Hello, list.<br><br>I'm having some problems implementing freeradius on opensuse box.<br>I've followed the toturial at novell and as a test i've used the default CA and certs that camed with the freeradius rpm.
<br>This worked very good the server started and every thing seamed nice.<br>Then i made my own CA and certs, 1st a 4096 and then a 1024 bits, but no luck in either cases.<br>Is there a limit to the length of the certs and CA keys?
<br>I've google to find if there was some info on this but no luck. <br>Can anyone help me on this?<br><br>This is a radiusd -X -A output.<br><br>Starting - reading configuration files ...<br>reread_config: reading radiusd.conf
<br>Config: including file: /etc/raddb/proxy.conf<br>Config: including file: /etc/raddb/clients.conf<br>Config: including file: /etc/raddb/snmp.conf<br>Config: including file: /etc/raddb/eap.conf<br>Config: including file: /etc/raddb/sql.conf
<br> main: prefix = "/usr"<br> main: localstatedir = "/var"<br> main: logdir = "/var/log/radius"<br> main: libdir = "/usr/lib/freeradius"<br> main: radacctdir = "/var/log/radius/radacct"
<br> main: hostname_lookups = no<br> main: max_request_time = 30<br> main: cleanup_delay = 5<br> main: max_requests = 1024<br> main: delete_blocked_requests = 0<br> main: port = 0<br> main: allow_core_dumps = no<br> main: log_stripped_names = no
<br> main: log_file = "/var/log/radius/radius.log"<br> main: log_auth = no<br> main: log_auth_badpass = no<br> main: log_auth_goodpass = no<br> main: pidfile = "/var/run/radiusd/radiusd.pid"<br> main: bind_address =
<a href="http://10.10.0.1">10.10.0.1</a> IP address [<a href="http://10.10.0.1">10.10.0.1</a>]<br> main: user = "radiusd"<br> main: group = "radiusd"<br> main: usercollide = no<br> main: lower_user = "no"
<br> main: lower_pass = "no"<br> main: nospace_user = "no"<br> main: nospace_pass = "no"<br> main: checkrad = "/usr/sbin/checkrad"<br> main: proxy_requests = yes<br> proxy: retry_delay = 5
<br> proxy: retry_count = 3<br> proxy: synchronous = no<br> proxy: default_fallback = yes<br> proxy: dead_time = 120<br> proxy: post_proxy_authorize = no<br> proxy: wake_all_if_all_dead = no<br> security: max_attributes = 200
<br> security: reject_delay = 1<br> security: status_server = no<br> main: debug_level = 0<br>read_config_files: reading dictionary<br>read_config_files: reading naslist<br>read_config_files: reading clients<br>read_config_files: reading realms
<br>radiusd: entering modules setup<br>Module: Library search path is /usr/lib/freeradius<br>Module: Loaded exec<br> exec: wait = yes<br> exec: program = "(null)"<br> exec: input_pairs = "request"<br>
exec: output_pairs = "(null)"<br> exec: packet_type = "(null)"<br>rlm_exec: Wait=yes but no output defined. Did you mean output=none?<br>Module: Instantiated exec (exec)<br>Module: Loaded expr<br>Module: Instantiated expr (expr)
<br>Module: Loaded PAP<br> pap: encryption_scheme = "crypt"<br>Module: Instantiated pap (pap)<br>Module: Loaded CHAP<br>Module: Instantiated chap (chap)<br>Module: Loaded MS-CHAP<br> mschap: use_mppe = yes<br> mschap: require_encryption = yes
<br> mschap: require_strong = yes<br> mschap: with_ntdomain_hack = no<br> mschap: passwd = "(null)"<br> mschap: ntlm_auth = "(null)"<br>Module: Instantiated mschap (mschap)<br>Module: Loaded System<br>
unix: cache = no<br> unix: passwd = "(null)"<br> unix: shadow = "(null)"<br> unix: group = "(null)"<br> unix: radwtmp = "/var/log/radius/radwtmp"<br> unix: usegroup = no<br> unix: cache_reload = 600
<br>Module: Instantiated unix (unix)<br>Module: Loaded eap<br> eap: default_eap_type = "peap"<br> eap: timer_expire = 60<br> eap: ignore_unknown_eap_types = no<br> eap: cisco_accounting_username_bug = no<br>rlm_eap: Loaded and initialized type md5
<br>rlm_eap: Loaded and initialized type leap<br> gtc: challenge = "Password: "<br> gtc: auth_type = "PAP"<br>rlm_eap: Loaded and initialized type gtc<br> tls: rsa_key_exchange = no<br> tls: dh_key_exchange = yes
<br> tls: rsa_key_length = 512<br> tls: dh_key_length = 512<br> tls: verify_depth = 0<br> tls: CA_path = "(null)"<br> tls: pem_file_type = yes<br> tls: private_key_file = "/etc/raddb/certs/cert-srv.pem"
<br> tls: certificate_file = "/etc/raddb/certs/cert-srv.pem"<br> tls: CA_file = "/etc/raddb/certs/demoCA/cacert.pem"<br> tls: private_key_password = "whatever"<br> tls: dh_file = "/etc/raddb/certs/dh"
<br> tls: random_file = "/etc/raddb/certs/random"<br> tls: fragment_size = 1024<br> tls: include_length = yes<br> tls: check_crl = no<br> tls: check_cert_cn = "(null)"<br> tls: cipher_list = "(null)"
<br> tls: check_cert_issuer = "(null)"<br>rlm_eap_tls: Loading the certificate file as a chain<br>rlm_eap: SSL error error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt<br>rlm_eap_tls: Error reading private key file
<br>rlm_eap: Failed to initialize type tls<br>radiusd.conf[10]: eap: Module instantiation failed.<br>radiusd.conf[1941] Unknown module "eap".<br>radiusd.conf[1888] Failed to parse authenticate section.<br><br>Thanks for any help that may came from this list.
<br>