EAP-TLS and EAP-TTLS/MSCHAPv2 in parralel...possible ?
Ben
ben+freeradius at list-subs.com
Fri Feb 28 22:31:01 CET 2014
> Well.. they shouldn't. And what's with not posting the debug log? Do
you want to fix the problem or not?
This is what it looks like with ldap uncommented, i.e. EAP-TLS "broken"
..... in comparison, lower down you can see with LDAP commented again,
it just gets on with the job of processing EAP-TLS.
*** LDAP UNCOMMENTED*****
rad_recv: Access-Request packet from host 172.16.100.254 port 32771,
id=251, length=188
User-Name = "xyz_laptop_wifi"
NAS-IP-Address = 172.16.100.254
NAS-Identifier = "hello"
NAS-Port = 0
Called-Station-Id = "84-1B-FF-FF-FF-FF:XXXXXXXXXXXXX"
Calling-Station-Id = "60-03-FF-FF-FF-FF"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 0Mbps 802.11b"
EAP-Message = 0xXXXXXXXXX
Message-Authenticator = 0xXXXXXXXXX
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "xyz_laptop_wifi", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 0 length 19
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
[ldap] performing user authorization for xyz_laptop_wifi
[ldap] expand: %{Stripped-User-Name} ->
[ldap] ... expanding second conditional
[ldap] expand: %{User-Name} -> xyz_laptop_wifi
[ldap] expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) ->
(uid=xyz_laptop_wifi)
[ldap] expand: ou=dot1x,dc=mydomain,dc=eu -> ou=dot1x,dc=mydomain,dc=eu
[ldap] ldap_get_conn: Checking Id: 0
[ldap] ldap_get_conn: Got Id: 0
[ldap] attempting LDAP reconnection
[ldap] (re)connect to localhost:389, authentication 0
[ldap] bind as cn=admin,dc=mydomain,dc=eu/XXXXXXXXXXXXXX to localhost:389
[ldap] waiting for bind result ...
[ldap] LDAP login failed: check identity, password settings in ldap
section of radiusd.conf
[ldap] (re)connection attempt failed
[ldap] search failed
[ldap] ldap_release_conn: Release Id: 0
++[ldap] returns fail
Using Post-Auth-Type Reject
# Executing group from file /etc/freeradius/sites-enabled/default
+- entering group REJECT {...}
[attr_filter.access_reject] expand: %{User-Name} -> xyz_laptop_wifi
attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 0 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
rad_recv: Access-Request packet from host 172.16.100.254 port 32771,
id=251, length=188
Waiting to send Access-Reject to client wifi2 port 32771 - ID: 251
Sending delayed reject for request 0
Sending Access-Reject of id 251 to 172.16.100.254 port 32771
Waking up in 4.9 seconds.
Cleaning up request 0 ID 251 with timestamp +7
Ready to process requests.
***** LDAP COMMENTED****
rad_recv: Access-Request packet from host 172.16.100.254 port 32771,
id=252, length=188
User-Name = "xyzlaptop_wifi"
NAS-IP-Address = 172.16.100.254
NAS-Identifier = "hello"
NAS-Port = 0
Called-Station-Id = "84-1B-FF-FF-FF-FF:XXXXXXXX"
Calling-Station-Id = "60-03-FF-FF-FF-FF"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 0Mbps 802.11b"
EAP-Message = 0xXXXX
Message-Authenticator = 0xXXXX
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "xyzlaptop_wifi", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 0 length 19
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user.
Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/freeradius/sites-enabled/default
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Requiring client certificate
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 252 to 172.16.100.254 port 32771
EAP-Message = 0x010100060d20
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x7940879679418a6863a4c65145317568
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.100.254 port 32771,
id=253, length=339
User-Name = "xyzlaptop_wifi"
NAS-IP-Address = 172.16.100.254
NAS-Identifier = "hello"
NAS-Port = 0
Called-Station-Id = "84-1B-FF-FF-FF-FF:XXXXXXXX"
Calling-Station-Id = "60-03-FF-FF-FF-FF"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 0Mbps 802.11b"
EAP-Message = 0xXXXXXX
State = 0x7940879679418a6863a4c65145317568
Message-Authenticator = 0x827b75775f481e9f2b14b64f56443006
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "xyzlaptop_wifi", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 1 length 152
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/freeradius/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/tls
[eap] processing type tls
[tls] Authenticate
[tls] processing EAP-TLS
TLS Length 142
[tls] Length Included
[tls] eaptls_verify returned 11
[tls] (other): before/accept initialization
[tls] TLS_accept: before/accept initialization
[tls] <<< TLS 1.0 Handshake [length 0089], ClientHello
[tls] TLS_accept: SSLv3 read client hello A
[tls] >>> TLS 1.0 Handshake [length 0039], ServerHello
[tls] TLS_accept: SSLv3 write server hello A
[tls] >>> TLS 1.0 Handshake [length 0d03], Certificate
[tls] TLS_accept: SSLv3 write certificate A
[tls] >>> TLS 1.0 Handshake [length 014b], ServerKeyExchange
[tls] TLS_accept: SSLv3 write key exchange A
[tls] >>> TLS 1.0 Handshake [length 00ec], CertificateRequest
[tls] TLS_accept: SSLv3 write certificate request A
[tls] TLS_accept: SSLv3 flush data
[tls] TLS_accept: Need to read more data: SSLv3 read client
certificate A
In SSL Handshake Phase
In SSL Accept mode
[tls] eaptls_process returned 13
++[eap] returns handled
Sending Access-Challenge of id 253 to 172.16.100.254 port 32771
etc. etc. etc.
More information about the Freeradius-Users
mailing list