Hi,
I have configured the radius server to authenticate EAP-PEAP-MSCHAPv2
I have followed the steps mentioned in the following link.
http://wiki.freeradius.org/WPA_HOWTO
But the client is not able to authenticate.
I am attaching the radiusd log.
The log shows a Unknown CA error.
Can anyone help???
Thanks & Regards
Gaurav
Starting - reading configuration files ...
reread_config: reading radiusd.conf
Config: including file: /usr/local/etc/raddb/proxy.conf
Config: including file: /usr/local/etc/raddb/clients.conf
Config: including file: /usr/local/etc/raddb/snmp.conf
Config: including file: /usr/local/etc/raddb/eap.conf
Config: including file: /usr/local/etc/raddb/sql.conf
main: prefix = "/usr/local"
main: localstatedir = "/usr/local/var"
main: logdir = "/usr/local/var/log/radius"
main: libdir = "/usr/local/lib"
main: radacctdir = "/usr/local/var/log/radius/radacct"
main: hostname_lookups = no
main: max_request_time = 30
main: cleanup_delay = 5
main: max_requests = 1024
main: delete_blocked_requests = 0
main: port = 0
main: allow_core_dumps = no
main: log_stripped_names = no
main: log_file = "/usr/local/var/log/radius/radius.log"
main: log_auth = no
main: log_auth_badpass = no
main: log_auth_goodpass = no
main: pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
main: user = "(null)"
main: group = "(null)"
main: usercollide = no
main: lower_user = "no"
main: lower_pass = "no"
main: nospace_user = "no"
main: nospace_pass = "no"
main: checkrad = "/usr/local/sbin/checkrad"
main: proxy_requests = yes
proxy: retry_delay = 5
proxy: retry_count = 3
proxy: synchronous = no
proxy: default_fallback = yes
proxy: dead_time = 120
proxy: post_proxy_authorize = no
proxy: wake_all_if_all_dead = no
security: max_attributes = 200
security: reject_delay = 1
security: status_server = no
main: debug_level = 0
read_config_files: reading dictionary
read_config_files: reading naslist
Using deprecated naslist file. Support for this will go away soon.
read_config_files: reading clients
read_config_files: reading realms
radiusd: entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded exec
exec: wait = yes
exec: program = "(null)"
exec: input_pairs = "request"
exec: output_pairs = "(null)"
exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
pap: encryption_scheme = "crypt"
pap: auto_header = yes
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
mschap: use_mppe = yes
mschap: require_encryption = no
mschap: require_strong = no
mschap: with_ntdomain_hack = no
mschap: passwd = "(null)"
mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap)
Module: Loaded System
unix: cache = no
unix: passwd = "(null)"
unix: shadow = "(null)"
unix: group = "(null)"
unix: radwtmp = "/usr/local/var/log/radius/radwtmp"
unix: usegroup = no
unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
eap: default_eap_type = "peap"
eap: timer_expire = 60
eap: ignore_unknown_eap_types = no
eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
gtc: challenge = "Password: "
gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
tls: rsa_key_exchange = no
tls: dh_key_exchange = yes
tls: rsa_key_length = 512
tls: dh_key_length = 512
tls: verify_depth = 0
tls: CA_path = "(null)"
tls: pem_file_type = yes
tls: private_key_file = "/etc/wireless-auth/localhost.pem"
tls: certificate_file = "/etc/wireless-auth/localhost.pem"
tls: CA_file = "/etc/wireless-auth/root.pem"
tls: private_key_password = "password"
tls: dh_file = "/etc/wireless-auth/DH"
tls: random_file = "/etc/wireless-auth/random"
tls: fragment_size = 1024
tls: include_length = yes
tls: check_crl = no
tls: check_cert_cn = "(null)"
tls: cipher_list = "(null)"
tls: check_cert_issuer = "(null)"
rlm_eap_tls: Loading the certificate file as a chain
WARNING: rlm_eap_tls: Unable to set DH parameters. DH cipher suites may not
work!
WARNING: Fix this by running the OpenSSL command listed in eap.conf
rlm_eap: Loaded and initialized type tls
peap: default_eap_type = "mschapv2"
peap: copy_request_to_tunnel = no
peap: use_tunneled_reply = no
peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
preprocess: huntgroups = "/usr/local/etc/raddb/huntgroups"
preprocess: hints = "/usr/local/etc/raddb/hints"
preprocess: with_ascend_hack = no
preprocess: ascend_channels_per_line = 23
preprocess: with_ntdomain_hack = no
preprocess: with_specialix_jetstream_hack = no
preprocess: with_cisco_vsa_hack = no
preprocess: with_alvarion_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
realm: format = "suffix"
realm: delimiter = "@"
realm: ignore_default = no
realm: ignore_null = no
Module: Instantiated realm (suffix)
Module: Loaded files
files: usersfile = "/usr/local/etc/raddb/users"
files: acctusersfile = "/usr/local/etc/raddb/acct_users"
files: preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address,
Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
detail: detailfile =
"/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
detail: detailperm = 384
detail: dirperm = 493
detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
radutmp: filename = "/usr/local/var/log/radius/radutmp"
radutmp: username = "%{User-Name}"
radutmp: case_sensitive = yes
radutmp: check_with_nas = yes
radutmp: perm = 384
radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
rad_recv: Access-Request packet from host 10.244.5.7:1645, id=130, length=125
User-Name = "john"
Framed-MTU = 1400
Called-Station-Id = "001c.0e42.4df0"
Calling-Station-Id = "0020.b310.33b2"
Service-Type = Login-User
Message-Authenticator = 0x8a8be9899d6dad3c18e9a0e274b53df7
EAP-Message = 0x02010009016a6f686e
NAS-Port-Type = Wireless-802.11
NAS-Port = 293
NAS-IP-Address = 10.244.5.7
NAS-Identifier = "TestAP"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
modcall[authorize]: module "chap" returns noop for request 0
modcall[authorize]: module "mschap" returns noop for request 0
rlm_realm: No '@' in User-Name = "john", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 0
rlm_eap: EAP packet type response id 1 length 9
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 0
users: Matched entry john at line 92
modcall[authorize]: module "files" returns ok for request 0
rlm_pap: Found existing Auth-Type, not changing it.
modcall[authorize]: module "pap" returns noop for request 0
modcall: leaving group authorize (returns updated) for request 0
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns handled for request 0
modcall: leaving group authenticate (returns handled) for request 0
Sending Access-Challenge of id 130 to 10.244.5.7 port 1645
Reply-Message = "Hello, %u"
EAP-Message = 0x010200061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xb5ec22866041abf7779f69a427c491aa
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.244.5.7:1645, id=131, length=242
User-Name = "john"
Framed-MTU = 1400
Called-Station-Id = "001c.0e42.4df0"
Calling-Station-Id = "0020.b310.33b2"
Service-Type = Login-User
Message-Authenticator = 0x9ddd7f5b36ed4fdc246a359f8fe4bb6b
EAP-Message =
0x0202006c190016030100610100005d0301445b182dfab9f300c46061e5bbfd740f1d36ed91f09538583a38f3c315d1317a00003600390038003500160013000a00330032002f0007006600050004006300620061001500120009006500640060001400110008000600030100
NAS-Port-Type = Wireless-802.11
NAS-Port = 293
State = 0xb5ec22866041abf7779f69a427c491aa
NAS-IP-Address = 10.244.5.7
NAS-Identifier = "TestAP"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
modcall[authorize]: module "chap" returns noop for request 1
modcall[authorize]: module "mschap" returns noop for request 1
rlm_realm: No '@' in User-Name = "john", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 1
rlm_eap: EAP packet type response id 2 length 108
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 1
users: Matched entry john at line 92
modcall[authorize]: module "files" returns ok for request 1
rlm_pap: Found existing Auth-Type, not changing it.
modcall[authorize]: module "pap" returns noop for request 1
modcall: leaving group authorize (returns updated) for request 1
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
(other): before/accept initialization
TLS_accept: before/accept initialization
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0061], ClientHello
TLS_accept: SSLv3 read client hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
TLS_accept: SSLv3 write server hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 05f2], Certificate
TLS_accept: SSLv3 write certificate A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
TLS_accept: SSLv3 write server done A
TLS_accept: SSLv3 flush data
TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 1
modcall: leaving group authenticate (returns handled) for request 1
Sending Access-Challenge of id 131 to 10.244.5.7 port 1645
Reply-Message = "Hello, %u"
EAP-Message =
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
EAP-Message =
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
EAP-Message =
0xfa5966faedf096b56d07458967679b58e711338488c67c3371800e3a36012131bb5ceafd122db887f01b0203010001a37b307930090603551d1304023000302c06096086480186f842010d041f161d4f70656e53534c2047656e657261746564204365727469666963617465301d0603551d0e04160414802518fc6f75ff0dbf599c6e296c11997d5468bf301f0603551d2304183016801462d058c9815105b115d5f73a14427da2cf74aa77300d06092a864886f70d01010505000381810041cbc5d06d1df1a6db0e32f7af1ce846b7274ab5d7a9e9ce70846cb78c72eb1a73b901fda47c29b062ea2001d99d72f1f13bab0b80b166c29ce8361c85df
EAP-Message =
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
EAP-Message = 0x1302494e310c300a06035504081303476f61310e300c
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xf85b2c42138893b8355a824c688f8a8c
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.244.5.7:1645, id=132, length=140
User-Name = "john"
Framed-MTU = 1400
Called-Station-Id = "001c.0e42.4df0"
Calling-Station-Id = "0020.b310.33b2"
Service-Type = Login-User
Message-Authenticator = 0x9201e440895587b4e6e1acae188cb1cb
EAP-Message = 0x020300061900
NAS-Port-Type = Wireless-802.11
NAS-Port = 293
State = 0xf85b2c42138893b8355a824c688f8a8c
NAS-IP-Address = 10.244.5.7
NAS-Identifier = "TestAP"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
modcall[authorize]: module "preprocess" returns ok for request 2
modcall[authorize]: module "chap" returns noop for request 2
modcall[authorize]: module "mschap" returns noop for request 2
rlm_realm: No '@' in User-Name = "john", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 2
rlm_eap: EAP packet type response id 3 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 2
users: Matched entry john at line 92
modcall[authorize]: module "files" returns ok for request 2
rlm_pap: Found existing Auth-Type, not changing it.
modcall[authorize]: module "pap" returns noop for request 2
modcall: leaving group authorize (returns updated) for request 2
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 2
modcall: leaving group authenticate (returns handled) for request 2
Sending Access-Challenge of id 132 to 10.244.5.7 port 1645
Reply-Message = "Hello, %u"
EAP-Message =
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
EAP-Message =
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
EAP-Message =
0x2cdd88d7d6603b923e96666a7371a5c05736c25b392cde017f0f8a647b3297d0c18fefbe82922d83c8852bb3cd44ff36d74f0ebe9619012c048bffe1fadd5673030a895dc791aba0945c7e0ca228080a04a016030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xada20e673fca2961f6842a350347a50a
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.244.5.7:1645, id=133, length=147
User-Name = "john"
Framed-MTU = 1400
Called-Station-Id = "001c.0e42.4df0"
Calling-Station-Id = "0020.b310.33b2"
Service-Type = Login-User
Message-Authenticator = 0xf5023d8c617c2adba6e4f27f9e9da936
EAP-Message = 0x0204000d190015030100020230
NAS-Port-Type = Wireless-802.11
NAS-Port = 293
State = 0xada20e673fca2961f6842a350347a50a
NAS-IP-Address = 10.244.5.7
NAS-Identifier = "TestAP"
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
modcall[authorize]: module "preprocess" returns ok for request 3
modcall[authorize]: module "chap" returns noop for request 3
modcall[authorize]: module "mschap" returns noop for request 3
rlm_realm: No '@' in User-Name = "john", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 3
rlm_eap: EAP packet type response id 4 length 13
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 3
users: Matched entry john at line 92
modcall[authorize]: module "files" returns ok for request 3
rlm_pap: Found existing Auth-Type, not changing it.
modcall[authorize]: module "pap" returns noop for request 3
modcall: leaving group authorize (returns updated) for request 3
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
rlm_eap_tls: <<< TLS 1.0 Alert [length 0002], fatal unknown_ca
TLS Alert read:fatal:unknown CA
TLS_accept:failed in SSLv3 read client certificate A
rlm_eap: SSL error error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert
unknown ca
rlm_eap_tls: SSL_read failed inside of TLS (-1), TLS session fails.
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
rlm_eap: Freeing handler
modcall[authenticate]: module "eap" returns reject for request 3
modcall: leaving group authenticate (returns reject) for request 3
auth: Failed to validate the user.
Delaying request 3 for 1 seconds
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.244.5.7:1645, id=133, length=147
Sending Access-Reject of id 133 to 10.244.5.7 port 1645
EAP-Message = 0x04040004
Message-Authenticator = 0x00000000000000000000000000000000
Reply-Message = "Hello, %u"
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 130 with timestamp 476a6656
Cleaning up request 1 ID 131 with timestamp 476a6656
Cleaning up request 2 ID 132 with timestamp 476a6656
Cleaning up request 3 ID 133 with timestamp 476a6656
Nothing to do. Sleeping until we see a request.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html