-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WPA2 PEAP Connection Issue on SDK v3.4 (GIT8266O-723) #1145
Comments
Here is the Radius Server Msg: Authentication Details: Connection Request Policy Name: Secure Wireless Controllers Network Policy Name: Stores Secure Wireless Policy Authentication Provider: Windows Authentication Server: Authentication Type: PEAP EAP Type: - Account Session Identifier: 43434530393946454142464636423033 Logging Results: Accounting information was written to the local log file. Reason Code: 262 Reason: The supplied message is incomplete. The signature was not verified. |
From further Tests, we have found that with SDK v3.4: --> Working with Freeradius v3.0.20 and above with basic setup running on Ubuntu. Authentication Details: Note: We don't provide the domain name in example ID configuration. We give the same as Username cause that's what was working with earlier SDK. Will that cause an issue in new SDK v3.4? |
@SaurabhCoolR The reason code 262 on windows server could mean any of these. Pls refer to this link "https://community.spiceworks.com/topic/1342663-nps-server-certificate" |
Hi @nishanth-radja.
2.Is the Validate server option enabled on the client i.e is the CA flashed on the DUT? Can you also try without flashing. 3.Any windows update was done recently? 4.Are other client able to connect using the radius server or is it just this DUT having the issue? |
@SaurabhCoolR Also can you pls provide the correct domain and username in the ID configuration that is the entered in Active directory of the windows.Else the windows will reject the authentication. |
Hi @nishanth-radja, Please find the needed details: winlog.event_data.SubjectDomainName --> DHC In the sdk v3.4 WPA2 Example Code, We are giving following config in Menuconfig: EXAMPLE_EAP_ID --> SVSHLFWIFI001A Also we have following Difference in Radius Server Log for working case with earlier SDK and non working SDK v3.4 Example: |
Hi @nishanth-radja ,Could you please provide some help? |
@SaurabhCoolR Looks like the EAP_type is going as blank,Do you have sniffer captures for both working and not working case. |
Hi @nishanth-radja : We are working on getting the full radius logs. We tried with suggested EAP Credetentials but it doesn't seem to work and giving same Auth Fail issue. |
@SaurabhCoolR sure,Pls get the sniffer capture too along with the radius logs for the working and non working case . |
Hi @nishanth-radja : We are working on the same. Meanwhile can you please confirm which specific packets you need? We are using Wireshark to capture the packets. |
Hi @nishanth-radja : Here attaching the K12 Text Files of Wireshark sniffer capture of the Radius Packets for both success and failed cases. Please have a look. Thanks. |
Hi @SaurabhCoolR Can you please add this fix and retry? espressif/esp-idf@6647f48 |
Hi, Tried with the mentioned changes above, but still radius connection failed. |
Hi,
Have tried with suggested solution but issue remains same.
Please check the update on underlying issue.
Thanks and regards,
Saurabh Yadav
Firmware Engineer
-----------------------------------------
p: +91-120-4167004 m: +91-8200628847 us: 571-766-6072, 571-612-5506,
517-266-8995
a: 14100 Parke Long Ct. Suite I, Chantilly, VA – 20151
em: +1-571-346 7306 w: https://www.coolrgroup.com/
This message contains information that may be privileged or confidential
and is the property of the CoolR Group Inc. It is intended only for the
person to whom it is addressed. If you are not the intended recipient, you
are not authorized to read, print, retain copy, disseminate, distribute, or
use this message or any part thereof. If you receive this message in error,
please notify the sender immediately and delete all copies of this
message. CoolR
Group Inc. does not accept any liability for virus infected mails.
…On Mon, Feb 21, 2022 at 11:23 AM Kapil Gupta ***@***.***> wrote:
Hi @SaurabhCoolR <https://github.com/SaurabhCoolR> Can you please add
this fix and retry? ***@***.***
<espressif/esp-idf@6647f48>
—
Reply to this email directly, view it on GitHub
<#1145 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AWIBCLMHEYOJQ2FQI7E6G4LU4HHOTANCNFSM5G5C3YUA>
.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub>.
You are receiving this because you were mentioned.Message ID:
***@***.***>
--
This message contains information that may be privileged or confidential
and is the property of the Spraxa Solutions Pvt. Ltd. It is intended only
for the person to whom it is addressed. If you are not the intended
recipient, you are not authorized to read, print, retain copy, disseminate,
distribute, or use this message or any part thereof. If you receive this
message in error, please notify the sender immediately and delete all
copies of this message. Spraxa Solutions Pvt. Ltd. does not accept any
liability for virus infected mails.
|
@SaurabhCoolR The difference between the pass case and the fail case is the TLS version used. Pass case is using TLS 1.0 and fail case is using TLS1.2.As you have mentioned that the connection was successful in free radius, Was the freeradius using TLS v1.0? |
Hi @nishanth-radja : For Freeradius v3.0.25 (Successful with both SDKs): Will share the wpa suppllicant logs as well shortly. |
Hi @SaurabhCoolR , Is it possible for you to share the sniffer capture and logs? Please enable the logs for both wpa_supplicant and mbedTLS logs which will help to debug this faster. Also can you disable WPA_MBEDTLS_CRYPTO option and retry? Is it able to connect in that case(as a separate exercise then the upper one)? |
Hi @kapilkedawat, We have tried with both WPA_MBEDTLS_CRYPTO enabled and disabled and both cases connection/auth failed. Please find the attached device logs and packet capture for both the cases. WPA_MBEDTLS_CRYPTO_disabled.txt |
Hi @nishanth-radja @kapilkedawat Any update on this issue? |
Hi @SaurabhCoolR are you using CMake or make? In case using make, please apply this patch espressif/esp-idf@6acb462 and retry with mbedtls_crypto disabled. |
Hi @kapilkedawat : We are using make. |
Hi @SaurabhCoolR , you copied the line as it is, which is why the compilation issue is occurring. |
Hi @kapilkedawat : The wpa2 example ran successfully with Mbedtls Crypto Disabled and the -DCONFIG_SHA256 flag. Attached the logs for reference. |
Thanks @SaurabhCoolR , seems like issue is in mbedTLS client. Can you please apply espressif/esp-idf@6647f48 and espressif/esp-idf@d3a42d7 correctly? After that, enable WPA_MBEDTLS_CRYPTO, clean the build directory and build the app again to make sure changes are included and then retry? In case you face trouble applying these patches, you can directly replace components/wpa_supplicant/src/crypto/tls_mbedtls.c with https://github.com/espressif/esp-idf/blob/master/components/wpa_supplicant/src/crypto/tls_mbedtls.c |
Hi @kapilkedawat , Thanks for getting back. Please let us know the next steps. |
Thanks for update @SaurabhCoolR . Please use the default WPA_MBEDTLS_CRYPTO enabled config which provides faster and better crypto. We will backport the fixes. |
Thanks @kapilkedawat |
This is old but I am struggling to connect to wpa2 peap. I tried applying the patches but it does not work. The issue is still open idk why thats why I am commenting. |
Hi @Preetam-Das please share client and server side logs. |
Hi @kapilkedawat I am not sure if I can give you the server logs .. I'll try. I am trying to connect to my university network using nodemcu which is WPA2 PEAP. Using the latest SDK. The client debug logs are here. |
Environment
Problem Description
The WPA2 Enterprise Example Doesn't Work with SDK v3.4.
Due to inconsistency in PEAP Connection, We wanted to move our firmware based on ESP8266 RTOS SDK commit ID 655f934 (near release/v3.1.2) to SDK v3.4. But we observe that using SDK v3.4, the PEAP Connection becomes worse.
Expected Behavior
The PEAP Connection with SDK v3.4 is supposed to improve.
Actual Behavior
As we compared the PEAP connection by running the wpa2_enterprise example, it seems PEAP connection way worse with latest release v3.4. It's always giving Disconnect reason 23, 802.1x Auth Failed. This was not the issue when we tried the same example with commit ID 655f934.
Steps to reproduce
Code to reproduce this issue
Just attaching the code for
initialise_wifi
function where I have commented the lines to set the cert bytes.Following is the PEAP Config details in SDK Config:
Debug Logs
Attached Items:
sdkconfig.zip
wpa_enterprise.log
The text was updated successfully, but these errors were encountered: