I thought that was true. And I did that, with no change. So it must be something in Freeradius/Certs.
Hopefully I will discover the little discrepancy that is keeping this from working for me. Does it matter that it is Solaris 2.8? I am running Openssl 0.9.7e, and the latest Freeradius release. -atkinson > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On > Behalf Of �ystein G�sdal > Sent: Monday, February 07, 2005 1:57 AM > To: '[email protected]' > Subject: RE: PEAP and "fatal unknown_ca" > > > The easiest way to find out if it's the server it is > something wrong with, just turn off validate server > certificate under the 802.1x settings in WindowsXP. If you > are running PEAP, you don't need certificates on the client, > just on the server. > > - �ystein > > > > -----Original Message----- > > From: Dudley Atkinson [mailto:[EMAIL PROTECTED] > > Sent: 7. februar 2005 06:44 > > To: [email protected] > > Subject: RE: PEAP and "fatal unknown_ca" > > > > Thank you for the ideas. > > > > I think that I have the right root.pem file in my config. I > > will double-check that things match, but I've checked it many > > times already. > > > > Is there any way to use openssl to inspect the root.pem? Or > > cacert.pem? > > What commands can I enter to check that is is a valid pem > > file containing the CA certificate? > > > > Also, when I made the certs with the CA.all script, I got > > both a demoCA/cacert.pem and a root.pem file as a result. > > I've tried using both for the root certificate in freeradius, > > and neither seems to work right. > > Which is THE right one to use? The examples and config > > templates made me think cacert.pem was right. > > > > And I did go and install the certificate in XP, with no > > change in behavior. > > The error looks like something on the Freeradius side? Or is > > this error reflecting a problem on the XP side? > > > > > > rlm_eap_tls: <<< TLS 1.0 Alert [length 0002], fatal > > unknown_ca TLS > > > > Alert read:fatal:unknown CA > > > > TLS_accept:failed in SSLv3 read client certificate A > > > > 24317:error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 > > > > I've followed the recipes and I'm still not savvy enough to > > know the way out.... > > > > -atkinson > > > > > > > -----Original Message----- > > > From: [EMAIL PROTECTED] > > > [mailto:[EMAIL PROTECTED] On Behalf Of > > > Artur Hecker > > > Sent: Sunday, February 06, 2005 6:12 PM > > > To: [email protected] > > > Subject: Re: PEAP and "fatal unknown_ca" > > > > > > > > > hi > > > > > > > > > Dudley Atkinson wrote: > > > > I have followed the instructions for creating self-signed server > > > > certificates, and I think I have the config files and certs > > > aligned. > > > > But I must have something wrong, because when my supplicant > > > (Aironet > > > > 1200) gets a request for PEAP from a Windows XP system, > > the radiusd > > > > debug shows "fatal unknown_ca" when in the last phase > of the PEAP > > > > authentication. > > > > > > hmmm, sorry to be a nitpicker - but the supplicant _is_ > > windows XP. i > > > suppose, the aironet 1200 is an access point, so it would be an > > > authenticator then. > > > > > > > > > > Is there some little gotcha I'm missing? > > > > > > > > Is the setup for PEAP different than EAP/TLS? > > > > > > > > Do I have to install something on the client (I thought > > > not, since it > > > > is PEAP). > > > > > > i personally think that the root.pem file which your > > radiusd is using > > > does not contain a correct certificate of the used CA. make sure: > > > - this file exists and is configured as such in the eap.conf / > > > radiusd.conf > > > - freeradius finds and reads this file (file permissions, > > paths, etc.) > > > - this file and its content are valid (i.e. it's a valid pem file > > > containing the CA certificate). > > > > > > the used CA has to be known to the server at the moment > > when it starts > > > TLS communications. > > > > > > btw it is the same for the supplicant (your Windows XP) - i would > > > suggest that you install the certificate. Windows used to kindly > > > propose the installation of a new (unknown) CA certificate > > but i'm not > > > quite sure it still works as expected and it definitly > depends on a > > > lot of other parameters. so just preinstall it locally. > > > > > > > > > > > > ciao > > > artur > > > > > > > > > > All help is appreciated; debug follows. > > > > > > > > Thanks! > > > > Atkinson > > > > > > > > ad_recv: Access-Request packet from host 10.0.1.3:21645, > > > id=151, length=180 > > > > User-Name = "atkinsondu" > > > > Framed-MTU = 1400 > > > > Called-Station-Id = "000f.9060.c140" > > > > Calling-Station-Id = "0040.96a2.8ef1" > > > > Cisco-AVPair = "ssid=eap-only" > > > > Service-Type = Login-User > > > > Message-Authenticator = > 0xb7c8fd67a6fa635c21df964a0cbd2af5 > > > > EAP-Message = 0x020300061900 > > > > NAS-Port-Type = Wireless-802.11 > > > > Cisco-NAS-Port = "369" > > > > NAS-Port = 369 > > > > State = 0x21f31e4903806b3d170350fcd4a4a82a > > > > NAS-IP-Address = 10.0.1.3 > > > > NAS-Identifier = "wifi-ap1" > > > > Processing the authorize section of radiusd.conf > > > > modcall: entering group authorize for request 2 > > > > modcall[authorize]: module "preprocess" returns ok > for request 2 > > > > rlm_realm: No '\' in User-Name = "atkinsondu", looking > > > up realm NULL > > > > rlm_realm: No such realm "NULL" > > > > modcall[authorize]: module "ntdomain" returns noop > for request 2 > > > > rlm_realm: No '@' in User-Name = "atkinsondu", looking > > > up realm NULL > > > > rlm_realm: No such realm "NULL" > > > > modcall[authorize]: module "suffix" returns noop for request 2 > > > > rlm_eap: EAP packet type response id 3 length 6 > > > > rlm_eap: No EAP Start, assuming it's an on-going EAP > > conversation > > > > modcall[authorize]: module "eap" returns updated for request 2 > > > > modcall: entering group group for request 2 > > > > rlm_dbm: try open database file: > > /opt/local/etc/raddb/database/users > > > > rlm_dbm: Call parse_user: > > > > sm_parse_user.c: check for loops > > > > Add atkinsondu to user list > > > > rlm_dbm: User <atkinsondu> not foud in database > > > > Remove atkinsondu from user list > > > > sm_parse_user.c: check for loops > > > > Add DEFAULT to user list > > > > rlm_dbm: User <DEFAULT> not foud in database > > > > Remove DEFAULT from user list > > > > modcall[authorize]: module "dbm" returns notfound for > request 2 > > > > modcall: group group returns notfound for request 2 > > > > modcall: group authorize returns updated for request 2 > > > > rad_check_password: Found Auth-Type EAP > > > > auth: type "EAP" > > > > Processing the authenticate section of radiusd.conf > > > > modcall: entering group authenticate for request 2 > > > > rlm_eap: Request found, released from the list > > > > rlm_eap: EAP/peap > > > > rlm_eap: processing type peap > > > > rlm_eap_peap: Authenticate > > > > rlm_eap_tls: processing TLS > > > > rlm_eap_tls: Received EAP-TLS ACK message > > > > rlm_eap_tls: ack handshake fragment handler > > > > eaptls_verify returned 1 > > > > eaptls_process returned 13 > > > > rlm_eap_peap: EAPTLS_HANDLED > > > > modcall[authenticate]: module "eap" returns handled for > > request 2 > > > > modcall: group authenticate returns handled for request > 2 Sending > > > > Access-Challenge of id 151 to 10.0.1.3:21645 > > > > EAP-Message = > > > > > > > 0x010403cc19005553311230100603550408130954656e6e65737365653112 > > > 30100603550407 > > > > > > > 13094f616b205269646765310d300b060355040a130453414943310f300d06 > > > 0355040b13064e > > > > > > > 4149534d43311830160603550403130f4e41535652313820526f6f74204341 > > > 311a301806092a > > > > > > > 864886f70d010901160b746d68406e61737672313830819f300d06092a8648 > > > 86f70d01010105 > > > > > > > 0003818d0030818902818100f53d6206d775bd27ecc7f41358590f88eba011 > > > 4424ccfe8c75a1 > > > > > > > 735668a6506934cb4d1bae177cb9d130ce0b203d21ef9f5ff1eba850e6f1b8 > > > 0fa9b5162975f0 > > > > 0e4ac2fc4b0b0fe2ae8a6bef2a2651abc1ede8e72cad24e2210e > > > > EAP-Message = > > > > > > > 0xee6b46998af153a26274412e8e63816ecaa5bc997bf18ffaef66d42b98c0 > > > deb6f4db1ba0b0 > > > > > > > 150203010001a381f33081f0301d0603551d0e04160414552260d6dd4cebad > > > e9a0adacf4733a > > > > > > > bee5640ca33081c00603551d230481b83081b58014552260d6dd4cebade9a0 > > > adacf4733abee5 > > > > > > > 640ca3a18191a4818e30818b310b3009060355040613025553311230100603 > > > 55040813095465 > > > > > > > 6e6e657373656531123010060355040713094f616b205269646765310d300b > > > 060355040a1304 > > > > > > > 53414943310f300d060355040b13064e4149534d4331183016060355040313 > > > 0f4e4153565231 > > > > 3820526f6f74204341311a301806092a864886f70d010901160b > > > > EAP-Message = > > > > > > > 0x746d68406e617376723138820900aa339d443f523340300c0603551d1304 > > > 0530030101ff30 > > > > > > > 0d06092a864886f70d010104050003818100bd318788d5775b1446536c2cab > > > e5031b72131346 > > > > > > > 177a421c930f4ffbf36ba1d516789335f29e984575ab736f350adecf1e437f > > > c5f2a4b3be0a03 > > > > > > > 6c90abc5ac4689237bafc1cf0130ede334bacec4689fbacd52cb8f7c6412ef > > > a28c96827164ce > > > > > > > 8f6dcbb4d8d09c19e8fdc71cad56d2d665e02c6dfdaab49b83fdc2de3d6e47 > > > 4c160301010d0c > > > > > > > 0001090040d3706dbd315a1e6c6d31d7360a14069120fd6cd0de306332ac00 > > > d88280dbd81175 > > > > f1462cee6e4c0e58aa60e0190906edbf214e2bb7024043da0b66 > > > > EAP-Message = > > > > > > > 0xba7b8c5dc300010500404e9adcd06469e95f46852f53d7befb50802a7164 > > > 4dd633a501f6b4 > > > > > > > 82f01857af8a6de4056b27b1a9cbc8c9fc42a67354f698201690fd1d8bb8b5 > > > 8d415690d0c700 > > > > > > > 80d7c0706283d95cd56c5448bc3450fc6cbc7b63366fee4fbe37b5346453c4 > > > 2c2aa3eb857afe > > > > > > > a3ba215cecfaa471487fe7363549984a4b850b7e80601daa5c23e1baaaf727 > > > 964cca749eb0c1 > > > > > > > 40d7e0967915c072c264ed51930825ab6020d45562b1c2e947933ef885759c > > > 0ac83611621d6c > > > > 0b31c0f9cc885fb587317227c972eb16030100040e000000 > > > > Message-Authenticator = > 0x00000000000000000000000000000000 > > > > State = 0x36cdeb1e4af1060e78512ffdc9c31264 > > > > Finished request 2 > > > > Going to the next request > > > > Waking up in 6 seconds... > > > > rad_recv: Access-Request packet from host 10.0.1.3:21645, > > > id=152, length=191 > > > > User-Name = "atkinsondu" > > > > Framed-MTU = 1400 > > > > Called-Station-Id = "000f.9060.c140" > > > > Calling-Station-Id = "0040.96a2.8ef1" > > > > Cisco-AVPair = "ssid=eap-only" > > > > Service-Type = Login-User > > > > Message-Authenticator = > 0xfeb6cd762306cd1a886420d036082cc8 > > > > EAP-Message = 0x0204001119800000000715030100020230 > > > > NAS-Port-Type = Wireless-802.11 > > > > Cisco-NAS-Port = "369" > > > > NAS-Port = 369 > > > > State = 0x36cdeb1e4af1060e78512ffdc9c31264 > > > > NAS-IP-Address = 10.0.1.3 > > > > NAS-Identifier = "wifi-ap1" > > > > Processing the authorize section of radiusd.conf > > > > modcall: entering group authorize for request 3 > > > > modcall[authorize]: module "preprocess" returns ok > for request 3 > > > > rlm_realm: No '\' in User-Name = "atkinsondu", looking > > > up realm NULL > > > > rlm_realm: No such realm "NULL" > > > > modcall[authorize]: module "ntdomain" returns noop > for request 3 > > > > rlm_realm: No '@' in User-Name = "atkinsondu", looking > > > up realm NULL > > > > rlm_realm: No such realm "NULL" > > > > modcall[authorize]: module "suffix" returns noop for request 3 > > > > rlm_eap: EAP packet type response id 4 length 17 > > > > rlm_eap: No EAP Start, assuming it's an on-going EAP > > conversation > > > > modcall[authorize]: module "eap" returns updated for request 3 > > > > modcall: entering group group for request 3 > > > > rlm_dbm: try open database file: > > > /opt/local/etc/raddb/database/users > > > > rlm_dbm: Call parse_user: > > > > sm_parse_user.c: check for loops > > > > Add atkinsondu to user list > > > > rlm_dbm: User <atkinsondu> not foud in database > > > > Remove atkinsondu from user list > > > > sm_parse_user.c: check for loops > > > > Add DEFAULT to user list > > > > rlm_dbm: User <DEFAULT> not foud in database > > > > Remove DEFAULT from user list > > > > modcall[authorize]: module "dbm" returns notfound for > request 3 > > > > modcall: group group returns notfound for request 3 > > > > modcall: group authorize returns updated for request 3 > > > > rad_check_password: Found Auth-Type EAP > > > > auth: type "EAP" > > > > Processing the authenticate section of radiusd.conf > > > > modcall: entering group authenticate for request 3 > > > > rlm_eap: Request found, released from the list > > > > rlm_eap: EAP/peap > > > > rlm_eap: processing type peap > > > > rlm_eap_peap: Authenticate > > > > rlm_eap_tls: processing TLS > > > > rlm_eap_tls: Length Included > > > > eaptls_verify returned 11 > > > > rlm_eap_tls: <<< TLS 1.0 Alert [length 0002], fatal > unknown_ca > > > > TLS Alert read:fatal:unknown CA > > > > TLS_accept:failed in SSLv3 read client certificate A > > > > 24317:error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 > > > alert unknown > > > > ca:s3_pkt.c:1052:SSL alert number 48 24317:error:140940E5:SSL > > > > routines:SSL3_READ_BYTES:ssl handshake > > > > failure:s3_pkt.c:837: > > > > rlm_eap_tls: SSL_read failed in a system call (-1), TLS > > > session fails. > > > > In SSL Handshake Phase > > > > In SSL Accept mode > > > > rlm_eap_tls: BIO_read failed in a system call (-1), TLS > > > session fails. > > > > eaptls_process returned 13 > > > > rlm_eap_peap: EAPTLS_HANDLED > > > > rlm_eap: Freeing handler > > > > modcall[authenticate]: module "eap" returns reject > for request 3 > > > > modcall: group authenticate returns reject for request 3 > > > > auth: Failed to validate the user. > > > > Delaying request 3 for 1 seconds > > > > Finished request 3 > > > > Going to the next request > > > > Waking up in 6 seconds... > > > > rad_recv: Access-Request packet from host 10.0.1.3:21645, > > > id=152, length=191 > > > > Sending Access-Reject of id 152 to 10.0.1.3:21645 > > > > > > > > > > > > - > > > > List info/subscribe/unsubscribe? See > > > http://www.freeradius.org/list/users.html > > > > > > -- > > > ___________________________________________________________ > > > Artur Hecker > > > http://www.enst.fr/~hecker > > > ENST Paris ________________________________________________ > > > > > > > > > > > > > > > > > > - > > List info/subscribe/unsubscribe? See > > http://www.freeradius.org/list/users.html > > > > > > - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

