EAP-TEAP Compound MAC calculation
Suriya Shankar
suriya.dshankar at gmail.com
Thu Aug 24 01:04:05 UTC 2023
Hi Alan,
I am able to authenticate both the certificates in the inner tunnel. I have
hard coded to request the client first User and Machine authentication. I
am receiving those certificates as expected , validate those certificates
and server sends the EAP-Success in plain text without encryption for some
reason the client doesn't respond anything and just says *Can't Connect to
this Network*
For reference
*(51) Login OK: [anonymous/<via Auth-Type =
eap_S_94de66e8-556a-4d56-8780-a114620a5c42>] (from client localhost port 0
cli BC-6E-E2-F2-22-CC)*
*(51) Sent Access-Accept Id 36 from 0.0.0.0:3000 <http://0.0.0.0:3000> to
100.96.1.28:35488 <http://100.96.1.28:35488> length 183*
*(51) MS-MPPE-Recv-Key =
0x456ec819f468acc0c54be0be0b7e5fe301a6842101f2ade041e2da5643acbc54*
*(51) MS-MPPE-Send-Key =
0x1a2c3e892943e6955152ce9912c118e070681098a18c9ee4f7e18fbfd52def91*
*(51) EAP-Message = 0x03a00004*
*(51) Message-Authenticator = 0x00000000000000000000000000000000*
*(51) User-Name = "anonymous"*
*(51) Framed-MTU = 994*
*(51) Acct-Interim-Interval = 7200*
*(51) Finished request*
I verified all the communication between client and server which is in the
exact sequence described in Appendix C.6. Sequence of EAP Methods
I checked the Event Viewer from the client and the information is not that
clear. It complains* "A fatal error occured while creating a TLS
credential. The internal error state is 10013."*
Do we have a better way to debug this issue?
Thank you so much for your help
Regards,
Suriya
On Mon, Aug 21, 2023 at 5:34 PM Alan DeKok <aland at deployingradius.com>
wrote:
> On Aug 21, 2023, at 8:14 PM, Suriya Shankar <suriya.dshankar at gmail.com>
> wrote:
> > Thank you. I am able to bring up the eap_teap module from 3.2.x and the
> > client is happy until the first inner TLS. Intermediate Result Success is
> > being shared with each other.
>
> That's good.
>
> > But with the vp = fr_pair_find_by_num(request->state,
> >> PW_EAP_TEAP_TLV_IDENTITY, VENDORPEC_FREERADIUS, TAG_ANY);
> >
> > is being returned null and before the second certificate exchange, server
> > is sending success and so client rejects the authentication saying
> > Unexpected TLV.
>
> You have to configure the Identity-Type correctly. It's all a bit
> magical.
>
> > Where do we set the request->state with the Attr pair to avoid this?
>
> We're working on documentation for TEAP. For now, it's still largely
> experimental.
>
> > For the same reason EAP_TEAP_TLV_IDENTITY is not being sent even for the
> > first Inner tunnel authentication. As per the documentation the TLV is
> the
> > hint for the client and I believe it may not essential for the connection
> > to establish.
> >
> > Is 3.2.x the right version for eap_teap?
>
> All of the code is public. If I say TEAP is in v3.2.x, then I'm not
> trying to mislead you. There is no secret repository of TEAP that you only
> get access to by asking nicely.
>
> Since all of the code is public, you can also walk through the way
> rlm_eap_teap works, to see what it's doing. Then, configure the server the
> way the module expects.
>
> Alan DeKok.
>
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/devel.html
>
More information about the Freeradius-Devel
mailing list