today I played round with the PrivacyIdea environment and freeradius.
I installed all packets on my ubuntu 14.04 LTS system.
I made a standard setup with a user (user) and a totp token and made a test
with the radclient tool - it works!
Now I started to connect my cisco wifi controller (wlc) to the freeradius.
I setup a SSID with a 802.1x authentication and tried to connect from my
windows client with username/password.
I used the mschapV2 end EAP to connect to the WiFi and for the
authentication at the radius.
No i get a rlm_perl: Added pair Reply-Message = ERR905: Missing parameter:
‘pass’ – oh ???
I saw at the logs that the rlm_perl modul can’t saw the "User-Password"
property at the request - this makes sense because the mschap is a
challenge response protocol (?).
Now my question - is it possible to deploy such a infrastructure ? Client
-> AP -> WLC -> FreeRadius -> PrivacyIdea ?
Can rlm_perl handle the request and forward the “challenge” to the
privacyIdea to authenticate the user?
at the moment rlm_perl and also privacyidea does not support mschapv2.
You can understand the error message about the missing “pass” parameter,
since the User-Password attribute is expected in the RADIUS request.
Supporting mschapv2 is a bit tricky, since the challenge is mangled with
the hash of the password.
To calculate the hash of the password on the backend (privacyidea) side,
this is the tricky part. Since the OTP PIN is saved in a hashed way by
default, we can not calculate the
HASH(otppin + otpvalue)
since it is not equal to
HASH(otppin) + HASH(otpvalue)
This means, we would have to save the OTP PIN in an encrypted way, to be
able to decrypt the OTP PIN.
Kind regards
CorneliusAm Mittwoch, den 27.04.2016, 11:03 -0700 schrieb Step Han:
Hey,
today I played round with the PrivacyIdea environment and freeradius.
I installed all packets on my ubuntu 14.04 LTS system.
I made a standard setup with a user (user) and a totp token and made a
test with the radclient tool - it works!
Now I started to connect my cisco wifi controller (wlc) to the
freeradius.
I setup a SSID with a 802.1x authentication and tried to connect from
my windows client with username/password.
I used the mschapV2 end EAP to connect to the WiFi and for the
authentication at the radius.
No i get a rlm_perl: Added pair Reply-Message = ERR905: Missing
parameter: ‘pass’ – oh ???
I saw at the logs that the rlm_perl modul can’t saw the
“User-Password” property at the request - this makes sense because the
mschap is a challenge response protocol (?).
Now my question - is it possible to deploy such a infrastructure ?
Client → AP → WLC → FreeRadius → PrivacyIdea ?
Can rlm_perl handle the request and forward the “challenge” to the
privacyIdea to authenticate the user?
In an enterprise environment you should get a SERVICE LEVEL AGREEMENT
which suites your needs for SECURITY, AVAILABILITY and LIABILITY: privacyIDEA Support Level