IDM OTP stops working after CVE-2024-3596 patching to RADIUS Server
Issue
- One-time password (OTP) feature is enabled on IdM via external RADIUS servers.
- After patching to the external server to enforce CVE-2024-3596, OTP stops working.
-
ipa-otpddebug log shows that IdM server did not receive a response from the external RADIUS server, the RADIUS request timed out after 15 seconds.Feb 12 00:21:09 <...> ipa-otpd[842]: bob@IDM.EXAMPLE.COM: request received Feb 12 00:21:09 <...> ipa-otpd[842]: bob@IDM.EXAMPLE.COM: user query start Feb 12 00:21:09 <...> ipa-otpd[842]: bob@IDM.EXAMPLE.COM: user query end: uid=bob,cn=users,cn=accounts,dc=idm,dc=example,dc=com Feb 12 00:21:09 <...> ipa-otpd[842]: bob@IDM.EXAMPLE.COM: radius query start: cn=externalradius,cn=radiusproxy,dc=idm,dc=example,dc=com Feb 12 00:21:09 <...> ipa-otpd[842]: bob@IDM.EXAMPLE.COM: radius query end: external-radius.example.com Feb 12 00:21:09 <...> ipa-otpd[842]: bob@IDM.EXAMPLE.COM: forward start: bob / external-radius.example.com Feb 12 00:21:24 <...> ipa-otpd[842]: bob@IDM.EXAMPLE.COM: forward end: Connection timed out Feb 12 00:21:24 <...> ipa-otpd[842]: bob@IDM.EXAMPLE.COM: sent: 0 data: 20 Feb 12 00:21:24 <...> ipa-otpd[842]: bob@IDM.EXAMPLE.COM: ..sent: 20 data: 20 Feb 12 00:21:24 <...> ipa-otpd[842]: bob@IDM.EXAMPLE.COM: response sent: Access-Reject.
Environment
- Red Hat Enterprise Linux 9
- Red Hat Identity Management (IdM)
- Third-Party RADIUS Server (patched for CVE-2024-3596)
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.