9.7 C
New York
Tuesday, March 25, 2025

radius – Meraki AP to FreeRADIUS caught on Entry-Request


I am presently dealing with some troubles whereas attempting to arrange a Lab between Home windows 11 PC (with Credential Guard & TLS 1.3 enabled by default) and a FreeRADIUS server utilizing EAP-TLS.

  • Principally, it appears like
    enter image description here
  1. The place Win 11 PC is configured to make use of EAP-TLS with its machine certificates to authenticate to my Lab SSID. Machine certificates is delivered by GPO (machine cert auto-enroll) with an on prem Home windows 3-tiers PKI.

  2. The place FreeRADIUS server (v3.2.7-1) primarily based on Debian 12 is configured to permit 10.0.0.0/8 NACs with a passphrase.

consumer check {
    ipaddr = 10.0.0.0/8
    secret = testing123
}

Additionally, I enabled the present configuration for EAP inside mods-available/eap

eap {
        default_eap_type = tls
        timer_expire = 60
        ignore_unknown_eap_types = no
        cisco_accounting_username_bug = no
        max_sessions = ${max_requests}
}
        tls-config tls-common {
                #private_key_password = no matter
                private_key_file = ${certdir}/myfreeradius_server.key
                certificate_file = ${certdir}/myfreeradius_server.pem
                ca_file = ${cadir}/my_corp_root_ca.pem
                ca_path = ${cadir}
                tls_min_version = "1.2"
                tls_max_version = "1.3"
}
  1. In the intervening time, if I do this configuration from one other Debian server with eapol cli
    eapol_test -c wpa_supplicant-tls.conf -a 10.230.102.108 -s testing123
    the place wpa_supplicant-tls.conf comprises :
ap_scan=0

community={
    eap=TLS
    eapol_flags=0
    key_mgmt=IEEE8021X
    id="[email protected]"
    client_cert="my_user_cert.pem"
    private_key="my_user_privkey.key"
    # CA certificates to validate the RADIUS server's id
    ca_cert="my_corp_root_ca.pem"
    phase1="tls_disable_tlsv1_3=0"
}

=> It really works nicely, consumer present SUCCESS standing and RADIUS server proceed to the request.

The ache is :
When I attempt to entry the check SSID, wifi connection from Win 11 PC hundreds,hundreds, and by no means ends.
Meraki AP say :
Shopper made an 802.1X authentication request to the RADIUS server, nevertheless it didn't reply. auth_mode="wpa2-802.1x" vlan_id='32' radius_proto='ipv4' radius_ip='10.230.102.108' motive='radius_timeout' reassoc="1" radio='0' vap='10' channel="1" rssi='40'

FreeRadius receives that sort of logs :

Waking up in 4.7 seconds.
(5) Obtained Entry-Request Id 5 from 10.6.4.165:50147 to 10.230.102.108:1812 size 413
(5)   Consumer-Identify = "host/my_PC.my-domain.internet"
(5)   NAS-IP-Tackle = 10.6.4.165
(5)   NAS-Identifier = "E0-CB-BC-8B-65-ED:vap10"
(5)   NAS-Port-Kind = Wi-fi-802.11
(5)   Service-Kind = Framed-Consumer
(5)   NAS-Port = 1
(5)   Calling-Station-Id = "F4-D1-08-87-72-56"
(5)   Join-Data = "CONNECT 54.00 Mbps / 802.11n / RSSI: 38 / Channel: 1"
(5)   Acct-Session-Id = "479273B6606E05AE"
(5)   Acct-Multi-Session-Id = "BA3341F3610DFCF9"
(5)   WLAN-Pairwise-Cipher = 1027076
(5)   WLAN-Group-Cipher = 1027076
(5)   WLAN-AKM-Suite = 1027073
(5)   Meraki-Community-Identify = "APW-Wifi- - wi-fi"
(5)   Meraki-Ap-Identify = "MyWifiAP"
(5)   Meraki-Ap-Tags = "  recently-added "
(5)   Known as-Station-Id = "E0-CB-BC-8B-65-ED:00-Check-W11"
(5)   Meraki-System-Identify = "MyWifiAP"
(5)   Framed-MTU = 1400
(5)   EAP-Message = 0x021b00060d00
(5)   State = 0x943a85b2902188fe8217870d8617c1ba
(5)   Message-Authenticator = 0x63c15f58f21aa1566869606e3b3b7609
(5) Restoring &session-state
(5)   &session-state:Framed-MTU = 994
(5)   &session-state:TLS-Session-Data = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello"     
(5)   &session-state:TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, ServerHello"     
(5)   &session-state:TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 ChangeCipherSpec"
(5)   &session-state:TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, EncryptedExtensions"
(5)   &session-state:TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, CertificateRequest"
(5)   &session-state:TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, Certificates"     
(5)   &session-state:TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, CertificateVerify"
(5)   &session-state:TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, Completed"        
(5) # Executing part authorize from file /and so forth/freeradius/sites-enabled/default
(5)   authorize {
(5)     coverage filter_username {
(5)       if (&Consumer-Identify) {
(5)       if (&Consumer-Identify)  -> TRUE
(5)       if (&Consumer-Identify)  {
(5)         if (&Consumer-Identify =~ / /) {
(5)         if (&Consumer-Identify =~ / /)  -> FALSE
(5)         if (&Consumer-Identify =~ /@[^@]*@/ ) {
(5)         if (&Consumer-Identify =~ /@[^@]*@/ )  -> FALSE
(5)         if (&Consumer-Identify =~ /../ ) {
(5)         if (&Consumer-Identify =~ /../ )  -> FALSE
(5)         if ((&Consumer-Identify =~ /@/) && (&Consumer-Identify !~ /@(.+).(.+)$/))  {
(5)         if ((&Consumer-Identify =~ /@/) && (&Consumer-Identify !~ /@(.+).(.+)$/))   -> FALSE
(5)         if (&Consumer-Identify =~ /.$/)  {
(5)         if (&Consumer-Identify =~ /.$/)   -> FALSE
(5)         if (&Consumer-Identify =~ /@./)  {
(5)         if (&Consumer-Identify =~ /@./)   -> FALSE
(5)       } # if (&Consumer-Identify)  = notfound
(5)     } # coverage filter_username = notfound
(5)     [preprocess] = okay
(5)     [chap] = noop
(5)     [mschap] = noop
(5)     [digest] = noop
(5) suffix: Checking for suffix after "@"
(5) suffix: No '@' in Consumer-Identify = "host/my_PC.my-domain.internet", trying up realm NULL
(5) suffix: No such realm "NULL"
(5)     [suffix] = noop
(5) eap: Peer despatched EAP Response (code 2) ID 27 size 6
(5) eap: No EAP Begin, assuming it is an on-going EAP dialog
(5)     [eap] = up to date
(5)     [files] = noop
(5)     [expiration] = noop
(5)     [logintime] = noop
(5)     [pap] = noop
(5)   } # authorize = up to date
(5) Discovered Auth-Kind = eap
(5) # Executing group from file /and so forth/freeradius/sites-enabled/default
(5)   authenticate {
(5) eap: Eradicating EAP session with state 0x943a85b2902188fe
(5) eap: Earlier EAP request discovered for state 0x943a85b2902188fe, launched from the listing
(5) eap: Peer despatched packet with technique EAP TLS (13)
(5) eap: Calling submodule eap_tls to course of knowledge
(5) eap_tls: (TLS) Peer ACKed our handshake fragment
(5) eap: Sending EAP Request (code 1) ID 28 size 857
(5) eap: EAP session including &reply:State = 0x943a85b2912688fe
(5)     [eap] = dealt with
(5)   } # authenticate = dealt with
(5) Utilizing Put up-Auth-Kind Problem
(5) # Executing group from file /and so forth/freeradius/sites-enabled/default
(5)   Problem { ... } # empty sub-section is ignored
(5) session-state: Saving cached attributes
(5)   Framed-MTU = 994
(5)   TLS-Session-Data = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello"
(5)   TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, ServerHello"
(5)   TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 ChangeCipherSpec"
(5)   TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, EncryptedExtensions"
(5)   TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, CertificateRequest"
(5)   TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, Certificates"
(5)   TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, CertificateVerify"
(5)   TLS-Session-Data = "(TLS) TLS - ship TLS 1.3 Handshake, Completed"
(5) Despatched Entry-Problem Id 5 from 10.230.102.108:1812 to 10.6.4.165:50147 size 921
(5)   EAP-Message = 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
(5)   Message-Authenticator = 0x00000000000000000000000000000000
(5)   State = 0x943a85b2912688fe8217870d8617c1ba
(5) Completed request
Waking up in 4.7 seconds.
(0) Cleansing up request packet ID 0 with timestamp +69 as a consequence of cleanup_delay was reached
(1) Cleansing up request packet ID 1 with timestamp +69 as a consequence of cleanup_delay was reached
(2) Cleansing up request packet ID 2 with timestamp +69 as a consequence of cleanup_delay was reached
(3) Cleansing up request packet ID 3 with timestamp +69 as a consequence of cleanup_delay was reached
(4) Cleansing up request packet ID 4 with timestamp +69 as a consequence of cleanup_delay was reached
(5) Cleansing up request packet ID 5 with timestamp +69 as a consequence of cleanup_delay was reached
Able to course of requests


From a Wireshark flows perspective, it appears Meraki AP sends Entry-Request to FreeRadius, which by no means solutions.
enter image description here

My questions are :

  1. Will we agree that such a configuration on FreeRADIUS ought to confirm machine (or finally consumer) certificates due to the configured root CA ? and so, each machine or consumer that has a certificates offered by the PKI ought to be licensed to entry community ?

  2. How can I examine extra to know if it is a freeRADIUS misconfiguration ?

I am sort of caught in the mean time..

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles