[Chilli] 802.1X - EAP/TLS Authentication using coova as Radius proxy [SOLVED]
HOUSSENBAY Adnane-Olivier
houssenbay at et.esiea.fr
Tue Sep 9 14:33:13 UTC 2014
Hi everyone,
I solved the EAP-TLS authentication issue.
The length of packets sent by wpa_supplicant was too big (1408 bytes).
Indeed, when the radius client encapsulates EAP message in a radius packet (Access-Request), total length of radius packet was greater than 1500 bytes.
Thus coovaChilli dropped these packets.
To fix that, I just configure my supplicant to make fragments of 1024 bytes.
Here is my configuration of wpa_supplicant, maybe it can be useful to somebody :
# EAP-TLS wired authentication
network={
eapol_flags=0
key_mgmt=WPA-EAP
eap=TLS
identity="yourID"
ca_cert="path/to/ca_certificate
client_cert="path/to/client_certificate"
private_key="path/to/client_private_key
private_key_passwd="yourPassword"
fragment_size=1024
}
Finally, I would like to thanks coovaChilli developers for their work. It's a great project and for me the best network access controller.
Best regards,
Olivier
ALCASAR<http://www.alcasar.net/en> project member
________________________________
De : HOUSSENBAY Adnane-Olivier
Envoyé : jeudi 4 septembre 2014 19:31
À : chilli at coova.org
Objet : 802.1X - EAP/TLS Authentication using coova as Radius proxy
Dear CoovaChilli users,
I'm trying to do 802.1X (wired/ and wireless with wpa) authentication using EAP-TLS method which involve mutual authentication with certificates (both sides client/server).
I already succeed to 802.1X EAP-PEAP authentication but I'm having trouble with EAP-TLS.
I configured chilli as proxy radius with the parameters below :
--proxylisten
--proxyport
--proxyclient
--proxysecret
Here is my authentication chain link:
Supplicant wpa_supplicant <-> switch Alcatel <-> coovachilli <-> freeradius server
So, the dialog between the supplicant and freeradius is doing well until
freeradius ask for client certificate. At this moment the switch interrupt
the authentication process. ( I got the same with wireless authentication using
Alcatel omniaccess AP)
I checked with wireshark the frames between freeradius <->coova<-> switch :
the radius packet from freeradius (Access-challenge) containing certificate request is forwarded to
the switch properly.
Frames between supplicant <-> switch
When client certificate is requested the supplicant send the first eap fragment which contains
the client certificate but it's "dropped" by the switch and it displays "Radius server not reachable"
To resume the situation here is the radius packets exchange :
switch <-----------------------------------> freeradius
--------> Access-Request: identity
<-------- Access-Challenge : Start TLS
---------> Access-Request: Client Hello
<-------- Access-Challenge : Server Hello, Certificate Request
And then nothing happens :(
Please help me if anyone have suggestion or explanation about this strange behaviour.
Thanks for all the reply, all the best.
Olivier
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.coova.org/pipermail/chilli/attachments/20140909/d7086187/attachment.html>
More information about the Chilli
mailing list