifically, all of the following portions of RADIUS
   remain unchanged when using RadSec:

   *  Packet format

   *  Permitted codes

   *  Request Authenticator calculation

   *  Response Authenticator calculation

   *  Minimum packet length

   *  Maximum packet length

   *  Attribute format

   *  Vendor-Specific Attribute (VSA) format

   *  Permitted data types

   *  Calculation of dynamic attributes such as CHAP-Challenge, or
      Message-Authenticator

   *  Calculation of "encrypted" attributes such as Tunnel-Password.

   The use of (D)TLS transport does not change the calculation of
   security-related fields (such as the Response-Authenticator) in
   RADIUS [RFC2865] or RADIUS Dynamic Authorization [RFC5176].
   Calculation of attributes such as User-Password [RFC2865] or Message-
   Authenticator [RFC3579] also does not change.

   The changes to RADIUS implementations required to implement this
   specification are largely limited to the portions that send and
   receive packets on the network, and to the establishment of the
   (D)TLS connection.  The fact that RADIUS remains largely unchanged
   ensures the simplest possible implementation and widest
   interoperability of the specification.  This reuse includes the usage
   of the outdated security mechanisms in RADIUS that are based on
   shared secrets and MD5.  The use of MD5 here is not considered a
   security issue, since integrity and confidentiality are provided by
   the (D)TLS layer.  See Section 7 of this document or [RFC9765] for
   more details.  See also [RFC9765], Section 1 for a discussion of
   issues related to the continued use of MD5, even in situations where
   its use is known to be safe.

Rieckers, et al.         Expires 27 August 2026                [Page 24]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   We note that for RADIUS/DTLS the DTLS encapsulation of RADIUS means
   that UDP datagrams include an additional overhead due to DTLS.  This
   is discussed further in Section 5.

6.1.1.  Differences from RFC 6614 unwanted RADIUS packet handling

   The previous specification of RADIUS/TLS in [RFC6614] recommends to
   send a reply to unwanted RADIUS packets that depends on the request
   type:

   *  For unwanted CoA-Requests or Disconnect-Requests, the servers
      should respond with a CoA-NAK or Disconnect-NAK, respectively.

   *  For unwanted Accounting-Requests, the servers should respond with
      an Accounting-Response containing an Error-Cause attribute with
      the value 406 ("Unsupported Extension").

   [RFC6614] also recommends that a RADIUS/TLS client observing this
   Accounting-Response should stop sending Accounting-Request packets to
   this server.  This behavior, however, could lead to problems,
   especially in proxy fabrics, since the RADIUS client cannot determine
   whether the reply came from the correct server or a RADIUS proxy
   along the way.

   Compared to the [RFC6614] recommended replies (CoA-NAK, Disconnect-
   NAK and Accounting-Response), the Protocol-Error packet is explicitly
   only applicable to one RADIUS hop and must not be forwarded, which
   gives the RADIUS client the opportunity to re-route the unwanted
   packet to a different RADIUS server.  This also is backwards
   compatible with existing implementations, since RADIUS clients must
   ignore any incoming RADIUS packets with an unknown packet type.
   Therefore these [RFC6614] recommended reply message types are now
   replaced with the Protocol-Error packet type.

6.2.  Forwarding RADIUS packets between UDP and TCP based transports

   When a RADIUS proxy forwards packets, it is possible that the
   incoming and outgoing links have substantially different properties.
   This issue is most notable in UDP to TCP proxying, but there are
   still possible issues even when the same transport is used on both
   incoming and outgoing links.  [RFC2866], Section 1.2 noted this issue
   many years ago:

Rieckers, et al.         Expires 27 August 2026                [Page 25]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   A forwarding server may either perform its forwarding function in a
   pass through manner, where it sends retransmissions on as soon as it
   gets them, or it may take responsibility for retransmissions, for
   example in cases where the network link between forwarding and remote
   server has very different characteristics than the link between NAS
   and forwarding server.

   These differences are most notable in throughput, and in differing
   retransmission requirements.

6.2.1.  Throughput Differences lead to Network Collapse

   An incoming link to the proxy may have substantially different
   throughput than the outgoing link.  Perhaps the network
   characteristics on the two links are different, or perhaps the home
   server is slow.  In both situations, the proxy may be left with a
   difficult choice about what to do with the incoming packets, if the
   rate of incoming packets exceeds throughput on the outgoing link.

   As RADIUS does not provide for connection-based congestion control,
   there is no way for the proxy to signal on the incoming link that the
   client should slow its rate of sending packets.  As a result, the
   proxy generally will accept the packets, buffer them, and hope that
   they can be be sent outbound before the client gives up on the
   request.  Other courses of action are possible, but are
   implementation specific.  See [I-D.dekok-protocol-error] for more
   discussion on this topic.

6.2.2.  Differing Retransmission Requirements

   Due to the lossy nature of UDP, RADIUS/UDP and RADIUS/DTLS transports
   are required to perform retransmissions as per [RFC5080],
   Section 2.2.1.  In contrast, RADIUS/TCP and RADIUS/TLS transports are
   reliable, and do not perform retransmissions.  These requirements
   lead to an issue for proxies when they send packets across protocol
   boundaries with differing retransmission behaviors.

   When a proxy receives packets on an unreliable transport, and
   forwards them across a reliable transport, it receives
   retransmissions from the client, but MUST NOT forward those
   retransmissions across the reliable transport.  The proxy MAY log
   information about these retransmissions, but it does not perform any
   other action.

   When a proxy receives RADIUS packets on a reliable transport, and
   forwards them across an unreliable transport, the proxy MUST perform
   retransmissions across the unreliable transport as per [RFC5080],
   Section 2.2.1.  That is, the proxy takes responsibility for the

Rieckers, et al.         Expires 27 August 2026                [Page 26]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   retransmissions.  Implementations MUST take care to not completely
   decouple the two transports in this situation.  See Section 5.1 for
   details on retransmitting RADIUS packets over DTLS.

   That is, if an incoming connection on a reliable transport is closed,
   there may be pending retransmissions on an outgoing unreliable
   transport.  Those retransmissions MUST be stopped, as there is
   nowhere to send the reply.  Similarly, if the proxy sees that the
   client has given up on a request (such as by re-using an Identifier
   before the proxy has sent a response), the proxy MUST stop all
   retransmissions of the old request and discard it.

   The above requirements are a logical extension of the common practice
   where a client stops retransmission of a packet once it decides to
   "give up" on the packet and discard it.  Whether this discard process
   is due to internal client decisions, or interaction with incoming
   connections is irrelevant.  When the client cannot do anything with
   responses to a request, it MUST stop retransmitting that request.

6.2.3.  Acct-Delay-Time and Event-Timestamp

   In order to avoid congestive collapse, it is RECOMMENDED that RadSec
   clients which originate Accounting-Request packets (i.e., not
   proxies) do not include Acct-Delay-Time ([RFC2866], Section 5.2) in
   those packets.  Instead, those clients SHOULD include Event-Timestamp
   ([RFC2869], Section 5.3), which is the time at which the original
   event occurred.  The Event-Timestamp MUST NOT be updated on any
   retransmissions, as that would both negate the meaning of Event-
   Timestamp, and create the same problem as with Acct-Delay-Time.

   Not using Acct-Delay-Time allows for RADIUS Accounting-Request
   packets to be retransmitted without change.  In contrast, updating
   Acct-Delay-Time would require that the client create and send a new
   Accounting-Request packet without signaling the server that the
   previous packet is no longer considered active.  This process can
   occur repeatedly, which leads to multiple different packets
   containing effectively the same information (except for Acct-Delay-
   Time).  This duplication contributes to congestive collapse of the
   network, if one or more RADIUS proxies performs retransmission to the
   next hop for each of those packets independently.

   Additionally, the different properties of the RADIUS/TLS transport as
   well as cross-protocol proxying change the assumption of a negligible
   transmission time of the RADIUS packet, on which the value of Acct-
   Delay-Time is based.  While a single UDP packet may have a negligible
   transmission time, application data sent via TLS could arrive at the
   server with a significant delay due to the underlying TCP
   retransmission mechanism.  If the packet is proxied from RADIUS/TLS

Rieckers, et al.         Expires 27 August 2026                [Page 27]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   to RADIUS/DTLS or RADIUS/UDP, the proxy has to retransmit on its own
   without changing the value of Acct-Delay-Time, which again introduces
   non-negligible transmission delays.

   Using Event-Timestamp instead of Acct-Delay-Time also removes an
   ambiguity around retransmitted packets for RADIUS/TLS.  Since there
   is no change to the packet contents when a retransmission timer
   expires, no new packet ID is allocated, and therefore no new packet
   is created.

   Where RadSec clients do include Acct-Delay-Time in RADIUS packets,
   the client SHOULD use timers to detect packet loss, as described in
   Section 3.8.2.  Where RadSec clients do include Acct-Delay-Time in
   RADIUS packets, the client can rely on the Event-Timestamp to signal
   delays, and therefore SHOULD NOT update the Acct-Delay-Time.  If the
   timer has determined that the original packet has been completely
   lost, the client SHOULD then create a new RADIUS packet with the same
   information, and MAY update Acct-Delay-Time.  This behavior ensures
   that there is no congestive collapse, since a new packet is only
   created if following hops have also given up on retransmission.  The
   Event-Timestamp is then interpreted as the time at which the event
   occurred.  Where Acct-Delay-Time exists, it is then interpreted as
   the delay between the event and when the packet was sent.  Systems
   MUST NOT subtract the Acct-Delay-Time from Event-Timestamp to derive
   a time at which the event occurred; that time is exactly Event-
   Timestamp.  The existence of Acct-Delay-Time instead serves as an
   additional indication of delays in sending the packet.  Leaving the
   Acct-Delay-Time static reduces the granularity of Acct-Delay-Time to
   the retransmission timeout, compared to the different approach of
   updating the Acct-Delay-Time on each retransmission.

6.3.  Additional Verification of Peers

   There are numerous trust models in PKIX environments, and it is
   beyond the scope of this document to define how a particular
   deployment determines whether a client is trustworthy.
   Implementations that want to support a wide variety of trust models
   should expose as many details of the presented certificate to the
   administrator as possible so that the trust model can be implemented
   by the administrator.  As a suggestion, at least the following
   information from the TLS connection and the X.509 client certificate
   should be exposed:

   *  Originating IP address

   *  Certificate Fingerprint

   *  Issuer

Rieckers, et al.         Expires 27 August 2026                [Page 28]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   *  Subject

   *  all X.509v3 Extended Key Usage

   *  all X.509v3 Subject Alternative Name

   *  all X.509v3 Certificate Policy

   Similar to the PKIX trust model, clients using TLS-PSK may have
   additional policies to determine whether a client should be allowed
   to connect.  Therefore, in TLS-PSK operation, at least the following
   information from the TLS connection should be exposed:

   *  Originating IP address

   *  TLS-PSK Identifier

6.4.  TCP Applications Are Not UDP Applications

   Implementers should be aware that programming a robust TCP-based
   application can be very different from programming a robust UDP-based
   application.

   Additionally, differences in the transport like head-of-line blocking
   and the possibility of increased transmission times should be
   considered.

   When using RADIUS/UDP or RADIUS/DTLS, there is no ordering of
   packets.  If a packet sent by a endpoint is lost, that loss has no
   effect on subsequent packets sent by that endpoint.

Rieckers, et al.         Expires 27 August 2026                [Page 29]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   Unlike UDP, TCP is subject to issues related to head-of-line
   blocking.  This occurs when a TCP segment is lost and a subsequent
   TCP segment arrives out of order.  While the RADIUS endpoints can
   process RADIUS packets out of order, the semantics of TCP makes this
   impossible.  This limitation can lower the maximum packet processing
   rate of RADIUS/TLS.  In severe cases, this may have a noticeable
   effect on all authentications that run over the congested connection,
   especially authentications with multiple round trips such as EAP-
   based authentications.  In contrast, when a RADIUS/UDP or RADIUS/DTLS
   packet is lost, only this authentication session is affected.
   Additionally, due to the architecture of TCP as reliable stream
   transport, TCP retransmissions can occur significantly later, even
   multiple seconds, after the original data was passed to the network
   stack by the application.  In contrast, RADIUS/UDP packets are
   usually received either quickly, or not at all, in which case the
   RADIUS/UDP stack triggers a retransmission of the packet on the
   application layer.  This can impact or distort the accuracy of RADIUS
   attributes for timing which assume a negligible network delay, namely
   Acct-Delay-Time.

6.5.  DTLS Session Management

   Where RADIUS/TLS can rely on the TCP state machine to perform session
   tracking, RADIUS/DTLS cannot.  As a result, implementations of
   RADIUS/DTLS may need to perform session management of the DTLS
   session in the application layer.  This subsection describes
   logically how this tracking is done.  Implementations MAY choose to
   use the method described here, or another, equivalent method.  When
   implementations do not use the 5-tuple described below, note that IP
   address based policies MUST still be applied for all incoming
   packets, similar to the mandated behavior for TLS Session Resumption
   in Section 3.5.

   We note that [RFC5080], Section 2.2.2, already mandates a duplicate
   detection cache.  The session tracking described below can be seen as
   an extension of that cache, where entries contain DTLS sessions
   instead of RADIUS/UDP packets.

6.5.1.  Server Session Management

   A RADIUS/DTLS server using the 5-tuple method MUST track ongoing DTLS
   sessions for each client, based on the following 5-tuple:

   *  source IP address

   *  source port

   *  destination IP address

Rieckers, et al.         Expires 27 August 2026                [Page 30]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   *  destination port

   *  protocol (fixed to UDP)

   Note that this 5-tuple is independent of IP address version (IPv4 or
   IPv6).

   Each 5-tuple points to a unique session entry, which usually contains
   the following information:

   DTLS Session:  Any information required to maintain and manage the
      DTLS session.

   DTLS Data:  An implementation-specific variable that may contain
      information about the active DTLS session.  This variable may be
      empty or nonexistent.

      This data will typically contain information such as idle
      timeouts, session lifetimes, and other implementation-specific
      data.

6.5.1.1.  Session Opening and Closing

   Session tracking is subject to Denial-of-Service (DoS) attacks due to
   the ability of an attacker to forge UDP traffic.  RADIUS/DTLS servers
   SHOULD use the stateless cookie tracking technique described in
   [RFC6347], Section 4.2.1 for DTLS 1.2 and [RFC9147], Section 5.1 for
   DTLS 1.3.  DTLS sessions SHOULD NOT be tracked until a ClientHello
   packet has been received with an appropriate Cookie value.  Server
   implementation SHOULD have a way of tracking DTLS sessions that are
   partially set up.  Servers MUST limit both the number and impact on
   resources of partial sessions.

   Sessions (both 5-tuple and entry) MUST be deleted when the DTLS
   session is closed for any reason.  When a session is deleted due to
   it failing security requirements, the DTLS session MUST be closed,
   any TLS session resumption parameters for that session MUST be
   discarded, and all tracking information MUST be deleted.

   Since UDP is stateless, the potential exists for the client to
   initiate a new DTLS session using a particular 5-tuple, before the
   server has closed the old session.  For security reasons, the server
   MUST keep the old session active until either it has received secure
   notification from the client that the session is closed or the server
   decides to close the session based on idle timeouts.  Taking any
   other action would permit unauthenticated clients to perform a DoS
   attack, by reusing a 5-tuple and thus causing the server to close an
   active (and authenticated) DTLS session.

Rieckers, et al.         Expires 27 August 2026                [Page 31]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   As a result, servers MUST ignore any attempts to reuse an existing
   5-tuple from an active session.  This requirement can generally be
   reached by simply processing the packet through the existing DTLS
   session, as with any other packet received via that 5-tuple.  Non-
   compliant, or unexpected packets will be ignored by the DTLS layer.

6.5.2.  Client Session Management

   RADIUS/DTLS clients SHOULD NOT send both RADIUS/UDP and RADIUS/DTLS
   packets to different servers from the same source socket.  This
   practice causes increased complexity in the client application and
   increases the potential for security breaches due to implementation
   issues.

   RADIUS/DTLS clients MAY use PMTU discovery [RFC6520] to determine the
   PMTU between the client and server.  While a RADIUS client has
   limited to no possibilities to reduce the size of an outgoing RADIUS
   packet without unwanted side effects, it gives the RADIUS client the
   possibility to determine whether or not the RADIUS packet can even be
   sent over the connection.  Sending RADIUS packets that exceed the
   PMTU between the client and the server will result in IP
   fragmentation.  IP fragmentation may not be functioning, so by
   determining the PMTU, the RADIUS client can preemptively select a
   different RADIUS server to send the RADIUS packet to.  Note that PMTU
   discovery can only discover the PMTU of the current RADIUS hop and a
   RADIUS client has no reliable way to discover the PMTU across the
   whole RADIUS proxy chain.  Further discussion of this topic is
   outside of the scope of this document.

7.  Security Considerations

   As this specification relies on the existing TLS and DTLS
   specifications, all security considerations for these protocols also
   apply to the (D)TLS portions of RadSec.

   For RADIUS however, many security considerations raised in the RADIUS
   documents are related to RADIUS encryption and authorization.  Those
   issues are largely mitigated when (D)TLS is used as a transport
   method, since encryption and authorization is achieved on the (D)TLS
   layer.  The issues that are not mitigated by this specification are
   related to the RADIUS packet format and handling, which is unchanged
   in this specification.

   A few remaining security considerations and notes to administrators
   deploying RadSec are listed below.

Rieckers, et al.         Expires 27 August 2026                [Page 32]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

7.1.  Mixing Secure and Insecure Traffic

   It is RECOMMENDED that servers do not accept both secure and insecure
   traffic from the same source IP address.  Allowing RADIUS/UDP and
   RADIUS/DTLS from the same client exposes the traffic to downbidding
   attacks and is NOT RECOMMENDED.

   Administrators of a client can place servers into a load-balance or
   fail-over pools, no matter what the combination of values in the
   3-tuple which identifies a server.  However, administrators should
   limit these pools to servers with a similar security profile, e.g.,
   all UDP, or all (D)TLS.  Mixing insecure traffic with secure traffic
   will likely create security risks.

7.2.  RADIUS Proxies

   RadSec provides authentication, integrity and confidentiality
   protection for RADIUS traffic for a single hop between two RADIUS
   endpoints.  In the presence of proxies, intermediate proxies can
   still inspect the individual RADIUS packets, i.e., "end-to-end"
   encryption on the RADIUS layer is not provided.  Where intermediate
   proxies are untrusted, it is desirable to use other RADIUS mechanisms
   to prevent critical RADIUS attributes from inspection by such
   proxies.  One common method is to protect user credentials by using
   the Extensible Authentication Protocol (EAP) and EAP methods that
   utilize TLS.  However, in typical use cases there still remain
   attributes potentially containing confidential data (such as
   personally identifiable information or cryptographic keys) which
   cannot be protected from inspection by proxies.

   Additionally, when RADIUS proxies are used, the RADIUS client has no
   way of ensuring that the complete path of the RADIUS packet is
   protected, since RADIUS routing is done hop-by-hop and any
   intermediate proxy may be configured, after receiving a RADIUS packet
   via RadSec from one endpoint, to forward this packet to a different
   endpoint using the RADIUS/UDP transport profile.  Since with RADIUS/
   UDP, the packet is sent in cleartext, an eavesdropper can observe the
   packet over the RADIUS/UDP hops.  There is no technical solution with
   the current specification that enforces that a RADIUS packet is
   transported only via secure RADIUS transports over the whole path.
   If the confidentiality of the full contents of the RADIUS packet
   across the whole path is required, organizational solutions need to
   be in place that ensure that every intermediate RADIUS proxy is
   configured to forward the RADIUS packets using RadSec as transport.

   One possible way to reduce the attack surface is to reduce the number
   of proxies in the overall proxy chain.  For this, dynamic discovery
   as defined in [RFC7585] can be used.

Rieckers, et al.         Expires 27 August 2026                [Page 33]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

7.2.1.  Loopback-Attack on endpoints acting as Server and Client

   RadSec endpoints that are configured to act both as client and
   server, typically in a proxy configuration, may be vulnerable to
   attacks where an attacker mirrors back all traffic to the endpoint.
   Therefore, endpoints that are capable of acting as both client and
   server SHOULD implement mitigations to avoid accepting connections
   from itself.  One example of a potentially vulnerable configuration
   is a setup where the RadSec server is accepting incoming connections
   from any address (or a wide address range).  Since the server may not
   be able to verify the certificate subject or subject alternate names,
   the trust is based on the certificate issuer and/or on the contents
   of the certificate policies extension [RFC5280], Section 4.2.1.4.
   However, in this case, the client certificate which the RadSec
   endpoint uses for outgoing connections on the client side might also
   satisfy the trust check of the server side.  Other scenarios where
   the identification of an outgoing connection satisfies the trust
   check of an incoming one are possible, but are not enumerated here.

   Either through misconfiguration, erroneous or spoofed dynamic
   discovery, or an attacker rerouting TLS packets, a proxy might thus
   open a connection to itself, creating a loop.  Such attacks have been
   described for TLS-PSK [RFC9257], dubbed a selfie-attack, but are much
   broader in the RadSec case.  In particular, as described above, they
   also apply to certificate based authentication.

   Server implementations SHOULD therefore detect connections from
   itself, and reject them.  There is currently no detection method that
   works universally for all use-cases and TLS implementations.  Some
   possible detection methods are listed below:

   *  Comparing client or server random used in the TLS handshake.
      While this is a very effective method, it requires access to
      values which are normally private to the TLS implementation.

   *  Sending a custom random number in an extension in the TLS client
      hello.  Again, this is very effective, but requires extension of
      the TLS implementation.

   *  Comparing the incoming server certificate to all server
      certificates configured on the proxy.  While in some scenarios
      this can be a valid detection method, using the same server
      certificate on multiple servers would keep these servers from
      connecting with each other, even when this connection is
      legitimate.

Rieckers, et al.         Expires 27 August 2026                [Page 34]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   The application layer RADIUS protocol also offers some loop
   detection, e.g., using a Proxy-State attribute.  However, these
   methods are not capable of reliably detecting and suppressing these
   attacks in every case and are outside the scope of this document.

7.3.  Usage of NULL encryption cipher suites for debugging

   Some TLS implementations offer cipher suites with NULL encryption, to
   allow inspection of the plaintext with packet sniffing tools.  Since
   with RadSec the RADIUS shared secret is set to a static string
   ("radsec" for RADIUS/TLS, "radius/dtls" for RADIUS/DTLS), using a
   NULL encryption cipher suite will also result in complete disclosure
   of the whole RADIUS packet, including the encrypted RADIUS
   attributes, to any party eavesdropping on the conversation.
   Following the recommendations in [RFC9325], Section 4.1, this
   specification forbids the usage of NULL encryption cipher suites for
   RadSec.

   For cases where administrators need access to the decrypted RadSec
   traffic, we suggest using different approaches, like exporting the
   key material from TLS libraries according to
   [I-D.ietf-tls-keylogfile].

7.4.  Possibility of Denial-of-Service attacks

   Both RADIUS/TLS and RADIUS/DTLS have a considerable higher amount of
   data that the server needs to store in comparison to RADIUS/UDP.
   Therefore, an attacker could try to exhaust server resources.

   With RADIUS/UDP, any invalid RADIUS packet would fail the
   cryptographic checks and the server would silently discard that
   packet.  For RadSec, the server needs to perform at least a partial
   TLS handshake to determine whether or not the client is authorized.
   Performing a (D)TLS handshake is more complex than the cryptographic
   check of a RADIUS packet.  An attacker could try to trigger a high
   number of (D)TLS handshakes at the same time, resulting in a high
   server load and potentially a Denial-of-Service.  To prevent this
   attack, a RadSec server SHOULD have configurable limits on new
   connection attempts, and where configured, MUST enforce those limits.

   Both TLS and DTLS need to store connection information for each open
   (D)TLS connection.  Especially with DTLS, a bogus or misbehaving
   client could open an excessive number of DTLS connections.  This
   connection tracking could lead to a resource exhaustion on the server
   side, triggering a Denial-of-Service.  Therefore, RadSec servers
   SHOULD have a configurable limit of the number of connections they
   can track, and where configured, MUST enforce those limits.  When the
   total number of connections tracked is going to exceed the configured

Rieckers, et al.         Expires 27 August 2026                [Page 35]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   limit, servers MAY free up resources by closing the connection that
   has been idle for the longest time.  Doing so may free up idle
   resources that then allow the server to accept a new connection.

   RadSec servers MUST limit the number of partially open (D)TLS
   connections and SHOULD expose this limit as configurable option to
   the administrator.

   To prevent resource exhaustion by partially opening a large number of
   (D)TLS connections, RadSec servers SHOULD have a timeout on partially
   open (D)TLS connections.  We recommend a limit of a few seconds,
   implementations SHOULD expose this timeout as configurable option to
   the administrator.  If a (D)TLS connection is not established within
   this timeframe, it is likely that this connection is either not from
   a valid client, or it is from a valid client with unreliable
   connectivity.  In contrast, an established connection might not send
   packets for longer periods of time, but since the endpoints are
   mutually authenticated, leaving a connection available does not pose
   a problem other than the problems mentioned before.

   A different means of prevention is IP filtering.  If the IP range
   that the server expects clients to connect from is restricted, then
   the server can simply reject or drop all connection attempts from
   outside those ranges.  If every RadSec client is configured with an
   IP range, then the server does not even have to perform a partial TLS
   handshake if the connection attempt comes from outside every allowed
   range, but can instead immediately drop the connection.  To perform
   this lookup efficiently, RadSec servers SHOULD keep a list of the
   accumulated permitted IP address ranges, individually for each
   transport.

7.5.  TLS Connection Lifetime and Key Rotation

   The RadSec TLS connections may have a long lifetime.  Especially when
   dealing with high volume of RADIUS traffic, the encryption keys have
   to be rotated regularly, depending on both the amount of data which
   was transferred, and on the encryption method.  See [RFC8446],
   Section 5.5 and [I-D.irtf-cfrg-aead-limits] for more information.

   Implementers SHOULD be aware of this issue and determine whether the
   underlying TLS library automatically rotates encryption keys or not.
   If the underlying TLS library does not perform the rotation
   automatically, RadSec implementations SHOULD perform this rotation
   manually, either by a key update of the existing TLS connection or by
   closing the TLS connection and opening a new one.

Rieckers, et al.         Expires 27 August 2026                [Page 36]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

7.6.  Connection Closing On Malformed Packets

   If malformed RADIUS packets are received or the packets fail the
   authenticator checks, this specification requires that the (D)TLS
   connection be closed.  The reason is that the connection is expected
   to be used for transport of RADIUS packets only.

   Any non-RADIUS traffic on that connection means the other party is
   misbehaving and is potentially a security risk.  Similarly, any
   RADIUS traffic failing authentication vector or Message-Authenticator
   validation means that two parties do not have a common shared secret.
   Since the shared secret is static, this again means the other party
   is misbehaving.

   On the other hand, we want to avoid situations in which a third party
   can trigger such a connection closure, e.g., by sending a RADIUS
   packet with attributes the RadSec server does not understand.  If a
   RadSec endpoint would close the connection when receiving such
   packets, an attacker could repeatedly send such packets to disrupt
   the RadSec connection.  Leaving the connection open and ignoring
   unknown attributes also ensures forward compatibility.

7.7.  Migrating from RADIUS/UDP to RadSec

   Since RADIUS/UDP security relies on the MD5 algorithm, which is
   considered insecure, using RADIUS/UDP over insecure networks is
   risky.  We therefore recommend to migrate from RADIUS/UDP to RadSec.
   Within this migration process, however, there are a few items that
   need to be considered by administrators.

   Firstly, administrators may be tempted to simply migrate from RADIUS/
   UDP to RadSec with (D)TLS-PSK and reuse the RADIUS shared secret as
   (D)TLS-PSK.  While this may seem like an easy way to upgrade RADIUS/
   UDP to RadSec, the cryptographic problems with the RADIUS/UDP shared
   secret render the shared secret potentially compromised.  Using a
   potentially compromised shared secret as TLS-PSK compromises the
   whole TLS connection.  Therefore, as defined in [RFC9813],
   Section 4.1.3, any shared secret used with RADIUS/UDP before MUST NOT
   be used with RadSec and (D)TLS-PSK.  We also strongly recommend
   implementers to not reuse the configuration option for the RADIUS/UDP
   shared secret in the existing user interfaces for the (D)TLS-PSK too.
   Instead, these should be separate input fields in order to prevent
   accidental reuse of an existing shared secret when switching to
   (D)TLS-PSK.

   When upgrading from RADIUS/UDP to RadSec, there may be a period of
   time, where the connection between client and server is configured
   for both transport profiles.  If the old RADIUS/UDP configuration is

Rieckers, et al.         Expires 27 August 2026                [Page 37]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   left configured, but not used in normal operation, e.g., due to a
   fail-over configuration that prefers RadSec, an attacker could
   disrupt the RadSec communication and force a downgrade to RADIUS/UDP.
   To prevent this it is RECOMMENDED that, when the migration to RadSec
   is completed, the RADIUS/UDP configuration is removed.  RadSec
   clients MUST NOT fall back to RADIUS/UDP if the RadSec communication
   fails, unless explicitly configured this way.

   Special considerations apply for clients behind a NAT, where some
   clients use RADIUS/UDP and others use RadSec.  A RADIUS server might
   not be able to detect if a RadSec client falls back to RADIUS/UDP;
   they will appear with the same source IP address to the server and
   use the same shared secret.  It is therefore NOT RECOMMENDED to use
   both RADIUS/UDP and RadSec clients behind a NAT at the same time.

7.8.  Client Subsystems

   Many traditional clients treat RADIUS as subsystem-specific.  That
   is, each subsystem on the client has its own RADIUS implementation
   and configuration.  These independent implementations work for simple
   systems, but break down for RADIUS when multiple servers, fail-over
   and load-balancing are required.  With (D)TLS enabled, these problems
   are expected to get worse.

   We therefore recommend in these situations the client use a local
   proxy that arbitrates all RADIUS traffic between the client and all
   servers.  This proxy will encapsulate all knowledge about servers,
   including security policies, fail-over and load-balancing.  All
   client subsystems should communicate with this local proxy, perhaps
   via an internal API, or over a loopback address.

   The benefit of this configuration is that there is one place in the
   client that arbitrates all RADIUS traffic.  So long as the proxy
   implements RadSec, other subsystems that do not implement RadSec do
   not need to be updated to support it.  They can instead leverage the
   functionality of the local proxy to leverage the benefits of (D)TLS.
   (D)TLS connections opened by the proxy can remain open for a long
   period of time, even when client subsystems are restarted.  The proxy
   can be configured to do RADIUS/UDP to some servers and RadSec to
   others.

   Delegation of responsibilities and separation of tasks are important
   security principles.  By moving all RadSec knowledge to a (D)TLS-
   aware proxy, security analysis becomes simpler, and enforcement of
   correct security becomes easier.

Rieckers, et al.         Expires 27 August 2026                [Page 38]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

8.  Design Decisions

   Many of the design decisions of RADIUS/TLS and RADIUS/DTLS can be
   found in [RFC6614] and [RFC7360].  This section will discuss the
   rationale behind significant changes from the experimental
   specification.

8.1.  Mandatory-to-implement transports

   With the merging of RADIUS/TLS and RADIUS/DTLS the question of
   mandatory-to-implement transports arose.  In order to avoid
   incompatibilities, there were two possibilities: Either mandate one
   of the transports for all implementations or mandate the
   implementation of both transports for either the server or the
   client.  As of the time writing, RADIUS/TLS is widely adapted for
   some use cases.  However, TLS has some serious drawbacks when used
   for RADIUS transport.  Especially the sequential nature of the
   connection and the connected issues like head-of-line blocking could
   create problems.

   Therefore, the decision was made that RADIUS servers must implement
   both transports.  For RADIUS clients, that may run on more
   constrained hardware, implementers can choose to implement only the
   transport that is better suited for their needs.

8.2.  Mandatory-to-implement trust profiles

   [RFC6614] mandates the implementation of the trust profile
   "certificate with PKIX trust model" for both clients and servers.
   The experience of the deployment of RADIUS/TLS as specified in
   [RFC6614] has shown that most actors still rely on RADIUS/UDP.  Since
   dealing with certificates can create a lot of issues, both for
   implementers and administrators, for the re-specification we wanted
   to create an alternative to insecure RADIUS transports like RADIUS/
   UDP that can be deployed easily without much additional
   administrative overhead.

   As with the supported transports, the assumption is that RADIUS
   servers are less constrained than RADIUS clients.  Since some client
   implementations already support using certificates for mutual
   authentication and there are several use cases, where pre-shared keys
   are not usable (e.g., a dynamic federation with changing members),
   the decision was made that, analog to the supported transports,
   RadSec servers must implement both certificates with PKIX trust model
   and TLS-PSK as means of mutual authentication.  RadSec clients again
   can choose which method is better suited for them, but must, for
   compatibility reasons, implement at least one of the two.

Rieckers, et al.         Expires 27 August 2026                [Page 39]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

8.3.  Changes in application of TLS

   The original specification of RADIUS/TLS does not forbid the usage of
   compression in the TLS layer.  As per [RFC9325], Section 3.3,
   compression should not be used due to the possibility of compression-
   related attacks, unless the application protocol is proven to be not
   open to such attacks.  Since some attributes of the RADIUS packets
   within the TLS tunnel contain values that an attacker could at least
   partially choose (i.e., username, MAC address or EAP message), there
   is a possibility for compression-related attacks, that could
   potentially reveal data in other RADIUS attributes through length of
   the TLS record.  To circumvent this attack, this specification
   forbids the usage of TLS compression.

   Since usage of 0-RTT may have implications on forward secrecy and
   replay protection, this specification prohibits its use.  Protection
   against replay attacks is necessary, since a replayed RADIUS packet
   in the early data would be processed as new packet.  The additional
   effort that is needed to protect 0-RTT data against replays outweighs
   the benefit of the reduced processing time.

9.  IANA Considerations

   Upon approval, IANA should update the Reference and the Assignment
   Notes to radsec in the Service Name and Transport Protocol Port
   Number Registry:

   For TCP: * Service Name: radsec * Port Number: 2083 * Transport
   Protocol: tcp * Description: Secure RADIUS Service * Assignment
   notes: The TCP port 2083 was already previously assigned by IANA for
   "RadSec", an early implementation of RADIUS/TLS, prior to issuance of
   the experimental RFC 6614.  [RFCXXXX] updates RFC 6614 (RADIUS/TLS).
   * Reference: [RFCXXXX] (this document)

   For UDP: * Service Name: radsec * Port Number: 2083 * Transport
   Protocol: udp * Description: Secure RADIUS Service * Assignment
   notes: The UDP port 2083 was already previously assigned by IANA for
   "RadSec", an early implementation of RADIUS/DTLS, prior to issuance
   of the experimental RFC 7360.  [RFCXXXX] updates RFC 7360 (RADIUS/
   DTLS). * Reference: [RFCXXXX] (this document)

10.  References

10.1.  Normative References

Rieckers, et al.         Expires 27 August 2026                [Page 40]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/rfc/rfc2119>.

   [RFC2865]  Rigney, C., Willens, S., Rubens, A., and W. Simpson,
              "Remote Authentication Dial In User Service (RADIUS)",
              RFC 2865, DOI 10.17487/RFC2865, June 2000,
              <https://www.rfc-editor.org/rfc/rfc2865>.

   [RFC2866]  Rigney, C., "RADIUS Accounting", RFC 2866,
              DOI 10.17487/RFC2866, June 2000,
              <https://www.rfc-editor.org/rfc/rfc2866>.

   [RFC3539]  Aboba, B. and J. Wood, "Authentication, Authorization and
              Accounting (AAA) Transport Profile", RFC 3539,
              DOI 10.17487/RFC3539, June 2003,
              <https://www.rfc-editor.org/rfc/rfc3539>.

   [RFC3579]  Aboba, B. and P. Calhoun, "RADIUS (Remote Authentication
              Dial In User Service) Support For Extensible
              Authentication Protocol (EAP)", RFC 3579,
              DOI 10.17487/RFC3579, September 2003,
              <https://www.rfc-editor.org/rfc/rfc3579>.

   [RFC5080]  Nelson, D. and A. DeKok, "Common Remote Authentication
              Dial In User Service (RADIUS) Implementation Issues and
              Suggested Fixes", RFC 5080, DOI 10.17487/RFC5080, December
              2007, <https://www.rfc-editor.org/rfc/rfc5080>.

   [RFC5176]  Chiba, M., Dommety, G., Eklund, M., Mitton, D., and B.
              Aboba, "Dynamic Authorization Extensions to Remote
              Authentication Dial In User Service (RADIUS)", RFC 5176,
              DOI 10.17487/RFC5176, January 2008,
              <https://www.rfc-editor.org/rfc/rfc5176>.

   [RFC5246]  Dierks, T. and E. Rescorla, "The Transport Layer Security
              (TLS) Protocol Version 1.2", RFC 5246,
              DOI 10.17487/RFC5246, August 2008,
              <https://www.rfc-editor.org/rfc/rfc5246>.

   [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
              Housley, R., and W. Polk, "Internet X.509 Public Key
              Infrastructure Certificate and Certificate Revocation List
              (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
              <https://www.rfc-editor.org/rfc/rfc5280>.

Rieckers, et al.         Expires 27 August 2026                [Page 41]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   [RFC5997]  DeKok, A., "Use of Status-Server Packets in the Remote
              Authentication Dial In User Service (RADIUS) Protocol",
              RFC 5997, DOI 10.17487/RFC5997, August 2010,
              <https://www.rfc-editor.org/rfc/rfc5997>.

   [RFC6066]  Eastlake 3rd, D., "Transport Layer Security (TLS)
              Extensions: Extension Definitions", RFC 6066,
              DOI 10.17487/RFC6066, January 2011,
              <https://www.rfc-editor.org/rfc/rfc6066>.

   [RFC6347]  Rescorla, E. and N. Modadugu, "Datagram Transport Layer
              Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347,
              January 2012, <https://www.rfc-editor.org/rfc/rfc6347>.

   [RFC7585]  Winter, S. and M. McCauley, "Dynamic Peer Discovery for
              RADIUS/TLS and RADIUS/DTLS Based on the Network Access
              Identifier (NAI)", RFC 7585, DOI 10.17487/RFC7585, October
              2015, <https://www.rfc-editor.org/rfc/rfc7585>.

   [RFC7930]  Hartman, S., "Larger Packets for RADIUS over TCP",
              RFC 7930, DOI 10.17487/RFC7930, August 2016,
              <https://www.rfc-editor.org/rfc/rfc7930>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.

   [RFC8446]  Rescorla, E., "The Transport Layer Security (TLS) Protocol
              Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
              <https://www.rfc-editor.org/rfc/rfc8446>.

   [RFC9147]  Rescorla, E., Tschofenig, H., and N. Modadugu, "The
              Datagram Transport Layer Security (DTLS) Protocol Version
              1.3", RFC 9147, DOI 10.17487/RFC9147, April 2022,
              <https://www.rfc-editor.org/rfc/rfc9147>.

   [RFC9325]  Sheffer, Y., Saint-Andre, P., and T. Fossati,
              "Recommendations for Secure Use of Transport Layer
              Security (TLS) and Datagram Transport Layer Security
              (DTLS)", BCP 195, RFC 9325, DOI 10.17487/RFC9325, November
              2022, <https://www.rfc-editor.org/rfc/rfc9325>.

   [RFC9525]  Saint-Andre, P. and R. Salz, "Service Identity in TLS",
              RFC 9525, DOI 10.17487/RFC9525, November 2023,
              <https://www.rfc-editor.org/rfc/rfc9525>.

10.2.  Informative References

Rieckers, et al.         Expires 27 August 2026                [Page 42]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   [I-D.dekok-protocol-error]
              DeKok, A., "Standardising Protocol-Error", Work in
              Progress, Internet-Draft, draft-dekok-protocol-error-00,
              24 June 2025, <https://datatracker.ietf.org/doc/html/
              draft-dekok-protocol-error-00>.

   [I-D.ietf-tls-keylogfile]
              Thomson, M., Rosomakho, Y., and H. Tschofenig, "The
              SSLKEYLOGFILE Format for TLS", Work in Progress, Internet-
              Draft, draft-ietf-tls-keylogfile-05, 9 June 2025,
              <https://datatracker.ietf.org/doc/html/draft-ietf-tls-
              keylogfile-05>.

   [I-D.irtf-cfrg-aead-limits]
              Günther, F., Thomson, M., and C. A. Wood, "Usage Limits on
              AEAD Algorithms", Work in Progress, Internet-Draft, draft-
              irtf-cfrg-aead-limits-11, 4 December 2025,
              <https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-
              aead-limits-11>.

   [RFC1321]  Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321,
              DOI 10.17487/RFC1321, April 1992,
              <https://www.rfc-editor.org/rfc/rfc1321>.

   [RFC2869]  Rigney, C., Willats, W., and P. Calhoun, "RADIUS
              Extensions", RFC 2869, DOI 10.17487/RFC2869, June 2000,
              <https://www.rfc-editor.org/rfc/rfc2869>.

   [RFC4033]  Arends, R., Austein, R., Larson, M., Massey, D., and S.
              Rose, "DNS Security Introduction and Requirements",
              RFC 4033, DOI 10.17487/RFC4033, March 2005,
              <https://www.rfc-editor.org/rfc/rfc4033>.

   [RFC5077]  Salowey, J., Zhou, H., Eronen, P., and H. Tschofenig,
              "Transport Layer Security (TLS) Session Resumption without
              Server-Side State", RFC 5077, DOI 10.17487/RFC5077,
              January 2008, <https://www.rfc-editor.org/rfc/rfc5077>.

   [RFC6520]  Seggelmann, R., Tuexen, M., and M. Williams, "Transport
              Layer Security (TLS) and Datagram Transport Layer Security
              (DTLS) Heartbeat Extension", RFC 6520,
              DOI 10.17487/RFC6520, February 2012,
              <https://www.rfc-editor.org/rfc/rfc6520>.

   [RFC6613]  DeKok, A., "RADIUS over TCP", RFC 6613,
              DOI 10.17487/RFC6613, May 2012,
              <https://www.rfc-editor.org/rfc/rfc6613>.

Rieckers, et al.         Expires 27 August 2026                [Page 43]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   [RFC6614]  Winter, S., McCauley, M., Venaas, S., and K. Wierenga,
              "Transport Layer Security (TLS) Encryption for RADIUS",
              RFC 6614, DOI 10.17487/RFC6614, May 2012,
              <https://www.rfc-editor.org/rfc/rfc6614>.

   [RFC7360]  DeKok, A., "Datagram Transport Layer Security (DTLS) as a
              Transport Layer for RADIUS", RFC 7360,
              DOI 10.17487/RFC7360, September 2014,
              <https://www.rfc-editor.org/rfc/rfc7360>.

   [RFC8900]  Bonica, R., Baker, F., Huston, G., Hinden, R., Troan, O.,
              and F. Gont, "IP Fragmentation Considered Fragile",
              BCP 230, RFC 8900, DOI 10.17487/RFC8900, September 2020,
              <https://www.rfc-editor.org/rfc/rfc8900>.

   [RFC9257]  Housley, R., Hoyland, J., Sethi, M., and C. A. Wood,
              "Guidance for External Pre-Shared Key (PSK) Usage in TLS",
              RFC 9257, DOI 10.17487/RFC9257, July 2022,
              <https://www.rfc-editor.org/rfc/rfc9257>.

   [RFC9293]  Eddy, W., Ed., "Transmission Control Protocol (TCP)",
              STD 7, RFC 9293, DOI 10.17487/RFC9293, August 2022,
              <https://www.rfc-editor.org/rfc/rfc9293>.

   [RFC9765]  DeKok, A., "RADIUS/1.1: Leveraging Application-Layer
              Protocol Negotiation (ALPN) to Remove MD5", RFC 9765,
              DOI 10.17487/RFC9765, April 2025,
              <https://www.rfc-editor.org/rfc/rfc9765>.

   [RFC9813]  DeKok, A., "Operational Considerations for Using TLS Pre-
              Shared Keys (TLS-PSKs) with RADIUS", BCP 243, RFC 9813,
              DOI 10.17487/RFC9813, July 2025,
              <https://www.rfc-editor.org/rfc/rfc9813>.

Appendix A.  Changes from RFC6614 (RADIUS/TLS) and RFC7360 (RADIUS/DTLS)

   The following list contains the most important changes from the
   previous specifications in [RFC6613] (RADIUS/TCP), [RFC6614] (RADIUS/
   TLS) and [RFC7360] (RADIUS/DTLS).

   *  The protocols RADIUS/TLS and RADIUS/DTLS are now collectively
      referred to as RadSec.

   *  [RFC6614] referenced [RFC6613] for TCP-related specification,
      RFC6613 on the other hand had some specification for RADIUS/TLS.
      These specifications have been merged into this document, and
      therefore removes [RFC6613] as normative reference.

Rieckers, et al.         Expires 27 August 2026                [Page 44]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   *  RFC6614 marked TLSv1.1 or later as mandatory, this specification
      now references [RFC9325] for recommended TLS versions, which
      mandates TLS 1.2 and recommends TLS 1.3

   *  RFC6614 allowed use of TLS compression, this document forbids it.

   *  RFC6614 only requires support for the trust model "certificates
      with PKIX" ([RFC6614], Section 2.3).  This document changes this.
      For servers, TLS-X.509-PKIX (Section 3.3.1, equivalent to
      "certificates with PKIX" in RFC6614) and TLS-PSK (Section 3.3.2)
      is now mandated and clients must implement at least one of the
      two.

   *  The recommendation for TLS-X509-FINGERPRINT ([RFC6614],
      Section 2.3) is removed since the model has not been implemented
      by any known implementation of the experimental RADIUS/(D)TLS
      specifications.

   *  The mandatory-to-implement cipher suites are not referenced
      directly, this is replaced by a pointer to [RFC9325].

   *  The specification regarding steps for certificate verification has
      been updated.

   *  [RFC6613] mandated the use of Status-Server as watchdog algorithm,
      [RFC7360] only recommended it.  This specification mandates the
      use of Status-Server for both RADIUS/TLS and RADIUS/DTLS.

   *  [RFC6613] only included limited text around retransmissions, this
      document now gives more guidance on how to handle retransmissions
      and retries, especially across different transports.

   *  The rules for verifying the peer certificate have been updated to
      follow guidance provided in [RFC9525].  Using the Common Name RDN
      for validation of server certificates is now forbidden.

   *  The response to unwanted packets has changed.  Endpoints should
      now reply with a Protocol-Error packet, which is connection-
      specific and should not be proxied.

   The rationales behind some of these changes are outlined in
   Section 8.

Acknowledgments

   Thanks to the original authors of RFC 6613, RFC 6614 and RFC 7360:
   Alan DeKok, Stefan Winter, Mike McCauley, Stig Venaas and Klaas
   Wierenga.

Rieckers, et al.         Expires 27 August 2026                [Page 45]
Internet-Draft      RadSec: RADIUS over TLS and DTLS       February 2026

   Thanks to Arran Curdbard-Bell for text around keepalives and the
   Status-Server watchdog algorithm.

   Thanks to Alan DeKok for his constant review of this document over
   its whole process and his many text contributions, like text around
   forwarding issues between TCP and UDP based transports.

   Thanks to the following people for their feedback and suggested text
   changes: Alexander Clouter, Mark Donnelly, Fabian Mauchle, Valery
   Smyslov, Heikki Vatiainen, Paul Wouters.

Authors' Addresses

   Jan-Frederik Rieckers
   Deutsches Forschungsnetz | German National Research and Education Network
   Alexanderplatz 1
   10178 Berlin
   Germany
   Email: rieckers@dfn.de
   URI:   www.dfn.de

   Margaret Cullen (editor)
   Painless Security
   4 High Street, Suite 206
   North Andover, MA,  01845
   United States of America
   Email: margaret@painless-security.com

   Stefan Winter
   Fondation Restena | Restena Foundation
   2, avenue de l'Université
   L-4365 Esch-sur-Alzette
   Luxembourg
   Email: stefan.winter@restena.lu
   URI:   www.restena.lu

Rieckers, et al.         Expires 27 August 2026                [Page 46]