Simultaneous EAP-TLS and PEAP-MSCHAPv2 (machine/user authentication)
Ben Humpert
ben at an3k.de
Sat Dec 26 15:55:29 CET 2015
Windows can't do machine authentication and then additionally user
authentication. You can do either do machine OR user auth. It is kind of
annoying.
2015-12-26 15:07 GMT+01:00 Alan DeKok <aland at deployingradius.com>:
> On Dec 25, 2015, at 5:42 AM, Lukas Haase <lukashaase at gmx.at> wrote:
> > However, I found tons of references and howtos where it is stated that
> > (a) installing certificates on the client is optional (b) using a server
> > certificate signed by an official CA is recommended.
>
> The only reason (a) *might* be true is if you believe (b). Which I
> don't.
>
> When you allow a public CA for a particular SSID, it means that *any*
> certificate issued by that CA will be allowed for that SSID.
>
> This isn't what you want.
>
> We recommend using a self-signed CA, because it's more secure. The
> people who recommend using public CAs generally don't know what they're
> talking about.
>
> >> Windows can do machine-level authentication, by automatically
> provisioning the certificates.
> >
> > I cannot find good references to that; do you have a pointer?
>
> It's done via Active Directory. See that documentation.
>
> >> For every other system, there is no "machine auth". There are only
> user accounts, and user credentials.
> >
> > At least I could use a users file containing "machine" accounts with
> > long passwords ... but this is again much more difficult than just
> > deploying a simple certificate file.
>
> Why would you do this in the first place?
>
> You can only authenticate once with 802.1X. Once you're authenticated,
> you're in the network. 802.1X has no concept of "machine" accounts versus
> "people" accounts.
>
> > In that case: Why then sign the client certificate with the server cert
> > at all?
>
> You don't. You sign the client certificate with the CA cert.
>
> >> You can't do both on the same machine in the same account.
> >
> > What do you mean by "same account"?
>
> Why do you think there are multiple accounts? Do you think there are
> multiple 802.1X authentications?
>
> The problem here is that you have certain assumptions about how things
> work. Those assumptions are wrong. I'm trying to correct them, but
> because your assumptions and terminology are wrong, you're not really
> understanding my answers.
>
> > I really can't use anything in parallel with PEAP?
>
> You can't authenticate twice in 802.1X. Once a system is authenticated,
> it's on the network.
>
> i.e. you're asking the wrong questions.
>
> > As mentioned, in this case too many broken howtos and references out
> > there :(
>
> I'm saying what you should do. You can
>
> (a) believe it and follow instructions, and get the systems on the net,
>
> or
>
> (b) ignore what I'm saying, keep with whatever ideas you have, and not
> get anything done.
>
> Pick one.
>
> > Again ... with machine you mean the client or the RADIUS server?
>
> I mean supplicant / laptop / desktop. Once a system is on the net, it's
> on the net.
>
> How do *you* expect to use EAP-TLS and PEAP at the same time, from the
> same machine?
>
> Please explain.
>
> > Per "end user account" I *only* want to use PEAP-MSCHAPv2 (because it is
> > most widely supported) using login/password information looked up via
> > OpenLDAP (this works).
>
> Sure.
>
> > Independently from an "end user account" I would like the authentication
> > to succeed when the client presents a certificate signed by the server,
> > same as it is the case for OpenVPN in PKI mode. I think this can be done
> > with EAP-TLS.
>
> Sure.
>
> But... how do you expect EAP-TLS and PEAP to work together?
>
> Explain. In detail.
>
> > So if FreeRADIUS can't be set up serving EAP-TLS and PEAP-MSCHAPv2 at
> > the same time,
>
> You're not paying attention.
>
> It's not a FreeRADIUS limitation. It's a limitation of the machine
> trying to get on the network, and the network.
>
> > can't it be configured with virtual servers?
> > For example, there is "modules/inner-eap" which contains a separate TLS
> > configuration. I though this is the key to the correct configuration.
>
> It helps to understand the concepts before trying random solutions.
>
> >> It's impossible. You can only have one 802.1X configuration per end
> user account.
> >
> > What I mean: There are tons of deployments in companies supporting which
> > present a username/password prompt when connecting to the network but
> > connect automatically without a prompt when a certain certificate is
> > installed on the system.
>
> Sure. That' s doing *either* PEAP or EAP-TLS. Only one 802.1X
> configuration is active at a time.
>
> > I've seen that. So I assume this is a very
> > common setup which shouldn't be too hard to implement.
>
> Authenticating one machine using EAP-TLS and PEAP at the same time is
> impossible.
>
> FreeRADIUS can authenticate anything. If one machine does EAP-TLS, and
> another does PEAP. That's fine. If one machine does EAP-TLS, logs off of
> the network, and then comes back with PEAP, that's fine.
>
> Please understand what I'm saying. You have some kind of assumption
> about how the network works. Those assumptions are wrong. Because those
> assumptions are wrong, you're asking the wrong questions. And not
> understanding my answers.
>
> It's really quite simple. Configure a system to do:
>
> a) PEAP
>
> or
>
> b) EAP-TLS.
>
> Pick one. It will be able to do 802.1X and get on the network.
>
> Doing some kind of magical "PEAP and EAP-TLS at the same time" is
> impossible. Stop trying to do it. You're wasting everyones time.
>
> Alan DeKok.
>
>
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/users.html
>
More information about the Freeradius-Users
mailing list