I retyped the config. That is a typo. It should be '--challenge'.

-Chris
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Paul
Bender
Sent: Monday, August 23, 2004 4:01 PM
To: [EMAIL PROTECTED]
Subject: Re: Freeradius + PEAP + MSCHAPv2 + ntlm_auth + Windows XP
client

Did you cut and paste or type the lines from your config file? According

the the config file ntlm_auth has the argument '--challence', but the 
debug output has the argument '--challenge'.

Hand, Chris wrote:

> I am trying to set up 802.1x on our network and I would like the users
> to be able to use their current Active Directory credentials.
> 
> I need the AD domain to be stripped from the username so that I can
feed
> it to ntlm_auth. I am using a Windows XP Pro client and Windows 2003
> server.
> 
> Here is part of my config file.
> 
> Modules {
> realm ntdomain {
>       format = prefix
>       delimiter = "\\"
>       ignore_default = no
>       ignore_null = no
> }
> 
> eap {
>       default_eap_type = peap
>       timer_expire = 60
>       ignore_unknown_eap_types = no
>       cisco_accounting_username_bug = yes
>       tls {
>               private_key_password = whatever
>               private_key_file = ${raddbdir}/certs/cert-srv.pem
>               certificate_file = ${raddbdir}/certs/cert-srv.pem
>               CA_file = ${raddbdir}/certs/demoCA/cacert.pem
>               dh_file = ${raddbdir}/certs/dh
>               random_file = ${raddbdir}/certs/random
>               fragment_size = 1024
>               include_length = yes
>       }
>       peap {
>               default_eap_type = mschapv2
>       }
>       mschapv2 {
>       }
> }
> 
> mschap {
>       authtype = MS-CHAP
>       with_ntdomain_hack = no
>       ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --domain=MI /
> --username=%{Stripped-User-Name} --challence=%{mschap:Challenge:-00} /
> --nt-response=%{mschap:NT-Response:-00}"
> }
> }
> 
> authorize {
>       preprocess
>       ntdomain
>       eap
>       files
> }
> 
> authenticate {
>       Auth-Type MS-CHAP {
>               Mschap
>       }
>       eap
> }
> 
> From the debug output:
> radius_xlat: Running registered xlat function of module mschap for
> string 'Challenge'
> radius_xlat: Running registered xlat function of module mschap for
> string 'NT-Response'
> Exec-Program: /usr/bin/ntlm_auth --request-nt-key --domain=MI
> --username= --challenge=3d66c96d9aa150e6
> --nt-response=c97090b4f7aeeac3ea2a98e24daf1fdac43f626658cbe463
> Exec-Program-Wait: plaintext: Logon failure (0xc000006d) 
> Exec-Program: returned: 1
> 
> If I try ntlm_auth manually, it works fine:
> [EMAIL PROTECTED] raddb]# ntlm_auth --requeset-nt-key --domain=MI /
> --username=chand
> password: 
> NT_STATUS_OK: Success (0x0)
> 
> Has anyone successfully used freeradius to authenticate against Active
> Directory (Windows 2003)?
> 
> Chris Hand 
> Network Engineer
> [EMAIL PROTECTED]
> 
> 
> 
> 
> - 
> List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html


- 
List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html



-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to