Hi Tim, EAP-TTLS is not supported by default by the MS 802.1x supplicant. *However*, you can get a copy of SecureW2 at http://www.securew2.com/, which behaves as a plugin to the MS 802.1x supplicant to provide support for EAP-TTLS. If you want to use a third party complete supplicant, I'd recommend Funk's Odyssey client. It's not free, but you can download a 30 day free trial from http://www.funk.com/.
Regards, Guy > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On > Behalf Of Tim Winders > Sent: 13 December 2004 18:32 > To: [EMAIL PROTECTED] > Subject: RE: rlm_eap_tls not built because OpenSSL not found > > > Grrrr. It's always something. > > Is there a way to configure a WinXP SP2 client to use EAP-TTLS/PAP? > > When I enable TTLS, what default_eap_type do I specify? I > would guess > PAP. > > I have tried searching through the FAQ and the list archives, > but am still > confused. Much of what is there doesn't seem to be relevant > anymore with > current freeradius versions. (I am using the 20041210 snapshot) > > -- > > Tim Winders > Associate Dean of Information Technology > South Plains College > Levelland, TX 79336 > > On Mon, 13 Dec 2004, Guy Davies wrote: > > > Hi Tim, > > > > You can't authenticate to the /etc/passwd file using > PEAP/MS-CHAPv2. > > Any CHAP based authentication mechanism requires the server to have > > access to the *clear text* passwords. > > > > If you want to use PEAP/MS-CHAPv2, then you'll need to create > > definitions of your users either in a local (or other) > database with > > clear text (or trivially reversible) passwords. > > > > If you want to use /etc/passwd, you could switch to EAP-TTLS/PAP. > > Since PAP sends the password in clear text (don't worry, > it's inside > > the outer TTLS tunnel so it's not visible in the air), your server > > doesn't need the clear text held locally. It simply > applies the same > > crypt algorithm to the received password and checks the > result against > > your /etc/passwd file. > > > > Regards, > > > > Guy > > > >> -----Original Message----- > >> From: [EMAIL PROTECTED] > >> [mailto:[EMAIL PROTECTED] On > Behalf Of Tim > >> Winders > >> Sent: 13 December 2004 15:55 > >> To: [EMAIL PROTECTED] > >> Subject: Re: rlm_eap_tls not built because OpenSSL not found > >> > >> > >>>> Mon Dec 13 07:02:02 2004 : Info: rlm_eap_tls: Length Included > >>>> Mon Dec 13 07:02:02 2004 : Error: TLS_accept:error in > >> SSLv3 read client > >>>> certificate A Mon Dec 13 07:02:02 2004 : Info: > >> rlm_eap_tls: Received > >>>> EAP-TLS ACK message > >>> > >>> That is not a show stopper. TLS is complaining about the client > >>> certificate you don't need for PEAP, but should process > the request > >>> anyway. Examine the debug output to see if there is any > >> other failure. > >>> > >>>> I am trying to connect to a Cisco AP1200 from a Windows XP SP2 > >>>> client. The client has Network Authentication Open, Data > >> Encryption > >>>> WEP, EAP Type Protected EAP (PEAP), Authentication > Method: Secured > >>>> password (EAP-MSCHAP v2). > >>> > >>> Why open and WEP? Why not WPA TKIP? The AP and supplicant should > >>> support this. > >> > >> No reason. I have changed the configuration to WPA/TKIP. > Here is the > >> degub output from radiusd after I have applied the MS hotfix > >> as referenced > >> in a previous message and have changed the AP and client > >> configuration to > >> WPA/TKIP. > >> > >> --- Walking the entire request list --- > >> Cleaning up request 22 ID 236 with timestamp 41bdb896 > Nothing to do. > >> Sleeping until we see a request. > >> rad_recv: Access-Request packet from host > 10.0.1.231:21646, id=237, > >> length=134 > >> User-Name = "twinders" > >> Framed-MTU = 1400 > >> Called-Station-Id = "0012.7f75.d940" > >> Calling-Station-Id = "0090.4b65.34a5" > >> Service-Type = Login-User > >> Message-Authenticator = 0xdc3d497356c2a583f2eaf7954c684d3a > >> EAP-Message = 0x0201000d017477696e64657273 > >> NAS-Port-Type = Wireless-802.11 > >> NAS-Port = 512 > >> NAS-IP-Address = 10.0.1.231 > >> NAS-Identifier = "sub-ap1" > >> Processing the authorize section of radiusd.conf > >> modcall: entering group authorize for request 23 > >> modcall[authorize]: module "preprocess" returns ok for > request 23 > >> modcall[authorize]: module "chap" returns noop for request 23 > >> modcall[authorize]: module "mschap" returns noop for request 23 > >> modcall[authorize]: module "digest" returns noop for request 23 > >> rlm_realm: No '@' in User-Name = "twinders", looking up realm > >> NULL > >> rlm_realm: No such realm "NULL" > >> modcall[authorize]: module "suffix" returns noop for request 23 > >> rlm_eap: EAP packet type response id 1 length 13 > >> rlm_eap: No EAP Start, assuming it's an on-going EAP > conversation > >> modcall[authorize]: module "eap" returns updated for request 23 > >> users: Matched entry DEFAULT at line 152 > >> modcall[authorize]: module "files" returns ok for request 23 > >> modcall: group authorize returns updated for request 23 > >> rad_check_password: Found Auth-Type EAP > >> auth: type "EAP" > >> Processing the authenticate section of radiusd.conf > >> modcall: entering group authenticate for request 23 > >> rlm_eap: EAP Identity > >> rlm_eap: processing type tls > >> rlm_eap_tls: Initiate > >> rlm_eap_tls: Start returned 1 > >> modcall[authenticate]: module "eap" returns handled for > request 23 > >> modcall: group authenticate returns handled for request 23 Sending > >> Access-Challenge of id 237 to 10.0.1.231:21646 > >> EAP-Message = 0x010200061920 > >> Message-Authenticator = 0x00000000000000000000000000000000 > >> State = 0xe2c50ab039bff81ff87783b7c4dc1736 > >> Finished request 23 > >> Going to the next request > >> --- Walking the entire request list --- > >> Waking up in 6 seconds... > >> --- Walking the entire request list --- > >> Cleaning up request 23 ID 237 with timestamp 41bdb8b7 > Nothing to do. > >> Sleeping until we see a request. > >> > >> > >> > >> > >> I see where it matches the DEFALT entry in the users file. This is > >> simply: > >> > >> DEFAULT Auth-Type = System > >> Fall-Through = 1 > >> > >> I am trying to authenticate to the /etc/passwd file on the > system. > >> Dial up PPP users are able to connect and authenticate OK using > >> the default > >> Framed-User service type: > >> > >> DEFAULT Service-Type == Framed-User > >> Framed-IP-Address = 255.255.255.254, > >> Framed-MTU = 576, > >> Service-Type = Framed-User, > >> Fall-Through = Yes > >> > >> > >> Perhaps the problem is here? I am new to freeradius and may have > >> missed something here. > >> > >> -- > >> > >> Tim Winders > >> Associate Dean of Information Technology > >> South Plains College > >> Levelland, TX 79336 > >> > >> - > >> List info/subscribe/unsubscribe? See > >> http://www.freeradius.org/list/users.html > >> > > > > This e-mail is private and may be confidential and is for > the intended > > recipient only. If misdirected, please notify us by telephone and > > confirm that it has been deleted from your system and any copies > > destroyed. If you are not the intended recipient you are strictly > > prohibited from using, printing, copying, distributing or > > disseminating this e-mail or any information contained in > it. We use > > reasonable endeavours to virus scan all e-mails leaving the Company > > but no warranty is given that this e-mail and any attachments are > > virus free. You should undertake your own virus checking. > The right > > to monitor e-mail communications through our network is reserved by > > us. > > > > > > > > - > > List info/subscribe/unsubscribe? See > > http://www.freeradius.org/list/users.html > > > > - > List info/subscribe/unsubscribe? See > http://www.freeradius.org/list/users.html > - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html