The TLS session cache in FreeRADIUS fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS. References: http://seclists.org/oss-sec/2017/q2/342 http://seclists.org/oss-sec/2017/q2/422 http://freeradius.org/security.html Upstream patches: https://github.com/FreeRADIUS/freeradius-server/commit/af030bd4 https://github.com/FreeRADIUS/freeradius-server/commit/8f53382c
Created freeradius tracking bugs for this issue: Affects: fedora-all [bug 1456698]
Mitigation: Disable TLS session caching in FreeRADIUS by setting "enable = no" in the cache subsection of EAP module settings, which are in /etc/raddb/mods-available/eap file.
Created attachment 1287974 [details] Backported fix for FreeRADIUS 3.0.4
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1581 https://access.redhat.com/errata/RHSA-2017:1581