Windows Slow EAP-TLS Authentication
    Alan DeKok 
    aland at deployingradius.com
       
    Wed Sep 18 12:03:35 UTC 2024
    
    
  
On Sep 18, 2024, at 12:49 AM, George Benjin <george.benjin at gmail.com> wrote:
> 
> You need to be very careful running a RADIUS server in Azure if you're
> using RADIUS/UDP.
> 
> Azure has a network security feature on by default that drops
> fragmented UDP packets that arrive out of order. This negatively
> impacts RADIUS/UDP traffic.
  Yes, that's a serious issue.  The solution would be to use RADIUS/TLS.
> Another thing to be wary of is setting 'tls_max_version' to 1.3.
> Windows 11 supports TLS 1.3 by default for EAP-TLS etc but does not
> yet support session resumption when using this protocol (see
> https://learn.microsoft.com/en-us/windows-server/networking/technologies/extensible-authentication-protocol/windows-11-changes).
> It's worth dropping the Max version to 1.2.
  I had discussions with Microsoft a year or so about this.  They were very happy to tell me that they had decided to not implement session resumption for TLS 1.3.  They were not happy when I explained it was 100% necessary for many environments.
  A year later, "yeah, we'll fix it eventually".
  That's not useful.
  Alan DeKok.
    
    
More information about the Freeradius-Users
mailing list