Hi
I have installed FreeRadius with EAP/TLS according
to this howto http://www.impossiblereflex.com/8021x/eap-tls-HOWTO.htm
I have carefully, step by step, analysed the
scripts and my settings, but keep getting this output :
rlm_eap: EAP_TYPE - tls
rlm_eap: processing type tls rlm_eap_tls: Length Included undefined: before/accept initialization TLS_accept: before/accept initialization <<< TLS 1.0 Handshake [length 0041], ClientHello TLS_accept: SSLv3 read client hello
A
>>> TLS 1.0 Handshake [length 004a], ServerHello TLS_accept: SSLv3 write server hello
A
>>> TLS 1.0 Handshake [length 06f2], Certificate TLS_accept: SSLv3 write certificate
A
>>> TLS 1.0 Handshake [length 00cc], CertificateRequest TLS_accept: SSLv3 write certificate request
A
TLS_accept: SSLv3 flush data TLS_accept:error in SSLv3 read client certificate A rlm_eap_tls: SSL_read Error Error code is ..... 2 SSL Error ..... 2 modcall[authenticate]: module "eap" returns ok modcall: group authenticate returns ok Sending Access-Challenge of id 34 to 192.168.1.2:1029 EAP-Message = "[EMAIL PROTECTED]/B\026\0239];\222\0266\003\236\237\275\371\275t \230\333\364|\262;\263\022,\367%\241\355-O\r\242W\3714\357\366\204y;[EMAIL PROTECTED]" EAP-Message = "tive1\0360\034\006\003U\004\003\023\025Funnybone Wireless [EMAIL PROTECTED] Wireless [EMAIL PROTECTED]" EAP-Message = "0\r\006\t*\206H\206\367\r\001\001\001\005\000\003\201\215\0000\201\211\002\201\201\000\323\3438\r;\362\352\030^\000\310w\373\004\202*\261+k!\324\323\257\351\223,\277k\252\347\245\367\263\261\335W\361Q(6\335\266\275&\353\265\224\311\211\307\372\231\314\314*\212\351\037\271\356\016\257\362aK+\337\231*\2714\3453\032\006\252\251}\306\235\275M\001\324M\305\245=?\356\325\017\315c\236\235\302\260\244\004$\236s\227*\0374A\027\312u\350ez\347\263\330\230\252\263ds\354QD\206\354\235\002\003\001\000\001\243\0270\0250" EAP-Message = "\010\004\t\3537>%\344j2}\227\364\306\364\306V\301s\315 +\351O\245\354\262\267x\240Dh\350\272\217V&\236\003\251MkU\345\366\t\376\227\344\220~\036&\014L\3073J#;\310}z[\306\367\310\364P;\013\242\363\025\262\242}.\325\000\004\n0\202\004\0060\202\003o\240\003\002\001\002\002\001\0000\r\006\t*\206H\206\367\r\001\001\004\005\0000\201\2711\0130\t\006\003U\004\006\023\002DK1\0240\022\006\003U\004\010\023\013Connecticut1\0170\r\006\003U\004\007\023\006Canton1 0\036\006\003U\004\n\023\027Vivendi Universal Games1\036" EAP-Message = "ne Wireless CA1!0\037\006\t*\206H\206\367\r" Message-Authenticator = 0x00000000000000000000000000000000 State = 0xc5a77cd5cb16d97dd3921fac35138fcda535bc40922c84e496945a62dc0a8df2b0208183 Finished request 7 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.1.2:1029, id=35, length=107 User-Name = "Funnybone Wireless CA" EAP-Message = "\002\003\000\006\r" State = 0xc5a77cd5cb16d97dd3921fac35138fcda535bc40922c84e496945a62dc0a8df2b0208183 Message-Authenticator = 0x1808a12977364804b4c8cd3583f0e83a modcall: entering group authorize Invalid operator for item NAS-IP-Address: reverting to '==' modcall[authorize]: module "preprocess" returns ok modcall[authorize]: module "eap" returns updated rlm_realm: No '@' in User-Name = "Funnybone Wireless CA", looking up realm NULL rlm_realm: No such realm NULL modcall[authorize]: module "suffix" returns noop users: Matched Funnybone Wireless CA at 96 modcall[authorize]: module "files" returns ok modcall: group authorize returns updated rad_check_password: Found Auth-Type EAP auth: type "EAP" modcall: entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - tls rlm_eap: processing type tls rlm_eap_tls: Received EAP-TLS ACK message modcall[authenticate]: module "eap" returns ok modcall: group authenticate returns ok Sending Access-Challenge of id 35 to 192.168.1.2:1029 EAP-Message = "[EMAIL PROTECTED] 0\036\006\003U\004\n\023\027Vivendi Universal Games1\0360\034\006\003U\004\013\023\025Funnybone Interactive1\0360\034\006\003U\004\003\023\025Funnybone Wireless [EMAIL PROTECTED]" EAP-Message = "m0\201\2370\r\006\t*\206H\206\367\r\001\001\001\005\000\003\201\215\0000\201\211\002\201\201\000\316\253\250\317\2337\300\313\201\220\313u\340D\025\rd}+P\036gZ\246\373\267\233x\323\277\204e\374o\036\013\347hf\273]|2\020\335\316\316\321^u*\265\225\360\325H<t\226\312m\000!gnQ\275\340d\207\365\335\317a!4\201|X\005\337\307\021Y\311\323b\231*\016bR'E\032,\247\212\333\356/\332m}\253\200\377\214\301a\nZ\rY\254\257JgZ\343\376\364\240\031\221h\002\003\001\000\001\243\202\001\0320\202\001\0260\035\006\003U\035\016" EAP-Message = "\003U\004\006\023\002DK1\0240\022\006\003U\004\010\023\013Connecticut1\0170\r\006\003U\004\007\023\006Canton1 0\036\006\003U\004\n\023\027Vivendi Universal Games1\0360\034\006\003U\004\013\023\025Funnybone Interactive1\0360\034\006\003U\004\003\023\025Funnybone Wireless [EMAIL PROTECTED]/\365k\2760Q\267" EAP-Message = "\264oPJ\366\363U\020\247U\310\352St\2072c\273\310\021C\3275\262b\322\277k\202\230\272y\215\256\tN\237\212\237\027\236Hl\206\264\2753\255ZU\377\336\361\237\013\253\214\223\205\237\375\240\002Q\200rf9Fp\022\035)\253j\374G\017\001\366\234\364\245c!#\302:r~\230\243\026\003\001\000\314\r\000\000\304\003\001\002\005\000\276\000\2740\201\2711\0130\t\006\003U\004\006\023\002DK1\0240\022\006\003U\004\010\023\013Connecticut1\0170\r\006\003U\004\007\023\006Canton1 0\036\006\003U\004\n\023\027Vivendi Universal Games1" EAP-Message = "ireless CA1!0\037\006\t*\206H\206\367\r\001\t\001\026" Message-Authenticator = 0x00000000000000000000000000000000 State = 0x899de4e41bd81238920be4d238876294a535bc40f7de03931624dcc5281ce1c963595db6 Finished request 8 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.1.2:1029, id=36, length=107 User-Name = "Funnybone Wireless CA" EAP-Message = "\002\004\000\006\r" State = 0x899de4e41bd81238920be4d238876294a535bc40f7de03931624dcc5281ce1c963595db6 Message-Authenticator = 0xcbbc46f4f191c047f8ca1706fc5f2880 modcall: entering group authorize Invalid operator for item NAS-IP-Address: reverting to '==' modcall[authorize]: module "preprocess" returns ok modcall[authorize]: module "eap" returns updated rlm_realm: No '@' in User-Name = "Funnybone Wireless CA", looking up realm NULL rlm_realm: No such realm NULL modcall[authorize]: module "suffix" returns noop users: Matched Funnybone Wireless CA at 96 modcall[authorize]: module "files" returns ok modcall: group authorize returns updated rad_check_password: Found Auth-Type EAP auth: type "EAP" modcall: entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - tls rlm_eap: processing type tls rlm_eap_tls: Received EAP-TLS ACK message modcall[authenticate]: module "eap" returns ok modcall: group authenticate returns ok Sending Access-Challenge of id 36 to 192.168.1.2:1029 EAP-Message = "[EMAIL PROTECTED]" Message-Authenticator = 0x00000000000000000000000000000000 State = 0x875e23c678606049d752d9df2d23b99ca535bc403010e521091a25d7ad0d48bdca9a385d Finished request 9 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.1.2:1029, id=37, length=1218 User-Name = "Funnybone Wireless CA" EAP-Message = "\002\005\004U\r\200\000\000\004K\026\003\001\004\033\013\000\003\013\000\003\010\000\003\0050\202\003\0010\202\002j\240\003\002\001\002\002\001\0010\r\006\t*\206H\206\367\r\001\001\004\005\0000\201\2711\0130\t\006\003U\004\006\023\002DK1\0240\022\006\003U\004\010\023\013Connecticut1\0170\r\006\003U\004\007\023\006Canton1 0\036\006\003U\004\n\023\027Vivendi Universal Games1\0360\034\006\003U\004\013\023\025Funnybone Interactive1\0360\034\006\003U\004\003\023\025Funnybone Wireless CA1!0\037\006\t*\206H\206\367" EAP-Message = "1175818Z\027\r050531175818Z0\201\2711\0130\t\006\003U\004\006\023\002DK1\0240\022\006\003U\004\010\023\013Connecticut1\0170\r\006\003U\004\007\023\006Canton1 0\036\006\003U\004\n\023\027Vivendi Universal Games1\0360\034\006\003U\004\013\023\025Funnybone Interactive1\0360\034\006\003U\004\003\023\025Funnybone Wireless [EMAIL PROTECTED]" EAP-Message = "\324\006\233;_%\002p\300n{\271B\022F)\033\\\236v\226J\221\211\2319\345\0174\252\335\267\032\016\222\250\344\312|\347\273\242\216>w^W\356\033\336\270\326\374\303f\304Q\242\263\215\313m\377K\332\022\344\\333\022\233\272\221\237\226\211_\024\373\212 $:\351\375\t\317\223\262N^\3267\322p\\\352\217h#\313]\334\022\206a4\351\201\361\274\275\255\227\002\003\001\000\001\243\0270\0250\023\006\003U\035%\004\0140\n\006\010+\006\001\005\005\007\003\0020\r\006\t*\206H\206\367\r\001\001\004\005\000\003\201\201\000p\037" EAP-Message = "\232\201\247\243*\234\tkk\323\325\214\341\212\007\243\342/\255.\371G\353UFp\004\010\211\000\315K\246T\313:[EMAIL PROTECTED] \032\262\017\321\3446\202\306\366\214s/O\314\200U\001\335`\204nm\374\362\307\205>\006PU\271\013#\225DKG\271\017\000\000\202\000" EAP-Message = "\311\034\362S\326\362\305\255\347(1\203\301\260\337\0362L\032^\016\3468\274\276.\034M\305}\277\372\24\022\236\215\375+\341\3139\232\201=\007e\304 U1ZF>\024\003\001\000\001\001\026\003\001\000 \310\237\020R\005\262\212mp\250k\t\023\264\267\253X0\310M\215\316\370\271(\277\223\004$\013\343\031" State = 0x875e23c678606049d752d9df2d23b99ca535bc403010e521091a25d7ad0d48bdca9a385d Message-Authenticator = 0xf728ea5e330aaa6a5185a020f259a2d9 modcall: entering group authorize Invalid operator for item NAS-IP-Address: reverting to '==' modcall[authorize]: module "preprocess" returns ok modcall[authorize]: module "eap" returns updated rlm_realm: No '@' in User-Name = "Funnybone Wireless CA", looking up realm NULL rlm_realm: No such realm NULL modcall[authorize]: module "suffix" returns noop users: Matched Funnybone Wireless CA at 96 modcall[authorize]: module "files" returns ok modcall: group authorize returns updated rad_check_password: Found Auth-Type EAP auth: type "EAP" modcall: entering group authenticate rlm_eap: Multiple EAP_Message attributes found rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - tls rlm_eap: processing type tls rlm_eap_tls: Length Included <<< TLS 1.0 Handshake [length 030f], Certificate --> verify error:num=18:self signed
certificate
chain-depth=0, error=18 --> User-Name = Funnybone Wireless CA --> BUF-Name = Funnybone Wireless CA --> subject = /C=DK/ST=Connecticut/L=Canton/O=Vivendi Universal Games/OU=Funnybone Interactive/CN=Funnybone Wireless CA/[EMAIL PROTECTED] --> issuer = /C=DK/ST=Connecticut/L=Canton/O=Vivendi Universal Games/OU=Funnybone Interactive/CN=Funnybone Wireless CA/[EMAIL PROTECTED] --> verify return:0 >>> TLS 1.0 Alert [length 0002], fatal unknown_ca TLS Alert write:fatal:unknown
CA
TLS_accept:error in SSLv3 read client certificate B rlm_eap_tls: SSL_read Error 11587:error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no certificate returned:s3_srvr.c:2386: Error code is ..... 5 Error in SSL ..... 5 modcall[authenticate]: module "eap" returns ok modcall: group authenticate returns ok Sending Access-Challenge of id 37 to 192.168.1.2:1029 EAP-Message = "\001\006\000\021\r\200\000\000\000\007\025\003\001\000\002\0020" Message-Authenticator = 0x00000000000000000000000000000000 State = 0x88011a3569c0a1eab77e7a88d47e0170a535bc404476f7c7e448f762d5135c8dc14e5ddf Finished request 10 Going to the next request Waking up in 6 seconds... rad_recv: Access-Request packet from host 192.168.1.2:1029, id=38, length=107 User-Name = "Funnybone Wireless CA" EAP-Message = "\002\006\000\006\r" State = 0x88011a3569c0a1eab77e7a88d47e0170a535bc404476f7c7e448f762d5135c8dc14e5ddf Message-Authenticator = 0x004f5d033b34d4d130734db451b73cc5 modcall: entering group authorize Invalid operator for item NAS-IP-Address: reverting to '==' modcall[authorize]: module "preprocess" returns ok modcall[authorize]: module "eap" returns updated rlm_realm: No '@' in User-Name = "Funnybone Wireless CA", looking up realm NULL rlm_realm: No such realm NULL modcall[authorize]: module "suffix" returns noop users: Matched Funnybone Wireless CA at 96 modcall[authorize]: module "files" returns ok modcall: group authorize returns updated rad_check_password: Found Auth-Type EAP auth: type "EAP" modcall: entering group authenticate rlm_eap: Request found, released from the list rlm_eap: EAP_TYPE - tls rlm_eap: processing type tls rlm_eap_tls: Received EAP-TLS ACK message modcall[authenticate]: module "eap" returns ok modcall: group authenticate returns ok Delaying request 11 for 1 seconds Finished request 11 Going to the next request Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 6 ID 33 with timestamp 40bc35a5 Cleaning up request 7 ID 34 with timestamp 40bc35a5 Cleaning up request 8 ID 35 with timestamp 40bc35a5 Cleaning up request 9 ID 36 with timestamp 40bc35a5 Cleaning up request 10 ID 37 with timestamp 40bc35a5 Sending Access-Reject of id 38 to 192.168.1.2:1029 EAP-Message = "\004\006\000\004" Message-Authenticator = 0x00000000000000000000000000000000 Cleaning up request 11 ID 38 with timestamp 40bc35a5 Nothing to do. Sleeping until we see a request. Any thaughts on how to resolve this problem
??
Regards
Jacob
|