Hi
I have successfully used Freeradius1.0.1 to authenticate my clients
using EAP-MD5 and EAP-TLS.
But i am not able to get EAP -TTLS working.
I have the same username password (users file) used in case of
EAP-TTLS phase2 as that used in EAP-MD5 which is successful
and also I have the same server cert being used for EAP -TTLS as that
used in EAP-TLS which is successful
Just that making the EAP-TTLS work is causing problems although with
these credentials already working for EAP TLS and EAP -MD5 ...
Following is the log i have attached for a single EAP-TTLS
Authentication session initiated by xsupplicant.
Can any one suggest me how to work it ...
regards
arun
Starting - reading configuration files ...
reread_config: reading radiusd.conf
Config: including file: /usr/local/etc//raddb/clients.conf
Config: including file: /usr/local/etc//raddb/snmp.conf
Config: including file: /usr/local/etc//raddb/eap.conf
Config: including file: /usr/local/etc//raddb/sql.conf
main: prefix = "/usr/local"
main: localstatedir = "/usr/local/var"
main: logdir = "/usr/local/var/log/radius"
main: libdir = "/usr/local/lib"
main: radacctdir = "/usr/local/var/log/radius/radacct"
main: hostname_lookups = no
main: max_request_time = 30
main: cleanup_delay = 5
main: max_requests = 1024
main: delete_blocked_requests = 0
main: port = 0
main: allow_core_dumps = no
main: log_stripped_names = no
main: log_file = "/usr/local/var/log/radius/radius.log"
main: log_auth = yes
main: log_auth_badpass = no
main: log_auth_goodpass = no
main: pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
main: user = "(null)"
main: group = "(null)"
main: usercollide = no
main: lower_user = "no"
main: lower_pass = "no"
main: nospace_user = "no"
main: nospace_pass = "no"
main: checkrad = "/usr/local/sbin/checkrad"
main: proxy_requests = no
security: max_attributes = 200
security: reject_delay = 1
security: status_server = no
main: debug_level = 0
read_config_files: reading dictionary
read_config_files: reading naslist
Using deprecated naslist file. Support for this will go away soon.
read_config_files: reading clients
read_config_files: reading realms
radiusd: entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded exec
exec: wait = yes
exec: program = "(null)"
exec: input_pairs = "request"
exec: output_pairs = "(null)"
exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
pap: encryption_scheme = "crypt"
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
mschap: use_mppe = yes
mschap: require_encryption = no
mschap: require_strong = no
mschap: with_ntdomain_hack = no
mschap: passwd = "(null)"
mschap: authtype = "MS-CHAP"
mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap)
Module: Loaded System
unix: cache = no
unix: passwd = "(null)"
unix: shadow = "(null)"
unix: group = "(null)"
unix: radwtmp = "/usr/local/var/log/radius/radwtmp"
unix: usegroup = no
unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
eap: default_eap_type = "ttls"
eap: timer_expire = 60
eap: ignore_unknown_eap_types = no
eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
tls: rsa_key_exchange = no
tls: dh_key_exchange = yes
tls: rsa_key_length = 512
tls: dh_key_length = 512
tls: verify_depth = 0
tls: CA_path = "(null)"
tls: pem_file_type = yes
tls: private_key_file = "/home/vpn/certs/ca_radius.pem"
tls: certificate_file = "/home/vpn/certs/ca_radius.pem"
tls: CA_file = "/home/vpn/certs/root.pem"
tls: private_key_password = "test"
tls: dh_file = "/etc/1x/dh"
tls: random_file = "/etc/1x/random"
tls: fragment_size = 1398
tls: include_length = yes
tls: check_crl = no
tls: check_cert_cn = "(null)"
rlm_eap: Loaded and initialized type tls
ttls: default_eap_type = "md5"
ttls: copy_request_to_tunnel = no
ttls: use_tunneled_reply = no
rlm_eap: Loaded and initialized type ttls
mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
preprocess: huntgroups = "/usr/local/etc//raddb/huntgroups"
preprocess: hints = "/usr/local/etc//raddb/hints"
preprocess: with_ascend_hack = no
preprocess: ascend_channels_per_line = 23
preprocess: with_ntdomain_hack = no
preprocess: with_specialix_jetstream_hack = no
preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded detail
detail: detailfile =
"/usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d"
detail: detailperm = 384
detail: dirperm = 493
detail: locking = no
Module: Instantiated detail (auth_log)
Module: Loaded realm
realm: format = "suffix"
realm: delimiter = "@"
realm: ignore_default = no
realm: ignore_null = no
Module: Instantiated realm (suffix)
Module: Loaded files
files: usersfile = "/usr/local/etc//raddb/users"
files: acctusersfile = "/usr/local/etc//raddb/acct_users"
files: preproxy_usersfile = "/usr/local/etc//raddb/preproxy_users"
files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address,
Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
detail: detailfile =
"/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
detail: detailperm = 384
detail: dirperm = 493
detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
radutmp: filename = "/usr/local/var/log/radius/radutmp"
radutmp: username = "%{User-Name}"
radutmp: case_sensitive = yes
radutmp: check_with_nas = yes
radutmp: perm = 384
radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.0.1:1812, id=60, length=75
User-Name = "futsoft"
EAP-Message = 0x0201000c01667574736f6674
Message-Authenticator = 0xdba241a0bf22259046efb275150c0713
NAS-Identifier = "fsNas1"
NAS-Port = 2
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
radius_xlat:
'/usr/local/var/log/radius/radacct/192.168.0.1/auth-detail-20050518'
rlm_detail:
/usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /usr/local/var/log/radius/radacct/192.168.0.1/auth-detail-20050518
modcall[authorize]: module "auth_log" returns ok for request 0
modcall[authorize]: module "chap" returns noop for request 0
rlm_realm: No '@' in User-Name = "futsoft", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 0
rlm_eap: EAP packet type response id 1 length 12
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 0
users: Matched futsoft at 62
modcall[authorize]: module "files" returns ok for request 0
modcall: group authorize returns updated for request 0
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 60 to 192.168.0.1:1812
Reply-Message = " Futsoft request recieved"
EAP-Message = 0x010200061520
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xc2b72c7219277248b0cdbf99bbe3b9fb
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.0.1:1812, id=61, length=179
User-Name = "futsoft"
EAP-Message =
0x0202006215800000005816030100530100004f0301428c836c2bf40f432995fd2ba0fb61677ee422214d37697336bf93deb790d1e300002800160013000a006600050004006500640063006200610060001500120009001400110008000600030100
Message-Authenticator = 0x74c9649dcda6f1462af801217399a8da
NAS-Identifier = "fsNas1"
NAS-Port = 2
State = 0xc2b72c7219277248b0cdbf99bbe3b9fb
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
radius_xlat:
'/usr/local/var/log/radius/radacct/192.168.0.1/auth-detail-20050518'
rlm_detail:
/usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /usr/local/var/log/radius/radacct/192.168.0.1/auth-detail-20050518
modcall[authorize]: module "auth_log" returns ok for request 1
modcall[authorize]: module "chap" returns noop for request 1
rlm_realm: No '@' in User-Name = "futsoft", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 1
rlm_eap: EAP packet type response id 2 length 98
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 1
users: Matched futsoft at 62
modcall[authorize]: module "files" returns ok for request 1
modcall: group authorize returns updated for request 1
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
rlm_eap: Request found, released from the list
rlm_eap: EAP/ttls
rlm_eap: processing type ttls
rlm_eap_ttls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
(other): before/accept initialization
TLS_accept: before/accept initialization
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0053], ClientHello
TLS_accept: SSLv3 read client hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
TLS_accept: SSLv3 write server hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 061f], Certificate
TLS_accept: SSLv3 write certificate A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
TLS_accept: SSLv3 write server done A
TLS_accept: SSLv3 flush data
TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
eaptls_process returned 13
modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 61 to 192.168.0.1:1812
Reply-Message = " Futsoft request recieved"
EAP-Message =
0x0103058015c00000067c160301004a020000460301428a4ae64524e781e05e6039cd6bfccac7f91212cef8b8c7006d1b7e363eccfd20bc97ca26f06e3cfc76f7eb973285b90e9d9854cbf779ed8940a5fdd3c4a5e828000a00160301061f0b00061b0006180002a33082029f30820208a003020102020102300d06092a864886f70d0101040500308186310b300906035504061302494e310b300906035504081302544e3110300e060355040713074368656e6e61693110300e060355040a1307667574736f66743110300e060355040b1307667574736f66743110300e0603550403140763615f726f6f743122302006092a864886f70d0109011613
EAP-Message =
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
EAP-Message =
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
EAP-Message =
0xd6c1ab1f320a51a470f63692725fabf035ff01ab00036f3082036b308202d4a003020102020100300d06092a864886f70d0101040500308186310b300906035504061302494e310b300906035504081302544e3110300e060355040713074368656e6e61693110300e060355040a1307667574736f66743110300e060355040b1307667574736f66743110300e0603550403140763615f726f6f743122302006092a864886f70d010901161363615f726f6f7440667574736f66742e636f6d301e170d3034313230363036303033385a170d3035313230373036303033385a308186310b300906035504061302494e310b300906035504081302544e31
EAP-Message =
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
EAP-Message =
0x66541f01fbae6c558e119d0203010001a381e63081e3301d0603551d0e04160414cb9cc50d3407e63693439af032fae10fc997eb453081b30603551d230481ab3081a88014cb9cc50d3407e63693439af032fae10fc997eb45a1818ca48189308186310b300906035504061302494e310b300906035504081302544e3110300e060355040713074368656e6e616931
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x4e21012d8278263aa6d41f58ddeb3e51
Finished request 1
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 60 with timestamp 428a4ae6
Cleaning up request 1 ID 61 with timestamp 428a4ae6
Nothing to do. Sleeping until we see a request.
rad_recv: Access-Request packet from host 192.168.0.1:1812, id=61, length=179
User-Name = "futsoft"
EAP-Message =
0x0202006215800000005816030100530100004f0301428c836c2bf40f432995fd2ba0fb61677ee422214d37697336bf93deb790d1e300002800160013000a006600050004006500640063006200610060001500120009001400110008000600030100
Message-Authenticator = 0x74c9649dcda6f1462af801217399a8da
NAS-Identifier = "fsNas1"
NAS-Port = 2
State = 0xc2b72c7219277248b0cdbf99bbe3b9fb
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
modcall[authorize]: module "preprocess" returns ok for request 2
radius_xlat:
'/usr/local/var/log/radius/radacct/192.168.0.1/auth-detail-20050518'
rlm_detail:
/usr/local/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /usr/local/var/log/radius/radacct/192.168.0.1/auth-detail-20050518
modcall[authorize]: module "auth_log" returns ok for request 2
modcall[authorize]: module "chap" returns noop for request 2
rlm_realm: No '@' in User-Name = "futsoft", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 2
rlm_eap: EAP packet type response id 2 length 98
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 2
users: Matched futsoft at 62
modcall[authorize]: module "files" returns ok for request 2
modcall: group authorize returns updated for request 2
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
rlm_eap: Request not found in the list
rlm_eap: Either EAP-request timed out OR EAP-response to an unknown EAP-request
rlm_eap: Failed in handler
modcall[authenticate]: module "eap" returns invalid for request 2
modcall: group authenticate returns invalid for request 2
auth: Failed to validate the user.
Login incorrect: [futsoft] (from client FutureNAS port 2)
Delaying request 2 for 1 seconds
Finished request 2
Going to the next request
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 61 to 192.168.0.1:1812
Reply-Message = " Futsoft request recieved"
Waking up in 4 seconds...
--- Walking the entire request list ---
Cleaning up request 2 ID 61 with timestamp 428a4af0
Nothing to do. Sleeping until we see a request.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html