EAP-TTLS-MSCHAPV2. Failed to authenticate.

Koos Beens koos at vera-groningen.nl
Wed Aug 17 01:04:16 CEST 2005


Hi,

I am trying to authenticate users using eap/ttls and internal mschap-v2.

Currently I haven't set any auth-type in the users, just a password. This
because auth-type := EAP (which is sugested in quite a few howto's is
appearantly wrong acccording to the list and the docs. It seems like I'm
allmost there cause I get a certificate at the supplicant. (O well, looks
like there's something working:) I've googled around but have not found a
solution, I hope someone could give me a hint in the right direction.

Thanks a lot for any help,

Kozy.

here are the last lines of freeradius' output:

  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
    rlm_realm: No '@' in User-Name = "TestUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
  rlm_eap: EAP packet type response id 5 length 143
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    users: Matched entry TestUser at line 206
  modcall[authorize]: module "files" returns ok for request 5
modcall: leaving group authorize (returns updated) for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/ttls
  rlm_eap: processing type ttls
  rlm_eap_ttls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
  eaptls_process returned 7
  rlm_eap_ttls: Session established.  Proceeding to decode tunneled
attributes.
  TTLS: Got tunneled request
        User-Name = "TestUser"
        MS-CHAP-Challenge = 0x6440b13c0e6ad28c3b7dd0a235d1b4ac
        MS-CHAP2-Response =
0x7d000ecb95ad6821c49c069a52d75b4791670000000000000000b49eccb3efc33e4b06047b50518e4ea66fdf6da9b98c4261
        FreeRADIUS-Proxied-To = 127.0.0.1
  TTLS: Sending tunneled request
        User-Name = "TestUser"
        MS-CHAP-Challenge = 0x6440b13c0e8ad28a3b7dd0a235d1b4ac
        MS-CHAP2-Response =
0x7d000ecb95ad6821c49c069a52d75b7791670000000000000000b49eccb3efd33e8a06047b50518e4ea66fdf6da9b98c4261
        FreeRADIUS-Proxied-To = 127.0.0.1
        NAS-IP-Address = 192.168.0.30
        Called-Station-Id = "002217d46891"
        Calling-Station-Id = "000d93ddf8f6"
        NAS-Identifier = "001227d44891"
        NAS-Port = 35
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  rlm_mschap: Found MS-CHAP attributes.  Setting 'Auth-Type  = MS-CHAP'
  modcall[authorize]: module "mschap" returns ok for request 5
    rlm_realm: No '@' in User-Name = "TestUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
  rlm_eap: No EAP-Message, not doing EAP
  modcall[authorize]: module "eap" returns noop for request 5
    users: Matched entry TestUser at line 206
  modcall[authorize]: module "files" returns ok for request 5
modcall: leaving group authorize (returns ok) for request 5
  rad_check_password:  Found Auth-Type MS-CHAP
auth: type "MS-CHAP"
  ERROR: Unknown value specified for Auth-Type.  Cannot perform requested
action.
auth: Failed to validate the user.
  TTLS: Got tunneled reply RADIUS code 3
  TTLS: Got tunneled Access-Reject
 rlm_eap: Handler failed in EAP/ttls
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 5
modcall: leaving group authenticate (returns invalid) for request 5
auth: Failed to validate the user.
Delaying request 5 for 1 seconds
Finished request 5
Going to the next request
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 0 to 192.168.0.4 port 1026
        EAP-Message = 0x04050004
        Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 4 seconds...
--- Walking the entire request list ---
Cleaning up request 5 ID 0 with timestamp 43026bef
Nothing to do.  Sleeping until we see a request.




More information about the Freeradius-Users mailing list