question about windows users

Bartosz Chodzinski bartosz.c at gmail.com
Mon May 18 09:39:49 CEST 2009


thanks,

/etc/freeradius/certs/README
This directory contains a number of sample certificates for
use by the rlm_eap_tls module.  These certificates should be used
ONLY for testing purposes.

If you're not using EAP-TLS, EAP-TTLS, or EAP-PEAP, then you may delete
this entire directory.

If you are using one or more of those authentication protocols, then
the certificates included here should be replaced with ones signed
by a real Certificate Authority.

not to many information in that case in README, so I did (of course you are
right with p12):

openssl pkcs12 -export -out cliet_cert.p12 -inkey client_key.pem -in
client_cert.pem

and something happend:
( I think key information is
TLS_accept:error in SSLv3 read client certificate A
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
but uncle google find as many diferent answers as peple having this problem)
log freeradius -X:

Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /etc/freeradius/proxy.conf
Config:   including file: /etc/freeradius/clients.conf
Config:   including file: /etc/freeradius/snmp.conf
Config:   including file: /etc/freeradius/eap.conf
Config:   including file: /etc/freeradius/sql.conf
 main: prefix = "/usr"
 main: localstatedir = "/var"
 main: logdir = "/var/log/freeradius"
 main: libdir = "/usr/lib/freeradius"
 main: radacctdir = "/var/log/freeradius/radacct"
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = no
 main: log_file = "/var/log/freeradius/radius.log"
 main: log_auth = no
 main: log_auth_badpass = no
 main: log_auth_goodpass = no
 main: pidfile = "/var/run/freeradius/freeradius.pid"
 main: user = "freerad"
 main: group = "freerad"
 main: usercollide = no
 main: lower_user = "yes"
 main: lower_pass = "no"
 main: nospace_user = "no"
 main: nospace_pass = "no"
 main: checkrad = "/usr/sbin/checkrad"
 main: proxy_requests = yes
 proxy: retry_delay = 5
 proxy: retry_count = 3
 proxy: synchronous = no
 proxy: default_fallback = yes
 proxy: dead_time = 120
 proxy: post_proxy_authorize = no
 proxy: wake_all_if_all_dead = no
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
 main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Library search path is /usr/lib/freeradius
Module: Loaded exec
 exec: wait = yes
 exec: program = "(null)"
 exec: input_pairs = "request"
 exec: output_pairs = "(null)"
 exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
 pap: encryption_scheme = "crypt"
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
 mschap: use_mppe = yes
 mschap: require_encryption = yes
 mschap: require_strong = yes
 mschap: with_ntdomain_hack = yes
 mschap: passwd = "(null)"
 mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap)
Module: Loaded System
 unix: cache = no
 unix: passwd = "(null)"
 unix: shadow = "/etc/shadow"
 unix: group = "(null)"
 unix: radwtmp = "/var/log/freeradius/radwtmp"
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
 eap: default_eap_type = "peap"
 eap: timer_expire = 60
 eap: ignore_unknown_eap_types = no
 eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
 gtc: challenge = "Password: "
 gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = "(null)"
 tls: pem_file_type = yes
 tls: private_key_file = "/etc/freeradius/eap/newkey.pem"
 tls: certificate_file = "/etc/freeradius/eap/newcert.pem"
 tls: CA_file = "/etc/freeradius/eap/eapCA/cacert.pem"
 tls: private_key_password = "windows"
 tls: dh_file = "/etc/freeradius/eap/dh"
 tls: random_file = "/etc/freeradius/eap/random"
 tls: fragment_size = 1024
 tls: include_length = yes
 tls: check_crl = no
 tls: check_cert_cn = "(null)"
 tls: cipher_list = "(null)"
 tls: check_cert_issuer = "(null)"
rlm_eap_tls: Loading the certificate file as a chain
rlm_eap: Loaded and initialized type tls
 peap: default_eap_type = "mschapv2"
 peap: copy_request_to_tunnel = no
 peap: use_tunneled_reply = no
 peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
 mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
 preprocess: huntgroups = "/etc/freeradius/huntgroups"
 preprocess: hints = "/etc/freeradius/hints"
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
 preprocess: with_alvarion_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
 realm: format = "suffix"
 realm: delimiter = "@"
 realm: ignore_default = no
 realm: ignore_null = no
Module: Instantiated realm (suffix)
Module: Loaded Acct-Unique-Session-Id
 acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address,
Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded files
 files: usersfile = "/etc/freeradius/users"
 files: acctusersfile = "/etc/freeradius/acct_users"
 files: preproxy_usersfile = "/etc/freeradius/preproxy_users"
 files: compat = "no"
Module: Instantiated files (files)
Module: Loaded detail
 detail: detailfile =
"/var/log/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
 radutmp: filename = "/var/log/freeradius/radutmp"
 radutmp: username = "%{User-Name}"
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.5.206:1812, id=106,
length=137
        NAS-IP-Address = 192.168.5.206
        NAS-Port = 50046
        NAS-Port-Type = Ethernet
        User-Name = "client_cert"
        Called-Station-Id = "00-0C-30-81-9B-EE"
        Calling-Station-Id = "00-0A-E4-13-1A-02"
        Service-Type = Framed-User
        Framed-MTU = 1500
        EAP-Message = 0x0200001001636c69656e745f63657274
        Message-Authenticator = 0x080bd3f4d25919886b96f969d2ae8eeb
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
  modcall[authorize]: module "preprocess" returns ok for request 0
  modcall[authorize]: module "mschap" returns noop for request 0
    rlm_realm: No '@' in User-Name = "client_cert", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 0
  rlm_eap: EAP packet type response id 0 length 16
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 0
modcall: leaving group authorize (returns updated) for request 0
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 0
modcall: leaving group authenticate (returns handled) for request 0
Sending Access-Challenge of id 106 to 192.168.5.206 port 1812
        EAP-Message = 0x010100061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x3af5b38421ac6af91c4a0a447244ecd0
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.5.206:1812, id=107,
length=145
        NAS-IP-Address = 192.168.5.206
        NAS-Port = 50046
        NAS-Port-Type = Ethernet
        User-Name = "client_cert"
        Called-Station-Id = "00-0C-30-81-9B-EE"
        Calling-Station-Id = "00-0A-E4-13-1A-02"
        Service-Type = Framed-User
        Framed-MTU = 1500
        State = 0x3af5b38421ac6af91c4a0a447244ecd0
        EAP-Message = 0x02010006030d
        Message-Authenticator = 0x2a999f5c3a37259efa6a052d616fba1a
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
  modcall[authorize]: module "preprocess" returns ok for request 1
  modcall[authorize]: module "mschap" returns noop for request 1
    rlm_realm: No '@' in User-Name = "client_cert", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 1
  rlm_eap: EAP packet type response id 1 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 1
modcall: leaving group authorize (returns updated) for request 1
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
  rlm_eap: Request found, released from the list
  rlm_eap: EAP NAK
 rlm_eap: EAP-NAK asked for EAP-Type/tls
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 1
modcall: leaving group authenticate (returns handled) for request 1
Sending Access-Challenge of id 107 to 192.168.5.206 port 1812
        EAP-Message = 0x010200060d20
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x159f00d591c08a25a614b86458f97af8
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.5.206:1812, id=108,
length=219
        NAS-IP-Address = 192.168.5.206
        NAS-Port = 50046
        NAS-Port-Type = Ethernet
        User-Name = "client_cert"
        Called-Station-Id = "00-0C-30-81-9B-EE"
        Calling-Station-Id = "00-0A-E4-13-1A-02"
        Service-Type = Framed-User
        Framed-MTU = 1500
        State = 0x159f00d591c08a25a614b86458f97af8
        EAP-Message =
0x020200500d800000004616030100410100003d0301416cd867ebc2b0ed199457e08b70d0c546a79311ab7a7bca97aa500a9707ae9800001600040005000a0009006400
        Message-Authenticator = 0xd46cb3d2145f27cf6aeec79c9e9ce79d
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
  modcall[authorize]: module "preprocess" returns ok for request 2
  modcall[authorize]: module "mschap" returns noop for request 2
    rlm_realm: No '@' in User-Name = "client_cert", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 2
  rlm_eap: EAP packet type response id 2 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 2
modcall: leaving group authorize (returns updated) for request 2
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
    (other): before/accept initialization
    TLS_accept: before/accept initialization
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
    TLS_accept: SSLv3 read client hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
    TLS_accept: SSLv3 write server hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 05ef], Certificate
    TLS_accept: SSLv3 write certificate A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0089], CertificateRequest
    TLS_accept: SSLv3 write certificate request A
    TLS_accept: SSLv3 flush data
    TLS_accept:error in SSLv3 read client certificate A
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase
In SSL Accept mode
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 2
modcall: leaving group authenticate (returns handled) for request 2
Sending Access-Challenge of id 108 to 192.168.5.206 port 1812
        EAP-Message =
0x0103040a0dc0000006d1160301004a020000460301416c8b253f830795b01f85bce293f96db3f996fa03bf0a71af5dedf9e6293b09209cee2596575c64b3481473ce8b
        EAP-Message =
0x40416464726573732e706c301e170d3034303531333132303735335a170d3035303531333132303735335a308184310b300906035504061302504c3115301306035504
        EAP-Message =
0x45759cbeddff3459fa8ccee35dc481c8f6e6cf174513c108d649633a6caa0038a314e199755f39f9d101f1bb88c25871541dc116c77ffbc9c233acac6e065d777adeef
        EAP-Message =
0xecd9f6a7b38f00034d30820349308202b2a003020102020900996167278b7d0ab1300d06092a864886f70d01010505003077310b300906035504061302504c31153013
        EAP-Message = 0x6d61310e300c060355040b13056669726d613110300e
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x9040a3706cc8c46b0e98f827fe1ad03a
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.5.206:1812, id=109,
length=145
        NAS-IP-Address = 192.168.5.206
        NAS-Port = 50046
        NAS-Port-Type = Ethernet
        User-Name = "client_cert"
        Called-Station-Id = "00-0C-30-81-9B-EE"
        Calling-Station-Id = "00-0A-E4-13-1A-02"
        Service-Type = Framed-User
        Framed-MTU = 1500
        State = 0x9040a3706cc8c46b0e98f827fe1ad03a
        EAP-Message = 0x020300060d00
        Message-Authenticator = 0x56f3edff4074b4e7f3f31bf43ddab33c
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
  modcall[authorize]: module "preprocess" returns ok for request 3
  modcall[authorize]: module "mschap" returns noop for request 3
    rlm_realm: No '@' in User-Name = "client_cert", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 3
  rlm_eap: EAP packet type response id 3 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 3
modcall: leaving group authorize (returns updated) for request 3
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 3
modcall: leaving group authenticate (returns handled) for request 3
Sending Access-Challenge of id 109 to 192.168.5.206 port 1812
        EAP-Message =
0x010402db0d80000006d10603550403140763615f61757468311f301d06092a864886f70d0109011610456d61696c40416464726573732e706c30819f300d06092a8648
        EAP-Message =
0x23ae323081a90603551d230481a130819e801475f4eedcbb085c11b9589d6411eb3147bf23ae32a17ba4793077310b300906035504061302504c311530130603550408
        EAP-Message =
0x043524308c73eb01d6ccff7a592b72757ced3e56868adb02662806fa383b2cb4e81f28222807064871595639ea30057f41cba7760c4a114f0e214e4d67345e95958299
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x3c8e25f0bd7437b0c00e3aa6da8a2200
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.5.206:1812, id=110,
length=1151
        NAS-IP-Address = 192.168.5.206
        NAS-Port = 50046
        NAS-Port-Type = Ethernet
        User-Name = "client_cert"
        Called-Station-Id = "00-0C-30-81-9B-EE"
        Calling-Station-Id = "00-0A-E4-13-1A-02"
        Service-Type = Framed-User
        Framed-MTU = 1500
        State = 0x3c8e25f0bd7437b0c00e3aa6da8a2200
        EAP-Message =
0x020403ee0d80000003e416030103b40b0002a40002a100029e3082029a30820203a003020102020900996167278b7d0ab4300d06092a864886f70d0101050500307731
        EAP-Message =
0x6b69653110300e0603550407130757726f636c6177310e300c060355040a13056669726d61310e300c060355040b13056669726d61311430120603550403140b636c69
        EAP-Message =
0xebd74539757ba335a9b237710203010001a317301530130603551d25040c300a06082b06010505070302300d06092a864886f70d0101050500038181002103c5a49de9
        EAP-Message =
0x6f1940d6fd963b73f10f783561d7f7f23bb5a07525c93b68780783caea502018bd47deea0cd994fc29dca0022a0a3e9d24cffa31625773b6f95572eea50c57dc3d298a
        Message-Authenticator = 0xadca91e74b84c7e3e853426e2450312b
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
  modcall[authorize]: module "preprocess" returns ok for request 4
  modcall[authorize]: module "mschap" returns noop for request 4
    rlm_realm: No '@' in User-Name = "client_cert", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 4
  rlm_eap: EAP packet type response id 4 length 253
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 4
modcall: leaving group authorize (returns updated) for request 4
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 02a8], Certificate
chain-depth=1,
error=0
--> User-Name = client_cert
--> BUF-Name = ca_auth
--> subject =
/C=PL/ST=dolnoslaskie/O=firma/OU=firma/CN=ca_auth/emailAddress=Email at Address.pl
--> issuer  =
/C=PL/ST=dolnoslaskie/O=firma/OU=firma/CN=ca_auth/emailAddress=Email at Address.pl
--> verify return:1
chain-depth=0,
error=0
--> User-Name = client_cert
--> BUF-Name = client_cert
--> subject =
/C=PL/ST=dolnoslaskie/L=Wroclaw/O=firma/OU=firma/CN=client_cert/emailAddress=Email at Address.pl
--> issuer  =
/C=PL/ST=dolnoslaskie/O=firma/OU=firma/CN=ca_auth/emailAddress=Email at Address.pl
--> verify return:1
    TLS_accept: SSLv3 read client certificate A
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
    TLS_accept: SSLv3 read client key exchange A
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], CertificateVerify
    TLS_accept: SSLv3 read certificate verify A
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 read finished A
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
    TLS_accept: SSLv3 write change cipher spec A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 write finished A
    TLS_accept: SSLv3 flush data
    (other): SSL negotiation finished successfully
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
SSL Connection Established
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 4
modcall: leaving group authenticate (returns handled) for request 4
Sending Access-Challenge of id 110 to 192.168.5.206 port 1812
        EAP-Message =
0x010500350d800000002b1403010001011603010020d58b10e81445170f5b3a07df4b0b9cc6c90a04cb00a9215b2303a7074c0b565e
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xfe779de4752e50ac7961d75b0b3cd68b
Finished request 4
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 106 with timestamp 416c8b25
Cleaning up request 1 ID 107 with timestamp 416c8b25
Cleaning up request 2 ID 108 with timestamp 416c8b25
Cleaning up request 3 ID 109 with timestamp 416c8b25
Cleaning up request 4 ID 110 with timestamp 416c8b25
Nothing to do.  Sleeping until we see a request.
rad_recv: Access-Request packet from host 192.168.5.206:1812, id=111,
length=137
        NAS-IP-Address = 192.168.5.206
        NAS-Port = 50046
        NAS-Port-Type = Ethernet
        User-Name = "client_cert"
        Called-Station-Id = "00-0C-30-81-9B-EE"
        Calling-Station-Id = "00-0A-E4-13-1A-02"
        Service-Type = Framed-User
        Framed-MTU = 1500
        EAP-Message = 0x0206001001636c69656e745f63657274
        Message-Authenticator = 0x659f830775091d0596d8d123c643e7ce
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
    rlm_realm: No '@' in User-Name = "client_cert", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
  rlm_eap: EAP packet type response id 6 length 16
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
modcall: leaving group authorize (returns updated) for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
Sending Access-Challenge of id 111 to 192.168.5.206 port 1812
        EAP-Message = 0x010700061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x3cf0290955410316037161120187ff6f
Finished request 5
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.5.206:1812, id=112,
length=145
        NAS-IP-Address = 192.168.5.206
        NAS-Port = 50046
        NAS-Port-Type = Ethernet
        User-Name = "client_cert"
        Called-Station-Id = "00-0C-30-81-9B-EE"
        Calling-Station-Id = "00-0A-E4-13-1A-02"
        Service-Type = Framed-User
        Framed-MTU = 1500
        State = 0x3cf0290955410316037161120187ff6f
        EAP-Message = 0x02070006030d
        Message-Authenticator = 0xead712160624a93aea19ab90827edc27
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: No '@' in User-Name = "client_cert", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
  rlm_eap: EAP packet type response id 7 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP NAK
 rlm_eap: EAP-NAK asked for EAP-Type/tls
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
Sending Access-Challenge of id 112 to 192.168.5.206 port 1812
        EAP-Message = 0x010800060d20
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xa0dd02d774a7a517afd24c34828db0e8
Finished request 6
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.5.206:1812, id=113,
length=219
        NAS-IP-Address = 192.168.5.206
        NAS-Port = 50046
        NAS-Port-Type = Ethernet
        User-Name = "client_cert"
        Called-Station-Id = "00-0C-30-81-9B-EE"
        Calling-Station-Id = "00-0A-E4-13-1A-02"
        Service-Type = Framed-User
        Framed-MTU = 1500
        State = 0xa0dd02d774a7a517afd24c34828db0e8
        EAP-Message =
0x020800500d800000004616030100410100003d0301416cd877cfd575976ad8ed8b77cec7fe1c97a81ef419d19e8ef2786d17169eef00001600040005000a0009006400
        Message-Authenticator = 0x045e0fdde9fe8bc0f05c25b6846a5525
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
    rlm_realm: No '@' in User-Name = "client_cert", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 7
  rlm_eap: EAP packet type response id 8 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
    (other): before/accept initialization
    TLS_accept: before/accept initialization
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
    TLS_accept: SSLv3 read client hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
    TLS_accept: SSLv3 write server hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 05ef], Certificate
    TLS_accept: SSLv3 write certificate A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0089], CertificateRequest
    TLS_accept: SSLv3 write certificate request A
    TLS_accept: SSLv3 flush data
    TLS_accept:error in SSLv3 read client certificate A
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase
In SSL Accept mode
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 7
modcall: leaving group authenticate (returns handled) for request 7
Sending Access-Challenge of id 113 to 192.168.5.206 port 1812
        EAP-Message =
0x0109040a0dc0000006d1160301004a020000460301416c8b35be097047d4cd35b23f5e2b4a476a576110e9cd8c19e4e9b56dc26ebd20cc05e73c0dc3b63d657e3bbeff
        EAP-Message =
0x40416464726573732e706c301e170d3034303531333132303735335a170d3035303531333132303735335a308184310b300906035504061302504c3115301306035504
        EAP-Message =
0x45759cbeddff3459fa8ccee35dc481c8f6e6cf174513c108d649633a6caa0038a314e199755f39f9d101f1bb88c25871541dc116c77ffbc9c233acac6e065d777adeef
        EAP-Message =
0xecd9f6a7b38f00034d30820349308202b2a003020102020900996167278b7d0ab1300d06092a864886f70d01010505003077310b300906035504061302504c31153013
        EAP-Message = 0x6d61310e300c060355040b13056669726d613110300e
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe0a996cc848b6e252a5e61a43b134ce9
Finished request 7
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.5.206:1812, id=114,
length=145
        NAS-IP-Address = 192.168.5.206
        NAS-Port = 50046
        NAS-Port-Type = Ethernet
        User-Name = "client_cert"
        Called-Station-Id = "00-0C-30-81-9B-EE"
        Calling-Station-Id = "00-0A-E4-13-1A-02"
        Service-Type = Framed-User
        Framed-MTU = 1500
        State = 0xe0a996cc848b6e252a5e61a43b134ce9
        EAP-Message = 0x020900060d00
        Message-Authenticator = 0xbcae487fabe5a67b7199abb7a39b84f8
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
  modcall[authorize]: module "preprocess" returns ok for request 8
  modcall[authorize]: module "mschap" returns noop for request 8
    rlm_realm: No '@' in User-Name = "client_cert", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 8
  rlm_eap: EAP packet type response id 9 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
modcall: leaving group authorize (returns updated) for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 8
modcall: leaving group authenticate (returns handled) for request 8
Sending Access-Challenge of id 114 to 192.168.5.206 port 1812
        EAP-Message =
0x010a02db0d80000006d10603550403140763615f61757468311f301d06092a864886f70d0109011610456d61696c40416464726573732e706c30819f300d06092a8648
        EAP-Message =
0x23ae323081a90603551d230481a130819e801475f4eedcbb085c11b9589d6411eb3147bf23ae32a17ba4793077310b300906035504061302504c311530130603550408
        EAP-Message =
0x043524308c73eb01d6ccff7a592b72757ced3e56868adb02662806fa383b2cb4e81f28222807064871595639ea30057f41cba7760c4a114f0e214e4d67345e95958299
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x10e8ef17c086eea40e96265d4c1c211d
Finished request 8
Going to the next request
--- Walking the entire request list ---
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.5.206:1812, id=115,
length=1151
        NAS-IP-Address = 192.168.5.206
        NAS-Port = 50046
        NAS-Port-Type = Ethernet
        User-Name = "client_cert"
        Called-Station-Id = "00-0C-30-81-9B-EE"
        Calling-Station-Id = "00-0A-E4-13-1A-02"
        Service-Type = Framed-User
        Framed-MTU = 1500
        State = 0x10e8ef17c086eea40e96265d4c1c211d
        EAP-Message =
0x020a03ee0d80000003e416030103b40b0002a40002a100029e3082029a30820203a003020102020900996167278b7d0ab4300d06092a864886f70d0101050500307731
        EAP-Message =
0x6b69653110300e0603550407130757726f636c6177310e300c060355040a13056669726d61310e300c060355040b13056669726d61311430120603550403140b636c69
        EAP-Message =
0xebd74539757ba335a9b237710203010001a317301530130603551d25040c300a06082b06010505070302300d06092a864886f70d0101050500038181002103c5a49de9
        EAP-Message =
0x7e0ce3792bb47a2a46722737d36f87e2ef8c35b4b684803b0aff3a79b7d97400c5d77dd738d4a04dea01a1058c0b3dbca14cf334629aee3e5f7aaff05ab312bfad6fd6
        Message-Authenticator = 0xa2ad368a0ec2a1a2fbc5524f9c9e3455
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 9
  modcall[authorize]: module "preprocess" returns ok for request 9
  modcall[authorize]: module "mschap" returns noop for request 9
    rlm_realm: No '@' in User-Name = "client_cert", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 9
  rlm_eap: EAP packet type response id 10 length 253
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 9
modcall: leaving group authorize (returns updated) for request 9
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 9
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 02a8], Certificate
chain-depth=1,
error=0
--> User-Name = client_cert
--> BUF-Name = ca_auth
--> subject =
/C=PL/ST=dolnoslaskie/O=firma/OU=firma/CN=ca_auth/emailAddress=Email at Address.pl
--> issuer  =
/C=PL/ST=dolnoslaskie/O=firma/OU=firma/CN=ca_auth/emailAddress=Email at Address.pl
--> verify return:1
chain-depth=0,
error=0
--> User-Name = client_cert
--> BUF-Name = client_cert
--> subject =
/C=PL/ST=dolnoslaskie/L=Wroclaw/O=firma/OU=firma/CN=client_cert/emailAddress=Email at Address.pl
--> issuer  =
/C=PL/ST=dolnoslaskie/O=firma/OU=firma/CN=ca_auth/emailAddress=Email at Address.pl
--> verify return:1
    TLS_accept: SSLv3 read client certificate A
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
    TLS_accept: SSLv3 read client key exchange A
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], CertificateVerify
    TLS_accept: SSLv3 read certificate verify A
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 read finished A
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
    TLS_accept: SSLv3 write change cipher spec A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 write finished A
    TLS_accept: SSLv3 flush data
    (other): SSL negotiation finished successfully
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
SSL Connection Established
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 9
modcall: leaving group authenticate (returns handled) for request 9
Sending Access-Challenge of id 115 to 192.168.5.206 port 1812
        EAP-Message =
0x010b00350d800000002b1403010001011603010020735b6dedb59fdb27811198c86a86bb2fdf2e96ce8f59031cc76f36b80bf1d04c
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x9f4e794b784914b1f67ff19696408712
Finished request 9
Going to the next request
Waking up in 5 seconds...
--- Walking the entire request list ---
Cleaning up request 5 ID 111 with timestamp 416c8b35
Cleaning up request 6 ID 112 with timestamp 416c8b35
Cleaning up request 7 ID 113 with timestamp 416c8b35
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 8 ID 114 with timestamp 416c8b36
Cleaning up request 9 ID 115 with timestamp 416c8b36
Nothing to do.  Sleeping until we see a request.






On Fri, May 15, 2009 at 4:24 PM, Ivan Kalik <tnt at kalik.net> wrote:

> > And I put cliet_cert.pem to both certificate stores Trusted CA and
> > Personal
> >
>
> You should import .p12 version onto the client.
>
> > Are you sure that I should not change anything in my server config files
> >
>
> Any particular reason you are creating certificates yourself? Why aren't
> you using scripts from raddb/certs directiory? Follow instructions in
> raddb/certs/ README.
>
> Ivan Kalik
> Kalik Informatika ISP
>
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/users.html
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20090518/c41dede0/attachment.html>


More information about the Freeradius-Users mailing list