FR 3.0.9 RADSEC with TLS 1.2

Stabla, Daniel dstabla at materna.de
Thu Sep 17 12:11:54 CEST 2015


Hello,

we are testing FR 3.0.9 with radsec, but it seems not to work
if our access point uses TLS 1.2.

Environment:
FR 3.0.9 on SLES 12
OpenSSL 1.0.1j (selfcompiled, configured with 
--prefix=/opt/openssl1.0.1j -fPIC shared linux-x86_64)
LANCOM L-1302acn / Firmware 9.10

If we use RADSEC with TLS 1.0/1.1 it works, but with TLS 1.2 we get this 
FR output:

(0) Initiating new EAP-TLS session
(0) Setting verify mode to require certificate from client
(0) (other): before/accept initialization
(0) TLS_accept: before/accept initialization
(0) <<< TLS 1.2  [length 007e]
(0) TLS_accept: SSLv3 read client hello A
(0) >>> TLS 1.2  [length 0059]
(0) TLS_accept: SSLv3 write server hello A
(0) >>> TLS 1.2  [length 18c4]
(0) TLS_accept: SSLv3 write certificate A
(0) >>> TLS 1.2  [length 024d]
(0) TLS_accept: SSLv3 write key exchange A
(0) >>> TLS 1.2  [length 0096]
(0) TLS_accept: SSLv3 write certificate request A
(0) TLS_accept: SSLv3 flush data
(0) TLS_accept: Need to read more data: SSLv3 read client certificate A
(0) TLS_accept: Need to read more data: SSLv3 read client certificate A
(0) In SSL Handshake Phase
(0) In SSL Accept mode
Waking up in 0.5 seconds.
(0) <<< TLS 1.2  [length 0002]
(0) ERROR: TLS Alert read:fatal:handshake failure
(0) ERROR: TLS_accept: Failed in SSLv3 read client certificate A
(0) ERROR: SSL says: error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 
alert handshake failure
(0) ERROR: SSL_read failed inside of TLS (-1), TLS session failed
(0) FAILED in TLS handshake receive
Closing TLS socket from client port 11906
Client has closed connection
  ... shutting down socket auth from client (10.0.0.2, 11906) -> (*, 
2083, virtual-server=radsec-guests)

A debug output from our access point shows us this:


*[RADSEC] 2015/09/17 11:36:29,316  Devicetime: 2015/09/17 11:37:26,575*

*Beginning to establish RADSEC connection to 10.0.0.1:2083[INTRANET]*

*->establishment begins, local port is 11163*

**

*[TLS] 2015/09/17 11:36:29,332  Devicetime: 2015/09/17 11:37:26,577*

*Creating connection 890 with peer 10.0.0.1:2083 for requester 'RB':*

**

*[TLS] 2015/09/17 11:36:29,332  Devicetime: 2015/09/17 11:37:26,577*

*Sending Client Hello on connection 890:*

*-> adding renegotiation_info extension to client hello*

*-> all fine, receive Server Hello*

**

*[TLS] 2015/09/17 11:36:29,332  Devicetime: 2015/09/17 11:37:26,604*

*Receiving Server Hello on connection 890:*

*-> protocol version is TLSv1.2*

*-> server refuses session resumption*

*-> selected cipher suite is TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384*

*-> parsing TLS extensions*

*-> selected elliptic curve point format is uncompressed*

*-> all fine, receive Certificate(s)*

**

*[TLS] 2015/09/17 11:36:29,332  Devicetime: 2015/09/17 11:37:26,605*

*Receiving Certificate(s) on connection 890:*

*-> read certificate of CN=radius.materna.de (2182 bytes)*

*-> read certificate of DC=com, DC=materna, CN=MATERNA Information & 
Communications (Root) (1887 bytes)*

*-> read certificate of DC=com, DC=materna, CN=MATERNA-INFRASTRUCTURE-CA 
(2255 bytes)*

*-> verification succeeded*

*-> all fine, receiving Server Hello Done*

**

*[TLS] 2015/09/17 11:36:29,332  Devicetime: 2015/09/17 11:37:26,614*

*Receiving Server Key Exchange on connection 890:*

*-> selected elliptic curve is secp256r1*

*-> selected signature method is (sha256,rsa)*

*-> signature match*

**

*[TLS] 2015/09/17 11:36:29,332  Devicetime: 2015/09/17 11:37:26,618*

*Receiving Certificate Request on connection 890:*

*-> my own certificate's issuer is DC=com, DC=materna, 
CN=MATERNA-INFRASTRUCTURE-CA*

*-> truncated CA name, exiting*

**

*[TLS] 2015/09/17 11:36:29,332  Devicetime: 2015/09/17 11:37:26,618*

*Preparing records to send on connection 890:*

*-> not in application state, bailing out*

**

*[TLS] 2015/09/17 11:36:29,332  Devicetime: 2015/09/17 11:37:26,618*

*Closing connection 890 (broken packet received):*

*--> application state not reached (ClientRcvServerHelloDone)*

*--> sending failure to requester*

**

*[RADSEC] 2015/09/17 11:36:29,332  Devicetime: 2015/09/17 11:37:26,619*

*RADSEC connection to 10.0.0.1:2083[INTRANET] failed: Handshake failure*

*->marking connection as dead*


So is this a error created through FR or does the access point something 
wrong?

Kind regards.
D. Stabla


More information about the Freeradius-Users mailing list