IEEE802.1x
#navi(contents-page-name): No such page: LinuxCONTENTS
REFERENCES
802.1xはport単位で接続の認証を行うプロトコル
Debian
# apt-get install xsupplicant
/etc/xsupplicant/xsupplicant.confで
deny_interfaces = eth0
して
/etc/init.d/xsupplicant restart
しないと一切リモートアクセスできません:-)
ちなみにWPA Supplicantも同様の機能をもっているので上の作業は無駄です。
# apt-get remove xsupplicant
予定
/etc/wpa_supplicant.conf
network={ ssid="tacoma" key_mgmt=WPA-EAP eap=TLS identity="hasebe" ca_cert="/etc/cert/cacert.pem" client_cert="/etc/cert/cert-clt.pem" private_key="/etc/cert/cert-clt.pem" private_key_passwd="whatever" priority=1 }
radiusd -X
rad_recv: Access-Request packet from host 192.168.100.1:1202, id=204, length=142 User-Name = "hasebe" NAS-IP-Address = 192.168.123.1 NAS-Port = 0 Called-Station-Id = "00-A0-B0-46-85-E2" Calling-Station-Id = "00-A0-B0-4C-5B-B8" NAS-Identifier = "tacoma" Framed-MTU = 1380 NAS-Port-Type = Wireless-802.11 EAP-Message = 0x020500060d00 State = 0xa400d73454b06110b20bb42ad551e5d4 Message-Authenticator = 0xf25aa2cbda033033b6f726c1486e395f Processing the authorize section of radiusd.conf modcall: entering group authorize for request 17 modcall[authorize]: module "preprocess" returns ok for request 17 modcall[authorize]: module "chap" returns noop for request 17 modcall[authorize]: module "mschap" returns noop for request 17 rlm_realm: No '@' in User-Name = "hasebe", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 17 rlm_eap: EAP packet type response id 5 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 17 users: Matched entry DEFAULT at line 153 modcall[authorize]: module "files" returns ok for request 17 modcall: group authorize returns updated for request 17 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 17 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake is finished eaptls_verify returned 3 eaptls_process returned 3 rlm_eap: Freeing handler modcall[authenticate]: module "eap" returns ok for request 17 modcall: group authenticate returns ok for request 17 Sending Access-Accept of id 204 to 192.168.100.1:1202 MS-MPPE-Recv-Key = 0x3002dbe723b42c89fe8794040232857a811157e23e7d4775bd4d6f3a8068243c MS-MPPE-Send-Key = 0x8c3358754b17c94c6e8be4d3c6c46562a353030f304506410030f01c63c883fe EAP-Message = 0x03050004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = "hasebe" Finished request 17