Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements

2015-07-17 Thread Heikki Vatiainen
On 16.7.2015 17.04, Nick Lowe wrote:

> In conjunction with https://tools.ietf.org/html/rfc7465 , it is
> probably time for RADIUS servers to comply with this by default unless
> explicitly configured otherwise:

Thanks for the RC4 reminder Nick.

This configuration is now possible with Radiator. It's hard to say how 
the EAP clients use crypto, so the default settings still allow RC4. 
However, the Radiator default settings do not allow export and weak 
ciphers, which are still part of the default ciphersuite set in many 
currently used OSes.

The configuration examples in goodies and reference manual have this as 
an example of cipher spec: DEFAULT:!EXPORT:!LOW:!RC4

I'd say this would comply with RFC 7465 requirements.

> "o TLS servers MUST NOT select an RC4 cipher suite when a TLS client
> sends such a cipher suite in the ClientHello message.
>   o If the TLS client only offers RC4 cipher suites, the TLS server
> MUST terminate the handshake.  The TLS server MAY send the
> insufficient_security fatal alert in this case."

There are also other sources with valuable information, one of which is 
Mozilla's guide:
https://wiki.mozilla.org/Security/Server_Side_TLS

The list members may want to take a look at this document if they plan 
to experiment with TLS versions and ciphersuites.

Thanks,
Heikki

-- 
Heikki Vatiainen 

Radiator: the most portable, flexible and configurable RADIUS server
anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS,
TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS, 
NetWare etc.
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator


Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements

2015-07-17 Thread Heikki Vatiainen
On 16.7.2015 18.10, Hartmaier Alexander wrote:
> On 2015-07-16 15:07, Heikki Vatiainen wrote:

>> There's also an example of how to use a custom module, possibly modified
>> from Radius/LogFormat.pm, to change the formatting or add new formats.
> I know because I was the one who requested the feature and wrote the Log
> module before you added the hook ;)

Yes, this was more for the other list members :)

> Yes I know. What I'd like to have is a way to *log* the actual chosen
> cipher per EAP-TLS connection, ideally in the AuthLog file.

That's probably fairly simple to log. Not sure how to get it authlog, 
though. I'll see what can be done for this and get back to you when I 
know more. Maybe the TLS version should be available too and visible in 
the debug logs.

Thanks for the suggestion.
Heikki

-- 
Heikki Vatiainen 

Radiator: the most portable, flexible and configurable RADIUS server
anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS,
TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS, 
NetWare etc.
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator


Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements

2015-07-16 Thread Hartmaier Alexander
On 2015-07-16 15:07, Heikki Vatiainen wrote:
> On 16.7.2015 13.42, Hartmaier Alexander wrote:
>
>> I couldn't find info about CEF and JSON logging in the reference manual,
>> should be included at least as keywords with a pointer to the
>> 'logformat.cfg' goodies file although I'd prefer having it in the main docs.
> Good point. I'll see that CEF and JSON will be mentioned in ref.pdf
>
> The configuration sample file 'logformat.cfg' is mentioned where
> LogFormatHook for Log FILE and AuthLog FILE are described. It's also
> mentioned where AcctLogFileFormatHook for accounting messages is described.
>
> The configuration sample shows how to use the new module
> Radius/LogFormat.pm. This module includes CEF and JSON authentication
> log formatting and JSON accounting log formatting.
>
> There's also an example of how to use a custom module, possibly modified
> from Radius/LogFormat.pm, to change the formatting or add new formats.
I know because I was the one who requested the feature and wrote the Log
module before you added the hook ;)

>
>> Is there a way to log the used TLS version and cipher to find out which
>> ones are in use before restricting it with the new EAPTLS_Protocols and
>> EAPTLS_Ciphers config options?
> I think the ciphers are the ones that can be listed with 'openssl
> ciphers -v' these depend on the SSL/TLS library. Older OpenSSL versions
> seem to have quite different set of ciphers than the most recent
> LibreSSL for example.
>
> In other words the ciphers could be listed by radiusd, but you can also
> see them from the command line. Also, new DEBUG level log message was
> added to show which Net::SSLeay version and SSL/TLS libary is used to
> make sure radiusd uses what you expect it to.
>
> The protocols also depend on what's compiled in the SSL/TLS library. I
> think the recent LibreSSLs do not have SSLv3 support anymore. Are you
> thinking about printing the available SSL/TLS versions before
> restricting them? Note that for TLS based EAPs, TLSv1 is the minimum so
> SSLv3 is not possible which means what you can use is TLSv1 or better.
Yes I know. What I'd like to have is a way to *log* the actual chosen
cipher per EAP-TLS connection, ideally in the AuthLog file.

>
> Thanks,
> Heikki
>
Cheers, Alex


*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*
T-Systems Austria GesmbH Rennweg 97-99, 1030 Wien
Handelsgericht Wien, FN 79340b
*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*
Notice: This e-mail contains information that is confidential and may be 
privileged.
If you are not the intended recipient, please notify the sender and then
delete this e-mail immediately.
*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator


Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements

2015-07-16 Thread Nick Lowe
RC4 is particularly broken now:

https://www.rc4nomore.com
https://www.rc4nomore.com/vanhoef-usenix2015.pdf

In conjunction with https://tools.ietf.org/html/rfc7465 , it is
probably time for RADIUS servers to comply with this by default unless
explicitly configured otherwise:

"o TLS servers MUST NOT select an RC4 cipher suite when a TLS client
sends such a cipher suite in the ClientHello message.
 o If the TLS client only offers RC4 cipher suites, the TLS server
MUST terminate the handshake.  The TLS server MAY send the
insufficient_security fatal alert in this case."
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator


Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements

2015-07-16 Thread Heikki Vatiainen
On 16.7.2015 13.42, Hartmaier Alexander wrote:

> I couldn't find info about CEF and JSON logging in the reference manual,
> should be included at least as keywords with a pointer to the
> 'logformat.cfg' goodies file although I'd prefer having it in the main docs.

Good point. I'll see that CEF and JSON will be mentioned in ref.pdf

The configuration sample file 'logformat.cfg' is mentioned where 
LogFormatHook for Log FILE and AuthLog FILE are described. It's also 
mentioned where AcctLogFileFormatHook for accounting messages is described.

The configuration sample shows how to use the new module 
Radius/LogFormat.pm. This module includes CEF and JSON authentication 
log formatting and JSON accounting log formatting.

There's also an example of how to use a custom module, possibly modified 
from Radius/LogFormat.pm, to change the formatting or add new formats.

> Is there a way to log the used TLS version and cipher to find out which
> ones are in use before restricting it with the new EAPTLS_Protocols and
> EAPTLS_Ciphers config options?

I think the ciphers are the ones that can be listed with 'openssl 
ciphers -v' these depend on the SSL/TLS library. Older OpenSSL versions 
seem to have quite different set of ciphers than the most recent 
LibreSSL for example.

In other words the ciphers could be listed by radiusd, but you can also 
see them from the command line. Also, new DEBUG level log message was 
added to show which Net::SSLeay version and SSL/TLS libary is used to 
make sure radiusd uses what you expect it to.

The protocols also depend on what's compiled in the SSL/TLS library. I 
think the recent LibreSSLs do not have SSLv3 support anymore. Are you 
thinking about printing the available SSL/TLS versions before 
restricting them? Note that for TLS based EAPs, TLSv1 is the minimum so 
SSLv3 is not possible which means what you can use is TLSv1 or better.

Thanks,
Heikki

-- 
Heikki Vatiainen 

Radiator: the most portable, flexible and configurable RADIUS server
anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS,
TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS, 
NetWare etc.
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator


Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements

2015-07-16 Thread Hartmaier Alexander
Hi Heikki,
that's a great release!

I couldn't find info about CEF and JSON logging in the reference manual,
should be included at least as keywords with a pointer to the
'logformat.cfg' goodies file although I'd prefer having it in the main docs.

Is there a way to log the used TLS version and cipher to find out which
ones are in use before restricting it with the new EAPTLS_Protocols and
EAPTLS_Ciphers config options?

Best regards, Alex

On 2015-07-15 14:40, Heikki Vatiainen wrote:
> We are pleased to announce the release of Radiator version 4.15
>
> This version contains fixes for an EAP-MSCHAP-V2 and EAP-pwd
> vulnerability. Upgrade is recommended. Please review OSC security
> advisory OSC-SEC-2015-01 for more information:
> https://www.open.com.au/OSC-SEC-2015-01.html
>
> As usual, the new version is available to current licensees from:
> https://www.open.com.au/radiator/downloads/
>
> and to current evaluators from:
> https://www.open.com.au/radiator/demo-downloads
>
> Licensees with expired access contracts can renew at:
> https://www.open.com.au/renewal.html
>
> An extract from the history file
> https://www.open.com.au/radiator/history.html is below:
>
> -
>
> Revision 4.15 (2015-07-15)
>
>   Selected fixes, compatibility notes and enhancements
>
> Fixes an EAP-MSCHAP-V2 and EAP-pwd vulnerability.
> OSC recommends all users to review OSC security advisory
> OSC-SEC-2015-01 to see if they are affected.
> https://www.open.com.au/OSC-SEC-2015-01.html
>
> perl-ldap-0.32 or better is required. Should be available in all current
> systems.
>
> EAP-pwd requires Crypt::OpenSSL::Bignum 0.06 or later from CPAN
>
> Configurable TLS version and ciphersuite selection for TLS based EAP and
> stream modules
>
> CRL checks for the entire certificate chain can now be enabled
>
> Included Gossip framework with Redis based implementation
>
> Support for Gossip when communicating next hop proxy failures between
> Radiator instances
>
> Shared duplicate cache for a more simple server farm configuration
>
> Windows Event log support
>
> Custom format support for logs, authentication logs and accounting logs.
> CEF and JSON included
>
> Support for IEEE 802.1AE, also known as MACsec
>
> All AuthBys now support PostAuthHooks
>
> Various binary modules are now available from OSC and were removed from
> the Radiator distribution
>
>
>
>   Detailed changes
>
> Added VENDOR STI (Server Technology Inc.) 1718 and multiple STI VSAs to
> dictionary. Contributed by Garry Shtern.
>
> Added VENDOR PacketDesign 8083 and VSAs PacketDesign-UserClass and
> PacketDesign-FTP to dictionary. Contributed by Garry Shtern.
>
> Added SN-Software-Version to dictionary. Reported by Bruno Tiago Rodrigues.
>
> Changed type of VENDORATTR 3076 Cisco-VPN-DHCP-Network-Scope in
> dictionary.cisco-vpn from text to ipaddr. Reported by Kilian Krause.
>
> Dictionary updates: Added H3C proprietary values H3C-SSH and H3C-Console
> for Login-Service. Changed Lancom LCS-Mac-Address type from string to
> hexadecimal. Added H3C-Priority. All reported by Philip Herbert.
>
> Zero length writes are now skipped in Stream.pm write_pending() used by
> RadSec, Diameter, SIGTRAN and other stream protocols. SCTP does not
> support 0 length syswrites on all platforms and may close the socket if
> zero length write is done.
>
> Added VENDOR Airespace 14179 VSAs 7-11 and 13-16 to dictionary.
>
> AuthBy GROUP now updates current AuthBy for %{AuthBy:parmname}. When
> AuthBy GROUP is used, this special formatting now gets the parameter
> value from the current AuthBy within the group instead of the AuthBy
> GROUP itself.
>
> Updated VENDOR 1991 Foundry VSAs in dictionary. foundry-privilege-level
> is now a synonym for brocade-privilege-level. Added a number of foundry
> VSAs.
>
> LDAP Version now defaults to 3 instead of 2. Updated a number of LDAP
> configuration example files in goodies to reflect this change.
>
> Ldap.pm now uses the LDAP object's disconnect method, instead of closing
> the socket directly.
>
> AuthBy LDAP2 and AuthBy LDAPDIGIPASS now use escape_filter_value
> provided by Net::LDAP::Util instead of escapeLdapLiteral in Ldap.pm
> Ldap.pm escapeLdapLiteral is now deprecacted and perl-ldap-0.32 or
> better is required.
>
> RefreshPeriod in ClientListSQL and ClientListLDAP now support special %
> formatting. Suggested by Bengi Sağlam.
>
> Updated VENDOR 2011 Huawei VSAs in dictionary. Huawei-Input-Basic-Rate
> is now an alias for Huawei-Input-Peak-Rate. Huawei-Output-Basic-Rate was
> changed similarly. Some of the attribute numbers appear to have
> different names and types between different devices. Huawei-User-Type,
> Huawei-MIP-Agent-MN-Flag and Huawei-Requested-APN are now aliases but
> aliasing may be handled with separate dictionary files in the future.
> Huawei-HW-Portal-Mode was renamed to Huawei-Portal-Mode.
>
> WiMAX dictionary updates: changed WiMAX-Session-Termination-Capability
> type to integer and added one va

[RADIATOR] Radiator Version 4.15 released - security fixes and enhancements

2015-07-15 Thread Heikki Vatiainen
We are pleased to announce the release of Radiator version 4.15

This version contains fixes for an EAP-MSCHAP-V2 and EAP-pwd
vulnerability. Upgrade is recommended. Please review OSC security
advisory OSC-SEC-2015-01 for more information:
https://www.open.com.au/OSC-SEC-2015-01.html

As usual, the new version is available to current licensees from:
https://www.open.com.au/radiator/downloads/

and to current evaluators from:
https://www.open.com.au/radiator/demo-downloads

Licensees with expired access contracts can renew at:
https://www.open.com.au/renewal.html

An extract from the history file
https://www.open.com.au/radiator/history.html is below:

-

Revision 4.15 (2015-07-15)

 Selected fixes, compatibility notes and enhancements

Fixes an EAP-MSCHAP-V2 and EAP-pwd vulnerability.
OSC recommends all users to review OSC security advisory
OSC-SEC-2015-01 to see if they are affected.
https://www.open.com.au/OSC-SEC-2015-01.html

perl-ldap-0.32 or better is required. Should be available in all current
systems.

EAP-pwd requires Crypt::OpenSSL::Bignum 0.06 or later from CPAN

Configurable TLS version and ciphersuite selection for TLS based EAP and
stream modules

CRL checks for the entire certificate chain can now be enabled

Included Gossip framework with Redis based implementation

Support for Gossip when communicating next hop proxy failures between
Radiator instances

Shared duplicate cache for a more simple server farm configuration

Windows Event log support

Custom format support for logs, authentication logs and accounting logs.
CEF and JSON included

Support for IEEE 802.1AE, also known as MACsec

All AuthBys now support PostAuthHooks

Various binary modules are now available from OSC and were removed from
the Radiator distribution



 Detailed changes

Added VENDOR STI (Server Technology Inc.) 1718 and multiple STI VSAs to
dictionary. Contributed by Garry Shtern.

Added VENDOR PacketDesign 8083 and VSAs PacketDesign-UserClass and
PacketDesign-FTP to dictionary. Contributed by Garry Shtern.

Added SN-Software-Version to dictionary. Reported by Bruno Tiago Rodrigues.

Changed type of VENDORATTR 3076 Cisco-VPN-DHCP-Network-Scope in
dictionary.cisco-vpn from text to ipaddr. Reported by Kilian Krause.

Dictionary updates: Added H3C proprietary values H3C-SSH and H3C-Console
for Login-Service. Changed Lancom LCS-Mac-Address type from string to
hexadecimal. Added H3C-Priority. All reported by Philip Herbert.

Zero length writes are now skipped in Stream.pm write_pending() used by
RadSec, Diameter, SIGTRAN and other stream protocols. SCTP does not
support 0 length syswrites on all platforms and may close the socket if
zero length write is done.

Added VENDOR Airespace 14179 VSAs 7-11 and 13-16 to dictionary.

AuthBy GROUP now updates current AuthBy for %{AuthBy:parmname}. When
AuthBy GROUP is used, this special formatting now gets the parameter
value from the current AuthBy within the group instead of the AuthBy
GROUP itself.

Updated VENDOR 1991 Foundry VSAs in dictionary. foundry-privilege-level
is now a synonym for brocade-privilege-level. Added a number of foundry
VSAs.

LDAP Version now defaults to 3 instead of 2. Updated a number of LDAP
configuration example files in goodies to reflect this change.

Ldap.pm now uses the LDAP object's disconnect method, instead of closing
the socket directly.

AuthBy LDAP2 and AuthBy LDAPDIGIPASS now use escape_filter_value
provided by Net::LDAP::Util instead of escapeLdapLiteral in Ldap.pm
Ldap.pm escapeLdapLiteral is now deprecacted and perl-ldap-0.32 or
better is required.

RefreshPeriod in ClientListSQL and ClientListLDAP now support special %
formatting. Suggested by Bengi Sağlam.

Updated VENDOR 2011 Huawei VSAs in dictionary. Huawei-Input-Basic-Rate
is now an alias for Huawei-Input-Peak-Rate. Huawei-Output-Basic-Rate was
changed similarly. Some of the attribute numbers appear to have
different names and types between different devices. Huawei-User-Type,
Huawei-MIP-Agent-MN-Flag and Huawei-Requested-APN are now aliases but
aliasing may be handled with separate dictionary files in the future.
Huawei-HW-Portal-Mode was renamed to Huawei-Portal-Mode.

WiMAX dictionary updates: changed WiMAX-Session-Termination-Capability
type to integer and added one value: Dynamic-Authorization. Changed
WiMAX-PPAQ TLV Quota-Identifier type to binary. WiMAX subattributes
within single Vendor-Specific attribute are now correctly decoded.

Dictionary updates for Huawei: Reverted the recent aliasing changes. The
conflicting attributes are now in a new Huawei specific dictionary file
goodies/dictionary.huawei1. This new dictionary file contains attributes
used by, for example, Huawei packet gateway / Wi-Fi controller. Since
Huawei seems to use device specific dictionaries, additional dictionary
files are added as needed.

Added new AuthLog EVENTLOG and Log EVENTLOG modules for logging to
Windows Event Log. Added eventlog.cfg in goodies for configura