Well I'll be a son of a gun :-) It worked! Awesome, thanks a ton, ok now to see if I can make my silly switch work with this authentication! Alan, if you're reading this you should add the inner-tunnel addition to the how to.
Now I just have to figure out the authorization piece of the puzzle and I'll be golden. Thanks Listening on authentication address * port 1812 Listening on accounting address * port 1813 Listening on command file /var/run/radiusd/radiusd.sock Listening on proxy address * port 1814 Ready to process requests. rad_recv: Access-Request packet from host 127.0.0.1 port 53912, id=223, length=57 User-Name = "rtest" User-Password = "SEKRAT" NAS-IP-Address = 127.0.0.1 NAS-Port = 0 +- entering group authorize {...} ++[preprocess] returns ok ++[chap] returns noop ++[mschap] returns noop [suffix] No '@' in User-Name = "rtest", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop [eap] No EAP-Message, not doing EAP ++[eap] returns noop ++[unix] returns notfound [files] users: Matched entry rtest at line 1 ++[files] returns ok ++[expiration] returns noop ++[logintime] returns noop [pap] WARNING! No "known good" password found for the user. Authentication may fail because of this. ++[pap] returns noop Found Auth-Type = ntlm_auth +- entering group authenticate {...} [ntlm_auth] expand: --username=%{mschap:User-Name} -> --username=rtest [ntlm_auth] expand: --password=%{User-Password} -> --password=SEKRAT Exec-Program output: NT_STATUS_OK: Success (0x0) Exec-Program-Wait: plaintext: NT_STATUS_OK: Success (0x0) Exec-Program: returned: 0 ++[ntlm_auth] returns ok +- entering group post-auth {...} ++[exec] returns noop Sending Access-Accept of id 223 to 127.0.0.1 port 53912 Finished request 0. Going to the next request Waking up in 4.9 seconds. Cleaning up request 0 ID 223 with timestamp +19 Ready to process requests. > -----Original Message----- > From: > [EMAIL PROTECTED] > .org > [mailto:[EMAIL PROTECTED] > eeradius.org] On Behalf Of [EMAIL PROTECTED] > Sent: Thursday, December 04, 2008 10:35 AM > To: FreeRadius users mailing list > Subject: RE: Beating a dead horse, or freeradius 2.1.1 and > active directory > > >Here is the first line in the users file > > > >(quotes removed) > >rtest Auth-Type := ntlm_auth > > > >And here is the error that generates: > > > >/etc/raddb/users[1]: Parse error (check) for entry rtest: > Unknown value > >ntlm_auth for attribute Auth-Type Errors reading /etc/raddb/users > >/etc/raddb/modules/files[7]: Instantiation failed for module "files" > >/etc/raddb/sites-enabled/inner-tunnel[110]: Failed to find > module "files". > >/etc/raddb/sites-enabled/inner-tunnel[34]: Errors parsing > authorize section. > > } > >} > >Errors initializing modules > > > > OK. Howto needs updating. Freeradius in default configuration > has default and inner-tunnel virtual servers. You should add > ntlm_auth to authenticate section of both (not just default > as in howto). This issue is probably going to be resolved > with virtual server specific users file but at present if > Auth-Type is listed in users file it has to exist in all > enabled virtual servers. > > So, add ntlm_auth to authenticate section of inner-tunnel > virtual server and leave user entry without quotes. > > Ivan Kalik > Kalik Informatika ISP > > Ivan Kalik > Kalik Informatika ISP > > - > List info/subscribe/unsubscribe? See > http://www.freeradius.org/list/users.html > - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html