Problem mit WLAN Client und WPA2 Enterprise EAP-TLS

Forum zu aktuellen Geräten der LANCOM Router/Gateway Serie

Moderator: Lancom-Systems Moderatoren

Antworten
geppi
Beiträge: 159
Registriert: 05 Mär 2009, 18:05

Problem mit WLAN Client und WPA2 Enterprise EAP-TLS

Beitrag von geppi »

In einem WLAN mit WPA2 Enterprise EAP-TLS und entsprechender Authentifizierung über Zertifikate habe ich ein Problem mit einem Client den ich nicht verbunden bekomme. Andere Clients verbinden sich erfolgreich und bei diesen sieht der Trace z.B. folgendermaßen aus.

Code: Alles auswählen

[RADIUS-Server] 2026/01/24 20:00:44,849  Devicetime: 2026/01/24 20:00:45,083
Received RADIUS Authentication Request request 101 from client X:
-->client matches static IPv4 table entry X
-->known attributes of request:
.......
   EAP-Message:
   (232 bytes)
   -->EAP Header
   EAP Packet Code     : Response
   EAP Packet Id       : 2
   EAP Packet Len      : 232
   EAP Packet Type     : TLS
   --> EAP/TLS Packet
   TLS Flags           :
   --> SSL/TLS Record
   Record Content Type : Handshake
   Record Length       : 221
   Protocol Version    : TLSv1
   Handshake Msg Type  : Client Hello
   Message Length      : 217
   -->SSL/TLS Client Hello
   Protocol Version    : TLSv1.2
   Client Random       : 44 19 6b bc 4c f1 97 f2 D.k.L...
                         9d 99 68 cf 61 8d 31 a2 ..h.a.1.
                         ed d3 e4 da 9b 99 b9 c4 ........
                         30 f6 11 b9 f9 9c 3c 6d 0.....<m
   Session ID          : 77 a5 05 d8 1a 80 61 b6 w.....a.
                         a7 31 56 6c 94 92 1a 96 .1Vl....
                         08 16 4e 59 31 8f c8 0c ..NY1...
                         9e 30 e6 16 cb 54 6b 45 .0...TkE
   Cipher Suites       : TLS_AES_128_GCM_SHA256
                         TLS_AES_256_GCM_SHA384
                         TLS_CHACHA20_POLY1305_SHA256
                         TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
                         TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
                         TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
                         TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
                         TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
                         TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
                         TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
                         TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
                         TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
                         TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
                         TLS_RSA_WITH_AES_128_GCM_SHA256
                         TLS_RSA_WITH_AES_256_GCM_SHA384
                         TLS_RSA_WITH_AES_128_CBC_SHA
                         TLS_RSA_WITH_AES_256_CBC_SHA
                         TLS_RSA_WITH_3DES_EDE_CBC_SHA
   Compression Methods : NULL
   Ext. Master Secret  :
   Reneg. Info         :
   Supported Groups    : ecdh_x25519
                         secp256r1
                         secp384r1
   EC-Point Formats    : uncompressed
   Sign. Algorithms    : ecdsa_secp256r1_sha256
                         rsa_pss_rsae_sha256
                         rsa_pkcs1_sha256
                         ecdsa_secp384r1_sha384
                         rsa_pss_rsae_sha384
                         rsa_pkcs1_sha384
                         rsa_pss_rsae_sha512
                         rsa_pkcs1_sha512
                         rsa_pkcs1_sha1
   Keyshare            :
    ecdh_x25519        : 34 be 47 84 bd 2f bc 69 4.G../.i
                         1f 4b 64 b0 bf 92 77 e7 .Kd...w.
                         04 4b f1 a1 62 4b 12 ce .K..bK..
                         65 97 6d da 60 9e 22 26 e.m.`."&
   PSK Exchange Modes  : psk_dhe_ke
   Supp. Versions      : TLSv1.3
                         TLSv1.2
   Mobility-Domain-Id  : 55370
   WLAN-Pairwise-Cipher: TGI-CSE-CCMP128
   WLAN-Group-Cipher   : TGI-CSE-CCMP128
   WLAN-AKM-Suite      : TGI-AUTHSE-8021X-FT
   WLAN-Group-Mgmt-Cipher: TGI-CSE-BIPCMAC128
   WLAN-RF-Band        : 2.4-GHz
-->user name contains no realm, using empty realm
-->realm of user is ''
-->authenticating locally
-->found user 'sirius.ofc.digitx.de' in database(s)
-->authenticating via EAP
-->queueing request for later response
Worauf im Trace später folgendes steht.

Code: Alles auswählen

[TLS] 2026/01/24 20:00:44,849  Devicetime: 2026/01/24 20:00:45,084
Receiving Client Hello on connection 184684:
-> parsing TLS extensions
-> protocol version is TLSv1.2
-> selected x25519 as named group
-> enable extended master secret usage
-> created new session id
-> select cipher:
 -> check cipher TLS_AES_128_GCM_SHA256
  -> not allowed for selected protocol version
 -> check cipher TLS_AES_256_GCM_SHA384
  -> not allowed for selected protocol version
 -> check cipher TLS_CHACHA20_POLY1305_SHA256
  -> encryption algorithm disallowed by config
 -> check cipher TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  -> server key type mismatch
 -> check cipher TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
 -> PFS suite or no PFS preference, selection done
-> selected cipher suite is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
-> selected signature scheme is rsa_pkcs1_sha256
-> selected elliptic curve is x25519
-> selected elliptic curve point format is uncompressed
-> client supports secure renegotiation (by extension), enable it
-> all fine, ready to send Server Hello
Bei dem Client den ich nicht verbunden bekomme sieht es folgendermaßen aus.

Code: Alles auswählen

[RADIUS-Server] 2026/01/24 19:55:30,484  Devicetime: 2026/01/24 19:55:30,710
Received RADIUS Authentication Request request 93 from client X:
-->client matches static IPv4 table entry X
-->known attributes of request:
.......
   EAP-Message:
   (203 bytes)
   -->EAP Header
   EAP Packet Code     : Response
   EAP Packet Id       : 2
   EAP Packet Len      : 203
   EAP Packet Type     : TLS
   --> EAP/TLS Packet
   TLS Flags           :
   --> SSL/TLS Record
   Record Content Type : Handshake
   Record Length       : 192
   Protocol Version    : TLSv1
   Handshake Msg Type  : Client Hello
   Message Length      : 188
   -->SSL/TLS Client Hello
   Protocol Version    : TLSv1.2
   Client Random       : b3 0c 54 b6 6f 0b 7d 1c ..T.o.}.
                         69 ab a0 42 f6 77 69 34 i..B.wi4
                         d1 47 11 2f e2 0c 7e 05 .G./..~.
                         d6 ca bd e7 5a 53 5a 3e ....ZSZ>
   Cipher Suites       : TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
                         TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
                         TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
                         TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
                         TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
                         TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
                         TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
                         TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
                         TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
                         TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
                         TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
                         TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
                         TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
                         TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
                         TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
                         TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
                         TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
                         TLS_DHE_RSA_WITH_AES_256_CBC_SHA
                         TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
                         TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
                         TLS_DHE_RSA_WITH_AES_128_CBC_SHA
                         TLS_RSA_WITH_AES_256_GCM_SHA384
                         TLS_RSA_WITH_AES_128_GCM_SHA256
                         TLS_RSA_WITH_AES_256_CBC_SHA256
                         TLS_RSA_WITH_AES_128_CBC_SHA256
                         TLS_RSA_WITH_AES_256_CBC_SHA
                         TLS_RSA_WITH_AES_128_CBC_SHA
   Compression Methods : NULL
   Reneg. Info         :
   EC-Point Formats    : uncompressed
   Supported Groups    : ecdh_x25519
                         secp256r1
                         ecdh_x448
                         secp384r1
                         secp521r1
   Encrypt-Then-MAC    :
   Ext. Master Secret  :
   Sign. Algorithms    : 0x0905
                         0x0906
                         0x0904
                         ecdsa_secp256r1_sha256
                         ecdsa_secp384r1_sha384
                         ecdsa_secp521r1_sha384
                         ed25519
                         ed448
                         0x081a
                         0x081b
                         0x081c
                         rsa_pss_pss_sha256
                         rsa_pss_pss_sha384
                         rsa_pss_pss_sha512
                         rsa_pss_rsae_sha256
                         rsa_pss_rsae_sha384
                         rsa_pss_rsae_sha512
                         rsa_pkcs1_sha256
                         rsa_pkcs1_sha384
                         rsa_pkcs1_sha512
                         ecdsa_sha224
                         rsa_pkcs1_sha224
                         dsa_sha224
                         dsa_sha256
                         dsa_sha384
                         dsa_sha512
   WLAN-Pairwise-Cipher: TGI-CSE-CCMP128
   WLAN-Group-Cipher   : TGI-CSE-CCMP128
   WLAN-AKM-Suite      : TGI-AUTHSE-8021X-SHA256
   WLAN-Group-Mgmt-Cipher: TGI-CSE-BIPCMAC128
   WLAN-RF-Band        : 2.4-GHz
-->user name contains no realm, using empty realm
-->realm of user is ''
-->authenticating locally
-->found user 'skye.ofc.digitx.de' in database(s)
-->authenticating via EAP
-->queueing request for later response
Worauf im Trace folgendes zum Scheitern der Verbindung steht.

Code: Alles auswählen

[TLS] 2026/01/24 19:55:30,486  Devicetime: 2026/01/24 19:55:30,711
Receiving Client Hello on connection 184667:
-> parsing TLS extensions
-> protocol version is TLSv1.2
-> selected secp521r1 as named group
-> enable extended master secret usage
-> created new session id
-> select cipher:
 -> check cipher TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  -> server key type mismatch
 -> check cipher TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  -> no fitting signature/hash algorithm
 -> check cipher TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
  -> no fitting signature/hash algorithm
 -> check cipher TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  -> server key type mismatch
 -> check cipher TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
  -> encryption algorithm disallowed by config
 -> check cipher TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
  -> encryption algorithm disallowed by config
 -> check cipher TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  -> server key type mismatch
 -> check cipher TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  -> no fitting signature/hash algorithm
 -> check cipher TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
  -> no fitting signature/hash algorithm
 -> check cipher TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
  -> server key type mismatch
 -> check cipher TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  -> no fitting signature/hash algorithm
 -> check cipher TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
  -> no fitting signature/hash algorithm
 -> check cipher TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  -> server key type mismatch
 -> check cipher TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  -> no fitting signature/hash algorithm
 -> check cipher TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
  -> no fitting signature/hash algorithm
 -> check cipher TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  -> server key type mismatch
 -> check cipher TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  -> no fitting signature/hash algorithm
 -> check cipher TLS_DHE_RSA_WITH_AES_256_CBC_SHA
  -> no fitting signature/hash algorithm
 -> check cipher TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  -> server key type mismatch
 -> check cipher TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  -> no fitting signature/hash algorithm
 -> check cipher TLS_DHE_RSA_WITH_AES_128_CBC_SHA
  -> no fitting signature/hash algorithm
 -> check cipher TLS_RSA_WITH_AES_256_GCM_SHA384
  -> no fitting signature/hash algorithm
 -> check cipher TLS_RSA_WITH_AES_128_GCM_SHA256
  -> no fitting signature/hash algorithm
 -> check cipher TLS_RSA_WITH_AES_256_CBC_SHA256
  -> no fitting signature/hash algorithm
 -> check cipher TLS_RSA_WITH_AES_128_CBC_SHA256
  -> no fitting signature/hash algorithm
 -> check cipher TLS_RSA_WITH_AES_256_CBC_SHA
  -> no fitting signature/hash algorithm
 -> check cipher TLS_RSA_WITH_AES_128_CBC_SHA
  -> no fitting signature/hash algorithm
-> cannot select cipher suite, exiting
Ich verstehe nicht warum hier z.B. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 scheitert, obwohl der Client dieses ja angeboten hat und auch den Signatur Algorythmus rsa_pkcs1_sha256 anbietet. Oder interpretiere ich das 'no fitting signature/hash algorithm' falsch?

Die Zertifikate sind alle mit dem identischen Verfahren erzeugt worden. In den Client Zertifikaten und im CA Zertifikat steht 'Signature Algorithm: sha256WithRSAEncryption'.
Dr.Einstein
Beiträge: 3461
Registriert: 12 Jan 2010, 14:10

Re: Problem mit WLAN Client und WPA2 Enterprise EAP-TLS

Beitrag von Dr.Einstein »

Der Client ist halt moderner und mag den alten Krempel nicht. Erhöhe also die Verschlüsselungsverfahren vom RADIUS-Server und/oder vom Serverzertifikat.
Antworten