mschap configuration problem
Piviul
piviul at riminilug.it
Wed Jul 15 10:27:19 CEST 2020
Ibrahim AKSIT ha scritto il 14/07/20 alle 21:30:
> Hello dear there all,
> Regarding the Windows TLS issue I have used the tool on
> https://www.nartac.com/Products/IISCrypto/ site and restart it. Everything
> worked like a charm.
> Hope this is going to work for you as well.
> Have a great day.
Thank you very much indeed!
IISCrypto say it is compatible with "Windows Server 2008, 2012, 2016 and
2019" but more over I can even read "IIS Crypto updates the registry
using the same settings from this article[¹] by Microsoft.". The MS
article says that the registry settings found on the article are
compatible with "Microsoft Windows Server 2003, Enterprise Edition
(32-bit x86), Microsoft Windows Server 2003 Standard Edition (32-bit
x86), Microsoft Windows Server 2003 Web Edition, Microsoft Windows XP
Professional, Microsoft Windows XP Home Edition". I can't find win7...
any way I have run it on a win7 client: all settings seems to be checked
so all protocols seems to be supported until TLS 1.2 and SSL 3.0.
I have selected the best practices template that disable old protocols,
I have selected all protocols even old ones, applyed and rebooted the
win7 client but nothing changed but the fails log are ever the same:
> (4) Found Auth-Type = eap
> (4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
> (4) authenticate {
> (4) eap: Expiring EAP session with state 0xbe242a7dbdc83389
> (4) eap: Finished EAP session with state 0xbe242a7dbdc83389
> (4) eap: Previous EAP request found for state 0xbe242a7dbdc83389, released from the list
> (4) eap: Peer sent packet with method EAP PEAP (25)
> (4) eap: Calling submodule eap_peap to process data
> (4) eap_peap: Continuing EAP-TLS
> (4) eap_peap: Peer indicated complete TLS record size will be 7 bytes
> (4) eap_peap: Got complete TLS record (7 bytes)
> (4) eap_peap: [eaptls verify] = length included
> (4) eap_peap: <<< recv TLS 1.0 Alert [length 0002], fatal unknown_ca
> (4) eap_peap: ERROR: TLS Alert read:fatal:unknown CA
> (4) eap_peap: TLS_accept: Need to read more data: error
> (4) eap_peap: ERROR: Failed in __FUNCTION__ (SSL_read): error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca
> (4) eap_peap: In SSL Handshake Phase
> (4) eap_peap: In SSL Accept mode
> (4) eap_peap: SSL Application Data
> (4) eap_peap: ERROR: TLS failed during operation
> (4) eap_peap: ERROR: [eaptls process] = fail
> (4) eap: ERROR: Failed continuing EAP PEAP (25) session. EAP sub-module failed
> (4) eap: Sending EAP Failure (code 4) ID 236 length 4
> (4) eap: Failed in EAP select
> (4) [eap] = invalid
> (4) } # authenticate = invalid
I have tried to run IISCrypto to a win10 client but the protocols
supported seems to be the same...
I'm very confused... :?
Piviul
[¹]
https://support.microsoft.com/en-us/help/245030/how-to-restrict-the-use-of-certain-cryptographic-algorithms-and-protoc
More information about the Freeradius-Users
mailing list