Title: RE: freeradius ldap and chap authentication problems
Hi,
I have recently experienced the same issues as yourself.  This isn't going to help solve your problem but it will allow for a better understanding of the situation.
 
The "passwords" used in CHAP are actually a one-way hash generated by the client machine, using the password entered by the user, and the "challenge" sent by the NAS. At the Radius server the same is done with the same "challenge" from the NAS and the clear-text password stored in the db. The RADIUS server compares the two hashes, giving an accept or deny. 
 
The "challenge" is different every time a connection is made resulting in new hash every time. If an attacker intercepted the packets he-she would see the hash which cannot be reversed to give the password.
 
As you can see, with CHAP,  the clear text password is a requirement at both ends of the connection. 
 
Regards Mike D.

[Michael Davidson]  -----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]On Behalf Of Tjeerd Bos
Sent: 11 June 2003 12:44
To: [EMAIL PROTECTED]
Subject: RE: freeradius ldap and chap authentication problems

I know what the problem is:
In our ldap the passwords are not stored in clear text. Other applications needs them encrypted. Chap needs passwords stored in clear text on ldap.

Isn't it possible to introduce a ldap encrypt module in rlm ldap so that the encrypted password matches  the encrypted userPassword in ldap?

greetings,
Tjeerd Bos

PinkRoccade Infra Structures
Apeldoorn

Reply via email to