Bug 52860 - Radius connection fails with last Android 11 update
Radius connection fails with last Android 11 update
Status: NEW
Product: UCS
Classification: Unclassified
Component: Radius
UCS 4.4
Other Linux
: P5 normal (vote)
: ---
Assigned To: UCS maintainers
UCS maintainers
https://www.itweb.co.za/content/mYZRX...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-03-01 11:59 CET by Oliver Friedrich
Modified: 2021-03-03 15:52 CET (History)
1 user (show)

See Also:
What kind of report is it?: Bug Report
What type of bug is this?: 5: Major Usability: Impairs usability in key scenarios
Who will be affected by this bug?: 1: Will affect a very few installed domains
How will those affected feel about the bug?: 2: A Pain – users won’t like this once they notice it
User Pain: 0.057
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Mobile devices/tablets, Security
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Oliver Friedrich univentionstaff 2021-03-01 11:59:43 CET
Since the last Android 11 update (December 2020) it is not possible to connect to the Radius-Server provided by UCS@School.

This update blocks the skipping of legacy certificate technologies like PEAP, which is still used as default in our freeradius configuration.

Suggestion:
provide a way to provide valid freeradius certificates to the clients
Comment 2 Erik Damrose univentionstaff 2021-03-03 10:43:17 CET
I think this is a regular Bug, not a security issue - although the bug originates from changed security handling in Android.

I also reset the internal bug flags, see e.g. here for criteria when to set them.
https://hutten.knut.univention.de/mediawiki/index.php/Priorisierung_in_der_Entwicklung#Waiting_Support
Comment 3 Jürn Brodersen univentionstaff 2021-03-03 15:52:02 CET
By default the radius server uses the computer certificate. Which means android needs the ucsCA root certificate. That certificate can be downloaded from the hamburger menu on the portal page.

Other certificates can be configured with the ucr keys "freeradius/conf/certificate/file" and "freeradius/conf/private/key/file"

You might want to consider using a certificate signed by a public ca. That way you don't have to install a new cert on the supplicant (wifi client), you only have to configure for which dns name that cert was issued.
Please note the following draw backs:
- If the dns name is not configured on the supplicant (at least android 10 forces you to configure one) it would accept any cert signed by a public ca. Making this as secure as not configuring a cert at all.
- The public ca might not allow the use of the certificate with eap and revoke it (See also extended key usage id-kp-eapOverLAN).

We do need to document this.