eduroam(UK) Advisory

Released: 24th October 2017 This advisory is relevant to all eduroam(UK) Home (IdP) and Visited (SP)  service organisations. It’s aim is to bring to the attention of our community the vulnerability of WPA2 to Key Reinstallation Attacks (KRACK) and describes the position of eduroam.org together with recommend actions to be taken. Background and scope:
eduroam(UK) Advisory: Injection of Operator-Name attribute by the NRPSs
Advisory issued by eduroam.OT 08/04/2014 It has come to our attention that there are vulnerabilities in the relatively new 1.0.1-series of OpenSSL (as detailed by http://heartbleed.com/) affecting TLS enabled services via a heartbeat extension. While there are no indications that this affects TLS-based EAP-mechanisms or RADIUS/TLS (aka RadSec) at this time, the operational team has made the decision to upgrade OpenSSL to versions implementing a fix for CVE-2014-0160
21 November 2014 at 4:03pm
Microsoft Security Bulletin MS14-066 -relevant to NPS and IAS eduroam Deployments eduroam administrators at all organisations providing eduroam using Microsoft NPS or IAS are advised to be aware that MS14-066 affects eduroam (and any other 802.1X deployment).
Subscribe to eduroam(UK) Advisory