public:2021-10_advisory_mutual_authentication_server_certificate_validation
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| public:2021-10_advisory_mutual_authentication_server_certificate_validation [2021/10/07 15:54] – lolaharrejisc | public:2021-10_advisory_mutual_authentication_server_certificate_validation [2021/10/12 13:46] (current) – lolaharrejisc | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| - | Published: | + | Published: |
| **This advisory applies to all organisations providing a Home or Home and Visited (Wi-Fi) service.** | **This advisory applies to all organisations providing a Home or Home and Visited (Wi-Fi) service.** | ||
| Line 21: | Line 21: | ||
| **There are no reports of this vulnerability being actively exploited.** | **There are no reports of this vulnerability being actively exploited.** | ||
| - | Apple iOS devices that have accepted | + | Managed |
| - | Devices configured with a profile installed via Group Policy or MDM should not be affected as these profiles ought to contain one or more root certificates, | + | Non-managed Apple iOS devices |
| The article also refers to the use of plain-text credentials inside the EAP (Extensible Authentication Protocol) mechanism, known as PAP (Password Authentication Protocol). PAP is no longer widely used or recommended. The only EAP mechanism to use PAP is EAP-TTLS, whereas the commonly deployed PEAP protocol uses the MSCHAPv2 password mechanism, which, as the article points out, is based on a challenge-response model and is not vulnerable to this risk. | The article also refers to the use of plain-text credentials inside the EAP (Extensible Authentication Protocol) mechanism, known as PAP (Password Authentication Protocol). PAP is no longer widely used or recommended. The only EAP mechanism to use PAP is EAP-TTLS, whereas the commonly deployed PEAP protocol uses the MSCHAPv2 password mechanism, which, as the article points out, is based on a challenge-response model and is not vulnerable to this risk. | ||
| Line 31: | Line 31: | ||
| * Discontinuing the use of EAP-TTLS/ | * Discontinuing the use of EAP-TTLS/ | ||
| * Discouraging the use of ad-hoc instructions that limit themselves to TOFU, as well as those which recommend, on versions of Android older than 11, the use of the 'Do not validate' | * Discouraging the use of ad-hoc instructions that limit themselves to TOFU, as well as those which recommend, on versions of Android older than 11, the use of the 'Do not validate' | ||
| - | * Jisc would like to encourage all UK govroam operators who operate a 'Home Only' or 'Home and Visited' | + | * Jisc would like to encourage all UK govroam operators who operate a 'Home Only' or 'Home and Visited' |
| - | + | ||
| - | The govroam team at Jisc would be happy to advise if you are unsure. | + | |
| Please contact us at **govroam@jisc.ac.uk** if you have any questions or concerns. | Please contact us at **govroam@jisc.ac.uk** if you have any questions or concerns. | ||
public/2021-10_advisory_mutual_authentication_server_certificate_validation.1633622046.txt.gz · Last modified: 2021/10/07 15:54 by lolaharrejisc
