EAP-TTLS w/MS-CHAPv2

Kwok Sianbin sianbin_kwok at yahoo.com
Fri May 23 18:07:43 CEST 2008


Hi Alan,
 
 Please help..Here I have problem that I can't figure out what went wrong!
 
 #radtest MarsNet Mars123 localhost 0 testing123
  User-Name = "MarsNet"
         User-Password = "Mars123"
         NAS-IP-Address = 192.168.1.5
         NAS-Port = 0
         Reply-Message = "Hello, MarsNet"
 
 if I change the configuration in radiusd.conf to bind to particular IP address (eth0) then about radtest failed to Accept.
 My server configured with DNS / DHCP / iptable firewall (Internet) (eth1) and eth0 connect to  Wifi -> D-Link client.
 
 # /usr/local/radiusd -X
 bash: /usr/local/radiusd: No such file or directory
 [root at marsindo saman]# /usr/local/sbin/radiusd -X
 FreeRADIUS Version 2.0.4, for host i686-pc-linux-gnu, built on May 15 2008 at 21 :44:23
 Copyright (C) 1999-2008 The FreeRADIUS server project and contributors.
 There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
 PARTICULAR PURPOSE.
 You may redistribute copies of FreeRADIUS under the terms of the
 GNU General Public License.
 Starting - reading configuration files ...
 including configuration file /usr/local/etc/raddb/radiusd.conf
 including configuration file /usr/local/etc/raddb/proxy.conf
 including configuration file /usr/local/etc/raddb/clients.conf
 including configuration file /usr/local/etc/raddb/snmp.conf
 including configuration file /usr/local/etc/raddb/eap.conf
 including configuration file /usr/local/etc/raddb/sql.conf
 including configuration file /usr/local/etc/raddb/sql/mysql/dialup.conf
 including configuration file /usr/local/etc/raddb/sql/mysql/counter.conf
 including configuration file /usr/local/etc/raddb/policy.conf
 including files in directory /usr/local/etc/raddb/sites-enabled/
 including configuration file /usr/local/etc/raddb/sites-enabled/default
 including configuration file /usr/local/etc/raddb/sites-enabled/inner-tunnel
 including dictionary file /usr/local/etc/raddb/dictionary
 main {
         prefix = "/usr/local"
         localstatedir = "/usr/local/var"
         logdir = "/usr/local/var/log/radius"
         libdir = "/usr/local/lib"
         radacctdir = "/usr/local/var/log/radius/radacct"
         hostname_lookups = no
         max_request_time = 30
         cleanup_delay = 5
         max_requests = 1024
         allow_core_dumps = no
         pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
         checkrad = "/usr/local/sbin/checkrad"
         debug_level = 0
         proxy_requests = yes
  security {
         max_attributes = 200
         reject_delay = 1
         status_server = yes
  }
 }
  client localhost {
         ipaddr = 127.0.0.1
         require_message_authenticator = no
         secret = "testing123"
         nastype = "other"
  }
  client 192.168.0.206 {
         require_message_authenticator = no
         secret = "testing123-1"
         shortname = "smartbridge"
  }
 radiusd: #### Loading Realms and Home Servers ####
  proxy server {
         retry_delay = 5
         retry_count = 3
         default_fallback = no
         dead_time = 120
         wake_all_if_all_dead = no
  }
  home_server localhost {
         ipaddr = 127.0.0.1
         port = 1812
         type = "auth"
         secret = "testing123"
         response_window = 20
         max_outstanding = 65536
         zombie_period = 40
         status_check = "status-server"
         ping_check = "none"
         ping_interval = 30
         check_interval = 30
         num_answers_to_alive = 3
         num_pings_to_alive = 3
         revive_interval = 120
         status_check_timeout = 4
  }
  home_server_pool my_auth_failover {
         type = fail-over
         home_server = localhost
  }
  realm example.com {
         auth_pool = my_auth_failover
  }
  realm LOCAL {
  }
 radiusd: #### Instantiating modules ####
  instantiate {
  Module: Linked to module rlm_exec
  Module: Instantiating exec
   exec {
         wait = yes
         input_pairs = "request"
         shell_escape = yes
   }
  Module: Linked to module rlm_expr
  Module: Instantiating expr
  Module: Linked to module rlm_expiration
  Module: Instantiating expiration
   expiration {
         reply-message = "Password Has Expired  "
   }
  Module: Linked to module rlm_logintime
  Module: Instantiating logintime
   logintime {
         reply-message = "You are calling outside your allowed timespan  "
         minimum-timeout = 60
   }
  }
 radiusd: #### Loading Virtual Servers ####
 server inner-tunnel {
  modules {
  Module: Checking authenticate {...} for more modules to load
  Module: Linked to module rlm_pap
  Module: Instantiating pap
   pap {
         encryption_scheme = "auto"
         auto_header = no
   }
  Module: Linked to module rlm_chap
  Module: Instantiating chap
  Module: Linked to module rlm_mschap
  Module: Instantiating mschap
   mschap {
         use_mppe = yes
         require_encryption = no
         require_strong = no
         with_ntdomain_hack = no
   }
  Module: Linked to module rlm_unix
  Module: Instantiating unix
   unix {
         radwtmp = "/usr/local/var/log/radius/radwtmp"
   }
  Module: Linked to module rlm_eap
  Module: Instantiating eap
   eap {
         default_eap_type = "tls"
         timer_expire = 60
         ignore_unknown_eap_types = no
         cisco_accounting_username_bug = no
   }
  Module: Linked to sub-module rlm_eap_md5
  Module: Instantiating eap-md5
  Module: Linked to sub-module rlm_eap_leap
  Module: Instantiating eap-leap
  Module: Linked to sub-module rlm_eap_gtc
  Module: Instantiating eap-gtc
    gtc {
         challenge = "Password: "
         auth_type = "PAP"
    }
  Module: Linked to sub-module rlm_eap_tls
  Module: Instantiating eap-tls
    tls {
         rsa_key_exchange = no
         dh_key_exchange = yes
         rsa_key_length = 512
         dh_key_length = 512
         verify_depth = 0
         pem_file_type = yes
         private_key_file = "/usr/local/etc/raddb/certs/server.pem"
         certificate_file = "/usr/local/etc/raddb/certs/server.pem"
         CA_file = "/usr/local/etc/raddb/certs/ca.pem"
         private_key_password = "Mars123"
         dh_file = "/usr/local/etc/raddb/certs/dh"
         random_file = "/usr/local/etc/raddb/certs/random"
         fragment_size = 1024
         include_length = yes
         check_crl = no
         cipher_list = "DEFAULT"
         make_cert_command = "/usr/local/etc/raddb/certs/bootstrap"
    }
  Module: Linked to sub-module rlm_eap_ttls
  Module: Instantiating eap-ttls
    ttls {
         default_eap_type = "md5"
         copy_request_to_tunnel = no
         use_tunneled_reply = no
         virtual_server = "inner-tunnel"
    }
  Module: Linked to sub-module rlm_eap_peap
  Module: Instantiating eap-peap
    peap {
         default_eap_type = "mschapv2"
         copy_request_to_tunnel = no
         use_tunneled_reply = no
         proxy_tunneled_request_as_eap = yes
         virtual_server = "inner-tunnel"
    }
  Module: Linked to sub-module rlm_eap_mschapv2
  Module: Instantiating eap-mschapv2
    mschapv2 {
         with_ntdomain_hack = no
    }
  Module: Checking authorize {...} for more modules to load
  Module: Linked to module rlm_realm
  Module: Instantiating suffix
   realm suffix {
         format = "suffix"
         delimiter = "@"
         ignore_default = no
         ignore_null = no
   }
  Module: Linked to module rlm_files
  Module: Instantiating files
   files {
         usersfile = "/usr/local/etc/raddb/users"
         acctusersfile = "/usr/local/etc/raddb/acct_users"
         preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
         compat = "no"
   }
  Module: Checking session {...} for more modules to load
  Module: Linked to module rlm_radutmp
  Module: Instantiating radutmp
   radutmp {
         filename = "/usr/local/var/log/radius/radutmp"
         username = "%{User-Name}"
         case_sensitive = yes
         check_with_nas = yes
         perm = 384
         callerid = yes
   }
  Module: Checking post-proxy {...} for more modules to load
  Module: Checking post-auth {...} for more modules to load
  Module: Linked to module rlm_attr_filter
  Module: Instantiating attr_filter.access_reject
   attr_filter attr_filter.access_reject {
         attrsfile = "/usr/local/etc/raddb/attrs.access_reject"
         key = "%{User-Name}"
   }
  }
 }
 server {
  modules {
  Module: Checking authenticate {...} for more modules to load
  Module: Checking authorize {...} for more modules to load
  Module: Linked to module rlm_preprocess
  Module: Instantiating preprocess
   preprocess {
         huntgroups = "/usr/local/etc/raddb/huntgroups"
         hints = "/usr/local/etc/raddb/hints"
         with_ascend_hack = no
         ascend_channels_per_line = 23
         with_ntdomain_hack = no
         with_specialix_jetstream_hack = no
         with_cisco_vsa_hack = no
         with_alvarion_vsa_hack = no
   }
  Module: Checking preacct {...} for more modules to load
  Module: Linked to module rlm_acct_unique
  Module: Instantiating acct_unique
   acct_unique {
         key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NA S-Port"
   }
  Module: Checking accounting {...} for more modules to load
  Module: Linked to module rlm_detail
  Module: Instantiating detail
   detail {
         detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/det ail-%Y%m%d"
         header = "%t"
         detailperm = 384
         dirperm = 493
         locking = no
         log_packet_header = no
   }
  Module: Instantiating attr_filter.accounting_response
   attr_filter attr_filter.accounting_response {
         attrsfile = "/usr/local/etc/raddb/attrs.accounting_response"
         key = "%{User-Name}"
   }
  Module: Checking session {...} for more modules to load
  Module: Checking post-proxy {...} for more modules to load
  Module: Checking post-auth {...} for more modules to load
  }
 }
 radiusd: #### Opening IP addresses and Ports ####
 listen {
         type = "auth"
         ipaddr = *
         port = 0
 }
 listen {
         type = "acct"
         ipaddr = *
         port = 0
 }
 Listening on authentication address * port 1812
 Listening on accounting address * port 1813
 Listening on proxy address * port 1814
 Ready to process requests.
         User-Name = "MarsNet"
         User-Password = "Mars123"
         NAS-IP-Address = 192.168.1.5
         NAS-Port = 0
 +- entering group authorize
 ++[preprocess] returns ok
 ++[chap] returns noop
 ++[mschap] returns noop
     rlm_realm: No '@' in User-Name = "MarsNet", looking up realm NULL
     rlm_realm: No such realm "NULL"
 ++[suffix] returns noop
   rlm_eap: No EAP-Message, not doing EAP
 ++[eap] returns noop
 ++[unix] returns notfound
     users: Matched entry MarsNet at line 91
         expand: Hello, %{User-Name} -> Hello, MarsNet
 ++[files] returns ok
 ++[expiration] returns noop
 ++[logintime] returns noop
 ++[pap] returns updated
   rad_check_password:  Found Auth-Type
 auth: type "PAP"
 +- entering group PAP
 rlm_pap: login attempt with password "Mars123"
 rlm_pap: Using clear text password "Mars123"
 rlm_pap: User authenticated successfully
 ++[pap] returns ok
 Login OK: [MarsNet/Mars123] (from client localhost port 0)
 +- entering group post-auth
 ++[exec] returns noop
         Reply-Message = "Hello, MarsNet"
 Finished request 0.
 Going to the next request
 Waking up in 4.9 seconds.
 Cleaning up request 0 ID 249 with timestamp +71
 Ready to process requests.
 
 #########################################
 Here the output from radius server
 Ready to process requests.
         User-Name = "MarsNet"
         NAS-IP-Address = 0.0.0.0
         Framed-MTU = 1488
         Called-Station-Id = "00:30:1a:29:03:66"
         Calling-Station-Id = "00:1c:f0:10:56:b8"
         NAS-Port-Type = Wireless-802.11
         NAS-Identifier = "127.0.0.1"
         Connect-Info = "CONNECT 11Mbps 802.11b"
         EAP-Message = 0x0201000c014d6172734e6574
         Message-Authenticator = 0x4ad688dbdf0cc05641a04b3a92f638a3
 +- entering group authorize
 ++[preprocess] returns ok
 ++[chap] returns noop
 ++[mschap] returns noop
     rlm_realm: No '@' in User-Name = "MarsNet", looking up realm NULL
     rlm_realm: No such realm "NULL"
 ++[suffix] returns noop
   rlm_eap: EAP packet type response id 1 length 12
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
 ++[eap] returns updated
 ++[unix] returns notfound
     users: Matched entry MarsNet at line 91
         expand: Hello, %{User-Name} -> Hello, MarsNet
 ++[files] returns ok
 ++[expiration] returns noop
 ++[logintime] returns noop
 rlm_pap: Found existing Auth-Type, not changing it.
 ++[pap] returns noop
   rad_check_password:  Found Auth-Type EAP
 auth: type "EAP"
 +- entering group authenticate
   rlm_eap: EAP Identity
   rlm_eap: processing type tls
  rlm_eap_tls: Requiring client certificate
   rlm_eap_tls: Initiate
   rlm_eap_tls: Start returned 1
 ++[eap] returns handled
         Reply-Message = "Hello, MarsNet"
         EAP-Message = 0x010200060d20
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0x3a145cc43a1651a2588cd4a004921f89
 Finished request 1.
 Going to the next request
 Waking up in 4.9 seconds.
 Cleaning up request 1 ID 1 with timestamp +820
 Ready to process requests.
         User-Name = "MarsNet"
         NAS-IP-Address = 0.0.0.0
         Framed-MTU = 1488
         Called-Station-Id = "00:30:1a:29:03:66"
         Calling-Station-Id = "00:1c:f0:10:56:b8"
         NAS-Port-Type = Wireless-802.11
         NAS-Identifier = "127.0.0.1"
         Connect-Info = "CONNECT 11Mbps 802.11b"
         EAP-Message = 0x0201000c014d6172734e6574
         Message-Authenticator = 0xa043b471730b2679bd2d1fc1332a74be
 +- entering group authorize
 ++[preprocess] returns ok
 ++[chap] returns noop
 ++[mschap] returns noop
     rlm_realm: No '@' in User-Name = "MarsNet", looking up realm NULL
     rlm_realm: No such realm "NULL"
 ++[suffix] returns noop
   rlm_eap: EAP packet type response id 1 length 12
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
 ++[eap] returns updated
 ++[unix] returns notfound
     users: Matched entry MarsNet at line 91
         expand: Hello, %{User-Name} -> Hello, MarsNet
 ++[files] returns ok
 ++[expiration] returns noop
 ++[logintime] returns noop
 rlm_pap: Found existing Auth-Type, not changing it.
 ++[pap] returns noop
   rad_check_password:  Found Auth-Type EAP
 auth: type "EAP"
 +- entering group authenticate
   rlm_eap: EAP Identity
   rlm_eap: processing type tls
  rlm_eap_tls: Requiring client certificate
   rlm_eap_tls: Initiate
   rlm_eap_tls: Start returned 1
 ++[eap] returns handled
         Reply-Message = "Hello, MarsNet"
         EAP-Message = 0x010200060d20
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0x58961ab6589417883d2fb3d577435665
 Finished request 2.
 Going to the next request
 Waking up in 4.9 seconds.
 Cleaning up request 2 ID 3 with timestamp +830
 Ready to process requests.
 
 The client show "Validating" then "Acquiring Network Address"
 
 


       
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20080523/a4cee294/attachment.html>


More information about the Freeradius-Users mailing list