FreeRadius MAC address authorization (no authentication)
Ramot Lubis
ramot.lubis at gmail.com
Mon Aug 11 05:43:55 CEST 2008
I guess, Windows XP client has been able to communicate (EAP problem
has been fixed) according to the following log. However, the client
has not been authenticated because of username and password problem,
but its OK since my purpose is to authenticate based on client MAC
address rather than username/password.
My question is how can I configure FreeRadius to authenticate client
based on MAC address? Is there in possibility to use "unlang", if so
how can I use unlang to authenticate client MAC address.
thanks in advance.
++[logintime] returns noop
++[pap] returns noop
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: Request found, released from the list
rlm_eap: EAP/mschapv2
rlm_eap: processing type mschapv2
+- entering group MS-CHAP
rlm_mschap: No Cleartext-Password configured. Cannot create LM-Password.
rlm_mschap: No Cleartext-Password configured. Cannot create NT-Password.
rlm_mschap: NT Domain delimeter found, should we have enabled
with_ntdomain_hack?
rlm_mschap: Told to do MS-CHAPv2 for PIDEL-3C5B30E9C\Administrator
with NT-Password
rlm_mschap: FAILED: No NT/LM-Password. Cannot perform authentication.
rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
++[mschap] returns reject
rlm_eap: Freeing handler
++[eap] returns reject
auth: Failed to validate the user.
PEAP: Tunneled authentication was rejected.
rlm_eap_peap: FAILURE
++[eap] returns handled
Sending Access-Challenge of id 52 to 10.0.0.2 port 1027
EAP-Message =
0x010800261900170301001b916dabf876b637e708a5f0472e047d95636c8d755a4db6398bfd5a
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x5e8a10c0598209f9d72120367b73e4be
Finished request 7.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.0.0.2 port 1027, id=53, length=221
User-Name = "PIDEL-3C5B30E9C\\Administrator"
NAS-IP-Address = 10.0.0.2
NAS-Port = 0
Called-Station-Id = "00-1E-E5-9D-61-85:DEL_LR1"
Calling-Station-Id = "00-21-00-0B-68-E3"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message =
0x020800261900170301001b09c3f1df213e452b936c4d3a3a42a177644f14e998e6d36c128a55
State = 0x5e8a10c0598209f9d72120367b73e4be
Message-Authenticator = 0xaa9d67c2641d1c6281c0b7e1dcff3aec
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
rlm_realm: No '@' in User-Name = "PIDEL-3C5B30E9C\Administrator",
looking up realm NULL
rlm_realm: No such realm "NULL"
++[suffix] returns noop
rlm_eap: EAP packet type response id 8 length 38
rlm_eap: Continuing tunnel setup.
++[eap] returns ok
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_peap: Received EAP-TLV response.
rlm_eap_peap: Had sent TLV failure. User was rejected earlier in
this session.
rlm_eap: Handler failed in EAP/peap
rlm_eap: Failed in EAP select
++[eap] returns invalid
auth: Failed to validate the user.
Found Post-Auth-Type Reject
+- entering group REJECT
expand: %{User-Name} -> PIDEL-3C5B30E9C\Administrator
attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Sending Access-Reject of id 53 to 10.0.0.2 port 1027
EAP-Message = 0x04080004
Message-Authenticator = 0x00000000000000000000000000000000
Finished request 8.
Going to the next request
On Sun, Aug 10, 2008 at 2:20 PM, Alan DeKok <aland at deployingradius.com> wrote:
> Ramot Lubis wrote:
>> 1. Creating production certificate as described in
>> http://deployingradius.com/documents/configuration/certificates.html
>> 2. update hotfix as described in http://support.microsoft.com/kb/885453/en-us
>> 3. Install certificate ca.der into Windows client. Use the new
>> installed certificate in client when using PEAP from client.
>
> For instructions on debugging the client side, see:
>
> http://deployingradius.com/documents/configuration/eap-problems.html
>
> Alan DeKok.
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
>
More information about the Freeradius-Users
mailing list