Before Bride of Frank | Boycott Citgo | 9/11 White Van Camera Crew | Hudson County Politics | Hudson County Facts | Outlaw Motorcycle Gangs | New Jersey Mafia | Hal Turner, FBI Informant
Removing Viruses and Spyware | Reinstalling Windows XP, Vista, or 7 | Reset Windows Passwords | Windows Blue Screen of Death | Computer Noise | Don't Trust External Hard Drives!
Internet Advertising SEO - Search Engine Optimization - Search Engine Marketing - SEM iTunes Beatles Billboards Anthony Olszewski Intellectual Predator Email this Page

CLASSIC PC | YOU DO SUCCEED | DOWNLOAD | FAQ LIBRARY
LINKS | LINUX | MAIN MENU | PS2 | REFERENCE | USENET


6. Testbed

6.1. Testcase

figure testbed: A wireless node request authentication.

Our testbed consists of two nodes and one Access Point (AP). One node functions as the Supplicant (WN), the other as the back-end Authentication Server running RADIUS (AS). The Access Point is the Authenticator. See figure testbed for explanation.

Important

It is crucial that the Access Point be able to reach (ping) the Authentication Server, and vice versa!

6.2. Running some tests

Running some tests

  1. The RADIUS server is started in debug mode. This produces a lot of debug information. The important snippets are below:

    
  # radiusd -X
      Starting - reading configuration files ...
      reread_config:  reading radiusd.conf
      Config:   including file: /usr/local/etc/raddb/proxy.conf
      Config:   including file: /usr/local/etc/raddb/clients.conf
      Config:   including file: /usr/local/etc/raddb/snmp.conf
      Config:   including file: /usr/local/etc/raddb/eap.conf
      Config:   including file: /usr/local/etc/raddb/sql.conf
      ......
      Module: Loaded MS-CHAP 
       mschap: use_mppe = yes
       mschap: require_encryption = no
       mschap: require_strong = no
       mschap: with_ntdomain_hack = no
       mschap: passwd = "(null)"
       mschap: authtype = "MS-CHAP"
       mschap: ntlm_auth = "(null)"
      Module: Instantiated mschap (mschap)
      ......
      Module: Loaded eap 
       eap: default_eap_type = "peap" (1)
       eap: timer_expire = 60
       eap: ignore_unknown_eap_types = no
       eap: cisco_accounting_username_bug = no
      rlm_eap: Loaded and initialized type md5
       tls: rsa_key_exchange = no (2)
       tls: dh_key_exchange = yes
       tls: rsa_key_length = 512
       tls: dh_key_length = 512
       tls: verify_depth = 0
       tls: CA_path = "(null)"
       tls: pem_file_type = yes
       tls: private_key_file = "/usr/local/etc/raddb/certs/cert-srv.pem"
       tls: certificate_file = "/usr/local/etc/raddb/certs/cert-srv.pem"
       tls: CA_file = "/usr/local/etc/raddb/certs/demoCA/cacert.pem"
       tls: private_key_password = "SecretKeyPass77"
       tls: dh_file = "/usr/local/etc/raddb/certs/dh"
       tls: random_file = "/usr/local/etc/raddb/certs/random"
       tls: fragment_size = 1024
       tls: include_length = yes
       tls: check_crl = no
       tls: check_cert_cn = "(null)"
      rlm_eap: Loaded and initialized type tls
       peap: default_eap_type = "mschapv2" (3)
       peap: copy_request_to_tunnel = no
       peap: use_tunneled_reply = no
       peap: proxy_tunneled_request_as_eap = yes
      rlm_eap: Loaded and initialized type peap
       mschapv2: with_ntdomain_hack = no
      rlm_eap: Loaded and initialized type mschapv2
      Module: Instantiated eap (eap) 
      ......
      Module: Loaded files 
       files: usersfile = "/usr/local/etc/raddb/users" (4)
      ...... 
      Module: Instantiated radutmp (radutmp) 
      Listening on authentication *:1812
      Listening on accounting *:1813
      Ready to process requests. (5)
      
    (1)
    Default EAP type is set to PEAP.
    (2)
    RADIUS's TLS settings are initiated here. The certificate type, location, and password are listet here.
    (3)
    Inside the PEAP tunnel, MS-CHAPv2 is used.
    (4)
    The username/password information is found in the users file.
    (5)
    RADIUS server started successfully. Waiting for incoming requests.

    The radius server is now ready to process requests!

    The most interesting output is included above. If you get any error message instead of the last line, go over the configuration (above) carefully.

  2. Now the Supplicant is ready to get authenticated. Start Xsupplicant in debug mode. Note that we'll see output produced by the two startup scripts: startup.sh and startup2.sh.

    
  # xsupplicant -c /usr/local/etc/1x/1x.conf -i eth0 -d 6
      Starting /etc/1x/startup.sh
      Finished /etc/1x/startup.sh
      Starting /etc/1x/startup2.sh
      Finished /etc/1x/startup2.sh
      
  3. At the same time, the RADIUS server is producing a lot of output. Key snippets are shown below:

    
  ......
      rlm_eap: Request found, released from the list
      rlm_eap: EAP/peap
      rlm_eap: processing type peap
      rlm_eap_peap: Authenticate
      rlm_eap_tls: processing TLS (1)
      eaptls_verify returned 7 
      rlm_eap_tls: Done initial handshake 
      eaptls_process returned 7 
      rlm_eap_peap: EAPTLS_OK (2)
      rlm_eap_peap: Session established.  Decoding tunneled attributes.
      rlm_eap_peap: Received EAP-TLV response.
      rlm_eap_peap: Tunneled data is valid.
      rlm_eap_peap: Success
      rlm_eap: Freeing handler
      modcall[authenticate]: module "eap" returns ok for request 8
    modcall: group authenticate returns ok for request 8
    Login OK: [testuser/<no User-Password attribute>] (from client testnet port 37 cli 0002a56fa08a)
    Sending Access-Accept of id 8 to 192.168.2.1:1032 (3)
    	MS-MPPE-Recv-Key = 0xf21757b96f52ddaefe084c343778d0082c2c8e12ce18ae10a79c550ae61a5206 (4)
    	MS-MPPE-Send-Key = 0x5e1321e06a45f7ac9f78fb9d398cab5556bff6c9d003cdf8161683bfb7e7af18 
    	EAP-Message = 0x030a0004
    	Message-Authenticator = 0x00000000000000000000000000000000
    	User-Name = "testuser"
      
    (1)
    TLS session startup. Doing TLS-handshake.
    (2)
    The TLS session (PEAP-encrypted tunnel) is up.
    (3)
    The Supplicant has been authenticated successfully by the RADIUS server. An "Access-Accept" message is sent.
    (4)
    The MS-MPPE-Recv-Key [RFC2548 section 2.4.3] contains the Pairwise Master Key (PMK) destined to the Authenticator (access point), encrypted with the MPPE Protocol [RFC3078], using the shared secret between the Authenticator and Authentication Server as key. The Supplicant derives the same PMK from MK, as described in Key Management.
  4. The Authenticator (access point) may also show something like this in its log:

    
  00:02:16 (Info): Station 0002a56fa08a Associated
      00:02:17 (Info): Station=0002a56fa08a User="testuser" EAP-Authenticated 
      

That's it! The Supplicant is now authenticated to use the Access Point!

Second Thief, Best Thief
New Jersey Short Stories

Nunchaku Style Bike Lock on Wheel
Great New Bike Lock!
$25 – Lock Included – Free Shipping in the USA
Payment by PayPal – E-mail anthony.olszewski@gmail.com
Mail Orders Accepted

I Love Hoboken!

Hal Turner sues 7chan, 4chan, ebaumsworld and others.
Hudson County Hate Monger and FBI informant Hal Turner charges in suit:
"Criminal activity . . . includes photographs of pre-teen and teenage girls in various states of undress."

New York City Politics Message Board
Brooklyn Politics: The Saga of Brooklyn District Attorney Charles "Joe" Hynes
The Prosecution of New York City Political Activists John O'Hara and Sandra Roper
Courts Take Property and Freedom from Judge John Phillips by Declaring him "Mentally Incapacitated"

The Trail of the Tiger – Tammany: 1789-1928
Boss Tweed and The History of New York City Political Corruption

Theft by deception as a way of life . . .

Hudson County Facts

James McGreevey vs. Bret Schundler
The 2001 Race for Governor of New Jersey

Martin Bormann Nazi in Exile

Now on Sale at Amazon

Hudson County Facts Winter 2006 by Anthony Olszewski
Hudson County, New Jersey is a place of many firsts - including genocide and slavery.
Political corruption is a tradition here.
First issue in a series by Anthony Olszewski – Click HERE to find out more.

Print Edition Now on Sale at Amazon

Read Online at
Google Book Search

Advertiser and Distributor
Inquiries Welcome

Marvin Corwick
New Jersey State Employee is Fired
"the release of the information, done against the advice of staff and without the authorization of his superiors, showed a lack of good judgment and undermined the hard-earned faith and trust in the division as an impartial assistant to local governments."

Page continues BELOW this image!
How to Care for Tropical Fish, Parrots, and other Pets


Deprecated: Function split() is deprecated in /home/content/o/n/t/ontheerie/html/computercraft/FeedForAll_XMLParser.inc.php on line 256

Fatal error: Call to undefined method baseParserClass::baseParserClassWithExtensions() in /home/content/o/n/t/ontheerie/html/computercraft/FeedForAll_XMLParser.inc.php on line 1691


Deprecated: Function split() is deprecated in /home/content/o/n/t/ontheerie/html/computercraft/FeedForAll_XMLParser.inc.php on line 256

Fatal error: Call to undefined method baseParserClass::baseParserClassWithExtensions() in /home/content/o/n/t/ontheerie/html/computercraft/FeedForAll_XMLParser.inc.php on line 1691

Great Domains for Sale

New Forces in
NJ Organized Crime
On sale at Amazon

SEO and Flash

Svedka female robot
The Svedka female robot wants you!

Corona Beer Subliminal Advertising

"Our Computers Don't Make Mistakes"

The Advance-Decline Line As A Tool In Technical Market Analysis

Intellectual Predator
Shines the Light of Reason on New Jersey Politics

Roger Chugh: The Third Most Powerful Official in Trenton
New Jersey Governor McGreevey's Close Confidant

The New Jersey Mafia

George Washington to Run for Office!

James McGreevey of New Jersey
Sex Scandal Prompts Resignation

Feds Charge Herbert Axelrod
As White Color Criminal And Fugitive

The Canary FAQ
Answers Your Frequently Asked Questions About
Keeping and Breeding Canaries

The Keet FAQ
Answers Your Frequently Asked Questions About
Keeping and Breeding Parakeets and Budgerigars

Last modified:

Contact
COMPUTERCRAFT

Return To The COMPUTERCRAFT Main Menu

Asbury Park
Bruce Springsteen's Jersey Shore Rock Haven!

Featured Link
Great Domain Names For Sale!
Very brandable Domains for Sale -- The GET NJ family of Sites, managed by Anthony Olszewski, features tens of thousands of Pages Online at dozens of active domains, many with a New Jersey focus. Other advertising opportunities including enterprise and exclusive placements exist at a wide range of Web Sites. Your ad can appear at one Page or at many, many thousands of Pages simultaneously! A large slice of the domains have been Online for more than five years, some for over ten! In addition to advertising, many great Domains are available for purchase or license

Text Link Advertising Program
Business name, Web Site Link and a brief description or motto – runs for one month in the Page (or Pages) of your choice.

Hudson County Politics
From Frank Hague to Robert Janiszewski, in this New Jersey county, political corruption is a tradition. Former NJ Governor Brendan Byrne wants to be buried here so he can stay active in Democratic politics! You'll find lots about Senator Robert Menendez, too.

GRAVE ROBBER Jersey City Computer Repair
297 Griffith Street, Jersey City, NJ - 201-798-2292 - In the Heights just off of Kennedy Blvd. - Very close to Journal Square and Union City, just five minutes away from Hoboken, Downtown Jersey City, Newport, the Waterfront, Secaucus, North Bergen and Weehawken - Tech support for The Jersey City Mayor's Office during the administration of Bret Schundler - PC repair - Tivos, too!, upgrade, hardware install, software install, data recovery, spyware removal, virus removal, replace hard drive, replace motherboard, data recovered from notebook computers, recover lost XP passwords, password recovery

The Statue of Liberty, Ellis Island, and The Central Railroad Terminal
Visit Liberty State Park!

Stealth Jet at the World Trade Center During OpSail 2000
For All Sorts of Unique New York City Information, Visit GET NY!