Hi Alex <br>Thank you for the help. I am now able to authenticate users from both windows xp(2) and windows 7 using PEAP authentication type. But in Windows Vista I have a problem. Initially I am able to authenticate from windows vista but after some time its diconnects itself. I have to disable the network to authenticate again and the whole process starts again (i.e after initial authentication and network connections success it disconnects ). Can you shed some light on this.<br>
<br>Thank You in advance....<br><br><div class="gmail_quote">On Sat, Sep 4, 2010 at 2:42 AM, Alexander Clouter <span dir="ltr"><<a href="mailto:alex@digriz.org.uk">alex@digriz.org.uk</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<div class="im">homyang cha <<a href="mailto:homyang4u@gmail.com">homyang4u@gmail.com</a>> wrote:<br>
><br>
> Now my issues are: in my networks there are various kinds of OS<br>
> running for supplicants. To name a few are Windows XP (SP2, SP3),<br>
> Windows Vista, Windows 7, Fedora, CentOS, Ubuntu and Mac OS X. I have<br>
> to configure AAA applicants systems in such a way all this systems are<br>
> supported. Can someone help me suggest or have any idea/experience on<br>
> this. What could be the best authentiation method that I can use so<br>
> that all this supplicants using different OS are supported. Also I use<br>
> wired connection as well as wireless connection in the network. Does<br>
> anybody throw some light on this matter?<br>
><br>
</div>Here is a summary of my five years of experience being a network<br>
analyst at a UK university... :) Mac OS X and Linux are really trivial<br>
and it is hard to write much about them, it is Microsoft that<br>
unsurprisingly once again excel at causing us so much pain.<br>
<br>
For Windows XP[1]/Vista/Win7 you have two options:<br>
* PEAP<br>
* TTLS - involves purchasing SecureW2[3]<br>
<br>
PEAP might seem appealing as it is built into Windows, however by the<br>
sounds of things all the workstations connecting are not part of your<br>
Microsoft AD (like ours) and so you cannot push out a group policy<br>
autoconfiguring everyones equipment. This means you (or rather your<br>
helldesk minions) have to manually configure every workstation by hand<br>
which can lead to corners being cut (skipping certificate validation)<br>
and misconfiguration.<br>
<br>
Until recently there was no way to avoid this nasty choice of either AD<br>
importing or manual configuration. Fortunately, one of my counterparts<br>
working also in academentia put together a collection of scripts/tools<br>
and called it SU1X[4] that lets you autoconfigure PEAP behind a single<br>
EXE.<br>
<br>
TTLS with SecureW2 is the other option and from day let you pre-seed the<br>
configuration so that everything got configured plus the handy popups<br>
and full customisation can be a nice touch if that sort of thing floats<br>
your boat, or rather your boss's. Of course, SecureW2 comes with a<br>
price tag, we personally think a *very* good one when you think of the<br>
money in hours saved in your helpdesk team costs. Things get even<br>
better when you wrap the lot up in a NSIS script like we have[5].<br>
<br>
There is actually a technical reason that might force you to choose<br>
between PEAP and TTLS which boils down to how your passwords were stored<br>
in your backend database. If you have an LDAP backend only (where the<br>
plaintext password is not extractable) then TTLS/PAP is really your<br>
*only* option. If you have a Microsoft AD backend for your user<br>
accounts, then you can use PEAP/MS-CHAPv2 (or TTLS/MS-CHAPv2).<br>
<br>
Originally we only had an LDAP backend database, but then 'upgraded' to<br>
using Novell's Universal Password so now we no longer have the TTLS<br>
constraint and can now offer TTLS/MS-CHAPv2 (but we actually choose<br>
*not* to offer PEAP).<br>
<br>
So, why pick one or the other, technical reasons only. SecureW2 handles<br>
certificate chaining a *lot* better than the PEAP and due to it's<br>
commercial nature it's hard for the helpdesk to cut corners and *not*<br>
use your official hand crafted blessed installer as they cannot source<br>
their own copy. PEAP however will offer you Statement of Health;<br>
speaking to the SecureW2 author though he is keen to work on adding<br>
support for this. One other win for SecureW2 is you get GTC support<br>
too, so you can do fancy things like use one time passwords (the<br>
changing key is generated by your mobile phone) which works nicely too;<br>
well it would work nicely if Alan accepted trivial patches to the GTC<br>
FreeRADIUS module (along with the LDAP one I posted...) </rant><br>
<br>
Lucky for you SU1X is free to play with and you can also get a fully<br>
enabled trial for free of SecureW2 (man, I must sound like a sales<br>
droid). Play with both and decide what you prefer.<br>
<br>
As for the Mac OS X weenies I noticed as soon as I enabled<br>
TTLS/MS-CHAPv2 they (including the iPhones, iPads and iPods) started to<br>
automatically configure themselves. No idea what they are like when<br>
confronted with PEAP but they would not autoconfigure TTLS/PAP :-/<br>
<br>
The Linux users, well we are fine, you can see what we do destructions<br>
wise on our support website[6]. One of our students is slowly getting<br>
around to testing amendments I suggested to the Wicd template that<br>
should improve things further; I myself am a Debian wpa_supplicant kinda<br>
person.<br>
<br>
As for your last question regarding simulateous wired and wireless<br>
access, look around the Internet and read up about 'routing metrics'.<br>
In short, make your wifi link have a higher (lower priority) routing<br>
metric; although this overlooks source based routing issues but that is<br>
not a FreeRADIUS problem or an issue that should be discussed here.<br>
<br>
If you have any more questions then do ask.<br>
<br>
Cheers<br>
<br>
[1] I strongly recommend you just say no to SP2, hell Microsoft will no<br>
longer support it so why should you. However, if you insist on<br>
punishing yourself make sure you force an install of<br>
KB917021[2]. Really you should make a condition of getting<br>
onto the wifi/wired 802.1X network that the user has to update<br>
to the latest service pack<br>
[2] <a href="http://support.microsoft.com/kb/917021/" target="_blank">http://support.microsoft.com/kb/917021/</a><br>
[3] <a href="http://www.securew2.com/" target="_blank">http://www.securew2.com/</a><br>
[4] <a href="http://www.ja.net/services/authentication-and-authorisation/janet-roaming/su1x.html" target="_blank">http://www.ja.net/services/authentication-and-authorisation/janet-roaming/su1x.html</a><br>
[5] <a href="http://stuff.digriz.org.uk/securew2-dev.zip" target="_blank">http://stuff.digriz.org.uk/securew2-dev.zip</a><br>
[6] <a href="http://support.docs.lis.soas.ac.uk/connect#linux" target="_blank">http://support.docs.lis.soas.ac.uk/connect#linux</a><br>
<font color="#888888"><br>
--<br>
Alexander Clouter<br>
.sigmonster says: Massachusetts has the best politicians money can buy.<br>
</font><div><div></div><div class="h5"><br>
-<br>
List info/subscribe/unsubscribe? See <a href="http://www.freeradius.org/list/users.html" target="_blank">http://www.freeradius.org/list/users.html</a><br>
</div></div></blockquote></div><br><br clear="all"><br>-- <br>homyang (aka puran)<br>