Problems with EAP-TTLS/EAP-TLS - One Step further
Carolin Latze
carolin.latze
Fri Oct 31 03:28:11 PDT 2008
Jouni Malinen wrote:
> On Thu, Oct 30, 2008 at 03:11:39PM +0100, Carolin Latze wrote:
>
>
>> meanwhile I tried several things and didn't succeed but I have an idea
>> what's going wrong. It seems that the wpa_supplicant only takes the
>> engine for the outer authentication. Is that possible?
>>
>
> Yes, that is quite possible. I have not tested using OpenSSL engine in
> phase 2.
>
Ok... I will go on debugging when I got it running without engine. If
you have some hints where to start it, I would be happy (otherwise I
start grepping through the code). At the moment I am still working with
wpa_supplicant 0.5.9 since I integrated the TPM engine into that version
and 0.6 brought a lot of changes. Seems like I have to reimplement my
integration in version 0.6. So if there is not strong need to change the
version, I would prefer to postpone it.
>
>> Therefore my question: On the wpa_supplicant homepage I saw that
>> EAP-TTLS/EAP-TLS has been tested with FreeRADIUS. Is there a place where
>> to download the test configurations? That would be very helpful for me!
>> I want to try to use EAP-TTLS/EAP-TLS without engine for a first test
>> (take out the complexity in order to understand it :)). I tried it with:
>>
>
> This worked when I lasted tested it, but I've only tested without an
> engine and EAP-TLS inside EAP-PEAP or -TTLS has previously been somewhat
> of a problem case, so you may need to update FreeRADIUS unless you are
> using the latest release.
>
Is that a problem of FreeRADIUS? As I wrote, I also do not use the
newest wpa_supplicant. But anyhow, I upgraded the FreeRADIUS to version
2.1.1. I also tried it with the latest version from git (2.1.2). But I
get still the same error. I attached the complete log to this mail.
>
>> eap=TTLS
>>
>> phase2="autheap=TLS"
>>
>> identity="10.1.1.5"
>> ca_cert="/home/latze/cert/cacert.pem"
>> client_cert2="/home/latze/cert/basisk_cert.pem"
>> private_key2="/home/latze/cert/basisk_key.pem"
>> private_key2_passwd="PW"
>>
>
> I would recommend including ca_cert2 here, too, so that wpa_supplicant
> will verify server certificate in phase2 should the server be using a
> different key in phase 1 and 2 (not really a very likely case, but
> anyway, it is good to validate certificates both in phase 1 and 2).
>
Ok, changed that.
Regards
Carolin
--
Carolin Latze
Research Assistant ICT Engineer
Department of Computer Science Swisscom Strategy and Innovation
Boulevard de P?rolles 90 Ostermundigenstrasse 93
CH-1700 Fribourg CH-3006 Bern
phone: +41 26 300 83 30 +41 79 72 965 27
homepage: http://diuf.unifr.ch/people/latzec
More information about the Hostap
mailing list