I'm not sure it's common that clients speak directly to a radius server. Usually there is a NAS in between whether it be VPN concentrator, switch, wireless controller/AP etc. If your clients reside on subnets that have no visibility to the Radius server and NAS management subnets then you'd only need to check your NAS devices for OpenSSL related vulnerabilities, no?

--
Jason Watts
Pratt Institute, Academic Computing
Senior Network Administrator
p. 718-399-4219
f. 718-399-3416

Hanset, Philippe C wrote:
All,

We have been informing eduroam connected schools in the US that were vulnerable
to heartbleed (about 10 schools were vulnerable out of 180 connected to 
eduroam-US, less than 5%).
The eduroam federation did testing for all eduroam-connected campuses to 
evaluate the level of vulnerability and we have informed each RADIUS 
administrator
independently.

This said, ANY campus that operates a 802.1X network and uses a RADIUS server 
using OpenSSL could be potentially at risk since an attacker can access the 
RADIUS server via the local WPA/WAP2-enterprise network.
It does require for the attacker to be physically on campus and join the SSID, 
but the risk still exists!

Please analyze your systems for the vulnerability (look into the version of 
OpenSSL that you are running)
and take the appropriate measures.

Here are a few links about Heartbleed and RADIUS
http://freeradius.org/security.html
http://www.open.com.au/pipermail/radiator-announce/2014-April/000024.html
https://confluence.terena.org/display/H2eduroam/heartbleed-note

Thank you,

Philippe

Philippe Hanset
www.eduroam.us

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to