mschap configuration problem
L.P.H. van Belle
belle at bazuin.nl
Tue Jul 14 15:01:48 CEST 2020
XP.. :-/ ..
Expect more problems...
But for your XP you can try this, if that doesnt work upgrade to W10
https://msfn.org/board/topic/178092-enable-tls-11-and-12-in-windows-xp-correctly/
And for Win7 this.
https://manage.accuwebhosting.com/knowledgebase/3008/How-do-I-enable-TLS-12-on-Windows-7.html
Greetz,
Louis
> -----Oorspronkelijk bericht-----
> Van: Freeradius-Users
> [mailto:freeradius-users-bounces+belle=bazuin.nl at lists.freerad
> ius.org] Namens Piviul
> Verzonden: dinsdag 14 juli 2020 14:54
> Aan: freeradius-users at lists.freeradius.org
> Onderwerp: Re: mschap configuration problem
>
> L.P.H. van Belle via Freeradius-Users ha scritto il 07/07/20
> alle 15:18:
> > Is your AD-DC also a samba server ?
> >
> > Try adding this to smb.conf (globel)
> > # Add for freeradius support
> > ntlm auth = mschapv2-and-ntlmv2-only
> After changing ntlm_auth, as you suggest, on the samba AD the problem
> seems to be solved.
>
> But now I have another problem using the CA certificate. I
> would like to
> use freeradius server to authenticate wifi users on WPA2 enterprise
> security settings using peap authentication.
> If I configure a linux, win xp and win7 clients using the ca
> certificate
> and WPA2 Enterprise auth protocol using PEAP and MSCHAP linux
> seems to
> work but win xp and win7 client didn't. On the winxp logs I can find:
> > (30) Found Auth-Type = eap
> > (30) # Executing group from file
> /etc/freeradius/3.0/sites-enabled/default
> > (30) authenticate {
> > (30) eap: Expiring EAP session with state 0x1cc2a6451cccbf2e
> > (30) eap: Finished EAP session with state 0x1cc2a6451cccbf2e
> > (30) eap: Previous EAP request found for state
> 0x1cc2a6451cccbf2e, released from the list
> > (30) eap: Peer sent packet with method EAP PEAP (25)
> > (30) eap: Calling submodule eap_peap to process data
> > (30) eap_peap: Continuing EAP-TLS
> > (30) eap_peap: Peer indicated complete TLS record size will
> be 77 bytes
> > (30) eap_peap: Got complete TLS record (77 bytes)
> > (30) eap_peap: [eaptls verify] = length included
> > (30) eap_peap: (other): before SSL initialization
> > (30) eap_peap: TLS_accept: before SSL initialization
> > (30) eap_peap: TLS_accept: before SSL initialization
> > (30) eap_peap: <<< recv UNKNOWN TLS VERSION ?0304? [length 0048]
> > (30) eap_peap: >>> send TLS 1.0 Alert [length 0002], fatal
> handshake_failure
> > (30) eap_peap: ERROR: TLS Alert write:fatal:handshake failure
> > tls: TLS_accept: Error in error
> > (30) eap_peap: ERROR: Failed in __FUNCTION__ (SSL_read):
> error:1417A0C1:SSL routines:tls_post_process_client_hello:no
> shared cipher
> > (30) eap_peap: ERROR: System call (I/O) error (-1)
> > (30) eap_peap: ERROR: TLS receive handshake failed during operation
> > (30) eap_peap: ERROR: [eaptls process] = fail
> > (30) eap: ERROR: Failed continuing EAP PEAP (25) session.
> EAP sub-module failed
> > (30) eap: Sending EAP Failure (code 4) ID 14 length 4
> > (30) eap: Failed in EAP select
> > (30) [eap] = invalid
> > (30) } # authenticate = invalid
> > (30) Failed to authenticate the user
> > (30) Using Post-Auth-Type Reject
>
> and on the win7 client:
> > (14) Found Auth-Type = eap
> > (14) # Executing group from file
> /etc/freeradius/3.0/sites-enabled/default
> > (14) authenticate {
> > (14) eap: Expiring EAP session with state 0x211f359d22552ca2
> > (14) eap: Finished EAP session with state 0x211f359d22552ca2
> > (14) eap: Previous EAP request found for state
> 0x211f359d22552ca2, released from the list
> > (14) eap: Peer sent packet with method EAP PEAP (25)
> > (14) eap: Calling submodule eap_peap to process data
> > (14) eap_peap: Continuing EAP-TLS
> > (14) eap_peap: Peer indicated complete TLS record size will
> be 7 bytes
> > (14) eap_peap: Got complete TLS record (7 bytes)
> > (14) eap_peap: [eaptls verify] = length included
> > (14) eap_peap: <<< recv TLS 1.2 [length 0002]
> > (14) eap_peap: ERROR: TLS Alert read:fatal:unknown CA
> > (14) eap_peap: TLS_accept: Need to read more data: error
> > (14) eap_peap: ERROR: Failed in __FUNCTION__ (SSL_read):
> error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca
> > (14) eap_peap: In SSL Handshake Phase
> > (14) eap_peap: In SSL Accept mode
> > (14) eap_peap: SSL Application Data
> > (14) eap_peap: ERROR: TLS failed during operation
> > (14) eap_peap: ERROR: [eaptls process] = fail
> > (14) eap: ERROR: Failed continuing EAP PEAP (25) session.
> EAP sub-module failed
> > (14) eap: Sending EAP Failure (code 4) ID 74 length 4
> > (14) eap: Failed in EAP select
> > (14) [eap] = invalid
> > (14) } # authenticate = invalid
> > (14) Failed to authenticate the user
> > (14) Using Post-Auth-Type Reject
>
> Winxp e win7 client both seems to fail during handshake phase; linux
> didn't. From successfully linux logs I can find:
> > eap_peap: Peer indicated complete TLS record size will be 126
>
> but reading winxp logs I can see:
> > eap_peap: Peer indicated complete TLS record size will be 77 bytes
>
> and win7:
> > eap_peap: Peer indicated complete TLS record size will be 7 bytes
>
>
> 77 or 7 bytes seems to me not to be enought for a TLS record
> size isn't
> it? That's the problem?
>
> Any way can anyone please help me to find why win{xp,7} clients can't
> communicate using EAP-TLS?
>
> Best regards
>
> Piviul
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/users.html
>
More information about the Freeradius-Users
mailing list