Hi Andreas,
Thank you for your reply. Below is the config file
charon {
load_modular = yes
plugins {
include strongswan.d/charon/*.conf
eap-radius {
station_id_with_port = true
servers {
server-a {
address = 172.17.203.28
secret =
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
nas_identifier = nasid_vpngate
sockets = 5
}
}
}
}
}
include strongswan.d/*.conf
Windows 7 is doing EAP-MS-CHAP-v2 (not PEAP - just plain EAP). The conn section
looks like this:
conn vpnfw-ikev2
auto=add
keyexchange=ikev2
type=tunnel
left=148.85.1.171
leftauth=pubkey
leftcert=vpnfirewall-ng.pem
leftsubnet=172.17.0.0/16
right=%any
rightsourceip=172.17.6.0/24
rightauth=eap-radius
eap_identity=%identity
The resulting log looks like this:
Jan 19 10:20:44 vpngate1 charon: 13[ENC] generating IKE_AUTH response 1 [ IDr
CERT CERT CERT AUTH EAP/REQ/ID ]
Jan 19 10:20:44 vpngate1 charon: 13[NET] sending packet: from
148.85.1.171[4500] to 75.145.249.254[4500] (4900 bytes)
Jan 19 10:20:44 vpngate1 charon: 02[NET] sending packet: from
148.85.1.171[4500] to 75.145.249.254[4500]
Jan 19 10:20:44 vpngate1 charon: 15[NET] received packet: from
75.145.249.254[4500] to 148.85.1.171[4500]
Jan 19 10:20:44 vpngate1 charon: 15[NET] waiting for data on sockets
Jan 19 10:20:44 vpngate1 charon: 04[NET] received packet: from
75.145.249.254[4500] to 148.85.1.171[4500] (76 bytes)
Jan 19 10:20:44 vpngate1 charon: 04[ENC] parsed IKE_AUTH request 2 [ EAP/RES/ID
]
Jan 19 10:20:44 vpngate1 charon: 04[IKE] received EAP identity 'swplotner'
Jan 19 10:20:44 vpngate1 charon: 04[CFG] sending RADIUS Access-Request to
server 'server-a'
Jan 19 10:20:45 vpngate1 charon: 04[CFG] received RADIUS Access-Reject from
server 'server-a'
Jan 19 10:20:45 vpngate1 charon: 04[IKE] RADIUS authentication of 'swplotner'
failed
Jan 19 10:20:45 vpngate1 charon: 04[IKE] initiating EAP_RADIUS method failed
Jan 19 10:20:45 vpngate1 charon: 04[ENC] generating IKE_AUTH response 2 [
EAP/FAIL ]
Jan 19 10:20:45 vpngate1 charon: 04[NET] sending packet: from
148.85.1.171[4500] to 75.145.249.254[4500] (68 bytes)
Jan 19 10:20:45 vpngate1 charon: 02[NET] sending packet: from
148.85.1.171[4500] to 75.145.249.254[4500]
Jan 19 10:20:45 vpngate1 charon: 04[IKE] IKE_SA vpnfw-ikev2[1] state change:
CONNECTING => DESTROYING
So, the configured cert appears to work, it receives the identity of
'swplotner', the request to the radius server does not contain the MSCHAP
components.
No. Time Source Destination Protocol Info
1 0.000000 172.17.1.165 172.17.203.28 RADIUS
Access-Request(1) (id=206, l=159)
Frame 1 (201 bytes on wire, 201 bytes captured)
Ethernet II, Src: Vmware_a5:00:db (00:50:56:a5:00:db), Dst: Vmware_a5:00:74
(00:50:56:a5:00:74)
Internet Protocol, Src: 172.17.1.165 (172.17.1.165), Dst: 172.17.203.28
(172.17.203.28)
User Datagram Protocol, Src Port: 33610 (33610), Dst Port: radius (1812)
Radius Protocol
Code: Access-Request (1)
Packet identifier: 0xce (206)
Length: 159
Authenticator: E5C63C2BBF627BB5F525603BC0698AE1
[The response to this request is in frame 2]
Attribute Value Pairs
AVP: l=11 t=User-Name(1): swplotner
AVP: l=6 t=NAS-Port-Type(61): Virtual(5)
AVP: l=6 t=Service-Type(6): Framed-User(2)
AVP: l=6 t=NAS-Port(5): 1
AVP: l=13 t=NAS-Port-Id(87): vpnfw-ikev2
AVP: l=6 t=NAS-IP-Address(4): 148.85.1.171
AVP: l=20 t=Called-Station-Id(30): 148.85.1.171[4500]
AVP: l=22 t=Calling-Station-Id(31): 75.145.249.254[4500]
AVP: l=16 t=EAP-Message(79) Last Segment[1]
AVP: l=15 t=NAS-Identifier(32): nasid_vpngate
AVP: l=18 t=Message-Authenticator(80): 6AFE310B6AB76524F1E2FDE5025BF5A2
No. Time Source Destination Protocol Info
2 0.530112 172.17.203.28 172.17.1.165 RADIUS
Access-Reject(3) (id=206, l=44)
Frame 2 (86 bytes on wire, 86 bytes captured)
Ethernet II, Src: Vmware_a5:00:74 (00:50:56:a5:00:74), Dst: Vmware_a5:00:db
(00:50:56:a5:00:db)
Internet Protocol, Src: 172.17.203.28 (172.17.203.28), Dst: 172.17.1.165
(172.17.1.165)
User Datagram Protocol, Src Port: radius (1812), Dst Port: 33610 (33610)
Radius Protocol
Code: Access-Reject (3)
Packet identifier: 0xce (206)
Length: 44
Authenticator: 6AF4DD3698491B9A474B14A44B9DE8F8
[This is a response to a request in frame 1]
[Time from request: 0.530112000 seconds]
Attribute Value Pairs
AVP: l=6 t=EAP-Message(79) Last Segment[1]
AVP: l=18 t=Message-Authenticator(80):
06969B5F3315A5B9A695A2A712F30810
Steffen
_______________________________________________________________________________________________
Steffen Plotner Amherst College Tel (413)
542-2348
Systems/Network Administrator/Programmer PO BOX 5000 Fax (413)
542-2626
Systems & Networking Amherst, MA 01002-5000
[email protected]
> -----Original Message-----
> From: Andreas Steffen [mailto:[email protected]]
> Sent: Sunday, January 18, 2015 11:12 PM
> To: Steffen Plotner; '[email protected]'
> Subject: Re: [strongSwan] eap-radius integration
>
> Hi Steffen,
>
> without the actual ipsec.conf file and if possible a log file on the
> strongSwan VPN server it is difficult to diagnose your problem.
>
> Best regards
>
> Andreas Steffen
>
> On 19.01.2015 04:09, Steffen Plotner wrote:
> > Hi,
> > After several days of not finding another path, I am trying to see
> what
> > I have done wrong in terms of the eap-radius integration. It appears
> > Strongswan is producing an Access-Request packet with the following
> > attributes: User-name, NAS-Port-Type, Service-Type, NAS-Port,
> > NAS-Port-Id, NAS-IP-Address, Called-Station-ID, Calling-Station-Id,
> > EAP-Message (last segment), NAS-Identifier, Message-Authenticator.
> > One of the attributes for doing MS-CHAP-v2 is not in it. I thought
> that
> > those might be vendor specific attributes 26:311 (I have experimented
> > with the forwarding of attributes ike_to_radius = 26:311 but did not
> > change anything).
> > I have configured the eap-radius servers in strongswan to point first
> to
> > IAS 2003 and it fails, as it expects PEAP and cannot handle
> > EAP-MS-Chap-v2. I have then pointed it to a Windows 2008 NPS server
> and
> > it fails, with Access-Reject - looking at the packets I don't see the
> > MS-CHAP-v2 Challenge attribute coming through. [Short version: the
> > password is not coming through in the Access-Request when eap-radius
> is
> > involved]
> > The configuration is under IKEv2 type, I was able to bypass the radius
> > stuff by simply doing a righauth=eap-mschapv2 using a local secrets
> > file. I wanted to switch to radius based authentication and
> > authorization. The client is windows 7 - I have tried both EAP-MS-
> CHAPv2
> > and PEAP-MS-CHAPv2 with the eap-radius configuration and it did not
> work.
> > We are using strongswan-5.2.2 on centos6. I have looked at the
> examples
> > and just cannot get the password to come through, only the attributes
> I
> > initially listed.
> > Thank you for your help.
> > Steffen
> >
> ________________________________________________________________________
> _______________________
> > Steffen Plotner Amherst College
> > Tel (413) 542-2348
> > Systems/Network Administrator/Programmer PO BOX 5000
> > Fax (413) 542-2626
> > Systems & Networking Amherst, MA 01002-5000
> > [email protected]
> >
> >
> > _______________________________________________
> > Users mailing list
> > [email protected]
> > https://lists.strongswan.org/mailman/listinfo/users
> >
>
> --
> ======================================================================
> Andreas Steffen [email protected]
> strongSwan - the Open Source VPN Solution! www.strongswan.org
> Institute for Internet Technologies and Applications
> University of Applied Sciences Rapperswil
> CH-8640 Rapperswil (Switzerland)
> ===========================================================[ITA-HSR]==
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users