For a wireless net i have to make some kind of authentication in order to log all connections made by users client and then make a billing page to show the sum the client has to pay (like hot spots by simpler).

I've installed freeradius 1.0.2 on a debian and i'm making some tests with the ap 3com 7250.

I thought to use dialupadmin to make an easy creation of users and then a simple php page to show all connections and relative fees. (I'm going to release this software under gpl licence if it's just usable)

I'm new with radius server in general but i've read many docs online and i think that the best solution for my needs (all clients will be windows) is to use freeradius with peap. So i've eneabled tls and peap under eap.conf
(I've had to use sources bacause of lack of tls module in debian packages)


In effects, il client logs in correclty, but  suddenly logoff


Could it be maybe a certificate problem? This issue if not much clear to my comprehension...
I've installed openssl with apt and compiled freeradius with the parameters:
-with-openssl-includes=/usr/include/openssl
--with-openssl-libraries=/usr/lib --disable-shared


due to this message:
http://lists.cistron.nl/pipermail/freeradius-users/2004-November/037760.html

but nothing yet.

Can anyone helpme, please?

Here are the logs of daemon.

rad_recv: Access-Request packet from host 192.168.10.2:1683, id=30, length=328
NAS-IP-Address = 192.168.10.2
NAS-Port-Type = Wireless-802.11
NAS-Port = 1
Framed-MTU = 1400
User-Name = "steve"
Calling-Station-Id = "00904bb9be8c"
Called-Station-Id = "000fcba437a3"
NAS-Identifier = "3Com Access Point"
State = 0xd2006d5d4df57fc04190cb462893573c
EAP-Message = 0x020300c01980000000b61603010086100000820080629aa7335494df30a6cedd46d2db6c7c8541895434f5a74daaf0c50ab9682bf515657176063fd328d29d1a43549d70aad6b795787b880549b77bc9d062a9744448a30c2b3990c52bec80be8922d62b4f667254ff519b6d3477596038834bb8523b0a15df68b65beaa760849b88abf38ead44d4fb752cfc20d074746cf6b85acf140301000101160301002075e265dd9142d5a47e2844a17695e55ac36130edf871aa9fcf41ea9fbb834fd2
Message-Authenticator = 0xf6b29a54f11dbdfe8a8985bfa5d22eba
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 20
modcall[authorize]: module "preprocess" returns ok for request 20
modcall[authorize]: module "chap" returns noop for request 20
modcall[authorize]: module "mschap" returns noop for request 20
rlm_realm: No '@' in User-Name = "steve", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 20
rlm_eap: EAP packet type response id 3 length 192
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 20
users: Matched entry steve at line 81
modcall[authorize]: module "files" returns ok for request 20
modcall: group authorize returns updated for request 20
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 20
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
TLS_accept: SSLv3 read client key exchange A
rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 read finished A
rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
TLS_accept: SSLv3 write change cipher spec A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 write finished A
TLS_accept: SSLv3 flush data
(other): SSL negotiation finished successfully
SSL Connection Established
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 20
modcall: group authenticate returns handled for request 20
Sending Access-Challenge of id 30 to 192.168.10.2:1683
Service-Type = Framed-User
Framed-Protocol = PPP
Framed-IP-Address = 192.168.10.33
Framed-IP-Netmask = 255.255.255.0
EAP-Message = 0x010400311900140301000101160301002060d0f682f32e7188a23a777fec2eab6787cc3d9f53d37ce2ee86f65f206850f1
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xe6e1e69dd95f53ca57517e27f099ddd0
Finished request 20
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.10.2:1684, id=31, length=142
NAS-IP-Address = 192.168.10.2
NAS-Port-Type = Wireless-802.11
NAS-Port = 1
Framed-MTU = 1400
User-Name = "steve"
Calling-Station-Id = "00904bb9be8c"
Called-Station-Id = "000fcba437a3"
NAS-Identifier = "3Com Access Point"
State = 0xe6e1e69dd95f53ca57517e27f099ddd0
EAP-Message = 0x020400061900
Message-Authenticator = 0x6ca035700c32f198e75433283e504f75
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 21
modcall[authorize]: module "preprocess" returns ok for request 21
modcall[authorize]: module "chap" returns noop for request 21
modcall[authorize]: module "mschap" returns noop for request 21
rlm_realm: No '@' in User-Name = "steve", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 21
rlm_eap: EAP packet type response id 4 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 21
users: Matched entry steve at line 81
modcall[authorize]: module "files" returns ok for request 21
modcall: group authorize returns updated for request 21
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 21
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake is finished
eaptls_verify returned 3
eaptls_process returned 3
rlm_eap_peap: EAPTLS_SUCCESS
modcall[authenticate]: module "eap" returns handled for request 21
modcall: group authenticate returns handled for request 21
Sending Access-Challenge of id 31 to 192.168.10.2:1684
Service-Type = Framed-User
Framed-Protocol = PPP
Framed-IP-Address = 192.168.10.33
Framed-IP-Netmask = 255.255.255.0
EAP-Message = 0x0105002019001703010015dd6039206833ba11f4c0ff08eda4c9a98b5ec12833
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x67be64a7d0920bb9646069e9667df2ea
Finished request 21



Thankyou Angelo Gelmi

- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to