An Analysis of the RADIUS Authentication Protocol
by Joshua Hill, InfoGard Laboratories [www.infogard.com]
Last Modified Mon Nov 12 16:12:53 PST 2001
A current HTML version of this paper can be found at:
http://www.untruth.org/~josh/security/radius
Please send comments to <josh-radius@untruth.org>
1 Introduction
RADIUS is a widely used protocol in network environments. It is
commonly used for embedded network devices such as routers, modem
servers, switches, etc. It is used for several reasons:
* The embedded systems generally cannot deal with a large number of
users with distinct authentication information. This requires more
storage than many embedded systems possess.
* RADIUS facilitates centralized user administration, which is
important for several of these applications. Many ISPs have tens
of thousands, hundreds of thousands, or even millions of users.
Users are added and deleted continuously throughout the day, and
user authentication information changes constantly. Centralized
administration of users in this setting is an operational
requirement.
* RADIUS consistently provides some level of protection against a
sniffing, active attacker. Other remote authentication protocols
provide either intermittent protection, inadequate protection or
non-existent protection. RADIUS's primary competition for remote
authentication is TACACS+ and LDAP. LDAP natively provides no
protection against sniffing or active attackers. TACACS+ is subtly
flawed, as discussed by Solar Designer in his advisory.
* RADIUS support is nearly omni-present. Other remote authentication
protocols do not have consistent support from hardware vendors,
whereas RADIUS is uniformly supported. Because the platforms on
which RADIUS is implemented on are often embedded systems, there
are limited opportunities to support additional protocols. Any
changes to the RADIUS protocol would have to be at least minimally
compatible with pre-existing (unmodified) RADIUS clients and
servers.
RADIUS is currently the de-facto standard for remote authentication.
It is very prevalent in both new and legacy systems.
1.1 Applicability
This analysis deals with some of the characteristics of the base
RADIUS protocol and of the User-Password attribute. Depending on the
mode of authentication used, the described User-Password weaknesses
may or may not compromise the security of the underlying
authentication scheme. A complete compromise of the User-Password
attribute would result in the complete compromise of the normal
Username/Password or PAP authentication schemes, because both of these
systems include otherwise unprotected authentication information in
the User-Password attribute. On the other hand when CHAP or a
Challenge/Response system is in use, a complete compromise of the
User-Password attribute would only expose the underlying CHAP or
Challenge/Response information to additional attack, which may or may
not lead to a complete compromise of the authentication system,
depending on the strength of the underlying authentication system.
This analysis does not cover the RADIUS protocol's accounting
functionality (which is, incidentally, also flawed, but normally
doesn't transport information that must be kept confidential).
2 Protocol Summary
A summary of the RADIUS packet is below (from the RFC):
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Code | Identifier | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Authenticator |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Attributes ...
+-+-+-+-+-+-+-+-+-+-+-+-+-
The code establishes the type of RADIUS packet. The codes are:
Value Description
1 Access-Request
2 Access-Accept
3 Access-Reject
4 Accounting-Request
5 Accounting-Response
11 Access-Challenge
12 Status-Server (experimental)
13 Status-Client (experimental)
255 Reserved
The identifier is a one octet value that allows the RADIUS client to
match a RADIUS response with the correct outstanding request.
The attributes section is where an arbitrary number of attribute
fields are stored. The only pertinent attributes for this discussion
are the User-Name and User-Password attributes.
This description will concentrate on the most common type of RADIUS
exchange: An Access-Request involving a username and user password,
followed by either an Access-Accept, Access-Reject or a failure. I
will refer to the two participants in this protocol as the client and
the server. The client is the entity that has authentication
information that it wishes to validate. The server is the entity that
has access to a database of authentication information that it can use
to validate the client's authentication request.
2.1 Initial Client Processing
The client creates an Access-Request RADIUS packet, including at least
the User-Name and User-Password attributes.
The Access-Request packet's identifier field is generated by the
client. The generation process for the identifier field is not
specified by the RADIUS protocol specification, but it is usually
implemented as a simple counter that is incremented for each request.
The Access-Request packet contains a 16 octet Request Authenticator in
the authenticator field. This Request authenticator is a randomly
chosen 16 octet string.
This packet is completely unprotected, except for the User-Password
attribute, which is protected as follows:
The client and server share a secret. That shared secret followed by
the Request Authenticator is put through an MD5 hash to create a 16
octet value which is XORed with the password entered by the user. If
the user password is greater than 16 octets, additional MD5
calculations are performed, using the previous ciphertext instead of
the Request Authenticator.
More formally:
Call the shared secret S and the pseudo-random 128-bit Request
Authenticator RA. The password is broken into 16-octet blocks p1, p2,
... pn, with the last block padded at the end with '0's to a 16-octet
boundary. The ciphertext blocks are c1, c2... cn.
c1 = p1 XOR MD5(S + RA)
c2 = p2 XOR MD5(S + c1)
.
.
.
cn = pn XOR MD5(S + cn-1)
The User-Password attribute contains c1+c2+...+cn, Where + denotes
concatenation.
2.2 Server Processing
The server receives the RADIUS Access-Request packet and verifies that
the server possesses a shared secret for the client. If the server
does not possess a shared secret for the client, the request is
silently dropped.
Because the server also possesses the shared secret, it can go through
a slightly modified version of the client's protection process on the
User-Password attribute and obtain the unprotected password. It then
uses its authentication database to validate the username and
password. If the password is valid, the server creates an
Access-Accept packet to send back to the client. If the password is
invalid, the server creates an Access-Reject packet to send back to
the client.
Both the Access-Accept packet and the Access-Reject packet use the
same identifier value from the client's Access-Request packet, and put
a Response Authenticator in the Authenticator field. The Response
Authenticator is the is the MD5 hash of the response packet with the
associated request packet's Request Authenticator in the Authenticator
field, concatenated with the shared secret.
That is,
ResponseAuth = MD5(Code+ID+Length+RequestAuth+Attributes+Secret)
where + denotes concatenation.
2.3 Client Post Processing
When the client receives a response packet, it attempts to match it
with an outstanding request using the identifier field. If the client
does not have an outstanding request using the same identifier, the
response is silently discarded. The client then verifies the Response
Authenticator by performing the same Response Authenticator
calculation the server performed, and then comparing the result with
the Authenticator field. If the Response Authenticator does not match,
the packet is silently discarded.
If the client received a verified Access-Accept packet, the username
and password are considered to be correct, and the user is
authenticated. If the client received a verified Access-Reject
message, the username and password are considered to be incorrect, and
the user is not authenticated.
3 RADIUS Issues
The RADIUS protocol has a set of vulnerabilities that are either
caused by the protocol or caused by poor client implementation and
exacerbated by the protocol. The vulnerabilities that follow arose
during a somewhat shallow exploration of the protocol; this is not
expected to be a complete list of vulnerabilities of the RADIUS
protocol, these are merely the vulnerabilities that presented
themselves to the reviewer.
3.1 Response Authenticator Based Shared Secret Attack
The Response Authenticator is essentially an ad hoc MD5 based keyed
hash. This primitive facilitates an attack on the shared secret. If an
attacker observes a valid Access-Request packet and the associated
Access-Accept or Access-Reject packet, they can launch an off-line
exhaustive attack on the shared secret. The attacker can pre-compute
the MD5 state for (Code+ID+Length+RequestAuth+Attributes) and then
resume the hash once for each shared secret guess. The ability to
pre-compute the leading sections of this keyed hash primitive reduces
the computational requirements for a successful attack.
3.2 User-Password Attribute Cipher Design Comments
The User-Password protection scheme is a stream-cipher, where an MD5
hash is used as an ad hoc pseudorandom number generator (PRNG). The
first 16 octets of the stream cipher display the same properties as a
synchronous stream cipher. After the first 16 octets, the stream
cipher state integrates the previous ciphertext, and becomes more
accurately described as a self-synchronizing stream cipher.
The security of the cipher rests on the strength of MD5 for this type
of use and the selection of the shared secret. It is unclear what the
requirements for this cipher are, so it is unclear if the MD5 function
is appropriate for this use. MD5 is not designed to be a stream cipher
primitive, it is designed to be a cryptographic hash. This sort of
misuse of cryptographic primitives often leads to subtly flawed
systems.
3.3 User-Password Attribute Based Shared Secret Attack
Because of the selection of a stream cipher for protection of
the User-Password attribute, an attacker can gain information
about the Shared Secret if they can observe network traffic and
attempt an authentication. The attacker attempts to authenticate to
the client with a known password. The attacker then captures the
resulting Access-Request packet and XORs the protected portion of
the User-Password attribute with the password they provided to the
client. This results in the value of the MD5(Shared Secret + Request
Authenticator) operation. The Request Authenticator is known (it is
in the client's Access-Request packet), so the attacker can launch an
off-line exhaustive attack on the shared secret. Note, though, that the
attacker cannot pre-compute the MD5 state of the hash for the Request
Authenticator, because the Request Authenticator is hashed second.
3.4 User-Password Based Password Attack
The use of a stream cipher to protect the User-Password attribute
results in a vulnerability that allows an attacker to circumvent
any authentication rate limits imposed by the client. The attacker
first attempts to authenticate to the client using a valid username
and a known (and likely incorrect) user password. The attacker then
captures the resulting Access-Request packet and determines the
result of the MD5(Shared Secret + Request Authenticator) operation
(in the same way as in the previous attack). The attacker can then
replay modified Access-Request packets, using the same Request
Authenticator and MD5(Shared Secret + Request Authenticator) value,
changing the password (and the associated User-Password attribute) for
each replay. If the server does not impose user based rate limits,
this will allow the attacker to efficiently perform an exhaustive
search for the correct user password.
Note that the attacker can only use this method to attack passwords
that are 16 characters or less, as the User-Password protection
mechanism uses a chaining method that includes previous ciphertext
in the state after the first 16 octets of output.
Any sort of strong data authentication in the Access-Request packet
would make this attack impossible.
3.5 Request Authenticator Based Attacks
The security of RADIUS depends on the generation of the Request
Authenticator field. The Request Authenticator must be both unique
and non-predictable in order for the RADIUS implementation to be
secure. The RADIUS protocol specification does not emphasize the
importance of the Request Authenticator generation, so there are a
large number of implementations that use poor PRNGs to generate the
Request Authenticator. If the client uses a PRNG that repeats values
(or has a short cycle), the protocol ceases to provide the intended
level of protection.
The last two of these attacks require the attacker to cause the
client to produce a particular identifier value. This is generally not
particularly difficult, as identifiers were never meant as a security
feature. The actual method of identifier generation is not specified by
the protocol specification, but the most common method of generating
the identifier is to increment a one octet counter for each request,
and include the counter value as the identifier. Because the identifier
generation is normally deterministic, it often doesn't increase the
work factor very much at all. An attacker can insert a series of extra
requests to the client, forcing the desired identifier to reoccur much
more rapidly than it would normally. Even if the identifier were not
generated in a readily attackable way, it would still only increase
the work factor by 256 times.
3.5.1 Passive User-Password Compromise Through Repeated Request
Authenticators
If the attacker can sniff the traffic between the RADIUS client
and the RADIUS server, they can passively produce a dictionary of
Request Authenticators, and the associated (protected) User-Password
attributes. If the attacker observes a repeated Request Authenticator,
they can remove any influence of the Shared Secret from the first 16
octets of the passwords by XORing the first 16 octets of the protected
passwords together. This yields the first 16 octets of the two (now
unprotected) user passwords XORed together.
The impact of this attack varies according to how good the user
passwords are. If the users all chose random passwords of the same
length, the attacker can gain nothing because no information about
either password can be extracted. Unfortunately, this is a somewhat
unlikely occurrence. In reality, users choose passwords of varying
lengths (generally less than 16 characters) and of varying quality.
The easiest problem for the attacker to exploit is the case where the
two passwords are of different lengths. Ideally for the attacker, the
passwords are both less than 16 characters long and are significantly
different lengths. In this situation, one of the passwords has more
padding than the other, so the non-overlapping characters of the
longer password are XORed with '0' (the characters do not change).
This results in the non-overlapping characters of the longer password
being exposed to the attacker with no analysis.
More complex attacks are available if the attacker makes the assumption
that the users chose low-entropy passwords. In this situation,
the attacker can perform an intelligent dictionary attack guided by
statistical analysis of the overlapping region. This dictionary attack
can be further refined by noting the length of the two passwords and
the trailing portion of the longer password, and then only trying
passwords with this length and ending.
Even passwords longer than 16 characters are at risk from this attack,
because the attacker still gains information about the first 16
characters of the password. This provides a firm basis for later
attack, if nothing else.
3.5.2 Active User-Password Compromise through Repeated Request
Authenticators
The attacker can attempt to authenticate many times using
known passwords and intercept the generated Access-Request
packets, extracting the Request Authenticator and User-Password
attributes. The Attacker can then XOR the known password with the
User-Password attribute and be left with the MD5(Shared Secret +
Request Authenticator) value. The attacker generates a dictionary
of Request Authenticator values and associated MD5(Shared Secret +
Request Authenticator) values.
When the attacker sees a valid Access-Request packet that has a Request
Authenticator value that is in the attacker's dictionary, the attacker
can recover the first 16 octets from the protected region of the
User-Password field by looking up the associated MD5(Shared Secret +
Request Authenticator) value from the dictionary and XORing it with
the intercepted protected portion of the User-Password attribute.
3.5.3 Replay of Server Responses through Repeated Request Authenticators
The attacker can build a dictionary of Request Authenticators,
identifiers and associated server responses. When the attacker then
sees a request that uses a Request Authenticator (and associated
identifier) that is in the dictionary, the attacker can masquerade
as the server and replay the previously observed server response.
Further, if the attacker can attempt to authenticate, causing the
client to produce an Access-Request packet with the same Request
Authenticator and identifier as a previously observed successful
authentication, the attacker can replay the valid looking Access-Accept
server response and successfully authenticate to the client without
knowing a valid password.
3.5.4 DOS Arising from the Prediction of the Request Authenticator
If the attacker can predict future values of the Request Authenticator,
the attacker can pose as the client and create a dictionary of future
Request Authenticator values (with either the expected identifier,
or with every possible identifier) and associated (presumably
Access-Reject) server responses. The attacker can then masquerade as
the server and respond to the client's (possibly valid) requests with
valid looking Access-Reject packets, creating a denial of service.
3.6 Shared Secret Hygiene
The RADIUS standard specifically permits use of the same Shared Secret
by many clients. This is a very bad idea, as it provides attackers
with more data to work from and allows any flawed client to compromise
several machines. All RADIUS clients that possesses the same shared
secret can be viewed as a single RADIUS client for the purpose of all
these attacks, because no RADIUS protection is applied to the client
or server address.
Most client and server implementations only allow shared secrets
to be input as ASCII strings. There are only 94 different ASCII
characters that can be entered from a standard US style keyboard
(out of the 256 possible). Many implementations also restrict the
total length of the shared secret to 16 characters or less. Both of
these restrictions artificially reduce the size of the keyspace that
an attacker must search in order to guess the shared secret.
4 Conclusions
4.1 Summary Findings
The RADIUS protocol has several interesting issues that arise from
its design. The design and policy characteristics that seem to be
principally responsible for the security problems are as follows:
* The User-Password protection technique is flawed in many ways. It
should not use a stream cipher, and it should not use MD5 as a
cipher primitive. (note 3.2; attacks 3.3, 3.4, 3.5.1, 3.5.2)
* The Response Authenticator is a good idea, but it is poorly
implemented. (attack 3.1)
* The Access-Request packet is not authenticated at all. (attack
3.4)
* Many client implementations do not create Request Authenticators
that are sufficiently random. (all attacks in 3.5)
* Many administrators choose RADIUS shared secrets with insufficient
information entropy. Many client and host implementations
artificially limit the shared secret key space. (note 3.6)
4.2 Suggested Protocol Additions
Selection of a well understood symmetric block cipher to protect
the user password would be good practice. A new User-Password like
attribute that uses an alternate encryption scheme should be created.
I suggest TDES (as specified in ANSI X9.52) used in CBC mode. If this
new attribute is used, the User-Password attribute should not be.
Ideally the block cipher would be keyed independently from the shared
secret, but this may prove unworkable for compatibility reasons.
Another option would be to key the cipher from some derived value
of the shared secret and the request authenticator. For instance
the cipher could be keyed from the output of an HMAC of the Request
Authenticator (where the HMAC is keyed by the shared secret) or by
seeding a cryptographic PRNG with the shared secret and the request
authenticator.
Instead of using an ad hoc keyed hash primitive in the Response
Authenticator, an accepted Message Authentication Code (MAC) should be
used. An HMAC would be an ideal choice for this primitive. In addition,
the Access-Request packet would benefit from authentication.
Though MD5 is a cryptographic hash that could be used in the HMAC
primitive, it has several significant attacks against it. The RADIUS
protocol would benefit from using SHA-1 instead of MD5 for HMACs.
In order to protect the Access-Request, Access-Accept and Access-Deny
packets, a new attribute should be created that contains a SHA-1-HMAC
of the entire RADIUS packet (with the SHA-1-HMAC attribute data set
to 0). If this attribute is present, the receiving client or server
should compute the HMAC for the entire RADIUS packet (with the HMAC
set to zeros) and verify that the result is the same as the stored
HMAC. If the result is not the same, the packet should be discarded.
When the server generates a RADIUS Access-Accept or Access-Reject
packet with a SHA-1-HMAC, it should set the Response Authenticator
to the associated Request Authenticator. If a client receives a
RADIUS Access-Accept or Access-Reject packet that has the SHA-1-HMAC
attribute, it should not test for the validity of the Response
Authenticator.
When a client generates a RADIUS Access-Request packet, it should
include the SHA-1-HMAC attribute. When the server receives a RADIUS
Access-Request packet, it should verify the SHA-1-HMAC attribute.
4.3 Suggested Client Behavior Modifications
Authenticator Behavior
The RADIUS specification should require a strong cryptographic PRNG
for generation of the Request-Authenticator, such as the PRNG specified
in ANSI X9.17 appendix C or FIPS 186-2, appendix 3.
Shared Secret Behavior
The RADIUS specification should require each RADIUS client use a
different Shared Secret. It should also require the shared secret to
be a random bit string at least 16 octets long that was generated by
a strong cryptographic PRNG.
In order to facilitate entry of this bit string, clients and servers
should allow for input of arbitrary binary data. Quite likely, the
easiest solution is to allow for the entry of hexadecimal digits.
4.4 General Comments
Both servers and clients should support the base RADIUS protocol and
this extended RADIUS protocol. Both the server and the client should
allow the administrator to enable the use of these RADIUS extensions
on a client-by-client basis. This should be an explicit configuration
option, not just an automatic determination made by the server. An
automatic determination made by the server could lead to an attack
where the attacker attempts to force the client/server interactions
into the old RADIUS mode.
If it is not possible to change the RADIUS protocol, the system can
still be made much more secure by just following the suggestions
in section 5.3, which can all be implemented while still remaining
completely compliant with the existing RADIUS protocol.
4.5 Why Modify RADIUS?
So, why attempt to modify RADIUS at all? Why not just go to another
(presumably more modern, more secure) protocol? Well, for the most
part, the answer is "Because such a protocol doesn't currently exist."
In the near future, however, DIAMETER is likely to be released by
the IETF.
DIAMETER is the planned RADIUS replacement. The great majority
of all the protocol work that has gone into DIAMETER has been
directed to removing some of the functional limitations imposed by
the RADIUS protocol. Effectively no work has been done as relates
to the client/server security of the protocol. (CMS is defined,
but this is a security layer for the proxy to proxy interaction,
not the client to proxy/server interaction)
So, does this mean that they continue to use even RADIUS's ad hoc
system? No, they removed all security functionality from the protocol.
They did the protocol designer's equivalent of punting. Section 2.2
of the current DIAMETER protocol spec says: "Diameter clients, such
as Network Access Servers (NASes) and Foreign Agents MUST support IP
Security, and MAY support TLS. Diameter servers MUST support TLS,
but the administrator MAY opt to configure IPSec instead of using
TLS. Operating the Diameter protocol without any security mechanism
is not recommended."
So, all security aspects of the protocol are handled by IPSec and/or
TLS. From a security aspect, this strikes me as a very good idea. Both
IPSec and TLS are fully featured (sometimes too fully featured)
protocols that many people have reviewed. (That's already much better
than RADIUS ever did).
Examining this from a slightly different angle gives me some cause for
concern, however. It strikes me that the overhead imposed by a full
TLS/IPSec implementation is very significant for many current-day
embedded devices. This would seem to indicate that (at least in the
near future) manufactures are going to either continue to use RADIUS or
ignore the DIAMETER standard and perform DIAMETER without TLS or IPSec.
Because of this, I suspect that it would be advantageous to push for
at least minimal RADIUS protocol revision.
5 Previous Work
There has been some independent previous work with the RADIUS protocol:
Attacks 3.5.3 and 3.5.4 are likely the attacks referred to in the
RADIUS RFC.
The known password attack on the shared secret using the
Access-Request packet (attack 3.3) appears to have been first
observed in September, 1996 by Thomas H. Ptacek. Paper #1
[http://skoda.sockpuppet.org/tqbf/radius-security.html]
The known password attack on the shared secret using the
Access-Request packet (attack 3.3), and the shared secret
attack on the Access-Reject and Access-Accept packets (attack
3.1) were independently observed in July, 1997 by Reilly
(rich.friedeman@ANIXTER.COM) Shared Secret Recovery in RADIUS
[http://baroque.sdsu.edu/hyper/sdsu_sec/sdsu_sec.jul97/0004.html]
6 Bibliography
RFC 2138, "Remote Authentication Dial In User Service
(RADIUS)", by C. Rigney, A. Rubens, W. Simpson, S. Willens.
[http://www.ietf.org/rfc/rfc2138.txt]
The DIAMETER Base Protocol
[http://www.ietf.org/internet-drafts/draft-ietf-aaa-diameter-07.txt]
DIAMETER CMS Security Application
[http://www.ietf.org/internet-drafts/draft-ietf-aaa-diameter-cms-sec-02.txt]
FIPS 186-2
[http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf]
The Handbook of Applied Cryptography, by Alfred J Menezes, Paul C. van
Ooschot, Scott A. Vanstone.
[http://www.cacr.math.uwaterloo.ca/hac/index.html]
Chapter 5, chapter 6 and chapter 9. Most notably:
The MD5 based stream cipher as a synchronous stream cipher (6.1.1, ii)
The use of cryptographic functions in pseudorandom number generation
is discussed in section 9.2.6.
The use of a MDC in the creation of a MAC is discussed in 9.5.2.
An Analysis of the TACACS+ Protocol and its Implementations by Solar
Designer
[http://www.openwall.com/advisories/OW-001-tac_plus.txt]
{"id": "SECURITYVULNS:DOC:2177", "bulletinFamily": "software", "title": "An Analysis of the RADIUS Authentication Protocol", "description": "An Analysis of the RADIUS Authentication Protocol\r\n\r\n by Joshua Hill, InfoGard Laboratories [www.infogard.com]\r\n Last Modified Mon Nov 12 16:12:53 PST 2001\r\n\r\n A current HTML version of this paper can be found at:\r\n http://www.untruth.org/~josh/security/radius\r\n\r\n Please send comments to <josh-radius@untruth.org>\r\n\r\n 1 Introduction\r\n \r\n RADIUS is a widely used protocol in network environments. It is\r\n commonly used for embedded network devices such as routers, modem\r\n servers, switches, etc. It is used for several reasons:\r\n \r\n * The embedded systems generally cannot deal with a large number of\r\n users with distinct authentication information. This requires more\r\n storage than many embedded systems possess.\r\n * RADIUS facilitates centralized user administration, which is\r\n important for several of these applications. Many ISPs have tens\r\n of thousands, hundreds of thousands, or even millions of users.\r\n Users are added and deleted continuously throughout the day, and\r\n user authentication information changes constantly. Centralized\r\n administration of users in this setting is an operational\r\n requirement.\r\n * RADIUS consistently provides some level of protection against a\r\n sniffing, active attacker. Other remote authentication protocols\r\n provide either intermittent protection, inadequate protection or\r\n non-existent protection. RADIUS's primary competition for remote\r\n authentication is TACACS+ and LDAP. LDAP natively provides no\r\n protection against sniffing or active attackers. TACACS+ is subtly\r\n flawed, as discussed by Solar Designer in his advisory.\r\n * RADIUS support is nearly omni-present. Other remote authentication\r\n protocols do not have consistent support from hardware vendors,\r\n whereas RADIUS is uniformly supported. Because the platforms on\r\n which RADIUS is implemented on are often embedded systems, there\r\n are limited opportunities to support additional protocols. Any\r\n changes to the RADIUS protocol would have to be at least minimally\r\n compatible with pre-existing (unmodified) RADIUS clients and\r\n servers.\r\n \r\n RADIUS is currently the de-facto standard for remote authentication.\r\n It is very prevalent in both new and legacy systems.\r\n \r\n 1.1 Applicability\r\n \r\n This analysis deals with some of the characteristics of the base\r\n RADIUS protocol and of the User-Password attribute. Depending on the\r\n mode of authentication used, the described User-Password weaknesses\r\n may or may not compromise the security of the underlying\r\n authentication scheme. A complete compromise of the User-Password\r\n attribute would result in the complete compromise of the normal\r\n Username/Password or PAP authentication schemes, because both of these\r\n systems include otherwise unprotected authentication information in\r\n the User-Password attribute. On the other hand when CHAP or a\r\n Challenge/Response system is in use, a complete compromise of the\r\n User-Password attribute would only expose the underlying CHAP or\r\n Challenge/Response information to additional attack, which may or may\r\n not lead to a complete compromise of the authentication system,\r\n depending on the strength of the underlying authentication system.\r\n \r\n This analysis does not cover the RADIUS protocol's accounting\r\n functionality (which is, incidentally, also flawed, but normally\r\n doesn't transport information that must be kept confidential).\r\n \r\n 2 Protocol Summary\r\n \r\n A summary of the RADIUS packet is below (from the RFC):\r\n 0 1 2 3\r\n 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1\r\n +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\r\n | Code | Identifier | Length |\r\n +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\r\n | |\r\n | Authenticator |\r\n | |\r\n | |\r\n +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+\r\n | Attributes ...\r\n +-+-+-+-+-+-+-+-+-+-+-+-+-\r\n\r\n The code establishes the type of RADIUS packet. The codes are:\r\n \r\n Value Description\r\n 1 Access-Request\r\n 2 Access-Accept\r\n 3 Access-Reject\r\n 4 Accounting-Request\r\n 5 Accounting-Response\r\n 11 Access-Challenge\r\n 12 Status-Server (experimental)\r\n 13 Status-Client (experimental)\r\n 255 Reserved\r\n \r\n The identifier is a one octet value that allows the RADIUS client to\r\n match a RADIUS response with the correct outstanding request.\r\n \r\n The attributes section is where an arbitrary number of attribute\r\n fields are stored. The only pertinent attributes for this discussion\r\n are the User-Name and User-Password attributes.\r\n \r\n This description will concentrate on the most common type of RADIUS\r\n exchange: An Access-Request involving a username and user password,\r\n followed by either an Access-Accept, Access-Reject or a failure. I\r\n will refer to the two participants in this protocol as the client and\r\n the server. The client is the entity that has authentication\r\n information that it wishes to validate. The server is the entity that\r\n has access to a database of authentication information that it can use\r\n to validate the client's authentication request.\r\n \r\n 2.1 Initial Client Processing\r\n \r\n The client creates an Access-Request RADIUS packet, including at least\r\n the User-Name and User-Password attributes.\r\n \r\n The Access-Request packet's identifier field is generated by the\r\n client. The generation process for the identifier field is not\r\n specified by the RADIUS protocol specification, but it is usually\r\n implemented as a simple counter that is incremented for each request.\r\n \r\n The Access-Request packet contains a 16 octet Request Authenticator in\r\n the authenticator field. This Request authenticator is a randomly\r\n chosen 16 octet string.\r\n \r\n This packet is completely unprotected, except for the User-Password\r\n attribute, which is protected as follows:\r\n \r\n The client and server share a secret. That shared secret followed by\r\n the Request Authenticator is put through an MD5 hash to create a 16\r\n octet value which is XORed with the password entered by the user. If\r\n the user password is greater than 16 octets, additional MD5\r\n calculations are performed, using the previous ciphertext instead of\r\n the Request Authenticator.\r\n \r\n More formally:\r\n Call the shared secret S and the pseudo-random 128-bit Request\r\n Authenticator RA. The password is broken into 16-octet blocks p1, p2,\r\n ... pn, with the last block padded at the end with '0's to a 16-octet\r\n boundary. The ciphertext blocks are c1, c2... cn.\r\n \r\n c1 = p1 XOR MD5(S + RA)\r\n c2 = p2 XOR MD5(S + c1)\r\n .\r\n .\r\n .\r\n cn = pn XOR MD5(S + cn-1)\r\n \r\n The User-Password attribute contains c1+c2+...+cn, Where + denotes\r\n concatenation.\r\n \r\n 2.2 Server Processing\r\n \r\n The server receives the RADIUS Access-Request packet and verifies that\r\n the server possesses a shared secret for the client. If the server\r\n does not possess a shared secret for the client, the request is\r\n silently dropped.\r\n \r\n Because the server also possesses the shared secret, it can go through\r\n a slightly modified version of the client's protection process on the\r\n User-Password attribute and obtain the unprotected password. It then\r\n uses its authentication database to validate the username and\r\n password. If the password is valid, the server creates an\r\n Access-Accept packet to send back to the client. If the password is\r\n invalid, the server creates an Access-Reject packet to send back to\r\n the client.\r\n \r\n Both the Access-Accept packet and the Access-Reject packet use the\r\n same identifier value from the client's Access-Request packet, and put\r\n a Response Authenticator in the Authenticator field. The Response\r\n Authenticator is the is the MD5 hash of the response packet with the\r\n associated request packet's Request Authenticator in the Authenticator\r\n field, concatenated with the shared secret.\r\n \r\n That is, \r\n ResponseAuth = MD5(Code+ID+Length+RequestAuth+Attributes+Secret) \r\n where + denotes concatenation.\r\n \r\n 2.3 Client Post Processing\r\n \r\n When the client receives a response packet, it attempts to match it\r\n with an outstanding request using the identifier field. If the client\r\n does not have an outstanding request using the same identifier, the\r\n response is silently discarded. The client then verifies the Response\r\n Authenticator by performing the same Response Authenticator\r\n calculation the server performed, and then comparing the result with\r\n the Authenticator field. If the Response Authenticator does not match,\r\n the packet is silently discarded.\r\n \r\n If the client received a verified Access-Accept packet, the username\r\n and password are considered to be correct, and the user is\r\n authenticated. If the client received a verified Access-Reject\r\n message, the username and password are considered to be incorrect, and\r\n the user is not authenticated.\r\n \r\n 3 RADIUS Issues\r\n \r\n The RADIUS protocol has a set of vulnerabilities that are either\r\n caused by the protocol or caused by poor client implementation and\r\n exacerbated by the protocol. The vulnerabilities that follow arose\r\n during a somewhat shallow exploration of the protocol; this is not\r\n expected to be a complete list of vulnerabilities of the RADIUS\r\n protocol, these are merely the vulnerabilities that presented\r\n themselves to the reviewer.\r\n \r\n 3.1 Response Authenticator Based Shared Secret Attack\r\n \r\n The Response Authenticator is essentially an ad hoc MD5 based keyed\r\n hash. This primitive facilitates an attack on the shared secret. If an\r\n attacker observes a valid Access-Request packet and the associated\r\n Access-Accept or Access-Reject packet, they can launch an off-line\r\n exhaustive attack on the shared secret. The attacker can pre-compute\r\n the MD5 state for (Code+ID+Length+RequestAuth+Attributes) and then\r\n resume the hash once for each shared secret guess. The ability to\r\n pre-compute the leading sections of this keyed hash primitive reduces\r\n the computational requirements for a successful attack.\r\n \r\n 3.2 User-Password Attribute Cipher Design Comments\r\n \r\n The User-Password protection scheme is a stream-cipher, where an MD5\r\n hash is used as an ad hoc pseudorandom number generator (PRNG). The\r\n first 16 octets of the stream cipher display the same properties as a\r\n synchronous stream cipher. After the first 16 octets, the stream\r\n cipher state integrates the previous ciphertext, and becomes more\r\n accurately described as a self-synchronizing stream cipher.\r\n \r\n The security of the cipher rests on the strength of MD5 for this type\r\n of use and the selection of the shared secret. It is unclear what the\r\n requirements for this cipher are, so it is unclear if the MD5 function\r\n is appropriate for this use. MD5 is not designed to be a stream cipher\r\n primitive, it is designed to be a cryptographic hash. This sort of\r\n misuse of cryptographic primitives often leads to subtly flawed\r\n systems.\r\n \r\n 3.3 User-Password Attribute Based Shared Secret Attack\r\n \r\n Because of the selection of a stream cipher for protection of\r\n the User-Password attribute, an attacker can gain information\r\n about the Shared Secret if they can observe network traffic and\r\n attempt an authentication. The attacker attempts to authenticate to\r\n the client with a known password. The attacker then captures the\r\n resulting Access-Request packet and XORs the protected portion of\r\n the User-Password attribute with the password they provided to the\r\n client. This results in the value of the MD5(Shared Secret + Request\r\n Authenticator) operation. The Request Authenticator is known (it is\r\n in the client's Access-Request packet), so the attacker can launch an\r\n off-line exhaustive attack on the shared secret. Note, though, that the\r\n attacker cannot pre-compute the MD5 state of the hash for the Request\r\n Authenticator, because the Request Authenticator is hashed second.\r\n\r\n 3.4 User-Password Based Password Attack\r\n\r\n The use of a stream cipher to protect the User-Password attribute\r\n results in a vulnerability that allows an attacker to circumvent\r\n any authentication rate limits imposed by the client. The attacker\r\n first attempts to authenticate to the client using a valid username\r\n and a known (and likely incorrect) user password. The attacker then\r\n captures the resulting Access-Request packet and determines the\r\n result of the MD5(Shared Secret + Request Authenticator) operation\r\n (in the same way as in the previous attack). The attacker can then\r\n replay modified Access-Request packets, using the same Request\r\n Authenticator and MD5(Shared Secret + Request Authenticator) value,\r\n changing the password (and the associated User-Password attribute) for\r\n each replay. If the server does not impose user based rate limits,\r\n this will allow the attacker to efficiently perform an exhaustive\r\n search for the correct user password.\r\n\r\n Note that the attacker can only use this method to attack passwords\r\n that are 16 characters or less, as the User-Password protection\r\n mechanism uses a chaining method that includes previous ciphertext\r\n in the state after the first 16 octets of output.\r\n\r\n Any sort of strong data authentication in the Access-Request packet\r\n would make this attack impossible.\r\n\r\n 3.5 Request Authenticator Based Attacks\r\n\r\n The security of RADIUS depends on the generation of the Request\r\n Authenticator field. The Request Authenticator must be both unique\r\n and non-predictable in order for the RADIUS implementation to be\r\n secure. The RADIUS protocol specification does not emphasize the\r\n importance of the Request Authenticator generation, so there are a\r\n large number of implementations that use poor PRNGs to generate the\r\n Request Authenticator. If the client uses a PRNG that repeats values\r\n (or has a short cycle), the protocol ceases to provide the intended\r\n level of protection.\r\n\r\n The last two of these attacks require the attacker to cause the\r\n client to produce a particular identifier value. This is generally not\r\n particularly difficult, as identifiers were never meant as a security\r\n feature. The actual method of identifier generation is not specified by\r\n the protocol specification, but the most common method of generating\r\n the identifier is to increment a one octet counter for each request,\r\n and include the counter value as the identifier. Because the identifier\r\n generation is normally deterministic, it often doesn't increase the\r\n work factor very much at all. An attacker can insert a series of extra\r\n requests to the client, forcing the desired identifier to reoccur much\r\n more rapidly than it would normally. Even if the identifier were not\r\n generated in a readily attackable way, it would still only increase\r\n the work factor by 256 times.\r\n\r\n 3.5.1 Passive User-Password Compromise Through Repeated Request\r\n Authenticators\r\n\r\n If the attacker can sniff the traffic between the RADIUS client\r\n and the RADIUS server, they can passively produce a dictionary of\r\n Request Authenticators, and the associated (protected) User-Password\r\n attributes. If the attacker observes a repeated Request Authenticator,\r\n they can remove any influence of the Shared Secret from the first 16\r\n octets of the passwords by XORing the first 16 octets of the protected\r\n passwords together. This yields the first 16 octets of the two (now\r\n unprotected) user passwords XORed together.\r\n\r\n The impact of this attack varies according to how good the user\r\n passwords are. If the users all chose random passwords of the same\r\n length, the attacker can gain nothing because no information about\r\n either password can be extracted. Unfortunately, this is a somewhat\r\n unlikely occurrence. In reality, users choose passwords of varying\r\n lengths (generally less than 16 characters) and of varying quality.\r\n\r\n The easiest problem for the attacker to exploit is the case where the\r\n two passwords are of different lengths. Ideally for the attacker, the\r\n passwords are both less than 16 characters long and are significantly\r\n different lengths. In this situation, one of the passwords has more\r\n padding than the other, so the non-overlapping characters of the\r\n longer password are XORed with '0' (the characters do not change).\r\n This results in the non-overlapping characters of the longer password\r\n being exposed to the attacker with no analysis.\r\n\r\n More complex attacks are available if the attacker makes the assumption\r\n that the users chose low-entropy passwords. In this situation,\r\n the attacker can perform an intelligent dictionary attack guided by\r\n statistical analysis of the overlapping region. This dictionary attack\r\n can be further refined by noting the length of the two passwords and\r\n the trailing portion of the longer password, and then only trying\r\n passwords with this length and ending.\r\n\r\n Even passwords longer than 16 characters are at risk from this attack,\r\n because the attacker still gains information about the first 16\r\n characters of the password. This provides a firm basis for later\r\n attack, if nothing else.\r\n\r\n 3.5.2 Active User-Password Compromise through Repeated Request\r\n Authenticators\r\n\r\n The attacker can attempt to authenticate many times using\r\n known passwords and intercept the generated Access-Request\r\n packets, extracting the Request Authenticator and User-Password\r\n attributes. The Attacker can then XOR the known password with the\r\n User-Password attribute and be left with the MD5(Shared Secret +\r\n Request Authenticator) value. The attacker generates a dictionary\r\n of Request Authenticator values and associated MD5(Shared Secret +\r\n Request Authenticator) values.\r\n\r\n When the attacker sees a valid Access-Request packet that has a Request\r\n Authenticator value that is in the attacker's dictionary, the attacker\r\n can recover the first 16 octets from the protected region of the\r\n User-Password field by looking up the associated MD5(Shared Secret +\r\n Request Authenticator) value from the dictionary and XORing it with\r\n the intercepted protected portion of the User-Password attribute.\r\n\r\n 3.5.3 Replay of Server Responses through Repeated Request Authenticators\r\n\r\n The attacker can build a dictionary of Request Authenticators,\r\n identifiers and associated server responses. When the attacker then\r\n sees a request that uses a Request Authenticator (and associated\r\n identifier) that is in the dictionary, the attacker can masquerade\r\n as the server and replay the previously observed server response.\r\n\r\n Further, if the attacker can attempt to authenticate, causing the\r\n client to produce an Access-Request packet with the same Request\r\n Authenticator and identifier as a previously observed successful\r\n authentication, the attacker can replay the valid looking Access-Accept\r\n server response and successfully authenticate to the client without\r\n knowing a valid password.\r\n\r\n 3.5.4 DOS Arising from the Prediction of the Request Authenticator\r\n\r\n If the attacker can predict future values of the Request Authenticator,\r\n the attacker can pose as the client and create a dictionary of future\r\n Request Authenticator values (with either the expected identifier,\r\n or with every possible identifier) and associated (presumably\r\n Access-Reject) server responses. The attacker can then masquerade as\r\n the server and respond to the client's (possibly valid) requests with\r\n valid looking Access-Reject packets, creating a denial of service.\r\n\r\n 3.6 Shared Secret Hygiene\r\n\r\n The RADIUS standard specifically permits use of the same Shared Secret\r\n by many clients. This is a very bad idea, as it provides attackers\r\n with more data to work from and allows any flawed client to compromise\r\n several machines. All RADIUS clients that possesses the same shared\r\n secret can be viewed as a single RADIUS client for the purpose of all\r\n these attacks, because no RADIUS protection is applied to the client\r\n or server address.\r\n\r\n Most client and server implementations only allow shared secrets\r\n to be input as ASCII strings. There are only 94 different ASCII\r\n characters that can be entered from a standard US style keyboard\r\n (out of the 256 possible). Many implementations also restrict the\r\n total length of the shared secret to 16 characters or less. Both of\r\n these restrictions artificially reduce the size of the keyspace that\r\n an attacker must search in order to guess the shared secret.\r\n\r\n 4 Conclusions\r\n\r\n 4.1 Summary Findings\r\n\r\n The RADIUS protocol has several interesting issues that arise from\r\n its design. The design and policy characteristics that seem to be\r\n principally responsible for the security problems are as follows:\r\n * The User-Password protection technique is flawed in many ways. It\r\n should not use a stream cipher, and it should not use MD5 as a\r\n cipher primitive. (note 3.2; attacks 3.3, 3.4, 3.5.1, 3.5.2)\r\n * The Response Authenticator is a good idea, but it is poorly\r\n implemented. (attack 3.1)\r\n * The Access-Request packet is not authenticated at all. (attack\r\n 3.4)\r\n * Many client implementations do not create Request Authenticators\r\n that are sufficiently random. (all attacks in 3.5)\r\n * Many administrators choose RADIUS shared secrets with insufficient\r\n information entropy. Many client and host implementations\r\n artificially limit the shared secret key space. (note 3.6)\r\n\r\n 4.2 Suggested Protocol Additions\r\n\r\n Selection of a well understood symmetric block cipher to protect\r\n the user password would be good practice. A new User-Password like\r\n attribute that uses an alternate encryption scheme should be created.\r\n I suggest TDES (as specified in ANSI X9.52) used in CBC mode. If this\r\n new attribute is used, the User-Password attribute should not be.\r\n\r\n Ideally the block cipher would be keyed independently from the shared\r\n secret, but this may prove unworkable for compatibility reasons.\r\n Another option would be to key the cipher from some derived value\r\n of the shared secret and the request authenticator. For instance\r\n the cipher could be keyed from the output of an HMAC of the Request\r\n Authenticator (where the HMAC is keyed by the shared secret) or by\r\n seeding a cryptographic PRNG with the shared secret and the request\r\n authenticator.\r\n\r\n Instead of using an ad hoc keyed hash primitive in the Response\r\n Authenticator, an accepted Message Authentication Code (MAC) should be\r\n used. An HMAC would be an ideal choice for this primitive. In addition,\r\n the Access-Request packet would benefit from authentication.\r\n\r\n Though MD5 is a cryptographic hash that could be used in the HMAC\r\n primitive, it has several significant attacks against it. The RADIUS\r\n protocol would benefit from using SHA-1 instead of MD5 for HMACs.\r\n\r\n In order to protect the Access-Request, Access-Accept and Access-Deny\r\n packets, a new attribute should be created that contains a SHA-1-HMAC\r\n of the entire RADIUS packet (with the SHA-1-HMAC attribute data set\r\n to 0). If this attribute is present, the receiving client or server\r\n should compute the HMAC for the entire RADIUS packet (with the HMAC\r\n set to zeros) and verify that the result is the same as the stored\r\n HMAC. If the result is not the same, the packet should be discarded.\r\n\r\n When the server generates a RADIUS Access-Accept or Access-Reject\r\n packet with a SHA-1-HMAC, it should set the Response Authenticator\r\n to the associated Request Authenticator. If a client receives a\r\n RADIUS Access-Accept or Access-Reject packet that has the SHA-1-HMAC\r\n attribute, it should not test for the validity of the Response\r\n Authenticator.\r\n\r\n When a client generates a RADIUS Access-Request packet, it should\r\n include the SHA-1-HMAC attribute. When the server receives a RADIUS\r\n Access-Request packet, it should verify the SHA-1-HMAC attribute.\r\n\r\n 4.3 Suggested Client Behavior Modifications\r\n\r\n Authenticator Behavior\r\n\r\n The RADIUS specification should require a strong cryptographic PRNG\r\n for generation of the Request-Authenticator, such as the PRNG specified\r\n in ANSI X9.17 appendix C or FIPS 186-2, appendix 3.\r\n\r\n Shared Secret Behavior\r\n\r\n The RADIUS specification should require each RADIUS client use a\r\n different Shared Secret. It should also require the shared secret to\r\n be a random bit string at least 16 octets long that was generated by\r\n a strong cryptographic PRNG.\r\n\r\n In order to facilitate entry of this bit string, clients and servers\r\n should allow for input of arbitrary binary data. Quite likely, the\r\n easiest solution is to allow for the entry of hexadecimal digits.\r\n\r\n 4.4 General Comments\r\n\r\n Both servers and clients should support the base RADIUS protocol and\r\n this extended RADIUS protocol. Both the server and the client should\r\n allow the administrator to enable the use of these RADIUS extensions\r\n on a client-by-client basis. This should be an explicit configuration\r\n option, not just an automatic determination made by the server. An\r\n automatic determination made by the server could lead to an attack\r\n where the attacker attempts to force the client/server interactions\r\n into the old RADIUS mode.\r\n\r\n If it is not possible to change the RADIUS protocol, the system can\r\n still be made much more secure by just following the suggestions\r\n in section 5.3, which can all be implemented while still remaining\r\n completely compliant with the existing RADIUS protocol.\r\n\r\n 4.5 Why Modify RADIUS?\r\n\r\n So, why attempt to modify RADIUS at all? Why not just go to another\r\n (presumably more modern, more secure) protocol? Well, for the most\r\n part, the answer is "Because such a protocol doesn't currently exist."\r\n In the near future, however, DIAMETER is likely to be released by\r\n the IETF.\r\n\r\n DIAMETER is the planned RADIUS replacement. The great majority\r\n of all the protocol work that has gone into DIAMETER has been\r\n directed to removing some of the functional limitations imposed by\r\n the RADIUS protocol. Effectively no work has been done as relates\r\n to the client/server security of the protocol. (CMS is defined,\r\n but this is a security layer for the proxy to proxy interaction,\r\n not the client to proxy/server interaction)\r\n\r\n So, does this mean that they continue to use even RADIUS's ad hoc\r\n system? No, they removed all security functionality from the protocol.\r\n They did the protocol designer's equivalent of punting. Section 2.2\r\n of the current DIAMETER protocol spec says: "Diameter clients, such\r\n as Network Access Servers (NASes) and Foreign Agents MUST support IP\r\n Security, and MAY support TLS. Diameter servers MUST support TLS,\r\n but the administrator MAY opt to configure IPSec instead of using\r\n TLS. Operating the Diameter protocol without any security mechanism\r\n is not recommended."\r\n\r\n So, all security aspects of the protocol are handled by IPSec and/or\r\n TLS. From a security aspect, this strikes me as a very good idea. Both\r\n IPSec and TLS are fully featured (sometimes too fully featured)\r\n protocols that many people have reviewed. (That's already much better\r\n than RADIUS ever did).\r\n\r\n Examining this from a slightly different angle gives me some cause for\r\n concern, however. It strikes me that the overhead imposed by a full\r\n TLS/IPSec implementation is very significant for many current-day\r\n embedded devices. This would seem to indicate that (at least in the\r\n near future) manufactures are going to either continue to use RADIUS or\r\n ignore the DIAMETER standard and perform DIAMETER without TLS or IPSec.\r\n\r\n Because of this, I suspect that it would be advantageous to push for\r\n at least minimal RADIUS protocol revision.\r\n\r\n 5 Previous Work\r\n\r\n There has been some independent previous work with the RADIUS protocol:\r\n\r\n Attacks 3.5.3 and 3.5.4 are likely the attacks referred to in the\r\n RADIUS RFC.\r\n\r\n The known password attack on the shared secret using the\r\n Access-Request packet (attack 3.3) appears to have been first\r\n observed in September, 1996 by Thomas H. Ptacek. Paper #1\r\n [http://skoda.sockpuppet.org/tqbf/radius-security.html]\r\n\r\n The known password attack on the shared secret using the\r\n Access-Request packet (attack 3.3), and the shared secret\r\n attack on the Access-Reject and Access-Accept packets (attack\r\n 3.1) were independently observed in July, 1997 by Reilly\r\n (rich.friedeman@ANIXTER.COM) Shared Secret Recovery in RADIUS\r\n [http://baroque.sdsu.edu/hyper/sdsu_sec/sdsu_sec.jul97/0004.html]\r\n\r\n 6 Bibliography\r\n\r\n RFC 2138, "Remote Authentication Dial In User Service\r\n (RADIUS)", by C. Rigney, A. Rubens, W. Simpson, S. Willens.\r\n [http://www.ietf.org/rfc/rfc2138.txt]\r\n\r\n The DIAMETER Base Protocol\r\n [http://www.ietf.org/internet-drafts/draft-ietf-aaa-diameter-07.txt]\r\n\r\n DIAMETER CMS Security Application\r\n [http://www.ietf.org/internet-drafts/draft-ietf-aaa-diameter-cms-sec-02.txt]\r\n\r\n FIPS 186-2\r\n [http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf]\r\n\r\n \r\n The Handbook of Applied Cryptography, by Alfred J Menezes, Paul C. van\r\n Ooschot, Scott A. Vanstone.\r\n [http://www.cacr.math.uwaterloo.ca/hac/index.html]\r\n Chapter 5, chapter 6 and chapter 9. Most notably:\r\n The MD5 based stream cipher as a synchronous stream cipher (6.1.1, ii)\r\n The use of cryptographic functions in pseudorandom number generation\r\n is discussed in section 9.2.6.\r\n The use of a MDC in the creation of a MAC is discussed in 9.5.2.\r\n \r\n An Analysis of the TACACS+ Protocol and its Implementations by Solar\r\n Designer\r\n [http://www.openwall.com/advisories/OW-001-tac_plus.txt]\r\n", "published": "2001-11-13T00:00:00", "modified": "2001-11-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:2177", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:05", "edition": 1, "viewCount": 48, "enchantments": {"score": {"value": 2.2, "vector": "NONE"}, "dependencies": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:1563"]}], "rev": 4}, "backreferences": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:1563"]}]}, "exploitation": null, "vulnersScore": 2.2}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645567767}}