Re: delayed Access Reject response

2007-10-30 Thread Florin Andrei
manIP wrote: On 10/30/07, *Florin Andrei* <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>> wrote: If the password is incorrect, the Access Reject reply is delayed until the user enters the password the second time. It's like the server waits for the next auth attempt

delayed Access Reject response

2007-10-30 Thread Florin Andrei
until the user enters the password the second time. It's like the server waits for the next auth attempt to send back the Reject. What could be the cause? -- Florin Andrei http://florin.myip.org/ - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: pam_radius_auth updated spec file, please include in future releases

2007-10-30 Thread Florin Andrei
Florin Andrei wrote: I attached an updated spec file for pam_radius_auth. No, I didn't. _Now_ I did. :-/ -- Florin Andrei http://florin.myip.org/ %define name pam_radius_auth %define shortname pam_radius %define version 1.3.17 %define release 0 Name: %{name} Summary: PAM Module for R

pam_radius_auth updated spec file, please include in future releases

2007-10-30 Thread Florin Andrei
, -- Florin Andrei http://florin.myip.org/ - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: LDAP authentication

2005-07-12 Thread Florin Andrei
On Tue, 2005-07-12 at 13:25 -0700, Florin Andrei wrote: > I don't really care about any information that's returned, I only want > to authenticate against LDAP. To be more precise, authentication happens during the LDAP Bind request. Subsequent searches are irrelevant. Can f

LDAP authentication

2005-07-12 Thread Florin Andrei
at's different from ldapsearch. LDAP is currently used to authenticate various things, and I'd like to point a Radius server to it to use the same user passwords. -- Florin Andrei http://florin.myip.org/ - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

more detailed logging

2005-03-15 Thread Florin Andrei
the NAS's cooperation, and i don't want to rely on that. I simply want to log, in SQL, all incoming authentication requests plus their source IP address. I am aware of the IP spoofing issues, i am not solely relying on this data to know what happens where. -- Florin Andrei http://florin