Hi folks,
This is my second try at this post; the first was too long.  I read the archives and then attempted to

configure freeRadius using PEAP MSCHAP.  After some initial success I am
stuck with a Segment Fault(coredump).
I am using an Windows XP 802.1x  client, Cisco 1100 AP and  Sun Solaris
ver. 8 for freeRadius 1.0.1.  After configuring the client, the AP and the
radiusd.conf, the client.conf and the users files (not yet the eap.conf
file) I was successful in getting the freeRadius server to authenticate
the client.  Next I attempted to configure the client and the eap.conf
file for PEAP MSCHAP, resulting in the coredump.  Enabling PEAP results in
error messages directing the configuration of TLS.  Enabling TLS results
in the coredump.  I have tried numerous combinations of configuration,
some of these I copied from the archive, with the same result.   The
"radius -X" output, the "gdb bt" output, the eap.conf file, and a slice of the
radiusd.conf file follow this text.  I appreciate any help on this
problem.
Thanks,
John Gauntt

radiusd -X

Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /usr/local/etc/raddb/proxy.conf
Config:   including file: /usr/local/etc/raddb/clients.conf
Config:   including file: /usr/local/etc/raddb/snmp.conf
Config:   including file: /usr/local/etc/raddb/eap.conf
Config:   including file: /usr/local/etc/raddb/sql.conf

main: prefix = "/usr/local"
main: localstatedir = "/usr/local/var"
main: logdir = "/usr/local/var/log/radius"
main: libdir = "/usr/local/lib"
main: radacctdir = "/usr/local/var/log/radius/radacct"
main: hostname_lookups = no
main: max_request_time = 30
main: cleanup_delay = 5
main: max_requests = 1024
main: delete_blocked_requests = 0
main: port = 0
main: allow_core_dumps = yes
main: log_stripped_names = no
main: log_file = "/usr/local/var/log/radius/radius.log"
main: log_auth = yes
main: log_auth_badpass = yes
main: log_auth_goodpass = yes
main: pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
main: user = "(null)"
main: group = "(null)"
main: usercollide = no
main: lower_user = "no"
main: lower_pass = "no"
main: nospace_user = "no"
main: nospace_pass = "no"
main: checkrad = "/usr/local/sbin/checkrad"
main: proxy_requests = yes
proxy: retry_delay = 5
proxy: retry_count = 3
proxy: synchronous = no
proxy: default_fallback = yes
proxy: dead_time = 120
proxy: post_proxy_authorize = yes
proxy: wake_all_if_all_dead = no
security: max_attributes = 200
security: reject_delay = 1
security: status_server = no
main: debug_level = 0

read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Library search path is /usr/local/lib
Module: Loaded exec

exec: wait = yes
exec: program = "(null)"
exec: input_pairs = "request"
exec: output_pairs = "(null)"
exec: packet_type = "(null)"

rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP

pap: encryption_scheme = "crypt"
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP

mschap: use_mppe = no
mschap: require_encryption = yes
mschap: require_strong = yes
mschap: with_ntdomain_hack = no
mschap: passwd = "(null)"
mschap: authtype = "MS-CHAP"
mschap: ntlm_auth = "(null)"

Module: Instantiated mschap (mschap)
Module: Loaded System

unix: cache = no
unix: passwd = "(null)"
unix: shadow = "(null)"
unix: group = "(null)"
unix: radwtmp = "/usr/local/var/log/radius/radwtmp"
unix: usegroup = no
unix: cache_reload = 600

Module: Instantiated unix (unix)
Module: Loaded eap

eap: default_eap_type = "peap"
eap: timer_expire = 60
eap: ignore_unknown_eap_types = no
eap: cisco_accounting_username_bug = no

rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap

gtc: challenge = "Password: "
gtc: auth_type = "PAP"

rlm_eap: Loaded and initialized type gtc
Segmentation Fault(coredump)


gdb bt

GNU gdb 5.0
Copyright 2000 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you
are
welcome to change it and/or distribute copies of it under certain
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for
details.
This GDB was configured as "sparc-sun-solaris2.8"...
Core was generated by `radiusd -X'.
Program terminated with signal 9, Killed.
Reading symbols from /usr/lib/libcrypt_i.so.1...done.
Loaded symbols for /usr/lib/libcrypt_i.so.1
Reading symbols from /usr/local/lib/libradius-1.0.1.so...done.
Loaded symbols for /usr/local/lib/libradius-1.0.1.so
Reading symbols from /usr/local/lib/libltdl.so.3...done.
Loaded symbols for /usr/local/lib/libltdl.so.3
Reading symbols from /usr/lib/libdl.so.1...done.
Loaded symbols for /usr/lib/libdl.so.1
Reading symbols from /usr/lib/libnsl.so.1...done.
Loaded symbols for /usr/lib/libnsl.so.1
Reading symbols from /usr/lib/libresolv.so.2...done.
Loaded symbols for /usr/lib/libresolv.so.2
Reading symbols from /usr/lib/libsocket.so.1...done.
Loaded symbols for /usr/lib/libsocket.so.1
Reading symbols from /usr/lib/librt.so.1...done.
Loaded symbols for /usr/lib/librt.so.1
Reading symbols from /usr/lib/libpthread.so.1...done.
Loaded symbols for /usr/lib/libpthread.so.1
Reading symbols from /usr/lib/libc.so.1...done.
Loaded symbols for /usr/lib/libc.so.1
Reading symbols from /usr/lib/libgen.so.1...done.
Loaded symbols for /usr/lib/libgen.so.1
Reading symbols from /usr/lib/libmp.so.2...done.
Loaded symbols for /usr/lib/libmp.so.2
Reading symbols from /usr/lib/libaio.so.1...done.
Loaded symbols for /usr/lib/libaio.so.1
Reading symbols from
/usr/platform/SUNW,Sun-Blade-100/lib/libc_psr.so.1...done.
Loaded symbols for /usr/platform/SUNW,Sun-Blade-100/lib/libc_psr.so.1
Reading symbols from /usr/lib/libthread.so.1...done.
Loaded symbols for /usr/lib/libthread.so.1
Reading symbols from /usr/lib/nss_files.so.1...done.
Loaded symbols for /usr/lib/nss_files.so.1
Reading symbols from /usr/local/lib/rlm_exec-1.0.1.so...done.
Loaded symbols for /usr/local/lib/rlm_exec-1.0.1.so
Reading symbols from /usr/local/lib/rlm_expr-1.0.1.so...done.
Loaded symbols for /usr/local/lib/rlm_expr-1.0.1.so
Reading symbols from /usr/local/lib/rlm_pap-1.0.1.so...done.
Loaded symbols for /usr/local/lib/rlm_pap-1.0.1.so
Reading symbols from /usr/local/lib/rlm_chap-1.0.1.so...done.
Loaded symbols for /usr/local/lib/rlm_chap-1.0.1.so
Reading symbols from /usr/local/lib/rlm_mschap-1.0.1.so...done.
Loaded symbols for /usr/local/lib/rlm_mschap-1.0.1.so
Reading symbols from /usr/local/lib/rlm_unix-1.0.1.so...done.
Loaded symbols for /usr/local/lib/rlm_unix-1.0.1.so
Reading symbols from /usr/local/lib/rlm_eap-1.0.1.so...done.
Loaded symbols for /usr/local/lib/rlm_eap-1.0.1.so
Reading symbols from /usr/local/lib/rlm_eap_md5-1.0.1.so...done.
Loaded symbols for /usr/local/lib/rlm_eap_md5-1.0.1.so
Reading symbols from /usr/local/lib/rlm_eap_leap-1.0.1.so...done.
Loaded symbols for /usr/local/lib/rlm_eap_leap-1.0.1.so
Reading symbols from /usr/local/lib/rlm_eap_gtc-1.0.1.so...done.
Loaded symbols for /usr/local/lib/rlm_eap_gtc-1.0.1.so
#0  0xff324838 in lt_dlsym (handle=0xf85c8, symbol=0xffbeda60
"rlm_eap_tls") at ltdl.c:3330
3330      lensym = LT_STRLEN (symbol) + LT_STRLEN
(handle->loader->sym_prefix)
#0  0xff324838 in lt_dlsym (handle=0xf85c8, symbol=0xffbeda60
"rlm_eap_tls") at ltdl.c:3330
#1  0xfeed2520 in eaptype_load (type=0x1875f4, eap_type=1597144,
cs=0xc2ab8) at eap.c:114
#2  0xfeed1a98 in eap_instantiate (cs=0xc2900, instance=0x187060) at
rlm_eap.c:134
#3  0x1c8dc in find_module_instance (instname=0xc5e80 "eap") at
modules.c:358
#4  0x1dd2c in do_compile_modsingle (component=0, ci=0xc6370,
filename=0x27070 "radiusd.conf", grouptype=0, modname=0xffbeddd4) at
modcall.c:814
#5  0x1dd84 in compile_modsingle (component=0, ci=0xc6370,
filename=0x27070 "radiusd.conf", modname=0xffbeddd4) at modcall.c:829
#6  0x1cdd4 in load_component_section (cs=0xc6230, comp=0,
filename=0x27070 "radiusd.conf") at modules.c:584
#7  0x1d284 in setup_modules () at modules.c:874
#8  0x147dc in main (argc=2, argv=0xffbeefdc) at radiusd.c:965

eap.conf

#
#  Whatever you do, do NOT set 'Auth-Type := EAP'.  The server
#  is smart enough to figure this out on its own.  The most
#  common side effect of setting 'Auth-Type := EAP' is that the
#  users then cannot use ANY other authentication method.
#
#       $Id: eap.conf,v 1.4 2004/04/15 18:34:41 aland Exp $
#

eap {
#  Invoke the default supported EAP type when
#  EAP-Identity response is received.
#
#  The incoming EAP messages DO NOT specify which EAP
#  type they will be using, so it MUST be set here.
#
#  For now, only one default EAP type may be used at a

time.
#
#  If the EAP-Type attribute is set by another module,
#  then that EAP type takes precedence over the
#  default type configured here.
#
default_eap_type = peap


#  A list is maintained to correlate EAP-Response
#  packets with EAP-Request packets.  After a
#  configurable length of time, entries in the list
#  expire, and are deleted.
#
timer_expire     = 60


#  There are many EAP types, but the server has support
#  for only a limited subset.  If the server receives
#  a request for an EAP type it does not support, then
#  it normally rejects the request.  By setting this
#  configuration to "yes", you can tell the server to
#  instead keep processing the request.  Another module
#  MUST then be configured to proxy the request to
#  another RADIUS server which supports that EAP type.
#
#  If another module is NOT configured to handle the
#  request, then the request will still end up being
#  rejected.
ignore_unknown_eap_types = no


# Cisco AP1230B firmware 12.2(13)JA1 has a bug.  When
given

# a User-Name attribute in an Access-Accept, it copies one
# more byte than it should.
#
# We can work around it by configurably adding an extra
# zero byte.
cisco_accounting_username_bug = no


# Supported EAP-types

#
#  We do NOT recommend using EAP-MD5 authentication
#  for wireless connections.  It is insecure, and does
#  not provide for dynamic WEP keys.
#
md5 {
}


# Cisco LEAP
#
#  We do not recommend using LEAP in new deployments. See:
#  http://www.securiteam.com/tools/5TP012ACKE.html
#
#  Cisco LEAP uses the MS-CHAP algorithm (but not
#  the MS-CHAP attributes) to perform it's authentication.
#
#  As a result, LEAP *requires* access to the plain-text
#  User-Password, or the NT-Password attributes.
#  'System' authentication is impossible with LEAP.
#
leap {
}


#  Generic Token Card.
#
#  Currently, this is only permitted inside of EAP-TTLS,
#  or EAP-PEAP.  The module "challenges" the user with
#  text, and the response from the user is taken to be
#  the User-Password.
#
#  Proxying the tunneled EAP-GTC session is a bad idea,
#  the users password will go over the wire in plain-text,
#  for anyone to see.
#
gtc {

#  The default challenge, which many clients
#  ignore..
#challenge = "Password: "


#  The plain-text response which comes back
#  is put into a User-Password attribute,
#  and passed to another module for
#  authentication.  This allows the EAP-GTC

#  response to be checked against plain-text,
#  or crypt'd passwords.
#
#  If you say "Local" instead of "PAP", then
#  the module will look for a User-Password
#  configured for the request, and do the
#  authentication itself.
#
auth_type = PAP

}

## EAP-TLS
#
#  To generate ctest certificates, run the script
#
#       ../scripts/certs.sh
#
#  The documents on http://www.freeradius.org/doc
#  are old, but may be helpful.
#
#  See also:
#
# http://www.dslreports.com/forum/remark,9286052~mode=flat
#

tls {
private_key_password = whatever
private_key_file = ${raddbdir}/certs/cert-srv.pem


#  If Private key & Certificate are located in
#  the same file, then private_key_file &
#  certificate_file must contain the same file
#  name.
certificate_file = ${raddbdir}/certs/cert-srv.pem


#  Trusted Root CA list
CA_file = ${raddbdir}/certs/demoCA/cacert.pem


dh_file = ${raddbdir}/certs/dh
random_file = ${raddbdir}/certs/random


#
#  This can never exceed the size of a RADIUS
#  packet (4096 bytes), and is preferably half
#  that, to accomodate other attributes in
#  RADIUS packet.  On most APs the MAX packet
#  length is configured between 1500 - 1600
#  In these cases, fragment size should be
#  1024 or less.
#

#       fragment_size = 1024

#  include_length is a flag which is
#  by default set to yes If set to
#  yes, Total Length of the message is
#  included in EVERY packet we send.
#  If set to no, Total Length of the
#  message is included ONLY in the
#  First packet of a fragment series.
#

#       include_length = yes

#  Check the Certificate Revocation List
#
#  1) Copy CA certificates and CRLs to same

directory.
#  2) Execute 'c_rehash <CA certs&CRLs

Directory>'.
#    'c_rehash' is OpenSSL's command.
#  3) Add 'CA_path=<CA certs&CRLs directory>'
#      to radiusd.conf's tls section.
#  4) uncomment the line below.
#  5) Restart radiusd

#       check_crl = yes

#
#  If check_cert_cn is set, the value will
#  be xlat'ed and checked against the CN
#  in the client certificate.  If the values
#  do not match, the certificate verification
#  will fail rejecting the user.
#

#       check_cert_cn = %{User-Name}
}


#  The TTLS module implements the EAP-TTLS protocol,
#  which can be described as EAP inside of Diameter,
#  inside of TLS, inside of EAP, inside of RADIUS...
#
#  Surprisingly, it works quite well.
#
#  The TTLS module needs the TLS module to be installed
#  and configured, in order to use the TLS tunnel
#  inside of the EAP packet.  You will still need to
#  configure the TLS module, even if you do not want
#  to deploy EAP-TLS in your network.  Users will not
#  be able to request EAP-TLS, as it requires them to
#  have a client certificate.  EAP-TTLS does not
#  require a client certificate.
#

ttls {
#  The tunneled EAP session needs a default
#  EAP type which is separate from the one for
#  the non-tunneled EAP module.  Inside of the
#  TTLS tunnel, we recommend using EAP-MD5.
#  If the request does not contain an EAP
#  conversation, then this configuration entry
#  is ignored.
default_eap_type = md5


#  The tunneled authentication request does
#  not usually contain useful attributes
#  like 'Calling-Station-Id', etc.  These
#  attributes are outside of the tunnel,
#  and normally unavailable to the tunneled
#  authentication request.
#
#  By setting this configuration entry to
#  'yes', any attribute which NOT in the
#  tunneled authentication request, but
#  which IS available outside of the tunnel,
#  is copied to the tunneled request.
#
# allowed values: {no, yes}
copy_request_to_tunnel = no


#  The reply attributes sent to the NAS are
#  usually based on the name of the user
#  'outside' of the tunnel (usually
#  'anonymous').  If you want to send the
#  reply attributes based on the user name
#  inside of the tunnel, then set this
#  configuration entry to 'yes', and the reply
#  to the NAS will be taken from the reply to
#  the tunneled request.
#
# allowed values: {no, yes}
use_tunneled_reply = no


}

#
#  The tunneled EAP session needs a default EAP type
#  which is separate from the one for the non-tunneled
#  EAP module.  Inside of the TLS/PEAP tunnel, we
#  recommend using EAP-MS-CHAPv2.
#
#  The PEAP module needs the TLS module to be installed
#  and configured, in order to use the TLS tunnel
#  inside of the EAP packet.  You will still need to
#  configure the TLS module, even if you do not want
#  to deploy EAP-TLS in your network.  Users will not
#  be able to request EAP-TLS, as it requires them to
#  have a client certificate.  EAP-PEAP does not
#  require a client certificate.
#

peap {
#  The tunneled EAP session needs a default
#  EAP type which is separate from the one for
#  the non-tunneled EAP module.  Inside of the
#  PEAP tunnel, we recommend using MS-CHAPv2,
#  as that is the default type supported by
#  Windows clients.
default_eap_type = mschapv2

}

#
#  This takes no configuration.
#
#  Note that it is the EAP MS-CHAPv2 sub-module, not
#  the main 'mschap' module.
#
#  Note also that in order for this sub-module to work,
#  the main 'mschap' module MUST ALSO be configured.
#
#  This module is the *Microsoft* implementation of

MS-CHAPv2
#  in EAP.  There is another (incompatible) implementation
#  of MS-CHAPv2 in EAP by Cisco, which FreeRADIUS does not
#  currently support.
#
mschapv2 {
}

}



radiusd.conf

##
## radiusd.conf -- FreeRADIUS server configuration file.
##
##      http://www.freeradius.org/
##      $Id: radiusd.conf.in,v 1.188 2004/05/13 20:10:19 pnixon Exp $
##



# SECURITY CONFIGURATION
#
#  There may be multiple methods of attacking on the server.  This
#  section holds the configuration items which minimize the impact
#  of those attacks
#


# MODULE CONFIGURATION
#
#  The names and configuration of each module is located in this section.
#
#  After the modules are defined here, they may be referred to by name,
#  in other sections of this configuration file.
#
modules {

#
#  Each module has a configuration as follows:
#
#       name [ instance ] {
#               config_item = value
#               ...
#       }
#
#  The 'name' is used to load the 'rlm_name' library
#  which implements the functionality of the module.
#
#  The 'instance' is optional.  To have two different instances
#  of a module, it first must be referred to by 'name'.
#  The different copies of the module are then created by
#  inventing two 'instance' names, e.g. 'instance1' and

'instance2'
#
#  The instance names can then be used in later configuration
#  INSTEAD of the original 'name'.  See the 'radutmp'

configuration
#  below for an example.
#


# PAP module to authenticate users based on their stored password
#
#  Supports multiple encryption schemes
#  clear: Clear text
#  crypt: Unix crypt
#    md5: MD5 ecnryption
#   sha1: SHA1 encryption.
#  DEFAULT: crypt
pap {

encryption_scheme = crypt
}


# CHAP module
#
#  To authenticate requests containing a CHAP-Password attribute.
#
chap {

authtype = CHAP
}


# Pluggable Authentication Modules
#
#  For Linux, see:
#       http://www.kernel.org/pub/linux/libs/pam/index.html
#
#  WARNING: On many systems, the system PAM libraries have
#           memory leaks!  We STRONGLY SUGGEST that you do not
#           use PAM for authentication, due to those memory leaks.
#
pam {

#
#  The name to use for PAM authentication.
#  PAM looks in /etc/pam.d/${pam_auth_name}

#  for it's configuration.  See 'redhat/radiusd-pam'
#  for a sample PAM configuration file.
#
#  Note that any Pam-Auth attribute set in the 'authorize'
#  section will over-ride this one.
#
pam_auth = radiusd

}

# Unix /etc/passwd style authentication
#
unix {

#
#  Cache /etc/passwd, /etc/shadow, and /etc/group
#
#  The default is to NOT cache them.
#
#  For FreeBSD and NetBSD, you do NOT want to enable
#  the cache, as it's password lookups are done via a
#  database, so set this value to 'no'.
#
#  Some systems (e.g. RedHat Linux with pam_pwbd) can
#  take *seconds* to check a password, when th passwd
#  file containing 1000's of entries.  For those systems,
#  you should set the cache value to 'yes', and set
#  the locations of the 'passwd', 'shadow', and 'group'
#  files, below.
#
# allowed values: {no, yes}
cache = no


# Reload the cache every 600 seconds (10mins). 0 to
disable.

cache_reload = 600

#
#  Define the locations of the normal passwd, shadow, and
#  group files.
#
#  'shadow' is commented out by default, because not all
#  systems have shadow passwords.
#
#  To force the module to use the system password

functions,
#  instead of reading the files, leave the following

entries
#  commented out.
#
#  This is required for some systems, like FreeBSD,
#  and Mac OSX.
#
#       passwd = /etc/passwd
#       shadow = /etc/shadow
#       group = /etc/group


#
#  The location of the "wtmp" file.
#  This should be moved to it's own module soon.
#
#  The only use for 'radlast'.  If you don't use
#  'radlast', then you can comment out this item.
#
radwtmp = ${logdir}/radwtmp

}

#  Extensible Authentication Protocol
#
#  For all EAP related authentications.
#  Now in another file, because it is very large.
#

$INCLUDE ${confdir}/eap.conf

# Microsoft CHAP authentication
#
#  This module supports MS-CHAP and MS-CHAPv2 authentication.
#  It also enforces the SMB-Account-Ctrl attribute.
#
mschap {

#
#  As of 0.9, the mschap module does NOT support
#  reading from /etc/smbpasswd.
#
#  If you are using /etc/smbpasswd, see the 'passwd'
#  module for an example of how to use /etc/smbpasswd


# authtype value, if present, will be used
# to overwrite (or add) Auth-Type during
# authorization. Normally should be MS-CHAP
authtype = MS-CHAP


# if use_mppe is not set to no mschap will
# add MS-CHAP-MPPE-Keys for MS-CHAPv1 and
# MS-MPPE-Recv-Key/MS-MPPE-Send-Key for MS-CHAPv2
#
use_mppe = no


# if mppe is enabled require_encryption makes
# encryption moderate
#
require_encryption = yes


# require_strong always requires 128 bit key
# encryption
#
require_strong = yes


# Windows sends us a username in the form of
# DOMAIN\user, but sends the challenge response
# based on only the user portion.  This hack
# corrects for that incorrect behavior.
#
#with_ntdomain_hack = no


# The module can perform authentication itself, OR
# use a Windows Domain Controller.  This configuration
# directive tells the module to call the ntlm_auth
# program, which will do the authentication, and return
# the NT-Key.  Note that you MUST have "winbindd" and
# "nmbd" running on the local machine for ntlm_auth
# to work.  See the ntlm_auth program documentation
# for details.
#
# Be VERY careful when editing the following line!
#
#ntlm_auth = "/path/to/ntlm_auth --request-nt-key

--username=%{Stripped-User-Name:-%{User-Name:-None}}
--challenge=%{mschap:Challenge:-00}
--nt-response=%{mschap:NT-Response:-00}"

}



#  Authentication.
#
#
#  This section lists which modules are available for authentication.
#  Note that it does NOT mean 'try each module in order'.  It means
#  that a module from the 'authorize' section adds a configuration
#  attribute 'Auth-Type := FOO'.  That authentication type is then
#  used to pick the apropriate module from the list below.
#

#  In general, you SHOULD NOT set the Auth-Type attribute.  The server
#  will figure it out on its own, and will do the right thing.  The
#  most common side effect of erroneously setting the Auth-Type
#  attribute is that one authentication method will work, but the
#  others will not.
#
#  The common reasons to set the Auth-Type attribute by hand
#  is to either forcibly reject the user, or forcibly accept him.
#
authenticate {

#
#  PAP authentication, when a back-end database listed
#  in the 'authorize' section supplies a password.  The
#  password can be clear-text, or encrypted.
Auth-Type PAP {

pap
}


#
#  Most people want CHAP authentication
#  A back-end database listed in the 'authorize' section
#  MUST supply a CLEAR TEXT password.  Encrypted passwords
#  won't work.
Auth-Type CHAP {

chap
}


#
#  MSCHAP authentication.
Auth-Type MS-CHAP {

mschap
}


#
#  If you have a Cisco SIP server authenticating against
#  FreeRADIUS, uncomment the following line, and the 'digest'
#  line in the 'authorize' section.

#       digest

#
#  Pluggable Authentication Modules.

#       pam

#
#  See 'man getpwent' for information on how the 'unix'
#  module checks the users password.  Note that packets
#  containing CHAP-Password attributes CANNOT be authenticated
#  against /etc/passwd!  See the FAQ for details.
#
unix


# Uncomment it if you want to use ldap for authentication
#
# Note that this means "check plain-text password against
# the ldap database", which means that EAP won't work,
# as it does not supply a plain-text password.

#       Auth-Type LDAP {
#               ldap
#       }

#
#  Allow EAP authentication.
eap

}


Reply via email to