<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=us-ascii">
<META content="MSHTML 6.00.2900.2769" name=GENERATOR></HEAD>
<BODY>
<DIV dir=ltr align=left><SPAN class=833125705-16122005><FONT face=Arial
color=#0000ff size=2>Put quotes around the password....one thing I learned. That
will take you further.</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=833125705-16122005><FONT face=Arial
color=#0000ff size=2></FONT></SPAN> </DIV>
<DIV dir=ltr align=left><SPAN class=833125705-16122005><FONT face=Arial
color=#0000ff size=2>I have a working config. So, please let me know if you are
still running into problems.</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=833125705-16122005><FONT face=Arial
color=#0000ff size=2></FONT></SPAN> </DIV>
<DIV dir=ltr align=left><SPAN class=833125705-16122005><FONT face=Arial
color=#0000ff size=2>P.S.</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=833125705-16122005><FONT face=Arial
color=#0000ff size=2>I will be posting a doc on the wiki once I'm done with
testing.</FONT></SPAN></DIV>
<DIV> </DIV><!-- Converted from text/plain format -->
<P><FONT size=2>Alhagie Puye - Network Engineer<BR>Datawave Group of
Companies<BR>(604)295-1817 </FONT></P>
<DIV> </DIV><BR>
<BLOCKQUOTE
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid; MARGIN-RIGHT: 0px">
<DIV class=OutlookMessageHeader lang=en-us dir=ltr align=left>
<HR tabIndex=-1>
<FONT face=Tahoma size=2><B>From:</B>
freeradius-users-bounces@lists.freeradius.org
[mailto:freeradius-users-bounces@lists.freeradius.org] <B>On Behalf Of
</B>Michael Calizo<BR><B>Sent:</B> December 15, 2005 8:26 PM<BR><B>To:</B>
Freeradius-Users@lists.freeradius.org<BR><B>Subject:</B> FreeRadius cannot
Authenticate to Windows AD<BR></FONT><BR></DIV>
<DIV></DIV>Hi Guru's,<BR><BR><BR>I have installed freeradius and used each
LDAP module to authenticate to WINDOWS 2003 AD. The problem is it cant do the
authentication, seems that i missed the radius.conf LDAP module configuration
which causes the LDAP module to failed when connecting to MSAD.
Below is my radius.conf config file.<BR><BR><BR>Hoping that you guys can help
me, coz i have been googling all day for this config and i can not make this
thing work... Thnx in advance.. <BR><BR>radius.conf:<BR><BR>ldap
{<BR>
server = "<A
href="http://oberon.chikka.ph">oberon.chikka.ph</A>"<BR>
# identity = "cn=admin,o=My
Org,c=UA"<BR>
identity =
"cn=backops,cn=Admin,dc=chikka,dc=ph"<BR>
password =
_bant@3a-@n<BR>
# password =
mypass<BR>
basedn =
"dc=chikka,dc=ph"<BR>
# filter =
"(SamAccountName=%{Stripped-User-Name:-%{User-Name}})"<BR>
#filter =
"(SamAccountName=%U)"<BR>
#filter =
"(SamAccountName=%u)"<BR>
# base_filter =
"(objectclass=radiusprofile)"<BR>
base_filter =
"(&(sAMAccountName=%{Stripped-User-Name:-%{User-Name}})(memberOf=Admin,DC=chikka,DC=ph))"<BR>
filter =
"(&(sAMAccountName=%{Stripped-User-Name:-%{User-Name}})"<BR><BR>
# set this to 'yes' to use TLS encrypted
connections<BR>
# to the LDAP database by using the StartTLS
extended<BR>
#
operation.<BR>
# The StartTLS operation is supposed to be used with
normal<BR>
# ldap connections instead of using ldaps (port 689)
connections<BR>
start_tls =
no<BR><BR>
# tls_cacertfile =
/path/to/cacert.pem<BR>
# tls_cacertdir =
/path/to/ca/dir/<BR>
# tls_certfile =
/path/to/radius.crt<BR>
# tls_keyfile =
/path/to/radius.key<BR>
# tls_randfile =
/path/to/rnd<BR>
# tls_require_cert =
"demand"<BR><BR>
# default_profile = "cn=radprofile,ou=dialup,o=My
Org,c=UA"<BR>
# profile_attribute =
"radiusProfileDn"<BR>
access_attr = "dialupAccess"<BR><BR>ictionary_mapping =
${raddbdir}/ldap.attrmap<BR><BR>
ldap_connections_number =
5<BR><BR>
#<BR>
# NOTICE: The password_header directive is NOT case
insensitive<BR>
#<BR>
# password_header =
"{clear}"<BR>
#<BR>
# The server can usually figure this out on its own, and
pull<BR>
# the correct User-Password or NT-Password from the
database.<BR>
#<BR>
# Note that NT-Passwords MUST be stored as a 32-digit
hex<BR>
# string, and MUST start off with "0x", such
as:<BR>
#<BR>
#
0x000102030405060708090a0b0c0d0e0f<BR>
#<BR>
# Without the leading "0x", NT-Passwords will not
work.<BR>
# This goes for NT-Passwords stored in SQL,
too.<BR>
#<BR>
# password_attribute =
userPassword<BR>
groupname_attribute =
cn<BR>
groupmembership_filter =
"(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"<BR>
groupmembership_attribute =
memberOf<BR>
timeout =
4<BR>
timelimit =
3<BR>
net_timeout =
1<BR>
# compare_check_items =
yes<BR>
# do_xlat =
yes<BR>
# access_attr_used_for_allow =
yes<BR> }<BR><BR><BR>Here is my the
radiusd -X -A LOG...<BR><BR>rad_recv: Access-Request packet from host <A
href="http://192.168.1.13:37146">192.168.1.13:37146</A>, id=42,
length=59<BR> User-Name =
"myaccount"<BR> User-Password =
"mypass"<BR> NAS-IP-Address = <A
href="http://255.255.255.255">255.255.255.255</A><BR>
NAS-Port = 1812<BR> Processing the authorize section of
radiusd.conf<BR>modcall: entering group authorize for request 0<BR>
modcall[authorize]: module "preprocess" returns ok for request 0<BR>
modcall[authorize]: module "chap" returns noop for request 0<BR>
modcall[authorize]: module "mschap" returns noop for request
0<BR> rlm_realm: No '@' in User-Name = "myaccount", looking
up realm NULL<BR> rlm_realm: No such realm "NULL"<BR>
modcall[authorize]: module "suffix" returns noop for request 0<BR>
rlm_eap: No EAP-Message, not doing EAP<BR> modcall[authorize]: module
"eap" returns noop for request 0<BR> users: Matched DEFAULT
at 152<BR> modcall[authorize]: module "files" returns ok for request
0<BR>modcall: group authorize returns ok for request 0<BR>
rad_check_password: Found Auth-Type ldap<BR>auth: type "LDAP"<BR>
Processing the authenticate section of radiusd.conf<BR>modcall: entering group
Auth-Type for request 0<BR>rlm_ldap: - authenticate<BR>rlm_ldap: login attempt
by "myaccount" with password "mypass"<BR>radius_xlat:
'(&(sAMAccountName=myaccount)'<BR>radius_xlat:
'dc=domain,dc=com'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap:
ldap_get_conn: Got Id: 0<BR>rlm_ldap: attempting LDAP
reconnection<BR>rlm_ldap: (re)connect to <A
href="http://192.168.1.1:389">192.168.1.1:389</A>, authentication
0<BR>rlm_ldap: bind as cn=backops,cn=Admin,dc=domain,dc=com/passofbackops to
<A href="http://192.168.1.1:389">192.168.1.1:389</A><BR>rlm_ldap: waiting for
bind result ...<BR>rlm_ldap: LDAP login failed: check identity, password
settings in ldap section of radiusd.conf<BR>rlm_ldap: (re)connection attempt
failed<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR>
modcall[authenticate]: module "ldap" returns fail for request 0<BR>modcall:
group Auth-Type returns fail for request 0<BR>auth: Failed to validate the
user.<BR>Delaying request 0 for 1 seconds<BR>Finished request 0<BR>Going to
the next request<BR>--- Walking the entire request list ---<BR>Waking up in 1
seconds...<BR>--- Walking the entire request list ---<BR>Sending Access-Reject
of id 42 to <A
href="http://192.168.1.13:37146">192.168.1.13:37146</A><BR>Waking up in 4
seconds...<BR>--- Walking the entire request list ---<BR>Cleaning up request 0
ID 42 with timestamp 43a23bb5<BR>Nothing to do. Sleeping until we see a
request.<BR><BR clear=all><BR>-- <BR>Mike Calizo<BR>Registered Linux User #
365113<BR><BR>_________________________________________________<BR>Even the
longest journey has to start with a small
first-step<BR>
</BLOCKQUOTE><p></p>This message (including any attachments) is confidential, may be privileged and is only intended for the person to whom it is addressed. If you have received it by mistake please notify the sender by return e-mail and delete this message from your system. Any unauthorized use or dissemination of this message in whole or in part is strictly prohibited. E-mail communications are inherently vulnerable to interception by unauthorized parties and are susceptible to change. We will use alternate communication means upon request.</BODY></HTML>