IEEE802.1x
#navi(contents-page-name): No such page: LinuxCONTENTS
REFERENCES
802.1xはport単位で接続の認証を行うプロトコル
Debian
# apt-get install xsupplicant
/etc/xsupplicant/xsupplicant.confで
deny_interfaces = eth0
して
/etc/init.d/xsupplicant restart
しないと一切リモートアクセスできません:-)
ちなみにWPA Supplicantも同様の機能をもっているので上の作業は無駄です。
# apt-get remove xsupplicant
予定
/etc/wpa_supplicant.conf
network={
ssid="tacoma"
key_mgmt=WPA-EAP
eap=TLS
identity="hasebe"
ca_cert="/etc/cert/cacert.pem"
client_cert="/etc/cert/cert-clt.pem"
private_key="/etc/cert/cert-clt.pem"
private_key_passwd="whatever"
priority=1
}
radiusd -X
rad_recv: Access-Request packet from host 192.168.100.1:1202, id=204, length=142
User-Name = "hasebe"
NAS-IP-Address = 192.168.123.1
NAS-Port = 0
Called-Station-Id = "00-A0-B0-46-85-E2"
Calling-Station-Id = "00-A0-B0-4C-5B-B8"
NAS-Identifier = "tacoma"
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x020500060d00
State = 0xa400d73454b06110b20bb42ad551e5d4
Message-Authenticator = 0xf25aa2cbda033033b6f726c1486e395f
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 17
modcall[authorize]: module "preprocess" returns ok for request 17
modcall[authorize]: module "chap" returns noop for request 17
modcall[authorize]: module "mschap" returns noop for request 17
rlm_realm: No '@' in User-Name = "hasebe", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 17
rlm_eap: EAP packet type response id 5 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 17
users: Matched entry DEFAULT at line 153
modcall[authorize]: module "files" returns ok for request 17
modcall: group authorize returns updated for request 17
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 17
rlm_eap: Request found, released from the list
rlm_eap: EAP/tls
rlm_eap: processing type tls
rlm_eap_tls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake is finished
eaptls_verify returned 3
eaptls_process returned 3
rlm_eap: Freeing handler
modcall[authenticate]: module "eap" returns ok for request 17
modcall: group authenticate returns ok for request 17
Sending Access-Accept of id 204 to 192.168.100.1:1202
MS-MPPE-Recv-Key = 0x3002dbe723b42c89fe8794040232857a811157e23e7d4775bd4d6f3a8068243c
MS-MPPE-Send-Key = 0x8c3358754b17c94c6e8be4d3c6c46562a353030f304506410030f01c63c883fe
EAP-Message = 0x03050004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "hasebe"
Finished request 17