On 12/20/2011 06:06 AM, Indrajaya Pitra Perdana wrote:

> I upgraded the IOS in my catalyst, the results shows a little bit
> different, seems that the certificate is doing okay, but somehow it keep
> asking for anoymous user? is there configuration that i missed? here are
> the log file and the config, thanks

Looks like PEAP authentication is now working much better. You should
change your configuration a little and it should work after that.

Add new Handler before the other Handlers:

<Handler Request-Type=Accounting-Request>
  # Move the second AuthBy from Handler TunnelledByPEAP=1 here
  # You can also remove the second AuthBy from the last Handler
</Handler>

Now it fails because of this:
Tue Dec 20 10:54:17 2011: DEBUG: EAP result: 1, Not authenticated by
this AuthBy
Tue Dec 20 10:54:17 2011: DEBUG: AuthBy SQL result: REJECT, Not
authenticated by this AuthBy

The AuthBy is the second AuthBy in Handler TunnelledByPEAP=1

About anonymous: 'anonymous' is a name that does not matter here. You
should look for PEAP tunnelled requests, 'DEBUG: PEAP Tunnelled request
Packet dump:', which show the inner authentication and the real
identity. For example:

Tue Dec 20 10:54:16 2011: DEBUG: Radius::AuthSQL looks for match with
indrajaya [anonymous]

Here 'indrajaya' is the real identity and 'anonymous' in this case is
the default value of User-Name attribute Radiator adds into tunnelled
request.

Once you change Handler TunneledByPEAP=1 I am quite sure your
configuration will work. Can you tell us how old the IOS version was you
were using?

Thanks!
Heikki

> 
> 
> /Regards,
> Indrajaya Pitra Perdana/
> 
> On 12/17/2011 2:01 PM, viet...@indo.net.id wrote:
>>
>> I'm using Microsoft Windows XP Professional SP 2
>>
>> Quoting Heikki Vatiainen <h...@open.com.au>:
>>
>>> On 12/16/2011 04:13 AM, Indrajaya Pitra Perdana wrote:
>>>
>>>> Thanks, i give it a try, i already enable tls trace in my win xp, and i
>>>> don't see there's an exchange certificate :-)
>>> What client are you using? I noticed the log shows it sends EAP TLS
>>> (type 13) responses while also logging about detecting PEAP authentication.
>>>
>>>> [1448] 11:49:36:218: PeapReadConnectionData
>>>> [1448] 11:49:36:218: PeapReadUserData
>>>> [1448] 11:49:36:218: RasEapGetInfo
>>>> [2884] 11:49:52:515: EapPeapBegin
>>>> [2884] 11:49:52:515: PeapReadConnectionData
>>>> [2884] 11:49:52:515: PeapReadUserData
>>>> [2884] 11:49:52:515:
>>>> [2884] 11:49:52:515: EapTlsBegin(test)
>>>> [2884] 11:49:52:515: State change to Initial
>>>> [2884] 11:49:52:515: EapTlsBegin: Detected 8021X authentication
>>>> [2884] 11:49:52:515: EapTlsBegin: Detected PEAP authentication
>>>> [2884] 11:49:52:515: MaxTLSMessageLength is now 16384
>>>> [2884] 11:49:52:515: EapPeapBegin done
>>>> [2884] 11:49:52:515: EapPeapMakeMessage
>>>> [2884] 11:49:52:515: EapPeapCMakeMessage
>>>> [2884] 11:49:52:515: PEAP:PEAP_STATE_INITIAL
>>>> [2884] 11:49:52:515: EapTlsCMakeMessage
>>>> [2884] 11:49:52:515: EapTlsReset
>>>> [2884] 11:49:52:515: State change to Initial
>>>> [2884] 11:49:52:515: GetCredentials
>>>> [2884] 11:49:52:515: Flag is Client and Store is Current User
>>>> [2884] 11:49:52:515: GetCachedCredentials
>>>> [2884] 11:49:52:515: FreeCachedCredentials
>>>> [2884] 11:49:52:515: No Cert Store.  Guest Access requested
>>>> [2884] 11:49:52:515: No Cert Name.  Guest access requested
>>>> [2884] 11:49:52:515: Will validate server cert
>>>> [2884] 11:49:52:515: MakeReplyMessage
>>>> [2884] 11:49:52:515: SecurityContextFunction
>>>> [2884] 11:49:52:515: InitializeSecurityContext returned 0x90312
>>>> [2884] 11:49:52:515: State change to SentHello
>>>> [2884] 11:49:52:515: BuildPacket
>>>> [2884] 11:49:52:515: << Sending Response (Code: 2) packet: Id: 2,
>>>> Length: 80, Type: 13, TLS blob length: 70. Flags: L
>>>> [2884] 11:49:52:515: EapPeapCMakeMessage done
>>>> [2884] 11:49:52:515: EapPeapMakeMessage done
>>>> [1352] 11:50:22:531: EapPeapEnd
>>>> [1352] 11:50:22:531: EapTlsEnd
>>>> [1352] 11:50:22:531: EapTlsEnd(test)
>>>> [1352] 11:50:22:531: EapPeapEnd done
>>>> [1352] 11:50:22:562: EapPeapBegin
>>>> [1352] 11:50:22:562: PeapReadConnectionData
>>>> [1352] 11:50:22:562: PeapReadUserData
>>>> [1352] 11:50:22:562:
>>>> [1352] 11:50:22:562: EapTlsBegin(test)
>>>> [1352] 11:50:22:562: State change to Initial
>>>> [1352] 11:50:22:562: EapTlsBegin: Detected 8021X authentication
>>>> [1352] 11:50:22:562: EapTlsBegin: Detected PEAP authentication
>>>> [1352] 11:50:22:562: MaxTLSMessageLength is now 16384
>>>> [1352] 11:50:22:562: EapPeapBegin done
>>>> [1352] 11:50:22:562: EapPeapMakeMessage
>>>> [1352] 11:50:22:562: EapPeapCMakeMessage
>>>> [1352] 11:50:22:562: PEAP:PEAP_STATE_INITIAL
>>>> [1352] 11:50:22:562: EapTlsCMakeMessage
>>>> [1352] 11:50:22:562: EapTlsReset
>>>> [1352] 11:50:22:562: State change to Initial
>>>> [1352] 11:50:22:562: GetCredentials
>>>> [1352] 11:50:22:562: Flag is Client and Store is Current User
>>>> [1352] 11:50:22:562: GetCachedCredentials
>>>> [1352] 11:50:22:562: FreeCachedCredentials
>>>> [1352] 11:50:22:562: No Cert Store.  Guest Access requested
>>>> [1352] 11:50:22:562: No Cert Name.  Guest access requested
>>>> [1352] 11:50:22:562: Will validate server cert
>>>> [1352] 11:50:22:562: MakeReplyMessage
>>>> [1352] 11:50:22:562: SecurityContextFunction
>>>> [1352] 11:50:22:562: InitializeSecurityContext returned 0x90312
>>>> [1352] 11:50:22:562: State change to SentHello
>>>> [1352] 11:50:22:562: BuildPacket
>>>> [1352] 11:50:22:562: << Sending Response (Code: 2) packet: Id: 37,
>>>> Length: 80, Type: 13, TLS blob length: 70. Flags: L
>>>> [1352] 11:50:22:562: EapPeapCMakeMessage done
>>>> [1352] 11:50:22:562: EapPeapMakeMessage done
>>>> [1448] 11:50:52:578: EapPeapEnd
>>>> [1448] 11:50:52:578: EapTlsEnd
>>>> [1448] 11:50:52:578: EapTlsEnd(test)
>>>> [1448] 11:50:52:578: EapPeapEnd done
>>>> [1448] 11:51:52:593: PeapReadConnectionData
>>>> [1448] 11:51:52:593: PeapReadUserData
>>>> [1448] 11:51:52:593: RasEapGetInfo
>>>> [1352] 12:02:42:625: PeapReadConnectionData
>>>> [1352] 12:02:42:640: PeapReadUserData
>>>> [1352] 12:02:42:640: RasEapGetInfo
>>>> [1352] 12:02:42:640: PeapReDoUserData
>>>> [1352] 12:02:42:640: EapTlsInvokeIdentityUI
>>>> [1352] 12:02:42:640: GetCertInfo
>>>> [1352] 12:03:42:640: PeapReadConnectionData
>>>> [1352] 12:03:42:640: PeapReadUserData
>>>> [1352] 12:03:42:640: RasEapGetInfo
>>>> [1352] 12:03:42:671: EapPeapBegin
>>>> [1352] 12:03:42:671: PeapReadConnectionData
>>>> [1352] 12:03:42:671: PeapReadUserData
>>>> [1352] 12:03:42:671:
>>>> [1352] 12:03:42:671: EapTlsBegin(GHOST\indrajaya)
>>>> [1352] 12:03:42:671: State change to Initial
>>>> [1352] 12:03:42:671: EapTlsBegin: Detected 8021X authentication
>>>> [1352] 12:03:42:671: EapTlsBegin: Detected PEAP authentication
>>>> [1352] 12:03:42:671: MaxTLSMessageLength is now 16384
>>>> [1352] 12:03:42:671: EapPeapBegin done
>>>> [1352] 12:03:42:671: EapPeapMakeMessage
>>>> [1352] 12:03:42:671: EapPeapCMakeMessage
>>>> [1352] 12:03:42:671: PEAP:PEAP_STATE_INITIAL
>>>> [1352] 12:03:42:671: EapTlsCMakeMessage
>>>> [1352] 12:03:42:671: EapTlsReset
>>>> [1352] 12:03:42:671: State change to Initial
>>>> [1352] 12:03:42:671: GetCredentials
>>>> [1352] 12:03:42:671: Flag is Client and Store is Current User
>>>> [1352] 12:03:42:671: GetCachedCredentials
>>>> [1352] 12:03:42:671: FreeCachedCredentials
>>>> [1352] 12:03:42:671: No Cert Store.  Guest Access requested
>>>> [1352] 12:03:42:671: No Cert Name.  Guest access requested
>>>> [1352] 12:03:42:671: Will validate server cert
>>>> [1352] 12:03:42:671: MakeReplyMessage
>>>> [1352] 12:03:42:671: SecurityContextFunction
>>>> [1352] 12:03:42:671: InitializeSecurityContext returned 0x90312
>>>> [1352] 12:03:42:671: State change to SentHello
>>>> [1352] 12:03:42:671: BuildPacket
>>>> [1352] 12:03:42:671: << Sending Response (Code: 2) packet: Id: 3,
>>>> Length: 80, Type: 13, TLS blob length: 70. Flags: L
>>>> [1352] 12:03:42:671: EapPeapCMakeMessage done
>>>> [1352] 12:03:42:671: EapPeapMakeMessage done
>>>> [2004] 12:04:12:687: EapPeapEnd
>>>> [2004] 12:04:12:687: EapTlsEnd
>>>> [2004] 12:04:12:687: EapTlsEnd(ghost\indrajaya)
>>>> [2004] 12:04:12:687: EapPeapEnd done
>>>> [2004] 12:04:42:734: EapPeapBegin
>>>> [2004] 12:04:42:734: PeapReadConnectionData
>>>> [2004] 12:04:42:734: PeapReadUserData
>>>>
>>>> /Regards,
>>>> Indrajaya Pitra Perdana/
>>>>
>>>> On 12/15/2011 6:04 PM, Heikki Vatiainen wrote:
>>>>> On 12/15/2011 06:18 AM, Indrajaya Pitra Perdana wrote:
>>>>>
>>>>>> The problem still persist even i created my own certificate using the
>>>>>> steps in mkcertificate.sh goodies , my windows didn't respon to the eap
>>>>>> challenge sent by Radiator, do u have any clue on this? or perhaps the
>>>>>> problem is within my 2950 catalyst ? thanks :-)
>>>>> You could try enabling debug for EAP authentication on the switch to see
>>>>> how it reacts to EAP messages.
>>>>>
>>>>> Meanwhile you could also try running wireshark on Windows to see if the
>>>>> challenge with the certificate is sent by the switch to the XP box.
>>>>>
>>>>> One thing you could try first is to use even lower value for
>>>>> EAPTLS_MaxFragmentSize
>>>>>
>>>>> The messages before certifcate are much smaller and so this challenge
>>>>> would be the first that can reach the maximum size.
>>>>>
>>>>> Thanks!
>>>>>
>>>
>>> --
>>> Heikki Vatiainen <h...@open.com.au>
>>>
>>> Radiator: the most portable, flexible and configurable RADIUS server
>>> anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
>>> Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS,
>>> TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
>>> DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS,
>>> NetWare etc.
>>
>>
>> _______________________________________________
>> radiator mailing list
>> radiator@open.com.au
>> http://www.open.com.au/mailman/listinfo/radiator
>>


-- 
Heikki Vatiainen <h...@open.com.au>

Radiator: the most portable, flexible and configurable RADIUS server
anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS,
TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS,
NetWare etc.
_______________________________________________
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator

Reply via email to