Re: EAP-TLS and WEP key generation

2004-05-25 Thread Bob McCormick
I don't know.  That does have me concerned about my test AP...
On May 25, 2004, at 6:56 AM, Chris Bshaw wrote:
Hi Bob.
I **think** I might have it working now.
I just added to the original config the following lines:
encryption vlan 90 key 1 size 128bit 7 CE78330C1A841439656A9323F25A 
transmit-key
encryption vlan 90 mode ciphers wep128

I read thru some examples on the cisco website (mostly for LEAP rather 
than EAP) and they mentioned creating an initial broadcast key.

Now I can connect my client PC, and all the traffic in kismet appears 
encrypted. If I open a kismet dump in ethereal, it also appears 
encryped and all I see is MAC addressesno IP addressesis this 
what I should see if I have not decrypted the traffic?

I know I am being pedantic, but if I initialise the broadcast key as 
above, and then use broadcast key rotation, (which I am) am I correct 
in saying that this means that once the broadcast key rotation time 
limit is reached a new broadcast key is generated which is different 
from the initial one?

If so, I presume this means that when the unit is switched on, it will 
always have the same initial key(i.e. it doesn't in some way 
remember the last one used?)?

Thanx for all your help.
Chris.

From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Mon, 24 May 2004 14:25:31 -0600
I honestly don't know, but I'd love to find out.
Three things I can think of to try...
1) You should be able to specify a vlan for your cypher suite, 
something like this " encryption vlan mode 90 mode ciphers wep128"  
You might see if that makes any difference
2) You could try using "encryption mode web mandatory" instead of 
ciphers.
3) You could try upgrading to the latest IOS version for your AP,  
and/or open a TAC case.

On May 24, 2004, at 1:55 PM, Chris Bshaw wrote:
Hi Bob
Config attached.
Also, I should mention the config of the client. I am using a 
NetGear WG511 802.11g card. I don't have any security features 
enabled on the utility which comes with the WG511 (no WEP, WPA etc) 
and there are no options for EAP on this utility.

I enabled all the EAP stuff via the Authentication tab on the 
Properties of the interface under Start -> Network and Dialup 
connections in Windoze.

Under there I have the following set:
Enable network control using IEEE 802.1x
EAP Type: Smart Card or other Certificate
Use a certificate on this computer
and I select the certificate generated on my freeradius server. 
This is more or less what is described under 
http://www.freeradius.org/doc/EAPTLS.pdf.

There is a method in this doc for debugging EAP on the Cisco AP, 
which I had not noticed before.I'll try this tomorrow.

Finally, just in case you might not remember from my previous 
emails, I was (and I think still am) able to see EAPOL packets on my 
wireless client when I ran ethereal on the wireless interface.

Thanx in advance for your help.
Chris.
_
The new MSN 8: smart spam protection and 2 months FREE*  
http://join.msn.com/?page=features/junkmail


- List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html
_
MSN 8 with e-mail virus protection service: 2 months FREE* 
http://join.msn.com/?page=features/virus

- List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-25 Thread Chris Bshaw
Hi Bob.
I **think** I might have it working now.
I just added to the original config the following lines:
encryption vlan 90 key 1 size 128bit 7 CE78330C1A841439656A9323F25A 
transmit-key
encryption vlan 90 mode ciphers wep128

I read thru some examples on the cisco website (mostly for LEAP rather than 
EAP) and they mentioned creating an initial broadcast key.

Now I can connect my client PC, and all the traffic in kismet appears 
encrypted. If I open a kismet dump in ethereal, it also appears encryped and 
all I see is MAC addressesno IP addressesis this what I should see 
if I have not decrypted the traffic?

I know I am being pedantic, but if I initialise the broadcast key as above, 
and then use broadcast key rotation, (which I am) am I correct in saying 
that this means that once the broadcast key rotation time limit is reached a 
new broadcast key is generated which is different from the initial one?

If so, I presume this means that when the unit is switched on, it will 
always have the same initial key(i.e. it doesn't in some way remember 
the last one used?)?

Thanx for all your help.
Chris.

From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Mon, 24 May 2004 14:25:31 -0600
I honestly don't know, but I'd love to find out.
Three things I can think of to try...
1) You should be able to specify a vlan for your cypher suite, something 
like this " encryption vlan mode 90 mode ciphers wep128"  You might see if 
that makes any difference
2) You could try using "encryption mode web mandatory" instead of ciphers.
3) You could try upgrading to the latest IOS version for your AP,  and/or 
open a TAC case.

On May 24, 2004, at 1:55 PM, Chris Bshaw wrote:
Hi Bob
Config attached.
Also, I should mention the config of the client. I am using a NetGear 
WG511 802.11g card. I don't have any security features enabled on the 
utility which comes with the WG511 (no WEP, WPA etc) and there are no 
options for EAP on this utility.

I enabled all the EAP stuff via the Authentication tab on the Properties 
of the interface under Start -> Network and Dialup connections in Windoze.

Under there I have the following set:
Enable network control using IEEE 802.1x
EAP Type: Smart Card or other Certificate
Use a certificate on this computer
and I select the certificate generated on my freeradius server. This 
is more or less what is described under 
http://www.freeradius.org/doc/EAPTLS.pdf.

There is a method in this doc for debugging EAP on the Cisco AP, which I 
had not noticed before.I'll try this tomorrow.

Finally, just in case you might not remember from my previous emails, I 
was (and I think still am) able to see EAPOL packets on my wireless client 
when I ran ethereal on the wireless interface.

Thanx in advance for your help.
Chris.
_
The new MSN 8: smart spam protection and 2 months FREE*  
http://join.msn.com/?page=features/junkmail


- List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html
_
MSN 8 with e-mail virus protection service: 2 months FREE* 
http://join.msn.com/?page=features/virus

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-24 Thread Bob McCormick
I honestly don't know, but I'd love to find out.
Three things I can think of to try...
1) You should be able to specify a vlan for your cypher suite, 
something like this " encryption vlan mode 90 mode ciphers wep128"  You 
might see if that makes any difference
2) You could try using "encryption mode web mandatory" instead of 
ciphers.
3) You could try upgrading to the latest IOS version for your AP,  
and/or open a TAC case.

On May 24, 2004, at 1:55 PM, Chris Bshaw wrote:
Hi Bob
Config attached.
Also, I should mention the config of the client. I am using a NetGear 
WG511 802.11g card. I don't have any security features enabled on the 
utility which comes with the WG511 (no WEP, WPA etc) and there are no 
options for EAP on this utility.

I enabled all the EAP stuff via the Authentication tab on the 
Properties of the interface under Start -> Network and Dialup 
connections in Windoze.

Under there I have the following set:
Enable network control using IEEE 802.1x
EAP Type: Smart Card or other Certificate
Use a certificate on this computer
and I select the certificate generated on my freeradius server. 
This is more or less what is described under 
http://www.freeradius.org/doc/EAPTLS.pdf.

There is a method in this doc for debugging EAP on the Cisco AP, which 
I had not noticed before.I'll try this tomorrow.

Finally, just in case you might not remember from my previous emails, 
I was (and I think still am) able to see EAPOL packets on my wireless 
client when I ran ethereal on the wireless interface.

Thanx in advance for your help.
Chris.
_
The new MSN 8: smart spam protection and 2 months FREE*  
http://join.msn.com/?page=features/junkmail


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-24 Thread Chris Bshaw
Hi Bob
Config attached.
Also, I should mention the config of the client. I am using a NetGear WG511 
802.11g card. I don't have any security features enabled on the utility 
which comes with the WG511 (no WEP, WPA etc) and there are no options for 
EAP on this utility.

I enabled all the EAP stuff via the Authentication tab on the Properties of 
the interface under Start -> Network and Dialup connections in Windoze.

Under there I have the following set:
Enable network control using IEEE 802.1x
EAP Type: Smart Card or other Certificate
Use a certificate on this computer
and I select the certificate generated on my freeradius server. This is 
more or less what is described under 
http://www.freeradius.org/doc/EAPTLS.pdf.

There is a method in this doc for debugging EAP on the Cisco AP, which I had 
not noticed before.I'll try this tomorrow.

Finally, just in case you might not remember from my previous emails, I was 
(and I think still am) able to see EAPOL packets on my wireless client when 
I ran ethereal on the wireless interface.

Thanx in advance for your help.
Chris.
_
The new MSN 8: smart spam protection and 2 months FREE*  
http://join.msn.com/?page=features/junkmail


ap-confg
Description: Binary data


Re: EAP-TLS and WEP key generation

2004-05-24 Thread Bob McCormick
Could you post the config from your AP?
On May 24, 2004, at 10:44 AM, Chris Bshaw wrote:
Hi Bob
You might remember from my previous postings that I was connecting via 
wireless connection using EAP-TLS via a Cisco 1200 AP and a freeradius 
server, but my connections weren't appearing as WEP encrypted.

As per your suggestion, I downloaded kismet (I don't have a Mac) and 
have it running on my linux laptop as my sniffer..I have not 
joined this machine to the network, so it is just passively capturing 
wireless data.

I then got another Win2K laptop and connected it to our network using 
EAP/TLS via the Cisco 1200 and a freeradius server. It all works as 
before.the client laptop connects OK and the radiusd logging shows 
MS-MPPE stuff which I believe indicates that WEP keys are being 
generated.

However, kismet does not show the traffic as encrypted..
Also, if I open the dump formatted file that kismet generates using 
ethereal I can see the data inside packets..eg: the echo's from a 
telnet session are readable in ASCIIno WEP key required to decode, 
and besides, my sniffer doesn't know the key to decode.

Either it is possible to have EAP-TLS without WEP, or I have badly 
missed something in my configuration.probably the latter.

I would be most grateful for any help in unravelling this...
Thanx in advance
Chris.


From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Thu, 20 May 2004 10:52:14 -0600
On May 20, 2004, at 10:08 AM, Chris Bshaw wrote:
Hi
Thanx to everyone who has replied so farvery helpful. A few more 
questions.

Bob.I tried your settings below. My client does connect and I 
can see the EAP-TLS exchange via the radiusd debugging info. I also 
see MS-MPPE-Recv-Key and MS-MPPE-Send-Key in the debug output, and 
in ethereal on the client I see the EAPOL packets. However.

1. Again, both ends say security = none (or Encryption = off)
On the AP, what command are you running that says there is no 
encryption?

2. A show logging on the AP has a line like this when a client 
machine associates with it:

*Mar  3 01:26:04.607: %DOT11-6-ASSOC: Interface Dot11Radio0, Station 
  0009.5b65.d55c Associated KEY_MGMT[NONE]

.is KEY_MGMT[NONE] relevant here?
Do you have TKIP or CKIP enabled in your config?  The config I sent 
you does not.   It's possible the log message is talking about TKIP 
key management?  I'm not certain.


3. I thought guest-mode meant that anyone could connect without EAP 
(or WEP)am I wrong on this?
You are completely wrong.  :-)
A Cisco AP can support multiple SSID's, but only one SSID can be 
broadcast in the beacon.  The SSID that is in "Guest mode" is the one 
being beaconed.   You can also have no guest mode SSID's at all, and 
then no SSID will be included in your AP's beacons.  (but it *will* 
still beacon).

4. I set the dynamic rekeying interval to 120 seconds (instead of 
600 seconds as you have below).however, after the first 
successful connection, I never see any transaction on the radiusd 
server.you mention I should configure the AP to honor the 
Session-Timeout from the radius server.should I also set 
Session-Timeout = 120 on the freeradius server and if so where? (eg: 
in the raddb/attrs file?)...
When you're using 802.1x authentication, there are actually 2 wep 
keys involved.  One is the per-user key assigned by the radius 
server.  It's used to encrypt unicast traffic.  Then there is a 
broadcast key used to encrypt broadcast and multicast traffic.  That 
key is shared by all clients that are associated to the AP.   The 
statement "broadcast-key change 600", causes a Cisco AP to change the 
broadcast WEP key every 600 seconds and distribute the new key to all 
associated clients.  The Session-Timeout causes the AP to 
disassociate the client from the AP.  When client will attempt to 
automatically re-associate.  When it does, the radius server will 
give the client a new unicast WEP key.So yes, in addition to 
telling the AP to honor the Session-Timeout, you will need to tell 
Freeradius to send a Session-Timeout.   It looks like this: (in your 
Freeradius users file)

# BDM - for all users, send a session-timeout value of 15 minutes 
(900 seconds)
# to the AP.  For Cisco AP's you MUST make sure the AP is configured
# to honor the Session-Timeout value (it doesn't by default)
DEFAULT
Session-Timeout := 900,
Fall-Through = Yes

Put that at the VERY top of your users file.
5. Does my client wlan card and/or card driver need to support WEP 
dynamic rekeying? Or is it the w2k supplicant which handles this? 
(in case you missed it below I am using a NetGear WG511 card).
As long as your card supports 802.1x I believe you're fine.  The 
supplicant will handle everything else.

One think you mi

Re: EAP-TLS and WEP key generation

2004-05-24 Thread Chris Bshaw
Hi Bob
You might remember from my previous postings that I was connecting via 
wireless connection using EAP-TLS via a Cisco 1200 AP and a freeradius 
server, but my connections weren't appearing as WEP encrypted.

As per your suggestion, I downloaded kismet (I don't have a Mac) and have it 
running on my linux laptop as my sniffer..I have not joined this machine 
to the network, so it is just passively capturing wireless data.

I then got another Win2K laptop and connected it to our network using 
EAP/TLS via the Cisco 1200 and a freeradius server. It all works as 
before.the client laptop connects OK and the radiusd logging shows 
MS-MPPE stuff which I believe indicates that WEP keys are being generated.

However, kismet does not show the traffic as encrypted..
Also, if I open the dump formatted file that kismet generates using ethereal 
I can see the data inside packets..eg: the echo's from a telnet session 
are readable in ASCIIno WEP key required to decode, and besides, my 
sniffer doesn't know the key to decode.

Either it is possible to have EAP-TLS without WEP, or I have badly missed 
something in my configuration.probably the latter.

I would be most grateful for any help in unravelling this...
Thanx in advance
Chris.


From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Thu, 20 May 2004 10:52:14 -0600
On May 20, 2004, at 10:08 AM, Chris Bshaw wrote:
Hi
Thanx to everyone who has replied so farvery helpful. A few more 
questions.

Bob.I tried your settings below. My client does connect and I can see 
the EAP-TLS exchange via the radiusd debugging info. I also see 
MS-MPPE-Recv-Key and MS-MPPE-Send-Key in the debug output, and in ethereal 
on the client I see the EAPOL packets. However.

1. Again, both ends say security = none (or Encryption = off)
On the AP, what command are you running that says there is no encryption?
2. A show logging on the AP has a line like this when a client machine 
associates with it:

*Mar  3 01:26:04.607: %DOT11-6-ASSOC: Interface Dot11Radio0, Station   
0009.5b65.d55c Associated KEY_MGMT[NONE]

.is KEY_MGMT[NONE] relevant here?
Do you have TKIP or CKIP enabled in your config?  The config I sent you 
does not.   It's possible the log message is talking about TKIP key 
management?  I'm not certain.


3. I thought guest-mode meant that anyone could connect without EAP (or 
WEP)am I wrong on this?
You are completely wrong.  :-)
A Cisco AP can support multiple SSID's, but only one SSID can be broadcast 
in the beacon.  The SSID that is in "Guest mode" is the one being beaconed. 
  You can also have no guest mode SSID's at all, and then no SSID will be 
included in your AP's beacons.  (but it *will* still beacon).

4. I set the dynamic rekeying interval to 120 seconds (instead of 600 
seconds as you have below).however, after the first successful 
connection, I never see any transaction on the radiusd server.you 
mention I should configure the AP to honor the Session-Timeout from the 
radius server.should I also set Session-Timeout = 120 on the 
freeradius server and if so where? (eg: in the raddb/attrs file?)...
When you're using 802.1x authentication, there are actually 2 wep keys 
involved.  One is the per-user key assigned by the radius server.  It's 
used to encrypt unicast traffic.  Then there is a broadcast key used to 
encrypt broadcast and multicast traffic.  That key is shared by all clients 
that are associated to the AP.   The statement "broadcast-key change 600", 
causes a Cisco AP to change the broadcast WEP key every 600 seconds and 
distribute the new key to all associated clients.  The Session-Timeout 
causes the AP to disassociate the client from the AP.  When client will 
attempt to automatically re-associate.  When it does, the radius server 
will give the client a new unicast WEP key.So yes, in addition to 
telling the AP to honor the Session-Timeout, you will need to tell 
Freeradius to send a Session-Timeout.   It looks like this: (in your 
Freeradius users file)

# BDM - for all users, send a session-timeout value of 15 minutes (900 
seconds)
# to the AP.  For Cisco AP's you MUST make sure the AP is configured
# to honor the Session-Timeout value (it doesn't by default)
DEFAULT
Session-Timeout := 900,
Fall-Through = Yes

Put that at the VERY top of your users file.
5. Does my client wlan card and/or card driver need to support WEP dynamic 
rekeying? Or is it the w2k supplicant which handles this? (in case you 
missed it below I am using a NetGear WG511 card).
As long as your card supports 802.1x I believe you're fine.  The supplicant 
will handle everything else.

One think you might do to verify that your clients *are* indeed using a WEP 
key would be to download a wireless sni

Re: EAP-TLS and WEP key generation

2004-05-21 Thread Bob McCormick
Sure, you just need an 802.1x supplicant (just like you would for any 
other OS).   These are the ones I know of for Linux:

Xsupplicant (OpenSource)
http://open1x.sourceforge.net/
Meetinghouse Aegis client (Commercial Proprietary)
http://www.mtghouse.com/products/aegisclient/index.shtml
On May 21, 2004, at 10:55 AM, Jeff Bilder wrote:
is it possible to have wireless linux users authenticate with EAP?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Chris
Bshaw
Sent: Friday, May 21, 2004 11:18 AM
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Hi all
Thanx for all the info. I would certainly like to see your Word doc on 
the
subject.

Yet another question.is there any advantage to using 802.1x + TKIP 
+ MIC
instead of the config you helped me get working?

TIA
Chris.


From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation Date: Fri, 21 May 2004 
10:04:03
-0600

To add the the WPA confusion, there are actually two types of
authentication within the WPA "standard".   There's 802.1x + TKIP + 
MIC for
enterprises, then there's something called WPA personal that's for 
home
users or really small businesses that don't have a Radius server.

BTW.   I've got an MS-Word doc with screenshots for how to configure 
XP for
PEAP.   I could post it to the list of you'd like?

On May 21, 2004, at 10:02 AM, Alan DeKok wrote:
Bob McCormick <[EMAIL PROTECTED]> wrote:
Errr.. That's because Freeradius doesn't have to.  WPA is a 
combination
of 802.1x authentication, TKIP and MIC.  TKIP and MIC need to be
supported by your AP and your client (supplicant), but the radius
server doesn't need to know anything about it.
  Hmm... Ok.  Now I have to figure out why my XP laptop asks for a
"network key" (i.e. wpa), but refuses to authenticate via PEAP.
  Alan DeKok.
-
List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html
- List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html
_
MSN 8 helps eliminate e-mail viruses. Get 2 months FREE*.
http://join.msn.com/?page=features/virus
-
List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


RE: EAP-TLS and WEP key generation

2004-05-21 Thread Jeff Bilder
is it possible to have wireless linux users authenticate with EAP?


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Chris
Bshaw
Sent: Friday, May 21, 2004 11:18 AM
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation


Hi all

Thanx for all the info. I would certainly like to see your Word doc on the 
subject.

Yet another question.is there any advantage to using 802.1x + TKIP + MIC 
instead of the config you helped me get working?

TIA

Chris.




>From: Bob McCormick <[EMAIL PROTECTED]>
>Reply-To: [EMAIL PROTECTED]
>To: [EMAIL PROTECTED]
>Subject: Re: EAP-TLS and WEP key generation Date: Fri, 21 May 2004 10:04:03 
>-0600
>
>To add the the WPA confusion, there are actually two types of 
>authentication within the WPA "standard".   There's 802.1x + TKIP + MIC for 
>enterprises, then there's something called WPA personal that's for home 
>users or really small businesses that don't have a Radius server.
>
>BTW.   I've got an MS-Word doc with screenshots for how to configure XP for 
>PEAP.   I could post it to the list of you'd like?
>
>On May 21, 2004, at 10:02 AM, Alan DeKok wrote:
>
>>Bob McCormick <[EMAIL PROTECTED]> wrote:
>>>Errr.. That's because Freeradius doesn't have to.  WPA is a combination
>>>of 802.1x authentication, TKIP and MIC.  TKIP and MIC need to be
>>>supported by your AP and your client (supplicant), but the radius
>>>server doesn't need to know anything about it.
>>
>>   Hmm... Ok.  Now I have to figure out why my XP laptop asks for a
>>"network key" (i.e. wpa), but refuses to authenticate via PEAP.
>>
>>   Alan DeKok.
>>
>>
>>-
>>List info/subscribe/unsubscribe? See 
>>http://www.freeradius.org/list/users.html
>>
>
>- List info/subscribe/unsubscribe? See 
>http://www.freeradius.org/list/users.html

_
MSN 8 helps eliminate e-mail viruses. Get 2 months FREE*. 
http://join.msn.com/?page=features/virus


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-21 Thread Chris Bshaw
Hi all
Thanx for all the info. I would certainly like to see your Word doc on the 
subject.

Yet another question.is there any advantage to using 802.1x + TKIP + MIC 
instead of the config you helped me get working?

TIA
Chris.


From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation Date: Fri, 21 May 2004 10:04:03 
-0600

To add the the WPA confusion, there are actually two types of 
authentication within the WPA "standard".   There's 802.1x + TKIP + MIC for 
enterprises, then there's something called WPA personal that's for home 
users or really small businesses that don't have a Radius server.

BTW.   I've got an MS-Word doc with screenshots for how to configure XP for 
PEAP.   I could post it to the list of you'd like?

On May 21, 2004, at 10:02 AM, Alan DeKok wrote:
Bob McCormick <[EMAIL PROTECTED]> wrote:
Errr.. That's because Freeradius doesn't have to.  WPA is a combination
of 802.1x authentication, TKIP and MIC.  TKIP and MIC need to be
supported by your AP and your client (supplicant), but the radius
server doesn't need to know anything about it.
  Hmm... Ok.  Now I have to figure out why my XP laptop asks for a
"network key" (i.e. wpa), but refuses to authenticate via PEAP.
  Alan DeKok.
-
List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html

- List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html
_
MSN 8 helps eliminate e-mail viruses. Get 2 months FREE*. 
http://join.msn.com/?page=features/virus

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-21 Thread Bob McCormick
To add the the WPA confusion, there are actually two types of 
authentication within the WPA "standard".   There's 802.1x + TKIP + MIC 
for enterprises, then there's something called WPA personal that's for 
home users or really small businesses that don't have a Radius server.

BTW.   I've got an MS-Word doc with screenshots for how to configure XP 
for PEAP.   I could post it to the list of you'd like?

On May 21, 2004, at 10:02 AM, Alan DeKok wrote:
Bob McCormick <[EMAIL PROTECTED]> wrote:
Errr.. That's because Freeradius doesn't have to.  WPA is a 
combination
of 802.1x authentication, TKIP and MIC.  TKIP and MIC need to be
supported by your AP and your client (supplicant), but the radius
server doesn't need to know anything about it.
  Hmm... Ok.  Now I have to figure out why my XP laptop asks for a
"network key" (i.e. wpa), but refuses to authenticate via PEAP.
  Alan DeKok.
-
List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-21 Thread Alan DeKok
Bob McCormick <[EMAIL PROTECTED]> wrote:
> Errr.. That's because Freeradius doesn't have to.  WPA is a combination 
> of 802.1x authentication, TKIP and MIC.  TKIP and MIC need to be 
> supported by your AP and your client (supplicant), but the radius 
> server doesn't need to know anything about it.

  Hmm... Ok.  Now I have to figure out why my XP laptop asks for a
"network key" (i.e. wpa), but refuses to authenticate via PEAP.

  Alan DeKok.


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-21 Thread Bob McCormick
Errr.. That's because Freeradius doesn't have to.  WPA is a combination 
of 802.1x authentication, TKIP and MIC.  TKIP and MIC need to be 
supported by your AP and your client (supplicant), but the radius 
server doesn't need to know anything about it.   I've tested WPA with a 
Cisco 1100 AP, Freeradius (for the 802.1x authentication) and both  
Windows XP and Mac OSX 10.3 clients.  It works great.

On May 21, 2004, at 8:34 AM, Alan DeKok wrote:
"Chris Bshaw" <[EMAIL PROTECTED]> wrote:
Can I (and if so should I) use WPA key management with the setup I 
have and
if so how do I configure freeradius for this?
  FreeRADIUS doesn't do WPA or TKIP.
If I can't use WPA, is EAP-TLS + regular WEP rekeying considered to be
secure enough?
  Yes.
  Alan DeKok.
-
List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-21 Thread Alan DeKok
"Chris Bshaw" <[EMAIL PROTECTED]> wrote:
> Can I (and if so should I) use WPA key management with the setup I have and 
> if so how do I configure freeradius for this?

  FreeRADIUS doesn't do WPA or TKIP.

> If I can't use WPA, is EAP-TLS + regular WEP rekeying considered to be 
> secure enough?

  Yes.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-21 Thread Chris Bshaw
Hi
Thanx for this reply and your previous one.
I tried the Session-Timeout in the radius users file and it works.so 
thanx for that.

To answer one of your questions, on the AP I go to the web interface for the 
AP and in there I go into Associations. I then select my client from the 
list to get its association details and in there it says Encryption = Off. 
I'll try kismet as soon as I can.

As regards the WPA TKIP key management command you mention below, if I 
understand correctly WPA is supposed to be much better than WEP.

Can I (and if so should I) use WPA key management with the setup I have and 
if so how do I configure freeradius for this?

If I can't use WPA, is EAP-TLS + regular WEP rekeying considered to be 
secure enough?

Thanx in advance again.
Chris Bradshaw

From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Thu, 20 May 2004 15:48:35 -0600
On May 20, 2004, at 10:08 AM, Chris Bshaw wrote:
Hi
Thanx to everyone who has replied so farvery helpful. A few more  
questions.

Bob.I tried your settings below. My client does connect and I can  see 
the EAP-TLS exchange via the radiusd debugging info. I also see  
MS-MPPE-Recv-Key and MS-MPPE-Send-Key in the debug output, and in  
ethereal on the client I see the EAPOL packets. However.

1. Again, both ends say security = none (or Encryption = off)
2. A show logging on the AP has a line like this when a client machine  
associates with it:

*Mar  3 01:26:04.607: %DOT11-6-ASSOC: Interface Dot11Radio0, Station
0009.5b65.d55c Associated KEY_MGMT[NONE]

.is KEY_MGMT[NONE] relevant here?
I think I may have found what that message is referring to.  Under each  
SSID you can put the command "authentication key-management { [wpa]  [cckm] 
} [ optional ]".  My guess is that you don't have this command.
I believe this is part of enabling TKIP(wpa) or the older Cisco  
proprietary CCKM.

Here's a URL for more info.
http://www.cisco.com/en/US/customer/products/hw/wireless/ps4570/ 
products_command_reference_chapter09186a00801d016c.html#2484789


3. I thought guest-mode meant that anyone could connect without EAP  (or 
WEP)am I wrong on this?

4. I set the dynamic rekeying interval to 120 seconds (instead of 600  
seconds as you have below).however, after the first successful  
connection, I never see any transaction on the radiusd server.you  
mention I should configure the AP to honor the Session-Timeout from  the 
radius server.should I also set Session-Timeout = 120 on the  
freeradius server and if so where? (eg: in the raddb/attrs file?)...

5. Does my client wlan card and/or card driver need to support WEP  
dynamic rekeying? Or is it the w2k supplicant which handles this? (in  
case you missed it below I am using a NetGear WG511 card).

Thanx again in advance
Chris Bradshaw


From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Thu, 20 May 2004 08:54:41 -0600
What kind of cipher suite did you configure on your AP?   For a Cisco  
AP, you should have something like this:

interface Dot11Radio0
 no ip address
 no ip route-cache
! #   Require wep128 encryption
 encryption mode ciphers wep128
 ! # rotate broadcast wep key every 10 minutes
 broadcast-key change 600
! # Create an SSID named "ssid1"
! # Require EAP authentication
! # broadcast the SSID
 ssid ssid1
authentication open eap eap_methods
guest-mode
! ## set the data rates support and/or required by the AP
! ## These are the rates recommended by Cisco for best throughput
! ## for supporting both 802.11.b and 802.11g
 speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0  24.0 
36.0 48.0 54.0

You'll also need to configure the AP to honor the Session-Timeout  value 
returned by the Radius server (by default, Cisco AP's don't).

! ## Tell the AP to honor the Session-Timeout returned by the  Radius 
server
 dot1x reauth-period server

On May 20, 2004, at 3:28 AM, Chris Bshaw wrote:
Hi Andrea
Thanx for the reply. Using ethereal I can see the EAPOL packets on  the 
wireless client.

However, if I go into the status monitor for the wireless card, its  
says security = none (would normally say security = wep if I was  using 
static non-EAP/TLS wep).

Also, as I mentioned below, the Cisco AP also says that the client  is 
'EAP-associated' but that Encryption is off.

However, everything works.I am connected to the WLAN just  
fine.I am just unsure whether or not my connection is encrypted  
with a WEP key.

I have read some more on this. I am not sure if I understand this  
correctlyso feel free to correct me. Once the mutual  authentication 
is complete via EAP, the AP maintains per-client WEP  keys which are 
generated once per 1x auth (a

Re: EAP-TLS and WEP key generation

2004-05-20 Thread Bob McCormick
On May 20, 2004, at 10:08 AM, Chris Bshaw wrote:
Hi
Thanx to everyone who has replied so farvery helpful. A few more  
questions.

Bob.I tried your settings below. My client does connect and I can  
see the EAP-TLS exchange via the radiusd debugging info. I also see  
MS-MPPE-Recv-Key and MS-MPPE-Send-Key in the debug output, and in  
ethereal on the client I see the EAPOL packets. However.

1. Again, both ends say security = none (or Encryption = off)
2. A show logging on the AP has a line like this when a client machine  
associates with it:

*Mar  3 01:26:04.607: %DOT11-6-ASSOC: Interface Dot11Radio0, Station
0009.5b65.d55c Associated KEY_MGMT[NONE]

.is KEY_MGMT[NONE] relevant here?
I think I may have found what that message is referring to.  Under each  
SSID you can put the command "authentication key-management { [wpa]  
[cckm] } [ optional ]".  My guess is that you don't have this command.
I believe this is part of enabling TKIP(wpa) or the older Cisco  
proprietary CCKM.

Here's a URL for more info.
http://www.cisco.com/en/US/customer/products/hw/wireless/ps4570/ 
products_command_reference_chapter09186a00801d016c.html#2484789


3. I thought guest-mode meant that anyone could connect without EAP  
(or WEP)am I wrong on this?

4. I set the dynamic rekeying interval to 120 seconds (instead of 600  
seconds as you have below).however, after the first successful  
connection, I never see any transaction on the radiusd server.you  
mention I should configure the AP to honor the Session-Timeout from  
the radius server.should I also set Session-Timeout = 120 on the  
freeradius server and if so where? (eg: in the raddb/attrs file?)...

5. Does my client wlan card and/or card driver need to support WEP  
dynamic rekeying? Or is it the w2k supplicant which handles this? (in  
case you missed it below I am using a NetGear WG511 card).

Thanx again in advance
Chris Bradshaw


From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Thu, 20 May 2004 08:54:41 -0600
What kind of cipher suite did you configure on your AP?   For a Cisco  
AP, you should have something like this:

interface Dot11Radio0
 no ip address
 no ip route-cache
! #   Require wep128 encryption
 encryption mode ciphers wep128
 ! # rotate broadcast wep key every 10 minutes
 broadcast-key change 600
! # Create an SSID named "ssid1"
! # Require EAP authentication
! # broadcast the SSID
 ssid ssid1
authentication open eap eap_methods
guest-mode
! ## set the data rates support and/or required by the AP
! ## These are the rates recommended by Cisco for best throughput
! ## for supporting both 802.11.b and 802.11g
 speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0  
24.0 36.0 48.0 54.0

You'll also need to configure the AP to honor the Session-Timeout  
value returned by the Radius server (by default, Cisco AP's don't).

! ## Tell the AP to honor the Session-Timeout returned by the  
Radius server
 dot1x reauth-period server

On May 20, 2004, at 3:28 AM, Chris Bshaw wrote:
Hi Andrea
Thanx for the reply. Using ethereal I can see the EAPOL packets on  
the wireless client.

However, if I go into the status monitor for the wireless card, its  
says security = none (would normally say security = wep if I was  
using static non-EAP/TLS wep).

Also, as I mentioned below, the Cisco AP also says that the client  
is 'EAP-associated' but that Encryption is off.

However, everything works.I am connected to the WLAN just  
fine.I am just unsure whether or not my connection is encrypted  
with a WEP key.

I have read some more on this. I am not sure if I understand this  
correctlyso feel free to correct me. Once the mutual  
authentication is complete via EAP, the AP maintains per-client WEP  
keys which are generated once per 1x auth (and can be regenerated  
after some period of time, e.g. 1 hr) and a broadcast WEP key which  
is the same across clients (also can be regenerated after some  
period of time.)

So it seems that the AP is responsible for the WEP keys and their  
rotation..correct?

If so, I currently have WEP encrypyion disabled on my AP, and on my  
client. I had assumed that EAP-TLS took care of everything.

How do you have your client and hostapd configured? Do you have WEP  
enabled?
If so, since the keys are generated dynamically, do you just leave  
the WEP key fields on the client and AP blank?

Thanx in advance
Chris Bradshaw

From: "Andrea G. Forte" <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Wed, 19 May 2004 17:25:12 -0400 (EDT)
Chris,
the whole purpose of 802.1x is to generate a secure auth mechanism  
and
dynamic re-keying. I have used hostapd together with freeradius and  
th

Re: EAP-TLS and WEP key generation

2004-05-20 Thread Bob McCormick
On May 20, 2004, at 10:08 AM, Chris Bshaw wrote:
Hi
Thanx to everyone who has replied so farvery helpful. A few more 
questions.

Bob.I tried your settings below. My client does connect and I can 
see the EAP-TLS exchange via the radiusd debugging info. I also see 
MS-MPPE-Recv-Key and MS-MPPE-Send-Key in the debug output, and in 
ethereal on the client I see the EAPOL packets. However.

1. Again, both ends say security = none (or Encryption = off)
On the AP, what command are you running that says there is no 
encryption?

2. A show logging on the AP has a line like this when a client machine 
associates with it:

*Mar  3 01:26:04.607: %DOT11-6-ASSOC: Interface Dot11Radio0, Station   
0009.5b65.d55c Associated KEY_MGMT[NONE]

.is KEY_MGMT[NONE] relevant here?
Do you have TKIP or CKIP enabled in your config?  The config I sent you 
does not.   It's possible the log message is talking about TKIP key 
management?  I'm not certain.


3. I thought guest-mode meant that anyone could connect without EAP 
(or WEP)am I wrong on this?
You are completely wrong.  :-)
A Cisco AP can support multiple SSID's, but only one SSID can be 
broadcast in the beacon.  The SSID that is in "Guest mode" is the one 
being beaconed.   You can also have no guest mode SSID's at all, and 
then no SSID will be included in your AP's beacons.  (but it *will* 
still beacon).

4. I set the dynamic rekeying interval to 120 seconds (instead of 600 
seconds as you have below).however, after the first successful 
connection, I never see any transaction on the radiusd server.you 
mention I should configure the AP to honor the Session-Timeout from 
the radius server.should I also set Session-Timeout = 120 on the 
freeradius server and if so where? (eg: in the raddb/attrs file?)...
When you're using 802.1x authentication, there are actually 2 wep keys 
involved.  One is the per-user key assigned by the radius server.  It's 
used to encrypt unicast traffic.  Then there is a broadcast key used to 
encrypt broadcast and multicast traffic.  That key is shared by all 
clients that are associated to the AP.   The statement "broadcast-key 
change 600", causes a Cisco AP to change the broadcast WEP key every 
600 seconds and distribute the new key to all associated clients.  The 
Session-Timeout causes the AP to disassociate the client from the AP.  
When client will attempt to automatically re-associate.  When it does, 
the radius server will give the client a new unicast WEP key.So 
yes, in addition to telling the AP to honor the Session-Timeout, you 
will need to tell Freeradius to send a Session-Timeout.   It looks like 
this: (in your Freeradius users file)

# BDM - for all users, send a session-timeout value of 15 minutes (900 
seconds)
# to the AP.  For Cisco AP's you MUST make sure the AP is configured
# to honor the Session-Timeout value (it doesn't by default)
DEFAULT
Session-Timeout := 900,
Fall-Through = Yes

Put that at the VERY top of your users file.
5. Does my client wlan card and/or card driver need to support WEP 
dynamic rekeying? Or is it the w2k supplicant which handles this? (in 
case you missed it below I am using a NetGear WG511 card).
As long as your card supports 802.1x I believe you're fine.  The 
supplicant will handle everything else.

One think you might do to verify that your clients *are* indeed using a 
WEP key would be to download a wireless sniffer like Kismet (or Kismac 
for Macintosh).  They'll tell you if the traffic on the SSID is WEP 
encrypted or not.   Kismac is a damn useful tool to have around anyway. 
 It's a great way to look for rogue AP's, even if they have hidden 
SSID's.   The config snippets I sent you are from my Cisco 1100 AP, and 
Kismac shows it's SSID as WEP encrypted.

Thanx again in advance
Chris Bradshaw


From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Thu, 20 May 2004 08:54:41 -0600
What kind of cipher suite did you configure on your AP?   For a Cisco 
AP, you should have something like this:

interface Dot11Radio0
 no ip address
 no ip route-cache
! #   Require wep128 encryption
 encryption mode ciphers wep128
 ! # rotate broadcast wep key every 10 minutes
 broadcast-key change 600
! # Create an SSID named "ssid1"
! # Require EAP authentication
! # broadcast the SSID
 ssid ssid1
authentication open eap eap_methods
guest-mode
! ## set the data rates support and/or required by the AP
! ## These are the rates recommended by Cisco for best throughput
! ## for supporting both 802.11.b and 802.11g
 speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 
24.0 36.0 48.0 54.0

You'll also need to configure the AP to honor the Session-Timeout 
value returned by the Radius server (by default

Re: EAP-TLS and WEP key generation

2004-05-20 Thread Chris Bshaw
Hi
Thanx to everyone who has replied so farvery helpful. A few more 
questions.

Bob.I tried your settings below. My client does connect and I can see 
the EAP-TLS exchange via the radiusd debugging info. I also see 
MS-MPPE-Recv-Key and MS-MPPE-Send-Key in the debug output, and in ethereal 
on the client I see the EAPOL packets. However.

1. Again, both ends say security = none (or Encryption = off)
2. A show logging on the AP has a line like this when a client machine 
associates with it:

*Mar  3 01:26:04.607: %DOT11-6-ASSOC: Interface Dot11Radio0, Station   
0009.5b65.d55c Associated KEY_MGMT[NONE]

.is KEY_MGMT[NONE] relevant here?
3. I thought guest-mode meant that anyone could connect without EAP (or 
WEP)am I wrong on this?

4. I set the dynamic rekeying interval to 120 seconds (instead of 600 
seconds as you have below).however, after the first successful 
connection, I never see any transaction on the radiusd server.you 
mention I should configure the AP to honor the Session-Timeout from the 
radius server.should I also set Session-Timeout = 120 on the freeradius 
server and if so where? (eg: in the raddb/attrs file?)...

5. Does my client wlan card and/or card driver need to support WEP dynamic 
rekeying? Or is it the w2k supplicant which handles this? (in case you 
missed it below I am using a NetGear WG511 card).

Thanx again in advance
Chris Bradshaw


From: Bob McCormick <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Thu, 20 May 2004 08:54:41 -0600
What kind of cipher suite did you configure on your AP?   For a Cisco AP, 
you should have something like this:

interface Dot11Radio0
 no ip address
 no ip route-cache
! #   Require wep128 encryption
 encryption mode ciphers wep128
 ! # rotate broadcast wep key every 10 minutes
 broadcast-key change 600
! # Create an SSID named "ssid1"
! # Require EAP authentication
! # broadcast the SSID
 ssid ssid1
authentication open eap eap_methods
guest-mode
! ## set the data rates support and/or required by the AP
! ## These are the rates recommended by Cisco for best throughput
! ## for supporting both 802.11.b and 802.11g
 speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 
36.0 48.0 54.0

You'll also need to configure the AP to honor the Session-Timeout value 
returned by the Radius server (by default, Cisco AP's don't).

! ## Tell the AP to honor the Session-Timeout returned by the Radius 
server
 dot1x reauth-period server

On May 20, 2004, at 3:28 AM, Chris Bshaw wrote:
Hi Andrea
Thanx for the reply. Using ethereal I can see the EAPOL packets on the 
wireless client.

However, if I go into the status monitor for the wireless card, its says 
security = none (would normally say security = wep if I was using static 
non-EAP/TLS wep).

Also, as I mentioned below, the Cisco AP also says that the client is 
'EAP-associated' but that Encryption is off.

However, everything works.I am connected to the WLAN just fine.I 
am just unsure whether or not my connection is encrypted with a WEP key.

I have read some more on this. I am not sure if I understand this 
correctlyso feel free to correct me. Once the mutual authentication is 
complete via EAP, the AP maintains per-client WEP keys which are generated 
once per 1x auth (and can be regenerated after some period of time, e.g. 1 
hr) and a broadcast WEP key which is the same across clients (also can be 
regenerated after some period of time.)

So it seems that the AP is responsible for the WEP keys and their 
rotation..correct?

If so, I currently have WEP encrypyion disabled on my AP, and on my 
client. I had assumed that EAP-TLS took care of everything.

How do you have your client and hostapd configured? Do you have WEP 
enabled?
If so, since the keys are generated dynamically, do you just leave the WEP 
key fields on the client and AP blank?

Thanx in advance
Chris Bradshaw

From: "Andrea G. Forte" <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Wed, 19 May 2004 17:25:12 -0400 (EDT)
Chris,
the whole purpose of 802.1x is to generate a secure auth mechanism and
dynamic re-keying. I have used hostapd together with freeradius and the
key generation as well as the re-keying are automatic. You can set the
re-keying interval as well.
I am not familiar with your setup, but a way to find out, would be to
sniff the traffic and look for EAPOL-Key frames which are exchanged at 
the
end of the auth process.

Hope this can help.
Andrea
On Wed, 19 May 2004, Chris Bshaw wrote:
> Hi
>
> I have created the following setup:
>
> W2K 802.1x supplicant client with NetGear WG511 card
> Cisco Aironet 1200 AP
> RH9 Linux server with a cvs download of freeradius
>
> As per the many docs 

Re: EAP-TLS and WEP key generation

2004-05-20 Thread Alan DeKok
"Htin Hlaing" <[EMAIL PROTECTED]> wrote:
> My understanding was that RADIUS server is responsible generating
> the first set of keys (mppe keys) which is used by the client and AP
> as the master key to generate their dynamic encyrption keys and they
> will do the further generation of keys at "rotation".  So, RADIUS
> server is involved only in the generation of the master key at
> authentication time.  Is this correct?

  No.

  There is no "master" key.  When the current dynamic WEP key expires,
the user re-authenticates, and gets a new dynamic WEP key.

  Alan DeKok.


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-20 Thread Bob McCormick
What kind of cipher suite did you configure on your AP?   For a Cisco 
AP, you should have something like this:

interface Dot11Radio0
 no ip address
 no ip route-cache
! #   Require wep128 encryption
 encryption mode ciphers wep128
 ! # rotate broadcast wep key every 10 minutes
 broadcast-key change 600	
! # Create an SSID named "ssid1"
! # Require EAP authentication
! # broadcast the SSID
 ssid ssid1
authentication open eap eap_methods
guest-mode
! ## set the data rates support and/or required by the AP
! ## These are the rates recommended by Cisco for best throughput
! ## for supporting both 802.11.b and 802.11g
 speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 
36.0 48.0 54.0

You'll also need to configure the AP to honor the Session-Timeout value 
returned by the Radius server (by default, Cisco AP's don't).

! ## Tell the AP to honor the Session-Timeout returned by the 
Radius server
 dot1x reauth-period server

On May 20, 2004, at 3:28 AM, Chris Bshaw wrote:
Hi Andrea
Thanx for the reply. Using ethereal I can see the EAPOL packets on the 
wireless client.

However, if I go into the status monitor for the wireless card, its 
says security = none (would normally say security = wep if I was using 
static non-EAP/TLS wep).

Also, as I mentioned below, the Cisco AP also says that the client is 
'EAP-associated' but that Encryption is off.

However, everything works.I am connected to the WLAN just 
fine.I am just unsure whether or not my connection is encrypted 
with a WEP key.

I have read some more on this. I am not sure if I understand this 
correctlyso feel free to correct me. Once the mutual 
authentication is complete via EAP, the AP maintains per-client WEP 
keys which are generated once per 1x auth (and can be regenerated 
after some period of time, e.g. 1 hr) and a broadcast WEP key which is 
the same across clients (also can be regenerated after some period of 
time.)

So it seems that the AP is responsible for the WEP keys and their 
rotation..correct?

If so, I currently have WEP encrypyion disabled on my AP, and on my 
client. I had assumed that EAP-TLS took care of everything.

How do you have your client and hostapd configured? Do you have WEP 
enabled?
If so, since the keys are generated dynamically, do you just leave the 
WEP key fields on the client and AP blank?

Thanx in advance
Chris Bradshaw

From: "Andrea G. Forte" <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Wed, 19 May 2004 17:25:12 -0400 (EDT)
Chris,
the whole purpose of 802.1x is to generate a secure auth mechanism and
dynamic re-keying. I have used hostapd together with freeradius and 
the
key generation as well as the re-keying are automatic. You can set the
re-keying interval as well.
I am not familiar with your setup, but a way to find out, would be to
sniff the traffic and look for EAPOL-Key frames which are exchanged 
at the
end of the auth process.

Hope this can help.
Andrea
On Wed, 19 May 2004, Chris Bshaw wrote:
> Hi
>
> I have created the following setup:
>
> W2K 802.1x supplicant client with NetGear WG511 card
> Cisco Aironet 1200 AP
> RH9 Linux server with a cvs download of freeradius
>
> As per the many docs on the subject, I have successfully setup
> EAP-TLS.however, I can't tell if WEP keys are being generated.
>
> When I look on the web admin page of the Aironet 1200 the 
associations list
> says that my W2K client is EAP-associated (so that works OK) but 
Encryption
> is marked as 'none'.
>
> and I have looked in the radiusd logs but can't work out 
whether WEP
> keys are being generated. I know that the session key is used to 
generate
> the keys, so perhaps something in the logs (without the word WEP in 
it) is
> responsible for WEP key generation.
>
> I thought that if you used EAP-TLS then you automatically got WEP 
keys
> generated? Is this true?
> If so how can I confirm that this is happening (other than trying 
to sniff
> the traffic off the air to see if it is encrypted ;-)...
>
> If this isn't true, does this mean that it is possible to use 
EAP-TLS
> without WEP key generation?
>
> If so, are there extra steps I need to follow to activate WEP key 
generation
> as part of EAP-TLS?
>
> Sorry if some of these questions seem a bit strangeI am a bit 
new to
> 802.1x and EAP
>
> Thanx in advance for any help.
>
> Chris Bradshaw
>
> _
> Help STOP SPAM with the new MSN 8 and get 2 months FREE*
> http://join.msn.com/?page=features/junkmail
>
>
> -
> List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html
>

-
List info/subscribe

RE: EAP-TLS and WEP key generation

2004-05-20 Thread Htin Hlaing
Hi Alan,

 
> > So it seems that the AP is responsible for the WEP keys and their
> > rotation..correct?
> 
>   Yes and no.  It's responsible for using the keys, and asking for
> their rotation, but the RADIUS server generates the keys.
> 

[Htin Hlaing] My understanding was that RADIUS server is responsible
generating the first set of keys (mppe keys) which is used by the client
and AP as the master key to generate their dynamic encyrption keys and
they will do the further generation of keys at "rotation".  So, RADIUS
server is involved only in the generation of the master key at
authentication time.  Is this correct?  

Thanks,
Htin

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-20 Thread Andrea G. Forte
Chris,

you do not have to worry about setting the keys manually. The EAP-tls
takes care of it. You have to set the keys manually, or better use static
keys, only if you wish to use WEP and nothing else. If you use WPA then
the Radius server takes care of it together with the authenticator.
Once authenticated by using EAP-tls, if you sniff your traffic you will
see all WEP data frames.

Andrea

On Thu, 20 May 2004, Chris Bshaw wrote:

> Hi Andrea
>
> Thanx for the reply. Using ethereal I can see the EAPOL packets on the
> wireless client.
>
> However, if I go into the status monitor for the wireless card, its says
> security = none (would normally say security = wep if I was using static
> non-EAP/TLS wep).
>
> Also, as I mentioned below, the Cisco AP also says that the client is
> 'EAP-associated' but that Encryption is off.
>
> However, everything works.I am connected to the WLAN just fine.I am
> just unsure whether or not my connection is encrypted with a WEP key.
>
> I have read some more on this. I am not sure if I understand this
> correctlyso feel free to correct me. Once the mutual authentication is
> complete via EAP, the AP maintains per-client WEP keys which are generated
> once per 1x auth (and can be regenerated after some period of time, e.g. 1
> hr) and a broadcast WEP key which is the same across clients (also can be
> regenerated after some period of time.)
>
> So it seems that the AP is responsible for the WEP keys and their
> rotation..correct?
>
> If so, I currently have WEP encrypyion disabled on my AP, and on my client.
> I had assumed that EAP-TLS took care of everything.
>
> How do you have your client and hostapd configured? Do you have WEP enabled?
> If so, since the keys are generated dynamically, do you just leave the WEP
> key fields on the client and AP blank?
>
> Thanx in advance
>
> Chris Bradshaw
>
>
> >From: "Andrea G. Forte" <[EMAIL PROTECTED]>
> >Reply-To: [EMAIL PROTECTED]
> >To: [EMAIL PROTECTED]
> >Subject: Re: EAP-TLS and WEP key generation
> >Date: Wed, 19 May 2004 17:25:12 -0400 (EDT)
> >
> >Chris,
> >
> >the whole purpose of 802.1x is to generate a secure auth mechanism and
> >dynamic re-keying. I have used hostapd together with freeradius and the
> >key generation as well as the re-keying are automatic. You can set the
> >re-keying interval as well.
> >I am not familiar with your setup, but a way to find out, would be to
> >sniff the traffic and look for EAPOL-Key frames which are exchanged at the
> >end of the auth process.
> >
> >Hope this can help.
> >Andrea
> >
> >On Wed, 19 May 2004, Chris Bshaw wrote:
> >
> > > Hi
> > >
> > > I have created the following setup:
> > >
> > > W2K 802.1x supplicant client with NetGear WG511 card
> > > Cisco Aironet 1200 AP
> > > RH9 Linux server with a cvs download of freeradius
> > >
> > > As per the many docs on the subject, I have successfully setup
> > > EAP-TLS.however, I can't tell if WEP keys are being generated.
> > >
> > > When I look on the web admin page of the Aironet 1200 the associations
> >list
> > > says that my W2K client is EAP-associated (so that works OK) but
> >Encryption
> > > is marked as 'none'.
> > >
> > > and I have looked in the radiusd logs but can't work out whether WEP
> > > keys are being generated. I know that the session key is used to
> >generate
> > > the keys, so perhaps something in the logs (without the word WEP in it)
> >is
> > > responsible for WEP key generation.
> > >
> > > I thought that if you used EAP-TLS then you automatically got WEP keys
> > > generated? Is this true?
> > > If so how can I confirm that this is happening (other than trying to
> >sniff
> > > the traffic off the air to see if it is encrypted ;-)...
> > >
> > > If this isn't true, does this mean that it is possible to use EAP-TLS
> > > without WEP key generation?
> > >
> > > If so, are there extra steps I need to follow to activate WEP key
> >generation
> > > as part of EAP-TLS?
> > >
> > > Sorry if some of these questions seem a bit strangeI am a bit new to
> > > 802.1x and EAP
> > >
> > > Thanx in advance for any help.
> > >
> > > Chris Bradshaw
> > >
> > > _
> > > Help STOP SPAM with the new MSN 8 and get 2 months FREE*
> > > http://join.msn.com/?page=features/junkmail
> > >
> > >
> > > -
> > > List info/subscribe/unsubscribe? See
> >http://www.freeradius.org/list/users.html
> > >
> >
> >-
> >List info/subscribe/unsubscribe? See
> >http://www.freeradius.org/list/users.html
>
> _
> Tired of spam? Get advanced junk mail protection with MSN 8.
> http://join.msn.com/?page=features/junkmail
>
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
>

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-20 Thread Alan DeKok
"Chris Bshaw" <[EMAIL PROTECTED]> wrote:
> However, everything works.I am connected to the WLAN just fine.I am 
> just unsure whether or not my connection is encrypted with a WEP key.

  Run the server in debugging mode.  If you see it sending "MPPE" keys
to the AP, then your wireless traffic is encrypted.

> I have read some more on this. I am not sure if I understand this 
> correctlyso feel free to correct me. Once the mutual authentication is 
> complete via EAP, the AP maintains per-client WEP keys which are generated 
> once per 1x auth (and can be regenerated after some period of time, e.g. 1 
> hr) and a broadcast WEP key which is the same across clients (also can be 
> regenerated after some period of time.)

  Yes.

> So it seems that the AP is responsible for the WEP keys and their 
> rotation..correct?

  Yes and no.  It's responsible for using the keys, and asking for
their rotation, but the RADIUS server generates the keys.

> If so, I currently have WEP encrypyion disabled on my AP, and on my client. 
> I had assumed that EAP-TLS took care of everything.

  Yes.

  Alan DeKok.


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-20 Thread Chris Bshaw
Hi Andrea
Thanx for the reply. Using ethereal I can see the EAPOL packets on the 
wireless client.

However, if I go into the status monitor for the wireless card, its says 
security = none (would normally say security = wep if I was using static 
non-EAP/TLS wep).

Also, as I mentioned below, the Cisco AP also says that the client is 
'EAP-associated' but that Encryption is off.

However, everything works.I am connected to the WLAN just fine.I am 
just unsure whether or not my connection is encrypted with a WEP key.

I have read some more on this. I am not sure if I understand this 
correctlyso feel free to correct me. Once the mutual authentication is 
complete via EAP, the AP maintains per-client WEP keys which are generated 
once per 1x auth (and can be regenerated after some period of time, e.g. 1 
hr) and a broadcast WEP key which is the same across clients (also can be 
regenerated after some period of time.)

So it seems that the AP is responsible for the WEP keys and their 
rotation..correct?

If so, I currently have WEP encrypyion disabled on my AP, and on my client. 
I had assumed that EAP-TLS took care of everything.

How do you have your client and hostapd configured? Do you have WEP enabled?
If so, since the keys are generated dynamically, do you just leave the WEP 
key fields on the client and AP blank?

Thanx in advance
Chris Bradshaw

From: "Andrea G. Forte" <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: EAP-TLS and WEP key generation
Date: Wed, 19 May 2004 17:25:12 -0400 (EDT)
Chris,
the whole purpose of 802.1x is to generate a secure auth mechanism and
dynamic re-keying. I have used hostapd together with freeradius and the
key generation as well as the re-keying are automatic. You can set the
re-keying interval as well.
I am not familiar with your setup, but a way to find out, would be to
sniff the traffic and look for EAPOL-Key frames which are exchanged at the
end of the auth process.
Hope this can help.
Andrea
On Wed, 19 May 2004, Chris Bshaw wrote:
> Hi
>
> I have created the following setup:
>
> W2K 802.1x supplicant client with NetGear WG511 card
> Cisco Aironet 1200 AP
> RH9 Linux server with a cvs download of freeradius
>
> As per the many docs on the subject, I have successfully setup
> EAP-TLS.however, I can't tell if WEP keys are being generated.
>
> When I look on the web admin page of the Aironet 1200 the associations 
list
> says that my W2K client is EAP-associated (so that works OK) but 
Encryption
> is marked as 'none'.
>
> and I have looked in the radiusd logs but can't work out whether WEP
> keys are being generated. I know that the session key is used to 
generate
> the keys, so perhaps something in the logs (without the word WEP in it) 
is
> responsible for WEP key generation.
>
> I thought that if you used EAP-TLS then you automatically got WEP keys
> generated? Is this true?
> If so how can I confirm that this is happening (other than trying to 
sniff
> the traffic off the air to see if it is encrypted ;-)...
>
> If this isn't true, does this mean that it is possible to use EAP-TLS
> without WEP key generation?
>
> If so, are there extra steps I need to follow to activate WEP key 
generation
> as part of EAP-TLS?
>
> Sorry if some of these questions seem a bit strangeI am a bit new to
> 802.1x and EAP
>
> Thanx in advance for any help.
>
> Chris Bradshaw
>
> _
> Help STOP SPAM with the new MSN 8 and get 2 months FREE*
> http://join.msn.com/?page=features/junkmail
>
>
> -
> List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html
>

-
List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html
_
Tired of spam? Get advanced junk mail protection with MSN 8. 
http://join.msn.com/?page=features/junkmail

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAP-TLS and WEP key generation

2004-05-19 Thread Andrea G. Forte
Chris,

the whole purpose of 802.1x is to generate a secure auth mechanism and
dynamic re-keying. I have used hostapd together with freeradius and the
key generation as well as the re-keying are automatic. You can set the
re-keying interval as well.
I am not familiar with your setup, but a way to find out, would be to
sniff the traffic and look for EAPOL-Key frames which are exchanged at the
end of the auth process.

Hope this can help.
Andrea

On Wed, 19 May 2004, Chris Bshaw wrote:

> Hi
>
> I have created the following setup:
>
> W2K 802.1x supplicant client with NetGear WG511 card
> Cisco Aironet 1200 AP
> RH9 Linux server with a cvs download of freeradius
>
> As per the many docs on the subject, I have successfully setup
> EAP-TLS.however, I can't tell if WEP keys are being generated.
>
> When I look on the web admin page of the Aironet 1200 the associations list
> says that my W2K client is EAP-associated (so that works OK) but Encryption
> is marked as 'none'.
>
> and I have looked in the radiusd logs but can't work out whether WEP
> keys are being generated. I know that the session key is used to generate
> the keys, so perhaps something in the logs (without the word WEP in it) is
> responsible for WEP key generation.
>
> I thought that if you used EAP-TLS then you automatically got WEP keys
> generated? Is this true?
> If so how can I confirm that this is happening (other than trying to sniff
> the traffic off the air to see if it is encrypted ;-)...
>
> If this isn't true, does this mean that it is possible to use EAP-TLS
> without WEP key generation?
>
> If so, are there extra steps I need to follow to activate WEP key generation
> as part of EAP-TLS?
>
> Sorry if some of these questions seem a bit strangeI am a bit new to
> 802.1x and EAP
>
> Thanx in advance for any help.
>
> Chris Bradshaw
>
> _
> Help STOP SPAM with the new MSN 8 and get 2 months FREE*
> http://join.msn.com/?page=features/junkmail
>
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
>

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


EAP-TLS and WEP key generation

2004-05-19 Thread Chris Bshaw
Hi
I have created the following setup:
W2K 802.1x supplicant client with NetGear WG511 card
Cisco Aironet 1200 AP
RH9 Linux server with a cvs download of freeradius
As per the many docs on the subject, I have successfully setup 
EAP-TLS.however, I can't tell if WEP keys are being generated.

When I look on the web admin page of the Aironet 1200 the associations list 
says that my W2K client is EAP-associated (so that works OK) but Encryption 
is marked as 'none'.

and I have looked in the radiusd logs but can't work out whether WEP 
keys are being generated. I know that the session key is used to generate 
the keys, so perhaps something in the logs (without the word WEP in it) is 
responsible for WEP key generation.

I thought that if you used EAP-TLS then you automatically got WEP keys 
generated? Is this true?
If so how can I confirm that this is happening (other than trying to sniff 
the traffic off the air to see if it is encrypted ;-)...

If this isn't true, does this mean that it is possible to use EAP-TLS 
without WEP key generation?

If so, are there extra steps I need to follow to activate WEP key generation 
as part of EAP-TLS?

Sorry if some of these questions seem a bit strangeI am a bit new to 
802.1x and EAP

Thanx in advance for any help.
Chris Bradshaw
_
Help STOP SPAM with the new MSN 8 and get 2 months FREE*  
http://join.msn.com/?page=features/junkmail

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html