[cisco-nas] >255 radius requests = bug?

Aaron Leonard Aaron at Cisco.COM
Fri May 28 17:40:13 EDT 2004


Hi Tassos,

Sure sounds like this is a security anomaly.

The good news is that this problem is addressed in current 
IOS (12.2(11)T and above) via CSCdu53246, "RADIUS - ID wraparounds 
should use new source ports".

Aaron


> -------------
> LNS terminating 500+ adsl users.
> The tunnel goes down/up, so all users are trying again to authenticate simultaneusly.
> Radius server isn't able to handle all those requests, so some udp packets are dropped.
> Router has to retransmit all these requests that aren't replied.
> Since unique-id is only 8 bits, we can have 255 concurrent unique access-requests.
 
> Router sends a access-request using an id and at the same time the radius is using the same id
> in order to reply to the router for a previous request (which also had this id).
> So the router thinks that this reply from the radius is about the last request,
> but this is actually for the previous request (both had the same  id).
 
> The result
> ----------
> A user which is not allowed to login, will be authenticated normally and
> will get all radius attributes of another user (who is allowed to login)!!!
 
> Can the above result be considered a bug from router's side?
> Is this the way radius authentication is supposed to work?
> If yes, how can something like this be considered secure?


More information about the cisco-nas mailing list