Hi Hollman,

I too have failed to grasp the nuances of the 'new' exec mechanisms. In the end I admitted defeat, and stuck to the 'old way' - which I fear may become deprecated at some point. In any case, here is what I have done and have working at this point.

1. Restore all the config files to their state before your exec modifications.

2. In the ..../raddb/users file, add an entry similar to the following..

       DEFAULT Auth-Type := Accept
Exec-Program-Wait = "/usr/local/sbin/auth -L -X -U -- %{User-Name} %{User-Password} %{%{Called-Station-Id}:-Missing} %{%{NAS-IP-Address}:-Missing} %{%{Calling-Station-Id}:-Missing} %{%{NAS-Port-Type}:-Missing} %{Vendor-Specific}" ,
           Fall-Through = no

3. My program (auth) required some command line parameters (for legacy reasons). Radius dictionary name/value pairs are (should be) stored in the environment. Environment variables are radius dictionary names converted to upper case only and all '-' changed to '_' characters.

4. The auth program in my case is responsible for returning (on stdout) all the replay Name/Value pairs. These need to be 'comma separated. Beware <cr> characters and magically appearing commas. My code has the following comment/warning ,

 "/* Need comma separated for freeradisu 2.1.8 */
/* EXCEPT for first value pair - freeradius adds it's own comma there for some reason..."

A trailing comma seems to be harmless at this point. I THINK multiple comma MAY also be harmless at this point.

If your reply value pairs are constant, you should be able to add them on the last line before the "Fall-Through = no" entry. Your auth program should return 0 for successful authentication, I return 255 for deny of login. (Perhaps any non 0 would work. Cannot recall.)


I would LOVE to understand the NEW and more correct way of achieving the same result.

If you figure it out, please let me know how to do it.

Good Luck,
-craig

----- Original Message ----- From: "hollman.diaz" <hollman.d...@gmail.com>
To: <freeradius-users@lists.freeradius.org>
Sent: Sunday, January 30, 2011 8:50 PM
Subject: Exec Module FreeRADIUS Version 2.1.8



Hi everybody

I'm trying to change the Auth-Type attribute with an external application.
I'm using FreeRADIUS Version 2.1.8 and Ubuntu 10.04

What files do I should modify?
I have tried with:

/etc/freeradius/radiusd.conf:
...
instantiate {
#
#  Allows the execution of external scripts.
#  The entire command line (and output) must fit into 253 bytes.
#
#  e.g. Framed-Pool = `%{exec:/bin/echo foo}`
exec ven{
wait = yes
               program = "/etc/disconnect/php return.php
%{Calling-Station-Id}"
input_pairs = request
               output_pairs = reply
               shell_escape = yes
}

/etc/freeradius/sites-enabled/default
post-auth {
...
exec ven{
wait = yes
               program = "/etc/disconnect/php return.php
%{Calling-Station-Id}"
input_pairs = request
               output_pairs = reply
               shell_escape = yes
}

/etc/freeradius/modules/exec
...
#  See also "echo" for more sample configuration.
#
exec ven{
wait = yes
               program = "/etc/disconnect/php return.php
%{Calling-Station-Id}"
input_pairs = request
               output_pairs = reply
               shell_escape = yes
}

And /etc/freeradius/users:
...
DEFAULT        Auth-Type := '%{exec:/etc/disconnect/php return.php
%{Calling-Station-Id}}'
                     Fall-Through = No

External application is /etc/disconnect/return.php and it returns Accept or
Reject values.

I have read several forums but I do not understand the procedure. I would
appreciate a step by step procedure :)


Running freeradius -X, I get (with no modifications in
/etc/freeradius/users):
...
Module: Checking session {...} for more modules to load
Module: Checking post-proxy {...} for more modules to load
Module: Checking post-auth {...} for more modules to load
/etc/freeradius/sites-enabled/default[464]: Failed to find module "exec".
/etc/freeradius/sites-enabled/default[435]: Errors parsing post-auth
section.

Line 464 is
exec ven{

and line 435 is
post-auth {

Thanks in advance,

Hollman Diaz
--
View this message in context: http://freeradius.1045715.n5.nabble.com/Exec-Module-FreeRADIUS-Version-2-1-8-tp3363953p3363953.html
Sent from the FreeRadius - User mailing list archive at Nabble.com.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

__________ Information from ESET Smart Security, version of virus signature database 5832 (20110130) __________

The message was checked by ESET Smart Security.

http://www.eset.com





__________ Information from ESET Smart Security, version of virus signature 
database 5833 (20110131) __________

The message was checked by ESET Smart Security.

http://www.eset.com



-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to