[Pkg-freeradius-maintainers] Bug#1077159: freeradius: Not backward compatible with eapol_test from bullseye
Bernhard Schmidt
berni at debian.org
Fri Jul 26 09:39:58 BST 2024
Control: reassign -1 eapoltest
Control: found -1 2:2.10-8
> freeradius with openssl 3.0.13-1~deb12u1 cannot successfully communicate
> with eapol_test from bullseye (2:2.10-8~bpo11+2, openssl 1.1.1w-0+deb11u1).
> eapol_test is used by our monitoring system to verify the functionality
> of our freeradius services.
>
> Server log shows the received Access-Request is handled and Access-Challenge
> is sent. However eapol_test simply ignores it and re-sends Access-Request
> packets again and again:
This sounds like a bug in eapoltest, not in Freeradius. Reassigning
accordingly.
Note that the version in bullseye-backports is older than the one in
bookworm it should base on. The version in bullseye-backports is missing
these fixes from bookworm (stable). Some of those sound related.
I'm not sure whether bullseye-backports is still updateable, if yes it
might be a good idea to backport the current stable-security version.
wpa (2:2.10-12+deb12u1) bookworm; urgency=high
* Non-maintainer upload on behalf of the Security Team.
* Fix CVE-2023-52160 (Closes: #1064061):
The implementation of PEAP in wpa_supplicant allows
authentication bypass. For a successful attack,
wpa_supplicant must be configured to not verify
the network's TLS certificate during Phase 1
authentication, and an eap_peap_decrypt vulnerability
can then be abused to skip Phase 2 authentication.
The attack vector is sending an EAP-TLV Success packet
instead of starting Phase 2. This allows an adversary
to impersonate Enterprise Wi-Fi networks.
-- Bastien Roucariès <rouca at debian.org> Tue, 30 Apr 2024 22:45:18 +0000
wpa (2:2.10-12) unstable; urgency=medium
* Prevent hostapd units from being started if there’s
no config provided (Closes: #1028088).
* hostapd: Enable 802.11ax support (Closes: #1013732).
-- Andrej Shadura <andrewsh at debian.org> Fri, 24 Feb 2023 14:01:35 +0100
wpa (2:2.10-11) unstable; urgency=medium
* Drop security level to 0 with OpenSSL 3.0 when using TLS 1.0/1.1
(Closes: #1011121, LP: #1958267)
* Drop dependency on lsb-base.
-- Andrej Shadura <andrewsh at debian.org> Tue, 31 Jan 2023 12:58:02 +0100
wpa (2:2.10-10) unstable; urgency=medium
* Configure wpa_supplicant.service to create control sockets owned by
group netdev
(Closes: #1012844)
-- Andrej Shadura <andrewsh at debian.org> Wed, 21 Dec 2022 10:03:29 +0100
wpa (2:2.10-9) unstable; urgency=medium
[ Sebastien Bacher ]
* debian/patches/allow-legacy-renegotiation.patch:
Allow legacy renegotiation to fix PEAP issues with some servers
(Closes: #1010603, LP: #1962541)
-- Andrej Shadura <andrewsh at debian.org> Thu, 05 May 2022 11:23:33 +0100
> Tcpdump shows the Access-Challenge packet is indeed delivered to the client.
> If the same configuration (both on server and eapol_test sides) is tested
> with eapoltest from bookworm (2:2.10-12+deb12u1, openssl 3.0.13-1~deb12u1),
> it is successful.
>
> The issue is critical becasue possibly all clients with openssl 1.1.1w-0+deb11u1
> might be affected.
We can't rule that out, but we haven't heard of any reports.
Bernhard
More information about the Pkg-freeradius-maintainers
mailing list