rfc3579.txt 102 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579
  1. Network Working Group B. Aboba
  2. Request for Comments: 3579 Microsoft
  3. Updates: 2869 P. Calhoun
  4. Category: Informational Airespace
  5. September 2003
  6. RADIUS (Remote Authentication Dial In User Service)
  7. Support For Extensible Authentication Protocol (EAP)
  8. Status of this Memo
  9. This memo provides information for the Internet community. It does
  10. not specify an Internet standard of any kind. Distribution of this
  11. memo is unlimited.
  12. Copyright Notice
  13. Copyright (C) The Internet Society (2003). All Rights Reserved.
  14. Abstract
  15. This document defines Remote Authentication Dial In User Service
  16. (RADIUS) support for the Extensible Authentication Protocol (EAP), an
  17. authentication framework which supports multiple authentication
  18. mechanisms. In the proposed scheme, the Network Access Server (NAS)
  19. forwards EAP packets to and from the RADIUS server, encapsulated
  20. within EAP-Message attributes. This has the advantage of allowing
  21. the NAS to support any EAP authentication method, without the need
  22. for method-specific code, which resides on the RADIUS server. While
  23. EAP was originally developed for use with PPP, it is now also in use
  24. with IEEE 802.
  25. This document updates RFC 2869.
  26. Aboba & Calhoun Informational [Page 1]
  27. RFC 3579 RADIUS & EAP September 2003
  28. Table of Contents
  29. 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
  30. 1.1. Specification of Requirements. . . . . . . . . . . . . . 3
  31. 1.2. Terminology. . . . . . . . . . . . . . . . . . . . . . . 3
  32. 2. RADIUS Support for EAP . . . . . . . . . . . . . . . . . . . . 4
  33. 2.1. Protocol Overview. . . . . . . . . . . . . . . . . . . . 5
  34. 2.2. Invalid Packets. . . . . . . . . . . . . . . . . . . . . 9
  35. 2.3. Retransmission . . . . . . . . . . . . . . . . . . . . . 10
  36. 2.4. Fragmentation. . . . . . . . . . . . . . . . . . . . . . 10
  37. 2.5. Alternative uses . . . . . . . . . . . . . . . . . . . . 11
  38. 2.6. Usage Guidelines . . . . . . . . . . . . . . . . . . . . 11
  39. 3. Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . 14
  40. 3.1. EAP-Message. . . . . . . . . . . . . . . . . . . . . . . 15
  41. 3.2. Message-Authenticator. . . . . . . . . . . . . . . . . . 16
  42. 3.3. Table of Attributes. . . . . . . . . . . . . . . . . . . 18
  43. 4. Security Considerations. . . . . . . . . . . . . . . . . . . . 19
  44. 4.1. Security Requirements. . . . . . . . . . . . . . . . . . 19
  45. 4.2. Security Protocol. . . . . . . . . . . . . . . . . . . . 20
  46. 4.3. Security Issues. . . . . . . . . . . . . . . . . . . . . 22
  47. 5. IANA Considerations. . . . . . . . . . . . . . . . . . . . . . 30
  48. 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 30
  49. 6.1. Normative References . . . . . . . . . . . . . . . . . . 30
  50. 6.2. Informative References . . . . . . . . . . . . . . . . . 32
  51. Appendix A - Examples. . . . . . . . . . . . . . . . . . . . . . . 34
  52. Appendix B - Change Log. . . . . . . . . . . . . . . . . . . . . . 43
  53. Intellectual Property Statement. . . . . . . . . . . . . . . . . . 44
  54. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . 44
  55. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 45
  56. Full Copyright Statement . . . . . . . . . . . . . . . . . . . . . 46
  57. 1. Introduction
  58. The Remote Authentication Dial In User Service (RADIUS) is an
  59. authentication, authorization and accounting protocol used to control
  60. network access. RADIUS authentication and authorization is specified
  61. in [RFC2865], and RADIUS accounting is specified in [RFC2866]; RADIUS
  62. over IPv6 is specified in [RFC3162].
  63. The Extensible Authentication Protocol (EAP), defined in [RFC2284],
  64. is an authentication framework which supports multiple authentication
  65. mechanisms. EAP may be used on dedicated links, switched circuits,
  66. and wired as well as wireless links.
  67. To date, EAP has been implemented with hosts and routers that connect
  68. via switched circuits or dial-up lines using PPP [RFC1661]. It has
  69. also been implemented with bridges supporting [IEEE802]. EAP
  70. encapsulation on IEEE 802 wired media is described in [IEEE8021X].
  71. Aboba & Calhoun Informational [Page 2]
  72. RFC 3579 RADIUS & EAP September 2003
  73. RADIUS attributes are comprised of variable length Type-Length-Value
  74. 3-tuples. New attribute values can be added without disturbing
  75. existing implementations of the protocol. This specification
  76. describes RADIUS attributes supporting the Extensible Authentication
  77. Protocol (EAP): EAP-Message and Message-Authenticator. These
  78. attributes now have extensive field experience. The purpose of this
  79. document is to provide clarification and resolve interoperability
  80. issues.
  81. As noted in [RFC2865], a Network Access Server (NAS) that does not
  82. implement a given service MUST NOT implement the RADIUS attributes
  83. for that service. This implies that a NAS that is unable to offer
  84. EAP service MUST NOT implement the RADIUS attributes for EAP. A NAS
  85. MUST treat a RADIUS Access-Accept requesting an unavailable service
  86. as an Access-Reject instead.
  87. 1.1. Specification of Requirements
  88. In this document, several words are used to signify the requirements
  89. of the specification. These words are often capitalized. The key
  90. words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
  91. "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document
  92. are to be interpreted as described in [RFC2119].
  93. 1.2. Terminology
  94. This document frequently uses the following terms:
  95. authenticator
  96. The end of the link requiring the authentication. Also
  97. known as the Network Access Server (NAS) or RADIUS client.
  98. Within IEEE 802.1X terminology, the term Authenticator is
  99. used.
  100. peer The other end of the point-to-point link (PPP),
  101. point-to-point LAN segment (IEEE 802.1X) or wireless link,
  102. which is being authenticated by the authenticator. In IEEE
  103. 802.1X, this end is known as the Supplicant.
  104. authentication server
  105. An authentication server is an entity that provides an
  106. authentication service to an authenticator (NAS). This
  107. service verifies from the credentials provided by the peer,
  108. the claim of identity made by the peer; it also may provide
  109. credentials allowing the peer to verify the identity of the
  110. authentication server. Within this document it is assumed
  111. that the NAS operates as a pass-through, forwarding EAP
  112. packets between the RADIUS server and the EAP peer.
  113. Aboba & Calhoun Informational [Page 3]
  114. RFC 3579 RADIUS & EAP September 2003
  115. Therefore the RADIUS server operates as an authentication
  116. server.
  117. silently discard
  118. This means the implementation discards the packet without
  119. further processing. The implementation SHOULD provide the
  120. capability of logging the error, including the contents of
  121. the silently discarded packet, and SHOULD record the event
  122. in a statistics counter.
  123. displayable message
  124. This is interpreted to be a human readable string of
  125. characters, and MUST NOT affect operation of the protocol.
  126. The message encoding MUST follow the UTF-8 transformation
  127. format [RFC2279].
  128. Network Access Server (NAS)
  129. The device providing access to the network. Also known as
  130. the Authenticator (IEEE 802.1X or EAP terminology) or
  131. RADIUS client.
  132. service The NAS provides a service to the user, such as IEEE 802 or
  133. PPP.
  134. session Each service provided by the NAS to a peer constitutes a
  135. session, with the beginning of the session defined as the
  136. point where service is first provided and the end of the
  137. session defined as the point where service is ended. A
  138. peer may have multiple sessions in parallel or series if
  139. the NAS supports that, with each session generating a
  140. separate start and stop accounting record.
  141. 2. RADIUS Support for EAP
  142. The Extensible Authentication Protocol (EAP), described in [RFC2284],
  143. provides a standard mechanism for support of additional
  144. authentication methods without the NAS to be upgraded to support each
  145. new method. Through the use of EAP, support for a number of
  146. authentication schemes may be added, including smart cards, Kerberos
  147. [RFC1510], Public Key [RFC2716], One Time Passwords [RFC2284], and
  148. others.
  149. One of the advantages of the EAP architecture is its flexibility.
  150. EAP is used to select a specific authentication mechanism. Rather
  151. than requiring the NAS to be updated to support each new
  152. authentication method, EAP permits the use of an authentication
  153. server implementing authentication methods, with the NAS acting as a
  154. pass-through for some or all methods and peers.
  155. Aboba & Calhoun Informational [Page 4]
  156. RFC 3579 RADIUS & EAP September 2003
  157. A NAS MAY authenticate local peers while at the same time acting as a
  158. pass-through for non-local peers and authentication methods it does
  159. not implement locally. A NAS implementing this specification is not
  160. required to use RADIUS to authenticate every peer. However, once the
  161. NAS begins acting as a pass-through for a particular session, it can
  162. no longer perform local authentication for that session.
  163. In order to support EAP within RADIUS, two new attributes,
  164. EAP-Message and Message-Authenticator, are introduced in this
  165. document. This section describes how these new attributes may be
  166. used for providing EAP support within RADIUS.
  167. 2.1. Protocol Overview
  168. In RADIUS/EAP, RADIUS is used to shuttle RADIUS-encapsulated EAP
  169. Packets between the NAS and an authentication server.
  170. The authenticating peer and the NAS begin the EAP conversation by
  171. negotiating use of EAP. Once EAP has been negotiated, the NAS SHOULD
  172. send an initial EAP-Request message to the authenticating peer. This
  173. will typically be an EAP-Request/Identity, although it could be an
  174. EAP-Request for an authentication method (Types 4 and greater). A
  175. NAS MAY be configured to initiate with a default authentication
  176. method. This is useful in cases where the identity is determined by
  177. another means (such as Called-Station-Id, Calling-Station-Id and/or
  178. Originating-Line-Info); where a single authentication method is
  179. required, which includes its own identity exchange; where identity
  180. hiding is desired, so that the identity is not requested until after
  181. a protected channel has been set up.
  182. The peer replies with an EAP-Response. The NAS MAY determine from
  183. the Response that it should proceed with local authentication.
  184. Alternatively, the NAS MAY act as a pass-through, encapsulating the
  185. EAP-Response within EAP-Message attribute(s) sent to the RADIUS
  186. server within a RADIUS Access-Request packet. If the NAS sends an
  187. EAP-Request/Identity message as the initial packet, the peer responds
  188. with an EAP-Response/Identity. The NAS may determine that the peer
  189. is local and proceed with local authentication. If no match is found
  190. against the list of local users, the NAS encapsulates the
  191. EAP-Response/Identity message within an EAP-Message attribute,
  192. enclosed within an Access-Request packet.
  193. On receiving a valid Access-Request packet containing EAP-Message
  194. attribute(s), a RADIUS server compliant with this specification and
  195. wishing to authenticate with EAP MUST respond with an
  196. Access-Challenge packet containing EAP-Message attribute(s). If the
  197. RADIUS server does not support EAP or does not wish to authenticate
  198. with EAP, it MUST respond with an Access-Reject.
  199. Aboba & Calhoun Informational [Page 5]
  200. RFC 3579 RADIUS & EAP September 2003
  201. EAP-Message attribute(s) encapsulate a single EAP packet which the
  202. NAS decapsulates and passes on to the authenticating peer. The peer
  203. then responds with an EAP-Response packet, which the NAS encapsulates
  204. within an Access-Request containing EAP-Message attribute(s). EAP is
  205. a 'lock step' protocol, so that other than the initial Request, a new
  206. Request cannot be sent prior to receiving a valid Response.
  207. The conversation continues until either a RADIUS Access-Reject or
  208. Access-Accept packet is received from the RADIUS server. Reception
  209. of a RADIUS Access-Reject packet MUST result in the NAS denying
  210. access to the authenticating peer. A RADIUS Access-Accept packet
  211. successfully ends the authentication phase. The NAS MUST NOT
  212. "manufacture" a Success or Failure packet as the result of a timeout.
  213. After a suitable number of timeouts have elapsed, the NAS SHOULD
  214. instead end the EAP conversation.
  215. Using RADIUS, the NAS can act as a pass-through for an EAP
  216. conversation between the peer and authentication server, without
  217. needing to implement the EAP method used between them. Where the NAS
  218. initiates the conversation by sending an EAP-Request for an
  219. authentication method, it may not be required that the NAS fully
  220. implement the EAP method reflected in the initial EAP-Request.
  221. Depending on the initial method, it may be sufficient for the NAS to
  222. be configured with the initial packet to be sent to the peer, and for
  223. the NAS to act as a pass-through for subsequent messages. Note that
  224. since the NAS only encapsulates the EAP-Response in its initial
  225. Access-Request, the initial EAP-Request within the authentication
  226. method is not available to the RADIUS server. For the RADIUS server
  227. to be able to continue the conversation, either the initial
  228. EAP-Request is vestigial, so that the RADIUS server need not be aware
  229. of it, or the relevant information from the initial EAP-Request (such
  230. as a nonce) is reflected in the initial EAP-Response, so that the
  231. RADIUS server can obtain it without having received the initial
  232. EAP-Request.
  233. Where the initial EAP-Request sent by the NAS is for an
  234. authentication Type (4 or greater), the peer MAY respond with a Nak
  235. indicating that it would prefer another authentication method that is
  236. not implemented locally. In this case, the NAS SHOULD send
  237. Access-Request encapsulating the received EAP-Response/Nak. This
  238. provides the RADIUS server with a hint about the authentication
  239. method(s) preferred by the peer, although it does not provide
  240. information on the Type of the original Request. It also provides
  241. the server with the Identifier used in the initial EAP-Request, so
  242. that Identifier conflicts can be avoided.
  243. Aboba & Calhoun Informational [Page 6]
  244. RFC 3579 RADIUS & EAP September 2003
  245. In order to evaluate whether the alternatives preferred by the
  246. authenticating peer are allowed, the RADIUS server will typically
  247. respond with an Access-Challenge containing EAP-Message attribute(s)
  248. encapsulating an EAP-Request/Identity (Type 1). This allows the
  249. RADIUS server to determine the peer identity, so as to be able to
  250. retrieve the associated authentication policy. Alternatively, an
  251. EAP-Request for an authentication method (Type 4 or greater) could be
  252. sent. Since the RADIUS server may not be aware of the Type of the
  253. initial EAP-Request, it is possible for the RADIUS server to choose
  254. an unacceptable method, and for the peer to respond with another Nak.
  255. In order to permit non-EAP aware RADIUS proxies to forward the
  256. Access-Request packet, if the NAS initially sends an
  257. EAP-Request/Identity message to the peer, the NAS MUST copy the
  258. contents of the Type-Data field of the EAP-Response/Identity received
  259. from the peer into the User-Name attribute and MUST include the
  260. Type-Data field of the EAP-Response/Identity in the User-Name
  261. attribute in every subsequent Access-Request. Since RADIUS proxies
  262. are assumed to act as a pass-through, they cannot be expected to
  263. parse an EAP-Response/Identity encapsulated within EAP-Message
  264. attribute(s). If the NAS initially sends an EAP-Request for an
  265. authentication method, and the peer identity cannot be determined
  266. from the EAP-Response, then the User-Name attribute SHOULD be
  267. determined by another means. As noted in [RFC2865] Section 5.6, it
  268. is recommended that Access-Requests use the value of the
  269. Calling-Station-Id as the value of the User-Name attribute.
  270. Having the NAS send the initial EAP-Request packet has a number of
  271. advantages:
  272. [1] It saves a round trip between the NAS and RADIUS server.
  273. [2] An Access-Request is only sent to the RADIUS server if the
  274. authenticating peer sends an EAP-Response, confirming that it
  275. supports EAP. In situations where peers may be EAP unaware,
  276. initiating a RADIUS Access-Request on a "carrier sense" or
  277. "media up" indication may result in many authentication
  278. exchanges that cannot complete successfully. For example, on
  279. wired networks [IEEE8021X] Supplicants typically do not initiate
  280. the 802.1X conversation with an EAPOL-Start. Therefore an IEEE
  281. 802.1X-enabled bridge may not be able to determine whether the
  282. peer supports EAP until it receives a Response to the initial
  283. EAP-Request.
  284. [3] It allows some peers to be authenticated locally.
  285. Aboba & Calhoun Informational [Page 7]
  286. RFC 3579 RADIUS & EAP September 2003
  287. Although having the NAS send the initial EAP-Request packet has
  288. substantial advantages, this technique cannot be universally
  289. employed. There are circumstances in which the peer identity is
  290. already known (such as when authentication and accounting is handled
  291. based on Called-Station-Id, Calling-Station-Id and/or
  292. Originating-Line-Info), but where the appropriate EAP method may vary
  293. based on that identity.
  294. Rather than sending an initial EAP-Request packet to the
  295. authenticating peer, on detecting the presence of the peer, the NAS
  296. MAY send an Access-Request packet to the RADIUS server containing an
  297. EAP-Message attribute signifying EAP-Start. The RADIUS server will
  298. typically respond with an Access-Challenge containing EAP-Message
  299. attribute(s) encapsulating an EAP-Request/Identity (Type 1).
  300. However, an EAP-Request for an authentication method (Type 4 or
  301. greater) can also be sent by the server.
  302. EAP-Start is indicated by sending an EAP-Message attribute with a
  303. length of 2 (no data). The Calling-Station-Id SHOULD be included in
  304. the User-Name attribute. This may result in a RADIUS Access-Request
  305. being sent by the NAS to the RADIUS server without first confirming
  306. that the peer supports EAP. Since this technique can result in a
  307. large number of uncompleted RADIUS conversations, in situations where
  308. EAP unaware peers are common, or where peer support for EAP cannot be
  309. determined on initial contact (e.g. [IEEE8021X] Supplicants not
  310. initiating the conversation with an EAPOL-Start) it SHOULD NOT be
  311. employed by default.
  312. For proxied RADIUS requests, there are two methods of processing. If
  313. the domain is determined based on the Calling-Station-Id,
  314. Called-Station-Id and/or Originating-Line-Info, the RADIUS server may
  315. proxy the initial RADIUS Access-Request/EAP-Start. If the realm is
  316. determined based on the peer identity, the local RADIUS server MUST
  317. respond with a RADIUS Access-Challenge including an EAP-Message
  318. attribute encapsulating an EAP-Request/Identity packet. The response
  319. from the authenticating peer SHOULD be proxied to the final
  320. authentication server.
  321. If an Access-Request is sent to a RADIUS server which does not
  322. support the EAP-Message attribute, then an Access-Reject MUST be sent
  323. in response. On receiving an Access-Reject, the NAS MUST deny access
  324. to the authenticating peer.
  325. Aboba & Calhoun Informational [Page 8]
  326. RFC 3579 RADIUS & EAP September 2003
  327. 2.2. Invalid Packets
  328. While acting as a pass-through, the NAS MUST validate the EAP header
  329. fields (Code, Identifier, Length) prior to forwarding an EAP packet
  330. to or from the RADIUS server. On receiving an EAP packet from the
  331. peer, the NAS checks the Code (2) and Length fields, and matches the
  332. Identifier value against the current Identifier, supplied by the
  333. RADIUS server in the most recently validated EAP-Request. On
  334. receiving an EAP packet from the RADIUS server (encapsulated within
  335. an Access-Challenge), the NAS checks the Code (1) and Length fields,
  336. then updates the current Identifier value. Pending EAP Responses
  337. that do not match the current Identifier value are silently discarded
  338. by the NAS.
  339. Since EAP method fields (Type, Type-Data) are typically not validated
  340. by a NAS operating as a pass-through, despite these checks it is
  341. possible for a NAS to forward an invalid EAP packet to or from the
  342. RADIUS server. A RADIUS server receiving EAP-Message attribute(s) it
  343. does not understand SHOULD make the determination of whether the
  344. error is fatal or non-fatal based on the EAP Type. A RADIUS server
  345. determining that a fatal error has occurred MUST send an
  346. Access-Reject containing an EAP-Message attribute encapsulating
  347. EAP-Failure.
  348. A RADIUS server determining that a non-fatal error has occurred MAY
  349. send an Access-Challenge to the NAS including EAP-Message
  350. attribute(s) as well as an Error-Cause attribute [RFC3576] with value
  351. 202 (decimal), "Invalid EAP Packet (Ignored)". The Access-Challenge
  352. SHOULD encapsulate within EAP-Message attribute(s) the most recently
  353. sent EAP-Request packet (including the same Identifier value). On
  354. receiving such an Access-Challenge, a NAS implementing previous
  355. versions of this specification will decapsulate the EAP-Request and
  356. send it to the peer, which will retransmit the EAP-Response.
  357. A NAS compliant with this specification, on receiving an
  358. Access-Challenge with an Error-Cause attribute of value 202 (decimal)
  359. SHOULD discard the EAP-Response packet most recently transmitted to
  360. the RADIUS server and check whether additional EAP-Response packets
  361. have been received matching the current Identifier value. If so, a
  362. new EAP-Response packet, if available, MUST be sent to the RADIUS
  363. server within an Access-Request, and the EAP-Message attribute(s)
  364. included within the Access-Challenge are silently discarded. If no
  365. EAP-Response packet is available, then the EAP-Request encapsulated
  366. within the Access-Challenge is sent to the peer, and the
  367. retransmission timer is reset.
  368. Aboba & Calhoun Informational [Page 9]
  369. RFC 3579 RADIUS & EAP September 2003
  370. In order to provide protection against Denial of Service (DoS)
  371. attacks, it is advisable for the NAS to allocate a finite buffer for
  372. EAP packets received from the peer, and to discard packets according
  373. to an appropriate policy once that buffer has been exceeded. Also,
  374. the RADIUS server is advised to permit only a modest number of
  375. invalid EAP packets within a single session, prior to terminating the
  376. session with an Access-Reject. By default a value of 5 invalid EAP
  377. packets is recommended.
  378. 2.3. Retransmission
  379. As noted in [RFC2284], if an EAP packet is lost in transit between
  380. the authenticating peer and the NAS (or vice versa), the NAS will
  381. retransmit.
  382. It may be necessary to adjust retransmission strategies and
  383. authentication timeouts in certain cases. For example, when a token
  384. card is used additional time may be required to allow the user to
  385. find the card and enter the token. Since the NAS will typically not
  386. have knowledge of the required parameters, these need to be provided
  387. by the RADIUS server. This can be accomplished by inclusion of
  388. Session-Timeout attribute within the Access-Challenge packet.
  389. If Session-Timeout is present in an Access-Challenge packet that also
  390. contains an EAP-Message, the value of the Session-Timeout is used to
  391. set the EAP retransmission timer for that EAP Request, and that
  392. Request alone. Once the EAP-Request has been sent, the NAS sets the
  393. retransmission timer, and if it expires without having received an
  394. EAP-Response corresponding to the Request, then the EAP-Request is
  395. retransmitted.
  396. 2.4. Fragmentation
  397. Using the EAP-Message attribute, it is possible for the RADIUS server
  398. to encapsulate an EAP packet that is larger than the MTU on the link
  399. between the NAS and the peer. Since it is not possible for the
  400. RADIUS server to use MTU discovery to ascertain the link MTU, the
  401. Framed-MTU attribute may be included in an Access-Request packet
  402. containing an EAP-Message attribute so as to provide the RADIUS
  403. server with this information. A RADIUS server having received a
  404. Framed-MTU attribute in an Access-Request packet MUST NOT send any
  405. subsequent packet in this EAP conversation containing EAP-Message
  406. attributes whose values, when concatenated, exceed the length
  407. specified by the Framed-MTU value, taking the link type (specified by
  408. the NAS-Port-Type attribute) into account. For example, as noted in
  409. [RFC3580] Section 3.10, for a NAS-Port-Type value of IEEE 802.11, the
  410. Aboba & Calhoun Informational [Page 10]
  411. RFC 3579 RADIUS & EAP September 2003
  412. RADIUS server may send an EAP packet as large as Framed-MTU minus
  413. four (4) octets, taking into account the additional overhead for the
  414. IEEE 802.1X Version (1), Type (1) and Body Length (2) fields.
  415. 2.5. Alternative Uses
  416. Currently the conversation between security servers and the RADIUS
  417. server is often proprietary because of lack of standardization. In
  418. order to increase standardization and provide interoperability
  419. between RADIUS vendors and security vendors, it is recommended that
  420. RADIUS- encapsulated EAP be used for this conversation.
  421. This has the advantage of allowing the RADIUS server to support EAP
  422. without the need for authentication-specific code within the RADIUS
  423. server. Authentication-specific code can then reside on a security
  424. server instead.
  425. In the case where RADIUS-encapsulated EAP is used in a conversation
  426. between a RADIUS server and a security server, the security server
  427. will typically return an Access-Accept message without inclusion of
  428. the expected attributes currently returned in an Access-Accept. This
  429. means that the RADIUS server MUST add these attributes prior to
  430. sending an Access-Accept message to the NAS.
  431. 2.6. Usage Guidelines
  432. 2.6.1. Identifier Space
  433. In EAP, each session has its own unique Identifier space. RADIUS
  434. server implementations MUST be able to distinguish between EAP
  435. packets with the same Identifier existing within distinct sessions,
  436. originating on the same NAS. For this purpose, sessions can be
  437. distinguished based on NAS and session identification attributes.
  438. NAS identification attributes include NAS-Identifier,
  439. NAS-IPv6-Address and NAS-IPv4-Address. Session identification
  440. attributes include User-Name, NAS-Port, NAS-Port-Type, NAS-Port-Id,
  441. Called-Station-Id, Calling-Station-Id and Originating-Line-Info.
  442. 2.6.2. Role Reversal
  443. Since EAP is a peer-to-peer protocol, an independent and simultaneous
  444. authentication may take place in the reverse direction. Both peers
  445. may act as authenticators and authenticatees at the same time.
  446. However, role reversal is not supported by this specification. A
  447. RADIUS server MUST respond to an Access-Request encapsulating an
  448. EAP-Request with an Access-Reject. In order to avoid retransmissions
  449. Aboba & Calhoun Informational [Page 11]
  450. RFC 3579 RADIUS & EAP September 2003
  451. by the peer, the Access-Reject SHOULD include an EAP-Response/Nak
  452. packet indicating no preferred method, encapsulated within
  453. EAP-Message attribute(s).
  454. 2.6.3. Conflicting Messages
  455. The NAS MUST make its access control decision based solely on the
  456. RADIUS Packet Type (Access-Accept/Access-Reject). The access control
  457. decision MUST NOT be based on the contents of the EAP packet
  458. encapsulated in one or more EAP-Message attributes, if present.
  459. Access-Accept packets SHOULD have only one EAP-Message attribute in
  460. them, containing EAP Success; similarly, Access-Reject packets SHOULD
  461. have only one EAP-Message attribute in them, containing EAP Failure.
  462. Where the encapsulated EAP packet does not match the result implied
  463. by the RADIUS Packet Type, the combination is likely to cause
  464. confusion, because the NAS and peer will arrive at different
  465. conclusions as to the outcome of the authentication.
  466. For example, if the NAS receives an Access-Reject with an
  467. encapsulated EAP Success, it will not grant access to the peer.
  468. However, on receiving the EAP Success, the peer will be lead to
  469. believe that it authenticated successfully.
  470. If the NAS receives an Access-Accept with an encapsulated EAP
  471. Failure, it will grant access to the peer. However, on receiving an
  472. EAP Failure, the peer will be lead to believe that it failed
  473. authentication. If no EAP-Message attribute is included within an
  474. Access-Accept or Access-Reject, then the peer may not be informed as
  475. to the outcome of the authentication, while the NAS will take action
  476. to allow or deny access.
  477. As described in [RFC2284], the EAP Success and Failure packets are
  478. not acknowledged, and these packets terminate the EAP conversation.
  479. As a result, if these packets are encapsulated within an
  480. Access-Challenge, no response will be received, and therefore the NAS
  481. will send no further Access-Requests to the RADIUS server for the
  482. session. As a result, the RADIUS server will not indicate to the NAS
  483. whether to allow or deny access, while the peer will be informed as
  484. to the outcome of the authentication.
  485. Aboba & Calhoun Informational [Page 12]
  486. RFC 3579 RADIUS & EAP September 2003
  487. To avoid these conflicts, the following combinations SHOULD NOT be
  488. sent by a RADIUS server:
  489. Access-Accept/EAP-Message/EAP Failure
  490. Access-Accept/no EAP-Message attribute
  491. Access-Accept/EAP-Start
  492. Access-Reject/EAP-Message/EAP Success
  493. Access-Reject/no EAP-Message attribute
  494. Access-Reject/EAP-Start
  495. Access-Challenge/EAP-Message/EAP Success
  496. Access-Challenge/EAP-Message/EAP Failure
  497. Access-Challenge/no EAP-Message attribute
  498. Access-Challenge/EAP-Start
  499. Since the responsibility for avoiding conflicts lies with the RADIUS
  500. server, the NAS MUST NOT "manufacture" EAP packets in order to
  501. correct contradictory messages that it receives. This behavior,
  502. originally mandated within [IEEE8021X], will be deprecated in the
  503. future.
  504. 2.6.4. Priority
  505. A RADIUS Access-Accept or Access-Reject packet may contain EAP-
  506. Message attribute(s). In order to ensure the correct processing of
  507. RADIUS packets, the NAS MUST first process the attributes, including
  508. the EAP-Message attribute(s), prior to processing the Accept/Reject
  509. indication.
  510. 2.6.5. Displayable Messages
  511. The Reply-Message attribute, defined in [RFC2865], Section 5.18,
  512. indicates text which may be displayed to the peer. This is similar
  513. in concept to EAP Notification, defined in [RFC2284]. When sending a
  514. displayable message to a NAS during an EAP conversation, the RADIUS
  515. server MUST encapsulate displayable messages within
  516. EAP-Message/EAP-Request/Notification attribute(s). Reply-Message
  517. attribute(s) MUST NOT be included in any RADIUS message containing an
  518. EAP-Message attribute. An EAP-Message/EAP-Request/Notification
  519. SHOULD NOT be included within an Access-Accept or Access-Reject
  520. packet.
  521. In some existing implementations, a NAS receiving Reply-Message
  522. attribute(s) copies the Text field(s) into the Type-Data field of an
  523. EAP-Request/Notification packet, fills in the Identifier field, and
  524. sends this to the peer. However, several issues arise from this:
  525. Aboba & Calhoun Informational [Page 13]
  526. RFC 3579 RADIUS & EAP September 2003
  527. [1] Unexpected Responses. On receiving an EAP-Request/Notification,
  528. the peer will send an EAP-Response/Notification, and the NAS
  529. will pass this on to the RADIUS server, encapsulated within
  530. EAP-Message attribute(s). However, the RADIUS server may not be
  531. expecting an Access-Request containing an
  532. EAP-Message/EAP-Response/Notification attribute.
  533. For example, consider what happens when a Reply-Message is
  534. included within an Access-Accept or Access-Reject packet with no
  535. EAP-Message attribute(s) present. If the value of the
  536. Reply-Message attribute is copied into the Type-Data of an
  537. EAP-Request/Notification and sent to the peer, this will result
  538. in an Access-Request containing an
  539. EAP-Message/EAP-Response/Notification attribute being sent by
  540. the NAS to the RADIUS server. Since an Access-Accept or
  541. Access-Reject packet terminates the RADIUS conversation, such an
  542. Access-Request would not be expected, and could be interpreted
  543. as the start of another conversation.
  544. [2] Identifier conflicts. While the EAP-Request/Notification is an
  545. EAP packet containing an Identifier field, the Reply-Message
  546. attribute does not contain an Identifier field. As a result, a
  547. NAS receiving a Reply-Message attribute and wishing to translate
  548. this to an EAP-Request/Notification will need to choose an
  549. Identifier value. It is possible that the chosen Identifier
  550. value will conflict with a value chosen by the RADIUS server for
  551. another packet within the EAP conversation, potentially causing
  552. confusion between a new packet and a retransmission.
  553. To avoid these problems, a NAS receiving a Reply-Message attribute
  554. from the RADIUS server SHOULD silently discard the attribute, rather
  555. than attempting to translate it to an EAP Notification Request.
  556. 3. Attributes
  557. The NAS-Port or NAS-Port-Id attributes SHOULD be included by the NAS
  558. in Access-Request packets, and either NAS-Identifier, NAS-IP-Address
  559. or NAS-IPv6-Address attributes MUST be included. In order to permit
  560. forwarding of the Access-Reply by EAP-unaware proxies, if a User-Name
  561. attribute was included in an Access-Request, the RADIUS server MUST
  562. include the User-Name attribute in subsequent Access-Accept packets.
  563. Without the User-Name attribute, accounting and billing becomes
  564. difficult to manage. The User-Name attribute within the Access-
  565. Accept packet need not be the same as the User-Name attribute in the
  566. Access-Request.
  567. Aboba & Calhoun Informational [Page 14]
  568. RFC 3579 RADIUS & EAP September 2003
  569. 3.1. EAP-Message
  570. Description
  571. This attribute encapsulates EAP [RFC2284] packets so as to allow
  572. the NAS to authenticate peers via EAP without having to understand
  573. the EAP method it is passing through.
  574. The NAS places EAP messages received from the authenticating peer
  575. into one or more EAP-Message attributes and forwards them to the
  576. RADIUS server within an Access-Request message. If multiple
  577. EAP-Message attributes are contained within an Access-Request or
  578. Access-Challenge packet, they MUST be in order and they MUST be
  579. consecutive attributes in the Access-Request or Access-Challenge
  580. packet. The RADIUS server can return EAP-Message attributes in
  581. Access-Challenge, Access-Accept and Access-Reject packets.
  582. When RADIUS is used to enable EAP authentication, Access-Request,
  583. Access-Challenge, Access-Accept, and Access-Reject packets SHOULD
  584. contain one or more EAP-Message attributes. Where more than one
  585. EAP-Message attribute is included, it is assumed that the
  586. attributes are to be concatenated to form a single EAP packet.
  587. Multiple EAP packets MUST NOT be encoded within EAP-Message
  588. attributes contained within a single Access-Challenge,
  589. Access-Accept, Access-Reject or Access-Request packet.
  590. It is expected that EAP will be used to implement a variety of
  591. authentication methods, including methods involving strong
  592. cryptography. In order to prevent attackers from subverting EAP
  593. by attacking RADIUS/EAP, (for example, by modifying EAP Success or
  594. EAP Failure packets) it is necessary that RADIUS provide
  595. per-packet authentication and integrity protection.
  596. Therefore the Message-Authenticator attribute MUST be used to
  597. protect all Access-Request, Access-Challenge, Access-Accept, and
  598. Access-Reject packets containing an EAP-Message attribute.
  599. Access-Request packets including EAP-Message attribute(s) without
  600. a Message-Authenticator attribute SHOULD be silently discarded by
  601. the RADIUS server. A RADIUS server supporting the EAP-Message
  602. attribute MUST calculate the correct value of the
  603. Message-Authenticator and MUST silently discard the packet if it
  604. does not match the value sent. A RADIUS server not supporting the
  605. EAP-Message attribute MUST return an Access-Reject if it receives
  606. an Access-Request containing an EAP-Message attribute.
  607. Aboba & Calhoun Informational [Page 15]
  608. RFC 3579 RADIUS & EAP September 2003
  609. Access-Challenge, Access-Accept, or Access-Reject packets
  610. including EAP-Message attribute(s) without a Message-Authenticator
  611. attribute SHOULD be silently discarded by the NAS. A NAS
  612. supporting the EAP-Message attribute MUST calculate the correct
  613. value of the Message-Authenticator and MUST silently discard the
  614. packet if it does not match the value sent.
  615. A summary of the EAP-Message attribute format is shown below. The
  616. fields are transmitted from left to right.
  617. 0 1 2
  618. 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
  619. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  620. | Type | Length | String...
  621. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  622. Type
  623. 79 for EAP-Message
  624. Length
  625. >= 3
  626. String
  627. The String field contains an EAP packet, as defined in [RFC2284].
  628. If multiple EAP-Message attributes are present in a packet their
  629. values should be concatenated; this allows EAP packets longer than
  630. 253 octets to be transported by RADIUS.
  631. 3.2. Message-Authenticator
  632. Description
  633. This attribute MAY be used to authenticate and integrity-protect
  634. Access-Requests in order to prevent spoofing. It MAY be used in
  635. any Access-Request. It MUST be used in any Access-Request,
  636. Access-Accept, Access-Reject or Access-Challenge that includes an
  637. EAP-Message attribute.
  638. A RADIUS server receiving an Access-Request with a
  639. Message-Authenticator attribute present MUST calculate the correct
  640. value of the Message-Authenticator and silently discard the packet
  641. if it does not match the value sent.
  642. Aboba & Calhoun Informational [Page 16]
  643. RFC 3579 RADIUS & EAP September 2003
  644. A RADIUS client receiving an Access-Accept, Access-Reject or
  645. Access-Challenge with a Message-Authenticator attribute present
  646. MUST calculate the correct value of the Message-Authenticator and
  647. silently discard the packet if it does not match the value sent.
  648. This attribute is not required in Access-Requests which include
  649. the User-Password attribute, but is useful for preventing attacks
  650. on other types of authentication. This attribute is intended to
  651. thwart attempts by an attacker to setup a "rogue" NAS, and perform
  652. online dictionary attacks against the RADIUS server. It does not
  653. afford protection against "offline" attacks where the attacker
  654. intercepts packets containing (for example) CHAP challenge and
  655. response, and performs a dictionary attack against those packets
  656. offline.
  657. A summary of the Message-Authenticator attribute format is shown
  658. below. The fields are transmitted from left to right.
  659. 0 1 2
  660. 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
  661. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  662. | Type | Length | String...
  663. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  664. Type
  665. 80 for Message-Authenticator
  666. Length
  667. 18
  668. String
  669. When present in an Access-Request packet, Message-Authenticator is
  670. an HMAC-MD5 [RFC2104] hash of the entire Access-Request packet,
  671. including Type, ID, Length and Authenticator, using the shared
  672. secret as the key, as follows.
  673. Message-Authenticator = HMAC-MD5 (Type, Identifier, Length,
  674. Request Authenticator, Attributes)
  675. When the message integrity check is calculated the signature
  676. string should be considered to be sixteen octets of zero.
  677. Aboba & Calhoun Informational [Page 17]
  678. RFC 3579 RADIUS & EAP September 2003
  679. For Access-Challenge, Access-Accept, and Access-Reject packets,
  680. the Message-Authenticator is calculated as follows, using the
  681. Request-Authenticator from the Access-Request this packet is in
  682. reply to:
  683. Message-Authenticator = HMAC-MD5 (Type, Identifier, Length,
  684. Request Authenticator, Attributes)
  685. When the message integrity check is calculated the signature
  686. string should be considered to be sixteen octets of zero. The
  687. shared secret is used as the key for the HMAC-MD5 message
  688. integrity check. The Message-Authenticator is calculated and
  689. inserted in the packet before the Response Authenticator is
  690. calculated.
  691. 3.3. Table of Attributes
  692. The following table provides a guide to which attributes may be found
  693. in packets including EAP-Message attribute(s), and in what quantity.
  694. The EAP-Message and Message-Authenticator attributes specified in
  695. this document MUST NOT be present in an Accounting-Request. If a
  696. table entry is omitted, the values found in [RFC2548], [RFC2865],
  697. [RFC2868], [RFC2869] and [RFC3162] should be assumed.
  698. Request Accept Reject Challenge # Attribute
  699. 0-1 0-1 0 0 1 User-Name
  700. 0 0 0 0 2 User-Password [Note 1]
  701. 0 0 0 0 3 CHAP-Password [Note 1]
  702. 0 0 0 0 18 Reply-Message
  703. 0 0 0 0 60 CHAP-Challenge
  704. 0 0 0 0 70 ARAP-Password [Note 1]
  705. 0 0 0 0 75 Password-Retry
  706. 1+ 1+ 1+ 1+ 79 EAP-Message [Note 1]
  707. 1 1 1 1 80 Message-Authenticator [Note 1]
  708. 0-1 0 0 0 94 Originating-Line-Info [Note 3]
  709. 0 0 0-1 0-1 101 Error-Cause [Note 2]
  710. Request Accept Reject Challenge # Attribute
  711. [Note 1] An Access-Request that contains either a User-Password or
  712. CHAP-Password or ARAP-Password or one or more EAP-Message attributes
  713. MUST NOT contain more than one type of those four attributes. If it
  714. does not contain any of those four attributes, it SHOULD contain a
  715. Message-Authenticator. If any packet type contains an EAP-Message
  716. attribute it MUST also contain a Message-Authenticator. A RADIUS
  717. server receiving an Access-Request not containing any of those four
  718. attributes and also not containing a Message-Authenticator attribute
  719. SHOULD silently discard it.
  720. Aboba & Calhoun Informational [Page 18]
  721. RFC 3579 RADIUS & EAP September 2003
  722. [Note 2] The Error-Cause attribute is defined in [RFC3576].
  723. [Note 3] The Originating-Line-Info attribute is defined in [NASREQ].
  724. The following table defines the meaning of the above table entries.
  725. 0 This attribute MUST NOT be present.
  726. 0+ Zero or more instances of this attribute MAY be present.
  727. 0-1 Zero or one instance of this attribute MAY be present.
  728. 1 Exactly one instance of this attribute MUST be present.
  729. 1+ One or more of these attributes MUST be present.
  730. 4. Security Considerations
  731. 4.1. Security Requirements
  732. RADIUS/EAP is used in order to provide authentication and
  733. authorization for network access. As a result, both the RADIUS and
  734. EAP portions of the conversation are potential targets of an attack.
  735. Threats are discussed in [RFC2607], [RFC2865], and [RFC3162].
  736. Examples include:
  737. [1] An adversary may attempt to acquire confidential data and
  738. identities by snooping RADIUS packets.
  739. [2] An adversary may attempt to modify packets containing RADIUS
  740. messages.
  741. [3] An adversary may attempt to inject packets into a RADIUS
  742. conversation.
  743. [4] An adversary may launch a dictionary attack against the RADIUS
  744. shared secret.
  745. [5] An adversary may launch a known plaintext attack, hoping to
  746. recover the key stream corresponding to a Request Authenticator.
  747. [6] An adversary may attempt to replay a RADIUS exchange.
  748. [7] An adversary may attempt to disrupt the EAP negotiation, in
  749. order to weaken the authentication, or gain access to peer
  750. passwords.
  751. [8] An authenticated NAS may attempt to forge NAS or session
  752. identification attributes,
  753. [9] A rogue (unauthenticated) NAS may attempt to impersonate a
  754. legitimate NAS.
  755. Aboba & Calhoun Informational [Page 19]
  756. RFC 3579 RADIUS & EAP September 2003
  757. [10] An attacker may attempt to act as a man-in-the-middle.
  758. To address these threats, it is necessary to support confidentiality,
  759. data origin authentication, integrity, and replay protection on a
  760. per-packet basis. Bi-directional authentication between the RADIUS
  761. client and server also needs to be provided. There is no requirement
  762. that the identities of RADIUS clients and servers be kept
  763. confidential (e.g., from a passive eavesdropper).
  764. 4.2. Security Protocol
  765. To address the security vulnerabilities of RADIUS/EAP,
  766. implementations of this specification SHOULD support IPsec [RFC2401]
  767. along with IKE [RFC2409] for key management. IPsec ESP [RFC2406]
  768. with non-null transform SHOULD be supported, and IPsec ESP with a
  769. non-null encryption transform and authentication support SHOULD be
  770. used to provide per-packet confidentiality, authentication, integrity
  771. and replay protection. IKE SHOULD be used for key management.
  772. Within RADIUS [RFC2865], a shared secret is used for hiding of
  773. attributes such as User-Password, as well as in computation of the
  774. Response Authenticator. In RADIUS accounting [RFC2866], the shared
  775. secret is used in computation of both the Request Authenticator and
  776. the Response Authenticator.
  777. Since in RADIUS a shared secret is used to provide confidentiality as
  778. well as integrity protection and authentication, only use of IPsec
  779. ESP with a non-null transform can provide security services
  780. sufficient to substitute for RADIUS application-layer security.
  781. Therefore, where IPSEC AH or ESP null is used, it will typically
  782. still be necessary to configure a RADIUS shared secret.
  783. Where RADIUS is run over IPsec ESP with a non-null transform, the
  784. secret shared between the NAS and the RADIUS server MAY NOT be
  785. configured. In this case, a shared secret of zero length MUST be
  786. assumed. However, a RADIUS server that cannot know whether incoming
  787. traffic is IPsec-protected MUST be configured with a non-null RADIUS
  788. shared secret.
  789. When IPsec ESP is used with RADIUS, per-packet authentication,
  790. integrity and replay protection MUST be used. 3DES-CBC MUST be
  791. supported as an encryption transform and AES-CBC SHOULD be supported.
  792. AES-CBC SHOULD be offered as a preferred encryption transform if
  793. supported. HMAC-SHA1-96 MUST be supported as an authentication
  794. transform. DES-CBC SHOULD NOT be used as the encryption transform.
  795. Aboba & Calhoun Informational [Page 20]
  796. RFC 3579 RADIUS & EAP September 2003
  797. A typical IPsec policy for an IPsec-capable RADIUS client is
  798. "Initiate IPsec, from me to any destination port UDP 1812". This
  799. causes an IPsec SA to be set up by the RADIUS client prior to sending
  800. RADIUS traffic. If some RADIUS servers contacted by the client do
  801. not support IPsec, then a more granular policy will be required:
  802. "Initiate IPsec, from me to IPsec-Capable-RADIUS-Server, destination
  803. port UDP 1812".
  804. For an IPsec-capable RADIUS server, a typical IPsec policy is "Accept
  805. IPsec, from any to me, destination port 1812". This causes the
  806. RADIUS server to accept (but not require) use of IPsec. It may not
  807. be appropriate to require IPsec for all RADIUS clients connecting to
  808. an IPsec-enabled RADIUS server, since some RADIUS clients may not
  809. support IPsec.
  810. Where IPsec is used for security, and no RADIUS shared secret is
  811. configured, it is important that the RADIUS client and server perform
  812. an authorization check. Before enabling a host to act as a RADIUS
  813. client, the RADIUS server SHOULD check whether the host is authorized
  814. to provide network access. Similarly, before enabling a host to act
  815. as a RADIUS server, the RADIUS client SHOULD check whether the host
  816. is authorized for that role.
  817. RADIUS servers can be configured with the IP addresses (for IKE
  818. Aggressive Mode with pre-shared keys) or FQDNs (for certificate
  819. authentication) of RADIUS clients. Alternatively, if a separate
  820. Certification Authority (CA) exists for RADIUS clients, then the
  821. RADIUS server can configure this CA as a trust anchor [RFC3280] for
  822. use with IPsec.
  823. Similarly, RADIUS clients can be configured with the IP addresses
  824. (for IKE Aggressive Mode with pre-shared keys) or FQDNs (for
  825. certificate authentication) of RADIUS servers. Alternatively, if a
  826. separate CA exists for RADIUS servers, then the RADIUS client can
  827. configure this CA as a trust anchor for use with IPsec.
  828. Since unlike SSL/TLS, IKE does not permit certificate policies to be
  829. set on a per-port basis, certificate policies need to apply to all
  830. uses of IPsec on RADIUS clients and servers. In IPsec deployments
  831. supporting only certificate authentication, a management station
  832. initiating an IPsec-protected telnet session to the RADIUS server
  833. would need to obtain a certificate chaining to the RADIUS client CA.
  834. Issuing such a certificate might not be appropriate if the management
  835. station was not authorized as a RADIUS client.
  836. Where RADIUS clients may obtain their IP address dynamically (such as
  837. an Access Point supporting DHCP), IKE Main Mode with pre-shared keys
  838. [RFC2409] SHOULD NOT be used, since this requires use of a group
  839. Aboba & Calhoun Informational [Page 21]
  840. RFC 3579 RADIUS & EAP September 2003
  841. pre-shared key; instead, Aggressive Mode SHOULD be used. IKEv2, a
  842. work in progress, may address this issue in the future. Where RADIUS
  843. client addresses are statically assigned, either Aggressive Mode or
  844. Main Mode MAY be used. With certificate authentication, Main Mode
  845. SHOULD be used.
  846. Care needs to be taken with IKE Phase 1 Identity Payload selection in
  847. order to enable mapping of identities to pre-shared keys even with
  848. Aggressive Mode. Where the ID_IPV4_ADDR or ID_IPV6_ADDR Identity
  849. Payloads are used and addresses are dynamically assigned, mapping of
  850. identities to keys is not possible, so that group pre-shared keys are
  851. still a practical necessity. As a result, the ID_FQDN identity
  852. payload SHOULD be employed in situations where Aggressive mode is
  853. utilized along with pre-shared keys and IP addresses are dynamically
  854. assigned. This approach also has other advantages, since it allows
  855. the RADIUS server and client to configure themselves based on the
  856. fully qualified domain name of their peers.
  857. Note that with IPsec, security services are negotiated at the
  858. granularity of an IPsec SA, so that RADIUS exchanges requiring a set
  859. of security services different from those negotiated with existing
  860. IPsec SAs will need to negotiate a new IPsec SA. Separate IPsec SAs
  861. are also advisable where quality of service considerations dictate
  862. different handling RADIUS conversations. Attempting to apply
  863. different quality of service to connections handled by the same IPsec
  864. SA can result in reordering, and falling outside the replay window.
  865. For a discussion of the issues, see [RFC2983].
  866. 4.3. Security Issues
  867. This section provides more detail on the vulnerabilities identified
  868. in Section 4.1., and how they may be mitigated. Vulnerabilities
  869. include:
  870. Privacy issues
  871. Spoofing and hijacking
  872. Dictionary attacks
  873. Known plaintext attacks
  874. Replay attacks
  875. Negotiation attacks
  876. Impersonation
  877. Man in the middle attacks
  878. Separation of authenticator and authentication server
  879. Multiple databases
  880. Aboba & Calhoun Informational [Page 22]
  881. RFC 3579 RADIUS & EAP September 2003
  882. 4.3.1. Privacy Issues
  883. Since RADIUS messages may contain the User-Name attribute as well as
  884. NAS-IP-Address or NAS-Identifier attributes, an attacker snooping on
  885. RADIUS traffic may be able to determine the geographic location of
  886. peers in real time. In wireless networks, it is often assumed that
  887. RADIUS traffic is physically secure, since it typically travels over
  888. the wired network and that this limits the release of location
  889. information.
  890. However, it is possible for an authenticated attacker to spoof ARP
  891. packets [RFC826] so as to cause diversion of RADIUS traffic onto the
  892. wireless network. In this way an attacker may obtain RADIUS packets
  893. from which it can glean peer location information, or which it can
  894. subject to a known plaintext or offline dictionary attack. To
  895. address these vulnerabilities, implementations of this specification
  896. SHOULD use IPsec ESP with non-null transform and per-packet
  897. encryption, authentication, integrity and replay protection to
  898. protect both RADIUS authentication [RFC2865] and accounting [RFC2866]
  899. traffic, as described in Section 4.2.
  900. 4.3.2. Spoofing and Hijacking
  901. Access-Request packets with a User-Password attribute establish the
  902. identity of both the user and the NAS sending the Access-Request,
  903. because of the way the shared secret between the NAS and RADIUS
  904. server is used. Access-Request packets with CHAP-Password or
  905. EAP-Message attributes do not have a User-Password attribute. As a
  906. result, the Message-Authenticator attribute SHOULD be used in
  907. Access-Request packets that do not have a User-Password attribute, in
  908. order to establish the identity of the NAS sending the request.
  909. An attacker may attempt to inject packets into the conversation
  910. between the NAS and the RADIUS server, or between the RADIUS server
  911. and the security server. RADIUS [RFC2865] does not support
  912. encryption other than attribute hiding. As described in [RFC2865],
  913. only Access-Reply and Access-Challenge packets are integrity
  914. protected. Moreover, the per-packet authentication and integrity
  915. protection mechanism described in [RFC2865] has known weaknesses
  916. [MD5Attack], making it a tempting target for attackers looking to
  917. subvert RADIUS/EAP.
  918. To provide stronger security, the Message-Authenticator attribute
  919. MUST be used in all RADIUS packets containing an EAP-Message
  920. attribute. Implementations of this specification SHOULD use IPsec
  921. ESP with non-null transform and per-packet encryption,
  922. authentication, integrity and replay protection, as described in
  923. Section 4.2.
  924. Aboba & Calhoun Informational [Page 23]
  925. RFC 3579 RADIUS & EAP September 2003
  926. 4.3.3. Dictionary Attacks
  927. The RADIUS shared secret is vulnerable to offline dictionary attack,
  928. based on capture of the Response Authenticator or
  929. Message-Authenticator attribute. In order to decrease the level of
  930. vulnerability, [RFC2865] recommends:
  931. The secret (password shared between the client and the RADIUS
  932. server) SHOULD be at least as large and unguessable as a
  933. well-chosen password. It is preferred that the secret be at least
  934. 16 octets.
  935. The risk of an offline dictionary attack can be further reduced by
  936. employing IPsec ESP with non-null transform in order to encrypt the
  937. RADIUS conversation, as described in Section 4.2.
  938. 4.3.4. Known Plaintext Attacks
  939. Since EAP [RFC2284] does not support PAP, the RADIUS User-Password
  940. attribute is not used to carry hidden user passwords within
  941. RADIUS/EAP conversations. The User-Password hiding mechanism,
  942. defined in [RFC2865] utilizes MD5, defined in [RFC1321], in order to
  943. generate a key stream based on the RADIUS shared secret and the
  944. Request Authenticator. Where PAP is in use, it is possible to
  945. collect key streams corresponding to a given Request Authenticator
  946. value, by capturing RADIUS conversations corresponding to a PAP
  947. authentication attempt, using a known password. Since the
  948. User-Password is known, the key stream corresponding to a given
  949. Request Authenticator can be determined and stored.
  950. Since the key stream may have been determined previously from a known
  951. plaintext attack, if the Request Authenticator repeats, attributes
  952. encrypted using the RADIUS attribute hiding mechanism should be
  953. considered compromised. In addition to the User-Password attribute,
  954. which is not used with EAP, this includes attributes such as
  955. Tunnel-Password [RFC2868, section 3.5] and MS-MPPE-Send-Key and
  956. MS-MPPE-Recv-Key attributes [RFC2548, section 2.4], which include a
  957. Salt field as part of the hiding algorithm.
  958. To avoid this, [RFC2865], Section 3 advises:
  959. Since it is expected that the same secret MAY be used to
  960. authenticate with servers in disparate geographic regions, the
  961. Request Authenticator field SHOULD exhibit global and temporal
  962. uniqueness.
  963. Aboba & Calhoun Informational [Page 24]
  964. RFC 3579 RADIUS & EAP September 2003
  965. Where the Request Authenticator repeats, the Salt field defined in
  966. [RFC2548], Section 2.4 does not provide protection against
  967. compromise. This is because MD5 [RFC1321], rather than HMAC-MD5
  968. [RFC2104], is used to generate the key stream, which is calculated
  969. from the 128-bit RADIUS shared secret (S), the 128-bit Request
  970. Authenticator (R), and the Salt field (A), using the formula b(1) =
  971. MD5(S + R + A). Since the Salt field is placed at the end, if the
  972. Request Authenticator were to repeat on a network where PAP is in
  973. use, then the salted keystream could be calculated from the
  974. User-Password keystream by continuing the MD5 calculation based on
  975. the Salt field (A), which is sent in the clear.
  976. Even though EAP does not support PAP authentication, a security
  977. vulnerability can still exist where the same RADIUS shared secret is
  978. used for hiding User-Password as well as other attributes. This can
  979. occur, for example, if the same RADIUS proxy handles authentication
  980. requests for both EAP and PAP.
  981. The threat can be mitigated by protecting RADIUS with IPsec ESP with
  982. non-null transform, as described in Section 4.2. Where RADIUS shared
  983. secrets are configured, the RADIUS shared secret used by a NAS
  984. supporting EAP MUST NOT be reused by a NAS utilizing the
  985. User-Password attribute, since improper shared secret hygiene could
  986. lead to compromise of hidden attributes.
  987. 4.3.5. Replay Attacks
  988. The RADIUS protocol provides only limited support for replay
  989. protection. RADIUS Access-Requests include liveness via the 128-bit
  990. Request Authenticator. However, the Request Authenticator is not a
  991. replay counter. Since RADIUS servers may not maintain a cache of
  992. previous Request Authenticators, the Request Authenticator does not
  993. provide replay protection.
  994. RADIUS accounting [RFC2866] does not support replay protection at the
  995. protocol level. Due to the need to support failover between RADIUS
  996. accounting servers, protocol-based replay protection is not
  997. sufficient to prevent duplicate accounting records. However, once
  998. accepted by the accounting server, duplicate accounting records can
  999. be detected by use of the the Acct-Session-Id [RFC2866, section 5.5]
  1000. and Event-Timestamp [RFC2869, section 5.3] attributes.
  1001. Unlike RADIUS authentication, RADIUS accounting does not use the
  1002. Request Authenticator as a nonce. Instead, the Request Authenticator
  1003. contains an MD5 hash calculated over the Code, Identifier, Length,
  1004. and request attributes of the Accounting Request packet, plus the
  1005. shared secret. The Response Authenticator also contains an MD5 hash
  1006. calculated over the Code, Identifier and Length, the Request
  1007. Aboba & Calhoun Informational [Page 25]
  1008. RFC 3579 RADIUS & EAP September 2003
  1009. Authenticator field from the Accounting-Request packet being replied
  1010. to, the response attributes and the shared secret.
  1011. Since the Accounting Response Authenticator depends in part on the
  1012. Accounting Request Authenticator, it is not possible to replay an
  1013. Accounting-Response unless the Request Authenticator repeats. While
  1014. it is possible to utilize EAP methods such as EAP TLS [RFC2716] which
  1015. include liveness checks on both sides, not all EAP messages will
  1016. include liveness so that this provides incomplete protection.
  1017. Strong replay protection for RADIUS authentication and accounting can
  1018. be provided by enabling IPsec replay protection with RADIUS, as
  1019. described in Section 4.2.
  1020. 4.3.6. Negotiation Attacks
  1021. In a negotiation attack a rogue NAS, tunnel server, RADIUS proxy or
  1022. RADIUS server attempts to cause the authenticating peer to choose a
  1023. less secure authentication method. For example, a session that would
  1024. normally be authenticated with EAP would instead be authenticated via
  1025. CHAP or PAP; alternatively, a connection that would normally be
  1026. authenticated via a more secure EAP method such as EAP-TLS [RFC2716]
  1027. might be made to occur via a less secure EAP method, such as
  1028. MD5-Challenge. The threat posed by rogue devices, once thought to be
  1029. remote, has gained currency given compromises of telephone company
  1030. switching systems, such as those described in [Masters].
  1031. Protection against negotiation attacks requires the elimination of
  1032. downward negotiations. The RADIUS exchange may be further protected
  1033. by use of IPsec, as described in Section 4.2. Alternatively, where
  1034. IPsec is not used, the vulnerability can be mitigated via
  1035. implementation of per-connection policy on the part of the
  1036. authenticating peer, and per-peer policy on the part of the RADIUS
  1037. server. For the authenticating peer, authentication policy should be
  1038. set on a per-connection basis. Per-connection policy allows an
  1039. authenticating peer to negotiate a strong EAP method when connecting
  1040. to one service, while negotiating a weaker EAP method for another
  1041. service.
  1042. With per-connection policy, an authenticating peer will only attempt
  1043. to negotiate EAP for a session in which EAP support is expected. As
  1044. a result, there is a presumption that an authenticating peer
  1045. selecting EAP requires that level of security. If it cannot be
  1046. provided, it is likely that there is some kind of misconfiguration,
  1047. or even that the authenticating peer is contacting the wrong server.
  1048. Should the NAS not be able to negotiate EAP, or should the
  1049. EAP-Request sent by the NAS be of a different EAP type than what is
  1050. expected, the authenticating peer MUST disconnect. An authenticating
  1051. Aboba & Calhoun Informational [Page 26]
  1052. RFC 3579 RADIUS & EAP September 2003
  1053. peer expecting EAP to be negotiated for a session MUST NOT negotiate
  1054. a weaker method, such as CHAP or PAP. In wireless networks, the
  1055. service advertisement itself may be spoof-able, so that an attacker
  1056. could fool the peer into negotiating an authentication method
  1057. suitable for a less secure network.
  1058. For a NAS, it may not be possible to determine whether a peer is
  1059. required to authenticate with EAP until the peer's identity is known.
  1060. For example, for shared-uses NASes it is possible for one reseller to
  1061. implement EAP while another does not. Alternatively, some peer might
  1062. be authenticated locally by the NAS while other peers are
  1063. authenticated via RADIUS. In such cases, if any peers of the NAS
  1064. MUST do EAP, then the NAS MUST attempt to negotiate EAP for every
  1065. session. This avoids forcing a peer to support more than one
  1066. authentication type, which could weaken security.
  1067. If CHAP is negotiated, the NAS will pass the User-Name and
  1068. CHAP-Password attributes to the RADIUS server in an Access-Request
  1069. packet. If the peer is not required to use EAP, then the RADIUS
  1070. server will respond with an Access-Accept or Access-Reject packet as
  1071. appropriate. However, if CHAP has been negotiated but EAP is
  1072. required, the RADIUS server MUST respond with an Access-Reject,
  1073. rather than an Access-Challenge/EAP-Message/EAP-Request packet. The
  1074. authenticating peer MUST refuse to renegotiate authentication, even
  1075. if the renegotiation is from CHAP to EAP.
  1076. If EAP is negotiated but is not supported by the RADIUS proxy or
  1077. server, then the server or proxy MUST respond with an Access-Reject.
  1078. In these cases, a PPP NAS MUST send an LCP-Terminate and disconnect
  1079. the peer. This is the correct behavior since the authenticating peer
  1080. is expecting EAP to be negotiated, and that expectation cannot be
  1081. fulfilled. An EAP-capable authenticating peer MUST refuse to
  1082. renegotiate the authentication protocol if EAP had initially been
  1083. negotiated. Note that problems with a non-EAP capable RADIUS proxy
  1084. could prove difficult to diagnose, since a peer connecting from one
  1085. location (with an EAP-capable proxy) might be able to successfully
  1086. authenticate via EAP, while the same peer connecting at another
  1087. location (and encountering an EAP-incapable proxy) might be
  1088. consistently disconnected.
  1089. 4.3.7. Impersonation
  1090. [RFC2865] Section 3 states:
  1091. A RADIUS server MUST use the source IP address of the RADIUS UDP
  1092. packet to decide which shared secret to use, so that RADIUS
  1093. requests can be proxied.
  1094. Aboba & Calhoun Informational [Page 27]
  1095. RFC 3579 RADIUS & EAP September 2003
  1096. When RADIUS requests are forwarded by a proxy, the NAS-IP-Address or
  1097. NAS-IPv6-Address attributes may not match the source address. Since
  1098. the NAS-Identifier attribute need not contain an FQDN, this attribute
  1099. also may not correspond to the source address, even indirectly, with
  1100. or without a proxy present.
  1101. As a result, the authenticity check performed by a RADIUS server or
  1102. proxy does not verify the correctness of NAS identification
  1103. attributes. This makes it possible for a rogue NAS to forge
  1104. NAS-IP-Address, NAS-IPv6-Address or NAS-Identifier attributes within
  1105. a RADIUS Access-Request in order to impersonate another NAS. It is
  1106. also possible for a rogue NAS to forge session identification
  1107. attributes such as Called-Station-Id, Calling-Station-Id, and
  1108. Originating-Line-Info.
  1109. This could fool the RADIUS server into subsequently sending
  1110. Disconnect or CoA-Request messages [RFC3576] containing forged
  1111. session identification attributes to a NAS targeted by an attacker.
  1112. To address these vulnerabilities RADIUS proxies SHOULD check whether
  1113. NAS identification attributes (NAS-IP-Address, NAS-IPv6-Address,
  1114. NAS-Identifier) match the source address of packets originating from
  1115. the NAS. Where a match is not found, an Access-Reject SHOULD be
  1116. sent, and an error SHOULD be logged.
  1117. However, such a check may not always be possible. Since the
  1118. NAS-Identifier attribute need not correspond to an FQDN, it may not
  1119. be resolvable to an IP address to be matched against the source
  1120. address. Also, where a NAT exists between the RADIUS client and
  1121. proxy, checking the NAS-IP-Address or NAS-IPv6-Address attributes may
  1122. not be feasible.
  1123. To allow verification of NAS and session identification parameters,
  1124. EAP methods can support the secure exchange of these parameters
  1125. between the EAP peer and EAP server. NAS identification attributes
  1126. include NAS-IP-Address, NAS-IPv6-Address and Called-Station-Id;
  1127. session identification attributes include User-Name and
  1128. Calling-Station-Id. The secure exchange of these parameters between
  1129. the EAP peer and server enables the RADIUS server to check whether
  1130. the attributes provided by the NAS match those provided by the peer;
  1131. similarly, the peer can check the parameters provided by the NAS
  1132. against those provided by the EAP server. This enables detection of
  1133. a rogue NAS.
  1134. Aboba & Calhoun Informational [Page 28]
  1135. RFC 3579 RADIUS & EAP September 2003
  1136. 4.3.8. Man in the Middle Attacks
  1137. RADIUS only provides security on a hop-by-hop basis, even where IPsec
  1138. is used. As a result, an attacker gaining control of a RADIUS proxy
  1139. could attempt to modify EAP packets in transit. To protect against
  1140. this, EAP methods SHOULD incorporate their own per-packet integrity
  1141. protection and authentication mechanisms.
  1142. 4.3.9. Separation of Authenticator and Authentication Server
  1143. As noted in [RFC2716], it is possible for the EAP peer and
  1144. authenticator to mutually authenticate, and derive a Master Session
  1145. Key (MSK) for a ciphersuite used to protect subsequent data traffic.
  1146. This does not present an issue on the peer, since the peer and EAP
  1147. client reside on the same machine; all that is required is for the
  1148. EAP client module to derive and pass a Transient Session Key (TSK) to
  1149. the ciphersuite module.
  1150. The situation is more complex when EAP is used with RADIUS, since the
  1151. authenticator and authentication server may not reside on the same
  1152. host.
  1153. In the case where the authenticator and authentication server reside
  1154. on different machines, there are several implications for security.
  1155. First, mutual authentication will occur between the peer and the
  1156. authentication server, not between the peer and the authenticator.
  1157. This means that it is not possible for the peer to validate the
  1158. identity of the NAS or tunnel server that it is speaking to, using
  1159. EAP alone.
  1160. As described in Section 4.2, when RADIUS/EAP is used to encapsulate
  1161. EAP packets, IPsec SHOULD be used to provide per-packet
  1162. authentication, integrity, replay protection and confidentiality.
  1163. The Message-Authenticator attribute is also required in RADIUS
  1164. Access-Requests containing an EAP-Message attribute sent from the NAS
  1165. or tunnel server to the RADIUS server. Since the
  1166. Message-Authenticator attribute involves an HMAC-MD5 message
  1167. integrity check, it is possible for the RADIUS server to verify the
  1168. integrity of the Access-Request as well as the NAS or tunnel server's
  1169. identity, even where IPsec is not used. Similarly, Access-Challenge
  1170. packets containing an EAP-Message attribute sent from the RADIUS
  1171. server to the NAS are also authenticated and integrity protected
  1172. using an HMAC-MD5 message integrity check, enabling the NAS or tunnel
  1173. server to determine the integrity of the packet and verify the
  1174. identity of the RADIUS server, even where IPsec is not used.
  1175. Moreover, EAP packets sent using methods that contain their own
  1176. integrity protection cannot be successfully modified by a rogue NAS
  1177. or tunnel server.
  1178. Aboba & Calhoun Informational [Page 29]
  1179. RFC 3579 RADIUS & EAP September 2003
  1180. The second issue that arises where the authenticator and
  1181. authentication server reside on separate hosts is that the EAP Master
  1182. Session Key (MSK) negotiated between the peer and authentication
  1183. server will need to be transmitted to the authenticator. Therefore a
  1184. mechanism needs to be provided to transmit the MSK from the
  1185. authentication server to the NAS or tunnel server that needs it. The
  1186. specification of the key transport and wrapping mechanism is outside
  1187. the scope of this document. However, it is expected that the
  1188. wrapping mechanism will provide confidentiality, integrity and replay
  1189. protection, and data origin authentication.
  1190. 4.3.10. Multiple Databases
  1191. In many cases a security server will be deployed along with a RADIUS
  1192. server in order to provide EAP services. Unless the security server
  1193. also functions as a RADIUS server, two separate user databases will
  1194. exist, each containing information about the security requirements
  1195. for the user. This represents a weakness, since security may be
  1196. compromised by a successful attack on either of the servers, or their
  1197. databases. With multiple user databases, adding a new user may
  1198. require multiple operations, increasing the chances for error. The
  1199. problems are further magnified in the case where user information is
  1200. also being kept in an LDAP server. In this case, three stores of
  1201. user information may exist.
  1202. In order to address these threats, consolidation of databases is
  1203. recommended. This can be achieved by having both the RADIUS server
  1204. and security server store information in the same database; by having
  1205. the security server provide a full RADIUS implementation; or by
  1206. consolidating both the security server and the RADIUS server onto
  1207. the same machine.
  1208. 5. IANA Considerations
  1209. This specification does not create any new registries, or define any
  1210. new RADIUS attributes or values.
  1211. 6. References
  1212. 6.1. Normative References
  1213. [RFC1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC
  1214. 1321, April 1992.
  1215. [RFC2104] Krawczyk, H., Bellare, M. and R. Canetti, "HMAC:
  1216. Keyed-Hashing for Message Authentication", RFC 2104,
  1217. February 1997.
  1218. Aboba & Calhoun Informational [Page 30]
  1219. RFC 3579 RADIUS & EAP September 2003
  1220. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
  1221. Requirement Levels", BCP 14, RFC 2119, March 1997.
  1222. [RFC2279] Yergeau, F., "UTF-8, a transformation format of ISO
  1223. 10646", RFC 2279, January 1998.
  1224. [RFC2284] Blunk, L. and J. Vollbrecht, "PPP Extensible
  1225. Authentication Protocol (EAP)", RFC 2284, March 1998.
  1226. [RFC2401] Atkinson, R. and S. Kent, "Security Architecture for
  1227. the Internet Protocol", RFC 2401, November 1998.
  1228. [RFC2406] Kent, S. and R. Atkinson, "IP Encapsulating Security
  1229. Payload (ESP)", RFC 2406, November 1998.
  1230. [RFC2409] Harkins, D. and D. Carrel, "The Internet Key Exchange
  1231. (IKE)", RFC 2409, November 1998.
  1232. [RFC2486] Aboba, B. and M. Beadles, "The Network Access
  1233. Identifier", RFC 2486, January 1999.
  1234. [RFC2865] Rigney, C., Willens, S., Rubens, A. and W. Simpson,
  1235. "Remote Authentication Dial In User Service (RADIUS)",
  1236. RFC 2865, June 2000.
  1237. [RFC2988] Paxson, V. and M. Allman, "Computing TCP's
  1238. Retransmission Timer", RFC 2988, November 2000.
  1239. [RFC3162] Aboba, B., Zorn, G. and D. Mitton, "RADIUS and IP6",
  1240. RFC 3162, August 2001.
  1241. [RFC3280] Housley, R., Polk, W., Ford, W. and D. Solo, "Internet
  1242. X.509 Public Key Infrastructure Certificate and
  1243. Certificate Revocation List (CRL) Profile", RFC 3280,
  1244. April 2002.
  1245. [RFC3576] Chiba, M., Dommety, G., Eklund, M., Mitton, D. and B.
  1246. Aboba, "Dynamic Authorization Extensions to Remote
  1247. Authentication Dial In User Service (RADIUS)", RFC
  1248. 3576, July 2003.
  1249. Aboba & Calhoun Informational [Page 31]
  1250. RFC 3579 RADIUS & EAP September 2003
  1251. 6.2. Informative References
  1252. [RFC826] Plummer, D., "An Ethernet Address Resolution
  1253. Protocol", STD 37, RFC 826, November 1982.
  1254. [RFC1510] Kohl, J. and C. Neuman, "The Kerberos Network
  1255. Authentication Service (V5)", RFC 1510, September
  1256. 1993.
  1257. [RFC1661] Simpson, W., "The Point-to-Point Protocol (PPP)", STD
  1258. 51, RFC 1661, July 1994.
  1259. [RFC2548] Zorn, G., "Microsoft Vendor-specific RADIUS
  1260. Attributes", RFC 2548, March 1999.
  1261. [RFC2607] Aboba, B. and J. Vollbrecht, "Proxy Chaining and
  1262. Policy Implementation in Roaming", RFC 2607, June
  1263. 1999.
  1264. [RFC2716] Aboba, B. and D. Simon,"PPP EAP TLS Authentication
  1265. Protocol", RFC 2716, October 1999.
  1266. [RFC2866] Rigney, C., "RADIUS Accounting", RFC 2866, June 2000.
  1267. [RFC2867] Zorn, G., Aboba, B. and D. Mitton, "RADIUS Accounting
  1268. Modifications for Tunnel Protocol Support", RFC 2867,
  1269. June 2000.
  1270. [RFC2868] Zorn, G., Leifer, D., Rubens, A., Shriver, J.,
  1271. Holdrege, M. and I. Goyret, "RADIUS Attributes for
  1272. Tunnel Protocol Support", RFC 2868, June 2000.
  1273. [RFC2869] Rigney, C., Willats, W. and P. Calhoun, "RADIUS
  1274. Extensions", RFC 2869, June 2000.
  1275. [RFC2983] Black, D. "Differentiated Services and Tunnels", RFC
  1276. 2983, October 2000.
  1277. [RFC3580] Congdon, P., Aboba, B., Smith, A., Zorn, G. and J.
  1278. Roese, "IEEE 802.1X Remote Authentication Dial In User
  1279. Service (RADIUS) Usage Guidelines", RFC 3580,
  1280. September 2003.
  1281. [IEEE802] IEEE Standards for Local and Metropolitan Area
  1282. Networks: Overview and Architecture, ANSI/IEEE Std
  1283. 802, 1990.
  1284. Aboba & Calhoun Informational [Page 32]
  1285. RFC 3579 RADIUS & EAP September 2003
  1286. [IEEE8021X] IEEE Standards for Local and Metropolitan Area
  1287. Networks: Port based Network Access Control, IEEE Std
  1288. 802.1X-2001, June 2001.
  1289. [MD5Attack] Dobbertin, H., "The Status of MD5 After a Recent
  1290. Attack", CryptoBytes Vol.2 No.2, Summer 1996.
  1291. [Masters] Slatalla, M. and J. Quittner, "Masters of Deception."
  1292. HarperCollins, New York, 1995.
  1293. [NASREQ] Calhoun, P., et al., "Diameter Network Access Server
  1294. Application", Work in Progress.
  1295. Aboba & Calhoun Informational [Page 33]
  1296. RFC 3579 RADIUS & EAP September 2003
  1297. Appendix A - Examples
  1298. The examples below illustrate conversations between an authenticating
  1299. peer, NAS, and RADIUS server. The OTP and EAP-TLS protocols are used
  1300. only for illustrative purposes; other authentication protocols could
  1301. also have been used, although they might show somewhat different
  1302. behavior.
  1303. Where the NAS sends an EAP-Request/Identity as the initial packet,
  1304. the exchange appears as follows:
  1305. Authenticating peer NAS RADIUS server
  1306. ------------------- --- -------------
  1307. <- EAP-Request/
  1308. Identity
  1309. EAP-Response/
  1310. Identity (MyID) ->
  1311. RADIUS Access-Request/
  1312. EAP-Message/EAP-Response/
  1313. (MyID) ->
  1314. <- RADIUS
  1315. Access-Challenge/
  1316. EAP-Message/EAP-Request
  1317. OTP/OTP Challenge
  1318. <- EAP-Request/
  1319. OTP/OTP Challenge
  1320. EAP-Response/
  1321. OTP, OTPpw ->
  1322. RADIUS Access-Request/
  1323. EAP-Message/EAP-Response/
  1324. OTP, OTPpw ->
  1325. <- RADIUS
  1326. Access-Accept/
  1327. EAP-Message/EAP-Success
  1328. (other attributes)
  1329. <- EAP-Success
  1330. Aboba & Calhoun Informational [Page 34]
  1331. RFC 3579 RADIUS & EAP September 2003
  1332. In the case where the NAS initiates with an EAP-Request for EAP TLS
  1333. [RFC2716], and the identity is determined based on the contents of
  1334. the client certificate, the exchange will appear as follows:
  1335. Authenticating peer NAS RADIUS server
  1336. ------------------- --- -------------
  1337. <- EAP-Request/
  1338. EAP-Type=EAP-TLS
  1339. (TLS Start, S bit set)
  1340. EAP-Response/
  1341. EAP-Type=EAP-TLS
  1342. (TLS client_hello)->
  1343. RADIUS Access-Request/
  1344. EAP-Message/EAP-Response/
  1345. EAP-Type=EAP-TLS->
  1346. <-RADIUS Access-Challenge/
  1347. EAP-Message/
  1348. EAP-Request/
  1349. EAP-Type=EAP-TLS
  1350. <- EAP-Request/
  1351. EAP-Type=EAP-TLS
  1352. (TLS server_hello,
  1353. TLS certificate,
  1354. [TLS server_key_exchange,]
  1355. [TLS certificate_request,]
  1356. TLS server_hello_done)
  1357. EAP-Response/
  1358. EAP-Type=EAP-TLS
  1359. (TLS certificate,
  1360. TLS client_key_exchange,
  1361. [TLS certificate_verify,]
  1362. TLS change_cipher_spec,
  1363. TLS finished)->
  1364. RADIUS Access-Request/
  1365. EAP-Message/EAP-Response/
  1366. EAP-Type=EAP-TLS->
  1367. <-RADIUS Access-Challenge/
  1368. EAP-Message/
  1369. EAP-Request/
  1370. EAP-Type=EAP-TLS
  1371. <- EAP-Request/
  1372. EAP-Type=EAP-TLS
  1373. (TLS change_cipher_spec,
  1374. TLS finished)
  1375. Aboba & Calhoun Informational [Page 35]
  1376. RFC 3579 RADIUS & EAP September 2003
  1377. EAP-Response/
  1378. EAP-Type=EAP-TLS ->
  1379. RADIUS Access-Request/
  1380. EAP-Message/EAP-Response/
  1381. EAP-Type=EAP-TLS->
  1382. <-RADIUS Access-Accept/
  1383. EAP-Message/EAP-Success
  1384. (other attributes)
  1385. <- EAP-Success
  1386. In the case where the NAS first sends an EAP-Start packet to the
  1387. RADIUS server, the conversation would appear as follows:
  1388. Authenticating peer NAS RADIUS server
  1389. ------------------- --- -------------
  1390. RADIUS Access-Request/
  1391. EAP-Message/Start ->
  1392. <- RADIUS
  1393. Access-Challenge/
  1394. EAP-Message/EAP-Request/
  1395. Identity
  1396. <- EAP-Request/
  1397. Identity
  1398. EAP-Response/
  1399. Identity (MyID) ->
  1400. RADIUS Access-Request/
  1401. EAP-Message/EAP-Response/
  1402. Identity (MyID) ->
  1403. <- RADIUS
  1404. Access-Challenge/
  1405. EAP-Message/EAP-Request/
  1406. OTP/OTP Challenge
  1407. <- EAP-Request/
  1408. OTP/OTP Challenge
  1409. EAP-Response/
  1410. OTP, OTPpw ->
  1411. RADIUS Access-Request/
  1412. EAP-Message/EAP-Response/
  1413. OTP, OTPpw ->
  1414. <- RADIUS
  1415. Access-Accept/
  1416. EAP-Message/EAP-Success
  1417. (other attributes)
  1418. <- EAP-Success
  1419. Aboba & Calhoun Informational [Page 36]
  1420. RFC 3579 RADIUS & EAP September 2003
  1421. In the case where the NAS initiates with an EAP-Request for EAP TLS
  1422. [RFC2716], but the peer responds with a Nak, indicating that it would
  1423. prefer another method not implemented locally on the NAS, the
  1424. exchange will appear as follows:
  1425. Authenticating peer NAS RADIUS server
  1426. ------------------- --- -------------
  1427. <- EAP-Request/
  1428. EAP-Type=EAP-TLS
  1429. (TLS Start, S bit set)
  1430. EAP-Response/
  1431. EAP-Type=Nak
  1432. (Alternative(s))->
  1433. RADIUS Access-Request/
  1434. EAP-Message/EAP-Response/
  1435. Nak ->
  1436. <- RADIUS
  1437. Access-Challenge/
  1438. EAP-Message/EAP-Request/
  1439. Identity
  1440. <- EAP-Request/
  1441. Identity
  1442. EAP-Response/
  1443. Identity (MyID) ->
  1444. RADIUS Access-Request/
  1445. EAP-Message/EAP-Response/
  1446. (MyID) ->
  1447. <- RADIUS
  1448. Access-Challenge/
  1449. EAP-Message/EAP-Request
  1450. OTP/OTP Challenge
  1451. <- EAP-Request/
  1452. OTP/OTP Challenge
  1453. EAP-Response/
  1454. OTP, OTPpw ->
  1455. RADIUS Access-Request/
  1456. EAP-Message/EAP-Response/
  1457. OTP, OTPpw ->
  1458. <- RADIUS
  1459. Access-Accept/
  1460. EAP-Message/EAP-Success
  1461. (other attributes)
  1462. <- EAP-Success
  1463. Aboba & Calhoun Informational [Page 37]
  1464. RFC 3579 RADIUS & EAP September 2003
  1465. In the case where the authenticating peer attempts to authenticate
  1466. the NAS, the conversation would appear as follows:
  1467. Authenticating peer NAS RADIUS Server
  1468. ------------------- --- -------------
  1469. EAP-Request/
  1470. Challenge, MD5 ->
  1471. RADIUS Access-Request/
  1472. EAP-Message/EAP-Request/
  1473. Challenge, MD5 ->
  1474. <- RADIUS
  1475. Access-Reject/
  1476. EAP-Message/
  1477. EAP-Response/
  1478. Nak (no alternative)
  1479. <- EAP-Response/Nak
  1480. (no alternative)
  1481. EAP-Failure ->
  1482. Aboba & Calhoun Informational [Page 38]
  1483. RFC 3579 RADIUS & EAP September 2003
  1484. In the case where an invalid EAP Response is inserted by an attacker,
  1485. the conversation would appear as follows:
  1486. Authenticating peer NAS RADIUS server
  1487. ------------------- --- -------------
  1488. <- EAP-Request/
  1489. EAP-Type=Foo
  1490. EAP-Response/
  1491. EAP-Type=Foo ->
  1492. RADIUS Access-Request/
  1493. EAP-Message/EAP-Response/
  1494. EAP-Type=Foo ->
  1495. <- RADIUS
  1496. Access-Challenge/
  1497. EAP-Message/EAP-Request/
  1498. EAP-Type=Foo
  1499. <- EAP-Request/
  1500. EAP-Type=Foo
  1501. Attacker spoof:
  1502. EAP-Response/
  1503. EAP-Type=Bar ->
  1504. Good guy:
  1505. EAP-Response/
  1506. EAP-Type=Foo ->
  1507. RADIUS Access-Request/
  1508. EAP-Message/EAP-Response/
  1509. EAP-Type=Bar ->
  1510. <- RADIUS
  1511. Access-Challenge/
  1512. EAP-Message/EAP-Request/
  1513. EAP-Type=Foo,
  1514. Error-Cause="Invalid EAP
  1515. Packet (Ignored)"
  1516. RADIUS Access-Request/
  1517. EAP-Message/EAP-Response/
  1518. EAP-Type=Foo ->
  1519. <- Access-Accept/
  1520. EAP-Message/Success
  1521. <- EAP Success
  1522. Aboba & Calhoun Informational [Page 39]
  1523. RFC 3579 RADIUS & EAP September 2003
  1524. In the case where the client fails EAP authentication, and an error
  1525. message is sent prior to disconnection, the conversation would appear
  1526. as follows:
  1527. Authenticating peer NAS RADIUS server
  1528. ------------------- --- -------------
  1529. RADIUS Access-Request/
  1530. EAP-Message/Start ->
  1531. <- RADIUS
  1532. Access-Challenge/
  1533. EAP-Message/EAP-Response/
  1534. Identity
  1535. <- EAP-Request/
  1536. Identity
  1537. EAP-Response/
  1538. Identity (MyID) ->
  1539. RADIUS Access-Request/
  1540. EAP-Message/EAP-Response/
  1541. (MyID) ->
  1542. <- RADIUS
  1543. Access-Challenge/
  1544. EAP-Message/EAP-Request
  1545. OTP/OTP Challenge
  1546. <- EAP-Request/
  1547. OTP/OTP Challenge
  1548. EAP-Response/
  1549. OTP, OTPpw ->
  1550. RADIUS Access-Request/
  1551. EAP-Message/EAP-Response/
  1552. OTP, OTPpw ->
  1553. <- RADIUS
  1554. Access-Challenge/
  1555. EAP-Message/EAP-Request/
  1556. Notification
  1557. <- EAP-Request/
  1558. Notification
  1559. EAP-Response/
  1560. Notification ->
  1561. RADIUS Access-Request/
  1562. EAP-Message/EAP-Response/
  1563. Notification ->
  1564. <- RADIUS
  1565. Access-Reject/
  1566. EAP-Message/EAP-Failure
  1567. <- EAP-Failure
  1568. (client disconnected)
  1569. Aboba & Calhoun Informational [Page 40]
  1570. RFC 3579 RADIUS & EAP September 2003
  1571. In the case that the RADIUS server or proxy does not support EAP-
  1572. Message, but no error message is sent, the conversation would appear
  1573. as follows:
  1574. Authenticating peer NAS RADIUS server
  1575. ------------------- --- -------------
  1576. RADIUS Access-Request/
  1577. EAP-Message/Start ->
  1578. <- RADIUS
  1579. Access-Reject
  1580. (User Disconnected)
  1581. In the case where the local RADIUS server does support EAP-Message, but
  1582. the remote RADIUS server does not, the conversation would appear as
  1583. follows:
  1584. Authenticating peer NAS RADIUS server
  1585. ------------------- --- -------------
  1586. RADIUS Access-Request/
  1587. EAP-Message/Start ->
  1588. <- RADIUS
  1589. Access-Challenge/
  1590. EAP-Message/
  1591. EAP-Response/
  1592. Identity
  1593. <- EAP-Request/
  1594. Identity
  1595. EAP-Response/
  1596. Identity
  1597. (MyID) ->
  1598. RADIUS Access-Request/
  1599. EAP-Message/EAP-Response/
  1600. (MyID) ->
  1601. <- RADIUS
  1602. Access-Reject
  1603. (proxied from remote
  1604. RADIUS server)
  1605. (User Disconnected)
  1606. Aboba & Calhoun Informational [Page 41]
  1607. RFC 3579 RADIUS & EAP September 2003
  1608. In the case where PPP is the link and the authenticating peer does
  1609. not support EAP, but where EAP is required for that user, the
  1610. conversation would appear as follows:
  1611. Authenticating peer NAS RADIUS server
  1612. ------------------- --- -------------
  1613. <- PPP LCP Request-EAP
  1614. auth
  1615. PPP LCP NAK-EAP
  1616. auth ->
  1617. <- PPP LCP Request-CHAP
  1618. auth
  1619. PPP LCP ACK-CHAP
  1620. auth ->
  1621. <- PPP CHAP Challenge
  1622. PPP CHAP Response ->
  1623. RADIUS Access-Request/
  1624. User-Name,
  1625. CHAP-Password ->
  1626. <- RADIUS
  1627. Access-Reject
  1628. <- PPP LCP Terminate
  1629. (User Disconnected)
  1630. In the case where PPP is the link, the NAS does not support EAP, but
  1631. where EAP is required for that user, the conversation would appear as
  1632. follows:
  1633. Authenticating peer NAS RADIUS server
  1634. ------------------- --- -------------
  1635. <- PPP LCP Request-CHAP
  1636. auth
  1637. PP LCP ACK-CHAP
  1638. auth ->
  1639. <- PPP CHAP Challenge
  1640. PPP CHAP Response ->
  1641. RADIUS Access-Request/
  1642. User-Name,
  1643. CHAP-Password ->
  1644. <- RADIUS
  1645. Access-Reject
  1646. <- PPP LCP Terminate
  1647. (User Disconnected)
  1648. Aboba & Calhoun Informational [Page 42]
  1649. RFC 3579 RADIUS & EAP September 2003
  1650. Appendix B - Change Log
  1651. The following changes have been made from RFC 2869:
  1652. A NAS may simultaneously support both local authentication and
  1653. pass-through; once the NAS enters pass-through mode within a session,
  1654. it cannot revert back to local authentication. Also EAP is
  1655. explicitly described as a 'lock step' protocol. (Section 2).
  1656. The NAS may initiate with an EAP-Request for an authentication Type.
  1657. If the Request is NAK'd, the NAS should send an initial
  1658. Access-Request with an EAP-Message attribute containing an
  1659. EAP-Response/Nak.
  1660. The RADIUS server may treat an invalid EAP Response as a non-fatal
  1661. error (Section 2.2)
  1662. For use with RADIUS/EAP, the Password-Retry (Section 2.3) and
  1663. Reply-Message (2.6.5) attributes are deprecated.
  1664. Each EAP session has a unique Identifier space (Section 2.6.1).
  1665. Role reversal is not supported (Section 2.6.2).
  1666. Message combinations (e.g. Access-Accept/EAP-Failure) that conflict
  1667. are discouraged (Section 2.6.3).
  1668. Only a single EAP packet may be encapsulated within a RADIUS message
  1669. (Section 3.1).
  1670. An Access-Request lacking explicit authentication as well as a
  1671. Message- Authenticator attribute SHOULD be silently discarded
  1672. (Section 3.3).
  1673. The Originating-Line-Info attribute is supported (Section 3.3).
  1674. IPsec ESP with non-null transform SHOULD be used and the usage model
  1675. is described in detail (Section 4.2).
  1676. Additional discussion of security vulnerabilities (Section 4.1) and
  1677. potential fixes (Section 4.3).
  1678. Separated normative (Section 6.1) and informative (Section 6.2)
  1679. references.
  1680. Aboba & Calhoun Informational [Page 43]
  1681. RFC 3579 RADIUS & EAP September 2003
  1682. Added additional examples (Appendix A): a NAS initiating with an
  1683. EAP-Request for an authentication Type; attempted role reversal.
  1684. Intellectual Property Statement
  1685. The IETF takes no position regarding the validity or scope of any
  1686. intellectual property or other rights that might be claimed to
  1687. pertain to the implementation or use of the technology described in
  1688. this document or the extent to which any license under such rights
  1689. might or might not be available; neither does it represent that it
  1690. has made any effort to identify any such rights. Information on the
  1691. IETF's procedures with respect to rights in standards-track and
  1692. standards-related documentation can be found in BCP-11. Copies of
  1693. claims of rights made available for publication and any assurances of
  1694. licenses to be made available, or the result of an attempt made to
  1695. obtain a general license or permission for the use of such
  1696. proprietary rights by implementors or users of this specification can
  1697. be obtained from the IETF Secretariat.
  1698. The IETF invites any interested party to bring to its attention any
  1699. copyrights, patents or patent applications, or other proprietary
  1700. rights which may cover technology that may be required to practice
  1701. this standard. Please address the information to the IETF Executive
  1702. Director.
  1703. Acknowledgments
  1704. Thanks to Dave Dawson and Karl Fox of Ascend, Glen Zorn of Cisco
  1705. Systems, Jari Arkko of Ericsson and Ashwin Palekar, Tim Moore and
  1706. Narendra Gidwani of Microsoft for useful discussions of this problem
  1707. space. The authors would also like to acknowledge Tony Jeffree,
  1708. Chair of IEEE 802.1 for his assistance in resolving RADIUS/EAP issues
  1709. in IEEE 802.1X-2001.
  1710. Aboba & Calhoun Informational [Page 44]
  1711. RFC 3579 RADIUS & EAP September 2003
  1712. Authors' Addresses
  1713. Bernard Aboba
  1714. Microsoft Corporation
  1715. One Microsoft Way
  1716. Redmond, WA 98052
  1717. Phone: +1 425 706 6605
  1718. Fax: +1 425 936 7329
  1719. EMail: bernarda@microsoft.com
  1720. Pat R. Calhoun
  1721. Airespace
  1722. 110 Nortech Parkway
  1723. San Jose, California, 95134
  1724. USA
  1725. Phone: +1 408 635 2023
  1726. Fax: +1 408 635 2020
  1727. EMail: pcalhoun@airespace.com
  1728. Aboba & Calhoun Informational [Page 45]
  1729. RFC 3579 RADIUS & EAP September 2003
  1730. Full Copyright Statement
  1731. Copyright (C) The Internet Society (2003). All Rights Reserved.
  1732. This document and translations of it may be copied and furnished to
  1733. others, and derivative works that comment on or otherwise explain it
  1734. or assist in its implementation may be prepared, copied, published
  1735. and distributed, in whole or in part, without restriction of any
  1736. kind, provided that the above copyright notice and this paragraph are
  1737. included on all such copies and derivative works. However, this
  1738. document itself may not be modified in any way, such as by removing
  1739. the copyright notice or references to the Internet Society or other
  1740. Internet organizations, except as needed for the purpose of
  1741. developing Internet standards in which case the procedures for
  1742. copyrights defined in the Internet Standards process must be
  1743. followed, or as required to translate it into languages other than
  1744. English.
  1745. The limited permissions granted above are perpetual and will not be
  1746. revoked by the Internet Society or its successors or assignees.
  1747. This document and the information contained herein is provided on an
  1748. "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
  1749. TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
  1750. BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
  1751. HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
  1752. MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
  1753. Acknowledgement
  1754. Funding for the RFC Editor function is currently provided by the
  1755. Internet Society.
  1756. Aboba & Calhoun Informational [Page 46]