Windows XP keeps "verifying identity"

Klaas De Craemer klaasdc at gmail.com
Sat Jul 8 15:24:40 CEST 2006


Hello,

I have been trying to set up an Access Point on a soekris-board for
some days now, but I keep getting stuck. The certificates are all in
place, Freeradius starts up nicely, hostapd seems to work... But the
trouble starts in Windows XP SP2: When I try to associate with the AP,
it keeps sitting in a "Attempting Verification"-loop.
In my freeradius-window, the authentication messages keep scrolling
by, but it seems like the Windows-client doesn't "listen" to them....
I am using freeradius 1.0.2 built from source on kernel 2.6.15
Below is some of the Radius-output ("radiusd -X -A") and some of that
from hostapd:

=================Freeradius======================
rad_recv: Access-Request packet from host 127.0.0.1:1026, id=74, length=245
        User-Name = "KlaasDC"
        NAS-IP-Address = 127.0.0.1
        NAS-Port = 1
        Called-Station-Id = "00-02-6F-3C-37-D7:soekris4521"
        Calling-Station-Id = "00-02-6F-3C-37-D8"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message =
0x026800500d800000004616030100410100003d030144afac86153ed083623ea17e4a82459787262b54cdb6eb6b33603567da79e78600001600040005000a000900640062000300060013001200630100
        State = 0xe1ca3273104420e8f3fa797348da4fbf
        Message-Authenticator = 0xb662295a5ab68423baa41ed3e1976b0f
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 74
  modcall[authorize]: module "preprocess" returns ok for request 74
  modcall[authorize]: module "chap" returns noop for request 74
  modcall[authorize]: module "mschap" returns noop for request 74
    rlm_realm: No '@' in User-Name = "KlaasDC", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 74
  rlm_eap: EAP packet type response id 104 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 74
    users: Matched entry KlaasDC at line 97
  modcall[authorize]: module "files" returns ok for request 74
modcall: group authorize returns updated for request 74
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 74
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
    (other): before/accept initialization
    TLS_accept: before/accept initialization
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
    TLS_accept: SSLv3 read client hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
    TLS_accept: SSLv3 write server hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 057b], Certificate
    TLS_accept: SSLv3 write certificate A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 006d], CertificateRequest
    TLS_accept: SSLv3 write certificate request A
    TLS_accept: SSLv3 flush data
    TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 74
modcall: group authenticate returns handled for request 74
Sending Access-Challenge of id 74 to 127.0.0.1:1026
        EAP-Message =
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
        EAP-Message =
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
        EAP-Message =
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
        EAP-Message =
0x03550408130357564c310b3009060355040a13024e413110300e060355040313074b6c61617344433120301e06092a864886f70d01090116116b6c616173646340676d61696c2e636f6d301e170d3036303730383039303733345a170d3039303730373039303733345a305c310b3009060355040613024245310c300a0603550408130357564c310b3009060355040a13024e413110300e060355040313074b6c61617344433120301e06092a864886f70d01090116116b6c616173646340676d61696c2e636f6d30819f300d06092a864886f70d010101050003818d0030818902818100d0a45b7a7abbdc0330bec488c4e5e2fd56eb84f7066d6ce7
        EAP-Message = 0xe6ef10a6f757b59a15da4694dc47dde72da145998c53
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x7d981da6b6526a9fc3fe589ab7276e7a
Finished request 74
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 127.0.0.1:1026, id=75, length=171
        User-Name = "KlaasDC"
        NAS-IP-Address = 127.0.0.1
        NAS-Port = 1
        Called-Station-Id = "00-02-6F-3C-37-D7:soekris4521"
        Calling-Station-Id = "00-02-6F-3C-37-D8"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x026900060d00
        State = 0x7d981da6b6526a9fc3fe589ab7276e7a
        Message-Authenticator = 0x212c160c65f716be783b7b5466fc4725
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 75
  modcall[authorize]: module "preprocess" returns ok for request 75
  modcall[authorize]: module "chap" returns noop for request 75
  modcall[authorize]: module "mschap" returns noop for request 75
    rlm_realm: No '@' in User-Name = "KlaasDC", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 75
  rlm_eap: EAP packet type response id 105 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 75
    users: Matched entry KlaasDC at line 97
  modcall[authorize]: module "files" returns ok for request 75
modcall: group authorize returns updated for request 75
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 75
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 75
modcall: group authenticate returns handled for request 75
Sending Access-Challenge of id 75 to 127.0.0.1:1026
        EAP-Message =
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
        EAP-Message =
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
        EAP-Message =
0x300a0603550408130357564c310b3009060355040a13024e413110300e060355040313074b6c61617344433120301e06092a864886f70d01090116116b6c616173646340676d61696c2e636f6d0e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x6e48de8b1b13d264c089c9916447801f
Finished request 75
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 127.0.0.1:1026, id=76, length=171
        User-Name = "KlaasDC"
        NAS-IP-Address = 127.0.0.1
        NAS-Port = 1
        Called-Station-Id = "00-02-6F-3C-37-D7:soekris4521"
        Calling-Station-Id = "00-02-6F-3C-37-D8"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x026a00060d00
        State = 0x6e48de8b1b13d264c089c9916447801f
        Message-Authenticator = 0xf29176423b6e75d12aacdfa951f33faf
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 76
  modcall[authorize]: module "preprocess" returns ok for request 76
  modcall[authorize]: module "chap" returns noop for request 76
  modcall[authorize]: module "mschap" returns noop for request 76
    rlm_realm: No '@' in User-Name = "KlaasDC", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 76
  rlm_eap: EAP packet type response id 106 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 76
    users: Matched entry KlaasDC at line 97
  modcall[authorize]: module "files" returns ok for request 76
modcall: group authorize returns updated for request 76
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 76
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 76
modcall: group authenticate returns handled for request 76
Sending Access-Challenge of id 76 to 127.0.0.1:1026
        EAP-Message = 0x016b000a0d8000000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe62d35d365edc5eece99a281849cfdc8
Finished request 76

===================hostapd=======================
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
DATA (TX callback) ACK
IEEE 802.1X: 00:02:6f:3c:37:d8 TX status - version=1 type=0 length=587 - ack=1
DATA
IEEE 802.1X: 10 bytes from 00:02:6f:3c:37:d8
   IEEE 802.1X: version=1 type=0 length=6
   EAP: code=2 identifier=131 length=6 (response)
wlan0: STA 00:02:6f:3c:37:d8 IEEE 802.1X: received EAP packet (code=2
id=131 len=6) from STA: EAP Response-TLS (13)
IEEE 802.1X: 00:02:6f:3c:37:d8 BE_AUTH entering state RESPONSE
Encapsulating EAP message into a RADIUS packet
  Copied RADIUS State Attribute
wlan0: RADIUS Sending RADIUS message to authentication server
wlan0: RADIUS Next RADIUS client retransmit in 3 seconds

IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
wlan0: RADIUS Received 68 bytes from RADIUS server
wlan0: RADIUS Received RADIUS message
wlan0: STA 00:02:6f:3c:37:d8 RADIUS: Received RADIUS packet matched
with a pending request, round trip time 0.03 sec
RADIUS packet matching with station 00:02:6f:3c:37:d8
wlan0: STA 00:02:6f:3c:37:d8 IEEE 802.1X: using EAP timeout of 30 seconds
wlan0: STA 00:02:6f:3c:37:d8 IEEE 802.1X: decapsulated EAP packet
(code=1 id=132 len=10) from RADIUS server: EAP-Request-TLS (13)
IEEE 802.1X: 00:02:6f:3c:37:d8 BE_AUTH entering state REQUEST
IEEE 802.1X: Sending EAP Packet to 00:02:6f:3c:37:d8 (identifier 132)
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
DATA (TX callback) ACK
IEEE 802.1X: 00:02:6f:3c:37:d8 TX status - version=1 type=0 length=10 - ack=1
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
IEEE 802.1X: 00:02:6f:3c:37:d8 REAUTH_TIMER entering state INITIALIZE
===============================================



More information about the Freeradius-Users mailing list