Supplicant authentication Issue

Pedro Alves pedrojmalves at gmail.com
Mon May 17 17:50:59 CEST 2010


Hello .

 

Why using Supplicant Intel PROSet or Supplicant Broadcom i can authenticate
with users from AD , and with Windows supplicant no ?

I see in radiusd -X log this diference:

 

Windows Supplicant:

[peap] Length Included

[peap] eaptls_verify returned 11 

[peap]     (other): before/accept initialization 

[peap]     TLS_accept: before/accept initialization 

[peap] <<< TLS 1.0 Handshake [length 0041], ClientHello  

[peap]     TLS_accept: SSLv3 read client hello A 

[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello  

[peap]     TLS_accept: SSLv3 write server hello A 

[peap] >>> TLS 1.0 Handshake [length 0791], Certificate  

[peap]     TLS_accept: SSLv3 write certificate A 

[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  

[peap]     TLS_accept: SSLv3 write server done A 

[peap]     TLS_accept: SSLv3 flush data 

[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate
A

In SSL Handshake Phase 

In SSL Accept mode  

[peap] eaptls_process returned 13 

[peap] EAPTLS_HANDLED

++[eap] returns handled

 

Intel PROSet Supplicant:

[peap] Length Included

[peap] eaptls_verify returned 11 

[peap]     (other): before/accept initialization 

[peap]     TLS_accept: before/accept initialization 

[peap] <<< TLS 1.0 Handshake [length 0061], ClientHello  

[peap]     TLS_accept: SSLv3 read client hello A 

[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello  

[peap]     TLS_accept: SSLv3 write server hello A 

[peap] >>> TLS 1.0 Handshake [length 0791], Certificate  

[peap]     TLS_accept: SSLv3 write certificate A 

[peap] >>> TLS 1.0 Handshake [length 018d], ServerKeyExchange  

[peap]     TLS_accept: SSLv3 write key exchange A 

[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  

[peap]     TLS_accept: SSLv3 write server done A 

[peap]     TLS_accept: SSLv3 flush data 

[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate
A

In SSL Handshake Phase 

In SSL Accept mode  

[peap] eaptls_process returned 13 

[peap] EAPTLS_HANDLED

++[eap] returns handled

 

 

Im losing with windows supplicant:

[peap] >>> TLS 1.0 Handshake [length 018d], ServerKeyExchange  

[peap]     TLS_accept: SSLv3 write key exchange A 

 

This is my issue ?

 

Cumprimentos

Pedro Alves

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20100517/40092172/attachment.html>


More information about the Freeradius-Users mailing list