FreeRADIUS EAP/TLS problem

2003-09-17 Thread olaf . wischhusen
Hello everybody,

my Radius server crashes everytime when the supplicant is trying to
authenticate.
I use Freeradius 0.9.1 on a Linux (Redhat8 Kernel 2.4.20) machine. The supplicant
is also installed on a Linux machine (Xsupplicant 0.7), the authentication
protocol is EAP-TLS. The access point is a workstation with HostAP.

After starting FreeRadius I get this sequence of messages:

Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /usr/local/etc/raddb/proxy.conf
Config:   including file: /usr/local/etc/raddb/clients.conf
Config:   including file: /usr/local/etc/raddb/snmp.conf
Config:   including file: /usr/local/etc/raddb/sql.conf
 main: prefix = /usr/local
 main: localstatedir = /usr/local/var
 main: logdir = /usr/local/var/log/radius
 main: libdir = /usr/local/lib
 main: radacctdir = /usr/local/var/log/radius/radacct
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = no
 main: log_file = /usr/local/var/log/radius/radius.log
 main: log_auth = no
 main: log_auth_badpass = no
 main: log_auth_goodpass = no
 main: pidfile = /usr/local/var/run/radiusd/radiusd.pid
 main: user = root
 main: group = root
 main: usercollide = no
 main: lower_user = no
 main: lower_pass = no
 main: nospace_user = no
 main: nospace_pass = no
 main: checkrad = /usr/local/sbin/checkrad
 main: proxy_requests = no
 proxy: retry_delay = 5
 proxy: retry_count = 3
 proxy: synchronous = no
 proxy: default_fallback = yes
 proxy: dead_time = 120
 proxy: post_proxy_authorize = yes
 proxy: wake_all_if_all_dead = no
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
 main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
Using deprecated clients file.  Support for this will go away soon.
read_config_files:  reading realms
Using deprecated realms file.  Support for this will go away soon.
radiusd:  entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
 pap: encryption_scheme = crypt
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
 mschap: use_mppe = yes
 mschap: require_encryption = no
 mschap: require_strong = no
 mschap: passwd = (null)
 mschap: authtype = MS-CHAP
Module: Instantiated mschap (mschap)
Module: Loaded System
 unix: cache = no
 unix: passwd = (null)
 unix: shadow = (null)
 unix: group = (null)
 unix: radwtmp = /usr/local/var/log/radius/radwtmp
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
 eap: default_eap_type = tls
 eap: timer_expire = 60
rlm_eap: Loaded and initialized the type md5
rlm_eap: Loaded and initialized the type leap
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = (null)
 tls: pem_file_type = yes
 tls: private_key_file = /etc/1x/r/cert-srv.pem
 tls: certificate_file = /etc/1x/r/cert-srv.pem
 tls: CA_file = /etc/1x/r/root.pem
 tls: private_key_password = whatever
 tls: dh_file = /etc/1x/r/dh
 tls: random_file = /etc/1x/r/random
 tls: fragment_size = 1750
 tls: include_length = yes
rlm_eap_tls: conf N ctx stored
rlm_eap: Loaded and initialized the type tls
Module: Instantiated eap (eap)
Module: Loaded preprocess
 preprocess: huntgroups = /usr/local/etc/raddb/huntgroups
 preprocess: hints = /usr/local/etc/raddb/hints
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
 realm: format = suffix
 realm: delimiter = @
Module: Instantiated realm (suffix)
Module: Loaded files
 files: usersfile = /usr/local/etc/raddb/users
 files: acctusersfile = /usr/local/etc/raddb/acct_users
 files: preproxy_usersfile = /usr/local/etc/raddb/preproxy_users
 files: compat = no
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
 acct_unique: key = User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, 
NAS-Port-Id
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
 detail: detailfile = 
/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
 radutmp: filename = /usr/local/var/log/radius/radutmp
 radutmp: username = %{User-Name}
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: 

Re: FreeRADIUS EAP/TLS problem

2003-09-17 Thread Artur Hecker
i can't say you what the problem is, but it looks like it is NOT linked 
against the correct library, since the function which is not found is 
NOT part of the 0.9.6 openssl BUT of the 0.9.7b. you probably compiled 
with the good version (otherwise it wouldn't compile in the first place) 
but the runtime is loading the old version. try an explicit LD_PRELOAD

ciao
artur
[EMAIL PROTECTED] wrote:

Hello everybody,

my Radius server crashes everytime when the supplicant is trying to
authenticate.
I use Freeradius 0.9.1 on a Linux (Redhat8 Kernel 2.4.20) machine. The supplicant
is also installed on a Linux machine (Xsupplicant 0.7), the authentication
protocol is EAP-TLS. The access point is a workstation with HostAP.
After starting FreeRadius I get this sequence of messages:

Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /usr/local/etc/raddb/proxy.conf
Config:   including file: /usr/local/etc/raddb/clients.conf
Config:   including file: /usr/local/etc/raddb/snmp.conf
Config:   including file: /usr/local/etc/raddb/sql.conf
 main: prefix = /usr/local
 main: localstatedir = /usr/local/var
 main: logdir = /usr/local/var/log/radius
 main: libdir = /usr/local/lib
 main: radacctdir = /usr/local/var/log/radius/radacct
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = no
 main: log_file = /usr/local/var/log/radius/radius.log
 main: log_auth = no
 main: log_auth_badpass = no
 main: log_auth_goodpass = no
 main: pidfile = /usr/local/var/run/radiusd/radiusd.pid
 main: user = root
 main: group = root
 main: usercollide = no
 main: lower_user = no
 main: lower_pass = no
 main: nospace_user = no
 main: nospace_pass = no
 main: checkrad = /usr/local/sbin/checkrad
 main: proxy_requests = no
 proxy: retry_delay = 5
 proxy: retry_count = 3
 proxy: synchronous = no
 proxy: default_fallback = yes
 proxy: dead_time = 120
 proxy: post_proxy_authorize = yes
 proxy: wake_all_if_all_dead = no
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
 main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
Using deprecated clients file.  Support for this will go away soon.
read_config_files:  reading realms
Using deprecated realms file.  Support for this will go away soon.
radiusd:  entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
 pap: encryption_scheme = crypt
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
 mschap: use_mppe = yes
 mschap: require_encryption = no
 mschap: require_strong = no
 mschap: passwd = (null)
 mschap: authtype = MS-CHAP
Module: Instantiated mschap (mschap)
Module: Loaded System
 unix: cache = no
 unix: passwd = (null)
 unix: shadow = (null)
 unix: group = (null)
 unix: radwtmp = /usr/local/var/log/radius/radwtmp
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
 eap: default_eap_type = tls
 eap: timer_expire = 60
rlm_eap: Loaded and initialized the type md5
rlm_eap: Loaded and initialized the type leap
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = (null)
 tls: pem_file_type = yes
 tls: private_key_file = /etc/1x/r/cert-srv.pem
 tls: certificate_file = /etc/1x/r/cert-srv.pem
 tls: CA_file = /etc/1x/r/root.pem
 tls: private_key_password = whatever
 tls: dh_file = /etc/1x/r/dh
 tls: random_file = /etc/1x/r/random
 tls: fragment_size = 1750
 tls: include_length = yes
rlm_eap_tls: conf N ctx stored
rlm_eap: Loaded and initialized the type tls
Module: Instantiated eap (eap)
Module: Loaded preprocess
 preprocess: huntgroups = /usr/local/etc/raddb/huntgroups
 preprocess: hints = /usr/local/etc/raddb/hints
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
 realm: format = suffix
 realm: delimiter = @
Module: Instantiated realm (suffix)
Module: Loaded files
 files: usersfile = /usr/local/etc/raddb/users
 files: acctusersfile = /usr/local/etc/raddb/acct_users
 files: preproxy_usersfile = /usr/local/etc/raddb/preproxy_users
 files: compat = no
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
 acct_unique: key = User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, 
NAS-Port-Id
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
 detail: detailfile = 

RE: FreeRADIUS EAP/TLS problem

2003-09-17 Thread Paul Hampson
 From: [EMAIL PROTECTED]
 Sent: Wednesday, 17 September 2003 8:33 PM

 /usr/local/sbin/radiusd:
 relocation error: /usr/local/lib/rlm_eap_tls-0.9.1.so:
 undefined symbol: SSL_set_msg_callback_arg

Try ldd /usr/local/lib/rlm_eap_tls-0.9.1.so, and see if it's
linking to the correct OpenSSL library.

--
=
Paul TBBle Hampson
Bubblesworth Pty Ltd (ABN: 51 095 284 361)
[EMAIL PROTECTED]

This is a one line proof...if we start
sufficiently far to the left.
-- Cambridge University Math Department
-
Random signature generator 3.0 by Paul TBBle Hampson
=


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


EAP-TLS problem

2003-08-29 Thread Yu-Ping Wang



Hi,

I use WinXP supplicant to authenticate with FreeRADIUS server 
by EAP-TLS.

OnRADIUS server debug mode "run-radiusd -X -A", I see 
Access-Accept log, and my network adaptor status is authenticated 
successfully.

ping AP, I got reply from message, but, after 5 sec, I got 
request timeout message.

What's wrong about this?

Thanks in advance.

Sincerely,
Yu-Ping Wang


Re: EAP-TLS problem

2003-08-28 Thread Alan DeKok
Jason Haar [EMAIL PROTECTED] wrote:
 The only way I've found to get it to work is to manually
...
 There must be a cleaner way... Besides moving to another distro ;-)

  Find out what is in 0.9.7b, which isn't in 0.9.6, and create patches
for FreeRADIUS to work with 0.9.6.

  The server can get better only if people submit patches.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


EAP-TLS problem

2003-08-27 Thread pankaj Goel

 Hi,
 
  I was succesfully using eap-tls with freeradius
version 0.8.1. Last week I checkedout the latest CVS
version as there have been some changes in EAP-TLS
module in the latest Version. I re-configured it only
to run into some problems. It breaks dowm before
starting the TLS Handshake. 

I again got it to work if I go back to version 0.8.1.
I do not know whats going wrong with the CVS version ?
 
Thanks in advance,
Pankaj

PS : The output with the CVS version is :
[EMAIL PROTECTED] root]# /usr/local/sbin/radiusd -X -A
Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file:
/usr/local/etc/raddb/proxy.conf
Config:   including file:
/usr/local/etc/raddb/clients.conf
Config:   including file:
/usr/local/etc/raddb/snmp.conf
Config:   including file:
/usr/local/etc/raddb/sql.conf
 main: prefix = /usr/local
 main: localstatedir = /usr/local/var
 main: logdir = /usr/local/var/log/radius
 main: libdir = /usr/local/lib
 main: radacctdir =
/usr/local/var/log/radius/radacct
 main: hostname_lookups = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = no
 main: log_file =
/usr/local/var/log/radius/radius.log
 main: log_auth = no
 main: log_auth_badpass = no
 main: log_auth_goodpass = no
 main: pidfile =
/usr/local/var/run/radiusd/radiusd.pid
 main: user = (null)
 main: group = (null)
 main: usercollide = no
 main: lower_user = no
 main: lower_pass = no
 main: nospace_user = no
 main: nospace_pass = no
 main: checkrad = /usr/local/sbin/checkrad
 main: proxy_requests = yes
 proxy: retry_delay = 5
 proxy: retry_count = 3
 proxy: synchronous = no
 proxy: default_fallback = yes
 proxy: dead_time = 120
 proxy: post_proxy_authorize = yes
 proxy: wake_all_if_all_dead = no
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
 main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will
go away soon.
read_config_files:  reading clients
Using deprecated clients file.  Support for this will
go away soon.
read_config_files:  reading realms
Using deprecated realms file.  Support for this will
go away soon.
radiusd:  entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded System
 unix: cache = no
 unix: passwd = /etc/passwd
 unix: shadow = /etc/shadow
 unix: group = /etc/group
 unix: radwtmp = /usr/local/var/log/radius/radwtmp
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
 eap: default_eap_type = tls
 eap: timer_expire = 60
 eap: ignore_unknown_eap_types = no
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = (null)
 tls: pem_file_type = yes
 tls: private_key_file =
/root/Eap-Setup/EAP-TLS-SERVER.pem
 tls: certificate_file =
/root/Eap-Setup/EAP-TLS-SERVER.pem
 tls: CA_file = /root/Eap-Setup/root.pem
 tls: private_key_password = whatever
 tls: dh_file = /root/Eap-Setup/DH
 tls: random_file = /root/Eap-Setup/random
 tls: fragment_size = 1024
 tls: include_length = yes
rlm_eap: Loaded and initialized type tls
Module: Instantiated eap (eap)
Module: Loaded preprocess
 preprocess: huntgroups =
/usr/local/etc/raddb/huntgroups
 preprocess: hints = /usr/local/etc/raddb/hints
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
 realm: format = suffix
 realm: delimiter = @
Module: Instantiated realm (suffix)
Module: Loaded files
 files: usersfile = /usr/local/etc/raddb/users
 files: acctusersfile =
/usr/local/etc/raddb/acct_users
 files: preproxy_usersfile =
/usr/local/etc/raddb/preproxy_users
 files: compat = no
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
 acct_unique: key = User-Name, Acct-Session-Id,
NAS-IP-Address, Client-IP-Addre   
ss, NAS-Port-Id
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
 detail: detailfile =
/usr/local/var/log/radius/radacct/%{Client-IP-Address}/de
  
tail-%Y%m%d
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
 radutmp: filename =
/usr/local/var/log/radius/radutmp
 radutmp: username = %{User-Name}
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on IP address *, ports 1812/udp and
1813/udp, with proxy on 

Re: EAP-TLS problem

2003-08-27 Thread Fabrice Beauvir
pankaj Goel wrote:

TLS_accept: before/accept initialization
Segmentation fault
 

I got the same thing with using wrong libcrypto (0.9.6 instead 0.9.7) 
shared library.

Check your LD_LIBRARY_PATH

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


RE: EAP-TLS problem

2003-08-27 Thread Paul Hampson
 From: Fabrice Beauvir
 Sent: Thursday, 28 August 2003 12:47 AM

 pankaj Goel wrote:
 
 TLS_accept: before/accept initialization
 Segmentation fault

 I got the same thing with using wrong libcrypto (0.9.6 instead 0.9.7) 
 shared library.

 Check your LD_LIBRARY_PATH

Was this because you linked against one, but tried to run against
the other, or is there a problem between OpenSSL 0.9.6 and FreeRADIUS's
EAP-TLS?

--
=
Paul TBBle Hampson
Bubblesworth Pty Ltd (ABN: 51 095 284 361)
[EMAIL PROTECTED]

This is a one line proof...if we start
sufficiently far to the left.
-- Cambridge University Math Department
-
Random signature generator 3.0 by Paul TBBle Hampson
=


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


RE: EAP-TLS problem

2003-08-27 Thread pankaj Goel

--- Paul Hampson [EMAIL PROTECTED] wrote:
  From: Fabrice Beauvir
  Sent: Thursday, 28 August 2003 12:47 AM
 
  pankaj Goel wrote:
  
  TLS_accept: before/accept initialization
  Segmentation fault
 
  I got the same thing with using wrong libcrypto
 (0.9.6 instead 0.9.7) 
  shared library.
 
  Check your LD_LIBRARY_PATH
 
 Was this because you linked against one, but tried
 to run against
 the other, or is there a problem between OpenSSL
 0.9.6 and FreeRADIUS's
 EAP-TLS?
 
 --

Yeah it makes sense, but I am using the same
compilation and run-time varibales for both the 0.8.1
and cvs version like
LD_LIBRAY_PATH=/usr/local/openssl/lib

THe following libs are inluded when i do a 

ldd /usr/local/sbin/radiusd
/lib/libssl.so.0.9.7a = /lib/libssl.so.0.9.7a
(0x40017000)
/lib/libcrypto.so.0.9.7a =
/lib/libcrypto.so.0.9.7a (0x4004c000)
libcrypt.so.1 = /lib/libcrypt.so.1
(0x40151000)
libnsl.so.1 = /lib/libnsl.so.1 (0x4017e000)
libresolv.so.2 = /lib/libresolv.so.2
(0x40193000)
libpthread.so.0 = /lib/tls/libpthread.so.0
(0x401a6000)
libradius-0.9-pre.so =
/usr/local//lib/libradius-0.9-pre.so (0x401b3000)
libltdl.so.3 = /usr/lib/libltdl.so.3
(0x401c5000)
libdl.so.2 = /lib/libdl.so.2 (0x401cc000)
libc.so.6 = /lib/tls/libc.so.6 (0x4200)
libgssapi_krb5.so.2 =
/usr/kerberos/lib/libgssapi_krb5.so.2 (0x401cf000)
libkrb5.so.3 = /usr/kerberos/lib/libkrb5.so.3
(0x401e3000)
libk5crypto.so.3 =
/usr/kerberos/lib/libk5crypto.so.3 (0x40241000)
libcom_err.so.3 =
/usr/kerberos/lib/libcom_err.so.3 (0x40251000)
libz.so.1 = /usr/lib/libz.so.1 (0x40253000)
/lib/ld-linux.so.2 = /lib/ld-linux.so.2
(0x4000)


Pankaj.


=
 Paul TBBle Hampson
 Bubblesworth Pty Ltd (ABN: 51 095 284 361)
 [EMAIL PROTECTED]
 
 This is a one line proof...if we start
 sufficiently far to the left.
   -- Cambridge University Math Department

-
 Random signature generator 3.0 by Paul TBBle
 Hampson

=
 
 
 - 
 List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html


__
Do you Yahoo!?
The New Yahoo! Search - Faster. Easier. Bingo.
http://search.yahoo.com

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS problem

2003-08-27 Thread Alan DeKok
pankaj Goel [EMAIL PROTECTED] wrote:
 Yeah it makes sense, but I am using the same
 compilation and run-time varibales for both the 0.8.1
 and cvs version like
 LD_LIBRAY_PATH=/usr/local/openssl/lib
 
 THe following libs are inluded when i do a 
 
 ldd /usr/local/sbin/radiusd
 /lib/libssl.so.0.9.7a = /lib/libssl.so.0.9.7a

  You need 0.9.7b, don't ask me why.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS problem

2003-08-27 Thread Jason Haar
On Thu, Aug 28, 2003 at 01:16:18AM +1000, Paul Hampson wrote:
 Was this because you linked against one, but tried to run against
 the other, or is there a problem between OpenSSL 0.9.6 and FreeRADIUS's
 EAP-TLS?

This wouldn't be a Redhat machine would it?

For better or worse, Redhat still insists on pushing out patched
openssl-0.96 stuff instead of the current 0.97 tree - which FreeRADIUS docs
as being a REQUIREMENT to get it working.

As just about every third app these days is linked against OpenSSL, it's
basically impossible to replace the RH OpenSSL install with 0.97 - leaving
FreeRADIUS in a hard place.

The only way I've found to get it to work is to manually compile and install
0.97 under (say) /usr/local/ssl-0.97b, then move all the /usr/lib 0.96
libraries aside, rename /usr/include/openssl to something else, and put
symlinks in to the 0.97 stuff. Then compile FreeRADIUS, but run it under
LD_LIBRARY_PATH=/usr/local/ssl-0.97b/lib. Oh yeah, and don't forget to
reverse out all those renames afterwards otherwise you'll have one hell of a
broken system

There must be a cleaner way... Besides moving to another distro ;-)

-- 
Cheers

Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +64 3 9635 377 Fax: +64 3 9635 417
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


EAP/TLS problem solved (almost...)

2003-08-14 Thread Antti Mattila
I tried certificates from Adam Sulmicki's cert.tgz packet. I set the server date to 
28.2 and on the laptop to 28.2. (the certificate is valid from and expires on that 
day). And the EAP/TLS authentication worked!

I finally got:
Sending Access-Accept of id 50 to 194.142.202.102:6001
MS-MPPE-Recv-Key = 
0x60b16b18235e7a9fde64aabf7ddb3248540cb7dcaff967454af4c39270ae1607
MS-MPPE-Send-Key = 
0x7236809f4cc3667478644304136783a2604a5a3607d9215f279aa97edcfeac2c
EAP-Message = 0x03090004
Message-Authenticator = 0x

But the certificate problem still remains. The certificate generated with the script 
which came from Freeradius package says on the w2k machine(on the certificate 
path):The certificate has a non-valid digital signature I think this is the problem. 
The Adam's certificate seems fine on the computer.

We will try different OpenSSL versions (we used the versions required in Ken Roser's 
guide, the SNAP was of course newer) but if this doesn't work we'll try to generate 
the certificates with Novell Certificate server that we are using. If it doesn't 
produce certificate files needed for Freeradius we need to buy somebody to make the 
certificates with OpenSSL for us. Fortunately the certificates must be generated only 
once. So if we get a working certificate set we don't have to buy a consultant to do 
the stuff ever again.

Best regards:
Antti Mattila


-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP/TLS problem solved (almost...)

2003-08-14 Thread Antti Mattila
you can DEFINITLY use openssl in order to produce valid certificates, 
both for windows AND freeradius (which uses openssl).

the certification path is not valid probably because the root 
certificate which you installed under windows expired.


ciao
artur


I know that many people have managed to get working certificates for Freeradius with 
OpenSSL and more importantly with the same exact script I'm using. I wonder what could 
go wrong maybe it is the OpenSSL version. 

My own generated certificate has valid date as of today and expires after 3 years. 
Windows 2000 shows it correctly under Authentication tab which it doesn't do if the 
certificate has expired.

Well have to keep trying, and if I don't get it working we'll have to use somebody 
else. After all I'm just a 21 year old summer worker ;-)

Best re


-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


EAP-TLS PROBLEM

2003-08-14 Thread wen-hong



Fri Aug 8 14:13:30 2003 : Info: Using deprecated naslist 
file. Support for this will go away soon.Fri Aug 8 14:13:30 2003 
: Info: Using deprecated clients file. Support for this will go away 
soon.Fri Aug 8 14:13:30 2003 : Info: Using deprecated realms 
file. Support for this will go away soon.Fri Aug 8 14:13:30 2003 
: Error: rlm_eap: Failed to link EAP-Type/tls: file not foundFri Aug 8 
14:13:30 2003 : Error: radiusd.conf[596]: eap: Module instantiation 
failed.

why it can not link to eap-tls¡H
Please help me,thanks...



Re: EAP/TLS problem solved (almost...)

2003-08-14 Thread Artur Hecker
that's why i'm trying to reassure you. it probably has nothing to do 
with the version of openssl. every suite has to produce compliant 
certificates. the certificate format is mandated by its form.

just verify all the certificates you installed. it's a small error 
somewhere.



ciao
artur
Antti Mattila wrote:

you can DEFINITLY use openssl in order to produce valid certificates, 
both for windows AND freeradius (which uses openssl).

the certification path is not valid probably because the root 
certificate which you installed under windows expired.

ciao
artur


I know that many people have managed to get working certificates for Freeradius with OpenSSL and more importantly with the same exact script I'm using. I wonder what could go wrong maybe it is the OpenSSL version. 

My own generated certificate has valid date as of today and expires after 3 years. Windows 2000 shows it correctly under Authentication tab which it doesn't do if the certificate has expired.

Well have to keep trying, and if I don't get it working we'll have to use somebody else. After all I'm just a 21 year old summer worker ;-)

Best re

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP/TLS problem solved (almost...)

2003-08-14 Thread Artur Hecker
you can DEFINITLY use openssl in order to produce valid certificates, 
both for windows AND freeradius (which uses openssl).

the certification path is not valid probably because the root 
certificate which you installed under windows expired.

ciao
artur
Antti Mattila wrote:

I tried certificates from Adam Sulmicki's cert.tgz packet. I set the server date to 28.2 and on the laptop to 28.2. (the certificate is valid from and expires on that day). And the EAP/TLS authentication worked!

I finally got:
Sending Access-Accept of id 50 to 194.142.202.102:6001
MS-MPPE-Recv-Key = 
0x60b16b18235e7a9fde64aabf7ddb3248540cb7dcaff967454af4c39270ae1607
MS-MPPE-Send-Key = 
0x7236809f4cc3667478644304136783a2604a5a3607d9215f279aa97edcfeac2c
EAP-Message = 0x03090004
Message-Authenticator = 0x
But the certificate problem still remains. The certificate generated with the script which came from Freeradius package says on the w2k machine(on the certificate path):The certificate has a non-valid digital signature I think this is the problem. The Adam's certificate seems fine on the computer.

We will try different OpenSSL versions (we used the versions required in Ken Roser's guide, the SNAP was of course newer) but if this doesn't work we'll try to generate the certificates with Novell Certificate server that we are using. If it doesn't produce certificate files needed for Freeradius we need to buy somebody to make the certificates with OpenSSL for us. Fortunately the certificates must be generated only once. So if we get a working certificate set we don't have to buy a consultant to do the stuff ever again.

Best regards:
Antti Mattila
- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS PROBLEM

2003-08-14 Thread diomedes
Hi,
Follow the steps of this articule abaut dinamic libraries
http://www.impossiblereflex.com/8021x/eap-tls-HOWTO.htm

good luck

omar.

wen-hong wrote:

 Fri Aug 8 14:13:30 2003 : Info: Using deprecated naslist file. Support
 for this will go away soon.
 Fri Aug 8 14:13:30 2003 : Info: Using deprecated clients file. Support
 for this will go away soon.
 Fri Aug 8 14:13:30 2003 : Info: Using deprecated realms file. Support
 for this will go away soon.
 Fri Aug 8 14:13:30 2003 : Error: rlm_eap: Failed to link EAP-Type/tls:
 file not found
 Fri Aug 8 14:13:30 2003 : Error: radiusd.conf[596]: eap: Module
 instantiation failed.
 why it can not link to eap-tls¡H
 Please help me,thanks...




-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


EAP/TLS problem continued again...

2003-08-07 Thread Antti Mattila
#  An example configuration for using /etc/smbpasswd.
#
#passwd etc_smbpasswd {
#   filename = /etc/smbpasswd
#   format =
*User-Name::LM-Password:NT-Password:SMB-Account-CTRL-TEXT::
#   authtype = MS-CHAP
#   hashsize = 100
#   ignorenislike = no
#   allowmultiplekeys = no
#}

#  Similar configuration, for the /etc/group file. Adds a
Group-Name
#  attribute for every group that the user is member of.
#
#passwd etc_group {
#   filename = /etc/group
#   format = =Group-Name:::*,User-Name
#   hashsize = 50
#   ignorenislike = yes
#   allowmultiplekeys = yes
#   delimiter = :
#}

# Realm module, for proxying.
#
#  You can have multiple instances of the realm module to
#  support multiple realm syntaxs at the same time.  The
#  search order is defined the order in the authorize and
#  preacct blocks after the module config block.
#
#  Two config options:
#   format -  must be 'prefix' or 'suffix'
#   delimiter  -  must be a single character

#  'realm/username'
#
#  Using this entry, IPASS users have their realm set to
IPASS.
#realm realmslash {
#   format = prefix
#   delimiter = /
#}

#  '[EMAIL PROTECTED]'
#
realm suffix {
format = suffix
delimiter = @
}

#  'username%realm'
#
#realm realmpercent {
#   format = suffix
#   delimiter = %
#}

#  rewrite arbitrary packets.  Useful in accounting and
authorization.
#
## This module is highly experimental at the moment.  Please
give 
## feedback to the mailing list.
#
#  The module can also use the Rewrite-Rule attribute. If it
#  is set and matches the name of the module instance, then
#  that module instance will be the only one which runs.
#
#  Also if new_attribute is set to yes then a new attribute
#  will be created containing the value replacewith and it
#  will be added to searchin (packet, reply or config).
# searchfor,ignore_case and max_matches will be ignored in that
case.

#
#attr_rewrite sanecallerid {
#   attribute = Called-Station-Id
# may be packet, reply, or config
#   searchin = packet
#   searchfor = [+ ]
#   replacewith = 
#   ignore_case = no
#   new_attribute = no
#   max_matches = 10
#   ## If set to yes then the replace string will be
appended to the original string
#   append = no
#}

# Preprocess the incoming RADIUS request, before handing it off
# to other modules.
#
#  This module processes the 'huntgroups' and 'hints' files.
#  In addition, it re-writes some weird attributes created
#  by some NASes, and converts the attributes into a form which
#  is a little more standard.
#
preprocess {
huntgroups = ${confdir}/huntgroups
hints = ${confdir}/hints

# This hack changes Ascend's wierd port numberings
# to standard 0-??? port numbers so that the + works
# for IP address assignments.
#   with_ascend_hack = no
#   ascend_channels_per_line = 23

# Windows NT machines often authenticate themselves as
# NT_DOMAIN\username
#
# If this is set to 'yes', then the NT_DOMAIN portion
# of the user-name is silently discarded.
#   with_ntdomain_hack = no

# Specialix Jetstream 8500 24 port access server.
#
# If the user name is 10 characters or longer, a /
# and the excess characters after the 10th are
# appended to the user name.
#
# If you're not running that NAS, you don't need
# this hack.
#   with_specialix_jetstream_hack = no

# Cisco sends it's VSA attributes with the attribute
# name *again* in the string, like:
#
#   H323-Attribute = h323-attribute=value.
#
# If this configuration item is set to 'yes', then
# the redundant data in the the attribute text is
stripped
# out.  The result is:
#
#  H323-Attribute = value
#
# If you're not running a Cisco NAS, you don't need
# this hack.
#   

EAP-TLS Problem

2002-12-09 Thread [EMAIL PROTECTED]
Hi,

I have a wireless network with cisco aironet 350 AP and a cisco card 
and I use win xp as
supplicant.
If I don't use (in win XP) the the key is provided for me 
automatically it's all ok.
When I enable that option I have same problems, the authentication is 
ok the cisco ap write
status=EAP Authenticated, BOOTP/DHCP but it's not possible take the 
ip address with the DHCP
and the connection is not enable, the cisco aironet client utilities 
indicate that the radio
connection is good.
I have read that in the authentication exchange freeradius send the 
session key (with MPPE) at
the AP.
It's possible that I have not configured the cisco AP or Freeradius in 
the right manner.

Thanks

Daniele Brevi


-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: EAP-TLS Problem

2002-12-09 Thread Artur Hecker

hi


the thread name is actually wrong since this is not a problem in
EAP-TLS.


 I have a wireless network with cisco aironet 350 AP and a cisco card
 and I use win xp as
 supplicant.
 If I don't use (in win XP) the the key is provided for me
 automatically it's all ok.

nice, so EAP-TLS is working just fine. what you want is dynamic wep
keys.


 When I enable that option I have same problems, the authentication is
 ok the cisco ap write
 status=EAP Authenticated, BOOTP/DHCP but it's not possible take the
 ip address with the DHCP
 and the connection is not enable, the cisco aironet client utilities
 indicate that the radio
 connection is good.

exactly, because the WEP keys are not the same at the supplicant and the
client (ap).


 I have read that in the authentication exchange freeradius send the
 session key (with MPPE) at
 the AP.
 It's possible that I have not configured the cisco AP or Freeradius in
 the right manner.

very probably even. in the future requests, please provide the version
of freeradius and the complete debug output (radiusd -s -X).

however, you have a good basis for succeeding, so further requests might
not be necessary :-) your EAP-TLS authentication works fine, you say.
congratulation, since that's the difficult part of the whole story.
now just grab the newest version of FR available, compile the
rlm_eap_tls, verify that you have some *mppe*.c files in the concerned
directory and that there are no compilation/linking errors.

then, start the new server and look at the radiusd -s -X output. if the
Access-Accept sent to the AP350 contains two MPPE-*-Key attributes with
values, everything should be ok for freeradius so far (when updating,
update the dictionaries too). then, you only need to alter the config of
the AP350 appropriately (activate encryption and either provide a
wep-key in the Slot1 or set the broadcast key rotation interval to 0).


greetings
artur



-- 
Artur Hecker
artur[at]hecker.info

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: Odyssey Client EAP/TLS problem

2002-11-09 Thread Klaus Heck
Here's some more info on the problem I have:

The client has a valid certificate, as well as the server. Both of them
can validate each others certificate using a valid root certificate.
However, the states of the second rad-access-cha packet of the server
and the rad-access-req answer packet from the client do not match. The
server cannot find a handler for the request (mem.c), more or less
ignores this request, and does not receive any other answer, thus sends
a rad-access-rej packet.

How is the states of the two packets calculated? I guess the
certificates are involved here, but they do not seem to be the problem
anyway. In the first rad-access-req - rad-access-cha packet pair, the
states do match, but I'm not sure if the certs are involved here
already. Could the client (Odyssey) be the problem?

I highly appreciate any comments.

Klaus


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Odyssey Client EAP/TLS problem

2002-11-08 Thread Klaus Heck
I have freeradius up and running. on the client side I use a odyssey
client manager (newest version). Once I try the authentication messages
are sent back and forth as I could see from the tcpdump trace. In short
it looks like:

radius:  rad-access-req 198 [id 1]
rad-access-cha 84 [id 1]
rad-access-req 321 [id 0]
rad-access-cha 1120 [id 0]
rad-access-req 229 [id 1]
rad-access-reject 20 [id 1]

The debugging information from the radius server tell

rlm_eap: Request not found in the list
rlm_eap: Either EAP-request timed out OR EAP-response to an unknown
EAP-request
  modcall[authenticate]: module eap returns invalid
modcall: group authenticate returns invalid
auth: Failed to validate the user.
Login incorrect

Did anybody see this before and find a solution?


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



EAP-TLS problem - rlm_eap: State verification failed

2002-04-10 Thread Sebastian Rieger

Hi there!

I've got a big prob. Thanks to the excellent howto of Adam Sulmicki, I finally 
managed to move back from my Win2k RADIUS towards freeRADIUS. I'm using 
freeRADIUS with eap tls enabled (cvs snaptshot 2002-04-08), a 3Com 8000 WLAN 
AP and xsupplicant under Linux to auth via 802.1x/EAP-TLS.

The messages look quite ok, but as soon as the secand request is handeled EAP 
is complainig about rlm_eap: State verification failed.. As I looked out 
for the State Attribute of the last message, I found it some chars shorter 
than it was in the message before. I tried to adjust the fragment size, but 
could'nt solve the problem. The packet has a length of 144 bytes, so it 
should not be a big deal with (standard) 1024 byte fragments.

Thank's a lot for your help!

Here's what I get:

Ready to process requests.
rad_recv: Access-Request packet from host 134.76.4.7:1812, id=11, length=67
EAP-Message = \002\010\000\t\001flex
Message-Authenticator = 0x783038983e2b972451718f233530d296
NAS-IP-Address = 134.76.4.7
User-Name = flex
Framed-MTU = 1400
modcall: entering group authorize
  modcall[authorize]: module preprocess returns ok
  modcall[authorize]: module eap returns updated
  modcall[authorize]: module suffix returns ok
users: Matched flex at 54
  modcall[authorize]: module files returns ok
modcall: group authorize returns updated
  rad_check_password:  Found Auth-Type EAP
auth: type EAP
modcall: entering group authenticate
rlm_eap: processing type tls
  modcall[authenticate]: module eap returns ok
modcall: group authenticate returns ok
Sending Access-Challenge of id 11 to 134.76.4.7:1812
EAP-Message = \001\t\000\006\r 
Message-Authenticator = 0x
State = 
0x3df30ad930886ee1c76b2ec405f54c47455db43c219ab001a93e6b8dfbf601baf54db839
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 134.76.4.7:1812, id=12, length=144
EAP-Message = 
\002\t\000\r\200\000\000\0004\026\003\001\000/\001\000\000+\003\001\264]ENJ\247\210_l/\227\347\256$O\211\255\031X\231\256\363\206\031\347mPSM\257\000\000\004\000\004\000\005\001
Message-Authenticator = 0xcd0dfea408b14674f367809b305f7c5c
NAS-IP-Address = 134.76.4.7
User-Name = flex
State = 0x3df30ad930886ee1c76b2ec405f54c47455db43c219a
Framed-MTU = 1400
modcall: entering group authorize
  modcall[authorize]: module preprocess returns ok
  modcall[authorize]: module eap returns updated
  modcall[authorize]: module suffix returns ok
users: Matched flex at 54
  modcall[authorize]: module files returns ok
modcall: group authorize returns updated
  rad_check_password:  Found Auth-Type EAP
auth: type EAP
modcall: entering group authenticate
rlm_eap: State verification failed.
  modcall[authenticate]: module eap returns invalid
modcall: group authenticate returns invalid
auth: Failed to validate the user.
Delaying request 1 for 1 seconds
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 134.76.4.7:1812, id=12, length=144
Sending duplicate authentication reply to client 134.76.4.7:1812 - ID: 12
Sending Access-Reject of id 12 to 134.76.4.7:1812
--- Walking the entire request list ---
Sending Access-Reject of id 12 to 134.76.4.7
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 11 with timestamp 3cb45d45
Cleaning up request 1 ID 12 with timestamp 3cb45d45
Nothing to do.  Sleeping until we see a request.



before all this - the server start's up with:
[root@caladan flex]# /usr/local/sbin/rc.radiusd -A -X
+ LD_LIBRARY_PATH=/usr/local/ssleap/lib
+ LD_PRELOAD=/usr/local/ssleap/lib/libcrypto.so
+ export LD_LIBRARY_PATH LD_PRELOAD
+ /usr/local/radiuseap/sbin/radiusd -A -X
Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /usr/local/radiuseap/etc/raddb/proxy.conf
Config:   including file: /usr/local/radiuseap/etc/raddb/clients.conf
Config:   including file: /usr/local/radiuseap/etc/raddb/snmp.conf
Config:   including file: /usr/local/radiuseap/etc/raddb/sql.conf
 main: prefix = /usr/local/radiuseap
 main: localstatedir = /usr/local/radiuseap/var
 main: logdir = /usr/local/radiuseap/var/log/radius
 main: libdir = /usr/local/radiuseap/lib
 main: radacctdir = /usr/local/radiuseap/var/log/radius/radacct
 main: hostname_lookups = no
read_config_files:  reading dictionary
read_config_files:  reading clients
read_config_files:  reading realms
read_config_files:  reading naslist
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = no
 main: log_auth = no
 main: log_auth_badpass = no
 main: log_auth_goodpass = no
 main: 

Re: EAP-TLS problem - rlm_eap: State verification failed

2002-04-10 Thread Raghu

Sebastian Rieger wrote:
 
 Hi there!
 
 I've got a big prob. Thanks to the excellent howto of Adam Sulmicki, I finally
 managed to move back from my Win2k RADIUS towards freeRADIUS. I'm using
 freeRADIUS with eap tls enabled (cvs snaptshot 2002-04-08), a 3Com 8000 WLAN
 AP and xsupplicant under Linux to auth via 802.1x/EAP-TLS.
 
 The messages look quite ok, but as soon as the secand request is handeled EAP
 is complainig about rlm_eap: State verification failed.. As I looked out
 for the State Attribute of the last message, I found it some chars shorter
 than it was in the message before. I tried to adjust the fragment size, but
 could'nt solve the problem. The packet has a length of 144 bytes, so it
 should not be a big deal with (standard) 1024 byte fragments.

State Attribute has nothing to do with the Fragment size.
Fragment size is meant for EAP-TLS packet only.



 State =
 0x3df30ad930886ee1c76b2ec405f54c47455db43c219ab001a93e6b8dfbf601baf54db839

 rad_recv: Access-Request packet from host 134.76.4.7:1812, id=12, length=144
 State = 0x3df30ad930886ee1c76b2ec405f54c47455db43c219a

The problem is here.
Radius Server is sending Access-Challenge packet with State Attribute.
During the Challenge response, Your AP should send the same 
State Attribute UN-MODIFIED.

Find out why your AP is truncating this Value.

-Raghu

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: EAP-TLS problem - rlm_eap: State verification failed

2002-04-10 Thread Alan DeKok

Sebastian Rieger [EMAIL PROTECTED] wrote:

 The messages look quite ok, but as soon as the secand request is
 handeled EAP is complainig about rlm_eap: State verification
 failed.. As I looked out for the State Attribute of the last
 message, I found it some chars shorter than it was in the message
 before.

  That's the problem.

 tried to adjust the fragment size, but could'nt solve the
 problem. The packet has a length of 144 bytes, so it should not be a
 big deal with (standard) 1024 byte fragments.

  The fragment size isn't the problem.  The problem is that the RADIUS
client is chopping the state off at 16 bytes.  This means that the
RADIUS client isn't implementing the RFC's properly.

  You have two choices:

 1. Edit the rlm_eap code so that it generates a state which is only
16 bytes.  This MAY be feasible.

 2. Complain to whoever wrote the RADIUS client, and tell them to fix
their software so that it actually implements the RADIUS RFC's,
instead of being broken.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html