Hola:<BR><BR><B><I>freeradius-users-request@lists.freeradius.org</I></B> wrote: <BLOCKQUOTE class=replbq style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #1010ff 2px solid">Send Freeradius-Users mailing list submissions to<BR>freeradius-users@lists.freeradius.org<BR><BR>To subscribe or unsubscribe via the World Wide Web, visit<BR>http://lists.freeradius.org/mailman/listinfo/freeradius-users<BR>or, via email, send a message with subject or body 'help' to<BR>freeradius-users-request@lists.freeradius.org<BR><BR>You can reach the person managing the list at<BR>freeradius-users-owner@lists.freeradius.org<BR><BR>When replying, please edit your Subject line so it is more specific<BR>than "Re: Contents of Freeradius-Users digest..."<BR><BR><BR>Today's Topics:<BR><BR>1. RE: PAM_RADIUS_AUTH (Sobanbabu Bakthavathsalu)<BR>2. pam_radius_auth updated spec file, please include in future<BR>releases (Florin Andrei)<BR>3. Re: pam_radius_auth updated spec file, please include
in<BR>future releases (Florin Andrei)<BR>4. Cert Problem with EAP-TTSL, SecureW2 (1.0.5-->1.1.7)<BR>(Martin Pauly)<BR><BR><BR>----------------------------------------------------------------------<BR><BR>Message: 1<BR>Date: Tue, 30 Oct 2007 21:31:09 +0530<BR>From: Sobanbabu Bakthavathsalu <SOBANBABU_B@INFOSYS.COM><BR>Subject: RE: PAM_RADIUS_AUTH<BR>To: FreeRadius users mailing list<BR><FREERADIUS-USERS@LISTS.FREERADIUS.ORG><BR>Message-ID:<BR><50E6D895B5B13C4FB2D86D295813A4830CECEC9005@BLRKECMBX05.ad.infosys.com><BR><BR>Content-Type: text/plain; charset="us-ascii"<BR><BR><BR>Hi Nick,<BR><BR>Thank you for the response. There is no firewall in between the RADIUS server and Solaris server (RADIUS client), only an Cisco router with standard ACL. I have verified the ACL matches counter and found that the request from the clinet itself is not reachign the router.<BR>Is that host entries in /etc/hosts file wont work for this, do I need a DNS server for RADIUS server name
authentication to work with pam_radius_auth.<BR><BR>The server in question is not configured for any DNS server for name resolution, it uses the hosts file only.<BR>Hope this provides more information.<BR><BR>Regards<BR>Soban<BR><BR><BR>________________________________________<BR>From: freeradius-users-bounces@lists.freeradius.org [freeradius-users-bounces@lists.freeradius.org] On Behalf Of Nick Owen [nowen@wikidsystems.com]<BR>Sent: 30 October 2007 15:37<BR>To: FreeRadius users mailing list<BR>Subject: Re: PAM_RADIUS_AUTH<BR><BR>On 10/30/07, Sobanbabu Bakthavathsalu <SOBANBABU_B@INFOSYS.COM>wrote:<BR>><BR>> Hi<BR>><BR>> I am trying install the PAM_RADIUS_AUTH on a Solaris 10 server to use RADIUS for user authentication.<BR>> I have managed to successfully compile and install the pam plugin.<BR>> When I tried to telnet to the machine from a different server I am getting the following error.<BR>><BR>> Failed looking up IP address for RADIUS server
radius1 (errcode=12)<BR>><BR>> I have made a host entry for this server name in /etc/hosts file and able to ping the RADIUS server with name.<BR>> But still its not working.<BR>><BR>> Could you please help on resolving this.<BR>><BR>Lots of times this is a firewall issue where the port opening is set<BR>for tcp and not UDP. check that. Check that both are using port<BR>1812, if that is what you are using. Have you edited your telnet pam<BR>entry? I'm not familiar with solaris, but that is what I would check.<BR><BR>More info would be helpful too.<BR><BR>HTH,<BR><BR>Nick<BR><BR>--<BR>--<BR>Nick Owen<BR>WiKID Systems, Inc.<BR>404.962.8983<BR>http://www.wikidsystems.com<BR>Commercial/Open Source Two-Factor Authentication<BR>-<BR>List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html<BR><BR>**************** CAUTION - Disclaimer *****************<BR>This e-mail contains PRIVILEGED AND CONFIDENTIAL INFORMATION intended solely for the use
of the addressee(s). If you are not the intended recipient, please notify the sender by e-mail and delete the original message. Further, you are not to copy, disclose, or distribute this e-mail or its contents to any other person and any such actions are unlawful. This e-mail may contain viruses. Infosys has taken every reasonable precaution to minimize this risk, but is not liable for any damage you may sustain as a result of any virus in this e-mail. You should carry out your own virus checks before opening the e-mail or attachment. Infosys reserves the right to monitor and review the content of all messages sent to or from this e-mail address. Messages sent to or from this e-mail address may be stored on the Infosys e-mail system.<BR>***INFOSYS******** End of Disclaimer ********INFOSYS***<BR><BR><BR><BR>------------------------------<BR><BR>Message: 2<BR>Date: Tue, 30 Oct 2007 09:51:56 -0700<BR>From: Florin Andrei <FLORIN@ANDREI.MYIP.ORG><BR>Subject: pam_radius_auth
updated spec file, please include in future<BR>releases<BR>To: freeradius-users@lists.freeradius.org<BR>Message-ID: <4727612C.8090901@andrei.myip.org><BR>Content-Type: text/plain; charset=ISO-8859-1; format=flowed<BR><BR>I attached an updated spec file for pam_radius_auth. The original one <BR>fails when building as non-root. I fixed that and made a few other minor <BR>changes.<BR><BR>It would be nice if the build system could generate this spec file from <BR>a template, automatically replace the version number inside the spec <BR>with the actual version of the pam_radius_auth tarball, and include the <BR>automatically generated spec in the tarball.<BR>That way, users could generate RPM packages out of the tarball by simply <BR>downloading the archive and running:<BR><BR>rpmbuild -ta pam_radius...(version number here)...tar.gz<BR><BR>Thanks,<BR><BR>-- <BR>Florin Andrei<BR><BR>http://florin.myip.org/<BR><BR><BR>------------------------------<BR><BR>Message: 3<BR>Date:
Tue, 30 Oct 2007 10:04:51 -0700<BR>From: Florin Andrei <FLORIN@ANDREI.MYIP.ORG><BR>Subject: Re: pam_radius_auth updated spec file, please include in<BR>future releases<BR>To: freeradius-users@lists.freeradius.org<BR>Message-ID: <47276433.7080402@andrei.myip.org><BR>Content-Type: text/plain; charset="iso-8859-1"; Format="flowed"<BR><BR>Florin Andrei wrote:<BR>> I attached an updated spec file for pam_radius_auth.<BR><BR>No, I didn't. _Now_ I did. :-/<BR><BR>-- <BR>Florin Andrei<BR><BR>http://florin.myip.org/<BR>-------------- next part --------------<BR>A non-text attachment was scrubbed...<BR>Name: pam_radius_auth.spec<BR>Type: text/x-rpm-spec<BR>Size: 1488 bytes<BR>Desc: not available<BR>Url : <HTTPS: attachment-0001.bin 7ff04458 20071030 attachments freeradius-users pipermail lists.freeradius.org><BR><BR>------------------------------<BR><BR>Message: 4<BR>Date: Tue, 30 Oct 2007 18:15:17 +0100<BR>From: Martin Pauly <PAULY@HRZ.UNI-MARBURG.DE><BR>Subject: Cert
Problem with EAP-TTSL, SecureW2 (1.0.5-->1.1.7)<BR>To: FreeRadius users mailing list<BR><FREERADIUS-USERS@LISTS.FREERADIUS.ORG><BR>Message-ID: <200710301815.18376.pauly@hrz.uni-marburg.de><BR>Content-Type: text/plain; charset="iso-8859-15"<BR><BR>Hi everybody,<BR><BR>I'm trying to upgrade form 1.0.5 to 1.1.7.<BR>For a test run, I copied all the cert and key files <BR>(only server-side, it's TTLS) from the production server,<BR>and 1.1.7 starts up fine (well, almost, see below). <BR>When connecting with a SecureW2 client that goes along<BR>well with the 1.0.5 server, I get a dialog window<BR>presenting the cert, but SecureW2 complains it's <BR>unable to put it into the hierarchy (which is in <BR>place already). There is no way to go on then,<BR>installing manually won't work either.<BR><BR>Have I missed some change in the cert handling?<BR><BR>Thanks for any help<BR>Martin<BR><BR>Here's the output:<BR><BR>Starting - reading configuration files ...<BR>reread_config:
reading radiusd.conf<BR>Config: including file: /etc/freeradius/proxy.conf<BR>Config: including file: /etc/freeradius/clients.conf<BR>Config: including file: /etc/freeradius/snmp.conf<BR>Config: including file: /etc/freeradius/eap.conf<BR>Config: including file: /etc/freeradius/sql.conf<BR>main: prefix = "/usr"<BR>main: localstatedir = "/var"<BR>main: logdir = "/var/log/freeradius"<BR>main: libdir = "/usr/lib/freeradius"<BR>main: radacctdir = "/var/log/freeradius/radacct"<BR>main: hostname_lookups = no<BR>main: snmp = no<BR>main: max_request_time = 30<BR>main: cleanup_delay = 5<BR>main: max_requests = 1024<BR>main: delete_blocked_requests = 0<BR>main: port = 0<BR>main: allow_core_dumps = no<BR>main: log_stripped_names = no<BR>main: log_file = "/var/log/freeradius/radius.log"<BR>main: log_auth = no<BR>main: log_auth_badpass = no<BR>main: log_auth_goodpass = no<BR>main: pidfile = "/var/run/freeradius/freeradius.pid"<BR>main: user = "freerad"<BR>main: group =
"freerad"<BR>main: usercollide = no<BR>main: lower_user = "no"<BR>main: lower_pass = "no"<BR>main: nospace_user = "no"<BR>main: nospace_pass = "no"<BR>main: checkrad = "/usr/sbin/checkrad"<BR>main: proxy_requests = yes<BR>proxy: retry_delay = 5<BR>proxy: retry_count = 3<BR>proxy: synchronous = no<BR>proxy: default_fallback = yes<BR>proxy: dead_time = 120<BR>proxy: post_proxy_authorize = no<BR>proxy: wake_all_if_all_dead = no<BR>security: max_attributes = 200<BR>security: reject_delay = 1<BR>security: status_server = no<BR>main: debug_level = 0<BR>read_config_files: reading dictionary<BR>read_config_files: reading naslist<BR>Using deprecated naslist file. Support for this will go away soon.<BR>read_config_files: reading clients<BR>read_config_files: reading realms<BR>radiusd: entering modules setup<BR>Module: Library search path is /usr/lib/freeradius<BR>Module: Loaded exec<BR>exec: wait = yes<BR>exec: program = "(null)"<BR>exec: input_pairs = "request"<BR>exec:
output_pairs = "(null)"<BR>exec: packet_type = "(null)"<BR>rlm_exec: Wait=yes but no output defined. Did you mean output=none?<BR>Module: Instantiated exec (exec)<BR>Module: Loaded expr<BR>Module: Instantiated expr (expr)<BR>Module: Loaded PAP<BR>pap: encryption_scheme = "crypt"<BR>pap: auto_header = yes<BR>Module: Instantiated pap (pap)<BR>Module: Loaded CHAP<BR>Module: Instantiated chap (chap)<BR>Module: Loaded MS-CHAP<BR>mschap: use_mppe = yes<BR>mschap: require_encryption = no<BR>mschap: require_strong = no<BR>mschap: with_ntdomain_hack = no<BR>mschap: passwd = "(null)"<BR>mschap: ntlm_auth = "(null)"<BR>Module: Instantiated mschap (mschap)<BR>Module: Loaded System<BR>unix: cache = no<BR>unix: passwd = "(null)"<BR>unix: shadow = "/etc/shadow"<BR>unix: group = "(null)"<BR>unix: radwtmp = "/var/log/freeradius/radwtmp"<BR>unix: usegroup = no<BR>unix: cache_reload = 600<BR>Module: Instantiated unix (unix)<BR>Module: Loaded eap<BR>eap: default_eap_type = "ttls"<BR>eap:
timer_expire = 60<BR>eap: ignore_unknown_eap_types = no<BR>eap: cisco_accounting_username_bug = no<BR>tls: rsa_key_exchange = no<BR>tls: dh_key_exchange = yes<BR>tls: rsa_key_length = 512<BR>tls: dh_key_length = 512<BR>tls: verify_depth = 0<BR>tls: CA_path = "(null)"<BR>tls: pem_file_type = yes<BR>tls: private_key_file = "/etc/freeradius/certs/key-radius-staff.pem"<BR>tls: certificate_file = "/etc/freeradius/certs/cert-radius-staff.pem"<BR>tls: CA_file = "/etc/freeradius/certs/unimr-ssl-ca.pem"<BR>tls: private_key_password = "omihnl"<BR>tls: dh_file = "/etc/freeradius/certs/dh"<BR>tls: random_file = "/dev/urandom"<BR>tls: fragment_size = 1024<BR>tls: include_length = yes<BR>tls: check_crl = no<BR>tls: check_cert_cn = "(null)"<BR>tls: cipher_list = "(null)"<BR>tls: check_cert_issuer = "(null)"<BR>rlm_eap_tls: Loading the certificate file as a chain<BR>WARNING: rlm_eap_tls: Unable to set DH parameters. DH cipher suites may not work!<BR>WARNING: Fix this by running the
OpenSSL command listed in eap.conf<BR>rlm_eap: Loaded and initialized type tls<BR>ttls: default_eap_type = "md5"<BR>ttls: copy_request_to_tunnel = yes<BR>ttls: use_tunneled_reply = yes<BR>rlm_eap: Loaded and initialized type ttls<BR>Module: Instantiated eap (eap)<BR>Module: Loaded preprocess<BR>preprocess: huntgroups = "/etc/freeradius/huntgroups"<BR>preprocess: hints = "/etc/freeradius/hints"<BR>preprocess: with_ascend_hack = no<BR>preprocess: ascend_channels_per_line = 23<BR>preprocess: with_ntdomain_hack = no<BR>preprocess: with_specialix_jetstream_hack = no<BR>preprocess: with_cisco_vsa_hack = no<BR>preprocess: with_alvarion_vsa_hack = no<BR>Module: Instantiated preprocess (preprocess)<BR>Module: Loaded realm<BR>realm: format = "suffix"<BR>realm: delimiter = "@"<BR>realm: ignore_default = no<BR>realm: ignore_null = no<BR>Module: Instantiated realm (suffix)<BR>Module: Loaded files<BR>files: usersfile = "/etc/freeradius/users"<BR>files: acctusersfile =
"/etc/freeradius/acct_users"<BR>files: preproxy_usersfile = "/etc/freeradius/preproxy_users"<BR>files: compat = "no"<BR>Module: Instantiated files (files)<BR>Module: Loaded Acct-Unique-Session-Id<BR>acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"<BR>Module: Instantiated acct_unique (acct_unique)<BR>Module: Loaded detail<BR>detail: detailfile = "/var/log/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"<BR>detail: detailperm = 384<BR>detail: dirperm = 493<BR>detail: locking = no<BR>Module: Instantiated detail (detail)<BR>Module: Loaded radutmp<BR>radutmp: filename = "/var/log/freeradius/radutmp"<BR>radutmp: username = "%{User-Name}"<BR>radutmp: case_sensitive = yes<BR>radutmp: check_with_nas = yes<BR>radutmp: perm = 384<BR>radutmp: callerid = yes<BR>Module: Instantiated radutmp (radutmp)<BR>Listening on authentication *:1812<BR>Listening on accounting *:1813<BR>Ready to process
requests.<BR><BR><BR>--------------------------- Now the EAP conversation ----------------------------<BR><BR>rad_recv: Access-Request packet from host 192.168.75.247:1645, id=47, length=136<BR>User-Name = "anonymous"<BR>Framed-MTU = 1400<BR>Called-Station-Id = "0013.8011.9a60"<BR>Calling-Station-Id = "0018.decc.af5f"<BR>Service-Type = Login-User<BR>Message-Authenticator = 0xfca416db4cadc5cd8d623f4ffa044a8c<BR>EAP-Message = 0x0202000e01616e6f6e796d6f7573<BR>NAS-Port-Type = Wireless-802.11<BR>NAS-Port = 1077<BR>NAS-IP-Address = 192.168.75.247<BR>NAS-Identifier = "warz003"<BR>Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 3<BR>modcall[authorize]: module "preprocess" returns ok for request 3<BR>modcall[authorize]: module "chap" returns noop for request 3<BR>modcall[authorize]: module "mschap" returns noop for request 3<BR>rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL<BR>rlm_realm: Found realm
"NULL"<BR>rlm_realm: Adding Stripped-User-Name = "anonymous"<BR>rlm_realm: Proxying request from user anonymous to realm NULL<BR>rlm_realm: Adding Realm = "NULL"<BR>rlm_realm: Authentication realm is LOCAL.<BR>modcall[authorize]: module "suffix" returns noop for request 3<BR>rlm_eap: EAP packet type response id 2 length 14<BR>rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR>modcall[authorize]: module "eap" returns updated for request 3<BR>modcall[authorize]: module "files" returns notfound for request 3<BR>rlm_pap: WARNING! No "known good" password found for the user. Authentication may fail because of this.<BR>modcall[authorize]: module "pap" returns noop for request 3<BR>modcall: leaving group authorize (returns updated) for request 3<BR>rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR>Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 3<BR>rlm_eap: EAP Identity<BR>rlm_eap: processing
type tls<BR>rlm_eap_tls: Initiate<BR>rlm_eap_tls: Start returned 1<BR>modcall[authenticate]: module "eap" returns handled for request 3<BR>modcall: leaving group authenticate (returns handled) for request 3<BR>Sending Access-Challenge of id 47 to 192.168.75.247 port 1645<BR>EAP-Message = 0x010300061520<BR>Message-Authenticator = 0x00000000000000000000000000000000<BR>State = 0x90e816dcec17882e035976d1081fbf9c<BR>Finished request 3<BR>Going to the next request<BR>--- Walking the entire request list ---<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.75.247:1645, id=48, length=200<BR>User-Name = "anonymous"<BR>Framed-MTU = 1400<BR>Called-Station-Id = "0013.8011.9a60"<BR>Calling-Station-Id = "0018.decc.af5f"<BR>Service-Type = Login-User<BR>Message-Authenticator = 0x47f848aca44779c6fe8451fd18e46ec8<BR>EAP-Message =
0x0203003c158000000032160301002d01000029030118e9b132c7808e219ee90a0861130998e95ddde2e6cc192ebf55af97907d967d000002000a0100<BR>NAS-Port-Type = Wireless-802.11<BR>NAS-Port = 1077<BR>State = 0x90e816dcec17882e035976d1081fbf9c<BR>NAS-IP-Address = 192.168.75.247<BR>NAS-Identifier = "warz003"<BR>Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 4<BR>modcall[authorize]: module "preprocess" returns ok for request 4<BR>modcall[authorize]: module "chap" returns noop for request 4<BR>modcall[authorize]: module "mschap" returns noop for request 4<BR>rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL<BR>rlm_realm: Found realm "NULL"<BR>rlm_realm: Adding Stripped-User-Name = "anonymous"<BR>rlm_realm: Proxying request from user anonymous to realm NULL<BR>rlm_realm: Adding Realm = "NULL"<BR>rlm_realm: Authentication realm is LOCAL.<BR>modcall[authorize]: module "suffix" returns noop for request 4<BR>rlm_eap: EAP packet type
response id 3 length 60<BR>rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR>modcall[authorize]: module "eap" returns updated for request 4<BR>modcall[authorize]: module "files" returns notfound for request 4<BR>rlm_pap: WARNING! No "known good" password found for the user. Authentication may fail because of this.<BR>modcall[authorize]: module "pap" returns noop for request 4<BR>modcall: leaving group authorize (returns updated) for request 4<BR>rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR>Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 4<BR>rlm_eap: Request found, released from the list<BR>rlm_eap: EAP/ttls<BR>rlm_eap: processing type ttls<BR>rlm_eap_ttls: Authenticate<BR>rlm_eap_tls: processing TLS<BR>rlm_eap_tls: Length Included<BR>eaptls_verify returned 11<BR>(other): before/accept initialization<BR>TLS_accept: before/accept initialization<BR>rlm_eap_tls: <<< TLS 1.0
Handshake [length 002d], ClientHello<BR>TLS_accept: SSLv3 read client hello A<BR>rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello<BR>TLS_accept: SSLv3 write server hello A<BR>rlm_eap_tls: >>> TLS 1.0 Handshake [length 06c4], Certificate<BR>TLS_accept: SSLv3 write certificate A<BR>rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone<BR>TLS_accept: SSLv3 write server done A<BR>TLS_accept: SSLv3 flush data<BR>TLS_accept: Need to read more data: SSLv3 read client certificate A<BR>In SSL Handshake Phase<BR>In SSL Accept mode<BR>eaptls_process returned 13<BR>modcall[authenticate]: module "eap" returns handled for request 4<BR>modcall: leaving group authenticate (returns handled) for request 4<BR>Sending Access-Challenge of id 48 to 192.168.75.247 port 1645<BR>EAP-Message =
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<BR>EAP-Message =
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<BR>EAP-Message =
0x06092a864886f70d010101050003818d0030818902818100a7b25329a57dcf9f4045f7ca2582b5dfd6c8979bdf109e1cc8acd71fd527c570f0b01e088a4cd1ad922dfa7dece1be7cf36f8b6557008ecc84335d15a02852639b27f38ae4da2adcde274eb0c678c88b7fa1491f9aeda8c817362cf263c13fe3a93377eff7dfa5fda65aa8865f21a757c93c0352b1ea493994cbac1ad290687d0203010001a38203733082036f300c0603551d130101ff04023000300b0603551d0f0404030205a030130603551d25040c300a06082b06010505070301301d0603551d0e04160414a103cee748c398670ec57153cf72f7429b6568533081dc0603551d2304<BR>EAP-Message =
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<BR><BR>=== message truncated ===</BLOCKQUOTE><BR><BR><BR><DIV><STRONG><EM><FONT face="times new roman"> CON CARIÑO</FONT></EM></STRONG></DIV>
<DIV><FONT face="times new roman"><EM><STRONG><U>MARIBEL HERNÁNDEZ LÓPEZ</U></STRONG></EM></FONT></DIV>
<DIV><FONT face="Times New Roman"><STRONG><EM> <IMG src="http://us.i1.yimg.com/us.yimg.com/i/mesg/tsmileys2/40.gif"></EM></STRONG></FONT></DIV><p> __________________________________________________<br>Do You Yahoo!?<br>Tired of spam? Yahoo! Mail has the best spam protection around <br>http://mail.yahoo.com