Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements
On 16.7.2015 17.04, Nick Lowe wrote: > In conjunction with https://tools.ietf.org/html/rfc7465 , it is > probably time for RADIUS servers to comply with this by default unless > explicitly configured otherwise: Thanks for the RC4 reminder Nick. This configuration is now possible with Radiator. It's hard to say how the EAP clients use crypto, so the default settings still allow RC4. However, the Radiator default settings do not allow export and weak ciphers, which are still part of the default ciphersuite set in many currently used OSes. The configuration examples in goodies and reference manual have this as an example of cipher spec: DEFAULT:!EXPORT:!LOW:!RC4 I'd say this would comply with RFC 7465 requirements. > "o TLS servers MUST NOT select an RC4 cipher suite when a TLS client > sends such a cipher suite in the ClientHello message. > o If the TLS client only offers RC4 cipher suites, the TLS server > MUST terminate the handshake. The TLS server MAY send the > insufficient_security fatal alert in this case." There are also other sources with valuable information, one of which is Mozilla's guide: https://wiki.mozilla.org/Security/Server_Side_TLS The list members may want to take a look at this document if they plan to experiment with TLS versions and ciphersuites. Thanks, Heikki -- Heikki Vatiainen Radiator: the most portable, flexible and configurable RADIUS server anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald, Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS, TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP, DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS, NetWare etc. ___ radiator mailing list radiator@open.com.au http://www.open.com.au/mailman/listinfo/radiator
Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements
On 16.7.2015 18.10, Hartmaier Alexander wrote: > On 2015-07-16 15:07, Heikki Vatiainen wrote: >> There's also an example of how to use a custom module, possibly modified >> from Radius/LogFormat.pm, to change the formatting or add new formats. > I know because I was the one who requested the feature and wrote the Log > module before you added the hook ;) Yes, this was more for the other list members :) > Yes I know. What I'd like to have is a way to *log* the actual chosen > cipher per EAP-TLS connection, ideally in the AuthLog file. That's probably fairly simple to log. Not sure how to get it authlog, though. I'll see what can be done for this and get back to you when I know more. Maybe the TLS version should be available too and visible in the debug logs. Thanks for the suggestion. Heikki -- Heikki Vatiainen Radiator: the most portable, flexible and configurable RADIUS server anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald, Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS, TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP, DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS, NetWare etc. ___ radiator mailing list radiator@open.com.au http://www.open.com.au/mailman/listinfo/radiator
Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements
On 2015-07-16 15:07, Heikki Vatiainen wrote: > On 16.7.2015 13.42, Hartmaier Alexander wrote: > >> I couldn't find info about CEF and JSON logging in the reference manual, >> should be included at least as keywords with a pointer to the >> 'logformat.cfg' goodies file although I'd prefer having it in the main docs. > Good point. I'll see that CEF and JSON will be mentioned in ref.pdf > > The configuration sample file 'logformat.cfg' is mentioned where > LogFormatHook for Log FILE and AuthLog FILE are described. It's also > mentioned where AcctLogFileFormatHook for accounting messages is described. > > The configuration sample shows how to use the new module > Radius/LogFormat.pm. This module includes CEF and JSON authentication > log formatting and JSON accounting log formatting. > > There's also an example of how to use a custom module, possibly modified > from Radius/LogFormat.pm, to change the formatting or add new formats. I know because I was the one who requested the feature and wrote the Log module before you added the hook ;) > >> Is there a way to log the used TLS version and cipher to find out which >> ones are in use before restricting it with the new EAPTLS_Protocols and >> EAPTLS_Ciphers config options? > I think the ciphers are the ones that can be listed with 'openssl > ciphers -v' these depend on the SSL/TLS library. Older OpenSSL versions > seem to have quite different set of ciphers than the most recent > LibreSSL for example. > > In other words the ciphers could be listed by radiusd, but you can also > see them from the command line. Also, new DEBUG level log message was > added to show which Net::SSLeay version and SSL/TLS libary is used to > make sure radiusd uses what you expect it to. > > The protocols also depend on what's compiled in the SSL/TLS library. I > think the recent LibreSSLs do not have SSLv3 support anymore. Are you > thinking about printing the available SSL/TLS versions before > restricting them? Note that for TLS based EAPs, TLSv1 is the minimum so > SSLv3 is not possible which means what you can use is TLSv1 or better. Yes I know. What I'd like to have is a way to *log* the actual chosen cipher per EAP-TLS connection, ideally in the AuthLog file. > > Thanks, > Heikki > Cheers, Alex *"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"* T-Systems Austria GesmbH Rennweg 97-99, 1030 Wien Handelsgericht Wien, FN 79340b *"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"* Notice: This e-mail contains information that is confidential and may be privileged. If you are not the intended recipient, please notify the sender and then delete this e-mail immediately. *"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"*"* ___ radiator mailing list radiator@open.com.au http://www.open.com.au/mailman/listinfo/radiator
Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements
RC4 is particularly broken now: https://www.rc4nomore.com https://www.rc4nomore.com/vanhoef-usenix2015.pdf In conjunction with https://tools.ietf.org/html/rfc7465 , it is probably time for RADIUS servers to comply with this by default unless explicitly configured otherwise: "o TLS servers MUST NOT select an RC4 cipher suite when a TLS client sends such a cipher suite in the ClientHello message. o If the TLS client only offers RC4 cipher suites, the TLS server MUST terminate the handshake. The TLS server MAY send the insufficient_security fatal alert in this case." ___ radiator mailing list radiator@open.com.au http://www.open.com.au/mailman/listinfo/radiator
Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements
On 16.7.2015 13.42, Hartmaier Alexander wrote: > I couldn't find info about CEF and JSON logging in the reference manual, > should be included at least as keywords with a pointer to the > 'logformat.cfg' goodies file although I'd prefer having it in the main docs. Good point. I'll see that CEF and JSON will be mentioned in ref.pdf The configuration sample file 'logformat.cfg' is mentioned where LogFormatHook for Log FILE and AuthLog FILE are described. It's also mentioned where AcctLogFileFormatHook for accounting messages is described. The configuration sample shows how to use the new module Radius/LogFormat.pm. This module includes CEF and JSON authentication log formatting and JSON accounting log formatting. There's also an example of how to use a custom module, possibly modified from Radius/LogFormat.pm, to change the formatting or add new formats. > Is there a way to log the used TLS version and cipher to find out which > ones are in use before restricting it with the new EAPTLS_Protocols and > EAPTLS_Ciphers config options? I think the ciphers are the ones that can be listed with 'openssl ciphers -v' these depend on the SSL/TLS library. Older OpenSSL versions seem to have quite different set of ciphers than the most recent LibreSSL for example. In other words the ciphers could be listed by radiusd, but you can also see them from the command line. Also, new DEBUG level log message was added to show which Net::SSLeay version and SSL/TLS libary is used to make sure radiusd uses what you expect it to. The protocols also depend on what's compiled in the SSL/TLS library. I think the recent LibreSSLs do not have SSLv3 support anymore. Are you thinking about printing the available SSL/TLS versions before restricting them? Note that for TLS based EAPs, TLSv1 is the minimum so SSLv3 is not possible which means what you can use is TLSv1 or better. Thanks, Heikki -- Heikki Vatiainen Radiator: the most portable, flexible and configurable RADIUS server anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald, Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS, TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP, DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS, NetWare etc. ___ radiator mailing list radiator@open.com.au http://www.open.com.au/mailman/listinfo/radiator
Re: [RADIATOR] Radiator Version 4.15 released - security fixes and enhancements
Hi Heikki, that's a great release! I couldn't find info about CEF and JSON logging in the reference manual, should be included at least as keywords with a pointer to the 'logformat.cfg' goodies file although I'd prefer having it in the main docs. Is there a way to log the used TLS version and cipher to find out which ones are in use before restricting it with the new EAPTLS_Protocols and EAPTLS_Ciphers config options? Best regards, Alex On 2015-07-15 14:40, Heikki Vatiainen wrote: > We are pleased to announce the release of Radiator version 4.15 > > This version contains fixes for an EAP-MSCHAP-V2 and EAP-pwd > vulnerability. Upgrade is recommended. Please review OSC security > advisory OSC-SEC-2015-01 for more information: > https://www.open.com.au/OSC-SEC-2015-01.html > > As usual, the new version is available to current licensees from: > https://www.open.com.au/radiator/downloads/ > > and to current evaluators from: > https://www.open.com.au/radiator/demo-downloads > > Licensees with expired access contracts can renew at: > https://www.open.com.au/renewal.html > > An extract from the history file > https://www.open.com.au/radiator/history.html is below: > > - > > Revision 4.15 (2015-07-15) > > Selected fixes, compatibility notes and enhancements > > Fixes an EAP-MSCHAP-V2 and EAP-pwd vulnerability. > OSC recommends all users to review OSC security advisory > OSC-SEC-2015-01 to see if they are affected. > https://www.open.com.au/OSC-SEC-2015-01.html > > perl-ldap-0.32 or better is required. Should be available in all current > systems. > > EAP-pwd requires Crypt::OpenSSL::Bignum 0.06 or later from CPAN > > Configurable TLS version and ciphersuite selection for TLS based EAP and > stream modules > > CRL checks for the entire certificate chain can now be enabled > > Included Gossip framework with Redis based implementation > > Support for Gossip when communicating next hop proxy failures between > Radiator instances > > Shared duplicate cache for a more simple server farm configuration > > Windows Event log support > > Custom format support for logs, authentication logs and accounting logs. > CEF and JSON included > > Support for IEEE 802.1AE, also known as MACsec > > All AuthBys now support PostAuthHooks > > Various binary modules are now available from OSC and were removed from > the Radiator distribution > > > > Detailed changes > > Added VENDOR STI (Server Technology Inc.) 1718 and multiple STI VSAs to > dictionary. Contributed by Garry Shtern. > > Added VENDOR PacketDesign 8083 and VSAs PacketDesign-UserClass and > PacketDesign-FTP to dictionary. Contributed by Garry Shtern. > > Added SN-Software-Version to dictionary. Reported by Bruno Tiago Rodrigues. > > Changed type of VENDORATTR 3076 Cisco-VPN-DHCP-Network-Scope in > dictionary.cisco-vpn from text to ipaddr. Reported by Kilian Krause. > > Dictionary updates: Added H3C proprietary values H3C-SSH and H3C-Console > for Login-Service. Changed Lancom LCS-Mac-Address type from string to > hexadecimal. Added H3C-Priority. All reported by Philip Herbert. > > Zero length writes are now skipped in Stream.pm write_pending() used by > RadSec, Diameter, SIGTRAN and other stream protocols. SCTP does not > support 0 length syswrites on all platforms and may close the socket if > zero length write is done. > > Added VENDOR Airespace 14179 VSAs 7-11 and 13-16 to dictionary. > > AuthBy GROUP now updates current AuthBy for %{AuthBy:parmname}. When > AuthBy GROUP is used, this special formatting now gets the parameter > value from the current AuthBy within the group instead of the AuthBy > GROUP itself. > > Updated VENDOR 1991 Foundry VSAs in dictionary. foundry-privilege-level > is now a synonym for brocade-privilege-level. Added a number of foundry > VSAs. > > LDAP Version now defaults to 3 instead of 2. Updated a number of LDAP > configuration example files in goodies to reflect this change. > > Ldap.pm now uses the LDAP object's disconnect method, instead of closing > the socket directly. > > AuthBy LDAP2 and AuthBy LDAPDIGIPASS now use escape_filter_value > provided by Net::LDAP::Util instead of escapeLdapLiteral in Ldap.pm > Ldap.pm escapeLdapLiteral is now deprecacted and perl-ldap-0.32 or > better is required. > > RefreshPeriod in ClientListSQL and ClientListLDAP now support special % > formatting. Suggested by Bengi Sağlam. > > Updated VENDOR 2011 Huawei VSAs in dictionary. Huawei-Input-Basic-Rate > is now an alias for Huawei-Input-Peak-Rate. Huawei-Output-Basic-Rate was > changed similarly. Some of the attribute numbers appear to have > different names and types between different devices. Huawei-User-Type, > Huawei-MIP-Agent-MN-Flag and Huawei-Requested-APN are now aliases but > aliasing may be handled with separate dictionary files in the future. > Huawei-HW-Portal-Mode was renamed to Huawei-Portal-Mode. > > WiMAX dictionary updates: changed WiMAX-Session-Termination-Capability > type to integer and added one va
[RADIATOR] Radiator Version 4.15 released - security fixes and enhancements
We are pleased to announce the release of Radiator version 4.15 This version contains fixes for an EAP-MSCHAP-V2 and EAP-pwd vulnerability. Upgrade is recommended. Please review OSC security advisory OSC-SEC-2015-01 for more information: https://www.open.com.au/OSC-SEC-2015-01.html As usual, the new version is available to current licensees from: https://www.open.com.au/radiator/downloads/ and to current evaluators from: https://www.open.com.au/radiator/demo-downloads Licensees with expired access contracts can renew at: https://www.open.com.au/renewal.html An extract from the history file https://www.open.com.au/radiator/history.html is below: - Revision 4.15 (2015-07-15) Selected fixes, compatibility notes and enhancements Fixes an EAP-MSCHAP-V2 and EAP-pwd vulnerability. OSC recommends all users to review OSC security advisory OSC-SEC-2015-01 to see if they are affected. https://www.open.com.au/OSC-SEC-2015-01.html perl-ldap-0.32 or better is required. Should be available in all current systems. EAP-pwd requires Crypt::OpenSSL::Bignum 0.06 or later from CPAN Configurable TLS version and ciphersuite selection for TLS based EAP and stream modules CRL checks for the entire certificate chain can now be enabled Included Gossip framework with Redis based implementation Support for Gossip when communicating next hop proxy failures between Radiator instances Shared duplicate cache for a more simple server farm configuration Windows Event log support Custom format support for logs, authentication logs and accounting logs. CEF and JSON included Support for IEEE 802.1AE, also known as MACsec All AuthBys now support PostAuthHooks Various binary modules are now available from OSC and were removed from the Radiator distribution Detailed changes Added VENDOR STI (Server Technology Inc.) 1718 and multiple STI VSAs to dictionary. Contributed by Garry Shtern. Added VENDOR PacketDesign 8083 and VSAs PacketDesign-UserClass and PacketDesign-FTP to dictionary. Contributed by Garry Shtern. Added SN-Software-Version to dictionary. Reported by Bruno Tiago Rodrigues. Changed type of VENDORATTR 3076 Cisco-VPN-DHCP-Network-Scope in dictionary.cisco-vpn from text to ipaddr. Reported by Kilian Krause. Dictionary updates: Added H3C proprietary values H3C-SSH and H3C-Console for Login-Service. Changed Lancom LCS-Mac-Address type from string to hexadecimal. Added H3C-Priority. All reported by Philip Herbert. Zero length writes are now skipped in Stream.pm write_pending() used by RadSec, Diameter, SIGTRAN and other stream protocols. SCTP does not support 0 length syswrites on all platforms and may close the socket if zero length write is done. Added VENDOR Airespace 14179 VSAs 7-11 and 13-16 to dictionary. AuthBy GROUP now updates current AuthBy for %{AuthBy:parmname}. When AuthBy GROUP is used, this special formatting now gets the parameter value from the current AuthBy within the group instead of the AuthBy GROUP itself. Updated VENDOR 1991 Foundry VSAs in dictionary. foundry-privilege-level is now a synonym for brocade-privilege-level. Added a number of foundry VSAs. LDAP Version now defaults to 3 instead of 2. Updated a number of LDAP configuration example files in goodies to reflect this change. Ldap.pm now uses the LDAP object's disconnect method, instead of closing the socket directly. AuthBy LDAP2 and AuthBy LDAPDIGIPASS now use escape_filter_value provided by Net::LDAP::Util instead of escapeLdapLiteral in Ldap.pm Ldap.pm escapeLdapLiteral is now deprecacted and perl-ldap-0.32 or better is required. RefreshPeriod in ClientListSQL and ClientListLDAP now support special % formatting. Suggested by Bengi Sağlam. Updated VENDOR 2011 Huawei VSAs in dictionary. Huawei-Input-Basic-Rate is now an alias for Huawei-Input-Peak-Rate. Huawei-Output-Basic-Rate was changed similarly. Some of the attribute numbers appear to have different names and types between different devices. Huawei-User-Type, Huawei-MIP-Agent-MN-Flag and Huawei-Requested-APN are now aliases but aliasing may be handled with separate dictionary files in the future. Huawei-HW-Portal-Mode was renamed to Huawei-Portal-Mode. WiMAX dictionary updates: changed WiMAX-Session-Termination-Capability type to integer and added one value: Dynamic-Authorization. Changed WiMAX-PPAQ TLV Quota-Identifier type to binary. WiMAX subattributes within single Vendor-Specific attribute are now correctly decoded. Dictionary updates for Huawei: Reverted the recent aliasing changes. The conflicting attributes are now in a new Huawei specific dictionary file goodies/dictionary.huawei1. This new dictionary file contains attributes used by, for example, Huawei packet gateway / Wi-Fi controller. Since Huawei seems to use device specific dictionaries, additional dictionary files are added as needed. Added new AuthLog EVENTLOG and Log EVENTLOG modules for logging to Windows Event Log. Added eventlog.cfg in goodies for configura