FR2 EAP-PEAP proxy does not saving attributes

Ivan Kalik tnt at kalik.net
Thu Sep 17 13:12:55 CEST 2009


>> > [peap] Tunneled authentication was successful.
>> > [peap] SUCCESS
>> > [peap] Saving tunneled attributes for later
>>
>> ...
>>
>> > Sending Access-Accept of id 231 to 192.168.145.42 port 45920
>> >         User-Name = "10"
>> >         MS-MPPE-Recv-Key =
>> > 0x95cd48dc452bb7ea093e2a2945d4337a6112847f9ac1dafce280a27713ec34ca
>> >         MS-MPPE-Send-Key =
>> > 0x34066a293d5a0f0f5269014040f41bc79d125807510bc15bf99f75e7e3307977
>> >         EAP-Message = 0x036b0004
>> >         Message-Authenticator = 0x00000000000000000000000000000000
>>
>>   Hmm... that's awkward.  You have "use_tunneled_reply = yes", so it
>> *should* work.
>>
>>   I'd suggest debugging the code in more detail.  There's little else
>> that can be done.

Original Access-Accept:

rad_recv: Access-Accept packet from host 192.168.151.59 port 1812, id=210,
length=190
        Acct-Interim-Interval = 100
        Vendor-14559-Attr-2 = 0x3746bdf7
        WISPr-Bandwidth-Max-Up = 256000
        WISPr-Bandwidth-Max-Down = 1024000
        MS-CHAP2-Success =
0x69533d38364544453342343842363931353546304535343645363831414538304436454232373039384144
        MS-MPPE-Recv-Key = 0xe7f1174e7beff1487910dc87d142d6e6
        MS-MPPE-Send-Key = 0x57c39cbbbdb601ce38ef7909bd7f9e12
        MS-MPPE-Encryption-Policy = 0x00000001
        MS-MPPE-Encryption-Types = 0x00000006
        Proxy-State = 0x323239
...
[eap] Passing reply from proxy back into the tunnel.
...
  rlm_eap_mschapv2: Passing reply from proxy back into the tunnel
0x8178f00 2.
...
[eap] Saving tunneled attributes for later
...
Sending Access-Challenge of id 229 to 192.168.145.42 port 45920
        EAP-Message =
0x016a004a1900170301003fd2ea6e8b90e35bd3dc79e64ecc7ae61cd620a7629fd3abf26723951ef19cfefbc3902e8c6b69247948560d9d5a2ffd957aaccfc6275fbeb408f6b9298c0b63
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x07ead3a30080caac02fc8e14eb27c4dd
...
[peap] Got tunneled reply RADIUS code 2
        EAP-Message = 0x036a0004
        Message-Authenticator = 0x00000000000000000000000000000000
        User-Name = "10"
[peap] Tunneled authentication was successful.
[peap] SUCCESS
[peap] Saving tunneled attributes for later

Perhaps this save wipes them off. There are no attributes in this reply.

...
Sending Access-Challenge of id 230 to 192.168.145.42 port 45920
        EAP-Message =
0x016b00261900170301001b6e683e898fecffe435a9ac6da18b14d763fce8469753e75845e608
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x07ead3a30f81caac02fc8e14eb27c4dd
...
[peap] Using saved attributes from the original Access-Accept

They might not be there because interim save between original
Access-Accept and this wipes them off.

[eap] Freeing handler
++[eap] returns ok
+- entering group post-auth {...}
++[exec] returns noop
Sending Access-Accept of id 231 to 192.168.145.42 port 45920
        User-Name = "10"
        MS-MPPE-Recv-Key =
0x95cd48dc452bb7ea093e2a2945d4337a6112847f9ac1dafce280a27713ec34ca
        MS-MPPE-Send-Key =
0x34066a293d5a0f0f5269014040f41bc79d125807510bc15bf99f75e7e3307977
        EAP-Message = 0x036b0004
        Message-Authenticator = 0x00000000000000000000000000000000


Ivan Kalik
Kalik Informatika ISP




More information about the Freeradius-Users mailing list