Re: EAP/TLS authentication in 2050

2011-12-06 Thread Victor Guk



why?

  really, why? wat purpose does testing these dates have - you really think
  your current infrastructure, and techologies such as 802.1X are going
  to be around in the same format in even 20 years time?

No, of course  not:)
This is my  curiosity  led me  to test  such  date.



  anywayI'm guessing these are 32 bit server and client OS ?

  you may find, in that case, that your tests will work until you set the
  date beyond 2037 - 32bit OS have problems with dates after 2038

  so, try this with KNOWN parameters - eg 2020 , within the 2038
  timeframe and things should work.

The server is running SLES 11 SP1 (x86_64), a workstation running
Windows XP SP3 (32bit). Authentication is successful until February 1,
2050, ie for example if you logged in December 31, 2049, then the
authentication is successful.
A little later, try the client computer under the control of 64bit. the
results announced later.


I tried on a 64 bit computer. The same result.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP/TLS authentication in 2050

2011-12-06 Thread Alan DeKok
Victor Guk wrote:
 I tried on a 64 bit computer. The same result.

  Ask the OpenSSL people why their library can't handle dates after 2050.

  FreeRADIUS can't handle dates after 2038, due to 32-bit limitations of
the timestamp in RADIUS.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


EAP/TLS authentication in 2050

2011-12-05 Thread Victor Guk

Hello

I have SLES 11 SP1(64bit), freeradius 2.1.12 and openssl 0.9.8r.
I set up authentication with EAP/TLS.
Server and client certificates are valid until 3011 year. Here they are:

Certificate Details:
Serial Number: 1 (0x1)
Validity
Not Before: Dec 5 07:05:02 2011 GMT
Not After : Apr 7 07:05:02 3011 GMT
Subject:
countryName = AU
stateOrProvinceName = Some-State
organizationName = Internet Widgits Pty Ltd
commonName = Root
X509v3 extensions:
X509v3 Extended Key Usage:
TLS Web Server Authentication
Certificate is to be certified until Apr 7 07:05:02 3011 GMT (365000 days)

Certificate Details:
Serial Number: 2 (0x2)
Validity
Not Before: Dec 5 07:06:57 2011 GMT
Not After : Apr 7 07:06:57 3011 GMT
Subject:
countryName = AU
stateOrProvinceName = Some-State
organizationName = Internet Widgits Pty Ltd
commonName = testuser
X509v3 extensions:
X509v3 Extended Key Usage:
TLS Web Client Authentication
Certificate is to be certified until Apr 7 07:06:57 3011 GMT (365000 days)

Now client like authentication is successful. About this show freeradius:

Login OK: [host/testuser] (from client private-network port 33566721 cli 
0022-15ef-ab87)

# Executing section post-auth from file /etc/raddb/sites-enabled/default
+- entering group post-auth {...}
++[exec] returns noop
Sending Access-Accept of id 67 to 10.2.2.240 port 5002
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = 3
MS-MPPE-Recv-Key = 
0xca7449798f0f957fe8e03542d1b9a5ef6291756644f4e392a60f078a3c858cba
MS-MPPE-Send-Key = 
0xcfffb577e162ba2111b253f1f969e46e39521626f4669704e367502640f368a7

EAP-Message = 0x03050004
Message-Authenticator = 0x
User-Name = host/testuser
Finished request 3.

After that, I wanted to check as to be the case in 2050, as we recall 
certificates are valid until 3011. Set the time on the server freeradius 
August 1, 2050 (01/08/2050) and the same thing on a client running on 
Windows XP SP3. Authentication fails (slightly below records cite the 
radius).


I have a question for all who can help, this is the mistake of 
freeradius, which can not correctly identify the validity of the 
certificate. Or somewhere I made ​​a mistake when setting up. Maybe this 
one is already experienced. I'll be glad for your help.


test#radiusd -X
..
rad_recv: Access-Request packet from host 10.2.2.240 port 5002, id=68, 
length=221

User-Name = host/testuser
EAP-Message = 0x0202001201686f73742f7465737475736572
Message-Authenticator = 0xe394bda2df7b6ff808bd0079cb5620cd
NAS-IP-Address = 10.2.2.240
NAS-Identifier = 001ac1d4d442
NAS-Port = 33566721
NAS-Port-Id = unit=2;subslot=0;port=3;vlanid=1
NAS-Port-Type = Ethernet
Service-Type = Framed-User
Framed-Protocol = PPP
Calling-Station-Id = 0022-15ef-ab87
H3C-Connect_Id = 18
H3C-Product-ID = 5500-EI
H3C-Ip-Host-Addr = 0.0.0.0 00:22:15:ef:ab:87
H3C-NAS-Startup-Timestamp = 954640520
# Executing section authorize from file /etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = host/testuser, looking up realm NULL
[suffix] No such realm NULL
++[suffix] returns noop
[eap] EAP packet type response id 2 length 18
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry DEFAULT at line 152
[files] users: Matched entry host/testuser at line 234
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No known good password found for the user. 
Authentication may fail because of this.

++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Requiring client certificate
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 68 to 10.2.2.240 port 5002
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = 3
EAP-Message = 0x010300060d20
Message-Authenticator = 0x
State = 0x905a520890595f1e7244e69c58c3b630
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.2.2.240 port 5002, id=69, 
length=301

User-Name = host/testuser
EAP-Message = 
0x020300500d8000461603010041013d030198387b2b15bc66925793a2b08aec38827730edb90a98238b1f8967ad5b0e5a301600040005000a000900640062000300060013001200630100

Message-Authenticator = 0x57f352efbff4566bed7422e481a95c1e
NAS-IP-Address = 10.2.2.240
NAS-Identifier = 001ac1d4d442
NAS-Port = 33566721
NAS-Port-Id = unit=2;subslot=0;port=3;vlanid=1
NAS-Port-Type = Ethernet
Service-Type = Framed-User
Framed-Protocol = PPP
Calling-Station-Id = 0022-15ef-ab87
State = 0x905a520890595f1e7244e69c58c3b630
H3C-Connect_Id = 18
H3C-Product-ID = 5500-EI
H3C-Ip-Host-Addr = 0.0.0.0 00:22:15:ef:ab:87

Re: EAP/TLS authentication in 2050

2011-12-05 Thread Phil Mayers

On 12/05/2011 08:25 AM, Victor Guk wrote:


[tls]  TLS 1.0 Handshake [length 0249], Certificate
-- verify error:num=9:certificate is not yet valid
[tls]  TLS 1.0 Alert [length 0002], fatal bad_certificate
TLS Alert write:fatal:bad certificate


This error comes from within OpenSSL. FreeRADIUS just does what OpenSSL 
tells it.


Can you verify the cert with the openssl verify ... test command? e.g. 
try this:


openssl verify -CAfile ca.pem -purpose sslserver server.pem

If this fails as well, then it's either a problem in OpenSSL or your 
system libraries with dates 2050. If it succeeds (which I doubt) then 
FreeRADIUS should work too.


I sort of admire your effort to future-proof your certs though! ;o)

Cheers,
Phil
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP/TLS authentication in 2050

2011-12-05 Thread Alan Buxey
hi,

why?

really, why? wat purpose does testing these dates have - you really think 
your current infrastructure, and techologies such as 802.1X are going
to be around in the same format in even 20 years time?

anywayI'm guessing these are 32 bit server and client OS ?

you may find, in that case, that your tests will work until you set the
date beyond 2037 - 32bit OS have problems with dates after 2038

so, try this with KNOWN parameters - eg 2020 , within the 2038
timeframe and things should work.


alan
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP/TLS authentication in 2050

2011-12-05 Thread Stefan Winter
Hi,

 why?

 really, why? wat purpose does testing these dates have - you really think 
 your current infrastructure, and techologies such as 802.1X are going
 to be around in the same format in even 20 years time?

To be honest, I'm thinking of a similar thing. Given how painful a CA
rollover can be, I'm planning to rollover to a CA with validity
somewhere beyond Stefan's retirement date, which is unfortunately
later than 2037.

Given that the extra effort to extend the lifetime of a CA is *zero*
(just enter a different date in openssl.cnf) and the pain to eventually
stumble over an expiring CA is non-zero - I prefer to do the zero work.

Of course things might change, my CA keys might get too short, and I
might be forced to roll over anyway - there is at least a *chance* that
I can prevent a need to rollover, and so I'll do it. 3011 is stretching
it though, admitted.

Stefan


 anywayI'm guessing these are 32 bit server and client OS ?

 you may find, in that case, that your tests will work until you set the
 date beyond 2037 - 32bit OS have problems with dates after 2038

 so, try this with KNOWN parameters - eg 2020 , within the 2038
 timeframe and things should work.


 alan
 -
 List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473




signature.asc
Description: OpenPGP digital signature
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP/TLS authentication in 2050

2011-12-05 Thread Victor Guk



This error comes from within OpenSSL. FreeRADIUS just does what OpenSSL
tells it.

Can you verify the cert with the openssl verify ... test command? e.g.
try this:

openssl verify -CAfile ca.pem -purpose sslserver server.pem


freeradius:/usr/local/CA # openssl verify -CAfile cacert.pem -purpose 
sslserver cert-srv.pem

cert-srv.pem: OK



If this fails as well, then it's either a problem in OpenSSL or your
system libraries with dates2050. If it succeeds (which I doubt) then
FreeRADIUS should work too.

I sort of admire your effort to future-proof your certs though! ;o)



why?

really, why? wat purpose does testing these dates have - you really think
your current infrastructure, and techologies such as 802.1X are going
to be around in the same format in even 20 years time?


No, of course  not :)
This is my  curiosity  led me  to test  such  date.



anywayI'm guessing these are 32 bit server and client OS ?

you may find, in that case, that your tests will work until you set the
date beyond 2037 - 32bit OS have problems with dates after 2038

so, try this with KNOWN parameters - eg 2020 , within the 2038
timeframe and things should work.


The server is running SLES 11 SP1 (x86_64), a workstation running 
Windows XP SP3 (32bit). Authentication is successful until February 1, 
2050, ie for example if you logged in December 31, 2049, then the 
authentication is successful.
A little later, try the client computer under the control of 64bit. the 
results announced later.


-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html