Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
CaseyB
Advisor
Jump to solution

R81.20 JHF99 - Radius VPN Issues

I have an open TAC case, but I figured I would do some crowd sourcing while I wait.

Upgraded from R81.20 JHF 89 -> 99 (Recommended). Users can no longer connect using the Check Point Mobile VPN. I am testing with version E88.62 on Windows 11 23H2. Our users authenticate against our internal Imprivata server for MFA. I get prompted to "Accept" MFA 3 times before it stops and Check Point says, "invalid username or password".

When I perform "tcpdump -nni any port 1812", I am seeing good traffic.

RADIUS_pcap.png

I see some stuff addressed for the BLAST CVE and that is where I thought my issue was, but it doesn't appear to be.

I am NOT ignoring Radius attribute 80. sk42184 

I applied the Remote Access VPN regedit as well. sk182516 

  • ckp_regedit -a SOFTWARE/CheckPoint/VPN1 require_message_authenticator -n 1

I do see the Message Authenticator field in the replies.

RADIUS_accept.png

Thoughts? Anyone else seeing this?

0 Kudos
1 Solution

Accepted Solutions
CaseyB
Advisor

The fix is:

  • sk183244 - Get the hotfix mentioned at the bottom of this SK. The hotfix allows the Message-Authenticator to be anywhere in the list of Attribute Value Pairs. This is working in our environment.

The other solution would be to get your RADIUS vendor to send back the Message-Authenticator as AVP #1. I am still trying to get this accomplished with Imprivata, but no updates yet. I do not wish to manage this hotfix for the rest of my life.

I am under the impression that Microsoft NPS and some Linux flavors send Message-Authenticator as AVP #1, so I'm not sure if Imprivata is the only vendor not doing this. The fix for BLAST has been publicly available since November from Check Point, and we have been the only ticket our engineer has delt with where the RADIUS vendor is not sending the Message-Authenticator as AVP #1, but if you are using Imprivata, be aware of this. Based on that, it seems unlikely Check Point is going to change the behavior, but you never know.

View solution in original post

15 Replies
the_rock
Legend
Legend

Saw someone else post about this too...affecting every user I assume?

Andy

0 Kudos
CaseyB
Advisor

Yeah it's for all users.

0 Kudos
the_rock
Legend
Legend

So tcpdump just shows auth error? What did TAC say?

0 Kudos
CaseyB
Advisor

I see valid accept / pass messages in the tcpdump, I am gathering debugs for TAC.

the_rock
Legend
Legend

Sounds good, let us know how it gets solved.

Andy

0 Kudos
CaseyB
Advisor

I was hoping for a better answer, but here is what is going on. This is Blast-RADIUS related. sk183244 

Basically, our RADIUS server, Imprivata, is not sending the AVP Message-Authenticator back first. Check Point is requiring that the Message-Authenticator AVP is listed first in the response, since it is not first, we get the failure. We have a ticket open with Imprivata, and they are investigating the issue, so it sounds like we are not the first ticket on this.

Here are pictures explaining the issue. You can see in the Access-Request, Message-Authenticator is AVP #1, in Access-Accept it is AVP #3, which to Check Point is bad.

RADIUS_1.pngRADIUS_2.png

Per the SK I linked, it sounds like there is a patch that changes the behavior, but that hotfix is currently only available for JHF-96,98. Nothing for JHF-99 yet.

So, it seems like I am still stuck running JHF-89 for the foreseeable future.

the_rock
Legend
Legend

da*n..nothing in 101?

0 Kudos
the_rock
Legend
Legend

Hey mate,

Any news from TAC?

Andy

0 Kudos
CaseyB
Advisor

We are still discussing with them, nothing concrete yet other than read these SKs.

0 Kudos
VIKAS1
Contributor

Hey,

any news from TAC, bcz we are planning to upgrade our JHF 92 to 99, and our more users are connecting through VPN, so if we face this issue then big challenges for us.

0 Kudos
CaseyB
Advisor

If you are on JHF-92, you should be fine. I am running JHF-89 which never included the fixed for CVE-2024-3596, it was added in JHF-90.

You can validate your current setup, just do a packet capture of a authentication on the gateway and look at the RADIUS packets:

  • tcpdump -nni any port 1812 -w radiuscap.pcap

Open the .pcap in wireshark and look at the "Access-Accept" packet, under the RADIUS protocol in the Attribute Value Pairs section, as long as the Message-Authenticator is #1 you are in the clear. I reference this in a screenshot above.

0 Kudos
CaseyB
Advisor

The fix is:

  • sk183244 - Get the hotfix mentioned at the bottom of this SK. The hotfix allows the Message-Authenticator to be anywhere in the list of Attribute Value Pairs. This is working in our environment.

The other solution would be to get your RADIUS vendor to send back the Message-Authenticator as AVP #1. I am still trying to get this accomplished with Imprivata, but no updates yet. I do not wish to manage this hotfix for the rest of my life.

I am under the impression that Microsoft NPS and some Linux flavors send Message-Authenticator as AVP #1, so I'm not sure if Imprivata is the only vendor not doing this. The fix for BLAST has been publicly available since November from Check Point, and we have been the only ticket our engineer has delt with where the RADIUS vendor is not sending the Message-Authenticator as AVP #1, but if you are using Imprivata, be aware of this. Based on that, it seems unlikely Check Point is going to change the behavior, but you never know.

the_rock
Legend
Legend

Tx for letting us know!

Andy

CaseyB
Advisor

Update from TAC:

  • Just got a message from internal team, and the hotfix from SK183244 will be integrated in the next upcoming Jumbo or the one after that.

I guess they are going to change the behavior, nice.

the_rock
Legend
Legend

So probably take that comes after 101?

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events