Dopisz:)
Dzięki, już dograłem hostapd:)
Możesz mi opisać w 3 zdaniach jak ogarnąć te certyfikaty.. kombinuje kiedyś mi się to jakoś (raczej przez przypadek udało) a teraz nie bardzo.
Robię wszystko mniej więcej zgodnie z http://rpc.one.pl/index.php/lista-artyk … enssl-x509.
Mniej więcej bo nie jest to dla mnie jasno opisane.
Na OpenWRT 10.03 Gargoyle PL
1) generuje centrum certyfikacji zgodnie z punktem 1. Pojawia mi się folder demoCA z którego kopiuje plik cacert.pem
2) robię zmiany w pliku zgodnie z twoim punktem 10. Następnie generuje newcert.pem i newkey.pem zgodnie z punktem 2. Znaczy w nim jest coś nie tak, bo jest znowu .CA.sh -newca. Więc.. daje najpierw ./CA.pl -newreq-nodes potem podpisuje ./CA.pl -sign .
3) generuje dh zgodnie z tym co napisałeś. Potem kopiuje i podpinam w pliku eap.conf
Przy próbie podłączenia klienta po eap-peap (windows 7)
dostaje coś o nieznanym ca "unknow CA"
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.2.1 port 56049, id=4, length=1 62
User-Name = "pawel.stojak"
NAS-Port = 1
Called-Station-Id = "94-0C-6D-AC-51-1A:gargoyle"
Calling-Station-Id = "00-14-85-C6-2D-CA"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x02cd001101706177656c2e73746f6a616b
Message-Authenticator = 0x0521b3d63d4105f3b8b5bc4f43c9be06
+- entering group authorize {...}
[eap] EAP packet type response id 205 length 17
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[mschap] returns noop
[files] users: Matched entry pawel.stojak at line 5
++[files] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 4 to 192.168.2.1 port 56049
EAP-Message = 0x01ce00061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x7ff3461a7f3d5f2db76e64fa567da44a
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.2.1 port 56049, id=5, length=2 89
User-Name = "pawel.stojak"
NAS-Port = 1
Called-Station-Id = "94-0C-6D-AC-51-1A:gargoyle"
Calling-Station-Id = "00-14-85-C6-2D-CA"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x02ce007e198000000074160301006f0100006b03014d35db858001a6 f7162b1d3b86a6f96011ef495cacc7fcbd03b8f561f6ae4c1b000018002f00350005000ac013c014 c009c00a00320038001300040100002aff0100010000000011000f00000c706177656c2e73746f6a 616b000a0006000400170018000b00020100
State = 0x7ff3461a7f3d5f2db76e64fa567da44a
Message-Authenticator = 0x50271bdc360923add577fdc6c19ab2b7
+- entering group authorize {...}
[eap] EAP packet type response id 206 length 126
[eap] Continuing tunnel setup.
++[eap] returns ok
++[mschap] returns noop
[files] users: Matched entry pawel.stojak at line 5
++[files] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 116
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] (other): before/accept initialization
[peap] TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 006f], ClientHello
[peap] TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 0031], ServerHello
[peap] TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 0668], Certificate
[peap] TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
[peap] TLS_accept: SSLv3 write server done A
[peap] TLS_accept: SSLv3 flush data
[peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 5 to 192.168.2.1 port 56049
EAP-Message = 0x01cf040019c0000006ac16030100310200002d03014d35db815a8760 a76c6377fa66cc70dcfc7da6293005378d774349d42ec17e7300002f000005ff0100010016030106 680b00066400066100031e3082031a30820283a003020102020101300d06092a864886f70d010105 05003077310b300906035504061302504c310e300c06035504081305736c61736b310c300a060355 040a1303484f57310c300a060355040b1303484f57311530130603550403130c506177656c205374 6f6a616b3125302306092a864886f70d0109011616706177656c2e73746f6a616b40676d61696c2e 636f6d301e170d3131303131383137353135345a170d323130
EAP-Message = 0x3131353137353135345a308187310b300906035504061302504c310e 300c06035504081305536c61736b310e300c06035504071305506f72616a310c300a060355040a13 03484f57310c300a060355040b1303484f57311530130603550403130c706177656c2073746f6a61 6b3125302306092a864886f70d0109011616706177656c2e73746f6a616b40676d61696c2e636f6d 30819f300d06092a864886f70d010101050003818d0030818902818100bbf7282d1d0633f8bf1c4c 9f991d43cba1f0098d96220e347b945a574b33cdf96e4479cc9b67ff5954b999c4697b121a09ce32 2a4d77b26e88f6350bc5b3f8f8309b872ddbe1e2a4585d5540
EAP-Message = 0x76d7a6dd2056c97d3fa664e84df7a427f017420f515710e532d15643 54856c91f34135a51b29d01b9c84d69eb582c0aede0da4dd0203010001a381a43081a13009060355 1d1304023000301106096086480186f842010104040302064030130603551d25040c300a06082b06 010505070301302c06096086480186f842010d041f161d4f70656e53534c2047656e657261746564 204365727469666963617465301d0603551d0e04160414d29a6a0fe21b00eaf5dd4ca118ee7006d1 049a94301f0603551d230418301680142e3d53cce71f100424349f58897270ddcd843a10300d0609 2a864886f70d0101050500038181006f1f328110331d55c6c1
EAP-Message = 0xeee22db565ea73491541f240f47d65b3f32f0ea152811f8dbd38eacb e61327833e22cc5a5fec7af9e09aaf7e0d39f5c52d273b1a3ddba42be38e73387a5aa351bded616a 4ca4ddedf7ad4fe02deaace39bb7991613c31800a34f0776d0d1a4d095ff30bfb378be66bb257998 4da68327929b3495d70f00033d30820339308202a2a003020102020100300d06092a864886f70d01 010505003077310b300906035504061302504c310e300c06035504081305736c61736b310c300a06 0355040a1303484f57310c300a060355040b1303484f57311530130603550403130c506177656c20 53746f6a616b3125302306092a864886f70d01090116167061
EAP-Message = 0x77656c2e73746f6a616b4067
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x7ff3461a7e3c5f2db76e64fa567da44a
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.2.1 port 56049, id=6, length=1 69
User-Name = "pawel.stojak"
NAS-Port = 1
Called-Station-Id = "94-0C-6D-AC-51-1A:gargoyle"
Calling-Station-Id = "00-14-85-C6-2D-CA"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x02cf00061900
State = 0x7ff3461a7e3c5f2db76e64fa567da44a
Message-Authenticator = 0x8334db4c71987ee1ebc1b466ebd94cd6
+- entering group authorize {...}
[eap] EAP packet type response id 207 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
++[mschap] returns noop
[files] users: Matched entry pawel.stojak at line 5
++[files] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 6 to 192.168.2.1 port 56049
EAP-Message = 0x01d002bc19006d61696c2e636f6d301e170d31313031313831373437 34345a170d3134303131373137343734345a3077310b300906035504061302504c310e300c060355 04081305736c61736b310c300a060355040a1303484f57310c300a060355040b1303484f57311530 130603550403130c506177656c2053746f6a616b3125302306092a864886f70d0109011616706177 656c2e73746f6a616b40676d61696c2e636f6d30819f300d06092a864886f70d010101050003818d 0030818902818100d5f1757ec4f548606eae29a407dfd4ed5f10949de68d329e9a2ee020fe056894 9583af0056b674a2d167a06c70859498a2e6915d67fdfad1f7
EAP-Message = 0x951250ab58d30176d603d5c0365ffe4d77395fb43ff4d66e5b28b8bc e7fa09025faafb129515e20d2c7cebc695652981362d530d12c1eddccd0eda78d8884a67d6d54993 3ba3f50203010001a381d43081d1301d0603551d0e041604142e3d53cce71f100424349f58897270 ddcd843a103081a10603551d2304819930819680142e3d53cce71f100424349f58897270ddcd843a 10a17ba4793077310b300906035504061302504c310e300c06035504081305736c61736b310c300a 060355040a1303484f57310c300a060355040b1303484f57311530130603550403130c506177656c 2053746f6a616b3125302306092a864886f70d010901161670
EAP-Message = 0x6177656c2e73746f6a616b40676d61696c2e636f6d820100300c0603 551d13040530030101ff300d06092a864886f70d0101050500038181004722a3039adb1f4a3631d2 6c77347202290bf4df64a335eeb319706941ac2341efcf1428818e330a03f007b1d2cd3a34ea90ff 382433582b5a9ee71d71ba553cdee28e539fcc2b922e33f22759d81fc19b6051e6abb003b020669f 13d18deff5f3b68f3f64a2827db98d8a16c49891ccaec0b3b686f3761870fc6bbd9272d846160301 00040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x7ff3461a7d235f2db76e64fa567da44a
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.2.1 port 56049, id=7, length=1 80
User-Name = "pawel.stojak"
NAS-Port = 1
Called-Station-Id = "94-0C-6D-AC-51-1A:gargoyle"
Calling-Station-Id = "00-14-85-C6-2D-CA"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x02d0001119800000000715030100020230
State = 0x7ff3461a7d235f2db76e64fa567da44a
Message-Authenticator = 0xb1b23f35844012012d6b9a5742569c02
+- entering group authorize {...}
[eap] EAP packet type response id 208 length 17
[eap] Continuing tunnel setup.
++[eap] returns ok
++[mschap] returns noop
[files] users: Matched entry pawel.stojak at line 5
++[files] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 7
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] <<< TLS 1.0 Alert [length 0002], fatal unknown_ca
TLS Alert read:fatal:unknown CA
TLS_accept:failed in SSLv3 read client certificate A
rlm_eap: SSL error error:14094418:lib(20):func(148):reason(1048)
SSL: SSL_read failed inside of TLS (-1), TLS session fails.
TLS receive handshake failed during operation
[peap] eaptls_process returned 4
[peap] EAPTLS_OTHERS
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Login incorrect: [pawel.stojak/<via Auth-Type = EAP>] (from client localhost por t 1 cli 00-14-85-C6-2D-CA)
Delaying reject of request 3 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 3
Sending Access-Reject of id 7 to 192.168.2.1 port 56049
EAP-Message = 0x04d00004
Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.7 seconds.
Cleaning up request 0 ID 4 with timestamp +13
Cleaning up request 1 ID 5 with timestamp +13
Cleaning up request 2 ID 6 with timestamp +13
Waking up in 1.2 seconds.
Cleaning up request 3 ID 7 with timestamp +13
Ready to process requests.
TL-WR1043ND + Gargoyle PL || WRT54GL