Retrieve an user attribute from AD for vlan assignment in PEAP auth

2009-03-26 Thread Frad

Hi everyone,

I am configuring a freeradius server with authentication PEAP/Mschap with an
Active Directory. The authentication works :)
There is my question: 
I have on my AD an attribute for each user such as "vlanId = 12" and I would
like to get this value to assign the user authenticated on this VLAN. Any
idea ? 

Thanks,
Frad
-- 
View this message in context: 
http://www.nabble.com/Retrieve-an-user-attribute-from-AD-for-vlan-assignment-in-PEAP-auth-tp22720035p22720035.html
Sent from the FreeRadius - User mailing list archive at Nabble.com.

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: EAp/TSL authorization problem

2005-04-26 Thread frad
Are you trying to use TLS or PEAP?   I'm not an expert but there are
some PEAP definitions in your config file that I think need to be changed
if you are attempting TLS.  The most obvious is the default_eap_type
which should be tls.
default_eap_type = tls
Also, if you are attempting tls you don't need the user password in the
users file.  I don't know if this will cause an error with TLS, but it's
not necessary to have.
If you are attempting PEAP, I don't see anything obvious in the config
file that is incorrect.  You might look other places such as ensuring you
are using the XP Wireless Zero Configuration for accessing the wireless
network, and also recheck your certificate creation.  I found
http://www.austux.net/resources/network/eaptls.html  to be the most
helpful regarding certificate creation.
Jon
Sergey Guriev wrote:
Hello!
Im' using freeradius 1.02 (under linux), Cisco AiroNet 1230B and PC-station 
under Win-XP. And I have some problem with authorization.
Here parts of my configs:

users:
-
ttt  Password == ""
-
radiusd.conf:
-
authenticate {
   #
   #  PAP authentication, when a back-end database listed
   #  in the 'authorize' section supplies a password.  The
   #  password can be clear-text, or encrypted.
#   Auth-Type PAP {
#   pap
#   }
   #
   #  Most people want CHAP authentication
   #  A back-end database listed in the 'authorize' section
   #  MUST supply a CLEAR TEXT password.  Encrypted passwords
   #  won't work.
#   Auth-Type CHAP {
#   chap
#   }
   #
   #  MSCHAP authentication.
   Auth-Type MS-CHAP {
   mschap
   }
   #
   #  If you have a Cisco SIP server authenticating against
   #  FreeRADIUS, uncomment the following line, and the 'digest'
   #  line in the 'authorize' section.
#   digest
   #
   #  Pluggable Authentication Modules.
#   pam
   #
   #  See 'man getpwent' for information on how the 'unix'
   #  module checks the users password.  Note that packets
   #  containing CHAP-Password attributes CANNOT be authenticated
   #  against /etc/passwd!  See the FAQ for details.
   #
#   unix
   # Uncomment it if you want to use ldap for authentication
   #
   # Note that this means "check plain-text password against
   # the ldap database", which means that EAP won't work,
   # as it does not supply a plain-text password.
#   Auth-Type LDAP {
#   ldap
#   }
   #
   #  Allow EAP authentication.
   eap
}
-
eap.conf:
-
  eap {
   default_eap_type = peap
   timer_expire = 60
   ignore_unknown_eap_types = no
   cisco_accounting_username_bug = yes
   md5 {
   }
   leap {
   }
   gtc {
   auth_type = PAP
   }
   ## EAP-TLS
   tls {
   private_key_password = maddie
   private_key_file = ${raddbdir}/certs/cert-srv.pem
   certificate_file = ${raddbdir}/certs/cert.pem
   check_cert_cn = no
   CA_file = ${raddbdir}/certs/cacert.pem
   dh_file = ${raddbdir}/certs/dh
   random_file = /dev/urandom
   rsa_key_exchange = no
   dh_key_exchange = yes
#   fragment_size = 1024
#   include_length = yes
#   check_crl = yes
#  check_cert_cn = %{User-Name}
   }
peap {
   default_eap_type = mschapv2
   }
   mschapv2 {
   }
   }
-
Cisco:
--
Current configuration : 3127 bytes
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname ap
!
aaa new-model
!
!
aaa group server radius wifi
server 80.243.64.177 auth-port 1812 acct-port 1813
!
aaa group server radius wlccp_rad_infra
!
aaa group server radius wlccp_rad_eap
server 80.243.64.177 auth-port 1812 acct-port 1813
!
aaa group server radius wlccp_rad_leap
!
aaa group server radius wlccp_rad_mac
!
aaa group server radius wlccp_rad_any
!
aaa group server radius wlccp_rad_acct
!
aaa group server radius rad_eap
server 80.243.64.177 auth-port 1812 acct-port 1813
!
aaa group server radius rad_mac
!
aaa group server radius rad_acct
!
aaa group server radius rad_admin
!
aaa group server tacacs+ tac_admin
!
aaa group server radius rad_pmip
!
aaa group server radius dummy
!
aaa group server radius eap_methods
server 80.243.64.177 auth-port 1812 acct-port 1813
!
aaa authentication login wlccp_infra group wlccp_rad_infra
aaa authentication log

Re: TLS problem

2005-04-25 Thread frad
A good resource is www.austux.net/resources/network/eaptls.html
Also, make sure you are using "windows zero configuration" on the
WinXP client.
Jon
[EMAIL PROTECTED] wrote:
Hello,
I'm tying to make an authentication using freeradius-1.0.1-1 on Fedora
Core 3, Cisco Catalyst 2950 as authenticator and WinXP (SP2) as a client.
I didn't manage to make it work and I found a document describing that I
should make a TLS authentication first, then go to MS-CHAP v2, but it
didn't work too. I found that the TLS connection doesn't establish
completely but I can't find the problem. Can you tell me the reason it
doesn't work or url to more descriptive document?

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


TLS Certificate Challenge

2005-04-21 Thread frad
FreeBSD V5.3
FreeRadius V1.0.2
Windows XP Home
Dlink 2100 Access Point
Dlink G132 USB Wireless Adapter
self-signed server certificates using openssl v0.9.7e
I'm using EAP/TLS successfully, however I'd like to have
the user challenged to enter a password prior to being
given access to the local network.  Currently, the TLS
certificates work without any user interaction.  

I thought this is what the "Challenge Password" was for
when the certificate is created by openssl, but my laptop
connects without requiring any challenge.  When I imported
the certificate I checked the box that required strict
security and said that I'd be prompted every time the
certificate was used.
Does a challenge get initiated by XP, the certificate, or
the wireless adapter?
Looking for any help you can provide on this issue.
Thanks,
Jon


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: verify server certificate XP supplicant ?

2005-04-18 Thread frad
Are you sure you used the "xpextensions" file when you built your
server and client certificates?  I had the same problem you describe
until I added the xpextension (OID) stuff to the certificates.
Try using the following resource, cut and pasting the commands
as they appear within the document.  I used this successfully for
EAP/PEAP and EAP/TLS.   Then make sure that your wireless
adapter is configured to use TLS.  Under Microsoft it's called
"Smart Card or Certificate" within the the adapters properties
dialog box.  If your adapter came with its own configuration software
there'll be a place to specify EAP/TLS.  If you don't see such an
option, your adapter is not 802.1x compliant.
A great resource for EAP/TLS is
austux.net/resources/network/eaptls.html
Jon

Riccardo Veraldi wrote:
Hello,
I am using EAP-TLS. Windows XP, Cisco 1200 AP, freeradius.
Everything is working fine unless I enable the "verify server 
certificate" checkbox on XP.
In this case I am not authenticated anymore by the radius server.
I Cannot understand why. I have the CA certificate installed
I cannot understand why it does not work.
any hints ?
thank you very much

Rick

- List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: TLS Alert read:fatal:bad certificate

2005-04-16 Thread frad

I resolved this issue.  The problem was that I had not included the
xpextensions when making the certificate.  I got errors when initially
trying to use CA.all and instead of investigating the errors further I
decided to build a CA root and server cert manually, which did not
include the xpextensions.

My configuration is working so well now that I've stop using the -X
option to watch the output.  As usual however, my success has resulted
in additional questions that I'd appreciate some help with.

1) What is an "OID"?  Nice buzz word that I see referenced in numerous
web pages but no definition.  What is the purpose of the data in the
xpextensions file?  Do all CA's use it when signing certificates, or
is this specific to freeradius?

2) I notice now that the certificate validation is working that I no
longer am prompted to enter my username and password.  Even after
rebooting the WinXP computer, the connection to freeradius occurs
automatically.  I suppose this might be convenient in some circles
but it's also a security risk in that if someone were to borrow my
computer they would not be challenged before getting access to the
network.  Does anyone know where WinXP stores this info and if it
can be configured to always prompt for user/pass?

Thanks,
Jon



>
>FreeBSD V5.3
>FreeRadius V1.0.2
>Windows XP Supplicant
>Dlink 2100 Access Point
>Dlink G132 USB Wireless Adapter
>self-signed server certificates using openssl v0.9.7e
>
>The radiusd -X command shows no errors on startup.
>
>I'm having problems authenticating when using the "validate server certificate"
>option in the WinXP PEAP configuration menu.  If I don't validate the server
>certificate I can connect to the radius server just fine.  Someone else ran
>into a similar problem (freeradius-users/2004-September/036349.html) claiming
>the problem was "usage attributes accompanying the cert".  I don't know what
>this means.  I created my certs according to directions from
>austux.net/resources/network/eaptls.html
>
>The entire log is include below, but the relevant part seems to be the
>following section.  I'm assuming "validating" the certificate is a good
>thing and an option I want to include in my WinXP configuration.  My root
>CA installed fine on the WinXP machine.  Can anyone give me some guidance
>on this issue?
>
>
>  rlm_eap_peap: EAPTLS_OK
>  rlm_eap_peap: Session established.  Decoding tunneled attributes.
>  rlm_eap_tls: <<< TLS 1.0 Alert [length 0002], fatal access_denied  
>TLS Alert read:fatal:access denied 
>rlm_eap_peap: No data inside of the tunnel.
> rlm_eap: Handler failed in EAP/peap
>  rlm_eap: Failed in EAP select
>  modcall[authenticate]: module "eap" returns invalid for request 53
>modcall: group authenticate returns invalid for request 53
>auth: Failed to validate the user.
>
>
>

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


TLS Alert read:fatal:bad certificate

2005-04-16 Thread frad

FreeBSD V5.3
FreeRadius V1.0.2
Windows XP Supplicant
Dlink 2100 Access Point
Dlink G132 USB Wireless Adapter
self-signed server certificates using openssl v0.9.7e

The radiusd -X command shows no errors on startup.

I'm having problems authenticating when using the "validate server certificate"
option in the WinXP PEAP configuration menu.  If I don't validate the server
certificate I can connect to the radius server just fine.  Someone else ran
into a similar problem (freeradius-users/2004-September/036349.html) claiming
the problem was "usage attributes accompanying the cert".  I don't know what
this means.  I created my certs according to directions from
austux.net/resources/network/eaptls.html

The entire log is include below, but the relevant part seems to be the
following section.  I'm assuming "validating" the certificate is a good
thing and an option I want to include in my WinXP configuration.  My root
CA installed fine on the WinXP machine.  Can anyone give me some guidance
on this issue?


  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_tls: <<< TLS 1.0 Alert [length 0002], fatal access_denied  
TLS Alert read:fatal:access denied 
rlm_eap_peap: No data inside of the tunnel.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 53
modcall: group authenticate returns invalid for request 53
auth: Failed to validate the user.



COMPLETE LOG
--
rad_recv: Access-Request packet from host 192.168.1.9:1044, id=0, length=195
Message-Authenticator = 0x4f9ccbaf3ab3be2586f9b6f5094a77b1
Service-Type = Framed-User
User-Name = "jon"
Framed-MTU = 1488
Called-Station-Id = "00-11-95-BF-B6-F9:radius1"
Calling-Station-Id = "00-11-95-94-4F-CB"
NAS-Identifier = "D-Link Corp. Access Point"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x0208016a6f6e
NAS-IP-Address = 192.168.1.9
NAS-Port = 1
NAS-Port-Id = "STA port # 1"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 49
  modcall[authorize]: module "preprocess" returns ok for request 49
  modcall[authorize]: module "mschap" returns noop for request 49
rlm_realm: No '@' in User-Name = "jon", looking up realm NULL
rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 49
  rlm_eap: EAP packet type response id 0 length 8
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 49
users: Matched entry jon at line 80
  modcall[authorize]: module "files" returns ok for request 49
modcall: group authorize returns updated for request 49
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 49
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 49
modcall: group authenticate returns handled for request 49
Sending Access-Challenge of id 0 to 192.168.1.9:1044
EAP-Message = 0x010100061920
Message-Authenticator = 0x
State = 0x109fea2d826cbca009c3b29faa07d32c
Finished request 49
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.1.9:1044, id=1, length=285
Message-Authenticator = 0xb476fe4ef81aa1687fc3be4696873ea2
Service-Type = Framed-User
User-Name = "jon"
Framed-MTU = 1488
State = 0x109fea2d826cbca009c3b29faa07d32c
Called-Station-Id = "00-11-95-BF-B6-F9:radius1"
Calling-Station-Id = "00-11-95-94-4F-CB"
NAS-Identifier = "D-Link Corp. Access Point"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 
0x02010050198000461603010041013d03014260aa5d192deeca7552fd6ecd6ab3baa64d8c6b25c45e979cfcdf2fdac8c1b51600040005000a000900640062000300060013001200630100
NAS-IP-Address = 192.168.1.9
NAS-Port = 1
NAS-Port-Id = "STA port # 1"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 50
  modcall[authorize]: module "preprocess" returns ok for request 50
  modcall[authorize]: module "mschap" returns noop for request 50
rlm_realm: No '@' in User-Name = "jon", looking up realm NULL
rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 50
  rlm_eap: EAP packet type response id 1 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 

Re: EAP-TLS Certificate Failure with CMC Emulation Engine

2005-04-15 Thread frad

Interesting.
I've getting the same error on WinXP SP2 when I use the "validate server 
certificate"
option in the PEAP configuration window.  In fact, I was just about the send my
log info to the list when I saw your mail.  On your winxp client you might want 
to
double-check if you have "validate server certificate" checked or not.  If you 
do,
can you send me the commands you used to create your certificates so I can try 
to
get mine to work correctly?

Jon


> Background:
> I am utilizing CMC’s Emulation Engine to perform multi-client testing on a
> wireless access point, which is configured for WPA 802.1x.  I am running
> EAP-TLS on FreeRADIUS 1.0.0-5 and OpenSSL 0.9.7d-25 on SuSE Linux
> Professional 9.2.  Before testing the access point with the Emulation
> Engine I verified the FreeRADIUS configuration with Windows XP SP2 clients,
> which allowed me to successfully associate, authenticate and transfer data
> through the access point.
>
> Problem:
> FreeRADIUS reports “fatal bad_certificate” when I try to associate and
> authenticate the Emulation Engine with the access point.  However, this is
> the same client certificate I successfully used on the Windows clients.
>
> My contact at CMC built FreeRADIUS on a Redhat platform and tried to
> troubleshoot the problem.  Initially, he was unable to associate and
> authenticate via the access point when running the Emulation Engine.  He
> eventually rebuilt his installation with the following configurations:
>
>   OpenSSL: --no-shared
>   FreeRADIUS: --with-openssl-includes=/usr/local/ssl/include
>   --with-openssl-libraries=/usr/local/ssl/lib
>   --disable-shared
>
> After he rebuilt his installation he was able to successfully use my
> certificates with the Emulation Engine.
>
> Questions:
> What did his rebuild configurations change?
> Can anyone provide insight into my FreeRADIUS errors captured below?
>
> - Thanks, Adam Gibson
>
> rad_recv: Access-Request packet from host xxx.xxx.xxx.xxx:5501, id=23,
> length=202
> Message-Authenticator = 0xd9e136bede727a18ffebbe5029428d2a
> Service-Type = Framed-User
> User-Name = "laptop"
> Framed-MTU = 1488
> State = 0xb9a81d87e3edf4ae5692cb71c2d3f34d
> Called-Station-Id = ":xx--xxx-xx"
> Calling-Station-Id = ""
> NAS-Identifier = ""
> NAS-Port-Type = Wireless-802.11
> Connect-Info = "CONNECT 54Mbps 802.11g"
> EAP-Message = 0x020200060d00
> NAS-IP-Address = xxx.xxx.xxx.xxx
> NAS-Port = 2
> NAS-Port-Id = "STA port # 2"
>   Processing the authorize section of radiusd.conf
> modcall: entering group authorize for request 10
>   modcall[authorize]: module "preprocess" returns ok for request 10
>   modcall[authorize]: module "chap" returns noop for request 10
>   modcall[authorize]: module "mschap" returns noop for request 10
> rlm_realm: No '@' in User-Name = "laptop", looking up realm NULL
> rlm_realm: No such realm "NULL"
>   modcall[authorize]: module "suffix" returns noop for request 10
>   rlm_eap: EAP packet type response id 2 length 6
>   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
>   modcall[authorize]: module "eap" returns updated for request 10
> users: Matched laptop at 97
>   modcall[authorize]: module "files" returns ok for request 10
> modcall: group authorize returns updated for request 10
>   rad_check_password:  Found Auth-Type EAP
> auth: type "EAP"
>   Processing the authenticate section of radiusd.conf
> modcall: entering group authenticate for request 10
>   rlm_eap: Request found, released from the list
>   rlm_eap: EAP/tls
>   rlm_eap: processing type tls
>   rlm_eap_tls: Authenticate
>   rlm_eap_tls: processing TLS
> rlm_eap_tls: Received EAP-TLS ACK message
>   rlm_eap_tls: ack handshake fragment handler
>   eaptls_verify returned 1
>   eaptls_process returned 13
>   modcall[authenticate]: module "eap" returns handled for request 10
> modcall: group authenticate returns handled for request 10
> Sending Access-Challenge of id 23 to xxx.xxx.xxx.xxx:5501
> EAP-Message =
> 0x010303200d800716273025060355040a131e4c657669746f6e20566f69636520616e6
>420446174612044697669736f6e31133011060355040b130a416374697665204c61623114301
>20603550403130b4164616d20476962736f6e312b302906092a864886f70d010901161c61676
>962736f6e406c657669746f6e766f696365646174612e636f6d305c300d06092a864886f70d0
>101010500034b003048024100b9eb33f79f3aff24f1613023530ee0b512c4aec11c11840087e
>9798f9da02446ff83854cf201fab7e2486a12f1e7fd406b1c34e7c38c29497d62765fae0ff48
>f0203010001a382011630820112301d0603551d0e041604143143 EAP-Message =
> 0x009a0e958f0e4adccbc9e9e757ea7eb7d7173081e20603551d230481da3081d7801431430
>09a0e958f0e4adccbc9e9e757ea7eb7d717a181bba481b83081b5310b3009060355040613025
>553311330110603550408130a57617368696e67746f6e3110300e06035504071307426f74686
>56c6c31273025060355040a131e

Re: Compile problem of last CVS version on FreeBSD 4.x

2004-11-22 Thread frad-u
Current CVS version also cannot be built on FreeBSD.
Is where any way to fix the problem?

Friday, November 19, 2004, 5:41:56 PM, [EMAIL PROTECTED] wrote:


fuanr> Tried on two FreeBSD 4.x box

fuanr> #gmake
fuanr> gmake[1]: Entering directory `/root/src/radiusd'
fuanr> Making all in libltdl...
fuanr> gmake[2]: Entering directory `/root/src/radiusd/libltdl'
fuanr> gmake[2]: *** No rule to make target `all'.  Stop.
fuanr> gmake[2]: Leaving directory `/root/src/radiusd/libltdl'
fuanr> gmake[1]: *** [common] Error 1
fuanr> gmake[1]: Leaving directory `/root/src/radiusd'
fuanr> gmake: *** [all] Error 2
fuanr> #uname -a
fuanr> FreeBSD 4.9-RELEASE FreeBSD 4.9-RELEASE #0: Mon Nov 10 15:58:43 MSK 2003


fuanr> configure:8639: checking if libtool supports shared libraries
fuanr> configure:8641: result: yes
fuanr> configure:8644: checking whether to build shared
fuanr> libraries  
fuanr> configure:8702: result: yes
fuanr> configure:8705: checking whether to build static
fuanr> libraries  
fuanr> configure:8709: result: yes
fuanr> configure:8801: creating libtool   
fuanr> configure:9348: checking for ld used by g++
fuanr> configure:9415: result: /usr/libexec/elf/ld
fuanr> configure:9424: checking if the linker
fuanr> (/usr/libexec/elf/ld) is GNU ld
fuanr> configure:9439: result: yes
fuanr> configure:9490: checking whether the g++ linker
fuanr> (/usr/libexec/elf/ld) supports shared libraries
fuanr> configure:10316: result: yes

fuanr> I didn't found in config.log lines related to libltdl.


fuanr> This version can be built successfully if copy libltdl dir from
fuanr> release.




fuanr> - 
fuanr> List info/subscribe/unsubscribe? See
fuanr> http://www.freeradius.org/list/users.html

-- 
Andrei Koulik.


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Compile problem of last CVS version on FreeBSD 4.x

2004-11-19 Thread frad-u

Tried on two FreeBSD 4.x box

#gmake
gmake[1]: Entering directory `/root/src/radiusd'
Making all in libltdl...
gmake[2]: Entering directory `/root/src/radiusd/libltdl'
gmake[2]: *** No rule to make target `all'.  Stop.
gmake[2]: Leaving directory `/root/src/radiusd/libltdl'
gmake[1]: *** [common] Error 1
gmake[1]: Leaving directory `/root/src/radiusd'
gmake: *** [all] Error 2
#uname -a
FreeBSD 4.9-RELEASE FreeBSD 4.9-RELEASE #0: Mon Nov 10 15:58:43 MSK 2003


configure:8639: checking if libtool supports shared libraries
configure:8641: result: yes 

  
configure:8644: checking whether to build shared libraries  

  
configure:8702: result: yes 

  
configure:8705: checking whether to build static libraries  

  
configure:8709: result: yes 

  
configure:8801: creating libtool

  
configure:9348: checking for ld used by g++ 

  
configure:9415: result: /usr/libexec/elf/ld 

  
configure:9424: checking if the linker (/usr/libexec/elf/ld) is GNU ld  

  
configure:9439: result: yes 

  
configure:9490: checking whether the g++ linker (/usr/libexec/elf/ld) supports 
shared libraries
   
configure:10316: result: yes

I didn't found in config.log lines related to libltdl.


This version can be built successfully if copy libltdl dir from
release.




- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html