FreeRadius 2.0.5 AD PEAP

Brooks, Kyle Kyle.Brooks at nrc-cnrc.gc.ca
Wed Aug 20 22:04:44 CEST 2008


Here we go,

TTLS/PAP works

STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending
request, round trip time 0.00 sec RADIUS packet matching with station
MS-MPPE-Send-Key (sign) - hexdump(len=32): c5 bd 3a 25 91 1b fa 82 01 4c
d2 d3 0f 50 b9 69 57 32 5c 19 73 03 2a 02 d2 47 36 bd 0d 79 a7 09
MS-MPPE-Recv-Key (crypt) - hexdump(len=32): 7e c5 98 86 14 43 b5 20 08
fd fa 5c 6a e6 7c b5 cd 42 aa d5 8f 10 8c b6 9c 01 d3 9a 86 f1 7f 15
decapsulated EAP packet (code=3 id=7 len=4) from RADIUS server: EAP
Success
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP entering state SUCCESS
CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames
required
WPA: EAPOL processing complete
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
eapol_sm_cb: success=1
PMK from EAPOL - hexdump(len=32): 7e c5 98 86 14 43 b5 20 08 fd fa 5c 6a
e6 7c b5 cd 42 aa d5 8f 10 8c b6 9c 01 d3 9a 86 f1 7f 15
EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit
ENGINE: engine deinit
MPPE keys OK: 1  mismatch: 0
SUCCESS


TTLS/MSCHAPV2 fails

STA 02:00:00:00:00:01: Received RADIUS packet matched with a pending
request, round trip time 0.02 sec RADIUS packet matching with station
decapsulated EAP packet (code=1 id=8 len=111) from RADIUS server:
EAP-Request-TTLS (21)
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=8 method=21 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=111) - Flags 0x80
SSL: TLS Message Length: 101
EAP-TTLS: received 101 bytes encrypted data for Phase 2
EAP-TTLS: Decrypted Phase 2 AVPs - hexdump(len=56): 00 00 00 1a c0 00 00
37 00 00 01 37 49 53 3d 42 46 32 34 44 44 43 43 44 31 46 37 44 36 39 37
32 45 33 34 37 30 30 42 46 44 30 35 34 43 39 43 38 45 45 34 30 30 38 45
00
EAP-TTLS: AVP: code=26 flags=0xc0 length=55
EAP-TTLS: AVP vendor_id 311
EAP-TTLS: AVP data - hexdump(len=43): 49 53 3d 42 46 32 34 44 44 43 43
44 31 46 37 44 36 39 37 32 45 33 34 37 30 30 42 46 44 30 35 34 43 39 43
38 45 45 34 30 30 38 45
EAP-TTLS: MS-CHAP2-Success - hexdump_ascii(len=43):
     49 53 3d 42 46 32 34 44 44 43 43 44 31 46 37 44   IS=BF24DDCCD1F7D
     36 39 37 32 45 33 34 37 30 30 42 46 44 30 35 34   6972E34700BFD054
     43 39 43 38 45 45 34 30 30 38 45                  C9C8EE4008E     
EAP-TTLS: Invalid authenticator response in Phase 2 MSCHAPV2 success
request
EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: startWhen --> 0
EAPOL test timed out
EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit
ENGINE: engine deinit
MPPE keys OK: 0  mismatch: 1
FAILURE


>  Perhaps try it with a Cleartext-Password in the "users" file.  i.e.
>*Without* using ntlm_auth.  That works for me, including with
eapol_test, and TTLS/EAP-MSCHAPv2.

Can you clarify this setup/change to test?  I was pretty sure I needed
to use ntlm_auth to auth against AD to test mschapv2

>  If that still fails, then there's something wrong with the system
that breaks the server in 2.0.5.

Running Samba 3.2.0 on Fedora 9

> FYI: Unknown network block for the CA_CERT with regards to the eapol 
> test config file

>  What does that mean?
Within the config you provided to for eapol_test at the bottom is a
ca_cert declaration that errors out when uncommented

Anyone using FC9 with freeradius 2.0.5 against AD working that I can use
to compare?

Thanks much appreciated




More information about the Freeradius-Users mailing list