&size(24){&color(darkgreen){''IEEE802.1x''};};
#navi(Linux)
~''CONTENTS''
#contents
----
~''REFERENCES''
-[[OpenSSL & FreeRADIUS による 802.1x 環境の構築>http://www.t3.rim.or.jp/~ohyama/TIPS/OpenSSL/]]
//-[[HOWTO on EAP/TLS authentication between FreeRADIUS and XSupplicant >http://www.missl.cs.umd.edu/wireless/eaptls/]]
-[[Open 1x>http://www.open1x.org/]]
-[[FreeRADIUS on FreeBSD>http://www.y-min.or.jp/~nob/FreeBSD/freeradius.html]]

----

**はじめに [#efc65a13]

802.1xはport単位で接続の認証を行うプロトコル
-認証サーバ
-オーセンティケータ
-サプリカント

***用語・略語 [#z8837672]
:RADIUS|Remote Authentication Dial-In User Service
:EAP|Extensible Authentication Protocol
:PAE|Port Access Entity
:CCMP|Counter with CBC-MAC Protocol

**XSupplicant [#ba7d17d9]

''Debian''
 # apt-get install xsupplicant

/etc/xsupplicant/xsupplicant.confで
 deny_interfaces = eth0
して
 /etc/init.d/xsupplicant restart
しないと一切リモートアクセスできません:-)

ちなみにWPA Supplicantも同様の機能をもっているので上の作業は''無駄''です。
 # apt-get remove xsupplicant



**実験 [#f5ea3781]

***WPA EAP-TLS on KS2970 [#m775ae5f]
予定


***WPA EAP-TLS on WN-AG/CB2[#aed568ad]

''/etc/wpa_supplicant.conf''
 network={
    ssid="tacoma"
    key_mgmt=WPA-EAP
    eap=TLS
    identity="hasebe"
    ca_cert="/etc/cert/cacert.pem"
    client_cert="/etc/cert/cert-clt.pem"
    private_key="/etc/cert/cert-clt.pem"
    private_key_passwd="whatever"
    priority=1
 }

***WPA EAP-TLS on WN-AG/CB2 (Windows) [#e340c6c6]
+Certificate Autority関係を何とかする。
+/usr/local/etc/raddb以下の環境ファイル(死ぬほどある)を何とかする。
+APの設定を何とかする。
+証明書などをクライアントマシンにコピーして何とかする。

''radiusd -X''
 rad_recv: Access-Request packet from host 192.168.100.1:1202, id=204, length=142
         User-Name = "hasebe"
         NAS-IP-Address = 192.168.123.1
         NAS-Port = 0
         Called-Station-Id = "00-A0-B0-46-85-E2"
         Calling-Station-Id = "00-A0-B0-4C-5B-B8"
         NAS-Identifier = "tacoma"
         Framed-MTU = 1380
         NAS-Port-Type = Wireless-802.11
         EAP-Message = 0x020500060d00
         State = 0xa400d73454b06110b20bb42ad551e5d4
         Message-Authenticator = 0xf25aa2cbda033033b6f726c1486e395f
   Processing the authorize section of radiusd.conf
 modcall: entering group authorize for request 17
   modcall[authorize]: module "preprocess" returns ok for request 17
   modcall[authorize]: module "chap" returns noop for request 17
   modcall[authorize]: module "mschap" returns noop for request 17
     rlm_realm: No '@' in User-Name = "hasebe", looking up realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 17
   rlm_eap: EAP packet type response id 5 length 6
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 17
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 17
 modcall: group authorize returns updated for request 17
   rad_check_password:  Found Auth-Type EAP
 auth: type "EAP"
   Processing the authenticate section of radiusd.conf
 modcall: entering group authenticate for request 17
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/tls
   rlm_eap: processing type tls
   rlm_eap_tls: Authenticate
   rlm_eap_tls: processing TLS
 rlm_eap_tls: Received EAP-TLS ACK message
   rlm_eap_tls: ack handshake is finished
   eaptls_verify returned 3 
   eaptls_process returned 3 
   rlm_eap: Freeing handler
   modcall[authenticate]: module "eap" returns ok for request 17
 modcall: group authenticate returns ok for request 17
 Sending Access-Accept of id 204 to 192.168.100.1:1202
         MS-MPPE-Recv-Key = 0x3002dbe723b42c89fe8794040232857a811157e23e7d4775bd4d6f3a8068243c
         MS-MPPE-Send-Key = 0x8c3358754b17c94c6e8be4d3c6c46562a353030f304506410030f01c63c883fe
         EAP-Message = 0x03050004
         Message-Authenticator = 0x00000000000000000000000000000000
         User-Name = "hasebe"
 Finished request 17

-WPA-EAP成功。REFERENCEのリンク先をみながら設定すれば何とかなる。


トップ   編集 差分 履歴 添付 複製 名前変更 リロード   新規 一覧 検索 最終更新   ヘルプ   最終更新のRSS