I submitted the patches and my wireless config looks like :

/etc/config/wireless

config 'wifi-device' 'radio0'
        option 'type' 'mac80211'
        option 'channel' '11'
        option 'macaddr' 'f4:ec:38:fc:11:c8'
        option 'hwmode' '11ng'
        option 'htmode' 'HT20'
        list 'ht_capab' 'SHORT-GI-40'
        list 'ht_capab' 'DSSS_CCK-40'
        option 'txpower' '23'
        option 'country' 'US'

config 'wifi-iface'
        option 'device' 'radio0'
        option 'network' 'lan'
        option 'mode' 'ap'
        option 'ssid' 'OpenWrt'
        option 'auth_server' '192.168.1.104'
        option 'auth_secret' 'testing123'
        option 'encryption' 'wpa2+ccmp'
        option 'vlan_enable' '2'

 I understood that making vlan enable 2 forces hostapd to reject
connection  if vlan assignment doesn't come from radius .


my radius sends access-accept but hostapd drops the connection and also no
br-vlan appears on ifconfig .
how can I work this out ?

openwrt r28943 with hostapd-20111103
System Log :

> Sep  9 06:07:29 OpenWrt daemon.info hostapd: wlan0: STA 78:e4:00:6c:2f:eb
> IEEE 802.1X: authentication server did not include required VLAN ID in
> Access-Accept
> Sep  9 06:07:29 OpenWrt daemon.warne hostapd: wlan0: STA 78:e4:00:6c:2f:eb
> IEEE 802.1X: authentication failed - EAP type: 25 (PEAP)



freeradius -X output:

>
> [peap] Got tunneled reply RADIUS code 2
> Tunnel-Type:0 = VLAN
> Tunnel-Medium-Type:0 = IEEE-802
>  Tunnel-Private-Group-Id:0 := "10"
> MS-MPPE-Encryption-Policy = 0x00000001
> MS-MPPE-Encryption-Types = 0x00000006
>  MS-MPPE-Send-Key = 0xfa4b6928402162dc75ca3c5d3633a544
> MS-MPPE-Recv-Key = 0xdbaf38647954a65f8ff3bd457640aa33
>  EAP-Message = 0x03450004
> Message-Authenticator = 0x00000000000000000000000000000000
> User-Name = "ashkan"
>  [peap] Tunneled authentication was successful.
> [peap] SUCCESS
> ++[eap] returns handled
>  Sending Access-Challenge of id 12 to 192.168.1.1 port 56950
> EAP-Message =
> 0x0146002b1900170301002005105d3df33ceaaa611dee9999d6ef7ebea0a52aa5a306448fc819ac6b864fb3
>  Message-Authenticator = 0x00000000000000000000000000000000
> State = 0x84bc4e3b83fa57e7caa19a8619269cb1
>  Finished request 268.
> Going to the next request
> Waking up in 0.5 seconds.
>  rad_recv: Access-Request packet from host 192.168.1.1 port 56950, id=13,
> length=199
> User-Name = "ashkan"
>  NAS-Port = 1
> Called-Station-Id = "F4-EC-38-FC-11-C8:OpenWrt"
> Calling-Station-Id = "78-E4-00-6C-2F-EB"
>  Framed-MTU = 1400
> NAS-Port-Type = Wireless-802.11
> Connect-Info = "CONNECT 54Mbps 802.11g"
>  EAP-Message =
> 0x0246002b190017030100204569670443a923b680717450c026917c7fe46b678375ddf9bb4ee0fc34a5a81b
> State = 0x84bc4e3b83fa57e7caa19a8619269cb1
>  Message-Authenticator = 0x24ef8ecd74b9236f51ff3dd17e4dc93c
> # Executing section authorize from file
> /etc/freeradius/sites-enabled/default
>  +- entering group authorize {...}
> ++[preprocess] returns ok
> ++[chap] returns noop
>  ++[mschap] returns noop
> ++[digest] returns noop
> [suffix] No '@' in User-Name = "ashkan", looking up realm NULL
>  [suffix] No such realm "NULL"
> ++[suffix] returns noop
> [eap] EAP packet type response id 70 length 43
>  [eap] Continuing tunnel setup.
> ++[eap] returns ok
> Found Auth-Type = EAP
>  # Executing group from file /etc/freeradius/sites-enabled/default
> +- entering group authenticate {...}
>  [eap] Request found, released from the list
> [eap] EAP/peap
> [eap] processing type peap
>  [peap] processing EAP-TLS
> [peap] eaptls_verify returned 7
> [peap] Done initial handshake
>  [peap] eaptls_process returned 7
> [peap] EAPTLS_OK
> [peap] Session established.  Decoding tunneled attributes.
>  [peap] Peap state send tlv success
> [peap] Received EAP-TLV response.
> [peap] Success
>  [eap] Freeing handler
> ++[eap] returns ok
> # Executing section post-auth from file
> /etc/freeradius/sites-enabled/default
>  +- entering group post-auth {...}
> ++[exec] returns noop
> Sending Access-Accept of id 13 to 192.168.1.1 port 56950
>  MS-MPPE-Recv-Key =
> 0x6398fd9d9561ea47fa64bf536de9c865b49d11ae9e40ad97653424747c433085
> MS-MPPE-Send-Key =
> 0x1e5eefc46a70bb8704f9b8bf92eab52609af6e5c695a1e24fcedbe91f7ed2ec3
>  EAP-Message = 0x03460004
> Message-Authenticator = 0x00000000000000000000000000000000
> User-Name = "ashkan"
>  Finished request 269.





.



On Mon, Jul 25, 2011 at 5:21 PM, Matthew Bowman <mgbow...@gmx.com> wrote:

> Sorry about the incorrect patches. This is a combined patch of the
> "supporting" files.
>
> --- a/package/hostapd/files/hostapd.sh  2011-07-25 14:05:21.000000000 +0300
> +++ b/package/hostapd/files/hostapd.sh  2011-07-25 16:44:00.000000000 +0300
> @@ -2,6 +2,7 @@
>        local var="$1"
>        local vif="$2"
>        local enc wpa_group_rekey wps_possible
> +       local vlan_enable vlan_file vlan_interface
>
>        config_get enc "$vif" encryption
>        config_get wpa_group_rekey "$vif" wpa_group_rekey
> @@ -93,6 +94,16 @@
>                        append "$var" "wpa_key_mgmt=WPA-EAP" "$N"
>                        append "$var" "wpa_group_rekey=300" "$N"
>                        append "$var" "wpa_gmk_rekey=640" "$N"
> +                       config_get vlan_enable "$vif" vlan_enable 0
> +                       case "$vlan_enable" in
> +                               1|2)
> +                                       append "$var"
> "dynamic_vlan=$vlan_enable" "$N"
> +                                       config_get vlan_file "$vif"
> vlan_file /etc/hostapd.vlan
> +                                       append "$var"
> "vlan_file=$vlan_file" "$N"
> +                                       config_get vlan_interface "$vif"
> vlan_interface eth0
> +                                       append "$var"
> "vlan_tagged_interface=$vlan_interface" "$N"
> +                               ;;
> +                       esac
>                ;;
>                *wep*)
>                        config_get key "$vif" key
>
> --- a/package/hostapd/files/hostapd.vlan        1970-01-01
> 02:00:00.000000000 +0200
> +++ b/package/hostapd/files/hostapd.vlan        2011-07-25
> 16:41:36.000000000 +0300
> @@ -0,0 +1,4 @@
> +# Wildcard entry matching all VLAN IDs. The first # in the interface
> +# name will be replaced with the VLAN ID. The network interfaces are
> +# created (and removed) dynamically based on the use.
> +* wlan0.#
>
> --- a/package/hostapd/Makefile  2011-07-25 15:43:33.000000000 +0300
> +++ b/package/hostapd/Makefile  2011-07-25 15:58:49.000000000 +0300
> @@ -281,6 +281,8 @@
>  define Install/hostapd
>        $(INSTALL_DIR) $(1)/lib/wifi
>        $(INSTALL_DATA) ./files/hostapd.sh $(1)/lib/wifi/hostapd.sh
> +       $(INSTALL_DIR) $(1)/etc
> +       $(INSTALL_DATA) ./files/hostapd.vlan $(1)/etc/hostapd.vlan
>        $(INSTALL_DIR) $(1)/usr/sbin
>  endef
>
> On Jul 25, 2011, at 4:35 PM, Matthew Bowman wrote:
>
> > Per a discussion with jow, here's a default hostapd.vlan file and a
> patched Makefile to install the file to /etc
> >
> > Signed-off-by: Matthew Bowman <mgbowman at gmx punct com>
> >
> > package/hostapd/files/hostapd.vlan
> >
> > # Wildcard entry matching all VLAN IDs. The first # in the interface
> > # name will be replaced with the VLAN ID. The network interfaces are
> > # created (and removed) dynamically based on the use.
> > * wlan0.#
> >
> > --- a/Makefile  2011-07-25 15:43:33.000000000 +0300
> > +++ b/Makefile  2011-07-25 15:58:49.000000000 +0300
> > @@ -281,6 +281,8 @@
> > define Install/hostapd
> >        $(INSTALL_DIR) $(1)/lib/wifi
> >        $(INSTALL_DATA) ./files/hostapd.sh $(1)/lib/wifi/hostapd.sh
> > +       $(INSTALL_DIR) $(1)/etc
> > +       $(INSTALL_DATA) ./files/hostapd.vlan $(1)/etc/hostapd.vlan
> >        $(INSTALL_DIR) $(1)/usr/sbin
> > endef
> >
> > _______________________________________________
> > openwrt-devel mailing list
> > openwrt-devel@lists.openwrt.org
> > https://lists.openwrt.org/mailman/listinfo/openwrt-devel
>
> _______________________________________________
> openwrt-devel mailing list
> openwrt-devel@lists.openwrt.org
> https://lists.openwrt.org/mailman/listinfo/openwrt-devel
>
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to