Wed Nov 29 21:11:52 PST 2006
Hi Bryan, thanks for the details. I admit right off that I'm asking prior to doing sufficent groundwork, so I apologize in advance.
On Wed, Nov 29, 2006 at 11:17:00PM -0500, Bryan Kadzban wrote:
> Benn wrote:
> > I'm trying to take advantage of the WindowsXP Zero Configuration
> I assume you're connecting to hostapd then, right? Which RADIUS server?
I've been fiddling with freeradius, to date.
> > What I /expect/ might work, is to use a server certificate signed by
> > a previously accepted CA (you know, like Verisign or some such).
> Well, yes, the cert has to be signed by a CA whose cert is in the
> "trusted root store". But by default the WZC stuff is *also* set to
> "validate server certificate" and no CAs selected, so by default no
> certs are trusted. So by default it won't talk to any RADIUS server.
Thanks for the well crafted answer, that was basically what I expected to hear, but was hoping otherwise :) The interesting thing is, the client is definitely sending out some kind of packet which gets turned into a request to the radius server:
IEEE 802.1X: 9 bytes from 00:13:d3:6f:b1:4e
IEEE 802.1X: version=1 type=0 length=5
EAP: code=2 identifier=1 length=5 (response)
ath0: STA 00:13:d3:6f:b1:4e IEEE 802.1X: received EAP packet (code=2 id=1 len=5) from STA: EAP Response-Identity (1)
ath0: STA 00:13:d3:6f:b1:4e IEEE 802.1X: STA identity ''
IEEE 802.1X: 00:13:d3:6f:b1:4e BE_AUTH entering state RESPONSE
It gets packaged up to the radius server, which says:
rad_recv: Access-Request packet from host 127.0.0.1:32771, id=1, length=140
User-Name = ""
NAS-IP-Address = 127.0.0.1
NAS-Port = 0
Called-Station-Id = "00-14-6C-A2-85-F8:test00"
Calling-Station-Id = "00-13-D3-6F-B1-4E"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x0201000501
Message-Authenticator = 0x533dd02e9989488687e022432e064d03
Now, ideally I would somehow encourage the radius server to send back a "yup, all good" reply (or modify the internal-to-hostapd radius server to do the same), hostapd would consider everything kosher, and we'd be off.
> Is hostapd logging these packets? ;-)
See above :)
> In any case, I'd check the "validate server cert" settings. It's in the
Any other day, that'd probably be perfect. The operational requirements however are "0 user input". Cheatings acceptable, fractured security is even somewhat acceptable, as long as the traffic is not directly sniffable, or so the management says.
/I'd/ still like it as secure as possible, however.
More information about the Hostap