Re: need help - force EAP-TTLS to validate the server certificate

2010-09-21 Thread Klaus Laus
I tried to login from another client, but it´s the same problem.

TLS Alert write:fatal:handshake failure
TLS_accept:error in SSLv3 read client certificate B
rlm_eap: SSL error error:140890C7:SSL
routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
SSL: SSL_read failed in a system call (-1), TLS session fails.

sorry that I ask again but I want to be sure that I didn´t understand anything 
wrong.
Is it not generally possible to configure the freeradius server so that only 
clients with username/password and client certificate can login successfully?
For expample only users who choose PEAP with the right username and password 
and having a client certificate can login successfully.

Or is the problem with the error in reading client certificate a problem in the 
clients?

Thanks a lot!

 Original-Nachricht 
 Datum: Fri, 17 Sep 2010 11:26:56 -0400
 Von: John Dennis jden...@redhat.com
 An: FreeRadius users mailing list freeradius-users@lists.freeradius.org
 CC: Klaus Laus superkla...@gmx.de
 Betreff: Re: need help - force EAP-TTLS to validate the server certificate

 On 09/17/2010 11:00 AM, Klaus Laus wrote:
 
  thanks a lot for your answer.
  Either move the files module before eap, or use unlang to set it:
 
  authorize {
  ...
  update control {
EAP-TLS-Require-Client-Cert = yes
  }
  eap
  ...
  }
  I did the changes in the authorize section, and freeradius seems to
 require the client certificate. But the server is not accept my certificate. I
 don't think that the certificate is bad because I can login any client with
 the same certificate when I use TLS instead of PEAP.
  This is my way to login with PEAP on a windows xp client maybe I do
 anything wrong? :
  I import the pksc12 certificate from the freeradius server in the
 windows xp certificate management. When I type certmgr.msc under run I can 
 see
 that the certificate is successfully imported. Then I scan for the wireless
 networks and connect to wifix, I use PEAP with MSCHAP v.2 and type in
 testuser as user with the correct password.
  Here you can see the debug output (freeradius did not find my
 certificate):
 
 That's right, the server didn't get your cert, it's right in the debug. 
 As Alan said this isn't a server issue, it's a client issue, figure out 
 why your client is not returning a cert.
 
  TLS Alert write:fatal:handshake failure
   TLS_accept:error in SSLv3 read client certificate B
  rlm_eap: SSL error error:140890C7:SSL
 routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
  SSL: SSL_read failed in a system call (-1), TLS session fails.
 -- 
 John Dennis jden...@redhat.com
 
 Looking to carve out IT costs?
 www.redhat.com/carveoutcosts/

-- 
GMX DSL SOMMER-SPECIAL: Surf  Phone Flat 16.000 für nur 19,99 Euro/mtl.!*
http://portal.gmx.net/de/go/dsl
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: need help - force EAP-TTLS to validate the server certificate

2010-09-21 Thread Alan DeKok
Klaus Laus wrote:
 I tried to login from another client, but it´s the same problem.
 
 TLS Alert write:fatal:handshake failure
 TLS_accept:error in SSLv3 read client certificate B
 rlm_eap: SSL error error:140890C7:SSL
 routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
 SSL: SSL_read failed in a system call (-1), TLS session fails.

  That message should be clear.  The supplicant didn't send a client
certificate.

  Did you create a client certificate?

  If so, did you copy it to the client?

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: need help - force EAP-TTLS to validate the server certificate

2010-09-21 Thread Klaus Laus
The message is clear. Yes I created a client certificate and imported it into 
the client. 
When I use TLS to connect to the freeradius server I can choose the client 
certificate in the TLS dialog and the client can login successfully.

When I use PEAP to login I have to type in my username and password in the PEAP 
dialog from windows but I can not select a client certificate, the certificate 
is imported successfully in the windows certificate manager.
Should I be able to choose a client certificate in the PEAP dialog or should it 
work when the certificate is saved in the windows certificate manager and I 
only have to type in my username and password in the PEAP dialog? 

I want to allow only PEAP logins (or username/password logins) with client 
certificate. 



 Original-Nachricht 
 Datum: Tue, 21 Sep 2010 09:33:29 +0200
 Von: Alan DeKok al...@deployingradius.com
 An: FreeRadius users mailing list freeradius-users@lists.freeradius.org
 Betreff: Re: need help - force EAP-TTLS to validate the server certificate

 Klaus Laus wrote:
  I tried to login from another client, but it´s the same problem.
  
  TLS Alert write:fatal:handshake failure
  TLS_accept:error in SSLv3 read client certificate B
  rlm_eap: SSL error error:140890C7:SSL
  routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
  SSL: SSL_read failed in a system call (-1), TLS session fails.
 
   That message should be clear.  The supplicant didn't send a client
 certificate.
 
   Did you create a client certificate?
 
   If so, did you copy it to the client?
 
   Alan DeKok.
 -
 List info/subscribe/unsubscribe? See
 http://www.freeradius.org/list/users.html

-- 
GRATIS: Spider-Man 1-3 sowie 300 weitere Videos!
Jetzt freischalten! http://portal.gmx.net/de/go/maxdome
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: need help - force EAP-TTLS to validate the server certificate

2010-09-21 Thread Alan DeKok
Klaus Laus wrote:
 The message is clear. Yes I created a client certificate and imported it into 
 the client. 
 When I use TLS to connect to the freeradius server I can choose the client 
 certificate in the TLS dialog and the client can login successfully.
 
 When I use PEAP to login I have to type in my username and password in the 
 PEAP dialog from windows but I can not select a client certificate, the 
 certificate is imported successfully in the windows certificate manager.

  So... the issue is that you haven't configured the client to use the
client certificate.

 Should I be able to choose a client certificate in the PEAP dialog or should 
 it work when the certificate is saved in the windows certificate manager and 
 I only have to type in my username and password in the PEAP dialog? 

  Ask Microsoft how their software works.  It's annoying to have you ask
a question here when you *already* know that you haven't configured the
client certificate for PEAP.

  It means that you *know* it's not sending a client certificate.  You
*know* you haven't configured one on the client.  And you *still* post
the FreeRADIUS debug output, asking us to debug the *server* to see why
the client certificate isn't being used.

  Microsoft has documentation for Windows.  Read it.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


RE: need help - force EAP-TTLS to validate the server certificate

2010-09-21 Thread Danner, Mearl
EAP/PEAP  requires a server certificate. You can opt for the M$ supplicant to 
verify it but it does not use a client certificate.

That's why there is no option to pick the client cert when setting up PEAP.

-Original Message-
From: freeradius-users-bounces+jmdanner=samford@lists.freeradius.org 
[mailto:freeradius-users-bounces+jmdanner=samford@lists.freeradius.org] On 
Behalf Of Klaus Laus
Sent: Tuesday, September 21, 2010 5:17 AM
To: FreeRadius users mailing list
Subject: Re: need help - force EAP-TTLS to validate the server certificate

The message is clear. Yes I created a client certificate and imported it into 
the client. 
When I use TLS to connect to the freeradius server I can choose the client 
certificate in the TLS dialog and the client can login successfully.

When I use PEAP to login I have to type in my username and password in the PEAP 
dialog from windows but I can not select a client certificate, the certificate 
is imported successfully in the windows certificate manager.
Should I be able to choose a client certificate in the PEAP dialog or should it 
work when the certificate is saved in the windows certificate manager and I 
only have to type in my username and password in the PEAP dialog? 

I want to allow only PEAP logins (or username/password logins) with client 
certificate. 



 Original-Nachricht 
 Datum: Tue, 21 Sep 2010 09:33:29 +0200
 Von: Alan DeKok al...@deployingradius.com
 An: FreeRadius users mailing list freeradius-users@lists.freeradius.org
 Betreff: Re: need help - force EAP-TTLS to validate the server certificate

 Klaus Laus wrote:
  I tried to login from another client, but it´s the same problem.
  
  TLS Alert write:fatal:handshake failure
  TLS_accept:error in SSLv3 read client certificate B
  rlm_eap: SSL error error:140890C7:SSL
  routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
  SSL: SSL_read failed in a system call (-1), TLS session fails.
 
   That message should be clear.  The supplicant didn't send a client
 certificate.
 
   Did you create a client certificate?
 
   If so, did you copy it to the client?
 
   Alan DeKok.
 -
 List info/subscribe/unsubscribe? See
 http://www.freeradius.org/list/users.html

-- 
GRATIS: Spider-Man 1-3 sowie 300 weitere Videos!
Jetzt freischalten! http://portal.gmx.net/de/go/maxdome
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: need help - force EAP-TTLS to validate the server certificate

2010-09-21 Thread Klaus Laus
I *only* want to know all the time if it´s possible to login on a client with 
user/userpassword and client certificate. I pleased you *only* to say *no* or 
*yes* and maybe one sentence more.

I know you´re a freeradius expert not a M$ expert but I thought when you know 
how to set up a server you just know how to configure any clients.
When you don´t want to answer me that question it´s ok, I can search on M$ 
websites, you´re right. But I think if you wanted you could simply answer my 
question.

nevertheless thank you for the great help with the configuration of the server.

Greetings misterklaus



 Original-Nachricht 
 Datum: Tue, 21 Sep 2010 14:21:26 +0200
 Von: Alan DeKok al...@deployingradius.com
 An: FreeRadius users mailing list freeradius-users@lists.freeradius.org
 Betreff: Re: need help - force EAP-TTLS to validate the server certificate

 Klaus Laus wrote:
  The message is clear. Yes I created a client certificate and imported it
 into the client. 
  When I use TLS to connect to the freeradius server I can choose the
 client certificate in the TLS dialog and the client can login successfully.
  
  When I use PEAP to login I have to type in my username and password in
 the PEAP dialog from windows but I can not select a client certificate, the
 certificate is imported successfully in the windows certificate manager.
 
   So... the issue is that you haven't configured the client to use the
 client certificate.
 
  Should I be able to choose a client certificate in the PEAP dialog or
 should it work when the certificate is saved in the windows certificate
 manager and I only have to type in my username and password in the PEAP 
 dialog? 
 
   Ask Microsoft how their software works.  It's annoying to have you ask
 a question here when you *already* know that you haven't configured the
 client certificate for PEAP.
 
   It means that you *know* it's not sending a client certificate.  You
 *know* you haven't configured one on the client.  And you *still* post
 the FreeRADIUS debug output, asking us to debug the *server* to see why
 the client certificate isn't being used.
 
   Microsoft has documentation for Windows.  Read it.
 
   Alan DeKok.
 -
 List info/subscribe/unsubscribe? See
 http://www.freeradius.org/list/users.html

-- 
GRATIS: Spider-Man 1-3 sowie 300 weitere Videos!
Jetzt freischalten! http://portal.gmx.net/de/go/maxdome
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: need help - force EAP-TTLS to validate the server certificate

2010-09-21 Thread Alan DeKok
Klaus Laus wrote:
 I *only* want to know all the time if it´s possible to login on a client with 
 user/userpassword and client certificate. I pleased you *only* to say *no* or 
 *yes* and maybe one sentence more.
 
 I know you´re a freeradius expert not a M$ expert but I thought when you know 
 how to set up a server you just know how to configure any clients.
 When you don´t want to answer me that question it´s ok, I can search on M$ 
 websites, you´re right. But I think if you wanted you could simply answer my 
 question.

  Honestly, I haven't configured a Windows system for EAP in 3-4 years.

  And my frustration wasn't about asking a Microsoft question.  It's
that you were *hiding* information.  The information you hid from us was
*exactly* the information needed to solve the problem.

  That was not nice.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: RE: need help - force EAP-TTLS to validate the server certificate

2010-09-21 Thread Klaus Laus
A lot of thanks for your answer Mearl Danner, I read the pages of M$ but I 
didn´t found any possibilitys to configure the clients so, that the client is 
use a username/password and certificate. Do you know how I can do these 
settings or if it´s generelly not possible? thanks again



 Original-Nachricht 
 Datum: Tue, 21 Sep 2010 08:02:27 -0500
 Von: Danner, Mearl jmdan...@samford.edu
 An: FreeRadius users mailing list freeradius-users@lists.freeradius.org
 Betreff: RE: need help - force EAP-TTLS to validate the server certificate

 EAP/PEAP  requires a server certificate. You can opt for the M$ supplicant
 to verify it but it does not use a client certificate.
 
 That's why there is no option to pick the client cert when setting up
 PEAP.
 
 -Original Message-
 From: freeradius-users-bounces+jmdanner=samford@lists.freeradius.org
 [mailto:freeradius-users-bounces+jmdanner=samford@lists.freeradius.org]
 On Behalf Of Klaus Laus
 Sent: Tuesday, September 21, 2010 5:17 AM
 To: FreeRadius users mailing list
 Subject: Re: need help - force EAP-TTLS to validate the server certificate
 
 The message is clear. Yes I created a client certificate and imported it
 into the client. 
 When I use TLS to connect to the freeradius server I can choose the client
 certificate in the TLS dialog and the client can login successfully.
 
 When I use PEAP to login I have to type in my username and password in the
 PEAP dialog from windows but I can not select a client certificate, the
 certificate is imported successfully in the windows certificate manager.
 Should I be able to choose a client certificate in the PEAP dialog or
 should it work when the certificate is saved in the windows certificate 
 manager
 and I only have to type in my username and password in the PEAP dialog? 
 
 I want to allow only PEAP logins (or username/password logins) with client
 certificate. 
 
 
 
  Original-Nachricht 
  Datum: Tue, 21 Sep 2010 09:33:29 +0200
  Von: Alan DeKok al...@deployingradius.com
  An: FreeRadius users mailing list
 freeradius-users@lists.freeradius.org
  Betreff: Re: need help - force EAP-TTLS to validate the server
 certificate
 
  Klaus Laus wrote:
   I tried to login from another client, but it´s the same problem.
   
   TLS Alert write:fatal:handshake failure
   TLS_accept:error in SSLv3 read client certificate B
   rlm_eap: SSL error error:140890C7:SSL
   routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
   SSL: SSL_read failed in a system call (-1), TLS session fails.
  
That message should be clear.  The supplicant didn't send a client
  certificate.
  
Did you create a client certificate?
  
If so, did you copy it to the client?
  
Alan DeKok.
  -
  List info/subscribe/unsubscribe? See
  http://www.freeradius.org/list/users.html
 
 -- 
 GRATIS: Spider-Man 1-3 sowie 300 weitere Videos!
 Jetzt freischalten! http://portal.gmx.net/de/go/maxdome
 -
 List info/subscribe/unsubscribe? See
 http://www.freeradius.org/list/users.html
 
 -
 List info/subscribe/unsubscribe? See
 http://www.freeradius.org/list/users.html

-- 
GRATIS: Spider-Man 1-3 sowie 300 weitere Videos!
Jetzt freischalten! http://portal.gmx.net/de/go/maxdome
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

RE: RE: need help - force EAP-TTLS to validate the server certificate

2010-09-21 Thread Danner, Mearl
Not possible with the Microsoft supplicant as far as I know. PEAP encapsulation 
doesn't support client certificates.

Probably what you want is EAP-TTLS which is not supported by Microsoft. You'll 
need a third party supplicant for it.

Might look at this for reference:

http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol



-Original Message-
From: freeradius-users-bounces+jmdanner=samford@lists.freeradius.org 
[mailto:freeradius-users-bounces+jmdanner=samford@lists.freeradius.org] On 
Behalf Of Klaus Laus
Sent: Tuesday, September 21, 2010 10:30 AM
To: FreeRadius users mailing list
Subject: Re: RE: need help - force EAP-TTLS to validate the server certificate

A lot of thanks for your answer Mearl Danner, I read the pages of M$ but I 
didn´t found any possibilitys to configure the clients so, that the client is 
use a username/password and certificate. Do you know how I can do these 
settings or if it´s generelly not possible? thanks again



 Original-Nachricht 
 Datum: Tue, 21 Sep 2010 08:02:27 -0500
 Von: Danner, Mearl jmdan...@samford.edu
 An: FreeRadius users mailing list freeradius-users@lists.freeradius.org
 Betreff: RE: need help - force EAP-TTLS to validate the server certificate

 EAP/PEAP  requires a server certificate. You can opt for the M$ supplicant
 to verify it but it does not use a client certificate.
 
 That's why there is no option to pick the client cert when setting up
 PEAP.
 
 -Original Message-
 From: freeradius-users-bounces+jmdanner=samford@lists.freeradius.org
 [mailto:freeradius-users-bounces+jmdanner=samford@lists.freeradius.org]
 On Behalf Of Klaus Laus
 Sent: Tuesday, September 21, 2010 5:17 AM
 To: FreeRadius users mailing list
 Subject: Re: need help - force EAP-TTLS to validate the server certificate
 
 The message is clear. Yes I created a client certificate and imported it
 into the client. 
 When I use TLS to connect to the freeradius server I can choose the client
 certificate in the TLS dialog and the client can login successfully.
 
 When I use PEAP to login I have to type in my username and password in the
 PEAP dialog from windows but I can not select a client certificate, the
 certificate is imported successfully in the windows certificate manager.
 Should I be able to choose a client certificate in the PEAP dialog or
 should it work when the certificate is saved in the windows certificate 
 manager
 and I only have to type in my username and password in the PEAP dialog? 
 
 I want to allow only PEAP logins (or username/password logins) with client
 certificate. 
 
 
 
  Original-Nachricht 
  Datum: Tue, 21 Sep 2010 09:33:29 +0200
  Von: Alan DeKok al...@deployingradius.com
  An: FreeRadius users mailing list
 freeradius-users@lists.freeradius.org
  Betreff: Re: need help - force EAP-TTLS to validate the server
 certificate
 
  Klaus Laus wrote:
   I tried to login from another client, but it´s the same problem.
   
   TLS Alert write:fatal:handshake failure
   TLS_accept:error in SSLv3 read client certificate B
   rlm_eap: SSL error error:140890C7:SSL
   routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
   SSL: SSL_read failed in a system call (-1), TLS session fails.
  
That message should be clear.  The supplicant didn't send a client
  certificate.
  
Did you create a client certificate?
  
If so, did you copy it to the client?
  
Alan DeKok.
  -
  List info/subscribe/unsubscribe? See
  http://www.freeradius.org/list/users.html
 
 -- 
 GRATIS: Spider-Man 1-3 sowie 300 weitere Videos!
 Jetzt freischalten! http://portal.gmx.net/de/go/maxdome
 -
 List info/subscribe/unsubscribe? See
 http://www.freeradius.org/list/users.html
 
 -
 List info/subscribe/unsubscribe? See
 http://www.freeradius.org/list/users.html

-- 
GRATIS: Spider-Man 1-3 sowie 300 weitere Videos!
Jetzt freischalten! http://portal.gmx.net/de/go/maxdome
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: need help - force EAP-TTLS to validate the server certificate

2010-09-17 Thread Klaus Laus
6160301018d0c0001890040dd176c46152fe3c986afa59e242da816936065e55afc075caad17d1a554fa9185954096f6eb07311af328409df210464d11d1280d5cb083a2a09de1eca09bc1f000105004055311a5874c6e2b72f961e668c6b3d2d601b9e6c36fa6315071d69e8c5138a3851327f2de71b320c924b04d10069
EAP-Message = 
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
EAP-Message = 
0xf5699d21162364c1ebc9a42d907af3559344c46a17418316030100880d80050304010240007800763074310b3009060355040613024445311b301906035504081312426164656e2d577565727474656d626572673111300f060355040713084672656962757267311c301a060355040a13135361757465722d43756d756c757320476d6248311730150603550403130e4d6172636f204b616c6d626163680e00
Message-Authenticator = 0x
State = 0x3f25f9043b23e0753b744dff47904da8
Finished request 4.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=9, 
length=310
User-Name = testuser
NAS-IP-Address = 10.65.100.50
NAS-Identifier = other
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = 0022FB1D434E
Called-Station-Id = 001B2F249FE0
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 
0x0206009c1980009216030100070b0300160301004610420040d2f3945de07408d38befe9ee2604880eeff1ed35718731b387080e2941942cbb8fe43238881d111b1a36a020e5c21a5739c9d0a66c3c955cc84baeb3138f2b0914030100010116030100308cf41a7573c4ad40a8161b748b11fa3a9888e0fa13c3d2f41cc6a7703902fa736455ce112c2951d5fe166af5041d8294
State = 0x3f25f9043b23e0753b744dff47904da8
Aruba-Essid-Name = wifix
Aruba-Location-Id = 1.1.1
Message-Authenticator = 0x0aa542dcaac69b04c228e15d97addc5a
+- entering group authorize {...}
++[control] returns notfound
[eap] EAP packet type response id 6 length 156
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 146
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap]  TLS 1.0 Handshake [length 0007], Certificate  
[peap]  TLS 1.0 Alert [length 0002], fatal handshake_failure  
TLS Alert write:fatal:handshake failure 
TLS_accept:error in SSLv3 read client certificate B 
rlm_eap: SSL error error:140890C7:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:peer 
did not return a certificate
SSL: SSL_read failed in a system call (-1), TLS session fails.
TLS receive handshake failed during operation
[peap] eaptls_process returned 4 
[peap] EAPTLS_OTHERS
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Using Post-Auth-Type Reject
+- entering group REJECT {...}
[attr_filter.access_reject] expand: %{User-Name} - testuser
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 5 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 5
Sending Access-Reject of id 9 to 10.65.100.50 port 32791
EAP-Message = 0x04060004
Message-Authenticator = 0x
Waking up in 3.7 seconds.
Cleaning up request 0 ID 4 with timestamp +16
Cleaning up request 1 ID 5 with timestamp +16
Waking up in 0.2 seconds.
Cleaning up request 2 ID 6 with timestamp +16
Cleaning up request 3 ID 7 with timestamp +16
Cleaning up request 4 ID 8 with timestamp +16
Waking up in 1.0 seconds.
Cleaning up request 5 ID 9 with timestamp +16
Ready to process requests.




 Original-Nachricht 
 Datum: Thu, 16 Sep 2010 15:35:54 +0100
 Von: Phil Mayers p.may...@imperial.ac.uk
 An: freeradius-users@lists.freeradius.org
 Betreff: Re: need help - force EAP-TTLS to validate the server certificate

 On 16/09/10 14:35, Klaus Laus wrote:
  ok, this is the debug output:
 
  FreeRADIUS Version 2.1.6, for host i686-pc-linux-gnu, built on Oct 27
 2009 at 17:05:49
  Copyright (C) 1999-2009 The FreeRADIUS server project and contributors.
  There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
  PARTICULAR PURPOSE.
  You may redistribute copies of FreeRADIUS under the terms of the
  GNU General Public License v2.
  Starting - reading configuration files ...
  including configuration file /etc/raddb/radiusd.conf
  including configuration file /etc/raddb/proxy.conf
  including configuration file /etc/raddb/clients.conf
  including files in directory /etc/raddb/modules/
  including configuration file /etc/raddb/modules/logintime
  including configuration file /etc/raddb/modules/passwd
  including configuration file /etc/raddb

Re: need help - force EAP-TTLS to validate the server certificate

2010-09-17 Thread John Dennis

On 09/17/2010 11:00 AM, Klaus Laus wrote:


thanks a lot for your answer.

Either move the files module before eap, or use unlang to set it:

authorize {
...
update control {
  EAP-TLS-Require-Client-Cert = yes
}
eap
...
}

I did the changes in the authorize section, and freeradius seems to require the 
client certificate. But the server is not accept my certificate. I don't think 
that the certificate is bad because I can login any client with the same 
certificate when I use TLS instead of PEAP.
This is my way to login with PEAP on a windows xp client maybe I do anything 
wrong? :
I import the pksc12 certificate from the freeradius server in the windows xp certificate 
management. When I type certmgr.msc under run I can see that the certificate 
is successfully imported. Then I scan for the wireless networks and connect to wifix, I 
use PEAP with MSCHAP v.2 and type in testuser as user with the correct password.
Here you can see the debug output (freeradius did not find my certificate):


That's right, the server didn't get your cert, it's right in the debug. 
As Alan said this isn't a server issue, it's a client issue, figure out 
why your client is not returning a cert.



TLS Alert write:fatal:handshake failure
 TLS_accept:error in SSLv3 read client certificate B
rlm_eap: SSL error error:140890C7:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:peer 
did not return a certificate
SSL: SSL_read failed in a system call (-1), TLS session fails.

--
John Dennis jden...@redhat.com

Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: need help - force EAP-TTLS to validate the server certificate

2010-09-16 Thread Alan DeKok
Klaus Laus wrote:
 Thanks a lot Alan DeKok, do I have any possibility to permit login only 
 persons with username/password and client certificate?
 All authentications methods works fine on my server, but I´ll only permit 
 login with username/password and client certificate. Which code I need to set 
 in users/eap.conf ? 
 TLS works fine on my server and the users can login themselves with the 
 client certificate, but I don´t want allow login without username/password, 
 also I don´t want allow logins with username and password but without client 
 certificates.

  Put this into the users file:

DEFAULT EAP-TLS-Require-Client-Cert = yes

  This will require client certificates for *all* EAP methods.  If you
want it to be more specific, see man unlang for writing general policies.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: need help - force EAP-TTLS to validate the server certificate

2010-09-16 Thread Klaus Laus
   Put this into the users file:
 
 DEFAULT   EAP-TLS-Require-Client-Cert = yes

I did this, but the clients can login furthermore without any client 
certificate for example with PEAP or EAP-TTLS. Here is my users file:

DEFAULT EAP-TLS-Require-Client-Cert = yes
testuserCleartext-Password := xxx
Reply-Message = Hello, %{User-Name}
DEFAULT Framed-Protocol == PPP
Framed-Protocol = PPP,
Framed-Compression = Van-Jacobson-TCP-IP
DEFAULT Hint == CSLIP
Framed-Protocol = SLIP,
Framed-Compression = Van-Jacobson-TCP-IP
DEFAULT Hint == SLIP
Framed-Protocol = SLIP

Here's the eap.conf file

eap {
default_eap_type = md5
timer_expire = 60
ignore_unknown_eap_types = no
cisco_accounting_username_bug = no
max_sessions = 2048
md5 {
}
leap {
}
gtc {
auth_type = PAP
}
tls {
certdir = /etc/ssl
cadir = /etc/ssl
private_key_password = xx
private_key_file = ${certdir}/serverkey.pem
certificate_file = ${certdir}/servercert.pem
CA_file = ${cadir}/cacert.pem
dh_file = ${certdir}/dh
random_file = ${certdir}/random
check_crl = no
CA_path = /etc/ssl
cipher_list = DEFAULT
cache {
  enable = no
  lifetime = 24 # hours
  max_entries = 255
}
}
ttls {
default_eap_type = md5
copy_request_to_tunnel = no
use_tunneled_reply = no
virtual_server = inner-tunnel
}
peap {
default_eap_type = mschapv2
copy_request_to_tunnel = no
use_tunneled_reply = no
proxy_tunneled_request_as_eap = yes
virtual_server = inner-tunnel
}
mschapv2 {
}
}


Any idea's what is wrong here? Thanks

 Original-Nachricht 
 Datum: Thu, 16 Sep 2010 09:54:28 +0200
 Von: Alan DeKok al...@deployingradius.com
 An: FreeRadius users mailing list freeradius-users@lists.freeradius.org
 Betreff: Re: need help - force EAP-TTLS to validate the server certificate

 Klaus Laus wrote:
  Thanks a lot Alan DeKok, do I have any possibility to permit login only
 persons with username/password and client certificate?
  All authentications methods works fine on my server, but I´ll only
 permit login with username/password and client certificate. Which code I need
 to set in users/eap.conf ? 
  TLS works fine on my server and the users can login themselves with the
 client certificate, but I don´t want allow login without
 username/password, also I don´t want allow logins with username and password 
 but without
 client certificates.
 
   Put this into the users file:
 
 DEFAULT   EAP-TLS-Require-Client-Cert = yes
 
   This will require client certificates for *all* EAP methods.  If you
 want it to be more specific, see man unlang for writing general
 policies.
 
   Alan DeKok.
 -
 List info/subscribe/unsubscribe? See
 http://www.freeradius.org/list/users.html

-- 
GRATIS: Spider-Man 1-3 sowie 300 weitere Videos!
Jetzt freischalten! http://portal.gmx.net/de/go/maxdome
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: need help - force EAP-TTLS to validate the server certificate

2010-09-16 Thread Alan DeKok
Klaus Laus wrote:
 I did this, but the clients can login furthermore without any client 
 certificate for example with PEAP or EAP-TTLS. Here is my users file:

  sigh  Is it that hard to show the debug output?

 Here's the eap.conf file

  Neither the documentation or messages on this list ask for the EAP
configuration.

 Any idea's what is wrong here? Thanks

  If you're not going to post the debug output, we have no idea what's
wrong.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: need help - force EAP-TTLS to validate the server certificate

2010-09-16 Thread Phil Mayers

On 16/09/10 14:35, Klaus Laus wrote:

ok, this is the debug output:

FreeRADIUS Version 2.1.6, for host i686-pc-linux-gnu, built on Oct 27 2009 at 
17:05:49
Copyright (C) 1999-2009 The FreeRADIUS server project and contributors.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License v2.
Starting - reading configuration files ...
including configuration file /etc/raddb/radiusd.conf
including configuration file /etc/raddb/proxy.conf
including configuration file /etc/raddb/clients.conf
including files in directory /etc/raddb/modules/
including configuration file /etc/raddb/modules/logintime
including configuration file /etc/raddb/modules/passwd
including configuration file /etc/raddb/modules/attr_rewrite
including configuration file /etc/raddb/modules/ippool
including configuration file /etc/raddb/modules/radutmp
including configuration file /etc/raddb/modules/acct_unique
including configuration file /etc/raddb/modules/sql_log
including configuration file /etc/raddb/modules/checkval
including configuration file /etc/raddb/modules/krb5
including configuration file /etc/raddb/modules/smbpasswd
including configuration file /etc/raddb/modules/otp
including configuration file /etc/raddb/modules/inner-eap
including configuration file /etc/raddb/modules/expr
including configuration file /etc/raddb/modules/perl
including configuration file /etc/raddb/modules/expiration
including configuration file /etc/raddb/modules/ldap
including configuration file /etc/raddb/modules/pap
including configuration file /etc/raddb/modules/mac2vlan
including configuration file /etc/raddb/modules/echo
including configuration file /etc/raddb/modules/attr_filter
including configuration file /etc/raddb/modules/unix
including configuration file /etc/raddb/modules/linelog
including configuration file /etc/raddb/modules/chap
including configuration file /etc/raddb/modules/policy
including configuration file /etc/raddb/modules/detail.example.com
including configuration file /etc/raddb/modules/preprocess
including configuration file /etc/raddb/modules/realm
including configuration file /etc/raddb/modules/files
including configuration file /etc/raddb/modules/detail.log
including configuration file /etc/raddb/modules/detail
including configuration file /etc/raddb/modules/wimax
including configuration file /etc/raddb/modules/sradutmp
including configuration file /etc/raddb/modules/sqlcounter_expire_on_login
including configuration file /etc/raddb/modules/etc_group
including configuration file /etc/raddb/modules/mac2ip
including configuration file /etc/raddb/modules/always
including configuration file /etc/raddb/modules/mschap
including configuration file /etc/raddb/modules/counter
including configuration file /etc/raddb/modules/smsotp
including configuration file /etc/raddb/modules/pam
including configuration file /etc/raddb/modules/exec
including configuration file /etc/raddb/modules/digest
including configuration file /etc/raddb/eap.conf
including configuration file /etc/raddb/policy.conf
including files in directory /etc/raddb/sites-enabled/
including configuration file /etc/raddb/sites-enabled/default
including configuration file /etc/raddb/sites-enabled/control-socket
including configuration file /etc/raddb/sites-enabled/inner-tunnel
group = radiusd
user = radiusd
including dictionary file /etc/raddb/dictionary
main {
 prefix = /usr
 localstatedir = /var
 logdir = /var/log/radius
 libdir = /usr/lib/freeradius
 radacctdir = /var/log/radius/radacct
 hostname_lookups = no
 max_request_time = 30
 cleanup_delay = 5
 max_requests = 1024
 allow_core_dumps = no
 pidfile = /var/run/radiusd/radiusd.pid
 checkrad = /usr/sbin/checkrad
 debug_level = 0
 proxy_requests = yes
  log {
 stripped_names = no
 auth = no
 auth_badpass = no
 auth_goodpass = no
  }
  security {
 max_attributes = 200
 reject_delay = 1
 status_server = yes
  }
}
radiusd:  Loading Realms and Home Servers 
  proxy server {
 retry_delay = 5
 retry_count = 3
 default_fallback = no
 dead_time = 120
 wake_all_if_all_dead = no
  }
  home_server localhost {
 ipaddr = 127.0.0.1
 port = 1812
 type = auth
 secret = testing123
 response_window = 20
 max_outstanding = 65536
 require_message_authenticator = no
 zombie_period = 40
 status_check = status-server
 ping_interval = 30
 check_interval = 30
 num_answers_to_alive = 3
 num_pings_to_alive = 3
 revive_interval = 120
 status_check_timeout = 4
 irt = 2
 mrt = 16
 mrc = 5
 mrd = 30
  }
  home_server_pool my_auth_failover {
 type = fail-over
 

Re: need help - force EAP-TTLS to validate the server certificate

2010-09-15 Thread Alan DeKok
Klaus Laus wrote:
 Hello, I have one question, is it possible to configure my freeradius server 
 so that only clients with a ca certificate can login themselves with their 
 username and password? I want to configure my freeradius server so that the 
 users can only login after the successfully server certificate validation.
 At the moment I use EAP-TTLS for authentication, but the options in the 
 clients servercertificate validation is optional. I want to use EAP-TTLS 
 and force the ca certificate on the clients.

  You can't force the client to validate the CA cert.  That is a
configuration which needs to be set on the client.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: need help - force EAP-TTLS to validate the server certificate

2010-09-15 Thread Klaus Laus
Thanks a lot Alan DeKok, do I have any possibility to permit login only persons 
with username/password and client certificate?
All authentications methods works fine on my server, but I´ll only permit login 
with username/password and client certificate. Which code I need to set in 
users/eap.conf ? 
TLS works fine on my server and the users can login themselves with the client 
certificate, but I don´t want allow login without username/password, also I 
don´t want allow logins with username and password but without client 
certificates.

Best Greetings, misterklaus

 Original-Nachricht 
 Datum: Wed, 15 Sep 2010 10:47:52 +0200
 Von: Alan DeKok al...@deployingradius.com
 An: FreeRadius users mailing list freeradius-users@lists.freeradius.org
 Betreff: Re: need help - force EAP-TTLS to validate the server certificate

 Klaus Laus wrote:
  Hello, I have one question, is it possible to configure my freeradius
 server so that only clients with a ca certificate can login themselves with
 their username and password? I want to configure my freeradius server so
 that the users can only login after the successfully server certificate
 validation.
  At the moment I use EAP-TTLS for authentication, but the options in the
 clients servercertificate validation is optional. I want to use EAP-TTLS
 and force the ca certificate on the clients.
 
   You can't force the client to validate the CA cert.  That is a
 configuration which needs to be set on the client.
 
   Alan DeKok.
 -
 List info/subscribe/unsubscribe? See
 http://www.freeradius.org/list/users.html

-- 
GMX DSL SOMMER-SPECIAL: Surf  Phone Flat 16.000 für nur 19,99 Euro/mtl.!*
http://portal.gmx.net/de/go/dsl
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html