Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Upgrade to 2.4.5 broke 802.1x RADIUS WiFi over VPN

    Scheduled Pinned Locked Moved General pfSense Questions
    39 Posts 6 Posters 5.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      ogghi @stephenw10
      last edited by

      @stephenw10 Hey there, I was brave and tested to change those settings from remote :)
      Nothing broke. Traffic is being handled by the interface specific rule now.
      But still I don't get any request on the RADIUS server on the other tunnel end. Always bad UDP checksum...

      stephenw10S 1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator @ogghi
        last edited by

        @ogghi said in Upgrade to 2.4.5 broke 802.1x RADIUS WiFi over VPN:

        Always bad UDP checksum...

        In a packet capture?
        That's expected if you have checksum offloading enabled on the capture interface.

        You're not seeing the radius traffic arrive at the server at all?

        Steve

        O 1 Reply Last reply Reply Quote 0
        • O
          ogghi @stephenw10
          last edited by

          @stephenw10 nothing arrives on the radius server from over the vpn connection.
          That's the weird thing. At least nothing is logged in the windows service...

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Hmm, well I'd pcap on the server to be sure. I'd also pcap at each interface in the route to see where it's failing.
            We have seen issues with large UDP packets not fragmenting correctly across the tunnel. You would see that in a pcap if you are hitting that or something similar.

            Steve

            O 1 Reply Last reply Reply Quote 1
            • O
              ogghi @stephenw10
              last edited by

              @stephenw10 Just did some package capture. On the ADC on the other tunnel side:
              837c7862-db80-4888-bf86-867e549a13f8-image.png

              On the one where it's working:
              831b8a45-50a8-44bd-b379-16dfdd7a6edf-image.png

              I am wondering why the length seems to be capped at 190 bytes for the one going through the tunnel...?

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                190B may just be the size of that request.

                Where, specifically did you capture there?

                I would check on the OpenVPN and internal interfaces at both ends if the tunnel. The traffic should appear in all 4 places but since something is failing it may not. You need to determine where it's failing.

                Steve

                O 1 Reply Last reply Reply Quote 1
                • O
                  ogghi @stephenw10
                  last edited by ogghi

                  @stephenw10 thanks for your help! :)
                  So I did capture traffic. Seems there is just no reply from the RADIUS server. Traffic gets to the server, but there is never any packet being sent back.
                  So it seems like debugging this windows NAPS is due here!

                  EDIT: Seems it must be some issue on Windows firewall? The NPS server logs nothing at all. If running locally NTradping tool it shows at least some log entries. But other then opening port 1812 UDP on the firewall...what else could I do here?

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Does it log something if there is a bad request? Incorrect shared secret for example.

                    You might be able to see some difference in the radius requests that fail wireshark. They are smaller packets as you noted.

                    I don't think that's a problem in the pfSense config though if traffic arrives at the server and looks the same as when it arrives in the remote firewall.

                    Steve

                    O 1 Reply Last reply Reply Quote 1
                    • O
                      ogghi @stephenw10
                      last edited by

                      @stephenw10 Hi there!
                      I just checked again the radius config for the auth servers in the pfSense. Actually I reconfigured it. Now the packet sizes are identical.
                      I get the bad UDP checksum also for the radius on the ADC without VPN where it's working.
                      So my current thought is that there might be an issue with the NPS itself. I'll try to uninstall/reinstall the role there. Who knows...

                      O 1 Reply Last reply Reply Quote 0
                      • O
                        ogghi @ogghi
                        last edited by

                        @ogghi I think I'll try and debug on the windows server/NPS side. The packets arrive at the windows server as seen on Wireshark. But nothing is ever logged on NPS. So it might be some really stupid bug here..

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.