HostAPd 2.6 fails EAP authentication with OpenSSL 1.1
Thomas d'Otreppe
tdotreppe at gmail.com
Tue Oct 31 15:04:57 PDT 2017
Jouni,
What are your thoughts on using those functions?
If no interest, could you please point me where they should ideally be
used? I'd like to develop a patch for that.
Thanks,
Thomas
On Mon, Oct 30, 2017 at 5:49 AM, Alan DeKok <aland at deployingradius.com> wrote:
> On Oct 30, 2017, at 6:06 AM, Jouni Malinen <j at w1.fi> wrote:
>> That talks about Debian OpenSSL package disallowing use of TLS v1.0. In
>> other words, this sounds like a security policy choice and expected
>> behavior to reject a client that does not support enabled protocol
>> versions.
>
> It was a "security" choice by Debian to remove TLS v1.0 from *all of Debian*.
>
>> Please note that OpenSSL 1.1.0f itself does support TLS v1.0
>> and when built with default options, v1.0 seems to be enabled as well.
>
> Yes.
>
>>> The solution was to use SSL_CTX_set_max_proto_version and
>>> SSL_CTX_set_min_proto_version as you can see on
>>> https://github.com/FreeRADIUS/freeradius-server/commits/v3.0.x/src/main/tls.c
>>> (anything on or after September 8 2017).
>>
>> I'm not sure I'd call that a solution.. At best, that sounds like a
>> workaround that explicitly ignored distro security policy for TLS.
>
> Application authors using TLS in Debian complained. All of them.
>
> Debian changed their policy so that apps using the "old" OpenSSL APIs would get TLS v1.0 disabled by default. This meant that old applications would, by default, be "secure".
>
> i.e. SSL_CTX_set_min_proto_version() was added by Debian, as a concession that sometimes application developers do know how to do security.
>
>> You
>> cannot both have a policy that mandates TLS v1.0 to be disabled for
>> everything in the system and have client devices that do not support
>> anything else than TLS v1.0.
>
> Debian changed their policy. TLS v1.0 is disabled by default, but applications can explicitly enable it. I've done that in FreeRADIUS, because allowing TLS v1.0 is required for real-world environments.
>
> As has been noted in the IETF recently, there are ~2 billion devices running EAP. Mandating that they upgrade is just a non-starter. People who try to enact such mandates don't understand the consequences of their actions.
>
> Alan DeKok.
>
More information about the Hostap
mailing list