hi - we're seeing a Lucent Stinger device sending radius requests with a
passowrd field that is less than the 16 octets as per protocol.

now, some radius servers seem not to like this - but freeradius seems to
work fine with this. i suspect that is because freeradius either ignores the
length of that field, or copies it to a zero-padded buffer.

am i right? see section of an email below for details...

tariq

-----

 have the Password and Chap-Password fields with 16 and
17 octects respectively - as seen in the trace 5 logs. This is as per
protocol.

however, the problem stinger seems to send "short" passwords such as :

        Password = "<249>!<19><31><236><170><172>"
        Password = "<252><7><217><213><237><134><130>"
        Password = "<249>!<19><31><236><170><172>"

and so on .. these are less than the normal:
        Password = "<215>y<160><1>F<224><193><187>OM<'<0><222><197><227>"
- 16 octects
        CHAP-Password =
<1><193><202>t<186><136><24><147><145><210>n<233>.{9!;   - 17 octects

is this evidence that the problem lucent stinger is malforming its packets?
or are there valid cases when the Password field is short?

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to