Yeah, I'm not sure I want to use LDAP (clear text) for authentication.  I'm 
starting to think that I can just use md5 passwords in a database or a flat 
file to manage it, there's really not that many "administrative" users for the 
cisco equipment.  It's either that or pony up several thousands for the Cisco 
ACS server...it was worth beating my head against a wall for a few days though 
:-)


________________________________


        
        From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Rupert 
Finnigan
        Sent: Wednesday, December 03, 2008 3:03 PM
        To: FreeRadius users mailing list
        Subject: Re: Beating a dead horse, or freeradius 2.1.1 and active 
directory
        
        
        
         
        Following on from this, I've just had a read of my radiusd.conf file. 
I'd start by having a look at the ldap module, specifically around the:
         
                        #  By default, if the packet contains a User-Password,
                        #  and no other module is configured to handle the
                        #  authentication, the LDAP module sets itself to do
                        #  LDAP bind for authentication.
                        #
                        #  THIS WILL ONLY WORK FOR PAP AUTHENTICATION.
        
        bit.. This might provide the answer you're looking for.
         
        Rupes
        
        
        2008/12/3 Rupert Finnigan <[EMAIL PROTECTED]>
        

                 
                Well, yes - it does proxy them fine.. But is the request from 
the switch a MS-CHAP one? I don't think it is..
                 
                The switch will be sending a PAP request, not a MS-CHAP one, 
and so you'll need to configure FreeRADIUS to take the PAP request and auth 
that against AD. As the switch isn't sending a MS-CHAP request then FreeRADIUS 
can't process it as such, and so MS-CHAP module returns noop. Unfortunately, 
I'm not clued up enough on FreeRADIUS to help you with this config, but in 
essence this is what I think you need to do to achieve your goal.
                
                2008/12/3 Ben Little <[EMAIL PROTECTED]>
                

                        yeah I'm trying to authenticate and authorize 
administrative tty session to the cisco equipment itself, not 802.1x for 
clients on the network.  If it's not possible I guess it's not possible.  It 
does kind of make me wonder how the Cisco ACS works though because that 
'proxies' radius or tacacs+ authen and author requests to active directory 
quite nicely.
                        

________________________________

                        

                                

                                From: 
freeradius-users-bounces+blittle=skylight.com <http://skylight.com/> 
@lists.freeradius.org <http://lists.freeradius.org/>  
[mailto:freeradius-users-bounces+blittle 
<mailto:freeradius-users-bounces%2Bblittle> =skylight.com 
<http://skylight.com/> @lists.freeradius.org <http://lists.freeradius.org/> ] 
On Behalf Of Rupert Finnigan
                                Sent: Wednesday, December 03, 2008 2:04 PM
                                To: FreeRadius users mailing list
                                Subject: Re: Beating a dead horse, or 
freeradius 2.1.1 and active directory
                                
                                
                                Hi,
                                 
                                I'm not sure if what you're doing is going to 
work.. You're trying to use MS-CHAP to handle terminal session logins, I 
think.. Most of the MS-CHAP advise given so far is to get EAP working from a 
client, say a XP laptop doing 802.1X to gain access to a switchport.
                                 
                                Someone will definitely correct me if I'm 
wrong, but I thought you could only do PAP (or CHAP???) for Authentication to a 
Terminal line. In which case, you either have to use the plain old users file, 
use a database such as mysql, or (probably a better solution) use the LDAP 
module to bind to the AD with the supplied username and password, and allow 
access if successful.
                                 
                                Like I say - I'm really unsure on this one, but 
as no-ones replied for a while I though it might help...
                                 
                                Thanks,
                                 
                                Rupes
                                
                                
                                2008/12/3 Ben Little <[EMAIL PROTECTED]>
                                


                                        PAP is working:
                                        
                                        ++[pap] returns updated
                                        Found Auth-Type = PAP
                                        +- entering group PAP {...}
                                        [pap] login attempt with password 
"secretz"
                                        [pap] Using clear text password 
"secretz"
                                        [pap] User authenticated successfully
                                        ++[pap] returns ok
                                        +- entering group post-auth {...}
                                        ++[exec] returns noop
                                        Sending Access-Accept of id 21 to 
*.*.*.* port 1645
                                               Cisco-AVPair = 
"shell:priv-lvl=15"
                                        Finished request 1.
                                        
                                        Going to the next request
                                        
                                        Waking up in 4.9 seconds.
                                        
                                        Cleaning up request 1 ID 21 with 
timestamp +431
                                        Ready to process requests.
                                        
                                        For some reason though, even when 
configured to do so, the authentication attempt coming from a switch or router 
is not being forwarded to the KDC.  I have followed that how-to now to the 
letter and Active Directory is not working, however active directory and krb 
are both working fine on the server;
                                        
                                        [wbinfo -a test%test output]
                                        plaintext password authentication failed
                                        Could not authenticate user test%test 
with plaintext password
                                        challenge/response password 
authentication succeeded
                                        
                                        I'm not sure what I am missing here? 
Why isn't the login attempt on the switch being forwarded to active directory?  
Is there something within the switch that meeds to be set? A radius attribute 
maybe to identify the login attempt as mschap?
                                        

                                        >
                                        > Howto will show you how to set up and 
test with pap first:
                                        >
                                        
                                        
                                        -
                                        List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html
                                        


                                

                                

                                

                                


                        -
                        List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html
                        



-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to