On 10/26/2011 02:49 PM, freeradius-users-requ...@lists.freeradius.org wrote:
   On Access-Accept, store the unencrypted User-Name in the DB, along
with a Class attribute.  When you receive an accounting packet, look up
the Class attribute to find the unencrypted User-Name.
Thanks

I notice when running in debug mode, I have:

[ttls] Got tunneled request
    User-Name = "testairs...@iconnect.zm"
    User-Password = "airspan"
    FreeRADIUS-Proxied-To = 127.0.0.1
[ttls] Sending tunneled request
    User-Name = "testairs...@iconnect.zm"
    User-Password = "airspan"
    FreeRADIUS-Proxied-To = 127.0.0.1
    Calling-Station-Id = "00-1f-fb-20-7b-0e"
    Service-Type = Framed-User
    NAS-Port-Type = Wireless-802.16
    WiMAX-Release = "1.0"
...
...
...
[sql]     expand: %{User-Name} -> testairs...@iconnect.zm
[sql] sql_set_user escaped user --> 'testairs...@iconnect.zm'

The user is then correctly authenticated and receives the relevant parameters

What attribute contains the unencrypted username, and at which stage of the inner-tunnel session can I retrieve it?



   That's pretty much the only way with WiMAX.

   Alan DeKok
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to