need help - force EAP-TTLS to validate the server certificate
Klaus Laus
superklausx at gmx.de
Thu Sep 16 15:35:20 CEST 2010
ok, this is the debug output:
FreeRADIUS Version 2.1.6, for host i686-pc-linux-gnu, built on Oct 27 2009 at 17:05:49
Copyright (C) 1999-2009 The FreeRADIUS server project and contributors.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License v2.
Starting - reading configuration files ...
including configuration file /etc/raddb/radiusd.conf
including configuration file /etc/raddb/proxy.conf
including configuration file /etc/raddb/clients.conf
including files in directory /etc/raddb/modules/
including configuration file /etc/raddb/modules/logintime
including configuration file /etc/raddb/modules/passwd
including configuration file /etc/raddb/modules/attr_rewrite
including configuration file /etc/raddb/modules/ippool
including configuration file /etc/raddb/modules/radutmp
including configuration file /etc/raddb/modules/acct_unique
including configuration file /etc/raddb/modules/sql_log
including configuration file /etc/raddb/modules/checkval
including configuration file /etc/raddb/modules/krb5
including configuration file /etc/raddb/modules/smbpasswd
including configuration file /etc/raddb/modules/otp
including configuration file /etc/raddb/modules/inner-eap
including configuration file /etc/raddb/modules/expr
including configuration file /etc/raddb/modules/perl
including configuration file /etc/raddb/modules/expiration
including configuration file /etc/raddb/modules/ldap
including configuration file /etc/raddb/modules/pap
including configuration file /etc/raddb/modules/mac2vlan
including configuration file /etc/raddb/modules/echo
including configuration file /etc/raddb/modules/attr_filter
including configuration file /etc/raddb/modules/unix
including configuration file /etc/raddb/modules/linelog
including configuration file /etc/raddb/modules/chap
including configuration file /etc/raddb/modules/policy
including configuration file /etc/raddb/modules/detail.example.com
including configuration file /etc/raddb/modules/preprocess
including configuration file /etc/raddb/modules/realm
including configuration file /etc/raddb/modules/files
including configuration file /etc/raddb/modules/detail.log
including configuration file /etc/raddb/modules/detail
including configuration file /etc/raddb/modules/wimax
including configuration file /etc/raddb/modules/sradutmp
including configuration file /etc/raddb/modules/sqlcounter_expire_on_login
including configuration file /etc/raddb/modules/etc_group
including configuration file /etc/raddb/modules/mac2ip
including configuration file /etc/raddb/modules/always
including configuration file /etc/raddb/modules/mschap
including configuration file /etc/raddb/modules/counter
including configuration file /etc/raddb/modules/smsotp
including configuration file /etc/raddb/modules/pam
including configuration file /etc/raddb/modules/exec
including configuration file /etc/raddb/modules/digest
including configuration file /etc/raddb/eap.conf
including configuration file /etc/raddb/policy.conf
including files in directory /etc/raddb/sites-enabled/
including configuration file /etc/raddb/sites-enabled/default
including configuration file /etc/raddb/sites-enabled/control-socket
including configuration file /etc/raddb/sites-enabled/inner-tunnel
group = radiusd
user = radiusd
including dictionary file /etc/raddb/dictionary
main {
prefix = "/usr"
localstatedir = "/var"
logdir = "/var/log/radius"
libdir = "/usr/lib/freeradius"
radacctdir = "/var/log/radius/radacct"
hostname_lookups = no
max_request_time = 30
cleanup_delay = 5
max_requests = 1024
allow_core_dumps = no
pidfile = "/var/run/radiusd/radiusd.pid"
checkrad = "/usr/sbin/checkrad"
debug_level = 0
proxy_requests = yes
log {
stripped_names = no
auth = no
auth_badpass = no
auth_goodpass = no
}
security {
max_attributes = 200
reject_delay = 1
status_server = yes
}
}
radiusd: #### Loading Realms and Home Servers ####
proxy server {
retry_delay = 5
retry_count = 3
default_fallback = no
dead_time = 120
wake_all_if_all_dead = no
}
home_server localhost {
ipaddr = 127.0.0.1
port = 1812
type = "auth"
secret = "testing123"
response_window = 20
max_outstanding = 65536
require_message_authenticator = no
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
num_answers_to_alive = 3
num_pings_to_alive = 3
revive_interval = 120
status_check_timeout = 4
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
home_server_pool my_auth_failover {
type = fail-over
home_server = localhost
}
realm example.com {
auth_pool = my_auth_failover
}
realm LOCAL {
}
radiusd: #### Loading Clients ####
client localhost {
ipaddr = 127.0.0.1
require_message_authenticator = no
secret = "testing123"
nastype = "other"
}
client 10.65.100.50 {
require_message_authenticator = no
secret = "xxxxxxxx"
nastype = "other"
}
radiusd: #### Instantiating modules ####
instantiate {
Module: Linked to module rlm_exec
Module: Instantiating exec
exec {
wait = no
input_pairs = "request"
shell_escape = yes
}
Module: Linked to module rlm_expr
Module: Instantiating expr
Module: Linked to module rlm_expiration
Module: Instantiating expiration
expiration {
reply-message = "Password Has Expired "
}
Module: Linked to module rlm_logintime
Module: Instantiating logintime
logintime {
reply-message = "You are calling outside your allowed timespan "
minimum-timeout = 60
}
}
radiusd: #### Loading Virtual Servers ####
server inner-tunnel {
modules {
Module: Checking authenticate {...} for more modules to load
Module: Linked to module rlm_pap
Module: Instantiating pap
pap {
encryption_scheme = "auto"
auto_header = no
}
Module: Linked to module rlm_chap
Module: Instantiating chap
Module: Linked to module rlm_mschap
Module: Instantiating mschap
mschap {
use_mppe = yes
require_encryption = no
require_strong = no
with_ntdomain_hack = no
}
Module: Linked to module rlm_unix
Module: Instantiating unix
unix {
radwtmp = "/var/log/radius/radwtmp"
}
Module: Linked to module rlm_eap
Module: Instantiating eap
eap {
default_eap_type = "md5"
timer_expire = 60
ignore_unknown_eap_types = no
cisco_accounting_username_bug = no
max_sessions = 2048
}
Module: Linked to sub-module rlm_eap_md5
Module: Instantiating eap-md5
Module: Linked to sub-module rlm_eap_leap
Module: Instantiating eap-leap
Module: Linked to sub-module rlm_eap_gtc
Module: Instantiating eap-gtc
gtc {
challenge = "Password: "
auth_type = "PAP"
}
Module: Linked to sub-module rlm_eap_tls
Module: Instantiating eap-tls
tls {
rsa_key_exchange = no
dh_key_exchange = yes
rsa_key_length = 512
dh_key_length = 512
verify_depth = 0
CA_path = "/etc/ssl"
pem_file_type = yes
private_key_file = "/etc/ssl/serverkey.pem"
certificate_file = "/etc/ssl/servercert.pem"
CA_file = "/etc/ssl/cacert.pem"
private_key_password = "xxxxxxxxx"
dh_file = "/etc/ssl/dh"
random_file = "/etc/ssl/random"
fragment_size = 1024
include_length = yes
check_crl = no
cipher_list = "DEFAULT"
cache {
enable = no
lifetime = 24
max_entries = 255
}
}
Module: Linked to sub-module rlm_eap_ttls
Module: Instantiating eap-ttls
ttls {
default_eap_type = "md5"
copy_request_to_tunnel = no
use_tunneled_reply = no
virtual_server = "inner-tunnel"
include_length = yes
}
Module: Linked to sub-module rlm_eap_peap
Module: Instantiating eap-peap
peap {
default_eap_type = "mschapv2"
copy_request_to_tunnel = no
use_tunneled_reply = no
proxy_tunneled_request_as_eap = yes
virtual_server = "inner-tunnel"
}
Module: Linked to sub-module rlm_eap_mschapv2
Module: Instantiating eap-mschapv2
mschapv2 {
with_ntdomain_hack = no
}
Module: Checking authorize {...} for more modules to load
Module: Linked to module rlm_realm
Module: Instantiating suffix
realm suffix {
format = "suffix"
delimiter = "@"
ignore_default = no
ignore_null = no
}
Module: Linked to module rlm_files
Module: Instantiating files
files {
usersfile = "/etc/raddb/users"
acctusersfile = "/etc/raddb/acct_users"
preproxy_usersfile = "/etc/raddb/preproxy_users"
compat = "no"
}
Module: Checking session {...} for more modules to load
Module: Linked to module rlm_radutmp
Module: Instantiating radutmp
radutmp {
filename = "/var/log/radius/radutmp"
username = "%{User-Name}"
case_sensitive = yes
check_with_nas = yes
perm = 384
callerid = yes
}
Module: Checking post-proxy {...} for more modules to load
Module: Checking post-auth {...} for more modules to load
Module: Linked to module rlm_attr_filter
Module: Instantiating attr_filter.access_reject
attr_filter attr_filter.access_reject {
attrsfile = "/etc/raddb/attrs.access_reject"
key = "%{User-Name}"
}
} # modules
} # server
server {
modules {
Module: Checking authenticate {...} for more modules to load
Module: Checking authorize {...} for more modules to load
Module: Linked to module rlm_preprocess
Module: Instantiating preprocess
preprocess {
huntgroups = "/etc/raddb/huntgroups"
hints = "/etc/raddb/hints"
with_ascend_hack = no
ascend_channels_per_line = 23
with_ntdomain_hack = no
with_specialix_jetstream_hack = no
with_cisco_vsa_hack = no
with_alvarion_vsa_hack = no
}
Module: Checking preacct {...} for more modules to load
Module: Linked to module rlm_acct_unique
Module: Instantiating acct_unique
acct_unique {
key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
}
Module: Checking accounting {...} for more modules to load
Module: Linked to module rlm_detail
Module: Instantiating detail
detail {
detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
header = "%t"
detailperm = 384
dirperm = 493
locking = no
log_packet_header = no
}
Module: Instantiating attr_filter.accounting_response
attr_filter attr_filter.accounting_response {
attrsfile = "/etc/raddb/attrs.accounting_response"
key = "%{User-Name}"
}
Module: Checking session {...} for more modules to load
Module: Checking post-proxy {...} for more modules to load
Module: Checking post-auth {...} for more modules to load
} # modules
} # server
radiusd: #### Opening IP addresses and Ports ####
listen {
type = "auth"
ipaddr = *
port = 0
}
listen {
type = "acct"
ipaddr = *
port = 0
}
listen {
type = "control"
listen {
socket = "/var/run/radiusd/radiusd.sock"
}
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on command file /var/run/radiusd/radiusd.sock
Listening on proxy address * port 1814
Ready to process requests.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=114, length=144
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x02010008016b6d61
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0x3cbbc184709e658cef90b39bdd2f713d
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 1 length 8
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[files] users: Matched entry testuser at line 93
[files] expand: Hello, %{User-Name} -> Hello, testuser
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type md5
rlm_eap_md5: Issuing Challenge
++[eap] returns handled
Sending Access-Challenge of id 114 to 10.65.100.50 port 32791
Reply-Message = "Hello, testuser"
EAP-Message = 0x010200160410739a3e07e94beceb2948b8179492f893
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x146fb04e146db4438ffe5de6d8918b6a
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=115, length=160
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x020200060319
State = 0x146fb04e146db4438ffe5de6d8918b6a
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0x55c243970a8b2fd0a0e14a3fb34a6dc2
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[files] users: Matched entry testuser at line 93
[files] expand: Hello, %{User-Name} -> Hello, testuser
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP NAK
[eap] EAP-NAK asked for EAP-Type/peap
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 115 to 10.65.100.50 port 32791
Reply-Message = "Hello, testuser"
EAP-Message = 0x010300061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x146fb04e156ca9438ffe5de6d8918b6a
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=116, length=266
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x0203007019800000006616030100610100005d03014c91fe49a98cf5c95b36c59cb731bcd848a2d74e329b0506827eeaeaa32bedad00003600390038003500160013000a00330032002f0007006600050004006300620061001500120009006500640060001400110008000600030100
State = 0x146fb04e156ca9438ffe5de6d8918b6a
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0x9f28ec17594a81915f8211ac4571a49f
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 3 length 112
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 102
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] (other): before/accept initialization
[peap] TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 0061], ClientHello
[peap] TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello
[peap] TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 0831], Certificate
[peap] TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 018d], ServerKeyExchange
[peap] TLS_accept: SSLv3 write key exchange A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
[peap] TLS_accept: SSLv3 write server done A
[peap] TLS_accept: SSLv3 flush data
[peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 116 to 10.65.100.50 port 32791
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x22593f76ebc38c2dc6ebe26d3a1d23b68cf1aebf164f9ac7d78dc8ca94357fdec227751be1a547c09c267b6bf5108d3f22e09d468754de49778e1dc75c4427dbe08db6fe8f9f1c3f64f4650cd1abb96922adc5beaeb50ffa6be76c2ae9fe1cea02e73df394411ff98be4239f2df447b9c2c1380e11afe8880269f0e8e5ab72c7ec6e87ce1c95fef3e832d8f9ac12f86c93925f0203010001a37b307930090603551d1304023000302c06096086480186f842010d041f161d4f70656e53534c2047656e657261746564204365727469666963617465301d0603551d0e041604145ba25c767b248d2d0e6a5ac498880878c7723124301f0603551d230418
EAP-Message = 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
EAP-Message = 0xcbda6c00dccba82a9fab719b
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x146fb04e166ba9438ffe5de6d8918b6a
Finished request 2.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=117, length=160
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x020400061900
State = 0x146fb04e166ba9438ffe5de6d8918b6a
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0x44fbb8d5b5794231e160cbdf297ae974
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 4 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 117 to 10.65.100.50 port 32791
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xd77d5cdafcba00909b8c89b4c3da27f52095816f75fb9f5aab6ff92cfd06ed0e72fcf7aaf6b67e2ff8d925f023d5c9e8aef68453cbf49bd2f60364520ffcb13fa0943f1ced1f9797520654bedab6670ed41d77499da10a9fd13af6fd8da181cf88c3cdaf6e53b3275ea6a5b4c59c3f001484b1e4a4ab080407f5c42a4a082970853e0aeaa6250203010001a381d93081d6301d0603551d0e041604147eceb96deb6bd80d6d82a6691ea4d9e2c4cb42023081a60603551d2304819e30819b80147eceb96deb6bd80d6d82a6691ea4d9e2c4cb4202a178a4763074310b3009060355040613024445311b301906035504081312426164656e2d5775657274
EAP-Message = 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
EAP-Message = 0x59589be19952b366
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x146fb04e176aa9438ffe5de6d8918b6a
Finished request 3.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=118, length=160
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x020500061900
State = 0x146fb04e176aa9438ffe5de6d8918b6a
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0x292aa35d20c8002dde6bade34ca718dc
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 5 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 118 to 10.65.100.50 port 32791
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x2b44962f5f43e4a26a0d2146f2963ddf37704a386e25d416030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x146fb04e1069a9438ffe5de6d8918b6a
Finished request 4.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=119, length=298
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x020600901980000000861603010046100000420040d6ce8558c55b2f4b779e21a769e80ae1a7285817941bbb1b427fbd98c3f448ba9e5acfacc468aba6ccd1051a99a4a1eb13cb530f4ec3520b7943a217ef7404481403010001011603010030267e42128241e550234b52c4fc58616d01c3c2f04e862210d8d3ed652410d1e116acf17b2618d4972f325986eea2809d
State = 0x146fb04e1069a9438ffe5de6d8918b6a
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0xf7fcbd1a29f6af1476fea9f0d76d5a12
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 6 length 144
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 134
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] <<< TLS 1.0 Handshake [length 0046], ClientKeyExchange
[peap] TLS_accept: SSLv3 read client key exchange A
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
[peap] <<< TLS 1.0 Handshake [length 0010], Finished
[peap] TLS_accept: SSLv3 read finished A
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
[peap] TLS_accept: SSLv3 write change cipher spec A
[peap] >>> TLS 1.0 Handshake [length 0010], Finished
[peap] TLS_accept: SSLv3 write finished A
[peap] TLS_accept: SSLv3 flush data
[peap] (other): SSL negotiation finished successfully
SSL Connection Established
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 119 to 10.65.100.50 port 32791
EAP-Message = 0x010700411900140301000101160301003059ea927eecffd98015702b3b6ae3f2cf0083b8809b7c6e943549cf1af8de0664820fd44155ab3fb36566e0d7fffe486f
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x146fb04e1168a9438ffe5de6d8918b6a
Finished request 5.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=120, length=160
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x020700061900
State = 0x146fb04e1168a9438ffe5de6d8918b6a
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0x5b5400a4346b7e0e7202ee94ca4ed8d3
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 7 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3
[peap] eaptls_process returned 3
[peap] EAPTLS_SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 120 to 10.65.100.50 port 32791
EAP-Message = 0x0108002b19001703010020d03ba37e6bc5dc557a376c4246f8bfb50b2935ca258dc4465681962b70fbdab9
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x146fb04e1267a9438ffe5de6d8918b6a
Finished request 6.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=121, length=234
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x0208005019001703010020af51d2ad8a6ac5ff4fa0048ed9253a4294d39d383830b7d8b3e1b814663ae0961703010020430e06a7415f46e9821ed0e29e0328ab48ef25cb6289f9519f9b5c4459f315e4
State = 0x146fb04e1267a9438ffe5de6d8918b6a
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0x8c67d38f63d1f87ea0286ab5cc57c3f8
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 8 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] Identity - testuser
[peap] Got tunneled request
EAP-Message = 0x02080008016b6d61
server {
PEAP: Got tunneled identity of testuser
PEAP: Setting default EAP type for tunneled EAP session.
PEAP: Setting User-Name to testuser
Sending tunneled request
EAP-Message = 0x02080008016b6d61
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "testuser"
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 8 length 8
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry testuser at line 93
[files] expand: Hello, %{User-Name} -> Hello, testuser
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
Reply-Message = "Hello, testuser"
EAP-Message = 0x0109001d1a010900181010505b40b65f8da5df3e631fa0eddfaa6b6d61
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd0ad1ff3d0a4052dc28d5a3bf8e55c14
[peap] Got tunneled reply RADIUS code 11
Reply-Message = "Hello, testuser"
EAP-Message = 0x0109001d1a010900181010505b40b65f8da5df3e631fa0eddfaa6b6d61
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd0ad1ff3d0a4052dc28d5a3bf8e55c14
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 121 to 10.65.100.50 port 32791
EAP-Message = 0x0109003b1900170301003013ae0544bc2cad43f20a2c91c4e0d9f68649b56f6af2b9ada9f6e37eb55a583b28c6a2f34bc41be16b06d8855d5c0765
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x146fb04e1366a9438ffe5de6d8918b6a
Finished request 7.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=122, length=282
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x0209008019001703010020dfafddfd32b180bd41f6b94d1c0c6dab4fe9fad5d6214881e8759ba5d3d37fb917030100509fbe1fffed1077a519daef3be5ef5ba8a26cabe56ee1560fe3b76ed8be9f3d5951dd23d9a78db5db5da7cbdadaafc15e2eff1461c94907a55636a338b1730b61330af0be4b26c2165f66caa527f2aa3d
State = 0x146fb04e1366a9438ffe5de6d8918b6a
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0x209d97fd5ee96f0bd3349fae536184e7
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 9 length 128
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunneled request
EAP-Message = 0x0209003e1a0209003931d9d8b102ce83de433f276c5661497f430000000000000000058ea3e6714d16d2e41c1e0427a10d61e590046982f3a3e9006b6d61
server {
PEAP: Setting User-Name to testuser
Sending tunneled request
EAP-Message = 0x0209003e1a0209003931d9d8b102ce83de433f276c5661497f430000000000000000058ea3e6714d16d2e41c1e0427a10d61e590046982f3a3e9006b6d61
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "testuser"
State = 0xd0ad1ff3d0a4052dc28d5a3bf8e55c14
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 9 length 62
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry testuser at line 93
[files] expand: Hello, %{User-Name} -> Hello, testuser
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] +- entering group MS-CHAP {...}
[mschap] Told to do MS-CHAPv2 for testuser with NT-Password
[mschap] adding MS-CHAPv2 MPPE keys
++[mschap] returns ok
MSCHAP Success
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
Reply-Message = "Hello, testuser"
EAP-Message = 0x010a00331a0309002e533d35413831414632463839313838374237313232343234423138353036364233353839384135453032
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd0ad1ff3d1a7052dc28d5a3bf8e55c14
[peap] Got tunneled reply RADIUS code 11
Reply-Message = "Hello, testuser"
EAP-Message = 0x010a00331a0309002e533d35413831414632463839313838374237313232343234423138353036364233353839384135453032
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd0ad1ff3d1a7052dc28d5a3bf8e55c14
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 122 to 10.65.100.50 port 32791
EAP-Message = 0x010a005b19001703010050ab1aaba3a5cc5d5f59306fc52cecd149035314cf6d8314ca557ea3ecbb779c1534e74bab56d83af7d409691bcc58dc9faf420609db996026e48a28adcb10273702bc4cf06aa6a233a245b546f86d31e8
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x146fb04e1c65a9438ffe5de6d8918b6a
Finished request 8.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=123, length=234
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x020a005019001703010020d0614fa7b8ff8083b8d61774ddd773b933ed30cb41288bcf98e440a8645e22481703010020e8ebccaf018fb150c034423d895981e1d63b153bf0cf10c861213329bbd0c27c
State = 0x146fb04e1c65a9438ffe5de6d8918b6a
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0x9643c28111cc622d3251820415ba9354
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 10 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunneled request
EAP-Message = 0x020a00061a03
server {
PEAP: Setting User-Name to testuser
Sending tunneled request
EAP-Message = 0x020a00061a03
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "testuser"
State = 0xd0ad1ff3d1a7052dc28d5a3bf8e55c14
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 10 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry testuser at line 93
[files] expand: Hello, %{User-Name} -> Hello, testuser
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[eap] Freeing handler
++[eap] returns ok
} # server inner-tunnel
[peap] Got tunneled reply code 2
Reply-Message = "Hello, testuser"
EAP-Message = 0x030a0004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "testuser"
[peap] Got tunneled reply RADIUS code 2
Reply-Message = "Hello, testuser"
EAP-Message = 0x030a0004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "testuser"
[peap] Tunneled authentication was successful.
[peap] SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 123 to 10.65.100.50 port 32791
EAP-Message = 0x010b002b19001703010020a8df9ff0b3e5e9a331325791d8583c2795bb421537785af150ff1b0fdca12287
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x146fb04e1d64a9438ffe5de6d8918b6a
Finished request 9.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 10.65.100.50 port 32791, id=124, length=234
User-Name = "testuser"
NAS-IP-Address = 10.65.100.50
NAS-Identifier = "other"
NAS-Port = 1
NAS-Port-Type = Wireless-802.11
Calling-Station-Id = "0022FB1D434E"
Called-Station-Id = "001B2F249FE0"
Service-Type = Login-User
Framed-MTU = 1100
EAP-Message = 0x020b005019001703010020d5209467556655064d523534a66fa7c13c2fc859320517c17d261e216ac9b79d170301002091f579c57bca10d4cdbc96d51162ae6d02f5a6d09583783ab48fa531ef454bea
State = 0x146fb04e1d64a9438ffe5de6d8918b6a
Aruba-Essid-Name = "wifix"
Aruba-Location-Id = "1.1.1"
Message-Authenticator = 0x907e9f43252bb1d42864f0d89673bcf9
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "testuser", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 11 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] Received EAP-TLV response.
[peap] Success
[eap] Freeing handler
++[eap] returns ok
+- entering group post-auth {...}
++[exec] returns noop
Sending Access-Accept of id 124 to 10.65.100.50 port 32791
MS-MPPE-Recv-Key = 0x8707580784ad40615e2a1374d89d53c30341db4e93477116cf340714bdd8640f
MS-MPPE-Send-Key = 0xf96a66741663540faac3b50720bfc29ee58b10d8cfc7469a644c502026bf6041
EAP-Message = 0x030b0004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "testuser"
Finished request 10.
Going to the next request
Waking up in 4.6 seconds.
Cleaning up request 0 ID 114 with timestamp +5
Cleaning up request 1 ID 115 with timestamp +5
Waking up in 0.1 seconds.
Cleaning up request 2 ID 116 with timestamp +5
Cleaning up request 3 ID 117 with timestamp +5
Cleaning up request 4 ID 118 with timestamp +5
Cleaning up request 5 ID 119 with timestamp +5
Cleaning up request 6 ID 120 with timestamp +5
Cleaning up request 7 ID 121 with timestamp +5
Cleaning up request 8 ID 122 with timestamp +5
Cleaning up request 9 ID 123 with timestamp +5
Cleaning up request 10 ID 124 with timestamp +5
Ready to process requests.
-------- Original-Nachricht --------
> Datum: Thu, 16 Sep 2010 14:07:28 +0200
> Von: Alan DeKok <aland at deployingradius.com>
> An: FreeRadius users mailing list <freeradius-users at lists.freeradius.org>
> Betreff: Re: need help - force EAP-TTLS to validate the server certificate
> Klaus Laus wrote:
> > I did this, but the clients can login furthermore without any client
> certificate for example with PEAP or EAP-TTLS. Here is my users file:
>
> <sigh> Is it that hard to show the debug output?
>
> > Here's the eap.conf file
>
> Neither the documentation or messages on this list ask for the EAP
> configuration.
>
> > Any idea's what is wrong here? Thanks
>
> If you're not going to post the debug output, we have no idea what's
> wrong.
>
> Alan DeKok.
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/users.html
--
GMX DSL SOMMER-SPECIAL: Surf & Phone Flat 16.000 für nur 19,99 Euro/mtl.!*
http://portal.gmx.net/de/go/dsl
More information about the Freeradius-Users
mailing list