[RADIATOR] UNS: Re: TLS v1.3

Heikki Vatiainen hvn at open.com.au
Tue Oct 25 17:25:58 UTC 2022


On 24.10.2022 18.25, Cassidy B. Larson wrote:

> We are using the "EAPTLS_Protocols TLSv1.3" currently in all of our 
> AuthBy's for good measure.  However, the TLS handshake appears to not 
> use TLSv1.3 outbound for the establishment, and instead tries TLSv1.2 
> which fails.
> See these two debug lines:
> DEBUG: AuthSQL EAP-TTLS TLS handshake: Direction*IN, Version: TLS 1.3*, 
> Record content: (22) Handshake, message type: (1) ClientHello
> DEBUG: AuthSQL EAP-TTLS TLS handshake: Direction *OUT, Version: TLS 
> 1.2*, Record content: (21) Alert, level: (2) fatal, description: (70) 
> protocol version

Would it be possible to run tcpdump to get capture from the ClientHello 
that Radiator rejects? The ClientHello might have a combination of 
parameters that don't work with TLSv1.3.

My testing with Radiator-4.26-24.tgz and its demo certificates was 
successful with eapol_test that requires TLSv1.3.

I tested with the following:
- FreeBSD 13.1
- pkg install p5-Net-SSLeay-1.92
- eapol_test compiled on the host



eapol_test compilation
++++++++++++++++++++++
Clone it from https://w1.fi/cvs.html and then do this:

freebsd% git checkout hostap_2_10
HEAD is now at cff80b4f7 Preparations for v2.10 release

freebsd% cd wpa_supplicant
freebsd% cp defconfig .config

Then patch with the diff at the bottom of this message and compile with 
this (note needs pkg install gmake):

freebsd% gmake eapol_test



Testing with eapol_test
+++++++++++++++++++++++
When you have compiled eapol_test, run it with something like this:

./eapol_test -p 1645 -s mysecret -c eapol-eap-ttls.conf

Where eapol-eap-ttls.conf looks something like this:

network={
         phase1="tls_disable_tlsv1_0=1 tls_disable_tlsv1_1=1 
tls_disable_tlsv1_2=1 tls_disable_tlsv1_3=0"

         ssid="ttls-ssid"
         key_mgmt=WPA-EAP
         eap=TTLS
         anonymous_identity="mikem-anon"
         identity="mikem"
         password="fred"
         ca_cert="certificates/demoCA/cacert.pem"
	phase2="auth=PAP"
	eap_workaround=0
}

Radiator configuration is goodies/eap_ttls.cfg with EAPTLS_Protocols 
forced to TLSv1.3 with no other remarkable changes.

With the above EAP-TTLS/PAP works fine.



Here's the .config patch to get eapol_test compiled with FreeBSD 13.1:

--- defconfig	2022-10-25 17:59:13.262031000 +0000
+++ .config	2022-10-25 20:00:19.057923000 +0000
@@ -29,7 +29,7 @@
  CONFIG_DRIVER_WEXT=y

  # Driver interface for Linux drivers using the nl80211 kernel interface
-CONFIG_DRIVER_NL80211=y
+#CONFIG_DRIVER_NL80211=y

  # QCA vendor extensions to nl80211
  #CONFIG_DRIVER_NL80211_QCA=y
@@ -77,7 +77,7 @@
  #CONFIG_DRIVER_MACSEC_QCA=y

  # Driver interface for Linux MACsec drivers
-CONFIG_DRIVER_MACSEC_LINUX=y
+#CONFIG_DRIVER_MACSEC_LINUX=y

  # Driver interface for the Broadcom RoboSwitch family
  #CONFIG_DRIVER_ROBOSWITCH=y
@@ -246,7 +246,7 @@
  #CONFIG_NO_WPA_PASSPHRASE=y

  # Simultaneous Authentication of Equals (SAE), WPA3-Personal
-CONFIG_SAE=y
+#CONFIG_SAE=y

  # Disable scan result processing (ap_scan=1) to save code size by 
about 1 kB.
  # This can be used if ap_scan=1 mode is never enabled.
@@ -303,6 +303,7 @@
  # ndis = Windows NDISUIO (note: requires CONFIG_USE_NDISUIO=y)
  # none = Empty template
  #CONFIG_L2_PACKET=linux
+CONFIG_L2_PACKET=none

  # Disable Linux packet socket workaround applicable for station interface
  # in a bridge for EAPOL frames. This should be uncommented only if the 
kernel
@@ -363,7 +364,7 @@

  # Add support for new DBus control interface
  # (fi.w1.wpa_supplicant1)
-CONFIG_CTRL_IFACE_DBUS_NEW=y
+#CONFIG_CTRL_IFACE_DBUS_NEW=y

  # Add introspection support for new DBus control interface
  CONFIG_CTRL_IFACE_DBUS_INTRO=y

-- 
Heikki Vatiainen
OSC, makers of Radiator
Visit radiatorsoftware.com for Radiator AAA server software


More information about the radiator mailing list