(RADIATOR) Disconnect after 12 hours with WindowsXP clients

DELORT Stephane Stephane.DELORT at murex.com
Mon Dec 5 05:26:26 CST 2005


Hello,

I am currently usign Radiator as a RADIUS server beyond Trapeze switch. All the clients are Windows XP stations with patches and drivers up to date for a 802.11 wireless configuration (PEAP/MSCHAP v2).
After 12 hours of connection the station disconnect and reconnect (saw by acct stop/start).
It happens with every stations.



The NAS is set to be "passthrough" and every parameter is set to 24 hours.
On the RADIUS, the only parameter that could have a role is, I think, the EAPTLS_SessionResumptionLimit. It is also set to 24 hours.

So, is there a known isssue with windows XP stations ?
Could the APTLS_SessionResumptionLimit be responsible of these disconnections ?
How can I see if the disconnection is initiated from the RADIUS, the switch or the station ?


My PEAP config is shown below.

Regards,
Stéphane
 




*******************************************************

<Handler Called-Station-Id=/MX_WIFI/ >
	SessionDatabase NULL_SESSION_DB
	MaxSessions 1	
	<AuthBy FILE>
		EAPAnonymous	%0
		# The username of the outer authentication
		#  must be in this file to get anywhere. In this example,
		# it requires an entry for 'anonymous' which is the standard username 
		# in the outer requests, and it also requires an entry for the
		# actual user name who is trying to connect (ie the 'Login name' entered
		# in the Funk Odyssey 'Edit Profile Properties' page
		#Filename %D/users

		# EAPType sets the EAP type(s) that Radiator will honour.
		# Options are: MD5-Challenge, One-Time-Password
		# Generic-Token, TLS, TTLS, PEAP, MSCHAP-V2
		# Multiple types can be comma separated. With the default (most
		# preferred) type given first
		EAPType PEAP

		# EAPTLS_CAFile is the name of a file of CA certificates 
		# in PEM format. The file can contain several CA certificates
		# Radiator will first look in EAPTLS_CAFile then in
		# EAPTLS_CAPath, so there usually is no need to set both
		#EAPTLS_CAFile %D/certificates/demoCA/cacert.pem
		EAPTLS_CAFile %D/certificates/certifs_murex/sdelort.crt

		# EAPTLS_CertificateFile is the name of a file containing
		# the servers certificate. EAPTLS_CertificateType
		# specifies the type of the file. Can be PEM or ASN1
		# defaults to ASN1
		#EAPTLS_CertificateFile %D/certificates/cert-srv.pem
		EAPTLS_CertificateFile %D/certificates/certifs_murex/sdelort.crt		
		EAPTLS_CertificateType PEM

		# EAPTLS_PrivateKeyFile is the name of the file containing
		# the servers private key. It is sometimes in the same file
		# as the server certificate (EAPTLS_CertificateFile) 
		# If the private key is encrypted (usually the case)
		# then EAPTLS_PrivateKeyPassword is the key to descrypt it
		#EAPTLS_PrivateKeyFile %D/certificates/cert-srv.pem
		#EAPTLS_PrivateKeyPassword whatever
		EAPTLS_PrivateKeyFile %D/certificates/certifs_murex/sdelort.key
		EAPTLS_PrivateKeyPassword murex

		# EAPTLS_MaxFragmentSize sets the maximum TLS fragemt
		# size that will be replied by Radiator. It must be small
		# enough to fit in a single Radius request (ie less than 4096)
		# and still leave enough space for other attributes
		# Aironet APs seem to need a smaller MaxFragmentSize
		# (eg 1024) than the default of 2048. Others need even smaller sizes.
		EAPTLS_MaxFragmentSize 1000		
		
		# Some clients, depending on their configuration, may require you to specify
		# MPPE send and receive keys. This _will_ be required if you select
		# 'Keys will be generated automatically for data privacy' in the Funk Odyssey
		# client Network Properties dialog.
		# Automatically sets MS-MPPE-Send-Key and MS-MPPE-Recv-Key
		# in the final Access-Accept
		AutoMPPEKeys

		# You can enable some warning messages from the Net::SSLeay
		# module by setting SSLeayTrace to an integer from 1 to 4
		# 1=ciphers, 2=trace, 3=dump data
		SSLeayTrace 4

		# You can configure the User-Name that will be used for the inner
		# authentication. Defaults to 'anonymous'. This can be useful
		# when proxying the inner authentication. If tehre is a realm, it can 
		# be used to choose a local Realm to handle the inner authentication.
		# %0 is replaced with the EAP identitiy
		# EAPAnonymous anonymous at some.other.realm

		# You can enable or disable support for TTLS Session Resumption and
		# PEAP Fast Reconnect with the EAPTLS_SessionResumption flag.
		# Default is enabled
		#EAPTLS_SessionResumption 0

		# You can limit how long after the initial session that a session can be resumed
		# with EAPTLS_SessionResumptionLimit (time in seconds). Defaults to 43200
		# (12 hours)
		EAPTLS_SessionResumptionLimit 86400

		# You can control which version of the draft PEAP protocol to honour
		# with EAPTLS_PEAPVersion. Defaults to 1. Set it to 0 for unusual clients,
		# such as Funk Odyssey Client 2.22 or later.
		EAPTLS_PEAPVersion 0

		# You can make PEAP Version 1 support compatible with
		# nonstandard PEAP V1 clients that use the old broken TLS encryption labels that
		# appear to be used frequently, due to Microsofts use of the incorrect
		# label in its V0 client.
		#EAPTLS_PEAPBrokenV1Label
	</AuthBy>
</Handler>

--
Archive at http://www.open.com.au/archives/radiator/
Announcements on radiator-announce at open.com.au
To unsubscribe, email 'majordomo at open.com.au' with
'unsubscribe radiator' in the body of the message.


More information about the radiator mailing list