Any luck with 802.1x authentication using TTLS with MSCHAPv2 ?

2006-10-15 Thread Mohammed Petiwala
Hi Alan, Mak: I tried the patch on both freeRADIUS 1.1.2 and freeRADIUS 1.1.3 - had seen similar problems with wpa-supplicant and freeRADIUS with EAP-TTLS/MS-CHAPv2 and hence had to enable wpa_workaround flag to get past the issue... (which was incorrect) But Mak's patch resolves the issue and now

VSA and other attributes in Access-Accept

2006-09-29 Thread Mohammed Petiwala
RFCs for 3GPP/3GPP2 only some of them are possible in certain type of responses. Thx.Regards, Mohammed. Date: Thu, 30 Mar 2006 14:06:02 -0800 (PST)From: Mohammed Petiwala <[EMAIL PROTECTED]>Subject: VSA and other attributes in Access-AcceptTo: freeradius-users@lists.freeradius.o

VSA and other attributes in Access-Accept

2006-03-30 Thread Mohammed Petiwala
Hi: First thanks to the freeRADIUS team - this is one of the most flexibile and powerful AAA available...I've 2 questions: 1. I've set up my clients to authenticate using EAP-TTLS with MSCHAPv2 as the inner authentication protocol. This works fine with the wpa_suppicant with intel 2200b/g a

Re: Configuring Freeradius to authenticate with MySQL

2004-11-28 Thread Mohammed Petiwala
Hi: Based on the error message - check whether your clients.conf file has local host 127.0.0.1 setup as a valid client and also check the shared-secret used is the correct client 127.0.0.1 { secret = omeya shortname = spacecable nastype = other }

RE: der and pem (urgent!!!)

2004-10-02 Thread Mohammed Petiwala
hi bilal: you could do this in 2 ways: 1. in the eap.conf file in the tls section tls { rsa_key_exchange = yes dh_key_exchange = no rsa_key_length = 1024 dh_key_length = 1024

Re: eap-smartcard

2004-09-25 Thread Mohammed Petiwala
Hi Nelson: check the rlm_eap_tls.h/.c and the eap_tls.c/.h files in the your radius 1.0.0-pre3 1.0.0 release ./src/modules/rlm_eap/types/rlm_eap_tls/ folder in the distro. the rlm_eap_tls.c file has a function to initialize the ssl/tls context params (certs, keys, trusts, etc.) that are used globa

Re: tls failed

2004-09-08 Thread Mohammed Petiwala
Hi Nelson/Alan: the problem seems to be the issue with freeRADIUS not able to authenticate certificate chains of length greater than 2. In Nelson's case the cert chain is CA->RA->user-cert so Nelson will have to apply the patch 112 in bugs.freeradius.org and refer to my email on using freeradius w

Re: Bug/security EAP-TLS

2004-08-24 Thread Mohammed Petiwala
Hi Joey: Could you please provide more details on this find and how it gets triggered (test scenario, conditions, example config). If your find is valid (per feedback from freeRADIUS authors then this serious flaw should be patched asap!) Thanks. Regards, Mohammed. Mohammed H. Petiwala Senior Sta

Re: Pre-proxy attr_rewrite problems

2004-08-11 Thread Mohammed Petiwala
Hi Trevor: why are you trying to use the attr_rewrite stuff for proxying. The simpler approach is to use the proxy.conf and use the 'strip' option for e.g. realm mydomain.net { type= radius authhost= anotherserver.mydomain.net accthost= anothers

EAP-TLS CRL Distribution Point (CDP) support in freeRADIUS.1.0.0

2004-08-11 Thread Mohammed Petiwala
Hi: I am interested in using the CRL feature in the R1.0.0 freeRADIUS release. The documentation/comments in the radiusd.conf file are the only piece I was able to get out. Is there any other documentation on this feature in the freeRADIUS release. We are using CISCO ACS server as well as the MS IA

Re: EAP-TLS Testing

2004-08-11 Thread Mohammed Petiwala
Hi Gopal: I am copying this email to the freeRADIUS community to see if more people can help you with this: here are my 2 cents... you'll need to have your own certificates - normally the organization has mandates on what type of certificates to use and stuff, we have our own CA that issues certifi

Re: EAP-TLS problem

2004-08-05 Thread Mohammed Petiwala
hi ester: we use freeradius.1.0.0-pre3 for our internal testing and i haven't seen this problem. but i've seen similar problems in prior release. some pointers that COULD help (try it out what's the harm!!) 1. do a 'make distclean' and then reconfigure with the prefix you use openssl lib and includ

freeRADIUS patch for EAP-TLS n-tier server/aaa certificate chain support

2004-07-13 Thread Mohammed Petiwala
Hi: Currently the freeRADIUS server (including R1.0.0 pre-3) doesn't support sending server certificate chains during the SERVER-HELLO handshake to the EAP-TLS client/supplicant. This patch allows freeRADIUS to have certificate chain of depth greater than 2 in the server/aaa certificate. This patch

Re: krb5 error

2004-07-11 Thread Mohammed Petiwala
Hi I've seen this error releated to kerberos when building freeRADIUS on a red hat fedora 2 core (could also occur on a fedora 1 core). you need to locate the location of com_err.h file (it's located in a different directory path in this particular distribution) and once you do that it should solve

Re: freeRADIUS cert chain authentication

2004-06-23 Thread Mohammed Petiwala
Hi Alan: If someone can get this working (n-tier cert chain authentication - can it be added as a patch to freeRADIUS) or be made as part of the release 1.0.0 (if done in the release time-frame) Thanks.   Regards, Mohammed.   Alan DeKok <[EMAIL PROTECTED]> wrote: Mohammed Petiwala &

freeRADIUS cert chain authentication

2004-06-21 Thread Mohammed Petiwala
Hi: I am using freeRADIUS (0.9.3 on linux with openssl ) for EAP-TLS authentication using our in-house supplicant, we are currently using 3-tier cert chains and have been using it quite successfully for TLS authentication with OpenSSL but when we try to use these same 3-tier certs for EAP-TLS rad