Skip to main content

IETF Last Call Review of draft-ietf-radext-radiusdtls-bis-14
review-ietf-radext-radiusdtls-bis-14-secdir-lc-housley-2026-02-13-00

Request Review of draft-ietf-radext-radiusdtls-bis
Requested revision No specific revision (document currently at 15)
Type IETF Last Call Review
Team Security Area Directorate (secdir)
Deadline 2026-02-23
Requested 2026-02-09
Authors Jan-Frederik Rieckers , Margaret Cullen , Stefan Winter
I-D last updated 2026-03-18 (Latest revision 2026-02-23)
Completed reviews Secdir Early review of -02 by Russ Housley (diff)
Dnsdir IETF Last Call review of -14 by R. (Miek) Gieben (diff)
Genart IETF Last Call review of -15 by Mallory Knodel
Secdir IETF Last Call review of -14 by Russ Housley (diff)
Opsdir IETF Last Call review of -15 by Jürgen Schönwälder
Secdir Telechat review of -15 by Russ Housley
Assignment Reviewer Russ Housley
State Completed
Request IETF Last Call review on draft-ietf-radext-radiusdtls-bis by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/Xajgwi_q3rhssPu10p4YLeCB5Go
Reviewed revision 14 (document currently at 15)
Result Has issues
Completed 2026-02-13
review-ietf-radext-radiusdtls-bis-14-secdir-lc-housley-2026-02-13-00
I reviewed this document as part of the Security Directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Security Area
Directors.  Document authors, document editors, and WG chairs should
treat these comments just like any other IETF Last Call comments.

Document: draft-ietf-radext-radiusdtls-bis-14
Reviewer: Russ Housley
Review Date: 2026-02-13
IETF LC End Date: Unknown
IESG Telechat date: Unknown

Summary: Has Issues


Major Concerns:

Section 3.2: The document says that implementers "MUST follow
the recommendations given in [RFC9325]".  No worries there.
However, you do not want to revise this document just because
[RFC9325] gets revised.  Instead say "[RFC9325] or its successors"


Minor Concerns:

Section 3.2: The "must" in the second sentence seems to be a consequence
of the "MUST" in the first sentence.  I suggest rewording to avoid
implementers wondering whether this ought to be upper case.  Perhaps
the second sentece could start with: "as a result, all data ...".

Section 3.2: I agree that 0-RTT is inappropriate.  I think that 0-RTT
MUST NOT be used for protection of RADIUS packets for the reason given.
In addition, it could be the fourth bullet in the list of requirements.

Section 3.3.1: The term "configured trust base" is not defined. I
suggest that this term be avoided altogether. I understand changes to
the set of configured trust anchors, but fresh CRLs are issued all the
time.  These two should probably not be talked about in the same bullet
since a fresh CRL does not impact every certification path that might be
active at a RADIUIS server.

Section 3.4: The second paragraphe ends with "determined as follows."  I
was expecting this to end with a colon, and then there to be a list of
bullets or some numbered items.

Section 7.5: You might want to point to draft-ietf-tls-extended-key-update,
which will eventually offer the ability to change the session keys
without shutting down the TLS session.


Food for thought:

Section 3.3: You might consider TLS-X.509-PKIX-PSK for TLS 1.3, which
gives certificate-based authentication and some protection against the
future invention of a quantum computer.  See draft-ietf-tls-8773bis,
which is in the RFC Editor's queue.


Nits:

Section 3.3.1: s/Certificate Authorities/Certification Authorities/

Section 3.3.1: s/longer than the validity span/beyond the validity period/

Section 3.3.1: s/(i.e. proxies)/(i.e., proxies)/

Section 3.3.1: s/trust chain check/certification path validation/

Section 3.7: s/(i.e. proxy)/(i.e., proxy)/

Section 7.7: s/e.g./e.g.,/