OpenHarbors - Dynamic Tunneling of WPA over IP/L2TP
Linus Lüssing
linus.luessing at c0d3.blue
Wed Jun 19 13:22:46 PDT 2024
Hi Michael,
Thanks for the feedback.
On Wed, Jun 19, 2024 at 02:32:20PM -0400, Michael Richardson wrote:
> Radius already does this, and does it better.
> And Radius v1.1 over TLS is a significantly better protocol than the NAT44
> hostile MD5-authenticated thing of yore. Take a page from eduroam.
I don't think that RADIUS does this, this does not work for us with Freifunk.
Just like we can't offer eduroam on a Freifunk mesh node / AP
right now either:
The final RADIUS Accept message from the RADIUS server, no matter
if using it with or without TLS, will as the final step of its EAP
exchange send the pairwise-master-key to the AP. WPA encryption is between the
client/supplicant and the AP/authenticator only. The RADIUS TLS
encryption is a separate encryption channel and only between the
AP/authenticator and remote RADIUS server. It's not
end-to-end-encrypting payload between the client/authenticator and a
remote host.
This whole exchange therefore requires the AP/authenticator to be
run by a trusted operator. At Freifunk most of our nodes are run
by people that do not know each other. The AP/authenticator would
be able to Man-in-the-middle attack there.
That was the main idea of this proposal, to create
end-to-end-encryption between a client/supplicant and a remote
host. Without needing an extra VPN software on the client device.
>
> L2TP is a disaster, requires IPsec transport mode to be secure.
> Just don't.
If the frames within L2TP are still WPA encrypted then this
shouldn't need an extra layer of encryption around it via IPSec?
If this were not secure over the internet then it would not have
been secure over the air in the first place either.
Regards, Linus
More information about the Hostap
mailing list