[RADIATOR] eap + apple products - failed auth

Amândio Antunes Gomes Silva amandio at scom.uminho.pt
Thu Mar 1 10:35:41 CST 2012


Hi list!

 

I'm struggling to solve a problem similar to this one for a while, but the scenario is a little bit different: in our wireless network (eduroam with WPA/Enterprise) we support TTLS/PAP, TTLS/MSCHAPv2 and PEAP authentication methods, which works fine for all kind of devices, but Apple one's, which work fine with all of this, but TTLS/MSCHAPv2. The Apple clients get authenticated, the connections last for 5 to 10 seconds and then it drops, never getting the IP address. Analyzing the logs, I see an Access-Accept just followed by a Challenge which, I think, makes the connection to not succeed. Once TTLS/MSCHAPv2 is the default authentication method in Apple devices, it's impossible for our new users to connect to the eduroam for the first time (by simply enter their username/password when prompted) without edit the connection properties, what can be tricky, especially now that Mac OSX Lion don't let you do this manually, unless you have a mobile.config configuration file with the proper parameters. Anyone have some idea on how to solve this?

 

Some important notes:

1.       The PEAP and TTLS/MSCHAPV2 requests, as you can see, are proxied to an ISA server, which I don't have admin rights on.

2.       The TTLS/PAP requests are handled by an <AuthBy LDAP>, with the ServerChecksPassword enabled (that's why it doesn't handle MSCHAPV2).

3.       There is a ReplyHook used to correct some attributes that are sent by the ISA server, mainly the Tunnel-Private-Group-ID, used to put each user in his VLAN, according to his type. 

4.       Mac OSX 10.6.8 (Snow Leopard) with TTLS/MSCHAP, PEAP and TTLS/PAP works fine.

5.       Mac OSX 10.6.8 doesn't work with TTLS/MSCHAPV2 (mac syslog reports "TTLS: authentication failed with status 1").

 

 

Our config is:

 

The authenticator for PEAP/MSCHAPV2:

 

<AuthBy RADIUS>

  NoEAP

# RewriteUsername s/^([^@]+).*/$1\@%{W}/

  Identifier      PEAPnoSAPIA

  Host            ***.***.***.***

  Secret          ********

  AuthPort        1812

  AcctPort        1813

  EAPType         PEAP,TTLS,TLS,MSCHAP-V2,MSCHAPV2

  Description     PEAP no SAPIA

  Retries         5

  RetryTimeout    30  

  ReplyHook       file:"/etc/radiator/rh-postauth.pl"

  EAPTLS_PEAPVersion  0

</AuthBy>

 

The Handlers

...

<Handler ConvertedFromEAPMSCHAPV2=1>

  AuthByPolicy  ContinueUntilAcceptOrChallenge

  AuthLog peaplog

  StripFromRequest ConvertedFromEAPMSCHAPV2

  AuthBy  PEAPnoSAPIA

</Handler>

 

<Handler TunnelledByPEAP=1>

  AuthByPolicy ContinueUntilAcceptOrChallenge

  <AuthBy FILE>

    # Dont really need this

    Filename %D/users

 

    # This tells the PEAP client what types of inner EAP requests

    # we will honour

    EAPType MSCHAP-V2

 

    # This flag tells EAPType MSCHAP-V2 to convert the inner EAP-MSCHAPV2 request into

    # an ordinary Radius-MSCHAPV2 request and redespatch to to a Handler

    # that matches ConvertedFromEAPMSCHAPV2=1 (see above)

    EAP_PEAP_MSCHAP_Convert 1

  </AuthBy>

  PostProcessingHook file:"/etc/radiator/eap_acct_username_orig.pl"

</Handler>

 

<Handler TunnelledByTTLS=1, MS-CHAP-Challenge =/.+$/>

  AcctLogFileName /var/log/radius/radacct/%Y%m

  AuthByPolicy  ContinueUntilAcceptOrChallenge

  AuthBy  PEAPnoSAPIA

  PostProcessingHook file:"/etc/radiator/eap_acct_username_orig.pl"

</Handler>

 

<Handler TunnelledByTTLS=1>

  AcctLogFileName /var/log/radius/radacct/%Y%m

  AuthByPolicy  ContinueUntilAcceptOrChallenge

  AuthBy  Auth-SAPIA

  PostProcessingHook file:"/etc/radiator/eap_acct_username_orig.pl"

</Handler>

 

<Handler Realm=/uminho.pt$/ >

  AcctLogFileName /var/log/radius/radacct/%Y%m

  AuthBy SQLAccounting

  Description SSID eduroam para utilizadores uminho.pt

  Identifier  REALM-UMINHO

  RejectHasReason

  <AuthBy FILE>

    # the %D/users file can be empty, its there for normal PAP

    # authentication. This can however be used for the WEB captive

    # portals.

    Filename %D/users

    EAPTLS_CAFile /etc/radiator/certs/8675909-usertrust.ca-bundle

    EAPTLS_CertificateFile /etc/radiator/certs/server.crt

    EAPTLS_CertificateType PEM

    EAPTLS_MaxFragmentSize 1024

    EAPTLS_PrivateKeyFile /etc/radiator/certs/server.key

    EAPType TTLS, PEAP

    AutoMPPEKeys

  </AuthBy FILE>

  PreProcessingHook file:"/etc/radiator/radius.rewriteMAC.pl"

</Handler>

 

The Logs:

See attached file.

 

 

Best regards,

 

Amândio Antunes Gomes da Silva

-----------------------------------------------------------------------------------------------------------------------------------

Serviços de Comunicações da Universidade do Minho

Campus de Gualtar, 4710-057 Braga - Portugal

Tel.: + 351 253 60 40 20, Fax: +351 253 60 40 21

VoIP: amandio at scom.uminho.pt <sip:amandio at scom.uminho.pt> 

email: amandio at scom.uminho.pt <mailto:amandio at scom.uminho.pt>  | http://www.scom.uminho.pt <http://www.scom.uminho.pt/> 

-----------------------------------------------------------------------------------------------------------------------------------

This email is confidential. If you are not the intended recipient, 

you must not disclose or use the information contained in it.

If you have received this mail in error, please tell us immediately 

by return email and delete the document.

 

 

-----Mensagem original-----
De: James [mailto:jtp at nc.rr.com] 
Enviada: terça-feira, 28 de Fevereiro de 2012 18:11
Para: chema
Cc: radiator at open.com.au
Assunto: Re: [RADIATOR] eap + apple products - failed auth

 

Yes, setting the EAPTLS_PEAPVersion set to '0' seems to work.

 

Does this result in any sort of "less secure" communications? What is

the difference between the two PEAP draft versions?

 

-james

 

 

On Tue, Feb 28, 2012 at 13:06, chema <chema at uniovi.es <mailto:chema at uniovi.es> > wrote:

>  Hi,

> 

>  Sometime ago, we had the same problem, and our solution was making this

>  change (EAPTLS_PEAPVersion to 0). We had no previous problems using

>  PAP/TTLS.

>  Hope you can solve this. Regards

> 

>  On Tue, 28 Feb 2012 17:48:53 +0000, Adam Bishop wrote:

>> Hi,

>> 

>> Try setting EAPTLS_PEAPVersion as 0 instead of 1 - been a while since

>> I wrote my configuration but I think that was the value that made OS

>> X

>> and iOS clients work for me.

>> 

>> Regards,

>> 

>> Adam Bishop

>> 

>> On 28 Feb 2012, at 17:38, James wrote:

>> 

>>> All,

>>> 

>>> I'm facing a pretty weird problem while trying to set up EAP

>>> authentication. Windows and Linux devices seem to work fine without

>>> issues -- the clients are prompted to authenticate, accept the

>>> certificate, and then they're successfully auth'ed and hop onto the

>>> wireless network.

>>> 

>>> Apple products (OS X, iPad and iPod) seem to have a strange issue,

>>> however: Radiator sends an Access-Accept, the client sees that

>>> authentication was successful, but the client will disconnect and

>>> then

>>> reconnect ensuing in an authentication loop. Logs on OS X indicate

>>> that authentication *IS* successful, but the operating system

>>> eventually reports a timeout in the 4-way handshake.

>>> 

>>> Here's the Radiator configuration:

>>> 

>>> -->8--

>>> 

>>> DefineFormattedGlobalVar    ConfigDir   /opt/radiator/config

>>> LogDir  /opt/radiator/logs

>>> DbDir   /opt/radiator/db

>>> Trace   4

>>> AuthPort 1645

>>> AcctPort 1646

>>> PidFile  %L/wireless.pid

>>> LogFile

>>> <Log FILE>

>>>    Identifier radiatorLog

>>>    Filename %L/%d.%v.%Y/wireless.log

>>>    Trace   4

>>>    LogMicroseconds

>>> </Log>

>>> <Client DEFAULT>

>>>    Secret whatever

>>>    DupInterval 0

>>> </Client>

>>> <SessionDatabase NULL>

>>>    Identifier Null

>>> </SessionDatabase>

>>> <AuthLog FILE>

>>>    Identifier authLogger

>>>    Filename %L/%d.%v.%Y/wireless.auth

>>>    LogSuccess 1

>>>    LogFailure 1

>>>    SuccessFormat %q %v %e %Y @ %s (child process %O) -> AUTHORIZED

>>> %T

>>> request from %c (nas = %N) for user %U

>>>    FailureFormat %q %v %e %Y @ %s (child process %O) -> DENIED %T

>>> request from %c (nas = %N) for user %U

>>> </AuthLog>

>>> include %{GlobalVar:ConfigDir}/auth.wireless

>>> <Handler TunnelledByPEAP=1>

>>>    AuthBy dm-wifi

>>>    AuthLog authLogger

>>>    Log radiatorLog

>>>    AcctLogFileName %L/%d.%v.%Y/wireless.log

>>> </Handler>

>>> <Handler>

>>>    AuthBy eap-outer

>>>    AuthLog authLogger

>>>    Log radiatorLog

>>>    AcctLogFileName %L/%d.%v.%Y/wireless.log

>>> </Handler>

>>> <AuthBy NTLM>

>>>    Identifier dm-wifi

>>>    NtlmAuthProg /usr/bin/ntlm_auth  --helper-protocol=ntlm-server-1

>>>    DefaultDomain DHE

>>>    EAPType MSCHAP-V2

>>> </AuthBy>

>>> <AuthBy FILE>

>>>    Identifier eap-outer

>>>    Filename %D/users

>>>    EAPType MSCHAP-V2,PEAP,FAST,TLS,TTLS

>>>    EAPTLS_CAFile %{GlobalVar:ConfigDir}/certs/duke.ca.cert

>>>    EAPTLS_CertificateFile

>>> %{GlobalVar:ConfigDir}/certs/wifi-radius1.cert

>>>    EAPTLS_CertificateType PEM

>>>    EAPTLS_PrivateKeyFile

>>> %{GlobalVar:ConfigDir}/certs/wifi-radius1.key

>>>    EAPTLS_PrivateKeyPassword whatever

>>>    EAPTLS_MaxFragmentSize 1000

>>>    AutoMPPEKeys

>>>    EAPTLS_PEAPVersion 1

>>> </AuthBy>

>>> 

>>> --8<--

>>> 

>>> Tue Feb 28 12:27:59 2012 737876: DEBUG: Packet dump:

>>> *** Received from 10.11.55.232 port 32768 ....

>>> Code:       Access-Request

>>> Identifier: 145

>>> Authentic:  ES<<16><147>F<136><228>l<229>#z<234><212><182><128>

>>> Attributes:

>>>      User-Name = "testUser"

>>>      Calling-Station-Id = "b3-dd-ae-87-22-b3"

>>>      Called-Station-Id = "bb-3d-b3-ae-00-b0:test"

>>>      NAS-Port = 29

>>>      cisco-avpair = "audit-session-id=0abff816000000f84f4d0bcd"

>>>      NAS-IP-Address = 10.11.55.232

>>>      NAS-Identifier = "cisco-wism"

>>>      Airespace-WLAN-Id = 7

>>>      Service-Type = Framed-User

>>>      Framed-MTU = 1300

>>>      NAS-Port-Type = Wireless-IEEE-802-11

>>>      Tunnel-Type = 0:VLAN

>>>      Tunnel-Medium-Type = 0:802

>>>      Tunnel-Private-Group-ID = 924

>>>      EAP-Message = <2><9><0>+<25><1><23><3><1><0>

>>> 

>>> |<195><27><180>;<16>F<128>"K<158><253>3<141><243>+<216><11><159><183><227><2>6rs<166>f<144><141><244><3><150>

>>>      Message-Authenticator =

>>> <196><237><143><215><203><146>/v<170><219><21><233><214><29>"<193>

>>> 

>>> Tue Feb 28 12:27:59 2012 738099: DEBUG: Handling request with

>>> Handler

>>> '', Identifier ''

>>> Tue Feb 28 12:27:59 2012 738216: DEBUG: Handling request with

>>> Handler

>>> '', Identifier ''

>>> Tue Feb 28 12:27:59 2012 738406: DEBUG: Handling with

>>> Radius::AuthFILE: eap-outer

>>> Tue Feb 28 12:27:59 2012 738611: DEBUG: Handling with EAP: code 2,

>>> 9, 43, 25

>>> Tue Feb 28 12:27:59 2012 738738: DEBUG: Response type 25

>>> Tue Feb 28 12:27:59 2012 739078: DEBUG: EAP PEAP inner

>>> authentication

>>> request for anonymous

>>> Tue Feb 28 12:27:59 2012 739300: DEBUG: PEAP Tunnelled request

>>> Packet dump:

>>> Code:       Access-Request

>>> Identifier: UNDEF

>>> Authentic:  <199><244><220><211><14><18>.<159><18>B}<30><209><202>kr

>>> Attributes:

>>>      EAP-Message = <2><0><0><10><1>testUser

>>>      Message-Authenticator =

>>> <0><0><0><0><0><0><0><0><0><0><0><0><0><0><0><0>

>>>      NAS-IP-Address = 10.11.55.232

>>>      NAS-Identifier = "cisco-wism"

>>>      NAS-Port = 29

>>>      Calling-Station-Id = "b3-dd-ae-87-22-b3"

>>>      User-Name = "anonymous"

>>> 

>>> Tue Feb 28 12:27:59 2012 739446: DEBUG: Handling request with

>>> Handler

>>> 'TunnelledByPEAP=1', Identifier ''

>>> Tue Feb 28 12:27:59 2012 739556: DEBUG: Handling request with

>>> Handler

>>> 'TunnelledByPEAP=1', Identifier ''

>>> Tue Feb 28 12:27:59 2012 739737: DEBUG: Handling with

>>> Radius::AuthNTLM: dm-wifi

>>> Tue Feb 28 12:27:59 2012 739910: DEBUG: Handling with EAP: code 2,

>>> 0, 10, 1

>>> Tue Feb 28 12:27:59 2012 740035: DEBUG: Response type 1

>>> Tue Feb 28 12:27:59 2012 740206: DEBUG: EAP result: 3, EAP MSCHAP-V2

>>> Challenge

>>> Tue Feb 28 12:27:59 2012 740326: DEBUG: AuthBy NTLM result:

>>> CHALLENGE,

>>> EAP MSCHAP-V2 Challenge

>>> Tue Feb 28 12:27:59 2012 740434: DEBUG: AuthBy NTLM result:

>>> CHALLENGE,

>>> EAP MSCHAP-V2 Challenge

>>> Tue Feb 28 12:27:59 2012 740560: DEBUG: Access challenged for

>>> anonymous: EAP MSCHAP-V2 Challenge

>>> Tue Feb 28 12:27:59 2012 740680: DEBUG: Access challenged for

>>> anonymous: EAP MSCHAP-V2 Challenge

>>> Tue Feb 28 12:27:59 2012 740931: DEBUG: Returned PEAP tunnelled

>>> packet dump:

>>> Code:       Access-Challenge

>>> Identifier: UNDEF

>>> Authentic:  <199><244><220><211><14><18>.<159><18>B}<30><209><202>kr

>>> Attributes:

>>>      EAP-Message =

>>> <1><1><0>*<26><1><1><0>%<16><214><185><12><255>~v<196><242>]<176>QX<162><12><128>ywifi-radius-temp

>>>      Message-Authenticator =

>>> <0><0><0><0><0><0><0><0><0><0><0><0><0><0><0><0>

>>> 

>>> Tue Feb 28 12:27:59 2012 741140: DEBUG: EAP result: 3, EAP PEAP

>>> inner

>>> authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 741267: DEBUG: AuthBy FILE result:

>>> CHALLENGE,

>>> EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 741377: DEBUG: AuthBy FILE result:

>>> CHALLENGE,

>>> EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 741504: DEBUG: Access challenged for

>>> testUser: EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 741619: DEBUG: Access challenged for

>>> testUser: EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 741984: DEBUG: Packet dump:

>>> *** Sending to 10.11.55.232 port 32768 ....

>>> Code:       Access-Challenge

>>> Identifier: 145

>>> Authentic:  +r<221>"<169>)<140><154>0<188><185><183><167><220>[<23>

>>> Attributes:

>>>      EAP-Message =

>>> <1><10><0>K<25><1><23><3><1><0>@5<212>O<151>\,I<180><210>>7<185>|<18><188>[<218>Y<148><144><231><173>w<180><138><218>c<225><160>=C]n<233><13><196>"o<242><11><165><198><18>&<215>]<242>M<151><159><145><140>'6D<163>a<177><183>W<170>)<129>T

>>>      Message-Authenticator =

>>> <0><0><0><0><0><0><0><0><0><0><0><0><0><0><0><0>

>>> 

>>> Tue Feb 28 12:27:59 2012 746317: DEBUG: Packet dump:

>>> *** Received from 10.11.55.232 port 32768 ....

>>> Code:       Access-Request

>>> Identifier: 146

>>> Authentic:

>>> <28>2<198><208><212>(<13><254><13><162><148><227><134><229><246><201>

>>> Attributes:

>>>      User-Name = "testUser"

>>>      Calling-Station-Id = "b3-dd-ae-87-22-b3"

>>>      Called-Station-Id = "bb-3d-b3-ae-00-b0:test"

>>>      NAS-Port = 29

>>>      cisco-avpair = "audit-session-id=0abff816000000f84f4d0bcd"

>>>      NAS-IP-Address = 10.11.55.232

>>>      NAS-Identifier = "cisco-wism"

>>>      Airespace-WLAN-Id = 7

>>>      Service-Type = Framed-User

>>>      Framed-MTU = 1300

>>>      NAS-Port-Type = Wireless-IEEE-802-11

>>>      Tunnel-Type = 0:VLAN

>>>      Tunnel-Medium-Type = 0:802

>>>      Tunnel-Private-Group-ID = 924

>>>      EAP-Message =

>>> <2><10><0>k<25><1><23><3><1><0>`<229><182>~U<231>LL<224><11><25><145><2>v<140>y?y4<170><224>Q<24>8<169><158>f<184>&<165><166><147>%<253><143>/<224>D<160><202><131>

>>> 

>>> <229><203>4<237><2><145>Z@<129><137>$<200><229><218><181><10><235><210><161><133>H!<28>F<205>?<173>:[<184>`<210>)<19><184><21><<187>A4<139><169>t<237>5<7><f<189>QY<195><209>D<141>

>>>      Message-Authenticator =

>>> <30><<150><197>JcR<14><223>lY<161><24>w/<250>

>>> 

>>> Tue Feb 28 12:27:59 2012 746562: DEBUG: Handling request with

>>> Handler

>>> '', Identifier ''

>>> Tue Feb 28 12:27:59 2012 746682: DEBUG: Handling request with

>>> Handler

>>> '', Identifier ''

>>> Tue Feb 28 12:27:59 2012 746872: DEBUG: Handling with

>>> Radius::AuthFILE: eap-outer

>>> Tue Feb 28 12:27:59 2012 747078: DEBUG: Handling with EAP: code 2,

>>> 10, 107, 25

>>> Tue Feb 28 12:27:59 2012 747210: DEBUG: Response type 25

>>> Tue Feb 28 12:27:59 2012 747489: DEBUG: EAP PEAP inner

>>> authentication

>>> request for anonymous

>>> Tue Feb 28 12:27:59 2012 747762: DEBUG: PEAP Tunnelled request

>>> Packet dump:

>>> Code:       Access-Request

>>> Identifier: UNDEF

>>> Authentic:  <30>7<160><153><167><133>'<151>KG<136><213>u<30><242><3>

>>> Attributes:

>>>      EAP-Message =

>>> <2><1><0>@<26><2><1><0>;1<190>b<188><197>3Q<236><201><196><174><137>l<16><223><224>h<0><0><0><0><0><0><0><0><232><133><210><161>Jr[<249><233><7><227>7<132><241>x<145>HE<217>=vu<21><233><0>testUser

>>>      Message-Authenticator =

>>> <0><0><0><0><0><0><0><0><0><0><0><0><0><0><0><0>

>>>      NAS-IP-Address = 10.11.55.232

>>>      NAS-Identifier = "cisco-wism"

>>>      NAS-Port = 29

>>>      Calling-Station-Id = "b3-dd-ae-87-22-b3"

>>>      User-Name = "anonymous"

>>> 

>>> Tue Feb 28 12:27:59 2012 747906: DEBUG: Handling request with

>>> Handler

>>> 'TunnelledByPEAP=1', Identifier ''

>>> Tue Feb 28 12:27:59 2012 748018: DEBUG: Handling request with

>>> Handler

>>> 'TunnelledByPEAP=1', Identifier ''

>>> Tue Feb 28 12:27:59 2012 748192: DEBUG: Handling with

>>> Radius::AuthNTLM: dm-wifi

>>> Tue Feb 28 12:27:59 2012 748362: DEBUG: Handling with EAP: code 2,

>>> 1, 64, 26

>>> Tue Feb 28 12:27:59 2012 748490: DEBUG: Response type 26

>>> Tue Feb 28 12:27:59 2012 748661: DEBUG: Radius::AuthNTLM looks for

>>> match with testUser [anonymous]

>>> Tue Feb 28 12:27:59 2012 748801: DEBUG: Radius::AuthNTLM ACCEPT: :

>>> testUser [anonymous]

>>> Tue Feb 28 12:27:59 2012 749086: DEBUG: Passing attribute

>>> Request-User-Session-Key: Yes

>>> Tue Feb 28 12:27:59 2012 749251: DEBUG: Passing attribute

>>> Request-LanMan-Session-Key: Yes

>>> Tue Feb 28 12:27:59 2012 749395: DEBUG: Passing attribute

>>> LANMAN-Challenge: some-challenge

>>> Tue Feb 28 12:27:59 2012 749542: DEBUG: Passing attribute

>>> NT-Response:

>>> some-response

>>> Tue Feb 28 12:27:59 2012 749687: DEBUG: Passing attribute

>>> NT-Domain::

>>> some-domain

>>> Tue Feb 28 12:27:59 2012 749832: DEBUG: Passing attribute Username::

>>> some-username

>>> Tue Feb 28 12:27:59 2012 754539: DEBUG: Received attribute:

>>> Authenticated: Yes

>>> Tue Feb 28 12:27:59 2012 754685: DEBUG: Received attribute:

>>> User-Session-Key: session-key

>>> Tue Feb 28 12:27:59 2012 754809: DEBUG: Received attribute: .

>>> Tue Feb 28 12:27:59 2012 755114: DEBUG: EAP result: 3, EAP MSCHAP V2

>>> Challenge: Success

>>> Tue Feb 28 12:27:59 2012 755241: DEBUG: AuthBy NTLM result:

>>> CHALLENGE,

>>> EAP MSCHAP V2 Challenge: Success

>>> Tue Feb 28 12:27:59 2012 755351: DEBUG: AuthBy NTLM result:

>>> CHALLENGE,

>>> EAP MSCHAP V2 Challenge: Success

>>> Tue Feb 28 12:27:59 2012 755478: DEBUG: Access challenged for

>>> anonymous: EAP MSCHAP V2 Challenge: Success

>>> Tue Feb 28 12:27:59 2012 755588: DEBUG: Access challenged for

>>> anonymous: EAP MSCHAP V2 Challenge: Success

>>> Tue Feb 28 12:27:59 2012 755815: DEBUG: Returned PEAP tunnelled

>>> packet dump:

>>> Code:       Access-Challenge

>>> Identifier: UNDEF

>>> Authentic:  <30>7<160><153><167><133>'<151>KG<136><213>u<30><242><3>

>>> Attributes:

>>>      EAP-Message =

>>> <1><2><0>=<26><3><1><0>8S=537886D34156194318425B12CE9ED8969124063C

>>> M=success

>>>      Message-Authenticator =

>>> <0><0><0><0><0><0><0><0><0><0><0><0><0><0><0><0>

>>> 

>>> Tue Feb 28 12:27:59 2012 756011: DEBUG: EAP result: 3, EAP PEAP

>>> inner

>>> authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 756137: DEBUG: AuthBy FILE result:

>>> CHALLENGE,

>>> EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 756247: DEBUG: AuthBy FILE result:

>>> CHALLENGE,

>>> EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 756374: DEBUG: Access challenged for

>>> testUser: EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 756485: DEBUG: Access challenged for

>>> testUser: EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 756882: DEBUG: Packet dump:

>>> *** Sending to 10.11.55.232 port 32768 ....

>>> Code:       Access-Challenge

>>> Identifier: 146

>>> Authentic:  .<152>4<150><245><134>JV<14><147><241><182><18>}$<26>

>>> Attributes:

>>>      EAP-Message =

>>> <1><11><0>k<25><1><23><3><1><0>`<215>8]<183>m<197>N<250>kl<10><179>y><178><137><183>v<233><<255>{<177>r<207><186><1><9>*<142><207>Rl<31><173><25><237>%*<151><219>ts<16>H<218><169><10><252>eY<245>+<245><213><157>b<202><207><147><237><156>i<15><253><175><204><16><167><239>e<198><175><228>X<175><180><150><184>s<179>4<146>&w<20><203><175><16><155>*<162><133><224><129>-

>>>      Message-Authenticator =

>>> <0><0><0><0><0><0><0><0><0><0><0><0><0><0><0><0>

>>> 

>>> Tue Feb 28 12:27:59 2012 760841: DEBUG: Packet dump:

>>> *** Received from 10.11.55.232 port 32768 ....

>>> Code:       Access-Request

>>> Identifier: 147

>>> Authentic:

>>> <219><222>T<233><179><159><5>S<22><172><227><160><206>l<162>G

>>> Attributes:

>>>      User-Name = "testUser"

>>>      Calling-Station-Id = "b3-dd-ae-87-22-b3"

>>>      Called-Station-Id = "bb-3d-b3-ae-00-b0:test"

>>>      NAS-Port = 29

>>>      cisco-avpair = "audit-session-id=0abff816000000f84f4d0bcd"

>>>      NAS-IP-Address = 10.11.55.232

>>>      NAS-Identifier = "cisco-wism"

>>>      Airespace-WLAN-Id = 7

>>>      Service-Type = Framed-User

>>>      Framed-MTU = 1300

>>>      NAS-Port-Type = Wireless-IEEE-802-11

>>>      Tunnel-Type = 0:VLAN

>>>      Tunnel-Medium-Type = 0:802

>>>      Tunnel-Private-Group-ID = 924

>>>      EAP-Message = <2><11><0>+<25><1><23><3><1><0>

>>> 

>>> <12><177><248><244><30><235>n_<205><245>@/<3><224>$Ov$<237><138>+R<245><167>>/<27><134><201>v1<128>

>>>      Message-Authenticator =

>>> <249>=<217><165><5><31>|<7><149>]<201><180><209><187><234><175>

>>> 

>>> Tue Feb 28 12:27:59 2012 761081: DEBUG: Handling request with

>>> Handler

>>> '', Identifier ''

>>> Tue Feb 28 12:27:59 2012 761204: DEBUG: Handling request with

>>> Handler

>>> '', Identifier ''

>>> Tue Feb 28 12:27:59 2012 761434: DEBUG: Handling with

>>> Radius::AuthFILE: eap-outer

>>> Tue Feb 28 12:27:59 2012 761631: DEBUG: Handling with EAP: code 2,

>>> 11, 43, 25

>>> Tue Feb 28 12:27:59 2012 761761: DEBUG: Response type 25

>>> Tue Feb 28 12:27:59 2012 762048: DEBUG: EAP PEAP inner

>>> authentication

>>> request for anonymous

>>> Tue Feb 28 12:27:59 2012 762274: DEBUG: PEAP Tunnelled request

>>> Packet dump:

>>> Code:       Access-Request

>>> Identifier: UNDEF

>>> Authentic:

>>> <162><242><137><247><165><197>\<<169><158>L<188>5<1>f<246>

>>> Attributes:

>>>      EAP-Message = <2><2><0><6><26><3>

>>>      Message-Authenticator =

>>> <0><0><0><0><0><0><0><0><0><0><0><0><0><0><0><0>

>>>      NAS-IP-Address = 10.11.55.232

>>>      NAS-Identifier = "cisco-wism"

>>>      NAS-Port = 29

>>>      Calling-Station-Id = "b3-dd-ae-87-22-b3"

>>>      User-Name = "anonymous"

>>> 

>>> Tue Feb 28 12:27:59 2012 762416: DEBUG: Handling request with

>>> Handler

>>> 'TunnelledByPEAP=1', Identifier ''

>>> Tue Feb 28 12:27:59 2012 762614: DEBUG: Handling request with

>>> Handler

>>> 'TunnelledByPEAP=1', Identifier ''

>>> Tue Feb 28 12:27:59 2012 762809: DEBUG: Handling with

>>> Radius::AuthNTLM: dm-wifi

>>> Tue Feb 28 12:27:59 2012 762984: DEBUG: Handling with EAP: code 2,

>>> 2, 6, 26

>>> Tue Feb 28 12:27:59 2012 763143: DEBUG: Response type 26

>>> Tue Feb 28 12:27:59 2012 763319: DEBUG: EAP result: 0,

>>> Tue Feb 28 12:27:59 2012 763440: DEBUG: AuthBy NTLM result: ACCEPT,

>>> Tue Feb 28 12:27:59 2012 763548: DEBUG: AuthBy NTLM result: ACCEPT,

>>> Tue Feb 28 12:27:59 2012 763677: DEBUG: Access accepted for

>>> anonymous

>>> Tue Feb 28 12:27:59 2012 763788: DEBUG: Access accepted for

>>> anonymous

>>> Tue Feb 28 12:27:59 2012 764183: DEBUG: Returned PEAP tunnelled

>>> packet dump:

>>> Code:       Access-Accept

>>> Identifier: UNDEF

>>> Authentic:

>>> <162><242><137><247><165><197>\<<169><158>L<188>5<1>f<246>

>>> Attributes:

>>>      EAP-Message = <3><2><0><4>

>>>      Message-Authenticator =

>>> <0><0><0><0><0><0><0><0><0><0><0><0><0><0><0><0>

>>> 

>>> Tue Feb 28 12:27:59 2012 764406: DEBUG: EAP result: 3, EAP PEAP

>>> inner

>>> authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 764535: DEBUG: AuthBy FILE result:

>>> CHALLENGE,

>>> EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 764659: DEBUG: AuthBy FILE result:

>>> CHALLENGE,

>>> EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 764791: DEBUG: Access challenged for

>>> testUser: EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 764905: DEBUG: Access challenged for

>>> testUser: EAP PEAP inner authentication redispatched to a Handler

>>> Tue Feb 28 12:27:59 2012 765255: DEBUG: Packet dump:

>>> *** Sending to 10.11.55.232 port 32768 ....

>>> Code:       Access-Challenge

>>> Identifier: 147

>>> Authentic:

>>> <241>:\<176><204><154>`O<196><183><201><153><173><8><247><136>

>>> Attributes:

>>>      EAP-Message = <1><12><0>+<25><1><23><3><1><0>

>>> 

>>> @l<31><147>[<223><1>`<236><233>~<226><189><208><215>@X<248>a<210><160><213>-<8>].s<148><226><245><217><26>

>>>      Message-Authenticator =

>>> <0><0><0><0><0><0><0><0><0><0><0><0><0><0><0><0>

>>> 

>>> Tue Feb 28 12:27:59 2012 769812: DEBUG: Packet dump:

>>> *** Received from 10.11.55.232 port 32768 ....

>>> Code:       Access-Request

>>> Identifier: 148

>>> Authentic:  <191><247><200>F<176>Q<229>!<235>P<254>g<187><229><228>t

>>> Attributes:

>>>      User-Name = "testUser"

>>>      Calling-Station-Id = "b3-dd-ae-87-22-b3"

>>>      Called-Station-Id = "bb-3d-b3-ae-00-b0:test"

>>>      NAS-Port = 29

>>>      cisco-avpair = "audit-session-id=0abff816000000f84f4d0bcd"

>>>      NAS-IP-Address = 10.11.55.232

>>>      NAS-Identifier = "cisco-wism"

>>>      Airespace-WLAN-Id = 7

>>>      Service-Type = Framed-User

>>>      Framed-MTU = 1300

>>>      NAS-Port-Type = Wireless-IEEE-802-11

>>>      Tunnel-Type = 0:VLAN

>>>      Tunnel-Medium-Type = 0:802

>>>      Tunnel-Private-Group-ID = 924

>>>      EAP-Message = <2><12><0>+<25><1><23><3><1><0>

>>> 

>>> c<231><169>g(<173><133><225><149>{<193><185><201><139>2<160><20><169>I<253><145><173>)<226>B<22><29>G<222>`6<183>

>>>      Message-Authenticator =

>>> (<217><144>3I<171><10><194><28><15><8><18><242><139><198>W

>>> 

>>> Tue Feb 28 12:27:59 2012 770148: DEBUG: Handling request with

>>> Handler

>>> '', Identifier ''

>>> Tue Feb 28 12:27:59 2012 770331: DEBUG: Handling request with

>>> Handler

>>> '', Identifier ''

>>> Tue Feb 28 12:27:59 2012 770707: DEBUG: Handling with

>>> Radius::AuthFILE: eap-outer

>>> Tue Feb 28 12:27:59 2012 770989: DEBUG: Handling with EAP: code 2,

>>> 12, 43, 25

>>> Tue Feb 28 12:27:59 2012 771224: DEBUG: Response type 25

>>> Tue Feb 28 12:27:59 2012 771782: DEBUG: EAP result: 0,

>>> Tue Feb 28 12:27:59 2012 771975: DEBUG: AuthBy FILE result: ACCEPT,

>>> Tue Feb 28 12:27:59 2012 772145: DEBUG: AuthBy FILE result: ACCEPT,

>>> Tue Feb 28 12:27:59 2012 772338: DEBUG: Access accepted for testUser

>>> Tue Feb 28 12:27:59 2012 772508: DEBUG: Access accepted for testUser

>>> Tue Feb 28 12:27:59 2012 773368: DEBUG: Packet dump:

>>> *** Sending to 10.11.55.232 port 32768 ....

>>> Code:       Access-Accept

>>> Identifier: 148

>>> Authentic:  C<196><31><206><169>bF<220>j<237>K<1><183>+c<4>

>>> Attributes:

>>>      EAP-Message = <3><12><0><4>

>>>      Message-Authenticator =

>>> <0><0><0><0><0><0><0><0><0><0><0><0><0><0><0><0>

>>>      MS-MPPE-Send-Key =

>>> 

>>> <131>9<217>1<158><174><131>q><23>)<182><132>*<175><161>><26>I<187><143>t<217><26><245><14>;<167>%;W<200>

>>>      MS-MPPE-Recv-Key =

>>> 

>>> <193>$B<0>sn"<10><190>_U<221>1<173>#<153><7><198>+5<188>}<200>F<251>|^<230><218>G)<175>

>>> 

>>> -->8--

>>> 

>>> Thoughts on what may be happening? I can't seem to find anything on

>>> the web about this, but I'm also hard-pressed to believe we're the

>>> only folks that have run into this. The client simply refuses to

>>> connect. It's worth noting that OS X indicates the client is

>>> "connected" with a self-assigned 169.x.x.x IP address, but the logs

>>> really indicate that en1 (the wireless interface) continues to go

>>> up/down and re-attempt authentication.

>>> 

>>> Any help would be greatly appreciated.

>>> 

>>> -james

>>> _______________________________________________

>>> radiator mailing list

>>> radiator at open.com.au <mailto:radiator at open.com.au> 

>>> http://www.open.com.au/mailman/listinfo/radiator <http://www.open.com.au/mailman/listinfo/radiator> 

>> 

>> 

>> JANET(UK) is a trading name of The JNT Association, a company limited

>> by guarantee which is registered in England under No. 2881024

>> and whose Registered Office is at Lumen House, Library Avenue,

>> Harwell Oxford, Didcot, Oxfordshire. OX11 0SG

>> 

>> _______________________________________________

>> radiator mailing list

>> radiator at open.com.au <mailto:radiator at open.com.au> 

>> http://www.open.com.au/mailman/listinfo/radiator <http://www.open.com.au/mailman/listinfo/radiator> 

> 

> _______________________________________________

> radiator mailing list

> radiator at open.com.au <mailto:radiator at open.com.au> 

> http://www.open.com.au/mailman/listinfo/radiator <http://www.open.com.au/mailman/listinfo/radiator> 

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.open.com.au/pipermail/radiator/attachments/20120301/f408bb03/attachment-0001.html 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: f1023_20120301.radius.log
Type: application/octet-stream
Size: 36800 bytes
Desc: f1023_20120301.radius.log
Url : http://www.open.com.au/pipermail/radiator/attachments/20120301/f408bb03/attachment-0001.obj 


More information about the radiator mailing list