MSCHAP module returns OK, authentication fails..
James Yale
jim at thebiggame.org
Wed Aug 27 12:04:57 CEST 2008
2008/8/26 <A.L.M.Buxey at lboro.ac.uk>:
> Hi,
>
>> I'm using a MacOS as a test client, which connects to the wireless
>> network, prompts about an invalid certificate chain for the SSL cert
>
> well, unless you've installed the CA etc that you signed the RADIUS
> server with, this will always be the case. until you trust the cert
> (by trusting the CA) then you cant EAP
>
Thanks for the replies, I was able to hit continue when presented with
the SSL certificate warning to use it anyway, so had been doing that.
However to make sure I added the CA certificate to the test system,
unfortunately it didn't have any effect.
I've reverted to a default configuration (using the Fedora Core 9
packaged version of FreeRadius 2.0.5) allowing the certs to be
autogenerated to try and spot what in my configuration is making it
break.
With a default configuration EAP works with a user specified in the
users file with a cleartext password
(http://jim.geezas.com/stuff/radius-debugging/ *-success.log files).
This works via eapol and a Mac test client.
As soon as I enable the MSCHAP module (uncommenting the ntlm auth
line) all authentication queries the AD here, so the locally
configured user fails. When I try a user configured in the AD I'm
getting:
EAP-MSCHAPV2: Invalid authenticator response in success request
In the eapol output, the radiusd logs also stop just after the mschap
module returns success (0), finishing up the request. A snippet of the
log is below (full logs @
http://jim.geezas.com/stuff/radius-debugging/ *-failure.log), the
message authenticator does seem to be invalid, this seeming to happen
when the request is proxied to the inner tunnel.
MSCHAP Success
++[eap] returns handled
} # server inner-tunnel
PEAP: Got tunneled reply RADIUS code 11
EAP-Message =
0x010800331a0307002e533d31343030463445333137313238414639414438433531453433364146453138363141353839363139
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd1ea68cfd0e27269358adf5451b3d294
PEAP: Processing from tunneled session code 0x896ac68 11
EAP-Message =
0x010800331a0307002e533d31343030463445333137313238414639414438433531453433364146453138363141353839363139
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd1ea68cfd0e27269358adf5451b3d294
PEAP: Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 7 to 127.0.0.1 port 46172
EAP-Message =
0x0108005b190017030100506c55b2c3a5d1b727e4838dd88ff3d6be564aec2cce92f2cf546f86b9566d9d3add42598ab14de29f1a75b992798a92c28ecedc676ff9a0217787e64e686e93517ccbdce3f1a30e7fb861a382ab957cc8
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd8347b19df3c62eb11ce04af34e0d0a5
Finished request 15.
So, the mschap module returns that the user is valid, but it seems
that somewhere during the process the Message-Authenticator field is
becoming invalid.
Has anyone seen this problem before, or am I looking in the wrong place?
Thanks,
James
More information about the Freeradius-Users
mailing list