Hello,

I've solved the problem with OpenLDAP, PEAP-MSCHAPv2, WPA2-Enterprise and 
non-clear-text stored passwords.

Here is a solution -- 19-May-2011, Radiator v4.7, CentOS 5.6x32, OpenLDAP slapd 
2.3.43, Samba 3.0.33-3.29.el5_6.2:
When we work with wireless controller (in our case, Trapeze MX-200) and want to 
use WPA2-Enterprise scheme to encrypt a data we need to organize authentication 
with any available users database (Active Directory, LDAP, MySQL etc.). If we 
store our passwords in MySQL or LDAP in clear text form we don't have any 
problem to setup Radius as written in goodies/eap_peap_mschap_proxy.cfg file. 
In Trapeze MX there is a possibility to use PEAP-Offload scheme when MX itself 
does all PEAP-tunnel job and in Radius we receive already 
ConvertedFromEAPMSCHAPV2 request so radius.cfg will look very simple in case we 
use LDAP:

# cat radius.cfg
<Client 1.1.1.2>
        Secret  secret
        DupInterval 0
        IdenticalClients 1.1.1.3,1.1.1.4
</Client>
<Handler>
        <AuthBy LDAP2>
                NoDefault
                Host            ldap-server.local
                Port            389
                AuthDN          cn=root,dc=local
                AuthPassword    root-password
                BaseDN          dc=local
                Scope           sub
                Version         3
                PasswordAttr    userPassword
        </AuthBy>
</Handler>

But when we want to use (and it's my case) LDAP server that stores passwords in 
any crypted form (CRYPT, SHA, MD5 etc) we meet a problem. We, for example, use 
{crypt} to store the passwords. In this case we can't decrypt stored passwords. 
After a week of searches and experiments I've found an article 
http://vuksan.com/linux/dot1x/802-1x-LDAP.html that gave me an idea about 
NThash. So I've extended LDAP scheme with Samba attributes and then tried to 
authenticate with a small change in radius.cfg:

PasswordAttr    sambaNTPassword

And it didn't work as well.
Then after investigations with our LDAP and Linux specialists and after reading 
of source code of Radiator we've found that Radiator needs to know that he 
receives NThash and not clear-text. In the source code we saw that Radiator 
looks for {nthash} before password that he receives, i.e. usually from LDAP he 
receives:

#cat /var/log/radius/logfile
Thu May 19 14:28:08 2011: DEBUG: LDAP got sambaNTPassword: 
FD5117F72B251C2CB9A7A6669B8BD0A6

and Radiator doesn't know that this is NThash. So I've added:

TranslatePasswordHook sub {return "{nthash}$_[0]";}

In appropriate <AuthBy LDAP2>. So below is a full radius.cfg that works with 
PEAP-MSCHAPv2, WPA-2 and OpenLDAP:

# cat radius.cfg
<Client 1.1.1.2>
        Secret  test
        DupInterval 0
        IdenticalClients 1.1.11.3,1.1.1.4
</Client>
<Handler>
        <AuthBy LDAP2>
                NoDefault
                TranslatePasswordHook sub {return "{nthash}$_[0]";}
                Host            ldap-server.local
                Port            389
                AuthDN          cn=root,dc=local
                AuthPassword    root-password
                BaseDN          dc=local
                Scope           sub
                Version         3
                PasswordAttr    sambaNTPassword
        </AuthBy>
</Handler>

With this file and Samba extension to LDAP scheme PEAP-MSCHAPv2 and WPA-2 begin 
to work. Only drawback is every user needs to renew his password to update LDAP 
with new " sambaNTPassword " field because there is no way to convert {crypt} 
LDAP passwords to NThash (as minimum, I don't know). But it's a simple 
technical task for a user that wants to connect to our encrypted Wireless 
network.
And I think that we personally don't need to add all Samba scheme to our 
working LDAP only one field that will contain NThash.

One more thing.
When you use Trapeze MX or any other wireless controller as External 
Authentication scheme, i.e. all work is executed on Radiator side (PEAP too), 
you need to use a big radius.cfg:

# cat radius.cfg
<Client 1.1.1.2>
        Secret  test
        DupInterval 0
        IdenticalClients 1.1.11.3,1.1.1.4
</Client>
<Handler ConvertedFromEAPMSCHAPV2=1>
        <AuthBy LDAP2>
                NoDefault
                TranslatePasswordHook sub {return "{nthash}$_[0]";}
                Host            ldap-server.local
                Port            389
                AuthDN          cn=root,dc=local
                AuthPassword    root-password
                BaseDN          dc=local
                Scope           sub
                Version         3
                PasswordAttr    sambaNTPassword
        </AuthBy>
</Handler>
<Handler TunnelledByPEAP=1>
        PasswordLogFileName /var/log/radius/tunneledByPEAP_passwords
        <AuthBy FILE>
                EAPType MSCHAP-V2
                EAP_PEAP_MSCHAP_Convert 1
        </AuthBy>
</Handler>
<Handler>
        <AuthBy FILE>
                Filename %D/users
                AutoMPPEKeys
                EAPType PEAP,MSCHAP-V2
                EAPTLS_CAFile %D/certificates/demoCA/cacert.pem
                EAPTLS_CertificateFile %D/certificates/cert-srv.pem
                EAPTLS_CertificateType PEM
                EAPTLS_PrivateKeyFile %D/certificates/cert-srv.pem
                EAPTLS_PrivateKeyPassword whatever
                EAPTLS_MaxFragmentSize 1024
                EAPTLS_PEAPVersion 0
        </AuthBy>
</Handler>

And you need to build file %D/users that simply contains list of all users that 
can connect to your wireless network:

#cat users:
user1
user2
user3

In general, you can easily retrieve this list from your LDAP.
And you will need to install trusted certificates and keys instead of keys and 
certificates that Radiator gave us for test purposes.

Thanks to Heikki Vatiainen (Radiator) for TranslatePasswordHook idea and to 
Vladimir Vuksan (FreeRadius) for NThash idea.

Roman Safonov
Networking Engineer
TCC, Technion, Haifa
Email: rom...@cc.technion.ac.il


-----Original Message-----
From: Heikki Vatiainen [mailto:h...@open.com.au] 
Sent: Monday, May 16, 2011 3:08 PM
To: ספונוב רומן
Cc: radiator@open.com.au
Subject: Re: [RADIATOR] LDAP, crypt, hook

On 05/16/2011 11:14 AM, rom...@cc.technion.ac.il wrote:

Hello Roman,

> We use Radiator for authentication WPA2 wireless via LDAP.
> 
> Users passwords are stored inside LDAP in CRYPT form and we have a 
> possibility to receive the same CRYPTed string from a clear-text 
> password by executing
> 
> crypt <crypted-string-from-LDAP> <clear-text-from NAS-Request>
> 
> in perl script.

See the reference manual for version 4.8 (ref.pdf) and there AuthBy
LDAP2 and sections "5.37.11 PasswordAttr" and "5.37.12 EncryptedPasswordAttr". 
If your crypt passwords do not start with {crypt} you can use something like 
this:

TranslatePasswordHook sub { return "{crypt}$_[0]"; }

See also goodies/ldap.cfg for an LDAP authentication configuration example.

> I.e. first according to User-Name in NAS-request we need to receive an 
> answer from LDAP, then execute script and then we need to compare the 
> resulting crypted string with <crypted-string-from-LDAP> and only 
> after all this send a reply to NAS.
> 
> But we don't know how can it be done in Radiator conf-file, what hook 
> we need to use to achieve the result.

Radiator should be able to do what you require when you configure AuthBy
LDAP2 and configure appropriate PasswordAttr or EncryptedPasswordAttr

See also ref.pdf sections "13.1.1 User-Password, Password" and "13.1.2 
Encrypted-Password" for more about how Radiator interprets various password 
formats.


--
Heikki Vatiainen <h...@open.com.au>

Radiator: the most portable, flexible and configurable RADIUS server anywhere. 
SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald, Platypus, Freeside, 
TACACS+, PAM, external, Active Directory, EAP, TLS, TTLS, PEAP, TNC, WiMAX, 
RSA, Vasco, Yubikey, MOTP, HOTP, TOTP, DIAMETER etc. Full source on Unix, 
Windows, MacOSX, Solaris, VMS, NetWare etc.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator

Reply via email to