Hi there,

I've found a bug in the rlm_eap_tls module.

Which is created by the following commit (CVS):
File: eap_tls.c
Revision: 1.178
Changes since 1.16: +6 -1 lines
Comment: Try to handle the case where we get an ACK after sending the last fragment

http://www.freeradius.org/cgi-bin/cvsweb.cgi/radiusd/src/modules/rlm_eap/types/rlm_eap_tls/eap_tls.c.diff?r1=1.16&r2=1.17&f=H

After sending fragments and receiving a ACK message it is not per default that Access 
is granted!

I thin that EAPTLS_SUCCESS must be replaced with EAPTLS_REQUEST.

Test situation:
Untrusted ROOT CA and Client Certificate installed on a laptop with Windows and the 
default 802.1x authentication client, the certificate must be bigger than the size of 
one fragment! And the authorize/authentication will loop with access to the network.

Greetings,

Joey

_____________________________________________________________
GRATIS LEUK EMAILADRES! http://www.apennootje.nl

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to