<html><head><style type="text/css"><!-- DIV {margin:0px;} --></style></head><body><div style="font-family:times new roman, new york, times, serif;font-size:12pt">You have to look up for <br>1. In the eap.conf under tls it is clear;<br> # This can never exceed the size of a RADIUS<br> # packet (4096 bytes), and is preferably half<br> # that, to accomodate other attributes in<br> # RADIUS packet. On
most APs the MAX packet<br> # length is configured between 1500 - 1600<br> # In these cases, fragment size should be<br> # 1024 or less.<br> #<br> # fragment_size =
1024<br><br> # include_length is a flag which is<br> # by default set to yes If set to<br> # yes, Total Length of the message is<br> # included in EVERY packet we send.<br> # If set to no, Total Length of
the<br> # message is included ONLY in the<br> # First packet of a fragment series.<br> #<br> # include_length = yes<br><br>2.<br>tls: private_key_file = "/etc/raddb/certs/cert-srv.pem"
<br><br><div> rlm_eap: SSL error error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt<br>rlm_eap_tls: Error reading private key file<br><br>figure out what is wrong with your private key<br><br><br>
</div>==================================================<br><br>Benjamin K. Eshun<div style="font-family: times new roman,new york,times,serif; font-size: 12pt;"><br><br><div style="font-family: times new roman,new york,times,serif; font-size: 12pt;">----- Message d'origine ----<br>De : member alsuki <alsuki@opensuse.us><br>À : freeradius-users@lists.freeradius.org<br>Envoyé le : Vendredi, 27 Avril 2007, 0h06mn 19s<br>Objet : freeradius eap error.<br><br>Hello, list.<br><br>I'm having some problems implementing freeradius on opensuse box.<br>I've followed the toturial at novell and as a test i've used the default CA and certs that camed with the freeradius rpm.
<br>This worked very good the server started and every thing seamed nice.<br>Then i made my own CA and certs, 1st a 4096 and then a 1024 bits, but no luck in either cases.<br>Is there a limit to the length of the certs and CA keys?
<br>I've google to find if there was some info on this but no luck. <br>Can anyone help me on this?<br><br>This is a radiusd -X -A output.<br><br>Starting - reading configuration files ...<br>reread_config: reading radiusd.conf
<br>Config: including file: /etc/raddb/proxy.conf<br>Config: including file: /etc/raddb/clients.conf<br>Config: including file: /etc/raddb/snmp.conf<br>Config: including file: /etc/raddb/eap.conf<br>Config: including file: /etc/raddb/sql.conf
<br> main: prefix = "/usr"<br> main: localstatedir = "/var"<br> main: logdir = "/var/log/radius"<br> main: libdir = "/usr/lib/freeradius"<br> main: radacctdir = "/var/log/radius/radacct"
<br> main: hostname_lookups = no<br> main: max_request_time = 30<br> main: cleanup_delay = 5<br> main: max_requests = 1024<br> main: delete_blocked_requests = 0<br> main: port = 0<br> main: allow_core_dumps = no<br> main: log_stripped_names = no
<br> main: log_file = "/var/log/radius/radius.log"<br> main: log_auth = no<br> main: log_auth_badpass = no<br> main: log_auth_goodpass = no<br> main: pidfile = "/var/run/radiusd/radiusd.pid"<br> main: bind_address =
<a rel="nofollow" target="_blank" href="http://10.10.0.1">10.10.0.1</a> IP address [<a rel="nofollow" target="_blank" href="http://10.10.0.1">10.10.0.1</a>]<br> main: user = "radiusd"<br> main: group = "radiusd"<br> main: usercollide = no<br> main: lower_user = "no"
<br> main: lower_pass = "no"<br> main: nospace_user = "no"<br> main: nospace_pass = "no"<br> main: checkrad = "/usr/sbin/checkrad"<br> main: proxy_requests = yes<br> proxy: retry_delay = 5
<br> proxy: retry_count = 3<br> proxy: synchronous = no<br> proxy: default_fallback = yes<br> proxy: dead_time = 120<br> proxy: post_proxy_authorize = no<br> proxy: wake_all_if_all_dead = no<br> security: max_attributes = 200
<br> security: reject_delay = 1<br> security: status_server = no<br> main: debug_level = 0<br>read_config_files: reading dictionary<br>read_config_files: reading naslist<br>read_config_files: reading clients<br>read_config_files: reading realms
<br>radiusd: entering modules setup<br>Module: Library search path is /usr/lib/freeradius<br>Module: Loaded exec<br> exec: wait = yes<br> exec: program = "(null)"<br> exec: input_pairs = "request"<br>
exec: output_pairs = "(null)"<br> exec: packet_type = "(null)"<br>rlm_exec: Wait=yes but no output defined. Did you mean output=none?<br>Module: Instantiated exec (exec)<br>Module: Loaded expr<br>Module: Instantiated expr (expr)
<br>Module: Loaded PAP<br> pap: encryption_scheme = "crypt"<br>Module: Instantiated pap (pap)<br>Module: Loaded CHAP<br>Module: Instantiated chap (chap)<br>Module: Loaded MS-CHAP<br> mschap: use_mppe = yes<br> mschap: require_encryption = yes
<br> mschap: require_strong = yes<br> mschap: with_ntdomain_hack = no<br> mschap: passwd = "(null)"<br> mschap: ntlm_auth = "(null)"<br>Module: Instantiated mschap (mschap)<br>Module: Loaded System<br>
unix: cache = no<br> unix: passwd = "(null)"<br> unix: shadow = "(null)"<br> unix: group = "(null)"<br> unix: radwtmp = "/var/log/radius/radwtmp"<br> unix: usegroup = no<br> unix: cache_reload = 600
<br>Module: Instantiated unix (unix)<br>Module: Loaded eap<br> eap: default_eap_type = "peap"<br> eap: timer_expire = 60<br> eap: ignore_unknown_eap_types = no<br> eap: cisco_accounting_username_bug = no<br>rlm_eap: Loaded and initialized type md5
<br>rlm_eap: Loaded and initialized type leap<br> gtc: challenge = "Password: "<br> gtc: auth_type = "PAP"<br>rlm_eap: Loaded and initialized type gtc<br> tls: rsa_key_exchange = no<br> tls: dh_key_exchange = yes
<br> tls: rsa_key_length = 512<br> tls: dh_key_length = 512<br> tls: verify_depth = 0<br> tls: CA_path = "(null)"<br> tls: pem_file_type = yes<br> tls: private_key_file = "/etc/raddb/certs/cert-srv.pem"
<br> tls: certificate_file = "/etc/raddb/certs/cert-srv.pem"<br> tls: CA_file = "/etc/raddb/certs/demoCA/cacert.pem"<br> tls: private_key_password = "whatever"<br> tls: dh_file = "/etc/raddb/certs/dh"
<br> tls: random_file = "/etc/raddb/certs/random"<br> tls: fragment_size = 1024<br> tls: include_length = yes<br> tls: check_crl = no<br> tls: check_cert_cn = "(null)"<br> tls: cipher_list = "(null)"
<br> tls: check_cert_issuer = "(null)"<br>rlm_eap_tls: Loading the certificate file as a chain<br>rlm_eap: SSL error error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt<br>rlm_eap_tls: Error reading private key file
<br>rlm_eap: Failed to initialize type tls<br>radiusd.conf[10]: eap: Module instantiation failed.<br>radiusd.conf[1941] Unknown module "eap".<br>radiusd.conf[1888] Failed to parse authenticate section.<br><br>Thanks for any help that may came from this list.
<br>
<div>- <br>List info/subscribe/unsubscribe? See <a target="_blank" href="http://www.freeradius.org/list/users.html">http://www.freeradius.org/list/users.html</a></div></div><br></div></div><br>
<hr size="1">
Découvrez une nouvelle façon d'obtenir des réponses à toutes vos questions !
Profitez des connaissances, des opinions et des expériences des internautes sur <a href="http://fr.rd.yahoo.com/evt=42054/*http://fr.answers.yahoo.com">Yahoo! Questions/Réponses</a>.</body></html>