Can't connect via EAP-TLS with keys > 1024 bits

Bug #377430 reported by Jürgen Kreileder
16
This bug affects 2 people
Affects Status Importance Assigned to Milestone
wpasupplicant (Ubuntu)
Confirmed
Undecided
Unassigned

Bug Description

Binary package hint: wpasupplicant

I'm trying to connect to a wireless network via EAP-TLS with NetworkManager and wpa-supplicant. The RADIUS server is running freeradius 2.1.0.
Jaunty never manages to authenticate with 4096 bit keys. The same 4096 bit keys work fine with Windows, OS X, and even my iPhone. After some testing I found out that I can connect with Jaunty if I use 1024 bit keys (on the client side, the server side still can use larger ones) but all keys > 1024 bits won't work.

To debug this, I've built eapol_test from wpasupplicant 0.6.6-2ubuntu1 and did some test with a certificate infrastructure created by freeradius' example scripts (which use 2048 bit keys both for the server and clients).
Once again: The 2048 keys worked fine everywhere except on Jaunty!

freeradius' debug messages show that it actually sends out an Access-Accept but wpasupplicant sees a failure nevertheless!

Then I did the same tests with an older statically-linked version of eapol_test (http://wiki.eduroam.cz/rad_eap_test/eapol_test/ linked from the freeradius site). This version actually manages to authenticate (even with 4096 bit keys). The logs on the server look just like with the Jaunty' eapol_test but unlike the Jaunty version, this older version actually interprets the Access-Accept correctly.

So, either newer wpasupplicant versions broke EAP-TLS for keys with more than 1024 bits, or there's an Ubuntu-specific problem.

Revision history for this message
Jürgen Kreileder (jk) wrote :
Revision history for this message
Jürgen Kreileder (jk) wrote :
Revision history for this message
Maarten Bezemer (veger) wrote :

Thank you for reporting this bug to Ubuntu. Jaunty reached EOL on October 23, 2010.
See this document for currently supported Ubuntu releases: https://wiki.ubuntu.com/Releases

Please either a) upgrade and test or b) increase the verbosity of the steps to recreate it so we can try again.

Do feel free to report any other bugs you may find.

Changed in wpasupplicant (Ubuntu):
status: New → Incomplete
Revision history for this message
js1 (sujiannming) wrote :

I'm seeing similar behavior in 11.10 and 12.04. The RADIUS server recently upgraded to a 2048 bit key, and our Ubuntu laptops seem to no longer connect. I haven't been quite as thorough as the original bug reporter, but the only difference is the key size. Here's what I'm seeing in the syslog:

Jun 28 18:18:45 eee01 wpa_supplicant[922]: CTRL-EVENT-EAP-STARTED EAP authentication started
Jun 28 18:18:45 eee01 wpa_supplicant[922]: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
Jun 28 18:18:45 eee01 wpa_supplicant[922]: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
Jun 28 18:18:45 eee01 wpa_supplicant[922]: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=GeoTrust, Inc./CN=GeoTrust SSL CA
'
Jun 28 18:18:45 eee01 wpa_supplicant[922]: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=GeoTrust, Inc./CN=GeoTrust SSL CA
'
Jun 28 18:18:45 eee01 wpa_supplicant[922]: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/serialNumber=wiFEWGtHNv/I87ReD4dF8uPCS5e9Irnz/C=US/ST=MyState/L=MyCity/O=MyOrganization/OU=MyOrgUnit/CN=MyCanonicalName'
Jun 28 18:18:45 eee01 wpa_supplicant[922]: EAP-TLV: TLV Result - Failure

Revision history for this message
js1 (sujiannming) wrote :

Just tested with 10.04.4 and it seems to work. The difference is 10.04.4 uses wpasupplicant 0.6.x whereas 12.04 uses 0.7.x. Is there a known issue with wpasupplicant 0.7.x and keys larger than 1024 bits?

Revision history for this message
Maarten Bezemer (veger) wrote :

Set to confirmed, as people (still) have this problem.

Changed in wpasupplicant (Ubuntu):
status: Incomplete → Confirmed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.