[EMAIL PROTECTED] wrote:
> Well, I would like to have further details:

  See the source code.

> The AP doesn't signal to the FreeRADIUS server that an
> authentication has failed. Is there a timer which is
> armed when a session is created ?

  Yes.

>  And more generally,
> how this "garbage collector" works ?

  See the source code in rlm_eap/

> > > included EAP message was corrupted : 0x05050004 !
> > > Why not sending an EAP Failure in this case ?
> > 
> >   It looks like a bug.
> 
> 
> About this bug, would you like more precisions in
> order to solve it ? Is it planned to fix this bug ?

  I've fixed it in the latest CVS snapshot.

> Silently discard the bad EAP Response isn't the best
> solution. As you wrote, the EAP method could easily re
> send the previous packet: it's well suited ! 
> But how is managed the EAP identifier in this case ?
> The RFC 2284bis specifies that the EAP identifier MUST
> be the same in case of retransmissions.

  See the data structures in rlm_eap.  You have access to the previous
EAP packet, so you can re-send it.

  As for updating the ID, you have access to the source.  Update the
EAP_PACKET structure with information as to whether or not the main
eap code should set the identifier, and then modify that code to check
for the new flag.

> After reading the Packet modification attacks
> paragraph in the RFC 2284bis ("It is RECOMMENDED that
> methods providing integrity protection of EAP packets
> include coverage of all the EAP header fields,
> including the Code, Identifier, Length, Type and
> Type-Data fields."), we would like to protect the EAP
> header.
> Doing that implies the EAP method will have to guess
> the value of the EAP Identifier field of the next EAP
> Request packet ?

  Not if you set it to something using the above method.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to