Re: [RADIATOR] Server 2008 R2 x64 - radsec certificate verify failed

2011-12-15 Thread Heikki Vatiainen
On 12/14/2011 05:21 PM, Röver, Christian wrote:
> The posted logfile is the full trace 4 logging and the config I posted
> before is he complete config (I only cut the descriptions and the lines that
> were commented out).

Ok.

> The certificates are all valid and have been verified by the toplevel-ca.
> Maybe it is useful to know, that we have our own CA.
> Our CA is the lowest in a row of three CA's. The CA-files are all stored in
> the CAPath-folder together with our own CA's chain file.

You could try TLS_CAFile instead of TLS_CAPath. Please see below for more.

> The error message tells about problems with the verification of a
> certificate. Is there any need to use the CA-files directly instead of the
> CAPath?

If you use CAPath, the certificate files are accessed by CA subject name
hash. In most cases this means there's a symbolic link like this:

lrwxrwxrwx 1 root root 20 2011-10-13 16:42 ddc328ff.0 ->
Thawte_Server_CA.pem

See this for how to use command c_rehash to create the links:
http://www.openssl.org/docs/ssl/SSL_CTX_load_verify_locations.html

Instead of using TLS_CAPath you can put all CA certifcates in one file
and point TLS_CAFile to that file. That might be easier to maintain the
symbolic links for all required certificates.

> Another question is: we use eaptls for the communication with our ldap
> server (this works!), but we have to use TLS for radsec with the toplevel
> server. Might there be a problem?

Sorry, I did not quite understand this. You can use SSL or TLS for LDAP
connections from Radiator without worries with RadSec.

I also just noticed you use AuthBy RADIUS too. Are you proxying PEAP and
TTLS inner authentication via RADIUS?

Thanks!

-- 
Heikki Vatiainen 

Radiator: the most portable, flexible and configurable RADIUS server
anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS,
TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS,
NetWare etc.
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator


Re: [RADIATOR] EAP-PEAP Windows XP Wired Ethernet

2011-12-15 Thread Heikki Vatiainen
On 12/15/2011 06:18 AM, Indrajaya Pitra Perdana wrote:

> The problem still persist even i created my own certificate using the
> steps in mkcertificate.sh goodies , my windows didn't respon to the eap
> challenge sent by Radiator, do u have any clue on this? or perhaps the
> problem is within my 2950 catalyst ? thanks :-) 

You could try enabling debug for EAP authentication on the switch to see
how it reacts to EAP messages.

Meanwhile you could also try running wireshark on Windows to see if the
challenge with the certificate is sent by the switch to the XP box.

One thing you could try first is to use even lower value for
EAPTLS_MaxFragmentSize

The messages before certifcate are much smaller and so this challenge
would be the first that can reach the maximum size.

Thanks!

-- 
Heikki Vatiainen 

Radiator: the most portable, flexible and configurable RADIUS server
anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS,
TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS,
NetWare etc.
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator


[RADIATOR] R: R: EAP-Peap-ntlm stops

2011-12-15 Thread Fabio Prina
Thanks Heikki,

I proxied the inner auth to another radiator with a smb 3.4.7 (Ubuntu lucid) 
and all work fine
... all except an annoying and uncompressible message related to the 
certificate on windows :-\  but this is another story :-)

Cheers
--
Fabio Prina
System Specialist
Easynet

T +39 02 30301 500
W www.easynet.com
> -Messaggio originale-
> Da: Heikki Vatiainen [mailto:h...@open.com.au]
> Inviato: martedì 13 dicembre 2011 16:06
> A: Fabio Prina
> Cc: Radiator ML (radiator@open.com.au)
> Oggetto: Re: R: [RADIATOR] EAP-Peap-ntlm stops
>
> On 12/12/2011 07:49 PM, Fabio Prina wrote:
>
> > I've read the  2 link, and I suppose that this is the problem; my
> > current samba version is an 3.2.5 the ntlm auth do not work only in
> > this case
>
> If you are using RedHat or Centos, you may want to consider samba3x RPM.
> I have not used it myself, but apparently ntlm_auth should work with that
> version.
>
> --
> Heikki Vatiainen 
>
> Radiator: the most portable, flexible and configurable RADIUS server
> anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
> Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS, TTLS,
> PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP, DIAMETER etc.
> Full source on Unix, Windows, MacOSX, Solaris, VMS, NetWare etc.
Questa e-mail e gli allegati possono essere confidenziali, riservati e / o 
protetti ai sensi di legge. Se avete ricevuto questa e-mail per errore, non 
essendone destinatari, siete pregati di informare il mittente con l'invio di 
una risposta e-mail all'indirizzo di cui sopra e quindi eliminare il messaggio 
e la vostra risposta dal sistema. Se non siete destinatari della presente email 
siete obbligati a non utilizzare, divulgare, distribuire, copiare, stampare o 
fare conto sul contenuto di questa e-mail. Eventuali pareri o opinioni 
contenute nella presente email sono esclusivamente riferibili all'autore. 
Eventuali dichiarazioni rilasciate e/o intenzioni espresse nella presente 
comunicazione non riflettono necessariamente la posizione di Easynet. In nessun 
modo il contenuto della presente email potrà creare obbligazioni per Easynet o 
per le società del gruppo Easynet se non confermate da un contratto formale 
sottoscritto da Easynet. Qualsiasi cifra o importo indicati nella presente 
e-mail deve essere considerata una mera citazione ed è soggetto a variazioni. 
Easynet pone in essere controlli approfonditi allo scopo di eliminare qualsiasi 
minaccia tipo virus o simili; nondimeno i destinatari devono a loro volta 
scansionare questa e-mail e gli eventuali allegati allo scopo di rilevare 
minacce tipo virus o simili. Easynet non rilascia alcuna garanzia circa 
l'assenza di virus in questa e-mail o negli allegati. Nel rispetto delle norme 
vigenti per garantire la protezione dei nostri clienti e dei nostri Partner 
potremo monitorare e controllare le e-mail inviate da e verso i nostri server. 
Easynet Italia S.p.A. Viale Fulvio Testi, 7 Milano, I-20159, Italy 
www.easynet.com Registro Imprese Milano Cod. Fisc e P. IVA 13028980152 REA 
1607597 Capitale Sociale 800.000 € i.v. Socio unico EGHL (UK) Limited
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator

[RADIATOR] Application like radclient

2011-12-15 Thread sergio
Hello

Radiator has some application like (radclient) of freeradius ?


___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator


Re: [RADIATOR] EAP-PEAP Windows XP Wired Ethernet

2011-12-15 Thread Indrajaya Pitra Perdana


Thanks, i give it a try, i already enable tls trace in my win xp, and i 
don't see there's an exchange certificate :-)



[1448] 11:49:36:218: PeapReadConnectionData
[1448] 11:49:36:218: PeapReadUserData
[1448] 11:49:36:218: RasEapGetInfo
[2884] 11:49:52:515: EapPeapBegin
[2884] 11:49:52:515: PeapReadConnectionData
[2884] 11:49:52:515: PeapReadUserData
[2884] 11:49:52:515:
[2884] 11:49:52:515: EapTlsBegin(test)
[2884] 11:49:52:515: State change to Initial
[2884] 11:49:52:515: EapTlsBegin: Detected 8021X authentication
[2884] 11:49:52:515: EapTlsBegin: Detected PEAP authentication
[2884] 11:49:52:515: MaxTLSMessageLength is now 16384
[2884] 11:49:52:515: EapPeapBegin done
[2884] 11:49:52:515: EapPeapMakeMessage
[2884] 11:49:52:515: EapPeapCMakeMessage
[2884] 11:49:52:515: PEAP:PEAP_STATE_INITIAL
[2884] 11:49:52:515: EapTlsCMakeMessage
[2884] 11:49:52:515: EapTlsReset
[2884] 11:49:52:515: State change to Initial
[2884] 11:49:52:515: GetCredentials
[2884] 11:49:52:515: Flag is Client and Store is Current User
[2884] 11:49:52:515: GetCachedCredentials
[2884] 11:49:52:515: FreeCachedCredentials
[2884] 11:49:52:515: No Cert Store.  Guest Access requested
[2884] 11:49:52:515: No Cert Name.  Guest access requested
[2884] 11:49:52:515: Will validate server cert
[2884] 11:49:52:515: MakeReplyMessage
[2884] 11:49:52:515: SecurityContextFunction
[2884] 11:49:52:515: InitializeSecurityContext returned 0x90312
[2884] 11:49:52:515: State change to SentHello
[2884] 11:49:52:515: BuildPacket
[2884] 11:49:52:515: << Sending Response (Code: 2) packet: Id: 2, 
Length: 80, Type: 13, TLS blob length: 70. Flags: L

[2884] 11:49:52:515: EapPeapCMakeMessage done
[2884] 11:49:52:515: EapPeapMakeMessage done
[1352] 11:50:22:531: EapPeapEnd
[1352] 11:50:22:531: EapTlsEnd
[1352] 11:50:22:531: EapTlsEnd(test)
[1352] 11:50:22:531: EapPeapEnd done
[1352] 11:50:22:562: EapPeapBegin
[1352] 11:50:22:562: PeapReadConnectionData
[1352] 11:50:22:562: PeapReadUserData
[1352] 11:50:22:562:
[1352] 11:50:22:562: EapTlsBegin(test)
[1352] 11:50:22:562: State change to Initial
[1352] 11:50:22:562: EapTlsBegin: Detected 8021X authentication
[1352] 11:50:22:562: EapTlsBegin: Detected PEAP authentication
[1352] 11:50:22:562: MaxTLSMessageLength is now 16384
[1352] 11:50:22:562: EapPeapBegin done
[1352] 11:50:22:562: EapPeapMakeMessage
[1352] 11:50:22:562: EapPeapCMakeMessage
[1352] 11:50:22:562: PEAP:PEAP_STATE_INITIAL
[1352] 11:50:22:562: EapTlsCMakeMessage
[1352] 11:50:22:562: EapTlsReset
[1352] 11:50:22:562: State change to Initial
[1352] 11:50:22:562: GetCredentials
[1352] 11:50:22:562: Flag is Client and Store is Current User
[1352] 11:50:22:562: GetCachedCredentials
[1352] 11:50:22:562: FreeCachedCredentials
[1352] 11:50:22:562: No Cert Store.  Guest Access requested
[1352] 11:50:22:562: No Cert Name.  Guest access requested
[1352] 11:50:22:562: Will validate server cert
[1352] 11:50:22:562: MakeReplyMessage
[1352] 11:50:22:562: SecurityContextFunction
[1352] 11:50:22:562: InitializeSecurityContext returned 0x90312
[1352] 11:50:22:562: State change to SentHello
[1352] 11:50:22:562: BuildPacket
[1352] 11:50:22:562: << Sending Response (Code: 2) packet: Id: 37, 
Length: 80, Type: 13, TLS blob length: 70. Flags: L

[1352] 11:50:22:562: EapPeapCMakeMessage done
[1352] 11:50:22:562: EapPeapMakeMessage done
[1448] 11:50:52:578: EapPeapEnd
[1448] 11:50:52:578: EapTlsEnd
[1448] 11:50:52:578: EapTlsEnd(test)
[1448] 11:50:52:578: EapPeapEnd done
[1448] 11:51:52:593: PeapReadConnectionData
[1448] 11:51:52:593: PeapReadUserData
[1448] 11:51:52:593: RasEapGetInfo
[1352] 12:02:42:625: PeapReadConnectionData
[1352] 12:02:42:640: PeapReadUserData
[1352] 12:02:42:640: RasEapGetInfo
[1352] 12:02:42:640: PeapReDoUserData
[1352] 12:02:42:640: EapTlsInvokeIdentityUI
[1352] 12:02:42:640: GetCertInfo
[1352] 12:03:42:640: PeapReadConnectionData
[1352] 12:03:42:640: PeapReadUserData
[1352] 12:03:42:640: RasEapGetInfo
[1352] 12:03:42:671: EapPeapBegin
[1352] 12:03:42:671: PeapReadConnectionData
[1352] 12:03:42:671: PeapReadUserData
[1352] 12:03:42:671:
[1352] 12:03:42:671: EapTlsBegin(GHOST\indrajaya)
[1352] 12:03:42:671: State change to Initial
[1352] 12:03:42:671: EapTlsBegin: Detected 8021X authentication
[1352] 12:03:42:671: EapTlsBegin: Detected PEAP authentication
[1352] 12:03:42:671: MaxTLSMessageLength is now 16384
[1352] 12:03:42:671: EapPeapBegin done
[1352] 12:03:42:671: EapPeapMakeMessage
[1352] 12:03:42:671: EapPeapCMakeMessage
[1352] 12:03:42:671: PEAP:PEAP_STATE_INITIAL
[1352] 12:03:42:671: EapTlsCMakeMessage
[1352] 12:03:42:671: EapTlsReset
[1352] 12:03:42:671: State change to Initial
[1352] 12:03:42:671: GetCredentials
[1352] 12:03:42:671: Flag is Client and Store is Current User
[1352] 12:03:42:671: GetCachedCredentials
[1352] 12:03:42:671: FreeCachedCredentials
[1352] 12:03:42:671: No Cert Store.  Guest Access requested
[1352] 12:03:42:671: No Cert Name.  Guest access requested
[1352] 12:03:42:671: Will validate server cert
[1352] 12:03:42:671: MakeRep

Re: [RADIATOR] Application like radclient

2011-12-15 Thread Hugh Irvine

Hello Sergio -

Yes - its called "radpwtst".

You will find it in the main Radiator distribution directory.

See also section 8 in the Radiator 4.9 reference manual ("doc/ref/pdf").

Here is the "help":


TiTi:Radiator-4.9 hugh$ perl radpwtst -h

usage: radpwtst [-h] [-time] [-iterations n] 
  [-trace [level]] [-s server] [-secret secret] [-retries n]
  [-noauth] [-noacct][-nostart] [-nostop] [-alive] [-status] 
  [-chap] [-mschap] [-mschapv2] [-eapmd5] [-eapotp] [-eapgtc] [-sip] 
[-leap]
  [-motp_secret ] [-eaphex x]
  [-accton] [-acctoff] [-framed_ip_address address]
  [-auth_port port] [-acct_port port] [-identifier n]
  [-user username] [-password password] 
  [-nas_ip_address address] [-nas_identifier string]
  [-nas_port port] [-nas_port_type type] [-service_type service] 
  [-calling_station_id string] [-called_station_id string] 
  [-session_id string] [-interactive]
  [-delay_time n] [-session_time n] [-input_octets n]
  [-output_octets n] [-timeout n] [-dictionary file,file]
  [-gui] [-class string] [-useoldascendpasswords]
  [-code requestcode] [-raw data] [-rawfile filename] 
  [-rawfileseq filename]
  [-outport port] [-bind_address dotted-ip-address]
  [-options optionfile]
  [attribute=value]... 


regards

Hugh


On 16 Dec 2011, at 12:35, sergio wrote:

> Hello
> 
> Radiator has some application like (radclient) of freeradius ?
> 
> 
> ___
> radiator mailing list
> radiator@open.com.au
> http://www.open.com.au/mailman/listinfo/radiator


--

Hugh Irvine
h...@open.com.au

Radiator: the most portable, flexible and configurable RADIUS server 
anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald, 
Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS, 
TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
DIAMETER etc. 
Full source on Unix, Windows, MacOSX, Solaris, VMS, NetWare etc.

___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator