[RADIATOR] Extracting certificates info for EAP PEAP,TTLS,TLS
Christian Kratzer
ck-lists at cksoft.de
Tue Feb 24 06:43:12 CST 2015
Hi Sami,
On Tue, 24 Feb 2015, Sami Keski-Kasari wrote:
> Hello Christian,
>
> MSCHAPv2 is mutual authentication protocol where client requires
> response from server. If the server doesn't send correct response client
> will terminate connection.
> So server can not just decide to accept authentication like in PAP case.
> I think that it is not possible to build walled garden solution with
> that protocol.
Thanks. That makes sense. I forgot about the mutality in CHAP.
Greetings
Christian
> If you use for example PEAP/GTC or EAP-TTLS/PAP you can use AuthBy GROUP
> to group sequences and use different policy inside them.
>
> for example like this:
>
> <Handler TunnelledByPEAP=1>
> Identifier TunnelledByPEAP=1
> AuthByPolicy ContinueWhileAccept
> <AuthBy GROUP>
> AuthByPolicy ContinueWhileReject
> AuthBy SQLauthenticate
> <AuthBy INTERNAL>
> AuthHook sub {my $p = $_[0];\
> $p->add_attr('X-OSC-Auth-Status', 'Rejected');\
> return $main::ACCEPT}
> </AuthBy>
> </AuthBy>
> AuthBy INTERNALextractFunnyStuffFromRequest
> AuthBy SQLauthorize
> </Handler>
>
> In this example the inner AuthBy INTERNAL will change reject to accept
> and mark it with vendor specific attribute that you can use in later
> INTERNAL to determine if authentication was successful or not.
>
> Best Regards,
> Sami
>
> On 02/24/2015 01:12 PM, Christian Kratzer wrote:
>> Hi Sami,
>>
>> We made progress with our setup thanks to your previous tips.
>>
>> We now have following setup simplyfied a bit:
>>
>> <Handler TunnelledByPEAP=1>
>> Identifier TunnelledByPEAP=1
>> AuthByPolicy ContinueWhileAccept
>> AuthBy SQLauthenticate
>> AuthBy INTERNALextractFunnyStuffFromRequest
>> AuthBy SQLauthorize
>> </Handler>
>>
>> <Handler>
>> Identifier Outer
>> AuthBy FILE
>> </Handler>
>>
>> the issue we are currently chasing is that the customer also wants
>> failed authentications to proceed into SQLauthorize so he can possible
>> put people into a walled garden with specific reply attributes.
>>
>> The issue seems to be that when MS-CHAP2 fails in TunneledByPeap it
>> seems to kill the EAP session and authentication terminates.
>>
>> Subsequent packets are not forwarded to the tunneled handler by the
>> outer handler.
>>
>> Do you have a suggestion how to accomplish authorization after failed
>> chap authentication.
>>
>> Terveisin
>> Christian
>>
>
>
>
--
Christian Kratzer CK Software GmbH
Email: ck at cksoft.de Wildberger Weg 24/2
Phone: +49 7032 893 997 - 0 D-71126 Gaeufelden
Fax: +49 7032 893 997 - 9 HRB 245288, Amtsgericht Stuttgart
Mobile: +49 171 1947 843 Geschaeftsfuehrer: Christian Kratzer
Web: http://www.cksoft.de/
More information about the radiator
mailing list