| FNGi statement on Shellshock and DHCPatriot systems | 2014-09-26 10:35:01 |
FNGi statement on DHCPatriot Systems vulnerability to CVE-2014-6271 and CVE-2014-7169 (aka Shellshock): National Vulnerability Database:
CVE-2014-6271 and
CVE-2014-7169
By now, many of you have probably heard of the Shellshock scare (Shellshock).
Of the possible attack vectors, there are two services that run on the DHCPatriot system. These are the Apache Web Server and OpenSSH. Both of these have specific exploitable features
(CGI bin program execution in Apache and ForceCommand in OpenSSH) which are not enabled on the DHCPatriot system. The third known attack vector, DHCP client, is not installed on the DHCPatriot system.
Therefore, rest assured that your DHCPatriot system is not vulnerable to this exploit.
When a patch for affected versions of GNU Bash is released, we will implement this as a safety precaution. As of the time of this writing, only Redhat Enterprise Linux has released a patch for this
GNU Bash vulnerability.
|
| -Darren |
| DHCPatriot 5.4.0 enters beta | 2014-08-20 14:33:13 |
DHCPatriot 5.4.0 has entered beta. We will be contacting
specific system owners and asking them to join our beta test
period. If You would like to be a beta tester, please contact us
at dhcpatriot@network1.net or 800-578-6381 opt. 3
Here are the changes in 5.4.0:
- When unsuspending a user device in Auth
DHCP Actions -> Suspend User, the limit displayed entries
was not saved during the unsuspend process. This has been
corrected and list limits are now remembered as user devices
are unsuspended.
- IPv6 logins to the web administration interface
were impossible. This was traced to storage of the remote IP
address being to small. The size has been increased so that it
can store IPv6 addresses. The DHCPatriot system can now be
administered from an IPv6 address.
- Discovered that there was a problem where
sometimes cron would no longer rotate logs or database files
until it was restarted. Cron now restarts once per day to avoid
this situation.
- Both IPv4 and IPv6 versions of Firewall setup
under System Configuration now support assigning several
services to an IP address simultaneously. Previously you had
to repeat the process several times to open the firewall for
more than
one service to a specific IP or subnet.
- IPv6 Ping and Trace route are now supported in
the web administration interface as well as the CLI admin
menu. Options 12 and 13 are ping6 and trace6 respectively.
Reboot and shutdown have moved to options 14 and 15
respectively.
- API: Unsuspending via the API can now perform
a RADIUS authentication check as the web administration
interface does if the parameter AuthTest=true is passed to the
API. Example:
https://patriot.network1.net/cli/?
function=SuspendEnable&username=apiuser&password=apip
ass&action=unsuspend&user=bobaaron&AuthTest=true
- API: StickyIP ADD: It is now possible to add a
sticky IP via the API by using a URL of the following format:
https://patriot.network1.net/cli/?
username=&password=&function=StickyIPs&action=ADD&Stic
kymac=&Stickyusername=&Stickyip=&Stickynote=
- API: StickyIP DELETE: It is now possible to
delete a sticky IP via the API by using a URL of the following
format:
https://patriot.network1.net/cli/?
username=&password=&function=StickyIPs&action=DELETE&
Stickymac=&Stickyusername=
- API: StickyIP LIST: It is now possible to list
sticky IP assignments via the API by using a URL of the
following format:
https://patriot.network1.net/cli/?
username=&password=&function=StickyIPs&action=LIST
An XML list is returned.
- API: Its now possible to authenticate a user
device using the current pre-auth IP address of the device by
using the parameter ip= in place of the MAC= parameter as
in this example:
https://patriot.network1.net/cli/?
username=&password=&function=AuthorizeCustomer&user=
exampleuser&pass=examplepass&ip=exampleip
- API: A new api call has been added to find
authenticated devices. This is accessed in the same way as
the rest of the API and returns results in XML format. All
authenticated devices may be returned, or the search may be
limited.
The URL should have the following format:
https://patriot.network1.net/cli/?
function=SearchAuthDevices&username=&password=@&mac
=&AdminNote=&user=&ShowOnlyOnline=
(TRUE)&AddressType=(STATIC/DYNAMIC)
- Default DNS servers (when a DHCPatriot has
first been installed but not yet configured) have been changed
to 8.8.8.8 and 8.8.4.4.
- It is now possible to exclude a range of IP
addresses in Auth DHCP Config -> Exclude IP Address in the
GUI.
- There is a new list that can be maintained in
Auth DHCP Config -> Deny MAC Address as well as Standard
DHCP Config -> Deny MAC Address. This list prevents mac
addresses entered within from getting an IP address.
- The DHCPatriot no longer prevents
authentication if there is a current authenticated lease for the
device. The reason it did this in the first place was to prevent
sim-use violations. Logic dictates that the device is already
suspend
however, so there really wasn`t a reason to
prevent authentication. Authentication still isn`t allowed if the
device is a valid authenticated device that is not suspended.
- It is now possible to delete suspended devices
that do not currently have an IP address in View Authenticated
Users.
- Optional lease length overrides have been
added to the dynamic subnets in standard and authenticated.
This allows an administrator to set a different lease length for
a certain dynamic subnet for maintenance purposes or
whatever reason.
- OpenSSL has been updated to fix the
somewhat obscure security issue reported in:
http://www.openssl.org/news/secadv_20140605.txt
- A feature has been added that lets an admin
add DHCP configs to the pool {} statement. This is needed by
some customers to replicate custom ISC DHCP configs in
specific environments.
- A new feature called Built-in Authentication:
User Import under Auth DHCP Actions allows the import of a
list of users using a comma separated value (CSV) file upload
in a specific format.
- A new feature called Device Import under Auth
DHCP Actions allows the import of a list of authenticated
devices using a comma separated value (CSV) file upload in a
specific format.
- Repaired a problem where the Request
Assistance under Main linked to a non-existant page.
- Captive portal protection has gained the ability
for the administrator to supply their own page to be used to
protect the DHCPatriot from automated programs that use
web. A new setting box appears in
System Configuration -> General Setup
allowing an administrator to supply their own HTML for the
protection page if they don`t want to use the math problem.
- It was discovered that Internet Explorer was
not following the 404 redirect on the DHCPatriot. Instead of
showing the login page, it would show an Internet Explorer
specific "Webpage not found" error page.
This meant that if the home page of the user
was set to something like http://www.sony.com/ps4 that
instead of redirecting back to the login page, the user would
get an Internet Explorer generated error page
that looked similar to the "page cannot be
displayed" error page. We have taken steps to rectify this and
Internet Explorer is now being properly redirected to the login
page.
- Keepalive with one second timeout has been
enabled on the DHCPatriot system web server. This affects
the login page as well as the admin interface.
|
| -Darren |
| DHCPatriot 5.3.1 released | 2014-02-25 09:59:26 |
DHCPatriot version 5.3.1 has been released. This is a maintenance with bug fixes only. Only DHCPatriot systems experiencing the bugs repaired in this release will receive this software.
All of the fixes from this release will of course be in version 5.4.0. Here are the release notes:
- Repaired a problem where the built-in authentication would fail under certain circumstances where the database was restarted. Built-in authentication would previously
fail to reconnect to the database for a time after the restart.
This would result in users being denied access. Built-in authentication now correctly reconnects to the database.
- Repaired a permissions problem that prevented viewing of the online manual directly from the DHCPatriot system. The manual is now viewable.
It also is always available at our website: www.network1.net
- The counts on view address usage and corresponding graphs were a bit nonsensical since the 5.3.0 patch that removed static, sticky, and excluded IPs from the counts.
The following changes have been made so that the counts are better.
Static network total counts are not decreased no matter what you do. Dynamic counts are decreased by excluded, sticky, and static (RADIUS) entries.
However, previously it was decreasing the total count for multiple entries. It now only decreases once per IP no matter how many times you enter it in those tables and
how many tables it is in.
If the IP is in use, it is not decreased from the total.
- The RADIUS Alive packet [Acct-Status-Type -> interim-update] had a problem where the username was not available at the time of queuing the event. It would use the
last username in memory (or possibly no username if there wasn`t one
in memory). The only time the username was correct was when the last RADIUS communication was about the same user who was now getting an interim-update. This
has been repaired.
- NTP changes have been made. Configuration options have been put in place to prevent a certain type of DoS attack. Also - the time server should provide time faster to
clients now.
- Changes to static assignment in the standard DHCP have been made. Previously, we used a pool based method of assigning static IPs within standard DHCP. When an
assignment was made via option 82 and the equipment was subsequently changed,
there was a chance that the static IP assignment would be unavailable until the previous equipment`s lease expired. This has been changed. The lease is now
immediately available. Side affects of this are that lease length settings
are now ignored by standard static assignments and are now twelve hours long regardless of the settings for the shared networks. Also, option 82 data is no longer
logged in the DHCP logs for these standard DHCP static assignments.
Clicking the 82 for any standard static assignment based sessions in Standard DHCP Reports -> Search Sessions will say `Not Available` as well. We felt the detrimental
effects of these limitations were outweighed by the benefit of
being able to immediately swap out equipment and have the static IP address assignment applied straight away.
|
| -Darren |
| DHCPatriot 5.3.0 released | 2013-11-06 09:51:36 |
DHCPatriot 5.3.0 has been released.
Arguably the most important new feature in this build is the floating IP support implemented with Virtual Router Redundancy Protocol (VRRP). This is the last piece of the puzzle in
making the DHCPatriot completely high availability. Previously, the router would need to be changed to force authentication traffic to one DHCPatriot device or the other in the case
of outage. Using VRRP allows a third IP address to “float” between the two devices. This allows the router to be configured to force authentication traffic to this third IP address. The
IP address never goes down as long as at least one DHCPatriot device is functional. Other enhancements in this version include: Searchable Option 82 information that is stored with
the sessions; Template based configuration of static address definitions in standard DHCP for quick configuration of ONT networks, for example; Optional protection of the
authentication page against automated clients via a simple math problem; Checking stored credentials against the RADIUS server during an un-suspend operation; Optionally send
RADIUS ALIVE (interim-update) packets upon DHCP client lease renewal; Optional RADIUS forwarding to external devices that need a RADIUS accounting stream.
Release notes for DHCPatriot 5.3.0:
- Floating IP (VRRP) implemented. It is now possible to add a third IP address to the DHCPatriot system that will float between the two devices. This IP address should
be used with the captive portal page and possibly as the destination
address when administrating the machine. Restrictions to using VRRP are that the DHCPatriot system devices must both be in the same subnet and the floating IP
must be in that same subnet as well.
- Optional simple page for protecting the database from being accessed by pre-auth / unauthenticated automated clients such as weatherbug. This page asks a simple
math problem before proceeding to the actual authentication page for
pre-auth users. The page has no images and no database access. Automated clients such as weatherbug will not answer the question and proceed to the login page.
Users attempting to authenticate on the network will answer the
question and proceed. Thusly, when a large load of unauthenticated devices is encountered, this page will prevent automated port 80 access from crippling the
DHCPatriot system.
- CLI user was changed to be API user in the administrators configuration to prevent future confusion.
- Fixed a problem with the TFTP File Maintenance where if two files were exactly the same, then the MD5 hash would match causing the delete and show file functions
to possibly show or delete the wrong file. I repaired this by using the
file name as the key instead.
- Fixed a problem with auto-generated forms where previously executed delete commands would try to execute again if using next, back, first, last, or show all as well
as when using limit displayed entries.
- in the config menu, if a ipv6 address was entered without the CIDR at the end, such as 2620:0:2e50:e4::226 instead of 2620:0:2e50:e4::226/64 it would not assume
64 and would not complain. This caused the address settings for
IPv6 not to work. It now assumes a prefix of 64 if none was entered.
- View address usage and usage graphs now decrement the number of available IPs for excluded IPs, sticky IPs and static IPs. The count of available addresses is
decreased by 1 for each of these type of IP exclusions or assignments that fall
within the subnet. If the IP is currently in use, the available address count is not reduced for that IP address.
- Leading and trailing white space will now be trimmed from form input. This should help with copy/paste situations. Presently these characters are removed: space,
tab, new line, carriage return, NUL-byte and vertical tab.
- Smartmon tools (www.smartmontools.org) have been added to the DHCPatriot system. We can use these tools to better diagnose potential hard drive problems in the
field.
- ISC DHCP 4.2.5-P1 has been installed.
- Idle time out on Administration interface increased to 10 hours. Previously it was 4 hours. Some people would have the interface timeout throughout the day.
- Log entries from dhcp devices that are talking more frequently than once per second will now have their logs ignored. Entries will only be recorded once per second.
Any more than that is not useful information as seconds is the resolution
of the DHCP lease. This further increases the level of performance.
- The DHCPatriot now verifies RADIUS credentials before an "unsuspend" is performed in Auth DHCP Actions->Suspend User. This will prevent confusion in customer
service as well as help customers to have a better experience.
Previously, it was possible to "unsuspend" a user when their stored password did not match, or they were disabled on the RADIUS server. This created some
confusion and customer callbacks that will not be avoided.
- It is now possible to delete RADIUS assigned static IP addresses. They are shown in the same list as the Sticky IP assignments. The delete link is functional and will
remove them. Keep in mind that if they are still assigned to the user
in RADIUS that they will likely reappear at some point in the future.
- Sticky IPs now work in the standard DHCP without being an authenticated MAC address. Previously, unless the mac belonged to a valid authenticated user, the sticky
IP would not function even if it was a standard sticky IP. This has been fixed.
- It is now possible to suspend individual devices by the MAC address via the remote access API.
- Option 82 information can now be searched under Auth DHCP Reports -> Search Session as well as Standard DHCP Reports -> Search Sessions. Please note that
searching by option 82 may signicantly increase the duration to receive results.
This is especially true of high traffic systems.
- RADIUS Alive packet [Acct-Status-Type -> interim-update] now supported. Turning this setting on in System Configuration -> General Setup will cause the
DHCPatriot system to send an Alive packet each time the lease is renewed. This could be
problematic on systems with many broken devices sending lots of renews rapidly. We will keep an eye on this situation and evaluate if some per-second limit needs
to be implemented at some point in the future.
- A long standing problem with system stability was found and repaired. The DHCPatriot system should now have no problem booting back up succesfully during
software installs. Previously, occasionally during an update the system would
fail to boot properly requiring a physical power cycle.
- Forwarding of RADIUS accounting packets to one or more arbitrary destinations has been added. A new type of server (AFOR) has been added to the authentication
setup. The DHCPatriot does not wait for an accounting response with these types
of destinations. This feature can be used for sending accounting data to Sandvine or Procera traffic shapers or various CALEA devices, for example.
- Scripted mass adding of standard DHCP static IP assignments is now possible. Access this functionality via Standard DHCP Actions -> Static IP Assignment and then
clicking
on: `If you wish to add multiple entries using scripted parameters, click here`. Follow the onscreen instructions to easily add as many entries or as few as you need.
- Corrected a problem where if Option82 information was received that contained a single quote (`) that would cause a problem with writing to the database. Option 82
information received via DHCP is now sanatized before being written to the db.
- Corrected a problem where if more than one device existed for a username and the either had a sticky address by username or a static address assigned by RADIUS,
only one random device would effectively be assigned to the address. Now all
devices that should be assigned to the address are assigned to it correctly.
|
| -Darren |
| 5.2.1 has been released | 2013-04-25 13:19:59 |
DHCPatriot version 5.2.1 has been released. This is a maintenance with bug fixes only. Only DHCPatriot systems experiencing the
bugs repaired in this release will receive this software. All of the fixes from this release will of course be in version 5.3.0. Here are
the release notes:
- Added hardware support for the 2013-1 model of DHCPatriot system.
- Gave space on startup to launching programs so that they don`t all launch simultaneously. This should help with some freeze-up
on startup problems.
- Added diagnostic software that will allow us to access hardware information in the field.
- Repaired a problem where if both circuit and remote ids were provided in option 82, the remote-id was not recorded.
- Repaired a problem that could cause the daily cron tasks to possibly hang and therefore not run the next day.
- When DHCP log storage gets to large, it can cause slowdowns and problems on the DHCPatriot. A watchdog has been introduced
to clean the logs if they get to large. * Please note that this refers to logs
not session information, in other words the transitory information used for troubleshooting someone`s DHCP problems, not the
storage of what IP address was used by whom at what time *
- Added extra information to the log file when an invalid DHCP event is encountered so that we may find the offending event and
remove it.
|
| -Darren |