Group administrators:
OpenSSL/Heartbleed and Moonshot
You will no doubt have already received advisories about vulnerabilities in the 1.0.1-series of OpenSSL[1] affecting TLS enabled services via the heartbeat extension.
The advice for Moonshot is very similar to an advisory you may have received from eduroam[2].
While there are no indications that CVE-2014-0160[3] is being actively exploited via TLS-based EAP-mechanisms or RADIUS/TLS (aka RadSec) at this time, the software used by Moonshot *is* vulnerable to a "heartbleed" attack.
The eduroam operational team and the Moonshot developers are advising that all sites should upgrade affected versions of OpenSSL to versions implementing a fix for CVE-2014-0160 immediately, and restart all services using OpenSSL. While RADIUS has several mitigating factors that make it more difficult to exploit than HTTPS, the severity of this issue should not be understated.
It is also advisable to regenerate certificates on affected hosts - if you are using JCS certificates, Janet is currently providing replacement certificates for no cost[4].
Within Moonshot we use OpenSSL in the following components:
1) We use OpenSSL inside our EAP supplicant. We do not typically have private keys there, but we do have user passwords.
2) We use OpenSSL inside libradsec. There we may have private keys for client certificates; we typically do if RadSec is enabled.
3) The SSP uses OpenSSL for libradsec but *not* the EAP supplicant.
4) FreeRADIUS uses OpenSSL and they have released an advisory[5] recommending that all administrators upgrade OpenSSL immediately.
For Debian and CentOS, upgrading OpenSSL and restarting all affected services is sufficient. For the Windows SSP, you will need a new release from Janet (which will be made available shortly).
Upgraded versions of the Moonshot Live DVD and RPMs will also be provided as soon as possible.
Progress and updates on this note will be published on the Moonshot Community site[6]; we also advise that you also read the material published on the Janet CSIRT blog[7].
[2] https://www.jiscmail.ac.uk/cgi-bin/webadmin?A2=ind1404&L=JANET-ROAMING&F=&S=&P=56
[3] https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160
[4] https://www.ja.net/about-janet/news/free-janet-certificates-those-affected-openssl-heartbleed-bug
[5] http://freeradius.org/security.html
[6] https://community.ja.net/groups/moonshot/article/opensslheartbleed-and-moonshot
[7] https://community.ja.net/blogs/csirt/article/heartbleed-openssl-vulnerability-cve-2014-0160
If you have any questions regarding Moonshot and this issue, please post them to this list (moonshot-community@jiscmail.ac.uk). For enquiries regarding the Janet Certificate service, please contact the Janet Service Desk (service@ja.net). You can also Janet CSIRT (irt@csirt.ja.net) for any enquiries regarding the impact of this issue on other services.
Regards,
Adam Bishop
Systems Development Specialist
gpg: 0x6609D460
t: +44 (0)1235 822 245
xmpp: adamb@jabber.dev.ja.net
Janet, the UK's research and education network.