Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Imlement countermeasures against BlastRADIUS vulnerability #200

Open
Janfred opened this issue Jul 9, 2024 · 1 comment
Open

Imlement countermeasures against BlastRADIUS vulnerability #200

Janfred opened this issue Jul 9, 2024 · 1 comment

Comments

@Janfred
Copy link

Janfred commented Jul 9, 2024

If I see it correctly, pyrad does not support the Message-Authenticator attribute.

This is a serious security problem, since an attacker can modify the RADIUS Requests freely and generate a RADIUS Response.

As far as I can see, this affects only the RADIUS Client implementation, since the RADIUS Server implementation is not standard-compliant to RFC2865. It appears not to mirror back the Proxy-State attribute, which would be required by RFC2865.

See blastradius.fail for more information.

@Janfred
Copy link
Author

Janfred commented Jul 12, 2024

Since it was pointed out to me (sorry for not seeing it earlier):
pyrad supports Message-Authenticator (via methods add_message_authenticator and verify_message_authenticator).

Nonetheless, at least in outgoing RADIUS packets there should always be a Message-Authenticator attribute included by default, and all examples should include the verify_message_authenticator method.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant