After checking the ethereal log and the eap_tls.c code, I really don't get it how can 
the rlm_eap_tls response both
"Received EAP-TLS ACK message" and "Invalid ACK received"!?

Problem:
"rlm_eap_tls: Received EAP-TLS ACK message
 rlm_eap_tls: Invalid ACK received
   modcall[authenticate]: module "eap" returns invalid"

code excerpt from eap_tls.c:
 if ((eap_ds->response->length == EAP_HEADER_LEN + 2/*EAPtype+flags*/) &&
                ((eaptls_packet != NULL) && (eaptls_packet->flags == 0x00))) {

                if (prev_eap_ds->request->id == eap_ds->response->id) {
                        radlog(L_INFO, "rlm_eap_tls: Received EAP-TLS ACK message");
                        return EAPTLS_ACK;
                } else {
                        radlog(L_ERR, "rlm_eap_tls: Received Invalid EAP-TLS ACK 
message");
                        return EAPTLS_INVALID;
                }
        }

ethereal capture of the EAP-TLS ACK message (you may see the context in previous 
email):
 t:EAP-Message(79) l:8
            Extensible Authentication Protocol
                Code: Response (2)
                Id: 4
                Length: 6
                Type: EAP-TLS [RFC2716] [Aboba] (13)
                Flags(0x0):

Length no problem, flag correct, id same as previous packet from server, and the 
eap_tls.c response "Received EAP-TLS
ACK message" correctly, but then why the "Invalid ACK received" follow? Any advise?

Thank you much for your help.

-Paul

-----Original Message-----
From: Ynjiun P. Wang [mailto:ypw@;eSignX.com]
Sent: Friday, November 15, 2002 2:43 PM
To: [EMAIL PROTECTED]
Subject: EAP/TLS


Now I have full captured logs (ethereal(0.9.3), freeradius(snapshot10282002) and 
AP350(v.12T))regarding to the problem
of:
"rlm_eap_tls: Received EAP-TLS ACK message
 rlm_eap_tls: Invalid ACK received
   modcall[authenticate]: module "eap" returns invalid"

Could you please take a look to see if there is any obvious blonder? Thanks.

/****************Ethereal (0.9.3) capture: *******************************/

Frame 14 (191 on wire, 191 captured)
    Arrival Time: Nov 15, 2002 13:44:03.415674000
    Time delta from previous packet: 1.267728000 seconds
    Time relative to first packet: 19.405991000 seconds
    Frame Number: 14
    Packet Length: 191 bytes
    Capture Length: 191 bytes
Ethernet II
    Destination: 00:c0:9f:05:12:a6 (curve.esignx.com)
    Source: 00:08:a1:1d:e7:30 (ip204.aec-1.sfo.interquest.net)
    Type: IP (0x0800)
Internet Protocol, Src Addr: ip204.aec-1.sfo.interquest.net (66.135.138.204), Dst 
Addr: curve.esignx.com
(66.135.138.207)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 177
    Identification: 0x3981
    Flags: 0x00
        .0.. = Don't fragment: Not set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 63
    Protocol: UDP (0x11)
    Header checksum: 0xa711 (correct)
    Source: ip204.aec-1.sfo.interquest.net (66.135.138.204)
    Destination: curve.esignx.com (66.135.138.207)
User Datagram Protocol, Src Port: 22563 (22563), Dst Port: radius (1812)
    Source port: 22563 (22563)
    Destination port: radius (1812)
    Length: 157
    Checksum: 0x50c2 (correct)
Radius Protocol
    Code: Access Request (1)
    Packet identifier: 0x4d (77)
    Length: 149
    Authenticator
    Attribute value pairs
        t:User Name(1) l:7, Value:"kevin"
        t:Vendor Specific(26) l:20, Vendor:Cisco, Type:Cisco AV Pair, Len:12 
Value:"ssid=tsunami"
        t:NAS IP Address(4) l:6, Value:192.168.0.8
        t:Called Station Id(30) l:14, Value:"004096495de0"
        t:Calling Station Id(31) l:14, Value:"0006250baad2"
        t:NAS identifier(32) l:14, Value:"AP350-495de0"
        t:NAS Port(5) l:6, Value:37
        t:Framed MTU(12) l:6, Value:1400
        t:NAS Port Type(61) l:6, Value:Wireless IEEE 802.11
        t:Service Type(6) l:6, Value:Login
        t:EAP-Message(79) l:12
            Extensible Authentication Protocol
                Code: Response (2)
                Id: 2
                Length: 10
                Type: Identity [RFC2284] (1)
                Identity (5 bytes): kevin
        t:Message Authenticator(80) l:18, Value:"�N�k~\147����,c\144��\025"

Frame 15 (126 on wire, 126 captured)
    Arrival Time: Nov 15, 2002 13:44:03.417986000
    Time delta from previous packet: 0.002312000 seconds
    Time relative to first packet: 19.408303000 seconds
    Frame Number: 15
    Packet Length: 126 bytes
    Capture Length: 126 bytes
Ethernet II
    Destination: 00:08:a1:1d:e7:30 (ip204.aec-1.sfo.interquest.net)
    Source: 00:c0:9f:05:12:a6 (curve.esignx.com)
    Type: IP (0x0800)
Internet Protocol, Src Addr: curve.esignx.com (66.135.138.207), Dst Addr: 
ip204.aec-1.sfo.interquest.net
(66.135.138.204)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 112
    Identification: 0x0000
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x9fd3 (correct)
    Source: curve.esignx.com (66.135.138.207)
    Destination: ip204.aec-1.sfo.interquest.net (66.135.138.204)
User Datagram Protocol, Src Port: radius (1812), Dst Port: 22563 (22563)
    Source port: radius (1812)
    Destination port: 22563 (22563)
    Length: 92
    Checksum: 0x0f31 (correct)
Radius Protocol
    Code: Access challenge (11)
    Packet identifier: 0x4d (77)
    Length: 84
    Authenticator
    Attribute value pairs
        t:EAP-Message(79) l:8
            Extensible Authentication Protocol
                Code: Request (1)
                Id: 3
                Length: 6
                Type: EAP-TLS [RFC2716] [Aboba] (13)
                Flags(0x20): Start
        t:Message Authenticator(80) l:18, Value:"��t\001�\143�G��\148\128�J/?"
        t:State(24) l:38, 
Value:"\005\023\017b\019\013jy\145\153�x1P'£j�=�Z^#\013��M��kFF\007R�"

Frame 17 (299 on wire, 299 captured)
    Arrival Time: Nov 15, 2002 13:44:03.789273000
    Time delta from previous packet: 0.106425000 seconds
    Time relative to first packet: 19.779590000 seconds
    Frame Number: 17
    Packet Length: 299 bytes
    Capture Length: 299 bytes
Ethernet II
    Destination: 00:c0:9f:05:12:a6 (curve.esignx.com)
    Source: 00:08:a1:1d:e7:30 (ip204.aec-1.sfo.interquest.net)
    Type: IP (0x0800)
Internet Protocol, Src Addr: ip204.aec-1.sfo.interquest.net (66.135.138.204), Dst 
Addr: curve.esignx.com
(66.135.138.207)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 285
    Identification: 0x3984
    Flags: 0x00
        .0.. = Don't fragment: Not set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 63
    Protocol: UDP (0x11)
    Header checksum: 0xa6a2 (correct)
    Source: ip204.aec-1.sfo.interquest.net (66.135.138.204)
    Destination: curve.esignx.com (66.135.138.207)
User Datagram Protocol, Src Port: 22564 (22564), Dst Port: radius (1812)
    Source port: 22564 (22564)
    Destination port: radius (1812)
    Length: 265
    Checksum: 0xa839 (correct)
Radius Protocol
    Code: Access Request (1)
    Packet identifier: 0x4e (78)
    Length: 257
    Authenticator
    Attribute value pairs
        t:User Name(1) l:7, Value:"kevin"
        t:Vendor Specific(26) l:20, Vendor:Cisco, Type:Cisco AV Pair, Len:12 
Value:"ssid=tsunami"
        t:NAS IP Address(4) l:6, Value:192.168.0.8
        t:Called Station Id(30) l:14, Value:"004096495de0"
        t:Calling Station Id(31) l:14, Value:"0006250baad2"
        t:NAS identifier(32) l:14, Value:"AP350-495de0"
        t:NAS Port(5) l:6, Value:37
        t:Framed MTU(12) l:6, Value:1400
        t:State(24) l:38, 
Value:"\005\023\017b\019\013jy\145\153�x1P'£j�=�Z^#\013��M��kFF\007R�"
        t:NAS Port Type(61) l:6, Value:Wireless IEEE 802.11
        t:Service Type(6) l:6, Value:Login
        t:EAP-Message(79) l:82
            Extensible Authentication Protocol
                Code: Response (2)
                Id: 3
                Length: 80
                Type: EAP-TLS [RFC2716] [Aboba] (13)
                Flags(0x80): Length
                Length: 70
                Secure Socket Layer
                    TLS Record Layer: Client Hello
                        Content Type: Handshake (22)
                        Version: TLS 1.0 (0x0301)
                        Length: 65
                        Handshake Protocol: Client Hello
                            Handshake Type: Client Hello (1)
                            Length: 61
                            Version: TLS 1.0 (0x0301)
                            Random.gmt_unix_time: Nov 15, 2002 13:45:56.000000000
                            Random.bytes
                            Session ID Length: 0
                            Cipher Suites Length: 22
                            Cipher Suites (11 suites)
                                Cipher Suite: TLS_RSA_WITH_RC4_128_MD5 (0x0004)
                                Cipher Suite: TLS_RSA_WITH_RC4_128_SHA (0x0005)
                                Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)
                                Cipher Suite: TLS_RSA_WITH_DES_CBC_SHA (0x0009)
                                Cipher Suite: TLS_RSA_EXPORT1024_WITH_RC4_56_SHA 
(0x0064)
                                Cipher Suite: TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA 
(0x0062)
                                Cipher Suite: TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x0003)
                                Cipher Suite: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 
(0x0006)
                                Cipher Suite: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA 
(0x0013)
                                Cipher Suite: TLS_DHE_DSS_WITH_DES_CBC_SHA (0x0012)
                                Cipher Suite: TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA 
(0x0063)
                            Compression Methods Length: 1
                            Compression Methods (1 method)
                                Compression Method: null (0)
        t:Message Authenticator(80) l:18, Value:"�\131\021�|\030\144�̷�\020L�k\022"

Frame 18 (1145 on wire, 1145 captured)
    Arrival Time: Nov 15, 2002 13:44:03.792712000
    Time delta from previous packet: 0.003439000 seconds
    Time relative to first packet: 19.783029000 seconds
    Frame Number: 18
    Packet Length: 1145 bytes
    Capture Length: 1145 bytes
Ethernet II
    Destination: 00:08:a1:1d:e7:30 (ip204.aec-1.sfo.interquest.net)
    Source: 00:c0:9f:05:12:a6 (curve.esignx.com)
    Type: IP (0x0800)
Internet Protocol, Src Addr: curve.esignx.com (66.135.138.207), Dst Addr: 
ip204.aec-1.sfo.interquest.net
(66.135.138.204)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 1131
    Identification: 0x0000
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x9bd8 (correct)
    Source: curve.esignx.com (66.135.138.207)
    Destination: ip204.aec-1.sfo.interquest.net (66.135.138.204)
User Datagram Protocol, Src Port: radius (1812), Dst Port: 22564 (22564)
    Source port: radius (1812)
    Destination port: 22564 (22564)
    Length: 1111
    Checksum: 0xdec5 (correct)
Radius Protocol
    Code: Access challenge (11)
    Packet identifier: 0x4e (78)
    Length: 1103
    Authenticator
    Attribute value pairs
        t:EAP-Message(79) l:254
            EAP fragment
        t:EAP-Message(79) l:254
            EAP fragment
        t:EAP-Message(79) l:254
            EAP fragment
        t:EAP-Message(79) l:254
            EAP fragment
        t:EAP-Message(79) l:11
            EAP fragment
            Extensible Authentication Protocol
                Code: Request (1)
                Id: 4
                Length: 1017
                Type: EAP-TLS [RFC2716] [Aboba] (13)
                Flags(0x80): Length
                Length: 1007
                Secure Socket Layer
                    TLS Record Layer: Server Hello
                        Content Type: Handshake (22)
                        Version: TLS 1.0 (0x0301)
                        Length: 74
                        Handshake Protocol: Server Hello
                            Handshake Type: Server Hello (2)
                            Length: 70
                            Version: TLS 1.0 (0x0301)
                            Random.gmt_unix_time: Nov 15, 2002 13:44:03.000000000
                            Random.bytes
                            Session ID Length: 32
                            Session ID (32 bytes)
                            Cipher Suite: TLS_RSA_WITH_RC4_128_MD5 (0x0004)
                            Compression Method: null (0)
                    TLS Record Layer: Certificate
                        Content Type: Handshake (22)
                        Version: TLS 1.0 (0x0301)
                        Length: 737
                        Handshake Protocol: Certificate
                            Handshake Type: Certificate (11)
                            Length: 733
                            Certificates Length: 730
                            Certificates (730 bytes)
                                Certificate Length: 727
                                Certificate (727 bytes)
                    TLS Record Layer: Multiple Handshake Messages
                        Content Type: Handshake (22)
                        Version: TLS 1.0 (0x0301)
                        Length: 181
                        Handshake Protocol: Certificate Request
                            Handshake Type: Certificate Request (13)
                            Length: 173
                            Certificate types count: 3
                            Certificate types (3 types)
                                Certificate type: RSA Sign (1)
                                Certificate type: DSS Sign (2)
                                Certificate type: Unknown (5)
                            Distinguished Names Length: 167
                            Distinguished Names (167 bytes)
                                Distinguished Name Length: 165
                                Distinguished Name (165 bytes)
                        Handshake Protocol: Server Hello Done
                            Handshake Type: Server Hello Done (14)
                            Length: 0
        t:Message Authenticator(80) l:18, Value:"$\155\004��\013f\001�\025�P\136��="
        t:State(24) l:38, 
Value:"���y��\141�\148O2b�j�=S�\127,\138�:�\026\026�\01253\136\017"

Frame 21 (225 on wire, 225 captured)
    Arrival Time: Nov 15, 2002 13:44:05.004527000
    Time delta from previous packet: 0.715416000 seconds
    Time relative to first packet: 20.994844000 seconds
    Frame Number: 21
    Packet Length: 225 bytes
    Capture Length: 225 bytes
Ethernet II
    Destination: 00:c0:9f:05:12:a6 (curve.esignx.com)
    Source: 00:08:a1:1d:e7:30 (ip204.aec-1.sfo.interquest.net)
    Type: IP (0x0800)
Internet Protocol, Src Addr: ip204.aec-1.sfo.interquest.net (66.135.138.204), Dst 
Addr: curve.esignx.com
(66.135.138.207)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 211
    Identification: 0x398d
    Flags: 0x00
        .0.. = Don't fragment: Not set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 63
    Protocol: UDP (0x11)
    Header checksum: 0xa6e3 (correct)
    Source: ip204.aec-1.sfo.interquest.net (66.135.138.204)
    Destination: curve.esignx.com (66.135.138.207)
User Datagram Protocol, Src Port: 22565 (22565), Dst Port: radius (1812)
    Source port: 22565 (22565)
    Destination port: radius (1812)
    Length: 191
    Checksum: 0xa27e (correct)
Radius Protocol
    Code: Access Request (1)
    Packet identifier: 0x4f (79)
    Length: 183
    Authenticator
    Attribute value pairs
        t:User Name(1) l:7, Value:"kevin"
        t:Vendor Specific(26) l:20, Vendor:Cisco, Type:Cisco AV Pair, Len:12 
Value:"ssid=tsunami"
        t:NAS IP Address(4) l:6, Value:192.168.0.8
        t:Called Station Id(30) l:14, Value:"004096495de0"
        t:Calling Station Id(31) l:14, Value:"0006250baad2"
        t:NAS identifier(32) l:14, Value:"AP350-495de0"
        t:NAS Port(5) l:6, Value:37
        t:Framed MTU(12) l:6, Value:1400
        t:State(24) l:38, 
Value:"���y��\141�\148O2b�j�=S�\127,\138�:�\026\026�\01253\136\017"
        t:NAS Port Type(61) l:6, Value:Wireless IEEE 802.11
        t:Service Type(6) l:6, Value:Login
        t:EAP-Message(79) l:8
            Extensible Authentication Protocol
                Code: Response (2)
                Id: 4
                Length: 6
                Type: EAP-TLS [RFC2716] [Aboba] (13)
                Flags(0x0):
        t:Message Authenticator(80) l:18, Value:"K\148����v�\134�\152\023'\006\154�"

Frame 23 (86 on wire, 86 captured)
    Arrival Time: Nov 15, 2002 13:44:07.003563000
    Time delta from previous packet: 0.968648000 seconds
    Time relative to first packet: 22.993880000 seconds
    Frame Number: 23
    Packet Length: 86 bytes
    Capture Length: 86 bytes
Ethernet II
    Destination: 00:08:a1:1d:e7:30 (ip204.aec-1.sfo.interquest.net)
    Source: 00:c0:9f:05:12:a6 (curve.esignx.com)
    Type: IP (0x0800)
Internet Protocol, Src Addr: curve.esignx.com (66.135.138.207), Dst Addr: 
ip204.aec-1.sfo.interquest.net
(66.135.138.204)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 72
    Identification: 0x0000
    Flags: 0x04
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: UDP (0x11)
    Header checksum: 0x9ffb (correct)
    Source: curve.esignx.com (66.135.138.207)
    Destination: ip204.aec-1.sfo.interquest.net (66.135.138.204)
User Datagram Protocol, Src Port: radius (1812), Dst Port: 22565 (22565)
    Source port: radius (1812)
    Destination port: 22565 (22565)
    Length: 52
    Checksum: 0x220e (correct)
Radius Protocol
    Code: Access Reject (3)
    Packet identifier: 0x4f (79)
    Length: 44
    Authenticator
    Attribute value pairs
        t:EAP-Message(79) l:6
            Extensible Authentication Protocol
                Code: Failure (4)
                Id: 4
                Length: 4
        t:Message Authenticator(80) l:18, Value:"8\129�d�b�����\138��\1495"



- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to