[RADIATOR] UNS: Re: TLS v1.3
Heikki Vatiainen
hvn at open.com.au
Mon Oct 24 09:35:27 UTC 2022
On 22.10.2022 0.15, Dubravko Penezic via radiator wrote:
> from my experience you have two options :
> * set system SSL library to work only wit TLS v1.3
> * set RADIATOR configuration to accept only TLS v1.3 by setting
> TLS_Protocols to TLSv1.3
I would the latter and put this to Radiator configuration under the
AuthBy that terminates EAP-TTLS tunnel:
<AuthBy ...>
# To support both TLSv1.2 and 1.3
#EAPTLS_Protocols TLSv1.2, TLSv1.3
# To support just TLSv1.3
EAPTLS_Protocols TLSv1.3
TLS_Protocols controls RadSec, Diameter and other non-EAP protocols.
It's a config option, but not for EAP.
> Also be aware that from many recent reports client which declare that
> work only with TLS v1.3 doesnt do that on correct way or not work at all
> with v1.3.
EAP-TTLS is currently set in Radiator 4.26-24 and other 4.26-nn versions
so that session resumption is disabled. The reasons is for this is that
EAP-TTLS/PAP (and non-EAP CHAP variants) did not work with all EAP-TTLS
implementations. The reason is how session resumption is done and is one
example not fully all clients fully working.
For more information see discussion related to document
draft-ietf-emu-tls-eap-types that has been ongoing this year on the
IETF's EAP Method Update (EMU) mailing list:
https://www.ietf.org/mailman/listinfo/emu
The next Radiator release supports TLSv1.3 for RadSec and has been
updated for EAP-TLS, EAP-TTLS and PEAP with TLSv1.3. There could still
be some work-arounds enabled, such as disabled session resumption, but
full authentication should work fine for the said EAP methods.
Thanks,
Heikki
> Regards,
> Dubravko Penezic
> Srce
>
> On 10/21/22 22:54, Cassidy B. Larson via radiator wrote:
>> More specifically, here's the debug output:
>>
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL Handling EAP type 1
>> (Identity), code: 2 (Response), identifier: 191, length: 20
>> Fri Oct 21 14:52:17 2022: DEBUG: Initialised SSL library: Net::SSLeay
>> 1.92, OpenSSL 1.1.1o-freebsd 3 May 2022
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x9 (9) for Net::SSLeay
>> constant ERROR_WANT_ASYNC
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0xa (10) for Net::SSLeay
>> constant ERROR_WANT_ASYNC_JOB
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0xb (11) for Net::SSLeay
>> constant ERROR_WANT_CLIENT_HELLO_CB
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0xc (12) for Net::SSLeay
>> constant ERROR_WANT_RETRY_VERIFY
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x8 (8) for Net::SSLeay
>> constant SSL2_MT_CLIENT_CERTIFICATE
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x3 (3) for Net::SSLeay
>> constant SSL2_MT_CLIENT_FINISHED
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x2 (2) for Net::SSLeay
>> constant SSL2_MT_CLIENT_MASTER_KEY
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x0 (0) for Net::SSLeay
>> constant SSL2_MT_ERROR
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x6 (6) for Net::SSLeay
>> constant SSL2_MT_REQUEST_CERTIFICATE
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x6 (6) for Net::SSLeay
>> constant SSL2_MT_SERVER_FINISHED
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x4 (4) for Net::SSLeay
>> constant SSL2_MT_SERVER_HELLO
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x5 (5) for Net::SSLeay
>> constant SSL2_MT_SERVER_VERIFY
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x2 (2) for Net::SSLeay
>> constant TLSEXT_ERR_ALERT_FATAL
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x1 (1) for Net::SSLeay
>> constant TLSEXT_ERR_ALERT_WARNING
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x3 (3) for Net::SSLeay
>> constant TLSEXT_ERR_NOACK
>> Fri Oct 21 14:52:17 2022: DEBUG: TLS: Using 0x0 (0) for Net::SSLeay
>> constant TLSEXT_ERR_OK
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL setting TLS protocols to:
>> TLSv1.3
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL setting EAPTLS_Ciphers to:
>> DEFAULT:!EXPORT:!LOW at SECLEVEL=1
>> Fri Oct 21 14:52:17 2022: DEBUG: EAP result: 3, EAP-TTLS Challenge
>> Fri Oct 21 14:52:17 2022: DEBUG: Radius::AuthGROUP: result:
>> CHALLENGE, EAP-TTLS Challenge
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthBy GROUP result: CHALLENGE,
>> EAP-TTLS Challenge
>> Fri Oct 21 14:52:17 2022: DEBUG: Access challenged for <....>:
>> EAP-TTLS Challenge
>>
>>
>> Fri Oct 21 14:52:17 2022: DEBUG: Handling with Radius::AuthGROUP:
>> Fri Oct 21 14:52:17 2022: DEBUG: Handling with AuthSQL
>> Fri Oct 21 14:52:17 2022: DEBUG: Handling with Radius::AuthSQL:
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL Handling EAP type 21 (TTLS),
>> code: 2 (Response), identifier: 192, length: 196
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS state: before
>> SSL initialization
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS state: before
>> SSL initialization
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS state: before
>> SSL initialization
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS handshake:
>> Direction IN, Version: TLS 1.3, Record content: (22) Handshake,
>> message type: (1) ClientHello
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS handshake:
>> Direction OUT, Version: TLS 1.2, Record content: (21) Alert, level:
>> (2) fatal, description: (70) protocol version
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS state: error
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS TLS state: error
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP-TTLS SSL_accept result:
>> -1, reason/error: 'SSL_ERROR_SSL, state: 'error'
>> Fri Oct 21 14:52:17 2022: ERR: AuthSQL EAP-TTLS TLS Handshake error:
>> result: -1, reason/error: 'SSL_ERROR_SSL', state: 'error',
>> error:14209102:SSL
>> routines:tls_early_post_process_client_hello:unsupported protocol
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthSQL EAP Failure, elapsed time
>> 0.050957
>> Fri Oct 21 14:52:17 2022: DEBUG: EAP result: 1, EAP-TTLS TLS Handshake
>> error: unsupported protocol
>> Fri Oct 21 14:52:17 2022: DEBUG: Radius::AuthGROUP: result: REJECT,
>> EAP-TTLS TLS Handshake error: unsupported protocol
>> Fri Oct 21 14:52:17 2022: DEBUG: AuthBy GROUP result: REJECT, EAP-TTLS
>> TLS Handshake error: unsupported protocol
>> Fri Oct 21 14:52:17 2022: INFO: Access rejected for 888901007406545:
>> EAP-TTLS TLS Handshake error: unsupported protocol
>>
>> We're running OpenSSL 1.1.1o and Net:SSLeay 1.92 as detailed above.
>>
>>
>> On Fri, Oct 21, 2022 at 1:39 PM Cassidy B. Larson <alandaluz at gmail.com
>> <mailto:alandaluz at gmail.com>> wrote:
>>
>> We're spinning up a new EAP-TTLS source. Installed latest dev of
>> 4.26-24. When I force EAP_TLS_Protocols to TLSv1.3 alone, I see the
>> TLSv1.3 handshake request come in, but outbound handshake is
>> TLSv1.2. Apparently our vendor only allows TLSv1.3 right now.
>>
>> Any ideas how to get outbound handshakes to use TLSv1.3?
>>
>> Fri Oct 21 13:30:12 2022: DEBUG: AuthSQL EAP-TTLS TLS handshake:
>> Direction IN, Version: TLS 1.3, Record content: (22) Handshake,
>> message type: (1) ClientHello Fri Oct 21 13:30:12 2022: DEBUG:
>> AuthSQL EAP-TTLS TLS handshake: Direction OUT, Version: TLS 1.2,
>> Record content: (21) Alert, level: (2) fatal, description: (70)
>> protocol version
>>
>>
>> Thanks!
>>
>> -c
>>
>>
>> _______________________________________________
>> radiator mailing list
>> radiator at lists.open.com.au
>> https://lists.open.com.au/mailman/listinfo/radiator
> _______________________________________________
> radiator mailing list
> radiator at lists.open.com.au
> https://lists.open.com.au/mailman/listinfo/radiator
--
Heikki Vatiainen
OSC, makers of Radiator
Visit radiatorsoftware.com for Radiator AAA server software
More information about the radiator
mailing list