freeradius-1.0.4 and MAC address authentication w/ win xp supplicant

Phil Mayers p.mayers at imperial.ac.uk
Wed Aug 29 18:56:34 CEST 2007


On Wed, 2007-08-29 at 11:41 -0500, John C. Koen wrote:
> I am running freeradius-1.0.4 on SLES10, XP supplicant and Cisco Aironet 1200 AP.
> 
> My goal is to authenticate against the "users" file and use WEP with eap-tls.
> I am trying to support Windows CE, and PEAP is not an option.

There's so much wrong I don't know where to begin.

> 
> 
> users:
> 0213dec2114a  Auth-Type:=Accept
>         Service-Type = Framed-User,
>         Tunnel-Private-Group-ID := 116,
>         Tunnel-Medium-Type := IEEE-802

This looks like a mac-address-based authentication, not EAP.

You can't force Auth-Type to Accept for EAP. EAP is a challenge-response
protocol, and the server needs to do it's thing for the client to
function.

Remove the Auth-Type if you're trying to do EAP.

Please also be aware that most NASes will require the "Tunnel-Type =
VLAN" reply attribute for VLAN assignment.


> 
> eap.conf:
>         eap {
>                 default_eap_type = tls
>                tls {
>                         private_key_password = secret
>                         private_key_file = ${raddbdir}/certs/private/radius.key
>                         certificate_file = /etc/raddb/certs/radius.crt
>                 
>                         #  Trusted Root CA list
>                         CA_file = /etc/raddb/certs/CA.crt
>                 
>                         dh_file = ${raddbdir}/certs/dh
>                         random_file = /etc/raddb/certs/random
>                        fragment_size = 1024
>                         include_length = yes
>                 }       
>         }
> 
> 
> radiusd.conf:
> authorize {
>         auth_log
>         files
>         eap
> }
> 
> authenticate {
>         eap
> }
> 
> I have uploaded both the CA andd certificate file to the supplicant, as
> trusted certificates.  For some reason, I continue to see the balloon from
> windows indicating that a valid certificate could not be found for comparison.
> I have followed the PDF instructions found in EAPTLS.pdf.
> 
> Here is a sample of my radiusd -X -s logs:
> 
> rad_recv: Access-Request packet from host 192.168.214.99:1645, id=39, length=115
>         User-Name = "0213dec2114a"
>         User-Password = "Qp\203e\206%\010`\256\243\203u;\362\321\017"
>         Called-Station-Id = "0014.6a73.6110"
>         Calling-Station-Id = "0213.dec2.114a"
>         Service-Type = Login-User
>         NAS-Port-Type = Wireless-802.11
>         NAS-Port = 551
>         NAS-IP-Address = 192.168.214.99
>         NAS-Identifier = "AP-99"

This is not an EAP authentication; your NAS (wireless AP) is not doing
EAP. Make it do EAP if you want to do EAP.


> rad_rmspace_pair:  User-Password now 'Qp?d?%?`?u;?'
>   Processing the authorize section of radiusd.conf
> modcall: entering group authorize for request 2
> radius_xlat:  '/var/log/radius/radius-MAC/radacct/auth-detail-20070829'
> rlm_detail: /var/log/radius/radius-MAC/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands to /var/log/radius/radius-MAC/radacct//auth-detail-20070829
>   modcall[authorize]: module "auth_log" returns ok for request 2
>     users: Matched entry 0213dec2114a at line 38
>   modcall[authorize]: module "files" returns ok for request 2
>   rlm_eap: No EAP-Message, not doing EAP
>   modcall[authorize]: module "eap" returns noop for request 2
> modcall: group authorize returns ok for request 2
>   rad_check_password:  Found Auth-Type Accept
>   rad_check_password: Auth-Type = Accept, accepting the user
>   Processing the post-auth section of radiusd.conf
> modcall: entering group post-auth for request 2
> radius_xlat:  '/var/log/radius/radius-MAC/radacct/reply-detail-20070829'
> rlm_detail: /var/log/radius/radius-MAC/radacct/%{Client-IP-Address}/reply-detail-%Y%m%d expands to /var/log/radius/radius-MAC/radacct/reply-detail-20070829
>   modcall[post-auth]: module "reply_log" returns ok for request 2
> modcall: group post-auth returns ok for request 2
> Sending Access-Accept of id 39 to 192.168.214.99:1645
>         Service-Type = Framed-User
>         Tunnel-Private-Group-Id:0 := "116"
>         Tunnel-Medium-Type:0 := IEEE-802
> Finished request 2
> Going to the next request
> --- Walking the entire request list ---
> 
> ...this transaction is repeated over and over and over again.
> 
> I have also tried commenting out all instances of "eap" from radiusd.conf, hoping
> to do non-wep mac address authentication, as a list effort.  I then remove
> WEP support from the supplicant and Cisco AP.  While freeradius reports 
> "access-accept", the supplicant hangs on obtaining an ip address (with no related 
> logs shown on my dhcp server) and the cisco AP reports "GMT: %DOT11-7-AUTH_FAILED: 
> Station 0213.dec2.114a Authentication failed"
> 
> --johnk
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html




More information about the Freeradius-Users mailing list