Radius EAP-TTLS setup

Hello, 

we are trying to configure radius setup.  First question is there any operator running Radius wih epmp1000?

Second - we trying to do first authentication withouts success. Something wrong with tunnels.  We are using freeradius-2.2.0

Here is Radius log:

Sun Jan  4 16:48:27 2015
        Packet-Type = Access-Request
        User-Name = "test01"
        NAS-Identifier = "BS6c7cd3:000000"
        NAS-Port = 0
        Called-Station-Id = "00-04-56-C4-51-C4:CWME"
        Calling-Station-Id = "00-04-56-C1-CB-95"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 0Mbps 802.11b"
        EAP-Message = 0x02e0000d150015030100020230
        State = 0x2b7ac44f289ad124bb62d008294d7876
        Message-Authenticator = 0xaaf098e5e9ce9088fab2e0c829706f3c
        NAS-IP-Address = 172.31.0.5

Sun Jan 4 16:48:27 2015
Packet-Type = Access-Reject
EAP-Message = 0x04e00004
Message-Authenticator = 0x00000000000000000000000000000000

In attach there is wireshark trace file.

Hi Roman,

The authentication is failing because you were using certificates which are invalid.

The certificates expired on 7th Nov, 2013.

Please refer to the screenshot attached.

Please use valid certificates and let us know if you have any issues.

Best Regards,

Balaji

Hello Balaji,

we've changed sertificate. Currently there is:

notAfter: utcTime: 16-01-12 16:07:36 (UTC)

But situation is the same.  In CPE log there is a message

STA cannot be associated on AP... Reason 21.  (CERTIFICATE FALIED)

There are  questions  not covered by documentation.

1. Should we create separate sertificate for SM?

2. Should we upload sertificate for SM?

Hi Roman,

I assume you have generated a new self-signed certificate, for Radius Server.
If that is the case,

1. You don't have to generate a seperate certificate for SM.

2. You have to upload the root CA certificate to the SM.

    It should be the same root CA Certificate you have used to sign the new server certificate.

Balaji, 

we upload root sertificate from radius (ca.pem)  file into SM.  It looks like TTLS is processing and and radius sending Access-Accept meassage.  

Now SM has another error.  Reason 49. INVALID SEKURITY KEY

BS shows error: 

Jan 16 11:03:31 BS6c7cd3:020000 hostapd: ath0: STA 00:04:56:c1:cb:95 WPA: INITPMK - keyAvailable = false
Jan 16 11:03:31 BS6c7cd3:020000 kernel: STA[00:04:56:c1:cb:95] aid=1 disassociated. Reason: INVALID SECURITY KEY
Jan 16 11:03:31 BS6c7cd3:020000 hostapd: ath0: STA 00:04:56:c1:cb:95 IEEE 802.11: deauthenticated due to local deauth request

Hi Roman,

Could you send me the config files of both AP and SM and the wireshark trace.

If you prefer, you can e-mail it to me at balaji.grandhi@cambiumnetworks.com.

Best Regards,

Balaji

Hi Balaji

I sent files to you. We are using Radius with Wimax module to support EAP-TTLS for WIMAX equipment.

Just for the knolege base.

If you are using EAP-TTLS and Freeradius with wimax module compiled there is an configuration option:

 delete_mppe_keys = yes

If you set it to "yes" Radius will remove this keys from the Access-Accept message and put WiMAX-MSK attribute which contains encoded keys.

Some of WiMAX devise requires to set this option to yes. Other devices can operat both way. 

Here is reply with "yes" option

Packet-Type = Access-Accept
        EAP-MSK = 0x3c53e3b6bb79329a4f36577990cb181211738b9aeded8279b05775cdefeb0253b79deedd596839d84afd04020905f5
067e634ddfeabbcfbba7bfe1b4cf58730a
        EAP-EMSK = 0xcfeb6d7567b1a672f00b5e00bc1f0b3ede22c219a806e91681df823764e38ab9be2d6d3435f528f5c10d9c8ef0b5b
870f20f6c8797a0e6ebcf041926c7d56cc7
        EAP-Message = 0x03570004
        Message-Authenticator = 0x00000000000000000000000000000000
        User-Name = "test02"
        WiMAX-MSK = 0x3c53e3b6bb79329a4f36577990cb181211738b9aeded8279b05775cdefeb0253b79deedd596839d84afd04020905
f5067e634ddfeabbcfbba7bfe1b4cf58730a

Here is the reply with "no" option, whic is standart behaviour of Radius.

Packet-Type = Access-Accept
        MS-MPPE-Recv-Key = 0xf0d1c1e0be1c23c000cae76bb2643a98ac22e0731f49780b561b62b1d13e8f96
        MS-MPPE-Send-Key = 0xa207a797fd4526321968ed1b0d778702f6d2df40bbd772e73ed9d04240e87a45
        EAP-MSK = 0xf0d1c1e0be1c23c000cae76bb2643a98ac22e0731f49780b561b62b1d13e8f96a207a797fd4526321968ed1b0d7787
02f6d2df40bbd772e73ed9d04240e87a45
        EAP-EMSK = 0xe04ccfff3cb0fae8da986627be212c8e8a8a9393defc1586efe5b8a542694f4fd2293ebc4d2490aa86d8dec6642ff
cbf13807debfd6a52c65df979a56cdd56c5
        EAP-Message = 0x03fd0004
        Message-Authenticator = 0x00000000000000000000000000000000
        User-Name = "test02"

Cambium print debug message INVALID SECURITY KEY if there are no MS-MPPE-* attributes in the message.