hi everyody!
i am trying to make a secure wireless access using PEAP, but i have a
problem during authentication.
I had sucessfully configured TLS module, and it seems to work fine.
But when i try to authenticate with a windows supplicant using
mschapv2, there is a problem.
i read in file eap.conf
#
# This module is the *Microsoft* implementation of MS-CHAPv2
# in EAP. There is another (incompatible) implementation
# of MS-CHAPv2 in EAP by Cisco, which FreeRADIUS does not
# currently support.
#
when will freeradius support this "incompatible" implementation of
ms-chapv2?
is this incompatible implementation of MS-CHAPv2 in EAP by Cisco my
problem?
what can i do?
bash-2.05# radiusd -v
radiusd: FreeRADIUS Version 1.0.1, for host , built on Jan 13 2005 at 12:25:42
Copyright (C) 2000-2003 The FreeRADIUS server project.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License.
For more information about these matters, see the file named COPYRIGHT.
Radius logs
Starting - reading configuration files ...
reread_config: reading radiusd.conf
Config: including file: /usr/local/etc/raddb/clients.conf
Config: including file: /usr/local/etc/raddb/snmp.conf
Config: including file: /usr/local/etc/raddb/eap.conf
Config: including file: /usr/local/etc/raddb/sql.conf
main: prefix = "/usr/local"
main: localstatedir = "/usr/local/var"
main: logdir = "/usr/local/var/log/radius"
main: libdir = "/usr/local/lib"
main: radacctdir = "/usr/local/var/log/radius/radacct"
main: hostname_lookups = no
main: max_request_time = 30
main: cleanup_delay = 5
main: max_requests = 1024
main: delete_blocked_requests = 0
main: port = 0
main: allow_core_dumps = no
main: log_stripped_names = no
main: log_file = "/usr/local/var/log/radius/radius.log"
main: log_auth = yes
main: log_auth_badpass = yes
main: log_auth_goodpass = no
main: pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
main: user = "(null)"
main: group = "(null)"
main: usercollide = no
main: lower_user = "no"
main: lower_pass = "no"
main: nospace_user = "no"
main: nospace_pass = "no"
main: checkrad = "/usr/local/sbin/checkrad"
main: proxy_requests = no
security: max_attributes = 200
security: reject_delay = 1
security: status_server = no
main: debug_level = 0
read_config_files: reading dictionary
read_config_files: reading naslist
Using deprecated naslist file. Support for this will go away soon.
read_config_files: reading clients
read_config_files: reading realms
radiusd: entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded exec
exec: wait = yes
exec: program = "(null)"
exec: input_pairs = "request"
exec: output_pairs = "(null)"
exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
pap: encryption_scheme = "crypt"
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
mschap: use_mppe = yes
mschap: require_encryption = yes
mschap: require_strong = yes
mschap: with_ntdomain_hack = no
mschap: passwd = "(null)"
mschap: authtype = "MS-CHAP"
mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap)
Module: Loaded eap
eap: default_eap_type = "peap"
eap: timer_expire = 60
eap: ignore_unknown_eap_types = no
eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
gtc: challenge = "Password: "
gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
tls: rsa_key_exchange = no
tls: dh_key_exchange = yes
tls: rsa_key_length = 512
tls: dh_key_length = 512
tls: verify_depth = 0
tls: CA_path = "(null)"
tls: pem_file_type = yes
tls: private_key_file = "/filer/PKI/radius/radius_wireless_privatekey.pem"
tls: certificate_file = "/filer/PKI/signed_requests/radius_wireless_cert.pem"
tls: CA_file = "/filer/PKI/ca_cert.pem"
tls: private_key_password = "xxxxxxx"
tls: dh_file = "/filer/PKI/radius/dh"
tls: random_file = "/filer/PKI/radius/random"
tls: fragment_size = 1024
tls: include_length = yes
tls: check_crl = no
tls: check_cert_cn = "%{User-Name}"
rlm_eap: Loaded and initialized type tls
peap: default_eap_type = "tls"
peap: copy_request_to_tunnel = yes
peap: use_tunneled_reply = no
peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
preprocess: huntgroups = "/usr/local/etc/raddb/huntgroups"
preprocess: hints = "/usr/local/etc/raddb/hints"
preprocess: with_ascend_hack = no
preprocess: ascend_channels_per_line = 23
preprocess: with_ntdomain_hack = no
preprocess: with_specialix_jetstream_hack = no
preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
realm: format = "suffix"
realm: delimiter = "@"
realm: ignore_default = no
realm: ignore_null = no
Module: Instantiated realm (suffix)
Module: Loaded files
files: usersfile = "/usr/local/etc/raddb/users"
files: acctusersfile = "/usr/local/etc/raddb/acct_users"
files: preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address,
Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
detail: detailfile =
"/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
detail: detailperm = 384
detail: dirperm = 493
detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
radutmp: filename = "/usr/local/var/log/radius/radutmp"
radutmp: username = "%{User-Name}"
radutmp: case_sensitive = yes
radutmp: check_with_nas = yes
radutmp: perm = 384
radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
rad_recv: Access-Request packet from host 10.190.0.5:21646, id=43, length=128
User-Name = "test"
Framed-MTU = 1400
Called-Station-Id = "0040.96a0.7fb7"
Calling-Station-Id = "000d.ed26.469e"
Service-Type = Login-User
Message-Authenticator = 0x46e6b94921874309aae57cf2886507eb
EAP-Message = 0x020200090174657374
NAS-Port-Type = Wireless-802.11
NAS-Port = 2954
NAS-IP-Address = 10.190.0.5
NAS-Identifier = "Aironet01"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
modcall[authorize]: module "chap" returns noop for request 0
modcall[authorize]: module "mschap" returns noop for request 0
rlm_realm: No '@' in User-Name = "test", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 0
rlm_eap: EAP packet type response id 2 length 9
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 0
users: Matched DEFAULT at 152
users: Matched test at 226
modcall[authorize]: module "files" returns ok for request 0
modcall: group authorize returns updated for request 0
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 43 to 10.190.0.5:21646
EAP-Message = 0x010300061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x8ecc16a56d3b8e32dda565e54110087d
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.190.0.5:21646, id=44, length=217
User-Name = "test"
Framed-MTU = 1400
Called-Station-Id = "0040.96a0.7fb7"
Calling-Station-Id = "000d.ed26.469e"
Service-Type = Login-User
Message-Authenticator = 0xeae41b402959ca6ecdfdcb9c05bfd46f
EAP-Message =
0x0203005019800000004616030100410100003d030141e66b6185303e3e8f622652fd06b51165ee228e57af1a5bb6dbaac7873f3f9800001600040005000a000900640062000300060013001200630100
NAS-Port-Type = Wireless-802.11
NAS-Port = 2954
State = 0x8ecc16a56d3b8e32dda565e54110087d
NAS-IP-Address = 10.190.0.5
NAS-Identifier = "Aironet01"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
modcall[authorize]: module "chap" returns noop for request 1
modcall[authorize]: module "mschap" returns noop for request 1
rlm_realm: No '@' in User-Name = "test", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 1
rlm_eap: EAP packet type response id 3 length 80
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 1
users: Matched DEFAULT at 152
users: Matched test at 226
modcall[authorize]: module "files" returns ok for request 1
modcall: group authorize returns updated for request 1
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
(other): before/accept initialization
TLS_accept: before/accept initialization
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
TLS_accept: SSLv3 read client hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
TLS_accept: SSLv3 write server hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 04d5], Certificate
TLS_accept: SSLv3 write certificate A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
TLS_accept: SSLv3 write server done A
TLS_accept: SSLv3 flush data
TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 44 to 10.190.0.5:21646
EAP-Message =
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
EAP-Message =
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
EAP-Message =
0x8fa49f640bc703905032174d12260bb7a9f1a0d9d102a5957199462d85f33612a505dac70203010001a310300e300c0603551d13040530030101ff300d06092a864886f70d010104050003818100b72c220657d6cae5c0e7224bd279bda8680c43df3754bbd7600f25eeb2103e29a9531c579336ae9bb90d96cd888b9dfcae96ba3a617a054bce47a40b5e1a53bf5844b0e4ed13cd312440e9b756b2d66f991ea39178a0dedc15f14bc324442300a027ba6596eb6e5ac56155ecfbfcbc8ed5eb00048a9e98d42a5d56e9128594ca00026830820264308201cda003020102020100300d06092a864886f70d0101040500306f3121301f06035504031418
EAP-Message =
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
EAP-Message = 0x864886f70d010101050003818d0030818902818100e6
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x43715d9ec0c501ba5ad3483f32dd4bff
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.190.0.5:21646, id=45, length=143
User-Name = "test"
Framed-MTU = 1400
Called-Station-Id = "0040.96a0.7fb7"
Calling-Station-Id = "000d.ed26.469e"
Service-Type = Login-User
Message-Authenticator = 0x5defb592a317db0ec1a716edd7f608fd
EAP-Message = 0x020400061900
NAS-Port-Type = Wireless-802.11
NAS-Port = 2954
State = 0x43715d9ec0c501ba5ad3483f32dd4bff
NAS-IP-Address = 10.190.0.5
NAS-Identifier = "Aironet01"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
modcall[authorize]: module "preprocess" returns ok for request 2
modcall[authorize]: module "chap" returns noop for request 2
modcall[authorize]: module "mschap" returns noop for request 2
rlm_realm: No '@' in User-Name = "test", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 2
rlm_eap: EAP packet type response id 4 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 2
users: Matched DEFAULT at 152
users: Matched test at 226
modcall[authorize]: module "files" returns ok for request 2
modcall: group authorize returns updated for request 2
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 2
modcall: group authenticate returns handled for request 2
Sending Access-Challenge of id 45 to 10.190.0.5:21646
EAP-Message =
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
EAP-Message =
0xe801aae84a17706de83fa8330decfcffff7f968a20bcade00ba54d43cb239db5cf2cfc874f552721d1733962c8a5c7355a6316030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x997ac151c97d32ab5f706983b0ee76f8
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.190.0.5:21646, id=46, length=329
User-Name = "test"
Framed-MTU = 1400
Called-Station-Id = "0040.96a0.7fb7"
Calling-Station-Id = "000d.ed26.469e"
Service-Type = Login-User
Message-Authenticator = 0xf5b23e042ec31634ce44908b7c02ec13
EAP-Message =
0x020500c01980000000b616030100861000008200806359a580f75fbcbca98157acb4c5099a56719034db3e59101a3b112533c6b4809159f49b76cf543248fefea10bf1ca062d453b501ddc75cf2e3daadf712ade0e1e5b24080c08467086ffe9f73332ac574d54dfdfc6680ff04f712c8102dbf403a2ca551e7291748aa54f60da64a9d1950051c3f9b28128d6fcfe9a7edb152b0f1403010001011603010020ee3a9afc72bb33eb19182f5ad9ba839051c50014a2f2e581abc65aabaab8ef3c
NAS-Port-Type = Wireless-802.11
NAS-Port = 2954
State = 0x997ac151c97d32ab5f706983b0ee76f8
NAS-IP-Address = 10.190.0.5
NAS-Identifier = "Aironet01"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
modcall[authorize]: module "preprocess" returns ok for request 3
modcall[authorize]: module "chap" returns noop for request 3
modcall[authorize]: module "mschap" returns noop for request 3
rlm_realm: No '@' in User-Name = "test", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 3
rlm_eap: EAP packet type response id 5 length 192
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 3
users: Matched DEFAULT at 152
users: Matched test at 226
modcall[authorize]: module "files" returns ok for request 3
modcall: group authorize returns updated for request 3
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
TLS_accept: SSLv3 read client key exchange A
rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 read finished A
rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
TLS_accept: SSLv3 write change cipher spec A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 write finished A
TLS_accept: SSLv3 flush data
(other): SSL negotiation finished successfully
SSL Connection Established
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 3
modcall: group authenticate returns handled for request 3
Sending Access-Challenge of id 46 to 10.190.0.5:21646
EAP-Message =
0x01060031190014030100010116030100201be33eeaf2cc343494a02f9e6febcbf093d59c69c28c6900e6001e8ca404a1dc
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3c788dad52913aeacf2028373ac9e6bf
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.190.0.5:21646, id=47, length=170
User-Name = "test"
Framed-MTU = 1400
Called-Station-Id = "0040.96a0.7fb7"
Calling-Station-Id = "000d.ed26.469e"
Service-Type = Login-User
Message-Authenticator = 0xe3db94ef3616ad5798bedd891edab7f8
EAP-Message =
0x020600211980000000171503010012b7f0f5ab498e65d76b114b222c4596d1a59a
NAS-Port-Type = Wireless-802.11
NAS-Port = 2954
State = 0x3c788dad52913aeacf2028373ac9e6bf
NAS-IP-Address = 10.190.0.5
NAS-Identifier = "Aironet01"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
modcall[authorize]: module "preprocess" returns ok for request 4
modcall[authorize]: module "chap" returns noop for request 4
modcall[authorize]: module "mschap" returns noop for request 4
rlm_realm: No '@' in User-Name = "test", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 4
rlm_eap: EAP packet type response id 6 length 33
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 4
users: Matched DEFAULT at 152
users: Matched test at 226
modcall[authorize]: module "files" returns ok for request 4
modcall: group authorize returns updated for request 4
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_tls: <<< TLS 1.0 Alert [length 0002], fatal access_denied
TLS Alert read:fatal:access denied
rlm_eap_peap: No data inside of the tunnel.
rlm_eap: Handler failed in EAP/peap
rlm_eap: Failed in EAP select
modcall[authenticate]: module "eap" returns invalid for request 4
modcall: group authenticate returns invalid for request 4
auth: Failed to validate the user.
Login incorrect: [test/<no User-Password attribute>] (from client ap port 2954
cli 000d.ed26.469e)
Delaying request 4 for 1 seconds
Finished request 4
Going to the next request
--
#####################################
Alfonso Lazaro Tellez <[EMAIL PROTECTED]>
c\Ribera del Sena s/n Tfono: 912020000
Edificio APOT
Campo de las Naciones (Madrid)
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html