Re: segmentation fault when calling inst->module->sql_error

2002-08-01 Thread CheongMeng

Hi,

found a small bug, which cause segmentation fault, when sql socket not
found for mysql.

the patch is for src/modules/rlm_sql/sql_mysql.c


patch:

--- sql_mysql.c.org Fri Aug  2 14:02:29 2002
+++ sql_mysql.c Fri Aug  2 14:03:41 2002
@@ -288,6 +288,12 @@

*/
 char *sql_error(SQLSOCK * sqlsocket, SQL_CONFIG *config) {
rlm_sql_mysql_sock *mysql_sock = sqlsocket->conn;
+
+   if (mysql_sock == NULL || mysql_sock->sock == NULL) {
+   radlog(L_INFO, "rlm_sql: sql sock null");
+   return NULL;
+   }
+
return mysql_error(mysql_sock->sock);
 }


On Thu, 25 Jul 2002, CheongMeng wrote:

> Date: Thu, 25 Jul 2002 18:00:21 +0800 (SGT)
> From: CheongMeng <[EMAIL PROTECTED]>
> Reply-To: [EMAIL PROTECTED]
> To: [EMAIL PROTECTED]
> Subject: segmentation fault when calling inst->module->sql_error
>
> Hi,
>
> I am using freeradius CVS (25 July) & mysql for accounting.
>
> noticed that radiusd always get segmentation fault when it call the
> function
> (sql_error()) at the rlm_sql.c, eg:
>
> if (rlm_sql_query(sqlsocket, inst, querystr)) {
> radlog(L_ERR, "rlm_sql: Couldn't
> update SQL accounting STOP record - %s", (char
> *)(inst->module->sql_error)(sqlsocket, inst->config));
> }
>
> it doesn't happen in the 0.6 release.
>
> just would like to check if this happen also on anyone else on the list.
>
> I will be grateful, if anyone can shed some light :)
> thx in advance.
>
>

-- 
Cheers,
CM.



- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: Strange problem with pam_radius_auth (SOLVED)

2002-08-01 Thread Frank Cusack

On Thu, Aug 01, 2002 at 06:47:10PM +0600, Dr. Muhammad Masroor Ali wrote:
> My problem has been solved by the kind suggestion of Mojahedul Hoque Abul Hasanat
> <[EMAIL PROTECTED]>. Direct quote from his mail.
> 
> 
> 
> This is a bit wild guess, but might help.  Put an "account" line squids
> pam config file with pam_permit.so as the module.  The line will be
> similar to:
> 
> account requiredpam_permit.so
> 
> I have seen some applications that don't seem to need an "account"
> section at first glance.  But they open a pam session requiring an
> account entry.  They do it to impose login time restrictions.
> 
> 
> 
> 
> > Greetings,
> > I have tried both the kind suggestions of Alan DeKok and Frank Cusack
> > without any avail. First of all, the latest version from CVS, did
> > improve the situation. And second, putting daemon.debug in syslog.conf
> > is not generating anything. The relevant lines I used,
> >
> > # Daemon debug messages
> > daemon.debug/usr/local/var/log/deamondebuglog
> >
> > Yes, this file exists (created by touch) and I remembered to restart
> > syslogd.
> >
> > I am really frustrated. Any help will be appreciated.
> >
> > -
> > List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
> 
> --
> Nobody's gonna believe that computers are intelligent until they start
> coming in late and lying about it.
> 
> Dr. Muhammad Masroor Ali
> Associate Professor and Associate Director
> Institute of Information and Communication Technology
> Bangladesh University of Engineering and Technology
> Dhaka-1000, Bangladesh
> 
> Phone: 880 2 966 5650 ext 7245, 7756 (work)
>   ext 7748 or 880 2 966 5700 (residence)
> FAX: 880 2 861 3046, 880 2 861 3026
> 
> 
> 

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: Is it possible to have more than one users list?

2002-08-01 Thread Andrew Tait



It most certainly is.
 
Put something like this in your main users 
file:
 
$INCLUDE /etc/raddb/users.perm$INCLUDE 
/etc/raddb/users.sat
Andrew TaitSystem AdministratorCountry 
NetLink Pty, LtdE-Mail: [EMAIL PROTECTED]WWW: http://www.cnl.com.au30 Bank St Cobram, VIC 
3644, AustraliaPh: +61 (03) 58 711 000Fax: +61 (03) 58 711 
874 "It's the smell! If there is such a thing." Agent Smith - The 
Matrix

  - Original Message - 
  From: 
  Kim 
  
  To: [EMAIL PROTECTED] 
  
  Sent: Friday, August 02, 2002 9:49 
  AM
  Subject: Is it possible to have more than 
  one users list?
  
  Hi,
   
  Im using FreeRADIUS 0.4 and I have one users file 
  and one access deny list. The access deny list contains ID and Phonenumbers 
  extracted from a DB2 database.I need to use this access deny list and make 
  sure that all users on this list can NOT access the Radius 
server.
  The access deny list is dynamic and it 
  changes.
  Does anybody know if this is possible ? 
  Is there some documentation how to use more than one users files ,one 
  users file and one access deny list?
  I would appreciate any help or hint.
   
  Thanks
   
  Kim


Is it possible to have more than one users list?

2002-08-01 Thread Kim



Hi,
 
Im using FreeRADIUS 0.4 and I have one users file 
and one access deny list. The access deny list contains ID and Phonenumbers 
extracted from a DB2 database.I need to use this access deny list and make 
sure that all users on this list can NOT access the Radius server.
The access deny list is dynamic and it 
changes.
Does anybody know if this is possible ? Is 
there some documentation how to use more than one users files ,one users file 
and one access deny list?
I would appreciate any help or hint.
 
Thanks
 
Kim


Re: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Artur Hecker


hi

> I was mistaken, but I was always under the impression that EAP/TLS ||
> EAP/MD5 was something like Cisco's LEAP where Supplicant -> AP
> encryption is possible.  Thanks for clearing that up!  I know understand
> that it's not the same thing :)

i don't know much about leap, but i think that it's actually is. except
that cisco leap is a complete proprietary product, including the user,
the client and server parts. so, basically they could make it using SMTP
and you wouldn't even know. what i want to say, leap kind of combines
different routines needed for authentication and the final key
distribution in an unknown way (at least for me). eap/??? is always only
the authentication part of the whole scenario. additionally, eap/md5 and
eap/tls are in some rfcs during no part of cisco leap is, for as far as
i know. that's for the authentication part. then, for the actual key
distribution, the key distribution pathes in leap and in mppe (which is
also proprietary actually, but they at least have an informational rfc)
are not the same, they say.

what you should finally accept is: the authentication can happen without
key distribution. it's very very dumb to do so; the key should even
depend on the information exchanged securely during the successfull
authentication but there is no magic about it - if there is no provision
for it, it will not happen automatically.


ciao
artur


-- 
Artur Hecker
artur[at]hecker.info

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



RE: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Jason Lixfeld

I was mistaken, but I was always under the impression that EAP/TLS ||
EAP/MD5 was something like Cisco's LEAP where Supplicant -> AP
encryption is possible.  Thanks for clearing that up!  I know understand
that it's not the same thing :)

Thanks for your replies, and again thanks for the great How-To.

> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED]] On Behalf Of 
> Artur Hecker
> Sent: Thursday, August 01, 2002 4:23 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Howto on EAP/MD5 with Windows XP
> 
> 
> Hello :-)
> 
> 
> 
> > Yes, I understand that TLS negotiates WEP keys dynamically 
> based on the
> > certificate information shared between the AAA server and the
> > supplicant.  I don't think I explained myself well enough 
> in my first
> > reply, as my terminology is lacking due to the fact that I am not
> > extreamely familiar with all of this quite yet.  Basically, I was
> > wondering if the EAP/MD5 combination does infact encrypt the data
> > between the client and AP, period.  Correct me if I am 
> wrong, but this
> 
> Look, that's exactly what I tried to explain below: EAP/MD5 does not
> encrypt anything on the air interface. Nor does TLS. Those are two
> authentication methods which happen between the USER and the 
> SERVER. The
> air encryption is between AP and USER, ok? :-)
> 
> 
> > method encrypts a preshared WEP key shared between the 
> supplicant and
> > the AP using MD5?  That same MD5 challenge is used to 
> encrypt the data
> > between the AP and the supplicant?  If yes, I know it's not 
> as secure as
> > negotiated dynamic keys but none the less, it's encryption 
> of some sort,
> > which is better than just a wep key and unencrypted data between
> > supplicant and AP.
> 
> Ahem, no, no, no and once more: NO. You can define static WEP keys but
> that has nothing to do with EAP/MD5. It's a basic misunderstanding,
> that's why I tried to explain it below. Please, read it. Everything
> what's WEP begins AFTER the EAP/MD5 has successfully 
> finished. Otherwise
> it doesn't happen at all. That's the sense of the port control (which
> EAP/MD5 is part of).
> 
> 
> > Your explaination below is a little over my head, so please 
> forgive me
> > if I've asked a question or made an assumption which is 
> contrary to the
> > explaination you gave below in the first place :)
> 
> Shake it and try to reread it, I think it's comprehensive. 
> But make your
> head free of wrong assumptions about the WEP keys and the EAP
> authentication.
> 
> You are confusing the SKA (WEP secret based network 
> authentication) with
> EAP/MD5. SKA would represent a very similiar exchange to EAP/MD5 but
> it's completely different in terms of protocol, used cryptographic
> bricks (RC4 in WEP and MD5 in EAP/MD5) and where it takes 
> place. And: it
> is not secure at all since WEP has a lot of security flaws with
> available tools to use those.
> 
> 
> Regards,
> 
> artur
> 
> 
> -- 
> Artur Hecker
> artur[at]hecker.info
> 
> - 
> List info/subscribe/unsubscribe? See 
> http://www.freeradius.org/list/users.html
> 



- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Artur Hecker

Hello :-)



> Yes, I understand that TLS negotiates WEP keys dynamically based on the
> certificate information shared between the AAA server and the
> supplicant.  I don't think I explained myself well enough in my first
> reply, as my terminology is lacking due to the fact that I am not
> extreamely familiar with all of this quite yet.  Basically, I was
> wondering if the EAP/MD5 combination does infact encrypt the data
> between the client and AP, period.  Correct me if I am wrong, but this

Look, that's exactly what I tried to explain below: EAP/MD5 does not
encrypt anything on the air interface. Nor does TLS. Those are two
authentication methods which happen between the USER and the SERVER. The
air encryption is between AP and USER, ok? :-)


> method encrypts a preshared WEP key shared between the supplicant and
> the AP using MD5?  That same MD5 challenge is used to encrypt the data
> between the AP and the supplicant?  If yes, I know it's not as secure as
> negotiated dynamic keys but none the less, it's encryption of some sort,
> which is better than just a wep key and unencrypted data between
> supplicant and AP.

Ahem, no, no, no and once more: NO. You can define static WEP keys but
that has nothing to do with EAP/MD5. It's a basic misunderstanding,
that's why I tried to explain it below. Please, read it. Everything
what's WEP begins AFTER the EAP/MD5 has successfully finished. Otherwise
it doesn't happen at all. That's the sense of the port control (which
EAP/MD5 is part of).


> Your explaination below is a little over my head, so please forgive me
> if I've asked a question or made an assumption which is contrary to the
> explaination you gave below in the first place :)

Shake it and try to reread it, I think it's comprehensive. But make your
head free of wrong assumptions about the WEP keys and the EAP
authentication.

You are confusing the SKA (WEP secret based network authentication) with
EAP/MD5. SKA would represent a very similiar exchange to EAP/MD5 but
it's completely different in terms of protocol, used cryptographic
bricks (RC4 in WEP and MD5 in EAP/MD5) and where it takes place. And: it
is not secure at all since WEP has a lot of security flaws with
available tools to use those.


Regards,

artur


-- 
Artur Hecker
artur[at]hecker.info

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



RE: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Jason Lixfeld

> > How does EAP/MD5 compare with EAP/TLS in regards to data 
> encryption over the air between the 
> > Client and the AP?  Is it the
> > same, just using a different mechanism to do the encryption 
> (MD5 challenge, verses a 
> > Certificate)?
> 
> Short answer: 
> 
> NO, it's not the same! EAP/TLS can negotiate dynamic WEP-keys which
> EAP/MD5 simply *can't*. FreeRADIUS now begins to support this dynamic
> WEP keys using Henrik and Lars patch and thanks to the recent changes.
> This patch is/will be integrated into 0.7.

Yes, I understand that TLS negotiates WEP keys dynamically based on the
certificate information shared between the AAA server and the
supplicant.  I don't think I explained myself well enough in my first
reply, as my terminology is lacking due to the fact that I am not
extreamely familiar with all of this quite yet.  Basically, I was
wondering if the EAP/MD5 combination does infact encrypt the data
between the client and AP, period.  Correct me if I am wrong, but this
method encrypts a preshared WEP key shared between the supplicant and
the AP using MD5?  That same MD5 challenge is used to encrypt the data
between the AP and the supplicant?  If yes, I know it's not as secure as
negotiated dynamic keys but none the less, it's encryption of some sort,
which is better than just a wep key and unencrypted data between
supplicant and AP.

Your explaination below is a little over my head, so please forgive me
if I've asked a question or made an assumption which is contrary to the
explaination you gave below in the first place :)

> 
> Explanation;
> 
> Every EAP mechanism being part of 802.1x basically defines the
> authentication scheme. So, neither of both has a direct regard to the
> air encryption, i.e. the RFCs of both specification do not talk about
> the used WEP encryption and WEP keys. The problem generally 
> is that from
> the point of view of the supplicant (user) the 
> EAP-communication ends at
> the server during the WEP encryption takes place between the 
> supplicant
> and the AP. According to the idea of 802.1x the AP will not 
> participate
> at the whichever EAP conversation. (It even couldn't in the 
> case of TLS,
> that's the sense of TLS). So, what to do?
> 
> However, EAP/TLS has a great advantage over EAP/MD5 because it
> negotiates the master keys (every TLS does). EAP/MD5 can't negotiate
> anything, it only verifies the identity with a rather weak method,
> cryptoanalitically spoken and compared to the PK-based TLS.
> 
> Anyway, some negotiated key material is available at the supplicant
> (user) and the authentication server after the TLS exchange. This
> material could be used to derive some other keys, which could then be
> sent to the AP (radius-client) using some (new) attributes. The
> supplicant already has the necessary key material since it 
> participated
> at the TLS exchange.
> 
> This advantage is used by MS and Cicso in their MPPE definition for
> WLANs (s. e.g. RFCs 3078 and 3079 and cisco documentation at
> www.cisco.com). The server adds the MPPE-Send-Key and MPPE-Recv-Key
> attributes, puts in these the derived key material and sends 
> them to the
> client (AP). AP has to understand these attributes. It then 
> derives the
> unicast and broadcast keys, encrypts them with the negotiated key and
> sends those in the EAPOL-Key message to the user. The user 
> uses its own
> key to decrypt the received EAPOL keys. These keys are setup 
> as dynamic
> WEP keys on the user side and at by the AP. An exact 
> description of the
> exchange is being prepared for as far as I know. Ask Raghu or 
> Henrik in
> case of doubt (or look in the RFCs :-))
> 
> The patch provided by Henrik and Lars adds the MPPE attributes to the
> server Accept message. There are people reporting that it works. In my
> case, with a Cicso AP340 I currently fail to activate it correctly:
> setting up dynamic WEP results in a communication breakdown. I'm
> currently on it, I hope the guys will help me ;-)
> 
> 
> That's it.
> 
> Artur
> 
> 
> 
> -- 
> Artur Hecker
> artur[at]hecker.info
> 
> - 
> List info/subscribe/unsubscribe? See 
> http://www.freeradius.org/list/users.html
> 



- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Alan DeKok

Artur Hecker <[EMAIL PROTECTED]> wrote:
> how can i supply the changes? i mail the new version to you?

  Sure.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Artur Hecker



>   "Smart" quotes are annoying, so I've deleted them.  Other than that,
> I haven't changed anything other than minor formatting.

i'm sorry, it was originally a word document :-) and ms interpretation
of what is html is really kind of bizar...

how can i supply the changes? i mail the new version to you?



-- 
Artur Hecker
artur[at]hecker.info

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Alan DeKok

Artur Hecker <[EMAIL PROTECTED]> wrote:
> I've written a small html-howto on EAP/MD5 with Windows XP. Raghu
> advised me to send it to the list. So here we go. (Since the file isn't
> big and I don't have a reliable web-server I will attach it to the
> message.)
> 
> Comments are highly appreciated. 

  http://www.freeradius.org/doc/EAP-MD5.html

  "Smart" quotes are annoying, so I've deleted them.  Other than that,
I haven't changed anything other than minor formatting.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Artur Hecker


Hi Pavel


> I'd suggest to add note about the way how WinXP asks about user's
> identification info to the document.

Ok, I'll add some text on it, you are right.


Ciao
artur


-- 
Artur Hecker
artur[at]hecker.info

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Artur Hecker


Hello Jason


> How does EAP/MD5 compare with EAP/TLS in regards to data encryption over the air 
>between the 
> Client and the AP?  Is it the
> same, just using a different mechanism to do the encryption (MD5 challenge, verses a 
> Certificate)?

Short answer: 

NO, it's not the same! EAP/TLS can negotiate dynamic WEP-keys which
EAP/MD5 simply *can't*. FreeRADIUS now begins to support this dynamic
WEP keys using Henrik and Lars patch and thanks to the recent changes.
This patch is/will be integrated into 0.7.


Explanation;

Every EAP mechanism being part of 802.1x basically defines the
authentication scheme. So, neither of both has a direct regard to the
air encryption, i.e. the RFCs of both specification do not talk about
the used WEP encryption and WEP keys. The problem generally is that from
the point of view of the supplicant (user) the EAP-communication ends at
the server during the WEP encryption takes place between the supplicant
and the AP. According to the idea of 802.1x the AP will not participate
at the whichever EAP conversation. (It even couldn't in the case of TLS,
that's the sense of TLS). So, what to do?

However, EAP/TLS has a great advantage over EAP/MD5 because it
negotiates the master keys (every TLS does). EAP/MD5 can't negotiate
anything, it only verifies the identity with a rather weak method,
cryptoanalitically spoken and compared to the PK-based TLS.

Anyway, some negotiated key material is available at the supplicant
(user) and the authentication server after the TLS exchange. This
material could be used to derive some other keys, which could then be
sent to the AP (radius-client) using some (new) attributes. The
supplicant already has the necessary key material since it participated
at the TLS exchange.

This advantage is used by MS and Cicso in their MPPE definition for
WLANs (s. e.g. RFCs 3078 and 3079 and cisco documentation at
www.cisco.com). The server adds the MPPE-Send-Key and MPPE-Recv-Key
attributes, puts in these the derived key material and sends them to the
client (AP). AP has to understand these attributes. It then derives the
unicast and broadcast keys, encrypts them with the negotiated key and
sends those in the EAPOL-Key message to the user. The user uses its own
key to decrypt the received EAPOL keys. These keys are setup as dynamic
WEP keys on the user side and at by the AP. An exact description of the
exchange is being prepared for as far as I know. Ask Raghu or Henrik in
case of doubt (or look in the RFCs :-))

The patch provided by Henrik and Lars adds the MPPE attributes to the
server Accept message. There are people reporting that it works. In my
case, with a Cicso AP340 I currently fail to activate it correctly:
setting up dynamic WEP results in a communication breakdown. I'm
currently on it, I hope the guys will help me ;-)


That's it.

Artur



-- 
Artur Hecker
artur[at]hecker.info

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



RE: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Pavel Baranov
Title: RE: Howto on EAP/MD5 with Windows XP





Here are my comments on the document:


One of the problems I had to make WinXP work with 802.1x was that I didn't pay attention to
the tooltip/bubble which came from the system status bar at the time when WinXP got connected
to Authenticator and which said to click there to enter login info for new connection. If you click
on this bubble you get a dialog box where you enter name, password and domain and that this info
will be sent to radius for authentication. My problem was that I expected Windows to popup dialogs
of such importance without clicking on any bubble/tooltip windows, which usually report about minor
events which happen to your system and I didn't notice this bubble/tooltip window for a while.


I'd suggest to add note about the way how WinXP asks about user's identification info to the document.


Regards,
Pavel




-Original Message-
From: Artur Hecker [mailto:[EMAIL PROTECTED]]
Sent: Thursday, August 01, 2002 10:48 AM
To: List FreeRADIUS
Subject: Howto on EAP/MD5 with Windows XP



Hi all



I've written a small html-howto on EAP/MD5 with Windows XP. Raghu
advised me to send it to the list. So here we go. (Since the file isn't
big and I don't have a reliable web-server I will attach it to the
message.)


Comments are highly appreciated. 


More problems+workarounds and more experiences with other hardware, etc.
can be sent to my email address, I will include those.



Regards,


artur




-- 
Artur Hecker                 Groupe Accès et Mobilité
hecker[at]enst[dot]fr         Département Informatique et Réseaux
+33 1 45 81 7507        46, rue Barrault 75634 Paris cedex 13
http://www.infres.enst.fr                  ENST Paris





RE: Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Jason Lixfeld
Title: Message



This 
is a great How-To!  Thanks Arthur!
 
I have 
a question though.  Not specifically to Arthur, but to anyone who knows the 
answer:
 
How 
does EAP/MD5 compare with EAP/TLS in regards to data encryption over the air 
between the Client and the AP?  Is it the same, just using a different 
mechanism to do the encryption (MD5 challenge, verses a 
Certificate)?

  
  -Original Message-From: 
  [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED]] On Behalf Of Artur 
  HeckerSent: Thursday, August 01, 2002 1:48 PMTo: List 
  FreeRADIUSSubject: Howto on EAP/MD5 with Windows 
  XP
  FreeRADIUS EAP/MD5: Windows XP as supplicant
  Basic understandingEAP/MD5 and other types of EAP authentication are 
  part of „Port based network access control“, as defined in the IEEE 802.1X 
  standard. All you have to know at this time are the three main actors: 
  
AAA server (RADIUS) which will verify user credentials and give commands 
to accept or reject the user login request. 
the network access device (NAS), which will take the EAP-frames out of 
the traffic on one side and translate them into RADIUS-attributes on the 
other and vice versa, thus acting as pass-through device. 
the one to be authenticated, i.e. your Windows/Linux whatever machine 
using the WLAN 
  Server configuration (FreeRADIUS)Assumptions: 
  
You have a server that starts without any errors when doing: ./radiusd –s –x
You have at least one properly configured client which we will call 
access point (ap) from now on. 
You have at least one configured user and your radtest user password 10 secretworks from a test 
host (e.g. localhost), i.e. you receive an Accept message from your 
server.Please take a look at the provided configuration files in 
  order to accomplish the setup so far. It’s really not difficult to have the 
  system configured this way by just correcting the supplied configuration 
  files. The files concerned here are in the etcdirectory of your 
  FreeRADIUS server: 
  
users 
clients.conf 
radiusd.conf User configuration 
  (users): 
  Alter the existent user or add another one which will be used for test 
  purposes. The simplest possible configurations are given in the examples. More 
  complicated configurations are out of the scope of this document. 
  Examples: Auth-Type := System, User-Password = “Hello”or Auth-Type := Local, User-Password = “Hello”Please note the ":=" 
  operator. "=" instead will not work. 
  Sections (radiusd.conf): 
  The interesting part here are authorize AND authenticate 
  sections. (At the very bottom of the file.) Ignore all the following as those 
  will deal with the accounting. authorize {

  preprocess

  files

  eap

}

authenticate {

  eap

}Finally, the EAP module itself has to be configured this way: eap {

  md5 {

  }

}That’s it for FreeRADIUS 
  Client configurationFirst of all: please read the documentation of 
  your client. There are a plenty of different clients on the market, we can’t 
  provide any help for them. Basically, you have to activate „Network port based 
  802.1X authentication“, sometimes called „Network EAP“ (Cisco) or similiar. 
  Please see the Technical Documentation of your AP. Then, of course, you have 
  to find the „Authentication Server“ configuration part and supply the data 
  about the used RADIUS server, i.e. it’s IP-address, UDP-port and the 
  pre-shared secret (the same one you configured for your access point – client 
  – in the FreeRADIUS configuration files). Sometimes you can 
  supply a bunch of those servers and sometimes you can use them for other 
  purposes, too, like e.g. MAC-based access control. You only have to activate 
  the EAP-Authentication. 
  Please note: you can perfectly use EAP-authentication without using WEP or 
  providing whichever keys in the AP. Do it so for the test purposes. Once 
  you’ve got it running, you can setup your WEP keys, whatever. That will allow 
  you to analyze traffic if something goes wrong. 
  For Cisco AP340 it would look like following: 
  [PICTURE] 
  Deactivate older authentication types (Open, Shared, CHAP, PAP, whatever) 
  to prevent misunderstanding during the test. 
  User configurationWindows XP 
  Go to the Network Connections window. Right-click the connection 
  corresponding to the adapter which is going to use EAP authentication. Go to 
  the "Authentication" tab. If it doesn’t appear (yes, it’s weird sometimes) try 
  to unplug and plug your adapter till it does (PCMCIA...) Otherwise, download 
  the software for the adapter configuration like e.g. ACU for the Cisco 
  adapters and try to de- and reactivate the card. 
  In the Authentication dialog, assure the box „Use IEEE802.1X network 
  authentication“ is checked. Set your EAP type there (EAP/MD5 Challenge). 
  That’s all. Now deactivate and reactivate your LAN-connection on this 
  adapter and it should work. 
  Troubleshoot

Howto on EAP/MD5 with Windows XP

2002-08-01 Thread Artur Hecker

Hi all


I've written a small html-howto on EAP/MD5 with Windows XP. Raghu
advised me to send it to the list. So here we go. (Since the file isn't
big and I don't have a reliable web-server I will attach it to the
message.)

Comments are highly appreciated. 

More problems+workarounds and more experiences with other hardware, etc.
can be sent to my email address, I will include those.


Regards,

artur



-- 
Artur Hecker Groupe Accès et Mobilité
hecker[at]enst[dot]fr Département Informatique et Réseaux
+33 1 45 81 750746, rue Barrault 75634 Paris cedex 13
http://www.infres.enst.fr  ENST Paris
Title: WinXP - FreeRADIUS: EAP/MD5 HowTo






FreeRADIUS EAP/MD5: Windows XP as supplicant


Basic understanding
EAP/MD5 and other types of EAP authentication are part of „Port based network
access control“, as defined in the IEEE 802.1X standard. All you have to
know at this time are the three main actors:


AAA server (RADIUS) which will verify user credentials and give commands
to accept or reject the user login request.


the network access device (NAS), which will take the EAP-frames out of
the traffic on one side and translate them into RADIUS-attributes on the
other and vice versa, thus acting as pass-through device.


the one to be authenticated, i.e. your Windows/Linux whatever machine using
the WLAN



Server configuration (FreeRADIUS)
Assumptions:


You have a server that starts without any errors when doing:

./radiusd –s –x


You have at least one properly configured client which we will call access
point (ap) from now on.


You have at least one configured user and your

radtest user password 10 secret
works from a test host (e.g. localhost), i.e. you receive an Accept
message from your server.
Please take a look at the provided configuration files in order to accomplish
the setup so far. It’s really not difficult to have the system configured
this way by just correcting the supplied configuration files. The files
concerned here are in the etcdirectory of your FreeRADIUS
server:


users


clients.conf


radiusd.conf

User configuration (users):
Alter the existent user or add another one which will be used for test
purposes. The simplest possible configurations are given in the examples.
More complicated configurations are out of the scope of this document.
Examples:
Auth-Type := System, User-Password = “Hello”
or
Auth-Type := Local, User-Password = “Hello”
Please note the ":=" operator. "=" instead will not work.
Sections (radiusd.conf):
The interesting part here are authorize AND authenticate
sections. (At the very bottom of the file.) Ignore all the following as
those will deal with the accounting.
authorize {

  preprocess

  files

  eap

}

authenticate {

  eap

}
Finally, the EAP module itself has to be configured this way:
eap {

  md5 {

  }

}
That’s it for FreeRADIUS

Client configuration
First of all: please read the documentation of your client. There are a
plenty of different clients on the market, we can’t provide any help for
them. Basically, you have to activate „Network port based 802.1X authentication“,
sometimes called „Network EAP“ (Cisco) or similiar. Please see the Technical
Documentation of your AP. Then, of course, you have to find the „Authentication
Server“ configuration part and supply the data about the used RADIUS server,
i.e. it’s IP-address, UDP-port and the pre-shared secret (the same one
you configured for your access point – client – in the FreeRADIUS
configuration files). Sometimes you can supply a bunch of those servers
and sometimes you can use them for other purposes, too, like e.g. MAC-based
access control. You only have to activate the EAP-Authentication.
Please note: you can perfectly use EAP-authentication without using
WEP or providing whichever keys in the AP. Do it so for the test purposes.
Once you’ve got it running, you can setup your WEP keys, whatever. That
will allow you to analyze traffic if something goes wrong.
For Cisco AP340 it would look like following:
[PICTURE]
Deactivate older authentication types (Open, Shared, CHAP, PAP, whatever)
to prevent misunderstanding during the test.

User configuration
Windows XP
Go to the Network Connections window. Right-click the connection corresponding
to the adapter which is going to use EAP authentication. Go to the "Authentication"
tab. If it doesn’t appear (yes, it’s weird sometimes) try to unplug and
plug your adapter till it does (PCMCIA...) Otherwise, download the software
for the adapter configuration like e.g. ACU for the Cisco adapters and
try to de- and reactivate the card.
In the Authentication dialog, assure the box „Use IEEE802.1X network
authentication“ is checked. Set your EAP type there (EAP/MD5 Challenge).
That’s all. Now deactivate and reactivate your LAN-connection on this
adapter and it should work.


Troubleshooting

Problems:



Problem 1:
Your AP keeps on saying „Unknown
E

No detail file generated in mod_radius_auth

2002-08-01 Thread Dr. Muhammad Masroor Ali

Hello all,
After some grueling days and kind advice from fellow netizens,
mod_radius_auth does perfect authentication for squid
(2.4.STABLE1) in my RH 7.3 linux box. However, no accounting
records are being written. That is,
/usr/local/var/log/radius/radacct/ is completely empty. My pam.d
file for squid is,

#
authrequired  /lib/security/pam_securetty.so
sessionrequired/lib/security/pam_radius_auth.so debug

accountrequired/lib/security/pam_radius_auth.so debug

authrequired/lib/security/pam_radius_auth.so


Nothing is being said in /var/log/messages or daemon.debug file.

What is I could be missing?


--
Nobody's gonna believe that computers are intelligent until they start
coming in late and lying about it.

Dr. Muhammad Masroor Ali
Associate Professor and Associate Director
Institute of Information and Communication Technology
Bangladesh University of Engineering and Technology
Dhaka-1000, Bangladesh

Phone: 880 2 966 5650 ext 7245, 7756 (work)
  ext 7748 or 880 2 966 5700 (residence)
FAX: 880 2 861 3046, 880 2 861 3026




- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: Freeradius and RPM Spec File

2002-08-01 Thread Shawn O'Shea


I'm working on a FreeRADIUS rpm that I've built from scratch. I was
waiting for 0.7 (and returning from vacation, which I have) before letting
people at it. I just tried building it, but there seems to be enough
differences that I need to sit down and see what has changed (looks mainly
like a libradius was added for my old SPEC file to work out of the box).

I'll probably have something for the general public early next week.

-Shawn

On Thu, 1 Aug 2002, Sheldon Fougere wrote:

> Hi,
>
> I'm new to radius and I've been experimenting with Freeradius.  I started at
> version 0.6.  In that version in the redhat directory there was a
> freeradius.spec file that I used to build an RPM of freeradius.  This worked
> fine.  When 0.7 came out I tried the same thing.  I did notice the spec file
> was still for version 0.6 so I changed the spec file version to 0.7 but this
> failed.  The RPM didn't build.  During the build process I noticed errors
> stating that files weren't found.
>
> Is there a freeradius.spec file available for version 0.7?
>
> Thanks,
> Sheldon
>
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
>


Shawn K. O'Shea
Sr. Unix Administrator
DSL.net, Inc.


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Freeradius and RPM Spec File

2002-08-01 Thread Sheldon Fougere

Hi,

I'm new to radius and I've been experimenting with Freeradius.  I started at
version 0.6.  In that version in the redhat directory there was a
freeradius.spec file that I used to build an RPM of freeradius.  This worked
fine.  When 0.7 came out I tried the same thing.  I did notice the spec file
was still for version 0.6 so I changed the spec file version to 0.7 but this
failed.  The RPM didn't build.  During the build process I noticed errors
stating that files weren't found.

Is there a freeradius.spec file available for version 0.7?

Thanks,
Sheldon


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Re: realmpercent & suffix

2002-08-01 Thread Alan DeKok

Vects <[EMAIL PROTECTED]> wrote:
> Could you help me with configuration of the freeradius 0.7 ?
> I want to use '@' and '%' as delimiter for realms. I added  realmpercent
> before suffix in authorisation but it's not working properly.

  It's also telling you what it's doing.  Read the messages you posted
to the list.

>   modcall[authorize]: module "preprocess" returns ok
> rlm_realm: Looking up realm NULL for User-Name = "user@"
> rlm_realm: Found realm NULL
> rlm_realm: Adding Stripped-User-Name = "user@"
>   rlm_realm: Proxying request from user user@ to realm NULL
> rlm_realm: Adding Realm = "NULL"
> rlm_realm:  Authentication realm is LOCAL.
> rlm_realm:  auth_port is not set.  proxy cancelled

  You've got a NULL realm set up, which is a catch-all for user names
not matching any other realm.

  There's no '%' in 'user@', so the 'realmpercent' configuration
says it must be a local realm.

  Then, the 'suffix' realm doesn't even look for the '@', because the
request is already marked up as being a LOCAL realm.

  The error messages you posted pretty much describe what's happening.


  A solution would be to remove the NULL realm, or to use a different
method for discovering realms.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



RE: RADIUS book from O'Reilly

2002-08-01 Thread Jonathan Hassell
Title: Message



Hi, 
Doug - you're right.  It goes into final proofing next Wednesday, and from 
there it goes directly to the printer.  I am skeptical that it will be 
October: I still believe mid-September is a more accurate 
estimation.
 
Jon

  
  -Original Message-From: De Yong, Doug 
  [mailto:[EMAIL PROTECTED]] Sent: Thursday, August 01, 2002 
  10:56 AMTo: [EMAIL PROTECTED]Subject: 
  RE: RADIUS book from O'Reilly
  well it seems you might have to wait for the O'Reilly 
  book 
  hey I've been to Rush../doug 
  Doug De Yong, CISSP, ESSE#1, SSE, CCSE Sr. Sales & Security Engineer Enterasys 
  Networks, Lexington Kentucky 
  -- fatbrain.com Radius Jonathan Hassell 
  Not Yet Available:Preorder Now This 
  book will be available on September 26, place your advance order now and we 
  will ship it when it arrives! Format: Paperback, 
  304pp. ISBN: 0596003226 Publisher: O'Reilly & Associates, Incorporated Pub. Date: September  2002   
  --- Amazon.com RADIUS by Jonathan Hassell 
  This item will be published in October 2002. You may order it 
  now and we will ship it to you when it arrives. 
  -Original Message- From: 
  [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] 
  Sent: Tuesday, July 30, 2002 4:12 PM To: [EMAIL PROTECTED] Subject: 
  RE: RADIUS book from O'Reilly 
  This might be a dumb question, but...  I'd like to buy 
  the book and have my company pay for it.  
  (Read:  fill out  a PO, go through the whole purchasing thing, blah blah blah...)  Any way for FR to get the 
  kickback then?  (I'd imagine not, but figured I'd 
  ask anyway.) 
  Vincent Giovannone Network 
  Infrastructure Group Information Services 
  Division Rush - Presbyterian St. Luke's Medical 
  Center 
  Pinball is a way of life.  My way! 
  
  "Jonathan Hassell" <[EMAIL PROTECTED]> 
  Sent by: [EMAIL PROTECTED] 
  07/30/2002 03:07 PM Please respond to 
  freeradius-users 
       To: 
  <[EMAIL PROTECTED]>     cc:     
  Subject:    RE: RADIUS book from 
  O'Reilly 
  And I just happen to be the author of said O'Reilly book, and 
  I monitor this list frequently.  I haven't had 
  time to contribute much during the past few months, 
  though.  At any rate, please feel free to ask any questions about the book to me personally, or call me stupid, and 
  I'll do my best to respond appropriately.  (No, I 
  won't hold it against you for calling me 
  stupid.) 
  If you do decide to purchase the book, please do so through 
  the FreeRADIUS site.  There is a real potential 
  for a decent chunk of change to become available to 
  support the development of this project. 
  Thanks for your support! 
  Jonathan Hassell [EMAIL PROTECTED] 
  -Original Message- From: Alan 
  DeKok [mailto:[EMAIL PROTECTED]] Sent: Tuesday, July 30, 2002 2:01 PM To: 
  [EMAIL PROTECTED] Subject: RADIUS book 
  from O'Reilly 
    A RADIUS book from O'Reilly has been announced, and 
  it's on Amazon. See: 
   
  http://www.freeradius.org/related/ 
    I've taken the liberty of signing up for an 'Amazon 
  associates' program, so if you're thinking about 
  buying the book, please us the link, and some $$ will 
  be contributed to FreeRADIUS. 
    Since there is currently no legal entity called 
  "FreeRADIUS", I've signed up for the Amazon Associates 
  program under my name.  If the incoming $$ are 
  sufficient, it may be worth legally registering FreeRADIUS as a non-profit entity. 
    In any case, the moneys received from the associates 
  program will go to fostering the development of the 
  server.  I will be posting periodic summaries of 
  the $$, and request for comment as to where/how the money should be spent. 
    If, in fact, the link makes money. :) 
    In the interests of transparency, I was a technical 
  reviewer of the book, and saw it in pre-publication 
  draft.  It isn't perfect, but it's better than 
  the nearly complete lack of documentation that comes with the server today.  It also explains in greater detail the "why" 
  and the "how" of the RADIUS protocol, and may answer 
  many initial questions someone may have about the 
  RADIUS protocol, and the FreeRADIUS server. 
    Alan DeKok. 
  - List info/subscribe/unsubscribe? 
  See http://www.freeradius.org/list/users.html 
  - List info/subscribe/unsubscribe? See 
  http://www.freeradius.org/list/users.html 
  
  - List info/subscribe/unsubscribe? See 
  http://www.freeradius.org/list/users.html 



RE: RADIUS book from O'Reilly

2002-08-01 Thread De Yong, Doug
Title: RE: RADIUS book from O'Reilly





well it seems you might have to wait for the O'Reilly book


hey I've been to Rush../doug


Doug De Yong, CISSP, ESSE#1, SSE, CCSE
Sr. Sales & Security Engineer
Enterasys Networks, Lexington Kentucky


--
fatbrain.com
Radius Jonathan Hassell
Not Yet Available:Preorder Now 
This book will be available on September 26, place your advance order now and we will ship it when it arrives!
Format: Paperback, 304pp.
ISBN: 0596003226
Publisher: O'Reilly & Associates, Incorporated
Pub. Date: September  2002
 
---
Amazon.com
RADIUS by Jonathan Hassell
This item will be published in October 2002. You may order it now and we will ship it to you when it arrives. 



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 30, 2002 4:12 PM
To: [EMAIL PROTECTED]
Subject: RE: RADIUS book from O'Reilly



This might be a dumb question, but...  I'd like to buy the book and have 
my company pay for it.  (Read:  fill out  a PO, go through the whole 
purchasing thing, blah blah blah...)  Any way for FR to get the kickback 
then?  (I'd imagine not, but figured I'd ask anyway.)


Vincent Giovannone
Network Infrastructure Group
Information Services Division
Rush - Presbyterian St. Luke's Medical Center


Pinball is a way of life.  My way!







"Jonathan Hassell" <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
07/30/2002 03:07 PM
Please respond to freeradius-users


 
    To: <[EMAIL PROTECTED]>
    cc: 
    Subject:    RE: RADIUS book from O'Reilly



And I just happen to be the author of said O'Reilly book, and I monitor
this list frequently.  I haven't had time to contribute much during the
past few months, though.  At any rate, please feel free to ask any
questions about the book to me personally, or call me stupid, and I'll
do my best to respond appropriately.  (No, I won't hold it against you
for calling me stupid.)


If you do decide to purchase the book, please do so through the
FreeRADIUS site.  There is a real potential for a decent chunk of change
to become available to support the development of this project. 


Thanks for your support!


Jonathan Hassell
[EMAIL PROTECTED]


-Original Message-
From: Alan DeKok [mailto:[EMAIL PROTECTED]] 
Sent: Tuesday, July 30, 2002 2:01 PM
To: [EMAIL PROTECTED]
Subject: RADIUS book from O'Reilly



  A RADIUS book from O'Reilly has been announced, and it's on Amazon.
See:


 http://www.freeradius.org/related/


  I've taken the liberty of signing up for an 'Amazon associates'
program, so if you're thinking about buying the book, please us the
link, and some $$ will be contributed to FreeRADIUS.



  Since there is currently no legal entity called "FreeRADIUS", I've
signed up for the Amazon Associates program under my name.  If the
incoming $$ are sufficient, it may be worth legally registering
FreeRADIUS as a non-profit entity.



  In any case, the moneys received from the associates program will go
to fostering the development of the server.  I will be posting periodic
summaries of the $$, and request for comment as to where/how the money
should be spent.


  If, in fact, the link makes money. :)



  In the interests of transparency, I was a technical reviewer of the
book, and saw it in pre-publication draft.  It isn't perfect, but it's
better than the nearly complete lack of documentation that comes with
the server today.  It also explains in greater detail the "why" and the
"how" of the RADIUS protocol, and may answer many initial questions
someone may have about the RADIUS protocol, and the FreeRADIUS server.


  Alan DeKok.


- 
List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html



- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html





- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html





radiusd: Cannot findELF

2002-08-01 Thread Denis

Hi everybody.

My sistem is:

bash-2.03# uname -X
System = SunOS
Node = nnm
Release = 5.8
KernelID = Generic_108528-14
Machine = sun4u
BusType = 
Serial = 
Users = 
OEM# = 0
Origin# = 1
NumCPU = 1

I have downloaded and extracted freeradius-0.7.tar.gz

Then ./configure --localstatedir=/var --sysconfdir=/etc
make
make install

then after editing raiusd.conf:

cd /usr/local/sbin
./check-radiusd-config

I've got this message:

bash-2.03# ./check-radiusd-config
radiusd: Cannot findELF
25652 Killed
Radius server configuration looks OK.

I tried to reconfigure and rebuild like this:
./configure --localstatedir=/var --sysconfdir=/etc --disable-shared --disabl
e-static
and I tried to edit libdir entry in radiusd.conf to help radiusd find
libelf* but this does not work.

What kind of problem may be here?

Thanks,
Denis


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



realmpercent & suffix

2002-08-01 Thread Vects

Hi folks,
Could you help me with configuration of the freeradius 0.7 ?
I want to use '@' and '%' as delimiter for realms. I added  realmpercent
before suffix in authorisation but it's not working properly.
If I put realmpercent before suffix the '%' is working but '@' and vice
versa.

I've attached the log below.

Thanks, Serge.

Module: Instantiated preprocess (preprocess) 
Module: Loaded realm 
 realm: format = "suffix"
 realm: delimiter = "%"
Module: Instantiated realm (realmpercent) 
 realm: format = "suffix"
 realm: delimiter = "@"

user@
  modcall[authorize]: module "preprocess" returns ok
rlm_realm: Looking up realm NULL for User-Name = "user@"
rlm_realm: Found realm NULL
rlm_realm: Adding Stripped-User-Name = "user@"
  rlm_realm: Proxying request from user user@ to realm NULL
rlm_realm: Adding Realm = "NULL"
rlm_realm:  Authentication realm is LOCAL.
rlm_realm:  auth_port is not set.  proxy cancelled
  modcall[authorize]: module "realmpercent" returns noop
rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop
users: Matched DEFAULT at 165
  modcall[authorize]: module "files" returns ok


user%
modcall: entering group authorize
  modcall[authorize]: module "preprocess" returns ok
rlm_realm: Looking up realm  for User-Name = "user%"
rlm_realm: Found realm 
rlm_realm: Adding Stripped-User-Name = "user"
  rlm_realm: Proxying request from user user to realm 
rlm_realm: Adding Realm = ""
rlm_realm:  Authentication realm is LOCAL.
rlm_realm:  auth_port is not set.  proxy cancelled
  modcall[authorize]: module "realmpercent" returns noop
rlm_realm: Request already proxied.  Ignoring.
  modcall[authorize]: module "suffix" returns noop
users: Matched DEFAULT at 165
  modcall[authorize]: module "files" returns ok
modcall: group authorize returns ok






- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



RE: active directory

2002-08-01 Thread Vic Abell

Allister Maguire writes:
>
> We do it for our ISP, we use rlm_ldap for authorisation and rlm_pam for
> authentication (using Kerberos), works great. We have created our own
> ldap schema attributes, but you can use the Microsoft ones. One thing,
> because we use kerberos it also requires the use of nss_ldap for user
> lookup, the best option for you would be to use rlm_ldap for
> authorisation and authentication.

I would think it would also be important to configure rlm_ldap
to use TLS, lest plain text passwords be sent from the FreeRadius
server to the Active Directory Server in the simple password LDAP
authentication method rlm_ldap uses.

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



Cisco PPTP

2002-08-01 Thread Sergio Sagliocco

Hello

anyone of the list have already configured freeradius to work with a 
Cisco IOS to authenticate users of a PPTP/MPPE VPN?

Can somebody help me?

thanks

sergio


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html