Freeradius error with eap authentication

2011-07-20 Thread DENJEAN Didier
Hi, I have some problems with Freeradius and EAP I use freeradius version 2.1.11 on debian 5 When I start the radius server in debug mode (radiusd -xX), there are no error (file debug1.txt) When eduroam server enable connexion on your freeradius server, I have some errors (file debug2.txt)

Re: Trying to wrap my head around FreeRadius config

2011-07-20 Thread Phil Mayers
On 07/20/2011 03:35 AM, Moe, John wrote: I hadn't seen or heard of that file before. Thanks for the pointer. When I unpacked the sources for FreeRadius (freeradius-server-2.0.5.tar.gz) that Gentoo used to build the server, I 2.0.5 is old. You want to be running a much newer version. - List

Re: Trying to wrap my head around FreeRadius config

2011-07-20 Thread Phil Mayers
On 07/20/2011 03:28 AM, Moe, John wrote: There are various others, but those are the main ones. So then, when matching an entry in users, does it look at the request items, or the config items? When creating an entry, you specify first things to match against on one line separated by commas,

Re: Freeradius error with eap authentication

2011-07-20 Thread Phil Mayers
On 07/20/2011 09:22 AM, DENJEAN Didier wrote: Hi, I have some problems with Freeradius and EAP I use freeradius version 2.1.11 on debian 5 When I start the radius server in debug mode (radiusd -xX), there are no error (file debug1.txt) When eduroam server enable connexion on your freeradius

Re: FreeRadius - LDAP

2011-07-20 Thread m4xmr
Il 20/07/11 10.19, Fajar A. Nugraha-2 [via FreeRadius] ha scritto: On Wed, Jul 20, 2011 at 3:07 PM, m4xmr [hidden email] /user/SendEmail.jtp?type=nodenode=4615111i=0 wrote: Hello, I'm trying to make working LDAP as authentication backend for RADIUS. I verified that the data are right and the

TTLS use_tunneled_reply and Mac OSX

2011-07-20 Thread Scott Armitage
Hi, I have noticed that when authenticating using TTLS/MSCHAPv2 that the outer-identity is used in the RADIUS reply packet even if the use_tunneled_reply is set to yes for TTLS in eap.conf Does anyone know the reason for this? Thanks Scott Armitage PGP.sig Description: This is a digitally

Re: Trying to wrap my head around FreeRadius config

2011-07-20 Thread Alan DeKok
Moe, John wrote: Seriously though, I've found one on PAP, one on ntlm_auth/AD, one on HP, one on Cisco, but when I've followed each one, they doesn't seem to work together properly. So ask *specific* questions about what you expect, what's happening, and what you think is going wrong.

Re: TTLS use_tunneled_reply and Mac OSX

2011-07-20 Thread Alexander Clouter
Scott Armitage s.p.armit...@lboro.ac.uk wrote: I have noticed that when authenticating using TTLS/MSCHAPv2 that the outer-identity is used in the RADIUS reply packet even if the use_tunneled_reply is set to yes for TTLS in eap.conf Does anyone know the reason for this? TLS session

Re: TTLS use_tunneled_reply and Mac OSX

2011-07-20 Thread Phil Mayers
On 20/07/11 11:26, Scott Armitage wrote: Hi, I have noticed that when authenticating using TTLS/MSCHAPv2 that the outer-identity is used in the RADIUS reply packet even if the use_tunneled_reply is set to yes for TTLS in eap.conf That's not what we see: [ttls] Using saved attributes from the

Re: TTLS use_tunneled_reply and Mac OSX

2011-07-20 Thread Scott Armitage
On 20 Jul 2011, at 13:39, Phil Mayers wrote: On 20/07/11 11:26, Scott Armitage wrote: Hi, I have noticed that when authenticating using TTLS/MSCHAPv2 that the outer-identity is used in the RADIUS reply packet even if the use_tunneled_reply is set to yes for TTLS in eap.conf That's not

Re: TTLS use_tunneled_reply and Mac OSX

2011-07-20 Thread Scott Armitage
On 20 Jul 2011, at 12:49, Alexander Clouter wrote: Scott Armitage s.p.armit...@lboro.ac.uk wrote: I have noticed that when authenticating using TTLS/MSCHAPv2 that the outer-identity is used in the RADIUS reply packet even if the use_tunneled_reply is set to yes for TTLS in eap.conf

Problem with module and users file

2011-07-20 Thread Jean Carlos Oliveira Guandalini
Hello, i'm using backcounter (rlm_backcounter) module. This module set a attribute and this attribute is compared in USERS file. Freeradius version 2.1.11. users file: DEFAULT Monthly-Time-Exceeded == 1 Framed-Pool = exceeded, Fall-Through = Yes The problem is what the freeradius

Re: TTLS use_tunneled_reply and Mac OSX

2011-07-20 Thread Phil Mayers
On 20/07/11 14:27, Scott Armitage wrote: [ttls] Using saved attributes from the original Access-Accept Reply-Message = Authenticated by Test ORPS Ok, looking at the debug the reason this is happening is that you are doing TTLS/MSCHAP, as opposed to TTLS/EAP-MSCHAP. [ttls] Got

Re: TTLS use_tunneled_reply and Mac OSX

2011-07-20 Thread Scott Armitage
On 20 Jul 2011, at 15:40, Phil Mayers wrote: On 20/07/11 14:27, Scott Armitage wrote: [ttls] Using saved attributes from the original Access-Accept Reply-Message = Authenticated by Test ORPS Ok, looking at the debug the reason this is happening is that you are doing TTLS/MSCHAP,

Re: FreeRadius - LDAP

2011-07-20 Thread up
You're using LDAP with POSIX type users, including shadow passwords. I'm pretty sure this means you cannot use CHAP on the client end, but must use PAP. Somebody can correct me if I'm wrong about this. While they are at it, maybe they can let me know how to get FreeRADIUS to respect the

Re: FreeRadius - LDAP

2011-07-20 Thread Massimiliano Tommasi
As you can see, there is a try with PAP after LDAP. Is there something I have to modify, in your opinion? Thanks, Max Wed Jul 20 13:35:25 2011 : Debug: rlm_ldap: ldap_release_conn: Release Id: 0 Wed Jul 20 13:35:25 2011 : Info: ++[ldap] returns ok Wed Jul 20 13:35:25 2011 : Info: ++[expiration]

SoH and DHCP

2011-07-20 Thread Francois Gaudreault
Hi, I am trying to make the SoH statements to work using the FreeRADIUS DHCP. However, I have issues to get the SoH values from the NAP client. Maybe someone will be able to help. On the client side, the DHCP NAP policy is set to enabled. Thanks! sites-enabled/dhcp : listen { ipaddr

Re: SoH and DHCP

2011-07-20 Thread Phil Mayers
On 07/20/2011 06:07 PM, Francois Gaudreault wrote: Hi, I am trying to make the SoH statements to work using the FreeRADIUS DHCP. However, I have issues to get the SoH values from the NAP client. Maybe someone will be able to help. On the client side, the DHCP NAP policy is set to enabled.

RE: Trying to wrap my head around FreeRadius config

2011-07-20 Thread Moe, John
-Original Message- So ask *specific* questions about what you expect, what's happening, and what you think is going wrong. Ask small questions, instead of long ones. It really makes a difference. Well, ok, I'll start again, go as far as I can, and then ask questions about

RE: Trying to wrap my head around FreeRadius config

2011-07-20 Thread Gary Gatten
Let me TRY to address a couple points here. 1.) Admins logging in to network devices: telnet, ssh, etc. The Network Device, if properly configured, sends a RADIUS request to the RADIUS server. If you run FR in debug mode you'll see the request come in and all the attributes thereof. FR,

Re: FreeRadius - LDAP

2011-07-20 Thread Massimiliano Tommasi
Syntax of 2.x is really is quite different from 1.y _ That was my problem, thanks an regards. Max Il 20/07/11 18.07, u...@3.am ha scritto: You're using LDAP with POSIX type users, including shadow passwords. I'm pretty sure this means you cannot use CHAP on the client end, but must use

RE: Trying to wrap my head around FreeRadius config

2011-07-20 Thread Moe, John
-Original Message- From: freeradius-users-bounces+jmoe=hatch.com...@lists.freeradius.org [mailto:freeradius-users- bounces+jmoe=hatch.com...@lists.freeradius.org] On Behalf Of Gary Gatten Sent: Thursday, 21 July 2011 9:29 AM To: 'FreeRadius users mailing list' Subject: RE: Trying

clients.conf with MAC-address .

2011-07-20 Thread Andy Zarzycki
Greetings, We are trying to authenticate user request coming from many APs. The plan is to authenticate the APs as well as the users centrally using freeradius. We were hoping if we could configure clients.conf with MAC-address instead of IP address for every AP. This will ensure MAC-address with

RE: Trying to wrap my head around FreeRadius config

2011-07-20 Thread Moe, John
-Original Message- 1.) Use only ntlm_auth. If necessary you can use require-membership- of (I forget exact syntax) to ensure only members of Network Admins can get a cli on your network gear. It will also work for 802.1x From what I've read, require-membership-of is a switch to