Way to verify RADIUS status-server of proxy server over RadSec / TLS

Bjørn Mork bjorn at mork.no
Fri May 9 15:14:09 UTC 2025


Alan DeKok <aland at deployingradius.com> writes:

>> To be honest, I let this interpret by an AI and this is what the AI
>> told me: "You’re trying to receive UDP packets on port 11812 and send
>> them via TLS/TCP using socat. That conceptually makes sense — it’s
>> what RADIUS-over-TLS (RadSec) does — but unfortunately, RADIUS over
>> TLS is not just “UDP in TLS over TCP”. RadSec uses a specific
>> framing: each RADIUS packet must be prefixed with a 2-byte length
>> field when encapsulated over TCP/TLS (per RFC 6614).“
>
>   Please don't use AI for this kind of thing.  It's garbage, and it
>   lies to you.  It's *worse* than doing nothing.

Funny.  Wonder if the AI confused RADIUS over TLS with DNS over TCP?
Almost the same, I guess.  At least for "intelligence" based on simple
extrapolation.  If you know how one UDP based protocol translates to a
stream, then you can guess how all other UDP based protocols translates
to streams.


Bjørn


More information about the Freeradius-Users mailing list