我们目前正在建立一个免费的服务器,它使用证书通过无线连接进行身份验证。我们已经为802.1x提供了该功能,但是Novell的Windows 7客户端破坏了802.1x协议。所以我们必须要有基于证书的认证。
我有一个测试域的设置和运行,我可以得到定期的内部/外部认证发生。一旦我实现了证书,事情就会变得疯狂。我已经附加了radius -X输出(至少它试图实例化EAP模块的部分)。我在谷歌上搜索过答案,但真的什么都没找到。任何帮助都将不胜感激。谢谢。
Module: Instantiating eap
eap {
default_eap_type = "eap"
timer_expire = 60
ignore_unknown_eap_types = no
cisco_accounting_username_bug = no
max_sessions = 4096
}
Module: Linked to sub-module rlm_eap_md5
Module: Instantiating eap-md5
Module: Linked to sub-module rlm_eap_leap
Module: Instantiating eap-leap
Module: Linked to sub-module rlm_eap_gtc
Module: Instantiating eap-gtc
gtc {
challenge = "Password: "
auth_type = "PAP"
}
Module: Linked to sub-module rlm_eap_tls
Module: Instantiating eap-tls
tls {
rsa_key_exchange = no
dh_key_exchange = yes
rsa_key_length = 512
dh_key_length = 512
verify_depth = 0
pem_file_type = yes
private_key_file = "/etc/raddb/certs/server.pem"
certificate_file = "/etc/raddb/certs/server.pem"
CA_file = "/etc/raddb/certs/ca.pem"
private_key_password = "whatever"
dh_file = "/etc/raddb/certs/dh"
random_file = "/etc/raddb/certs/random"
fragment_size = 1024
include_length = yes
check_crl = no
cipher_list = "DEFAULT"
cache {
enable = no
lifetime = 24
max_entries = 255
}
}
Module: Linked to sub-module rlm_eap_ttls
Module: Instantiating eap-ttls
ttls {
default_eap_type = "mschapv2"
copy_request_to_tunnel = no
use_tunneled_reply = no
virtual_server = "inner-tunnel"
include_length = yes
}
Module: Linked to sub-module rlm_eap_peap
Module: Instantiating eap-peap
peap {
default_eap_type = "mschapv2"
copy_request_to_tunnel = no
use_tunneled_reply = no
proxy_tunneled_request_as_eap = yes
virtual_server = "inner-tunnel"
}
Module: Linked to sub-module rlm_eap_mschapv2
Module: Instantiating eap-mschapv2
mschapv2 {
with_ntdomain_hack = no
}
rlm_eap: Unknown default EAP type eap
/etc/raddb/eap.conf[17]: Instantiation failed for module "eap"
/etc/raddb/sites-enabled/inner-tunnel[223]: Failed to load module "eap".
/etc/raddb/sites-enabled/inner-tunnel[176]: Errors parsing authenticate section.发布于 2012-04-06 00:18:53
。
这对我来说毫无意义。无论您使用的是EAP-PEAP、EAP-TLS还是EAP-TTLS,您的请求者都需要与身份验证者讨论802.1x。如果Novell的客户端真的破坏了802.1x,那么无论您决定在EAP中使用哪种身份验证机制(EAP本身是通过EAPOL隧道化的),802.1x都无法工作。802.1x将需要得到请求者和身份验证者的支持。
rlm_eap: Unknown default EAP type eap
/etc/raddb/eap.conf[17]: Instantiation failed for module "eap"不能将EAP身份验证机制设置为EAP。EAP只是一个身份验证框架,因此出现了可扩展身份验证协议。您需要选择一个协议供EAP使用。
您提到了证书,所以我假设您正在实现EAP。你可能想要改变:
default_eap_type = "eap"至
eap: default_eap_type = "tls"https://serverfault.com/questions/156834
复制相似问题