RADIUS ALPN and removing MD5
draft-ietf-radext-radiusv11-04
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-03-27
|
04 | Valery Smyslov | # Document Shepherd Write-Up for draft-ietf-radext-radiusv11 *Using the template for Shepherd Write-Ups dated 4 July 2022.* The reviewed version of the document is https://www.ietf.org/archive/id/draft-ietf-radext-radiusv11-04.txt ## … # Document Shepherd Write-Up for draft-ietf-radext-radiusv11 *Using the template for Shepherd Write-Ups dated 4 July 2022.* The reviewed version of the document is https://www.ietf.org/archive/id/draft-ietf-radext-radiusv11-04.txt ## Document History > Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? There is a broad consensus of the WG that this work is useful. In the first WGLC only three people expressed their explicit support, after a first review and a second (1-week) WGLC, more people expressed support and nobody objected. > Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There was some controversy around the naming of the new specification. Ultimately it was decided to not name the document "RADIUS version 1.1", since it is not really a new RADIUS version, however, this name is still present in the ALPN label. Another point of controversy was around the specific language regarding FIPS-140 compliance, especially regarding the ability to be FIPS complient despite using cryptographic methods like MD5, if they are not used for security. Input from several individuals that have experience in this area should have resolved these issues, so that the document reflects a correct representation of the topic regarding FIPS-140 compliance. > Has anyone threatened an appeal or otherwise indicated extreme discontent? No. > For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? There is an implementation of this draft available in FreeRADIUS. Other implementers have signaled their willingness to implement, namely radsecproxy and RADIATOR. ## Additional Reviews > Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. This document closely interacts with TLS, in particular the ALPN feature. There has been no explicit review of the document in the TLS working group yet, but the document shepherd believes that a review of by the TLS WG would be of benefit, especially since the document shepherd is not as experienced in the TLS specification. One specific topic for the TLS WG to review would be the specification about TLS session resumption and ALPN. > Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. None are required. > If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? This document does not contain YANG. > Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document does not contain any formal language that needs to be validated. ## Document Shepherd Checks > Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The document is well-written and well-structured. The specification is clear and complete. The ALPN feature for RADIUS/(D)TLS with the additional benifits of increased ID space for increased number of parallel pending authentications and losing the dependency MD5 is definitely needed. There are still some small issues, that are summarized in this message to the radext WG mailinglist: https://mailarchive.ietf.org/arch/msg/radext/fPFY7ZafCsMVAxqS6AjOqdmO2Zg These issues do not warrent a further hold, the document can be handed off to the AD and the issues can be addressed during the publication process. > Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? From the Doc Shepherd's perspective, this document should not have any issues that are listed in common issues outside the SEC area. As previously stated, review from TLS experts is encouraged, since this document makes use of several TLS features. >What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The document currently intends to be published as Experimental. The document header states this, as does the datatracker attribute. An issue regarding this status has been raised by the responsible AD Paul Wouters, who requested to add considerations about the experimental status of the draft with a timeline when this new specification will be moved to standards track. Given the reliance on the still-experimental documents RFC6614 and RFC7360, the experimental status is appropriate. Waiting for the RADIUS/(D)TLS-bis draft was concidered by the working group, but ultimately the WG chose to move forward with the document as-is and possibly re-publish it in the standards track after the RADIUS/(D)TLS-bis draft is published as standards-track RFC. > Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? There have been no IPR disclosures, and neither the author, the chairs, nor the document shepherd are aware of other IPR claims. > Has each author, editor, and contributor shown their willingness to be listed as such? Yes. > Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) From the content guidelines, the following issues arise: The security consideration section does not contain specific text. Since the whole document addresses security considerations raised against RADIUS and explains them inline, this could be seen as sufficient. The idnits tool issued the following warnings: * Unused/Duplicate Reference `[BCP14]` * Section 2 (Terminology) references both RFC2119 and RFC8174. Probably the reference to `[BCP14]` could be just removed from the normative references section. * Obsolete reference to RFC 5077 (Stateless TLS Session Resumption) * This reference is part of a citation from RFC 8301, Section 3.1 * No mention of the updated RFCs in the abstract * The abstract does not have direct references to the RFC-numbers, but mentions the protocol names defined in these RFCs (RFC6614 RADIUS/TLS, RFC7360 RADIUS/DTLS). RFC 5176 is not mentioned in the abstract, only in the introduction. Since the update of RFC 5176 is minimal (allowing the "Error-Cause" attribute to appear in Access-Rejects), the Doc Shepherd thinks this is sufficient, a separate mention of the update in the abstract would needlessly lengthen the abstract. > Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The curent document lists RFC6614 (RADIUS/TLS), RFC7360 (RADIUS/DTLS) and RFC5175 (Dynamic Authorization Extensions to RADIUS) as documents to be updated, but they are referenced only informatively. The document shepherd believes that at least RFC6614 and RFC7360 should be normative references, since this document is based on these two documents and understanding the specification in those documents is neccessary to understand the specification in this document. > List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are RFCs and therefore freely available. > Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. The current specification does not contain downward references. > Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? The current specification does not have references to work in progress documents. There is currently work done in the radext WG that will deprecate RFC6614 and RFC7360 by issuing a -bis document (draft-ietf-radext-radius-dtls-bis) The progress on that bis-draft is mostly independent from the ALPN document, the ALPN document can be published without a problem. > Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. The updated RFCs are stated on the title page. (For details about Abstract/Introduction see answer to idnits above.) The document changes some RADIUS attributes that were defined in the original RADIUS documents and later additions (RFC2865, RFC2548, RFC2868). Since those updates are specific to this document and the list is not exhaustive (i.e. other vendor-specific attributes may also implement an obfuscation based on the shared secret), it is reasonable to not include these RFCs in the "Updates:" part of this document. > Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The IANA section aligns with the rest of the document. The document inserts two new values in the TLS ALPN Protocol IDs registry, which has the Registration procedure "Expert Review". The registry entries in the document match the required data for the IANA registry. An expert review has not taken place yet. > List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The document does not allocate new IANA registries. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
2024-03-27
|
04 | Valery Smyslov | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2024-03-27
|
04 | Valery Smyslov | IESG state changed to Publication Requested from I-D Exists |
2024-03-27
|
04 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
2024-03-27
|
04 | Valery Smyslov | Responsible AD changed to Paul Wouters |
2024-03-27
|
04 | Valery Smyslov | Document is now in IESG state Publication Requested |
2024-03-17
|
04 | Jan-Frederik Rieckers | # Document Shepherd Write-Up for draft-ietf-radext-radiusv11 *Using the template for Shepherd Write-Ups dated 4 July 2022.* The reviewed version of the document is https://www.ietf.org/archive/id/draft-ietf-radext-radiusv11-04.txt ## … # Document Shepherd Write-Up for draft-ietf-radext-radiusv11 *Using the template for Shepherd Write-Ups dated 4 July 2022.* The reviewed version of the document is https://www.ietf.org/archive/id/draft-ietf-radext-radiusv11-04.txt ## Document History > Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? There is a broad consensus of the WG that this work is useful. In the first WGLC only three people expressed their explicit support, after a first review and a second (1-week) WGLC, more people expressed support and nobody objected. > Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There was some controversy around the naming of the new specification. Ultimately it was decided to not name the document "RADIUS version 1.1", since it is not really a new RADIUS version, however, this name is still present in the ALPN label. Another point of controversy was around the specific language regarding FIPS-140 compliance, especially regarding the ability to be FIPS complient despite using cryptographic methods like MD5, if they are not used for security. Input from several individuals that have experience in this area should have resolved these issues, so that the document reflects a correct representation of the topic regarding FIPS-140 compliance. > Has anyone threatened an appeal or otherwise indicated extreme discontent? No. > For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? There is an implementation of this draft available in FreeRADIUS. Other implementers have signaled their willingness to implement, namely radsecproxy and RADIATOR. ## Additional Reviews > Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. This document closely interacts with TLS, in particular the ALPN feature. There has been no explicit review of the document in the TLS working group yet, but the document shepherd believes that a review of by the TLS WG would be of benefit, especially since the document shepherd is not as experienced in the TLS specification. One specific topic for the TLS WG to review would be the specification about TLS session resumption and ALPN. > Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. None are required. > If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? This document does not contain YANG. > Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document does not contain any formal language that needs to be validated. ## Document Shepherd Checks > Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The document is well-written and well-structured. The specification is clear and complete. The ALPN feature for RADIUS/(D)TLS with the additional benifits of increased ID space for increased number of parallel pending authentications and losing the dependency MD5 is definitely needed. There are still some small issues, that are summarized in this message to the radext WG mailinglist: https://mailarchive.ietf.org/arch/msg/radext/fPFY7ZafCsMVAxqS6AjOqdmO2Zg These issues do not warrent a further hold, the document can be handed off to the AD and the issues can be addressed during the publication process. > Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? From the Doc Shepherd's perspective, this document should not have any issues that are listed in common issues outside the SEC area. As previously stated, review from TLS experts is encouraged, since this document makes use of several TLS features. >What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The document currently intends to be published as Experimental. The document header states this, as does the datatracker attribute. An issue regarding this status has been raised by the responsible AD Paul Wouters, who requested to add considerations about the experimental status of the draft with a timeline when this new specification will be moved to standards track. Given the reliance on the still-experimental documents RFC6614 and RFC7360, the experimental status is appropriate. Waiting for the RADIUS/(D)TLS-bis draft was concidered by the working group, but ultimately the WG chose to move forward with the document as-is and possibly re-publish it in the standards track after the RADIUS/(D)TLS-bis draft is published as standards-track RFC. > Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? There have been no IPR disclosures, and neither the author, the chairs, nor the document shepherd are aware of other IPR claims. > Has each author, editor, and contributor shown their willingness to be listed as such? Yes. > Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) From the content guidelines, the following issues arise: The security consideration section does not contain specific text. Since the whole document addresses security considerations raised against RADIUS and explains them inline, this could be seen as sufficient. The idnits tool issued the following warnings: * Unused/Duplicate Reference `[BCP14]` * Section 2 (Terminology) references both RFC2119 and RFC8174. Probably the reference to `[BCP14]` could be just removed from the normative references section. * Obsolete reference to RFC 5077 (Stateless TLS Session Resumption) * This reference is part of a citation from RFC 8301, Section 3.1 * No mention of the updated RFCs in the abstract * The abstract does not have direct references to the RFC-numbers, but mentions the protocol names defined in these RFCs (RFC6614 RADIUS/TLS, RFC7360 RADIUS/DTLS). RFC 5176 is not mentioned in the abstract, only in the introduction. Since the update of RFC 5176 is minimal (allowing the "Error-Cause" attribute to appear in Access-Rejects), the Doc Shepherd thinks this is sufficient, a separate mention of the update in the abstract would needlessly lengthen the abstract. > Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The curent document lists RFC6614 (RADIUS/TLS), RFC7360 (RADIUS/DTLS) and RFC5175 (Dynamic Authorization Extensions to RADIUS) as documents to be updated, but they are referenced only informatively. The document shepherd believes that at least RFC6614 and RFC7360 should be normative references, since this document is based on these two documents and understanding the specification in those documents is neccessary to understand the specification in this document. > List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are RFCs and therefore freely available. > Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. The current specification does not contain downward references. > Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? The current specification does not have references to work in progress documents. There is currently work done in the radext WG that will deprecate RFC6614 and RFC7360 by issuing a -bis document (draft-ietf-radext-radius-dtls-bis) The progress on that bis-draft is mostly independent from the ALPN document, the ALPN document can be published without a problem. > Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. The updated RFCs are stated on the title page. (For details about Abstract/Introduction see answer to idnits above.) The document changes some RADIUS attributes that were defined in the original RADIUS documents and later additions (RFC2865, RFC2548, RFC2868). Since those updates are specific to this document and the list is not exhaustive (i.e. other vendor-specific attributes may also implement an obfuscation based on the shared secret), it is reasonable to not include these RFCs in the "Updates:" part of this document. > Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The IANA section aligns with the rest of the document. The document inserts two new values in the TLS ALPN Protocol IDs registry, which has the Registration procedure "Expert Review". The registry entries in the document match the required data for the IANA registry. An expert review has not taken place yet. > List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The document does not allocate new IANA registries. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
2024-03-17
|
04 | Jan-Frederik Rieckers | # Document Shepherd Write-Up for draft-ietf-radext-radiusv11 *Using the template for Shepherd Write-Ups dated 4 July 2022.* The reviewed version of the document is https://www.ietf.org/archive/id/draft-ietf-radext-radiusv11-04.txt ## … # Document Shepherd Write-Up for draft-ietf-radext-radiusv11 *Using the template for Shepherd Write-Ups dated 4 July 2022.* The reviewed version of the document is https://www.ietf.org/archive/id/draft-ietf-radext-radiusv11-04.txt ## Document History > Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? There is a broad consensus of the WG that this work is useful. In the first WGLC only three people expressed their explicit support, after a first review and a second (1-week) WGLC, more people expressed support and nobody objected. > Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There was some controversy around the naming of the new specification. Ultimately it was decided to not name the document "RADIUS version 1.1", since it is not really a new RADIUS version, however, this name is still present in the ALPN label. Another point of controversy was around the specific language regarding FIPS-140 compliance, especially regarding the ability to be FIPS complient despite using cryptographic methods like MD5, if they are not used for security. Input from several individuals that have experience in this area should have resolved these issues, so that the document reflects a correct representation of the topic regarding FIPS-140 compliance. > Has anyone threatened an appeal or otherwise indicated extreme discontent? No. > For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? There is an implementation of this draft available in FreeRADIUS. Other implementers have signaled their willingness to implement, namely radsecproxy and RADIATOR. ## Additional Reviews > Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. This document closely interacts with TLS, in particular the ALPN feature. There has been no explicit review of the document in the TLS working group yet, but the document shepherd believes that a review of by the TLS WG would be of benefit, especially since the document shepherd is not as experienced in the TLS specification. One specific topic for the TLS WG to review would be the specification about TLS session resumption and ALPN. > Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. None are required. > If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? This document does not contain YANG. > Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document does not contain any formal language that needs to be validated. ## Document Shepherd Checks > Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The document is well-written and well-structured. The specification is clear and complete. The ALPN feature for RADIUS/(D)TLS with the additional benifits of increased ID space for increased number of parallel pending authentications and losing the dependency MD5 is definitely needed. There are still some small issues, that are summarized in this message to the radext WG mailinglist: https://mailarchive.ietf.org/arch/msg/radext/fPFY7ZafCsMVAxqS6AjOqdmO2Zg These documents do not warrent a further hold, the document can be handed off to the AD and the issues can be addressed during the publication process. > Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? From the Doc Shepherd's perspective, this document should not have any issues that are listed in common issues outside the SEC area. As previously stated, review from TLS experts is encouraged, since this document makes use of several TLS features. >What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The document currently intends to be published as Experimental. The document header states this, as does the datatracker attribute. An issue regarding this status has been raised by the responsible AD Paul Wouters, who requested to add considerations about the experimental status of the draft with a timeline when this new specification will be moved to standards track. Given the reliance on the still-experimental documents RFC6614 and RFC7360, the experimental status is appropriate. Waiting for the RADIUS/(D)TLS-bis draft was concidered by the working group, but ultimately the WG chose to move forward with the document as-is and possibly re-publish it in the standards track after the RADIUS/(D)TLS-bis draft is published as standards-track RFC. > Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? There have been no IPR disclosures, and neither the author, the chairs, nor the document shepherd are aware of other IPR claims. > Has each author, editor, and contributor shown their willingness to be listed as such? Yes. > Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) From the content guidelines, the following issues arise: The security consideration section does not contain specific text. Since the whole document addresses security considerations raised against RADIUS and explains them inline, this could be seen as sufficient. The idnits tool issued the following warnings: * Unused/Duplicate Reference `[BCP14]` * Section 2 (Terminology) references both RFC2119 and RFC8174. Probably the reference to `[BCP14]` could be just removed from the normative references section. * Obsolete reference to RFC 5077 (Stateless TLS Session Resumption) * This reference is part of a citation from RFC 8301, Section 3.1 * No mention of the updated RFCs in the abstract * The abstract does not have direct references to the RFC-numbers, but mentions the protocol names defined in these RFCs (RFC6614 RADIUS/TLS, RFC7360 RADIUS/DTLS). RFC 5176 is not mentioned in the abstract, only in the introduction. Since the update of RFC 5176 is minimal (allowing the "Error-Cause" attribute to appear in Access-Rejects), the Doc Shepherd thinks this is sufficient, a separate mention of the update in the abstract would needlessly lengthen the abstract. > Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The curent document lists RFC6614 (RADIUS/TLS), RFC7360 (RADIUS/DTLS) and RFC5175 (Dynamic Authorization Extensions to RADIUS) as documents to be updated, but they are referenced only informatively. The document shepherd believes that at least RFC6614 and RFC7360 should be normative references, since this document is based on these two documents and understanding the specification in those documents is neccessary to understand the specification in this document. > List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are RFCs and therefore freely available. > Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. The current specification does not contain downward references. > Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? The current specification does not have references to work in progress documents. There is currently work done in the radext WG that will deprecate RFC6614 and RFC7360 by issuing a -bis document (draft-ietf-radext-radius-dtls-bis) The progress on that bis-draft is mostly independent from the ALPN document, the ALPN document can be published without a problem. > Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. The updated RFCs are stated on the title page. (For details about Abstract/Introduction see answer to idnits above.) The document changes some RADIUS attributes that were defined in the original RADIUS documents and later additions (RFC2865, RFC2548, RFC2868). Since those updates are specific to this document and the list is not exhaustive (i.e. other vendor-specific attributes may also implement an obfuscation based on the shared secret), it is reasonable to not include these RFCs in the "Updates:" part of this document. > Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The IANA section aligns with the rest of the document. The document inserts two new values in the TLS ALPN Protocol IDs registry, which has the Registration procedure "Expert Review". The registry entries in the document match the required data for the IANA registry. An expert review has not taken place yet. > List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The document does not allocate new IANA registries. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
2024-03-17
|
04 | Valery Smyslov | Intended Status changed to Experimental from None |
2024-02-26
|
04 | Alan DeKok | New version available: draft-ietf-radext-radiusv11-04.txt |
2024-02-26
|
04 | (System) | New version approved |
2024-02-26
|
04 | (System) | Request for posting confirmation emailed to previous authors: Alan DeKok |
2024-02-26
|
04 | Alan DeKok | Uploaded new revision |
2023-11-24
|
03 | Jan-Frederik Rieckers | Document shepherd email changed |
2023-11-23
|
03 | Valery Smyslov | Notification list changed to mrcullen42@gmail.com, rieckers@uni-bremen.de from mrcullen42@gmail.com because the document shepherd was set |
2023-11-23
|
03 | Valery Smyslov | Document shepherd changed to Jan-Frederik Rieckers |
2023-11-21
|
03 | Valery Smyslov | Notification list changed to mrcullen42@gmail.com because the document shepherd was set |
2023-11-21
|
03 | Valery Smyslov | Document shepherd changed to Margaret Cullen |
2023-11-21
|
03 | Valery Smyslov | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2023-11-17
|
03 | Alan DeKok | New version available: draft-ietf-radext-radiusv11-03.txt |
2023-11-17
|
03 | Alan DeKok | New version approved |
2023-11-17
|
03 | (System) | Request for posting confirmation emailed to previous authors: Alan DeKok |
2023-11-17
|
03 | Alan DeKok | Uploaded new revision |
2023-11-17
|
03 | (System) | Request for posting confirmation emailed to previous authors: Alan DeKok |
2023-11-17
|
03 | Alan DeKok | Uploaded new revision |
2023-10-26
|
02 | Valery Smyslov | IETF WG state changed to In WG Last Call from WG Document |
2023-10-26
|
02 | Valery Smyslov | Added to session: IETF-118: radext Fri-1200 |
2023-10-11
|
02 | Alan DeKok | New version available: draft-ietf-radext-radiusv11-02.txt |
2023-10-11
|
02 | (System) | New version approved |
2023-10-11
|
02 | (System) | Request for posting confirmation emailed to previous authors: Alan DeKok |
2023-10-11
|
02 | Alan DeKok | Uploaded new revision |
2023-07-19
|
01 | Valery Smyslov | Added to session: IETF-117: radext Mon-1630 |
2023-05-24
|
01 | Alan DeKok | New version available: draft-ietf-radext-radiusv11-01.txt |
2023-05-24
|
01 | Alan DeKok | New version approved |
2023-05-24
|
01 | (System) | Request for posting confirmation emailed to previous authors: Alan DeKok |
2023-05-24
|
01 | Alan DeKok | Uploaded new revision |
2023-05-19
|
00 | Valery Smyslov | Added to session: interim-2023-radext-01 |
2023-04-26
|
00 | Valery Smyslov | Changed document external resources from: None to: github_repo https://github.com/radext-wg/draft-ietf-radext-radiusv11.git |
2023-04-26
|
00 | Valery Smyslov | This document now replaces draft-dekok-radext-radiusv11 instead of None |
2023-04-26
|
00 | Alan DeKok | New version available: draft-ietf-radext-radiusv11-00.txt |
2023-04-26
|
00 | Valery Smyslov | WG -00 approved |
2023-04-26
|
00 | Alan DeKok | Set submitter to "Alan DeKok ", replaces to draft-dekok-radext-radiusv11 and sent approval email to group chairs: radext-chairs@ietf.org |
2023-04-26
|
00 | Alan DeKok | Uploaded new revision |