> > 1) When the client doesn't respond, the AP will
> > dissassociate it 30 seconds after and end the
> > authentication procedure. During this time,
> FreeRADIUS
> > is sleeping So, I would like to know if there is a
> > sort of "garbage collector" which frees unfinished
> > authentications ? 
> 
>   Yes.


Well, I would like to have further details:
The AP doesn't signal to the FreeRADIUS server that an
authentication has failed. Is there a timer which is
armed when a session is created ? And more generally,
how this "garbage collector" works ?


> 
> > 2) My EAP module must return 0 or 1 to FreeRADIUS.
> If
> > it is 1, it siginifies that there is an EAP
> Request to
> > send. I tried to send an EAP Message with the code
> > equal to 5: FreeRADIUS detected correctly that the
> EAP
> > Code was invalid : it sent an Access-Reject but
> the
> > included EAP message was corrupted : 0x05050004 !
> > Why not sending an EAP Failure in this case ?
> 
>   It looks like a bug.


About this bug, would you like more precisions in
order to solve it ? Is it planned to fix this bug ?


> 
> > 3) It seems that it's impossible to silently
> discard a
> > packet under FreeRADIUS ? 
> 
>   The RFC's say you're not allowed to silently
> discard Access-Request
> packets.
> 
> > In case of a client bad EAP Response, my EAP
> method
> > has to choose between two solutions : discard it
> > silently or re send the previous EAP Request.
> 
>   Which EAP method are you implementing?  Why is
> this necessary?
> 
>   Note that you also have access to the previous EAP
> request.
> 


We're implementing a Pre-Shared Key (PSK) method whose
name is EAP-PSK.
EAP-PSK is a new EAP method which performs mutual
authentication and session key derivation. Using a
pre-shared key, EAP-PSK is intended to be easy to
deploy and well-suited for authentication over
insecure networks such as 802.11. Another goal is to
motivate work on replacing EAP-MD5 which is deprecated
due to security reasons in wireless context. For more
detail:
http://perso.rd.francetelecom.fr/bersani/EAP_PSK/EAP-PSK.htm
We intend to publish the first EAP-PSK implementation
in the next weeks.

Silently discard the bad EAP Response isn't the best
solution. As you wrote, the EAP method could easily re
send the previous packet: it's well suited ! 
But how is managed the EAP identifier in this case ?
The RFC 2284bis specifies that the EAP identifier MUST
be the same in case of retransmissions.




> > 4) I succeeded to modify the EAP Identifier on the
> > client side, but I didn't arrive in my EAP module.
> It
> > seems that FreeRADIUS choses the EAP Identifier by
> > incrementing by one the previous sent EAP
> Identifier.
> > Is it really that ?
> 
>   Yes.
> 
>   Why do you need it different?

After reading the Packet modification attacks
paragraph in the RFC 2284bis ("It is RECOMMENDED that
methods providing integrity protection of EAP packets
include coverage of all the EAP header fields,
including the Code, Identifier, Length, Type and
Type-Data fields."), we would like to protect the EAP
header.
Doing that implies the EAP method will have to guess
the value of the EAP Identifier field of the next EAP
Request packet ?


Aurelien Magniez






        

        
                
Yahoo! Mail : votre e-mail personnel et gratuit qui vous suit partout ! 
Cr�ez votre Yahoo! Mail sur http://fr.benefits.yahoo.com/

Dialoguez en direct avec vos amis gr�ce � Yahoo! Messenger !T�l�chargez Yahoo! 
Messenger sur http://fr.messenger.yahoo.com

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to