Here is what we are seeing now....The secret has been set and will allow us to login but we are not getting any privileged level:
rad_recv: Access-Request packet from host 67.106.198.67:1645, id=15, length=75 NAS-IP-Address = 10.1.1.31 NAS-Port = 1 NAS-Port-Type = Virtual User-Name = "homer" Calling-Station-Id = "10.1.1.162" User-Password = "t3stm3" modcall: entering group authorize for request 0 modcall[authorize]: module "preprocess" returns ok for request 0 modcall[authorize]: module "chap" returns noop for request 0 modcall[authorize]: module "eap" returns noop for request 0 rlm_realm: No '@' in User-Name = "homer", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 0 users: Matched DEFAULT at 152 users: Matched DEFAULT at 216 modcall[authorize]: module "files" returns ok for request 0 modcall[authorize]: module "mschap" returns noop for request 0 rlm_ldap: - authorize rlm_ldap: performing user authorization for homer radius_xlat: '(&(ObjectClass=posixAccount)(uid=homer))' radius_xlat: 'ou=people,dc=test,dc=net' ldap_get_conn: Got Id: 0 rlm_ldap: attempting LDAP reconnection rlm_ldap: (re)connect to jag.test.net:389, authentication 0 rlm_ldap: bind as / to jag.test.net:389 rlm_ldap: waiting for bind result ... rlm_ldap: performing search in ou=people,dc=test,dc=net, with filter (&(ObjectClass=posixAccount)(uid=homer)) rlm_ldap: looking for check items in directory... rlm_ldap: Adding radiusAuthType as Auth-Type, value LDAP & op=21 rlm_ldap: looking for reply items in directory... rlm_ldap: extracted attribute Juniper-Local-User-Name from generic item Juniper-Local-User-Name := tier1 rlm_ldap: extracted attribute Cisco-AVPair from generic item Cisco-AVPair := "shell:priv-lvl=15" rlm_ldap: user homer authorized to use remote access ldap_release_conn: Release Id: 0 modcall[authorize]: module "ldap" returns ok for request 0 modcall: group authorize returns ok for request 0 rad_check_password: Found Auth-Type LDAP auth: type "LDAP" modcall: entering group Auth-Type for request 0 rlm_ldap: - authenticate rlm_ldap: login attempt by "homer" with password "t3stm3" rlm_ldap: user DN: uid=homer,ou=people,dc=test,dc=net rlm_ldap: (re)connect to jag.test.net:389, authentication 1 rlm_ldap: bind as uid=homer,ou=people,dc=test,dc=net/t3stm3 to jag.test.net:389 rlm_ldap: waiting for bind result ... rlm_ldap: user homer authenticated succesfully modcall[authenticate]: module "ldap" returns ok for request 0 modcall: group Auth-Type returns ok for request 0 Sending Access-Accept of id 15 to 67.106.198.67:1645 Juniper-Local-User-Name := "tier1" Cisco-AVPair := "shell:priv-lvl=15" Finished request 0 Going to the next request --- Walking the entire request list --- Waking up in 6 seconds... --- Walking the entire request list --- Cleaning up request 0 ID 15 with timestamp 40f2e98a Nothing to do. Sleeping until we see a request. On Mon, Jul 12, 2004 at 02:29:28PM -0400, Dustin Doris wrote: > You need to do what the debug message said and make sure your shared > secret is correct. Check clients.conf in your raddb directory. > > WARNING: Unprintable characters in the password. ? Double-check the > shared secret on the server and the NAS! > > > On Mon, 12 Jul 2004, Robert Banniza wrote: > > > Here is what radiusd -X -A provides: > > > > rad_recv: Access-Request packet from host 67.106.198.67:1645, id=10, > > length=75 > > NAS-IP-Address = 11.9.67.177 > > NAS-Port = 1 > > NAS-Port-Type = Virtual > > User-Name = "homer" > > Calling-Station-Id = "10.1.1.162" > > User-Password = "\334\303A_-VB/VJ N\017\230\217\317" > > modcall: entering group authorize for request 0 > > modcall[authorize]: module "preprocess" returns ok for request 0 > > modcall[authorize]: module "chap" returns noop for request 0 > > modcall[authorize]: module "eap" returns noop for request 0 > > rlm_realm: No '@' in User-Name = "homer", looking up realm NULL > > rlm_realm: No such realm "NULL" > > modcall[authorize]: module "suffix" returns noop for request 0 > > users: Matched DEFAULT at 152 > > users: Matched DEFAULT at 216 > > modcall[authorize]: module "files" returns ok for request 0 > > modcall[authorize]: module "mschap" returns noop for request 0 > > rlm_ldap: - authorize > > rlm_ldap: performing user authorization for homer > > radius_xlat: '(&(ObjectClass=posixAccount)(uid=homer))' > > radius_xlat: 'ou=people,dc=test,dc=net' > > ldap_get_conn: Got Id: 0 > > rlm_ldap: attempting LDAP reconnection > > rlm_ldap: (re)connect to jag.test.net:389, authentication 0 > > rlm_ldap: bind as / to jag.test.net:389 > > rlm_ldap: waiting for bind result ... > > rlm_ldap: performing search in ou=people,dc=test,dc=net, with filter > > (&(ObjectClass=posixAccount)(uid=homer)) > > rlm_ldap: looking for check items in directory... > > rlm_ldap: Adding radiusAuthType as Auth-Type, value LDAP & op=21 > > rlm_ldap: looking for reply items in directory... > > rlm_ldap: extracted attribute Juniper-Local-User-Name from generic item > > Juniper-Local-User-Name := tier1 > > rlm_ldap: extracted attribute Cisco-AVPair from generic item > > Cisco-AVPair := "shell:priv-lvl=15" > > rlm_ldap: user homer authorized to use remote access > > ldap_release_conn: Release Id: 0 > > modcall[authorize]: module "ldap" returns ok for request 0 > > modcall: group authorize returns ok for request 0 > > rad_check_password: Found Auth-Type LDAP > > auth: type "LDAP" > > modcall: entering group Auth-Type for request 0 > > rlm_ldap: - authenticate > > rlm_ldap: login attempt by "homer" with password "ÜÃA_-VB/VJ N???Ï" > > rlm_ldap: user DN: uid=homer,ou=people,dc=test,dc=net > > rlm_ldap: (re)connect to jag.test.net:389, authentication 1 > > rlm_ldap: bind as uid=homer,ou=people,dc=test,dc=net/ÜÃA_-VB/VJ N???Ï > > to jag.test.net:389 > > rlm_ldap: waiting for bind result ... > > modcall[authenticate]: module "ldap" returns reject for request 0 > > modcall: group Auth-Type returns reject for request 0 > > auth: Failed to validate the user. > > WARNING: Unprintable characters in the password. ? Double-check the > > shared secret on the server and the NAS! > > Delaying request 0 for 1 seconds > > Finished request 0 > > Going to the next request > > --- Walking the entire request list --- > > Waking up in 1 seconds... > > --- Walking the entire request list --- > > Waking up in 1 seconds... > > --- Walking the entire request list --- > > Sending Access-Reject of id 10 to 67.106.198.67:1645 > > Juniper-Local-User-Name := "tier1" > > Cisco-AVPair := "shell:priv-lvl=15" > > Waking up in 4 seconds... > > --- Walking the entire request list --- > > Cleaning up request 0 ID 10 with timestamp 40f2cbda > > Nothing to do. Sleeping until we see a request. > > > > > > On Mon, Jul 12, 2004 at 12:46:46PM -0400, Dustin Doris wrote: > > > What about radiusd -x. Run Freeradius in debug mode. > > > > > > On Sun, 11 Jul 2004, Robert Banniza wrote: > > > > > > > Here is the debug output: > > > > > > > > 2d04h: AAA/MEMORY: create_user (0x20F7E20) user='' ruser='' port='tty1' > > > > +rem_addr='10.1.1.162' authen_type=ASCII service= > > > > LOGIN priv=1 > > > > 2d04h: AAA/AUTHEN/START (1821432037): port='tty1' list='' action=LOGIN > > > > +service=LOGIN > > > > 2d04h: AAA/AUTHEN/START (1821432037): using "default" list > > > > 2d04h: AAA/AUTHEN/START (1821432037): Method=radius (radius) > > > > 2d04h: AAA/AUTHEN (1821432037): status = GETUSER > > > > 2d04h: AAA/AUTHEN/CONT (1821432037): continue_login (user='(undef)') > > > > 2d04h: AAA/AUTHEN (1821432037): status = GETUSER > > > > 2d04h: AAA/AUTHEN (1821432037): Method=radius (radius) > > > > 2d04h: AAA/AUTHEN (1821432037): status = GETPASS > > > > 2d04h: AAA/AUTHEN/CONT (1821432037): continue_login (user='homer') > > > > 2d04h: AAA/AUTHEN (1821432037): status = GETPASS > > > > 2d04h: AAA/AUTHEN (1821432037): Method=radius (radius) > > > > 2d04h: AAA/AUTHEN (1821432037): status = PASS > > > > 2d04h: tty1 AAA/AUTHOR/EXEC (3720401710): Port='tty1' list='' > > > > service=EXEC > > > > 2d04h: AAA/AUTHOR/EXEC: tty1 (3720401710) user='homer' > > > > 2d04h: tty1 AAA/AUTHOR/EXEC (3720401710): send AV service=shell > > > > 2d04h: tty1 AAA/AUTHOR/EXEC (3720401710): send AV cmd* > > > > 2d04h: tty1 AAA/AUTHOR/EXEC (3720401710): found list "default" > > > > 2d04h: tty1 AAA/AUTHOR/EXEC (3720401710): Method=radius (radius) > > > > 2d04h: AAA/AUTHOR (3720401710): Post authorization status = FAIL > > > > 2d04h: AAA/AUTHOR/EXEC: Authorization FAILED > > > > 2d04h: AAA/MEMORY: free_user (0x20F7E20) user='homer' ruser='' > > > > port='tty1' > > > > +rem_addr='10.1.1.162' authen_type=ASCII servi > > > > ce=LOGIN priv=1 > > > > Soutlake#2# > > > > Soutlake#2# > > > > Soutlake#2# > > > > Soutlake#2# > > > > Soutlake#2# > > > > Soutlake#2# > > > > Soutlake#2# > > > > Soutlake#2# > > > > Soutlake#2# > > > > Soutlake#2# > > > > Soutlake#2# > > > > 2d04h: AAA: parse name=tty1 idb type=-1 tty=-1 > > > > 2d04h: AAA: name=tty1 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=1 > > > > +channel=0 > > > > 2d04h: AAA/MEMORY: create_user (0x20F7C0C) user='' ruser='' port='tty1' > > > > +rem_addr='10.1.1.162' authen_type=ASCII service= > > > > LOGIN priv=1 > > > > 2d04h: AAA/AUTHEN/START (2535633014): port='tty1' list='' action=LOGIN > > > > +service=LOGIN > > > > 2d04h: AAA/AUTHEN/START (2535633014): using "default" list > > > > 2d04h: AAA/AUTHEN/START (2535633014): Method=radius (radius) > > > > 2d04h: AAA/AUTHEN (2535633014): status = GETUSER > > > > 2d04h: AAA/AUTHEN/CONT (2535633014): continue_login (user='(undef)') > > > > 2d04h: AAA/AUTHEN (2535633014): status = GETUSER > > > > 2d04h: AAA/AUTHEN (2535633014): Method=radius (radius) > > > > 2d04h: AAA/AUTHEN (2535633014): status = GETPASS > > > > 2d04h: AAA/AUTHEN/CONT (2535633014): continue_login (user='jessica') > > > > 2d04h: AAA/AUTHEN (2535633014): status = GETPASS > > > > 2d04h: AAA/AUTHEN (2535633014): Method=radius (radius) > > > > 2d04h: AAA/AUTHEN (2535633014): status = PASS > > > > 2d04h: tty1 AAA/AUTHOR/EXEC (1601631891): Port='tty1' list='' > > > > service=EXEC > > > > 2d04h: AAA/AUTHOR/EXEC: tty1 (1601631891) user='jessica' > > > > 2d04h: tty1 AAA/AUTHOR/EXEC (1601631891): send AV service=shell > > > > 2d04h: tty1 AAA/AUTHOR/EXEC (1601631891): send AV cmd* > > > > 2d04h: tty1 AAA/AUTHOR/EXEC (1601631891): found list "default" > > > > 2d04h: tty1 AAA/AUTHOR/EXEC (1601631891): Method=radius (radius) > > > > 2d04h: AAA/AUTHOR (1601631891): Post authorization status = FAIL > > > > 2d04h: AAA/AUTHOR/EXEC: Authorization FAILED > > > > 2d04h: AAA/MEMORY: free_user (0x20F7C0C) user='jessica' ruser='' > > > > port='tty1' > > > > +rem_addr='10.1.1.162' authen_type=ASCII ser > > > > vice=LOGIN priv=1 > > > > > > > > On Fri, Jul 09, 2004 at 12:42:05PM -0400, Dustin Doris wrote: > > > > > What is the debug output? What happens when you try to login to the > > > > > router? User denied? > > > > > > > > > > On Fri, 9 Jul 2004, Robert Banniza wrote: > > > > > > > > > > > Guys, > > > > > > We are trying to allow users to authenticate to Cisco 26xx routers using > > > > > > Freeradius with the rlm_ldap module (OpenLDAP). We would like some of > > > > > > these users to be able to log in with enable privileges. The following > > > > > > is what we have done to try this with no avail. The following is a > > > > > > sample ldif entry: > > > > > > > > > > > > ################################################################# > > > > > > dn: uid=homer, ou=people, dc=test, dc=net > > > > > > objectclass: person > > > > > > objectclass: radiusprofile > > > > > > objectclass: uidObject > > > > > > objectClass: inetOrgPerson > > > > > > objectClass: posixAccount > > > > > > objectClass: extensibleObject > > > > > > cn: Homer Simpson > > > > > > sn: Simpson > > > > > > loginShell: /bin/bash > > > > > > userpassword: {SSHA}fghkjfghkhgkfhgrofZyn2u9yiAAxbMP > > > > > > uidnumber: 2001 > > > > > > gidnumber: 20 > > > > > > homeDirectory: /home/homer > > > > > > uid: homer > > > > > > shadowLastChange: 10877 > > > > > > shadowMin: 0 > > > > > > shadowMax: 999999 > > > > > > shadowWarning: 7 > > > > > > shadowInactive: -1 > > > > > > shadowExpire: -1 > > > > > > shadowFlag: 0 > > > > > > radiusAuthType: LDAP > > > > > > radiusReplyItem: Juniper-Local-User-Name := tier1 > > > > > > radiusReplyItem: Cisco-AVPair := "shell:priv-lvl=15" > > > > > > radiusprofileDN: uid=homer, ou=people, dc=test, dc=net > > > > > > ################################################################# > > > > > > > > > > > > The following is what we have on the router: > > > > > > > > > > > > ################################################################# > > > > > > aaa new-model > > > > > > aaa authentication login default group radius enable > > > > > > aaa authorization exec default group radius > > > > > > > > > > > > enable secret password > > > > > > > > > > > > radius-server host 67.106.198.70 auth-port 1812 acct-port 1813 > > > > > > radius-server retransmit 3 > > > > > > radius-server key testing123 > > > > > > ################################################################# > > > > > > > > > > > > What else are we missing? Any help would be appreciated. > > > > > > > > > > > > Robert > > > > > > > > > > > > - > > > > > > List info/subscribe/unsubscribe? See > > > > > > http://www.freeradius.org/list/users.html > > > > > > > > > > > > > > > > - > > > > > List info/subscribe/unsubscribe? See > > > > > http://www.freeradius.org/list/users.html > > > > > > > > > > > > > - > > > > List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html > > > > > > > > > > - > > > List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html > > > > > > > - > > List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html > > > > - > List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html > - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html