Communigate with PEAP-MSCHAPv2

Rosario Lumia eryter at gmail.com
Thu Sep 29 17:10:45 CEST 2011


Sorry for my troubling, but I've onother problem.
Tryng to configure TTLS/PAP I recognized that mail-server never answer.
So I decided to use the inner-tunnel virtual server. But now it doesn't
work. In mail-server log nothing appear and it seems to finish the request
between the default server and inner-tunnel.
I post my debug result

FreeRADIUS Version 2.1.8, for host x86_64-pc-linux-gnu, built on Jan  5 2010
at 02:56:18
Copyright (C) 1999-2009 The FreeRADIUS server project and contributors.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License v2.
Starting - reading configuration files ...
including configuration file /etc/freeradius/radiusd.conf
including configuration file /etc/freeradius/proxy.conf
including configuration file /etc/freeradius/clients.conf
including files in directory /etc/freeradius/modules/
including configuration file /etc/freeradius/modules/perl
including configuration file /etc/freeradius/modules/ldap
including configuration file /etc/freeradius/modules/ntlm_auth
including configuration file /etc/freeradius/modules/krb5
including configuration file /etc/freeradius/modules/wimax
including configuration file /etc/freeradius/modules/detail.example.com
including configuration file /etc/freeradius/modules/realm
including configuration file /etc/freeradius/modules/echo
including configuration file /etc/freeradius/modules/exec
including configuration file /etc/freeradius/modules/digest
including configuration file /etc/freeradius/modules/etc_group
including configuration file /etc/freeradius/modules/unix
including configuration file /etc/freeradius/modules/counter
including configuration file /etc/freeradius/modules/attr_rewrite
including configuration file /etc/freeradius/modules/smbpasswd
including configuration file /etc/freeradius/modules/logintime
including configuration file /etc/freeradius/modules/mschap
including configuration file /etc/freeradius/modules/mac2vlan
including configuration file /etc/freeradius/modules/chap
including configuration file /etc/freeradius/modules/inner-eap
including configuration file /etc/freeradius/modules/cui
including configuration file /etc/freeradius/modules/expiration
including configuration file /etc/freeradius/modules/passwd
including configuration file /etc/freeradius/modules/always
including configuration file /etc/freeradius/modules/expr
including configuration file /etc/freeradius/modules/checkval
including configuration file /etc/freeradius/modules/mac2ip
including configuration file /etc/freeradius/modules/ippool
including configuration file /etc/freeradius/modules/policy
including configuration file /etc/freeradius/modules/sradutmp
including configuration file /etc/freeradius/modules/attr_filter
including configuration file /etc/freeradius/modules/radutmp
including configuration file /etc/freeradius/modules/acct_unique
including configuration file /etc/freeradius/modules/detail.log
including configuration file /etc/freeradius/modules/preprocess
including configuration file /etc/freeradius/modules/pap
including configuration file /etc/freeradius/modules/linelog
including configuration file /etc/freeradius/modules/files
including configuration file /etc/freeradius/modules/sql_log
including configuration file /etc/freeradius/modules/pam
including configuration file
/etc/freeradius/modules/sqlcounter_expire_on_login
including configuration file /etc/freeradius/modules/otp
including configuration file /etc/freeradius/modules/detail
including configuration file /etc/freeradius/modules/smsotp
including configuration file /etc/freeradius/eap.conf
including configuration file /etc/freeradius/policy.conf
including files in directory /etc/freeradius/sites-enabled/
including configuration file /etc/freeradius/sites-enabled/default
including configuration file /etc/freeradius/sites-enabled/inner-tunnel
main {
    user = "freerad"
    group = "freerad"
    allow_core_dumps = no
}
including dictionary file /etc/freeradius/dictionary
main {
    prefix = "/usr"
    localstatedir = "/var"
    logdir = "/var/log/freeradius"
    libdir = "/usr/lib/freeradius"
    radacctdir = "/var/log/freeradius/radacct"
    hostname_lookups = no
    max_request_time = 30
    cleanup_delay = 5
    max_requests = 1024
    pidfile = "/var/run/freeradius/freeradius.pid"
    checkrad = "/usr/sbin/checkrad"
    debug_level = 0
    proxy_requests = yes
 log {
    stripped_names = no
    auth = yes
    auth_badpass = no
    auth_goodpass = no
 }
 security {
    max_attributes = 200
    reject_delay = 1
    status_server = yes
 }
}
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
    retry_delay = 5
    retry_count = 3
    default_fallback = no
    dead_time = 120
    wake_all_if_all_dead = no
 }
 home_server localhost {
    ipaddr = 127.0.0.1
    port = 1812
    type = "auth"
    secret = "testing123"
    response_window = 20
    max_outstanding = 65536
    require_message_authenticator = no
    zombie_period = 40
    status_check = "status-server"
    ping_interval = 30
    check_interval = 30
    num_answers_to_alive = 3
    num_pings_to_alive = 3
    revive_interval = 120
    status_check_timeout = 4
    irt = 2
    mrt = 16
    mrc = 5
    mrd = 30
 }
 home_server_pool my_auth_failover {
    type = fail-over
    home_server = localhost
 }
 realm example.com {
    auth_pool = my_auth_failover
 }
 realm LOCAL {
 }
 realm mail.sns.it.veramente {
    authhost = mail.sns.it:1812
    secret = ceicr4d
 }
 realm mail.sns.it {
    authhost = LOCAL
    accthost = LOCAL
 }
 realm win.sns.it {
    authhost = terra.sns.it:1812
    secret = radiogaga
 }
radiusd: #### Loading Clients ####
 client localhost {
    ipaddr = 127.0.0.1
    require_message_authenticator = no
    secret = "testing123"
    nastype = "other"
 }
 client test {
    ipaddr = 0.0.0.0
    netmask = 0
    require_message_authenticator = no
    secret = "pulcinella"
 }
radiusd: #### Instantiating modules ####
 instantiate {
 Module: Linked to module rlm_exec
 Module: Instantiating exec
  exec {
    wait = no
    input_pairs = "request"
    shell_escape = yes
  }
 Module: Linked to module rlm_expr
 Module: Instantiating expr
 Module: Linked to module rlm_expiration
 Module: Instantiating expiration
  expiration {
    reply-message = "Password Has Expired  "
  }
 Module: Linked to module rlm_logintime
 Module: Instantiating logintime
  logintime {
    reply-message = "You are calling outside your allowed timespan  "
    minimum-timeout = 60
  }
 }
radiusd: #### Loading Virtual Servers ####
server inner-tunnel {
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_pap
 Module: Instantiating pap
  pap {
    encryption_scheme = "auto"
    auto_header = yes
  }
 Module: Linked to module rlm_mschap
 Module: Instantiating mschap
  mschap {
    use_mppe = yes
    require_encryption = no
    require_strong = no
    with_ntdomain_hack = no
  }
 Module: Linked to module rlm_eap
 Module: Instantiating eap
  eap {
    default_eap_type = "peap"
    timer_expire = 60
    ignore_unknown_eap_types = no
    cisco_accounting_username_bug = no
    max_sessions = 4096
  }
 Module: Linked to sub-module rlm_eap_md5
 Module: Instantiating eap-md5
 Module: Linked to sub-module rlm_eap_gtc
 Module: Instantiating eap-gtc
   gtc {
    challenge = "Password: "
    auth_type = "PAP"
   }
 Module: Linked to sub-module rlm_eap_tls
 Module: Instantiating eap-tls
   tls {
    rsa_key_exchange = no
    dh_key_exchange = yes
    rsa_key_length = 512
    dh_key_length = 512
    verify_depth = 0
    pem_file_type = yes
    private_key_file = "/etc/freeradius/certs/server.key"
    certificate_file = "/etc/freeradius/certs/server.pem"
    CA_file = "/etc/freeradius/certs/ca.pem"
    private_key_password = "whatever"
    dh_file = "/etc/freeradius/certs/dh"
    random_file = "/etc/freeradius/certs/random"
    fragment_size = 1024
    include_length = yes
    check_crl = no
    cipher_list = "DEFAULT"
    cache {
    enable = no
    lifetime = 24
    max_entries = 255
    }
   }
 Module: Linked to sub-module rlm_eap_ttls
 Module: Instantiating eap-ttls
   ttls {
    default_eap_type = "gtc"
    copy_request_to_tunnel = yes
    use_tunneled_reply = no
    virtual_server = "inner-tunnel"
    include_length = yes
   }
 Module: Linked to sub-module rlm_eap_peap
 Module: Instantiating eap-peap
   peap {
    default_eap_type = "mschapv2"
    copy_request_to_tunnel = no
    use_tunneled_reply = no
    proxy_tunneled_request_as_eap = yes
    virtual_server = "inner-tunnel"
   }
 Module: Linked to sub-module rlm_eap_mschapv2
 Module: Instantiating eap-mschapv2
   mschapv2 {
    with_ntdomain_hack = no
   }
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_preprocess
 Module: Instantiating preprocess
  preprocess {
    huntgroups = "/etc/freeradius/huntgroups"
    hints = "/etc/freeradius/hints"
    with_ascend_hack = no
    ascend_channels_per_line = 23
    with_ntdomain_hack = no
    with_specialix_jetstream_hack = no
    with_cisco_vsa_hack = no
    with_alvarion_vsa_hack = no
  }
 Module: Linked to module rlm_realm
 Module: Instantiating suffix
  realm suffix {
    format = "suffix"
    delimiter = "@"
    ignore_default = no
    ignore_null = no
  }
 Module: Instantiating ntdomain
  realm ntdomain {
    format = "prefix"
    delimiter = "\"
    ignore_default = no
    ignore_null = no
  }
 Module: Linked to module rlm_files
 Module: Instantiating files
  files {
    usersfile = "/etc/freeradius/users"
    acctusersfile = "/etc/freeradius/acct_users"
    preproxy_usersfile = "/etc/freeradius/preproxy_users"
    compat = "no"
  }
 Module: Checking session {...} for more modules to load
 Module: Linked to module rlm_radutmp
 Module: Instantiating radutmp
  radutmp {
    filename = "/var/log/freeradius/radutmp"
    username = "%{User-Name}"
    case_sensitive = yes
    check_with_nas = yes
    perm = 384
    callerid = yes
  }
 Module: Checking pre-proxy {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 Module: Linked to module rlm_attr_filter
 Module: Instantiating attr_filter.access_reject
  attr_filter attr_filter.access_reject {
    attrsfile = "/etc/freeradius/attrs.access_reject"
    key = "%{User-Name}"
  }
 } # modules
} # server
server {
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_detail
 Module: Instantiating auth_log
  detail auth_log {
    detailfile =
"/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d"
    header = "%t"
    detailperm = 384
    dirperm = 493
    locking = no
    log_packet_header = no
  }
 Module: Checking preacct {...} for more modules to load
 Module: Linked to module rlm_acct_unique
 Module: Instantiating acct_unique
  acct_unique {
    key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address,
NAS-Port"
  }
 Module: Checking accounting {...} for more modules to load
 Module: Instantiating detail
  detail {
    detailfile =
"/var/log/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
    header = "%t"
    detailperm = 384
    dirperm = 493
    locking = no
    log_packet_header = no
  }
 Module: Instantiating attr_filter.accounting_response
  attr_filter attr_filter.accounting_response {
    attrsfile = "/etc/freeradius/attrs.accounting_response"
    key = "%{User-Name}"
  }
 Module: Checking session {...} for more modules to load
 Module: Checking pre-proxy {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 } # modules
} # server
radiusd: #### Opening IP addresses and Ports ####
listen {
    type = "auth"
    ipaddr = *
    port = 0
}
listen {
    type = "acct"
    ipaddr = *
    port = 0
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on proxy address * port 1814
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.71.131 port 2048, id=0,
length=163
    User-Name = "rosario.lumia at mail.sns.it"
    NAS-IP-Address = 192.168.71.131
    Called-Station-Id = "00236929d1a4"
    Calling-Station-Id = "e8e5d6d76775"
    NAS-Identifier = "00236929d1a4"
    NAS-Port = 5
    Framed-MTU = 1400
    NAS-Port-Type = Wireless-802.11
    EAP-Message =
0x0200001e01726f736172696f2e6c756d6961406d61696c2e736e732e6974
    Message-Authenticator = 0xa28e6d5c5d2d079cf2c6d7d1f31689f3
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log]     expand:
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands
to /var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]     expand: %t -> Thu Sep 29 16:59:46 2011
++[auth_log] returns ok
++[mschap] returns noop
[suffix] Looking up realm "mail.sns.it" for User-Name = "
rosario.lumia at mail.sns.it"
[suffix] Found realm "mail.sns.it"
[suffix] Adding Stripped-User-Name = "rosario.lumia"
[suffix] Adding Realm = "mail.sns.it"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[ntdomain] Request already proxied.  Ignoring.
++[ntdomain] returns ok
[eap] EAP packet type response id 0 length 30
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 0 to 192.168.71.131 port 2048
    EAP-Message = 0x010100061920
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xe51369fae51270f2c7cd054d635575da
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.71.131 port 2048, id=0,
length=157
Cleaning up request 0 ID 0 with timestamp +6
    User-Name = "rosario.lumia at mail.sns.it"
    NAS-IP-Address = 192.168.71.131
    Called-Station-Id = "00236929d1a4"
    Calling-Station-Id = "e8e5d6d76775"
    NAS-Identifier = "00236929d1a4"
    NAS-Port = 5
    Framed-MTU = 1400
    State = 0xe51369fae51270f2c7cd054d635575da
    NAS-Port-Type = Wireless-802.11
    EAP-Message = 0x020100060315
    Message-Authenticator = 0xd238a80e8299ea9bdb76edf803b76b48
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log]     expand:
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands
to /var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]     expand: %t -> Thu Sep 29 16:59:46 2011
++[auth_log] returns ok
++[mschap] returns noop
[suffix] Looking up realm "mail.sns.it" for User-Name = "
rosario.lumia at mail.sns.it"
[suffix] Found realm "mail.sns.it"
[suffix] Adding Stripped-User-Name = "rosario.lumia"
[suffix] Adding Realm = "mail.sns.it"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[ntdomain] Request already proxied.  Ignoring.
++[ntdomain] returns ok
[eap] EAP packet type response id 1 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP NAK
[eap] EAP-NAK asked for EAP-Type/ttls
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 0 to 192.168.71.131 port 2048
    EAP-Message = 0x010200061520
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xe51369fae4117cf2c7cd054d635575da
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.71.131 port 2048, id=0,
length=251
Cleaning up request 1 ID 0 with timestamp +6
    User-Name = "rosario.lumia at mail.sns.it"
    NAS-IP-Address = 192.168.71.131
    Called-Station-Id = "00236929d1a4"
    Calling-Station-Id = "e8e5d6d76775"
    NAS-Identifier = "00236929d1a4"
    NAS-Port = 5
    Framed-MTU = 1400
    State = 0xe51369fae4117cf2c7cd054d635575da
    NAS-Port-Type = Wireless-802.11
    EAP-Message =
0x02020064150016030100590100005503014e8487e2988c25274a1bc1de221099f0624160941a9a0fe94d067552d6cb2e6d00002800390038003500160013000a00330032002f000500040015001200090014001100080006000300ff0100000400230000
    Message-Authenticator = 0x872fd87b9024f7b4128b1e62b672f4f5
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log]     expand:
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands
to /var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]     expand: %t -> Thu Sep 29 16:59:46 2011
++[auth_log] returns ok
++[mschap] returns noop
[suffix] Looking up realm "mail.sns.it" for User-Name = "
rosario.lumia at mail.sns.it"
[suffix] Found realm "mail.sns.it"
[suffix] Adding Stripped-User-Name = "rosario.lumia"
[suffix] Adding Realm = "mail.sns.it"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[ntdomain] Request already proxied.  Ignoring.
++[ntdomain] returns ok
[eap] EAP packet type response id 2 length 100
[eap] Continuing tunnel setup.
++[eap] returns ok
++[files] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/ttls
[eap] processing type ttls
[ttls] Authenticate
[ttls] processing EAP-TLS
[ttls] eaptls_verify returned 7
[ttls] Done initial handshake
[ttls]     (other): before/accept initialization
[ttls]     TLS_accept: before/accept initialization
[ttls] <<< TLS 1.0 Handshake [length 0059], ClientHello
[ttls]     TLS_accept: SSLv3 read client hello A
[ttls] >>> TLS 1.0 Handshake [length 0035], ServerHello
[ttls]     TLS_accept: SSLv3 write server hello A
[ttls] >>> TLS 1.0 Handshake [length 01b7], Certificate
[ttls]     TLS_accept: SSLv3 write certificate A
[ttls] >>> TLS 1.0 Handshake [length 018d], ServerKeyExchange
[ttls]     TLS_accept: SSLv3 write key exchange A
[ttls] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
[ttls]     TLS_accept: SSLv3 write server done A
[ttls]     TLS_accept: SSLv3 flush data
[ttls]     TLS_accept: Need to read more data: SSLv3 read client certificate
A
In SSL Handshake Phase
In SSL Accept mode
[ttls] eaptls_process returned 13
++[eap] returns handled
Sending Access-Challenge of id 0 to 192.168.71.131 port 2048
    EAP-Message =
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
    EAP-Message =
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
    EAP-Message =
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
    EAP-Message =
0xe6d58089d5b25805fb11b0b7e0978717403b5627a00aa259080080a11896b899538a71059501cf9747befc5c092bc58937164d6e19ac5aa78eb1c0bc423f34e39cce650a468cc169fa832da992c8e7646f1e2e17b6bd77003749bfaee9586cb9ff9fd3244a4db7616abf7ace93229ce9a46d897258d966a00105201d2e8e24f3bf70bca793b2bb76220f02a163fba4913e801038accd3f50b6ed1c16030100040e000000
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xe51369fae7107cf2c7cd054d635575da
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.71.131 port 2048, id=0,
length=355
Cleaning up request 2 ID 0 with timestamp +6
    User-Name = "rosario.lumia at mail.sns.it"
    NAS-IP-Address = 192.168.71.131
    Called-Station-Id = "00236929d1a4"
    Calling-Station-Id = "e8e5d6d76775"
    NAS-Identifier = "00236929d1a4"
    NAS-Port = 5
    Framed-MTU = 1400
    State = 0xe51369fae7107cf2c7cd054d635575da
    NAS-Port-Type = Wireless-802.11
    EAP-Message =
0x020300cc1500160301008610000082008005fbca613e633559df8a1e1d77ad6cd15b380ec0cea371252f318b34634c0b3a3ccde0115ad89a5736d9a4173259b31a7824bb48f66ff67f7ab89b89691f8400daea475c7d17134f2f1a39cbb1ba3c4b7999e15f973578d363dc47a57efcb3914689c482c2c2aab08bfcb3895fd3e4729e1b21070e90e8bbbacaff6803d2f75c14030100010116030100304ea1c2ba7d47308aa0553e0db129572566f60220b05fb9d6337537862cf32e1c58bea3e1fd2b7044b3e7001c7a9d0329
    Message-Authenticator = 0xe862d8ad8c3ce1d1cddb86724cc5043c
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log]     expand:
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands
to /var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]     expand: %t -> Thu Sep 29 16:59:47 2011
++[auth_log] returns ok
++[mschap] returns noop
[suffix] Looking up realm "mail.sns.it" for User-Name = "
rosario.lumia at mail.sns.it"
[suffix] Found realm "mail.sns.it"
[suffix] Adding Stripped-User-Name = "rosario.lumia"
[suffix] Adding Realm = "mail.sns.it"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[ntdomain] Request already proxied.  Ignoring.
++[ntdomain] returns ok
[eap] EAP packet type response id 3 length 204
[eap] Continuing tunnel setup.
++[eap] returns ok
++[files] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/ttls
[eap] processing type ttls
[ttls] Authenticate
[ttls] processing EAP-TLS
[ttls] eaptls_verify returned 7
[ttls] Done initial handshake
[ttls] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
[ttls]     TLS_accept: SSLv3 read client key exchange A
[ttls] <<< TLS 1.0 ChangeCipherSpec [length 0001]
[ttls] <<< TLS 1.0 Handshake [length 0010], Finished
[ttls]     TLS_accept: SSLv3 read finished A
[ttls] >>> TLS 1.0 Handshake [length 00aa]???
[ttls]     TLS_accept: SSLv3 write session ticket A
[ttls] >>> TLS 1.0 ChangeCipherSpec [length 0001]
[ttls]     TLS_accept: SSLv3 write change cipher spec A
[ttls] >>> TLS 1.0 Handshake [length 0010], Finished
[ttls]     TLS_accept: SSLv3 write finished A
[ttls]     TLS_accept: SSLv3 flush data
[ttls]     (other): SSL negotiation finished successfully
SSL Connection Established
[ttls] eaptls_process returned 13
++[eap] returns handled
Sending Access-Challenge of id 0 to 192.168.71.131 port 2048
    EAP-Message =
0x010400f41580000000ea16030100aa040000a60000000000a0b54c160dbeb6d6b573cae559688e362680b08e0780e392e5bbf6f1e7535a64a3f918ea1395f3c6a0d10d5586b2f65e185321b2c3824e3b79acef72195e08395adc7378fb6dab6f4c18ffd087c3428c93293636921093be991c34d5087f0a41c7baae923d6320b4adbe08249e0f3411d988dfae10f2779fd4fa5badb41b42e5f7f682ce07bd425fabcac9ab9f456dd9c6f5af94cfb96a4ed08b0cd2ab7db681311403010001011603010030d1dbcdb8f02f883e76db6b80d67a42f09240bd7f21181b0512cbf3bdd1c2b9dd927d2d4e0caad44167bac645327e96a5
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xe51369fae6177cf2c7cd054d635575da
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.71.131 port 2048, id=0,
length=263
Cleaning up request 3 ID 0 with timestamp +7
    User-Name = "rosario.lumia at mail.sns.it"
    NAS-IP-Address = 192.168.71.131
    Called-Station-Id = "00236929d1a4"
    Calling-Station-Id = "e8e5d6d76775"
    NAS-Identifier = "00236929d1a4"
    NAS-Port = 5
    Framed-MTU = 1400
    State = 0xe51369fae6177cf2c7cd054d635575da
    NAS-Port-Type = Wireless-802.11
    EAP-Message =
0x0204007015001703010020429a9ca197b7ec7926c04f195740142973cae7049eeb833083603c36365d5c7f1703010040bd6f54d5d70eb67c4f4f2ed1b4d736d5d5b1ef436724004a5949cf0dfde273654fdddb306cf5518ca1b7bc98f1b986639c9bcb8a0ff005145b76cc0e22409e25
    Message-Authenticator = 0x9eb61bd2ebe12ff635525eb37e865dfd
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log]     expand:
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands
to /var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]     expand: %t -> Thu Sep 29 16:59:47 2011
++[auth_log] returns ok
++[mschap] returns noop
[suffix] Looking up realm "mail.sns.it" for User-Name = "
rosario.lumia at mail.sns.it"
[suffix] Found realm "mail.sns.it"
[suffix] Adding Stripped-User-Name = "rosario.lumia"
[suffix] Adding Realm = "mail.sns.it"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[ntdomain] Request already proxied.  Ignoring.
++[ntdomain] returns ok
[eap] EAP packet type response id 4 length 112
[eap] Continuing tunnel setup.
++[eap] returns ok
++[files] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/ttls
[eap] processing type ttls
[ttls] Authenticate
[ttls] processing EAP-TLS
[ttls] eaptls_verify returned 7
[ttls] Done initial handshake
[ttls] eaptls_process returned 7
[ttls] Session established.  Proceeding to decode tunneled attributes.
[ttls] Got tunneled request
    EAP-Message =
0x0200001e01726f736172696f2e6c756d6961406d61696c2e736e732e6974
    FreeRADIUS-Proxied-To = 127.0.0.1
[ttls] Got tunneled identity of rosario.lumia at mail.sns.it
[ttls] Setting default EAP type for tunneled EAP session.
[ttls] Sending tunneled request
    EAP-Message =
0x0200001e01726f736172696f2e6c756d6961406d61696c2e736e732e6974
    FreeRADIUS-Proxied-To = 127.0.0.1
    User-Name = "rosario.lumia at mail.sns.it"
    NAS-IP-Address = 192.168.71.131
    Called-Station-Id = "00236929d1a4"
    Calling-Station-Id = "e8e5d6d76775"
    NAS-Identifier = "00236929d1a4"
    NAS-Port = 5
    Framed-MTU = 1400
    NAS-Port-Type = Wireless-802.11
server inner-tunnel {
+- entering group authorize {...}
++[preprocess] returns ok
++[mschap] returns noop
[suffix] Looking up realm "mail.sns.it" for User-Name = "
rosario.lumia at mail.sns.it"
[suffix] Found realm "mail.sns.it"
[suffix] Adding Stripped-User-Name = "rosario.lumia"
[suffix] Adding Realm = "mail.sns.it"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[ntdomain] Request already proxied.  Ignoring.
++[ntdomain] returns ok
[eap] EAP packet type response id 0 length 30
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type gtc
++[eap] returns handled
} # server inner-tunnel
[ttls] Got tunneled reply code 11
    EAP-Message = 0x0101000f0650617373776f72643a20
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0x472ae6fa472be05905a4d096c41eca3d
[ttls] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 0 to 192.168.71.131 port 2048
    EAP-Message =
0x0105003f15800000003517030100309c117247421087fd8a2f1bbb3a5918b403c9e58a5ae2c5a735cfbf306e8ef532725a692739029eb5e0c315bcd5c2860f
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xe51369fae1167cf2c7cd054d635575da
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.71.131 port 2048, id=0,
length=247
Cleaning up request 4 ID 0 with timestamp +7
    User-Name = "rosario.lumia at mail.sns.it"
    NAS-IP-Address = 192.168.71.131
    Called-Station-Id = "00236929d1a4"
    Calling-Station-Id = "e8e5d6d76775"
    NAS-Identifier = "00236929d1a4"
    NAS-Port = 5
    Framed-MTU = 1400
    State = 0xe51369fae1167cf2c7cd054d635575da
    NAS-Port-Type = Wireless-802.11
    EAP-Message =
0x020500601500170301002007270f515f19b5891e67c7d5648bc9367310685d853bdd593faad466a4cf28521703010030511534b6f59e6b501d92dc9d0ed410d0aeb61fc824f79a8e2c4ee55436bb2bbaa2de318416e62ac528641e6b308c19a5
    Message-Authenticator = 0xbb1eebe683c100beed175bc58eb3a3a1
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log]     expand:
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]
/var/log/freeradius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands
to /var/log/freeradius/radacct/192.168.71.131/auth-detail-20110929
[auth_log]     expand: %t -> Thu Sep 29 16:59:47 2011
++[auth_log] returns ok
++[mschap] returns noop
[suffix] Looking up realm "mail.sns.it" for User-Name = "
rosario.lumia at mail.sns.it"
[suffix] Found realm "mail.sns.it"
[suffix] Adding Stripped-User-Name = "rosario.lumia"
[suffix] Adding Realm = "mail.sns.it"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[ntdomain] Request already proxied.  Ignoring.
++[ntdomain] returns ok
[eap] EAP packet type response id 5 length 96
[eap] Continuing tunnel setup.
++[eap] returns ok
++[files] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/ttls
[eap] processing type ttls
[ttls] Authenticate
[ttls] processing EAP-TLS
[ttls] eaptls_verify returned 7
[ttls] Done initial handshake
[ttls] eaptls_process returned 7
[ttls] Session established.  Proceeding to decode tunneled attributes.
[ttls] Got tunneled request
    EAP-Message = 0x0201000d063236303631393833
    FreeRADIUS-Proxied-To = 127.0.0.1
[ttls] Sending tunneled request
    EAP-Message = 0x0201000d063236303631393833
    FreeRADIUS-Proxied-To = 127.0.0.1
    User-Name = "rosario.lumia at mail.sns.it"
    State = 0x472ae6fa472be05905a4d096c41eca3d
    NAS-IP-Address = 192.168.71.131
    Called-Station-Id = "00236929d1a4"
    Calling-Station-Id = "e8e5d6d76775"
    NAS-Identifier = "00236929d1a4"
    NAS-Port = 5
    Framed-MTU = 1400
    NAS-Port-Type = Wireless-802.11
server inner-tunnel {
+- entering group authorize {...}
++[preprocess] returns ok
++[mschap] returns noop
[suffix] Looking up realm "mail.sns.it" for User-Name = "
rosario.lumia at mail.sns.it"
[suffix] Found realm "mail.sns.it"
[suffix] Adding Stripped-User-Name = "rosario.lumia"
[suffix] Adding Realm = "mail.sns.it"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[ntdomain] Request already proxied.  Ignoring.
++[ntdomain] returns ok
[eap] EAP packet type response id 1 length 13
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/gtc
[eap] processing type gtc
[gtc] +- entering group PAP {...}
*[pap] login attempt with password "xxxxx"
[pap] No password configured for the user.  Cannot do authentication*
++[pap] returns fail
[eap] Handler failed in EAP/gtc
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Login incorrect: [rosario.lumia at mail.sns.it] (from client test port 5 cli
e8e5d6d76775 via TLS tunnel)
} # server inner-tunnel
[ttls] Got tunneled reply code 3
    EAP-Message = 0x04010004
    Message-Authenticator = 0x00000000000000000000000000000000
[ttls] Got tunneled Access-Reject
[eap] Handler failed in EAP/ttls
rlm_eap_ttls: Freeing handler for user rosario.lumia at mail.sns.it
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Login incorrect: [rosario.lumia at mail.sns.it] (from client test port 5 cli
e8e5d6d76775)
Using Post-Auth-Type Reject
+- entering group REJECT {...}
[attr_filter.access_reject]     expand: %{User-Name} ->
rosario.lumia at mail.sns.it
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 5 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 5
Sending Access-Reject of id 0 to 192.168.71.131 port 2048
    EAP-Message = 0x04050004
    Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 4.9 seconds.


Thanks for any help!

RL


2011/9/28 Arran Cudbard-Bell <a.cudbardb at freeradius.org>

>
> On 28 Sep 2011, at 16:10, Rosario Lumia wrote:
>
>
>
> 2011/9/28 Arran Cudbard-Bell <a.cudbardb at freeradius.org>
>
> Sorry, do you mean I have to store in my mailserver cleartext or Md4
> passoword?
>
>
> I'm saying that in order to do PEAP/MSHCHAPv2 you have to have access to
> the Cleartext-Password or NT-Password, or be able to proxy the MACHAPv2 data
> to something else that has access to to the Cleartext-Password or
> NT-Password attribute (Usually Active Directory).
>
> If the CommuniGate box stores this information or lets you populate this
> information then execute a query to populate control:Cleartext-Password or
> control:NT-Password in the authorize section of the inner-server after the
> call to the EAP module.
>
> The reason why TTLS-PAP is working, is because the server has a cleartext
> version of the password from the PAP tunnel which it can send to the
> CommuniGate box or compare with a value from the CommuniGate box. You can't
> do this with PEAP because the password is not sent in a reversibly encrypted
> format.
>
> The google description for communigate.com mentions RADIUS, I don't have
> time to go digging through the manuals, but you might want to check if it'd
> be possible to proxy RADIUS/EAP authentication to the box, and then just
> make policy decisions with FreeRADIUS.
>
> -Arran
>
> Arran Cudbard-Bell
> a.cudbardb at freeradius.org
>
> Betelwiki, Betelwiki, Betelwiki.... http://wiki.freeradius.org/ !
>
>
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/users.html
>
>


-- 
Rosario L.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20110929/7c97b8fe/attachment.html>


More information about the Freeradius-Users mailing list