EAP-TLV: Earlier failure - force failed Phase 2

Dan Williams dcbw at redhat.com
Mon Jan 4 15:42:30 PST 2016


On Mon, 2016-01-04 at 15:28 -0800, Adam Jacobs wrote:
> Gotcha,  here's the NM config.  I'm running version 1.0.4 which is
> stock for Ubuntu 15.10.

This all looks pretty standard; can you get the supplicant debug info? 
 Double-check to ensure it doesn't include your password.  Since
wpa_supplicant is auto-started as a D-Bus service, if you kill it it
will just be restarted again.  The simplest way to get output is
probably:

1) mv /usr/sbin/wpa_supplicant /
2) killall -TERM wpa_supplicant
3) /wpa_supplicant -dddtu
4) reproduce the problem, get the output
5) Ctrl+C the supplicant
6) mv /wpa_supplicant /usr/sbin

and toggle rfkill or 'nmcli r wifi off; nmcli r wifi on"

Dan

> 
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'ssid' value 'Mocana-SECURE'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'scan_ssid' value '1'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'key_mgmt' value 'WPA-EAP'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'password' value '<omitted>'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'eap' value 'PEAP'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'fragment_size' value '1300'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'phase2' value 'auth=MSCHAPV2'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'ca_cert' value '/home/ajacobs/Documents/MocanaRoot.pem'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'identity' value 'ajacobs'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'bgscan' value 'simple:30:-65:300'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: added
> 'proactive_key_caching' value '1'
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  Config: set
> interface ap_scan to 1
> Jan  4 12:20:02 jeremiah NetworkManager[5337]: <info>  (wlan0):
> supplicant interface state: inactive -> scanning
> 
> 
> 
> 
> I see a couple of parameters being set there that I'm NOT setting
> when I manually configure wpa_supplicant myself, to perhaps it's one
> of those?  Maybe proactive_key_caching?  That seems like a likely
> candidate.  I'm going to try turning that back on in my manual config
> and see if it reproduces the problem.
> 
> 
> 
> 
> Adam
> 
> 
> ________________________________________
> From: Dan Williams [dcbw at redhat.com]
> Sent: Monday, January 04, 2016 15:18
> To: Adam Jacobs; Jouni Malinen
> Cc: hostap at lists.infradead.org
> Subject: Re: EAP-TLV: Earlier failure - force failed Phase 2
> 
> On Mon, 2016-01-04 at 14:46 -0800, Adam Jacobs wrote:
> > Well, this is weird.
> > 
> > My laptop runs Ubuntu, and when I reproduced the error, it was
> > invoking wpa_supplicant via NetworkManager.  Of course, to test
> > disabling TLS1.2, I had to shut off NetworkManager and invoke
> > wpa_supplicant manually.
> > 
> > What I've now discovered is that if I invoke wpa_supplicant
> > manually,
> > everything works fine even if I DON'T disable TLS1.2.  My config
> > looks like this:
> > 
> > 
> > 
> > network={
> >   ssid="Mocana-SECURE"
> >   key_mgmt=WPA-EAP
> >   eap=PEAP
> >   identity="ajacobs"
> >   password="**********"
> >   phase2="auth=MSCHAPV2"
> >   ca_cert="/usr/local/etc/MocanaRoot.pem"
> > }
> > 
> > 
> > 
> > 
> > So it must be something about the way NetworkManager is
> > calling/managing NetworkSupplicant that causes this failure.
> >  Unfortunately I don't know of any way to debug that further, and
> > as
> > I've shown wpa_supplicant to be working properly it is probably no
> > longer the domain of this group, Still, I'm happy to take
> > suggestions
> > if anyone has any ideas for debugging further.
> 
> You can look in your syslog where NM will print the configuration
> options it's sending to the supplicant.  We obviously intend that NM
> will work here, so this seems like a bug or misconfiguration.  You'll
> see stuff like:
> 
> NetworkManager[831]: <info>  Config: added 'ssid' value 'my SSID'
> NetworkManager[831]: <info>  Config: added 'scan_ssid' value '1'
> NetworkManager[831]: <info>  Config: added 'key_mgmt' value 'WPA-PSK'
> NetworkManager[831]: <info>  Config: added 'psk' value '<omitted>'
> NetworkManager[831]: <info>  Config: added 'proto' value 'WPA RSN'
> 
> and while this is obviously for a WPA-PSK connection, yours will EAP
> -specific stuff.
> 
> What version of NetworkManager are you using?
> 
> Dan
> 
> > 
> > 
> > 
> > Serves me right for using NetworkManager in the first place.
> > 
> > 
> > 
> > 
> > Adam
> > 
> > 
> > ________________________________________
> > From: Jouni Malinen [j at w1.fi]
> > Sent: Friday, January 01, 2016 06:28
> > To: Adam Jacobs
> > Cc: hostap at lists.infradead.org
> > Subject: Re: EAP-TLV: Earlier failure - force failed Phase 2
> > 
> > On Thu, Dec 31, 2015 at 03:36:22PM -0800, Adam Jacobs wrote:
> > > Dec 17 07:18:20 jeremiah wpa_supplicant[1146]: wlan0: CTRL-EVENT
> > > -EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
> > > Dec 17 07:18:20 jeremiah wpa_supplicant[1146]: EAP-MSCHAPV2:
> > > Authentication succeeded
> > > Dec 17 07:18:20 jeremiah wpa_supplicant[1146]: EAP-TLV: TLV
> > > Result
> > > - Success - EAP-TLV/Phase2 Completed
> > > Dec 17 07:18:20 jeremiah wpa_supplicant[1146]: EAP-TLV: Earlier
> > > failure - force failed Phase 2
> > 
> > It looks like Phase 2 (EAP-MSCHAPv2 username/password validation)
> > succeeded, but something went wrong with the following PEAP steps.
> > Adding some more wpa_supplicant debug verbosity (e.g., -d on the
> > command
> > line) would help clarify what exactly happened here.
> > 
> > > It seems to happen more-or-less randomly; I'm not doing anything
> > > in
> > > particular when the connection drops.  I'd say an average session
> > > lasts about 30 minutes or so, before it dies and I need to
> > > restart.
> > > 
> > > Disabling TLS1.2 in wpa_supplicant seems to solve the problem,
> > > but
> > > that's a workaround, not a fix.
> > > 
> > > Any ideas?  In particular, "EAP-TLV: Earlier failure - force
> > > failed
> > > Phase 2" seems to be where the trouble starts.  Anyone know what
> > > that means?
> > 
> > My first guess would be that this ended up using PEAPv0
> > cryptobinding
> > and there was an interop issue of some short that caused the server
> > and
> > wpa_supplicant derive different value. That may very well be
> > dependent
> > on TLS v1.2 being used.
> > 
> > Unfortunately, I do not have a Windows 2012 RADIUS server to test
> > this
> > easily myself. If you can produce more detailed debug logs from
> > wpa_supplicant, that would be useful information to have for
> > figuring
> > out what exactly might be causing this.
> > 
> > As a workaround, it might be possible to add
> > phase1="crypto_binding=0"
> > to disable use of PEAP cryptobinding (if the server allows this).
> > That
> > said, I'd rather get the real issue figured out and fixed.
> > 
> > --
> > Jouni Malinen                                            PGP id
> > EFC895FA
> > 
> > _______________________________________________
> > Hostap mailing list
> > Hostap at lists.infradead.org
> > http://lists.infradead.org/mailman/listinfo/hostap
> 
> _______________________________________________
> Hostap mailing list
> Hostap at lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/hostap



More information about the Hostap mailing list