Selective removal of the Message-Authenticator AVP from the Radius server replies
ryslink at dialtelecom.cz
ryslink at dialtelecom.cz
Sun Oct 20 14:30:48 UTC 2024
Hello,
It seems that since version 3.2.6, Freeradius always sends the
Message-Authenticator AVP, as discussed in the thread below (I did
search the conference, but did not find anything more relevant).
I have upgraded the freeradius version on the server this weekend, and I
have number of customer complaints whose obsolete BRASes fail to process
replies containing the M-A AVP. Hence, I would need to selectively
remove them from the replies - I tried to do it via the update-reply in
the post-auth section of the configuration
update reply {
Message-Authenticator !* ANY
}
, but examining the packets via radsniff, the replies still do contain
the M-A AVP.
Could you please kindly advise on how to best remove the M-A attribute
via the server configuration?
Thank you very much in advance.
--
Regards,
Daniel Ryšlink
Dne 19-Sep-24 v 13:27 Alan DeKok napsal(a):
> On Sep 19, 2024, at 4:21 AM, Bjørn Mork via Freeradius-Users<freeradius-users at lists.freeradius.org> wrote:
>> Unsurprisingly, many router vendors are still trying to implement the
>> BlastRADIUS recommendations in their RADIUS clients. With "interesting"
>> effects as a result.
> Vendors are "special". There was one I found which would discard packets which contained Message-Authenticator.
>
> Why? "It's unexpected". <sigh>
>
>> I got a complaint yesterday that vendor A now requires M-A in the
>> Accept-Accept, or the session is rejected. I guess that's good. We were
>> running 3.2.2 on the servers in question. An upgrade was obviously long
>> overdue in any case, so I upgraded to 3.2.6. And everything was fine.
>> For several minutes.
>>
>> Then it turned out that vendor C also must have been working on their
>> BlastRADIUS implementation. Unfortunately, it seems that they only got
>> as far as to make the authentication process crash if the Access-Accept
>> includes M-A. Nice work!
> :(
>
>> How are we supposed to handle real world vendors like that? It would be
>> nice to have some fine grained M-A enable/disable knobs. E.g. by client
>> or account (virtual internal attribute?). By client will not work well
>> for proxied requests, so that's probably not sufficient.
> Vendors should just fix their products. It's not hard. Message-Authenticator has been defined for 20+ years. It's not rocket surgery.
>
>> Will of course also work with the vendor, but that takes time. And we
>> have a number of routers to upgrade before it's done. Testing is a bit
>> of a hassle when we have to switch FR versions to enable/disable M-A
>> (unless we cheat with a proxy filter).
> Arg.
>
> I _really_ don't want to add more configuration flags to work around broken vendor equipment. That kind of nonsense tends to hang around for decades, because vendors go "well, there's a flag to work around it, so we don't have to fix our products!"
>
> I'll see if there's a good solution, but I suspect not. If vendors could ship products which aren't garbage, that would be great...
>
> Alan DeKok.
>
> -
> List info/subscribe/unsubscribe? Seehttp://www.freeradius.org/list/users.html
More information about the Freeradius-Users
mailing list