Freeradius and unexpected TLS version ->Access-Reject
irina.ilina-sidorova at ulb.ac.be
irina.ilina-sidorova at ulb.ac.be
Mon Feb 24 12:32:28 CET 2020
Thanks Alan!
Yup, I will continue with OpenSSL then
Have a great day!
-------- Original message --------
From: Alan DeKok <aland at deployingradius.com>
Date: Mon, 24 Feb 2020, 12:30
To: FreeRadius users mailing list
<freeradius-users at lists.freeradius.org>
Subject: Re: Freeradius and unexpected TLS version ->Access-Reject
On Feb 24, 2020, at 5:09 AM, iilinasi
<Irina.Ilina-Sidorova at ulb.ac.be> wrote:
> TLS library for 2 packets would be an overkill... I construct
packets in my python script (can share it - but it's really very
ugly at the moment). That's why I can tell you the version I send
exactly - I fill it in as "0x0301", as per specification. Is there
anything I miss?
Well, if you're creating your own TLS implementation, there isn't
much we can do to help.
FreeRADIUS uses OpenSSL for its TLS implementation. We rely on
OpenSSL to do all TLS work, including reporting to us the TLS
version.
> You can see 0x0301 in EAP message part of debug (and TLS 1.3 would
correspond to 0x0304). Again, I understand that wireshark is not the
ultimate source of truth, but it does not complain on anything and
correctly dissects the packet as EAP-TLS 1.0.
Ask the OpenSSL people how they implement TLS.
Further, this really isn't a FreeRADIUS issue. If you're writing
your own TLS implementation (even if it's 2 packets), then you need
to debug your code. Or, debug Wireshark / OpenSSL to see what they
do.
Alan DeKok.
-
List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html
More information about the Freeradius-Users
mailing list