Proxy EAP-TLS request after successful authorization with eap module
    work vlpl 
    thework.vlpl at gmail.com
       
    Tue Oct 17 20:57:35 CEST 2017
    
    
  
> On 17 October 2017 at 23:14, Alan DeKok <aland at deployingradius.com> wrote:
>
>   That's not what was suggested.  It helps to have some understanding of how the server works.
>
I am sorry for that misunderstanding
By looking on debug log I think eap module must set Auth-Type, and
nothing can be executed after eap module. Is this correct?
If I use this config
authorize {
    eap
    if(ok) {
        debug_all
    } else {
        debug_all
    }
}
there is no debug_all output in log
---not set Auth-Type version of tls_only virtual site---
WARNING: Outer and inner identities are the same.  User privacy is compromised.
(6) server tls_only {
(6)   session-state: No cached attributes
(6)   # Executing section authorize from file
/usr/local/etc/raddb/sites-enabled/tls_only
(6)     authorize {
(6)       update reply {
(6)         &Auth-Type := Accept
(6)       } # update reply = noop
(6)     } # authorize = noop
(6)   ERROR: No Auth-Type found: rejecting the user via Post-Auth-Type = Reject
(6)   Failed to authenticate the user
(6)   Using Post-Auth-Type Reject
(6)   Post-Auth-Type sub-section not found.  Ignoring.
(6) } # server tls_only
(6) Virtual server sending reply
(6)   Auth-Type := Accept
(6) eap_tls: Certificate rejected by the virtual server
(6) eap: ERROR: Failed continuing EAP TLS (13) session.  EAP sub-module failed
(6) eap: Sending EAP Failure (code 4) ID 6 length 4
(6) eap: Failed in EAP select
--set Auth-Type version of tls_only virtual site:-
WARNING: Outer and inner identities are the same.  User privacy is compromised.
(6) server tls_only {
(6)   session-state: No cached attributes
(6)   # Executing section authorize from file
/usr/local/etc/raddb/sites-enabled/tls_only
(6)     authorize {
(6)       update config {
(6)         &Auth-Type := Accept
(6)       } # update config = noop
(6)     } # authorize = noop
(6)   Found Auth-Type = Accept
(6)   Auth-Type = Accept, accepting the user
(6) } # server tls_only
(6) Virtual server sending reply
(6) eap_tls:     caching TLS-Cert-Serial := "f4f7b543fa1eaa80"
(6) eap_tls:     caching TLS-Cert-Expiration := "370806185333Z"
(6) eap_tls:     caching TLS-Cert-Subject := "/CN=CHANGED ca"
(6) eap_tls:     caching TLS-Cert-Issuer := "/CN=CHANGED ca"
(6) eap_tls:     caching TLS-Cert-Common-Name := "CHANGED ca"
(6) eap_tls:     caching TLS-Client-Cert-Serial := "9cd3e44502ae747b"
(6) eap_tls:     caching TLS-Client-Cert-Expiration := "271017150656Z"
(6) eap_tls:     caching TLS-Client-Cert-Subject := "/C=US/L=Some wifi
Wi-Fi/O=example.com/CN=CHANGED"
(6) eap_tls:     caching TLS-Client-Cert-Issuer := "/CN=CHANGED ca"
(6) eap_tls:     caching TLS-Client-Cert-Common-Name := "CHANGED"
(6) eap_tls: Failed to find 'persist_dir' in TLS configuration.
Session will not be cached on disk.
(6) eap: Sending EAP Success (code 3) ID 6 length 4
(6) eap: Freeing handler
tls: Freeing cached session VPs
(6)           [eap] = ok
(6)         } # authenticate = ok
    
    
More information about the Freeradius-Users
mailing list