Fwd: How to configure RADIUS +LDAP using SASL/Certificate based binding instead of usernames and passwords
John Dennis
jdennis at redhat.com
Tue Apr 9 14:11:29 CEST 2013
On 04/09/2013 03:44 AM, pramod kulkarni wrote:
> Hi,
> I am working on RADIUS with LDAP as backend for authenticating users.
> I configured rlm_ldap on RADIUS server with username and plaintext
> password and I am able to authenticate RADIUS client using LDAP.
There is a difference between using LDAP as a backend datastore (lookup
passwords and password hashes after binding as a service) and using LDAP
as a authentication oracle (binding as the user to determine if the user
is authenticated depending on the bind result). From above it sounds
like you've configured LDAP as a backend datastore.
> But I want to configure RADIUS server with certificates instead of using
> usernames and passwords.
> Please guide me how to achieve this,is there any help/doc how to
> configure LDAP SASL bind for RADIUS Server.
> Waiting for your inputs.
> Thanks and Regards,
You can't with the current rlm_ldap module bind to the LDAP server with
anything other than a (username, password) pair, either for lookups or
for authentication testing (only ldap_connect and ldap_simple_bind are
supported).
However, rlm_ldap does support SSL/TLS connections to the LDAP server
and you can specify that you want the LDAP server to request a client
cert when establishing the connection. But ultimately you're still doing
a simple bind albeit in a secure tunnel. If you specify you want the
LDAP server to require a client cert then you effectively have two
simultaneous authtication mechanisms in play (TLS for the tunnel and
simple auth inside the tunnel). Setting up TLS auth is straight forward
(see the options in raddb/modules/ldap) *except* for the fact the ldap
library routines to set the require cert option are buggy (rlm_ldap uses
the wrong entry point which may not be supported and the openldap
library also has bugs, I think we've now got all these fixed and patches
sent upstream to openldap, but you should be aware there is an
reasonable chance it won't work on your distribution unless you've got
patched libraries).
Even if SASL binds were supported you wouldn't want to use SASL binds
for user authentication (if that was what you were asking, it's not
clear from your original post). For user authentication based on
certificates you would use EAP-TLS.
A long time ago I had a patch for using SASL binds, but it was against
the old 1.1.7 version of rlm_ldap and it only supported GSSAPI.
HTH,
John
--
John Dennis <jdennis at redhat.com>
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
More information about the Freeradius-Devel
mailing list