<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Extreme Access Control (EAC) freeradius default cipher list in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46684#M6477</link>
    <description>Hi Patrick,&lt;BR /&gt;
&lt;BR /&gt;
yes, in tls.c is written that CTX prefers server list.&lt;BR /&gt;
Here is what &lt;A href="https://wiki.openssl.org/index.php/SSL_and_TLS_Protocols#Cipher_Suites" target="_blank" rel="nofollow noreferrer noopener"&gt;openssl &lt;/A&gt;wiki says&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;So it is implementation dependent. In openssl there are two modes:&lt;UL&gt; 
&lt;LI&gt;default is to choose the first compatible cipher suite from client hello.&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt; 
&lt;LI&gt;SSL_OP_CIPHER_SERVER_PREFERENCE to SSL_CTX_set_option to choose from server cipher list order&lt;/LI&gt;&lt;/UL&gt;&lt;/BLOCKQUOTE&gt;If EAC uses server preferences you may only benefit from it. Today TLS severs usually relay on Eliptic Curves - GCM based ciphers and upon response to client server may use only specific cipher. See below&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="abccfd7f04ed4eaf92e8dbcfacc730ed_RackMultipart20170403-28088-3c64uu-Google_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1869i020E47CCF33653B3/image-size/large?v=v2&amp;amp;px=999" role="button" title="abccfd7f04ed4eaf92e8dbcfacc730ed_RackMultipart20170403-28088-3c64uu-Google_inline.png" alt="abccfd7f04ed4eaf92e8dbcfacc730ed_RackMultipart20170403-28088-3c64uu-Google_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
Could you share packet capture filtered with EAC IP to compare it?&lt;BR /&gt;
&lt;BR /&gt;
If you do not like ciphers used by server, you might change the cipher list limiting weak ones. However, take in consideration wider support by older supplicants.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Ondrej&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Wed, 22 Mar 2017 02:52:00 GMT</pubDate>
    <dc:creator>Ondrej_Lepa</dc:creator>
    <dc:date>2017-03-22T02:52:00Z</dc:date>
    <item>
      <title>Extreme Access Control (EAC) freeradius default cipher list</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46678#M6471</link>
      <description>The default ciphers in freeradius on the EAC engine config for eap is:&lt;BR /&gt;
&lt;BR /&gt;
cipher_list = "ADH-AES128-GCM-SHA256:ADH-AES128-SHA:ADH-AES128-SHA256:&lt;BR /&gt;
ADH-AES256-GCM-SHA384:ADH-AES256-SHA:ADH-AES256-SHA256:ADH-CAMELLIA128-SHA:&lt;BR /&gt;
ADH-CAMELLIA256-SHA:AECDH-AES128-SHA:AECDH-AES256-SHA:AES128-GCM-SHA256:&lt;BR /&gt;
AES128-SHA:AES128-SHA256:AES256-GCM-SHA384:AES256-SHA:AES256-SHA256:&lt;BR /&gt;
CAMELLIA128-SHA:CAMELLIA256-SHA:DHE-DSS-AES128-GCM-SHA256:&lt;BR /&gt;
DHE-DSS-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-DSS-AES256-GCM-SHA384:&lt;BR /&gt;
DHE-DSS-AES256-SHA:DHE-DSS-AES256-SHA256:DHE-DSS-CAMELLIA128-SHA:&lt;BR /&gt;
DHE-DSS-CAMELLIA256-SHA:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA:&lt;BR /&gt;
DHE-RSA-AES128-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-SHA:&lt;BR /&gt;
DHE-RSA-AES256-SHA256:DHE-RSA-CAMELLIA128-SHA:DHE-RSA-CAMELLIA256-SHA:&lt;BR /&gt;
ECDH-ECDSA-AES128-GCM-SHA256:ECDH-ECDSA-AES128-SHA:&lt;BR /&gt;
ECDH-ECDSA-AES128-SHA256:ECDH-ECDSA-AES256-GCM-SHA384:&lt;BR /&gt;
ECDH-ECDSA-AES256-SHA:ECDH-ECDSA-AES256-SHA384:ECDH-RSA-AES128-GCM-SHA256:&lt;BR /&gt;
ECDH-RSA-AES128-SHA:ECDH-RSA-AES128-SHA256:ECDH-RSA-AES256-GCM-SHA384:&lt;BR /&gt;
ECDH-RSA-AES256-SHA:ECDH-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:&lt;BR /&gt;
ECDHE-ECDSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA256:&lt;BR /&gt;
ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA:&lt;BR /&gt;
ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES128-GCM-SHA256:&lt;BR /&gt;
ECDHE-RSA-AES128-SHA:ECDHE-RSA-AES128-SHA256:&lt;BR /&gt;
ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES256-SHA384:&lt;BR /&gt;
PSK-AES128-CBC-SHA:PSK-AES256-CBC-SHA:SRP-AES-128-CBC-SHA:&lt;BR /&gt;
SRP-AES-256-CBC-SHA:SRP-DSS-AES-128-CBC-SHA:SRP-DSS-AES-256-CBC-SHA:&lt;BR /&gt;
SRP-RSA-AES-128-CBC-SHA:SRP-RSA-AES-256-CBC-SHA"&lt;BR /&gt;
It seems this config is generated with something like:&lt;BR /&gt;
&lt;BR /&gt;
openssl ciphers HIGH | tr ':' '\n' | sort | grep -v RC4 | tr '\n' ':'which is controled by application properties (default values):&lt;BR /&gt;
&lt;BR /&gt;
RADIUS_TLS_CIPHER_LIST = "HIGH"&lt;BR /&gt;
RADIUS_TLS_REMOVE_RC4_CIPHERS = trueSo the list is &lt;B&gt;&lt;U&gt;sorted&lt;/U&gt;&lt;/B&gt; and the weak ciphers (128 &amp;lt; 256) gets in front. I don't know&lt;BR /&gt;
how the EAC implementation uses this list, but the default openssl libs use&lt;BR /&gt;
this list as an ordered list. So the weakest ciphers are used first.&lt;BR /&gt;
&lt;BR /&gt;
Isn't this a security bug?</description>
      <pubDate>Fri, 17 Mar 2017 02:17:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46678#M6471</guid>
      <dc:creator>Patrick_Koppen</dc:creator>
      <dc:date>2017-03-17T02:17:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Access Control (EAC) freeradius default cipher list</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46679#M6472</link>
      <description>Hello,&lt;BR /&gt;
&lt;BR /&gt;
The ciphers list in the /opt/nac/radius/raddb/mods-enabled, to my knowledge, is a list of available ciphers that are negotiated by RADIUS server and client to be used to encrypt EAP-PEAP username and password information during a RADIUS transaction. While openssl  libs may use this list in an ordered fashion, the cihpers_list for freeRADIUS does not change the ciphers list for openssl. &lt;BR /&gt;
&lt;BR /&gt;
Do you have any information that indicates free RADIUS will always attempt to use the first cipher in the list when performing authentication? &lt;BR /&gt;
&lt;BR /&gt;
One side note is that removing the RC4 ciphers from this cipher list has caused some issues with customers as the clients were still attempting to used RC4 ciphers that were removed. If the RC4 ciphers were not in the list there had to be some other mechanism requiring the affected clients to attempt negotiation using RC4.&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;
-Ryan&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Mar 2017 02:12:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46679#M6472</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2017-03-22T02:12:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Access Control (EAC) freeradius default cipher list</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46680#M6473</link>
      <description>If you look at the freeradius source:&lt;BR /&gt;
&lt;BR /&gt;
SSL_CTX_set_cipher_list(ctx, conf-&amp;gt;cipher_list)This funktion is part of the openssl library... so it might be a problem.&lt;BR /&gt;
&lt;BR /&gt;
And for customers who need RC4 (I had this problem last week), they have to set&lt;BR /&gt;
the list to "DEFAULT".&lt;BR /&gt;
&lt;BR /&gt;
  &lt;A href="https://extremeportal.force.com/ExtrArticleDetail?n=000012247" target="_blank" rel="nofollow noreferrer noopener"&gt;https://extremeportal.force.com/ExtrArticleDetail?n=000012247&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
If you don't want to use RC4 but want to use the recommended list of ciphers&lt;BR /&gt;
you have to set two options:&lt;BR /&gt;
&lt;BR /&gt;
RADIUS_TLS_REMOVE_RC4_CIPHERS=false&lt;BR /&gt;
RADIUS_TLS_CIPHER_LIST=HIGHIf you do not set any option, you get a &lt;B&gt;sorted&lt;/B&gt; list of HIGH ciphers.&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Mar 2017 02:12:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46680#M6473</guid>
      <dc:creator>Patrick_Koppen</dc:creator>
      <dc:date>2017-03-22T02:12:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Access Control (EAC) freeradius default cipher list</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46681#M6474</link>
      <description>Hi Patrick,&lt;BR /&gt;
&lt;BR /&gt;
freeRADIUS seems to fully rely on openSSL to negotiate suitable cipher.&lt;BR /&gt;
It is set in eap.conf and default string seems to go like this &lt;BR /&gt;
ALL:!EXPORT:!LOW:!aNULL:!eNULL:!SSLv2It may obviously differ based on intended server settings. &lt;BR /&gt;
See more details in openSSL &lt;A href="https://www.openssl.org/docs/man1.0.2/apps/ciphers.html" target="_blank" rel="nofollow noreferrer noopener"&gt;ciphers &lt;/A&gt;documentation&lt;BR /&gt;
&lt;BR /&gt;
Anyway, it i the client who sets rules and cipher order seen on server side is quite irrelevant.&lt;BR /&gt;
See page from openSSL &lt;A href="https://www.openssl.org/docs/man1.0.2/apps/s_server.html" target="_blank" rel="nofollow noreferrer noopener"&gt;s_server &lt;/A&gt;manual &lt;BR /&gt;
&lt;BLOCKQUOTE&gt;-cipher cipherlist&lt;BR /&gt;
&lt;BR /&gt;
this allows the cipher list used by the server to be modified. When the client sends a list of supported ciphers the first client cipher also included in the server list is used. &lt;B&gt;Because the client specifies the preference order, the order of the server cipherlist irrelevant.&lt;/B&gt; See the ciphers command for more information.&lt;/BLOCKQUOTE&gt;There might be an exception related to server preferences, but this must be set within s_server &lt;A href="https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html" target="_blank" rel="nofollow noreferrer noopener"&gt;SSL_CTX &lt;/A&gt;configuration&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;SSL_OP_CIPHER_SERVER_PREFERENCE&lt;BR /&gt;
&lt;BR /&gt;
When choosing a cipher, use the server's preferences instead of the client preferences. &lt;B&gt;When not set, the SSL server will always follow the clients preferences.&lt;/B&gt; When set, the SSLv3/TLSv1 server will choose following its own preferences. Because of the different protocol, for SSLv2 the server will send its list of preferences to the client and the client chooses.&lt;/BLOCKQUOTE&gt;You might give it a try with simple test - capturing authentication between client and server or try to find ssl.h and double check it is not used.&lt;BR /&gt;
&lt;BR /&gt;
Let me know if you have any more questions.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Ondrej</description>
      <pubDate>Wed, 22 Mar 2017 02:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46681#M6474</guid>
      <dc:creator>Ondrej_Lepa</dc:creator>
      <dc:date>2017-03-22T02:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Access Control (EAC) freeradius default cipher list</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46682#M6475</link>
      <description>Hi Ondrej,&lt;BR /&gt;
&lt;BR /&gt;
during the TLS handshake the server sends his cipher list to the client and the client&lt;BR /&gt;
this his to the server.&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_handshake" target="_blank" rel="nofollow noreferrer noopener"&gt;https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_handshake&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
The should agree on the stongest cipher. But if the client choses&lt;BR /&gt;
the cipher (that itself would be a security risk), you have to check every implementation&lt;BR /&gt;
of every client. If any of them uses this as a ordered list, your implementation is a &lt;BR /&gt;
security bug.&lt;BR /&gt;
&lt;BR /&gt;
You relying on:&lt;BR /&gt;
&lt;UL&gt; 
&lt;LI&gt;implementation of freeradius 
 
&lt;/LI&gt;&lt;LI&gt;implementation of openssl 
 
&lt;/LI&gt;&lt;LI&gt;implementation of every client&lt;/LI&gt;&lt;/UL&gt;So I think it's not good practise to use a wrong order in an ordered list. I'm not a&lt;BR /&gt;
cryptographic expert but I still think &lt;B&gt;this is a security bug in EMC/EAC&lt;/B&gt;.&lt;BR /&gt;
&lt;BR /&gt;
Regards&lt;BR /&gt;
Patrick&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Mar 2017 02:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46682#M6475</guid>
      <dc:creator>Patrick_Koppen</dc:creator>
      <dc:date>2017-03-22T02:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Access Control (EAC) freeradius default cipher list</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46683#M6476</link>
      <description>Hi Ondrej,&lt;BR /&gt;
&lt;BR /&gt;
if you look at the source code of freeradius (stable, not EOL):&lt;BR /&gt;
&lt;BR /&gt;
if (conf-&amp;gt;cipher_server_preference) {&lt;BR /&gt;
  /*&lt;BR /&gt;
   *      SSL_OP_CIPHER_SERVER_PREFERENCE to follow best practice&lt;BR /&gt;
   *      of nowday's TLS: do not allow poorly-selected ciphers from&lt;BR /&gt;
*  *      client to take preference   &lt;BR /&gt;
   */   &lt;BR /&gt;
   ctx_options |= SSL_OP_CIPHER_SERVER_PREFERENCE;&lt;BR /&gt;
}Regards,&lt;BR /&gt;
Patrick&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Mar 2017 02:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46683#M6476</guid>
      <dc:creator>Patrick_Koppen</dc:creator>
      <dc:date>2017-03-22T02:52:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Access Control (EAC) freeradius default cipher list</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46684#M6477</link>
      <description>Hi Patrick,&lt;BR /&gt;
&lt;BR /&gt;
yes, in tls.c is written that CTX prefers server list.&lt;BR /&gt;
Here is what &lt;A href="https://wiki.openssl.org/index.php/SSL_and_TLS_Protocols#Cipher_Suites" target="_blank" rel="nofollow noreferrer noopener"&gt;openssl &lt;/A&gt;wiki says&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;So it is implementation dependent. In openssl there are two modes:&lt;UL&gt; 
&lt;LI&gt;default is to choose the first compatible cipher suite from client hello.&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt; 
&lt;LI&gt;SSL_OP_CIPHER_SERVER_PREFERENCE to SSL_CTX_set_option to choose from server cipher list order&lt;/LI&gt;&lt;/UL&gt;&lt;/BLOCKQUOTE&gt;If EAC uses server preferences you may only benefit from it. Today TLS severs usually relay on Eliptic Curves - GCM based ciphers and upon response to client server may use only specific cipher. See below&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="abccfd7f04ed4eaf92e8dbcfacc730ed_RackMultipart20170403-28088-3c64uu-Google_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1869i020E47CCF33653B3/image-size/large?v=v2&amp;amp;px=999" role="button" title="abccfd7f04ed4eaf92e8dbcfacc730ed_RackMultipart20170403-28088-3c64uu-Google_inline.png" alt="abccfd7f04ed4eaf92e8dbcfacc730ed_RackMultipart20170403-28088-3c64uu-Google_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
Could you share packet capture filtered with EAC IP to compare it?&lt;BR /&gt;
&lt;BR /&gt;
If you do not like ciphers used by server, you might change the cipher list limiting weak ones. However, take in consideration wider support by older supplicants.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Ondrej&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Mar 2017 02:52:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-access-control-eac-freeradius-default-cipher-list/m-p/46684#M6477</guid>
      <dc:creator>Ondrej_Lepa</dc:creator>
      <dc:date>2017-03-22T02:52:00Z</dc:date>
    </item>
  </channel>
</rss>

