Bug ID 770557: Per-Session RADIUS Acct STOP message is forged based on pool route domain, but is sent through default one

Last Modified: Jul 12, 2023

Affected Product(s):
BIG-IP APM(all modules)

Known Affected Versions:
13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 13.1.3.2, 13.1.3.3, 13.1.3.4, 13.1.3.5, 13.1.3.6, 13.1.4, 13.1.4.1, 13.1.5, 13.1.5.1, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5

Fixed In:
15.0.0, 14.1.0.6, 14.0.0.5

Opened: Apr 08, 2019

Severity: 2-Critical

Symptoms

The per-Session RADIUS Acct STOP message is forged based on the pool route domain, but is sent through the default one.

Impact

The BIG-IP system sends the STOP packets according to the default routing table instead of the configured route domain RADIUS server.

Conditions

1. Deploy the BIG-IP system with two route domains 2. Under each route domains you have a path to the RADIUS server. 3. Create Access Policy with a Logon Page, RADIUS Acct agent fallback-to-Deny ending. 4. Attach it to the virtual server. 5. Run tcpdump -i any port 1813 -ne on the BIG-IP system. 5. Navigate to the virtual server. 6. Wait 20 seconds till STOP packets arrive.

Workaround

None.

Fix Information

The BIG-IP system now sends the STOP packets according to the configured route domain RADIUS server.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips