Another LDAP/RADIUS integration problem.

Tom Leach leach at coas.oregonstate.edu
Mon Jul 26 19:43:00 CEST 2010


Alan, I changed the ldap.attrmap file from "checkItem Crypt-Password 
userPassword" to "checkItem User-Password userPassword" and it's 
authenticating now, but I now have a new message in the debug output and 
I'm not sure if it's a problem, suggestion, or otherwise.  I can't 
change the LDAP directory to contain actual cleartext passwords, so it 
may just be something that I have to live with.
It is working, I'm just trying to squash the last message...
Thanks,
Tom

<removed most of the -X output, it's the same as the original below>
   [ldap-server1] waiting for bind result ...
   [ldap-server1] Bind was successful
   [ldap-server1] performing search in ou=People,o=mydomain, with filter 
(uid=testuser)
[ldap-server1] Added Crypt-Password = 4gOgBZqZgtwIw in check items
[ldap-server1] looking for check items in directory...
   [ldap-server1] userPassword -> User-Password == "{crypt}4gOgBZqZgtwIw"
[ldap-server1] looking for reply items in directory...
[ldap-server1] user testuser authorized to use remote access
   [ldap-server1] ldap_release_conn: Release Id: 0
++[ldap-server1] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns updated
Found Auth-Type = PAP
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!! Replacing User-Password in config items with Cleartext-Password. !!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!! Please update your configuration so that the "known good"        !!!
!!! clear text password is in Cleartext-Password, and not in 
User-Password. !!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
+- entering group PAP {...}
[pap] login attempt with password "testpasswd"
[pap] Using CRYPT encryption.
[pap] User authenticated successfully
++[pap] returns ok
Login OK: [testuser] (from client MSM765zl port 1 cli D8-30-62-6C-70-61)
+- entering group post-auth {...}
++[exec] returns noop
Sending Access-Accept of id 224 to 172.19.65.101 port 32775
         Framed-Protocol = PPP
         Framed-Compression = Van-Jacobson-TCP-IP
Finished request 0.



On 23 Jul 2010 20:59:00 +0200, Alan DeKok wrote:
Tom Leach wrote:
 >> To correct the bind problem, I added an ACL to the directory to
 >> allow 'uid=admin,o=radtree' to access the userPassword attribute,
 >> then configured the ldap module to use 'uid=admin,o=radtree' as the
 >> identity and 'secret' as the password.  Now the bind succeeds, the
 >> -X output says that it's mapping userPassword -> Crypt-Password ==
 >> "{crypt}4gOgBZqZgtwIw"
 >
 >  The "Crypt-Password" attribute is supposed to be the crypt'd version
 > of the password *without* the "{crypt}" header.  Change the mapping
 > from "userPassword -> Crypt-Password" to "userPassword ->
 > User-Password", and it will work.
 >
 >  The PAP module will look for the "{crypt}" header, and create a
 >Crypt-Password with the appropriate value.
 >
 >  Alan DeKok.


On 07/23/2010 11:36 AM, Tom Leach wrote:
> OK, I had LDAP 'working' but radiusd -X was showing the old 'WARNING: No 
> "known good" password was found in LDAP' errors.  Ignoring much of the 
> 'wisdom' on other sites to just ignore the error, I'm trying to squash 
> all errors from the -X output.  It was failing because the bind failed 
> (due to a bad 'identity' line in the ldap module config), thus it didn't 
> find a userPassword from LDAP, causing PAP to be skipped but since I had 
> the 'ldap' module in the authenticate section of the sites file, it 
> attempted to bind with the username/password supplied from the NAS to 
> the ldap directory which worked, thus Accept-Accept was given.
> 
> To correct the bind problem, I added an ACL to the directory to allow 
> 'uid=admin,o=radtree' to access the userPassword attribute, then 
> configured the ldap module to use 'uid=admin,o=radtree' as the identity 
> and 'secret' as the password.  Now the bind succeeds, the -X output says 
> that it's mapping userPassword -> Crypt-Password == 
> "{crypt}4gOgBZqZgtwIw" (if I bind to the directory and search as 
> uid=admin,o=radtree for the testuser account, the userPassword returned 
> (after base64 decoding) is {crypt}4gOgBZqZgtwIw.  If I run 
> 'testpassword' with a salt of '4g' through the crypt(3) subroutine, I 
> get '4gOgBZqZgtwIw', so the directory contains the correct password), I 
> have "checkItem Crypt-Password userPassword" in the dictionary for this 
> ldap module.
> 
> Anyway, I'm still seeing one of the 'No "known good" password' errors 
> and PAP is failing because the passwords don't match, and I'm not sure 
> where the problem lies (obviously, the passwords don't match, but 
> _why_).  It looks like I'm getting the correct encrypted password back 
> from the directory, and PAP is reporting a login attempt with the 
> correct password....
> 
> The ldap module config (comments stripped out):
> ldap ldap-server1 {
>         server = "ldap://server1.coas.oregonstate.edu"
>         port = 389
>         start_tls = yes
>         identity = "uid=admin,o=radtree"
>         password = secret
>         basedn = "ou=People,o=mydomain"
>         filter = "(uid=%{%{Stripped-User-Name}:-%{User-Name}})"
>         ldap_connections_number = 5
>         timeout = 4
>         timelimit = 3
>         net_timeout = 1
>         tls {
>                 start_tls = yes
>                 cacertdir               = /etc/pki/tls/certs/
>                 require_cert    = "demand"
>         }
>         dictionary_mapping = ${confdir}/ldap.pap.attrmap
>         edir_account_policy_check = no
> # note, I've also removed the following two lines.
>         password_attribute = userPassword
>         auto_header = yes
> }
> 
> 
> The ldap module dictionary (ldap.pap.attrmap, a copy of ldap.attrmap 
> with the addition of the following line):
> checkItem       Crypt-Password                  userPassword
> 
> 
> radius -X output:
> FreeRADIUS Version 2.1.9, for host x86_64-unknown-linux-gnu, built on 
> Jun 10 2010 at 15:26:46
> Copyright (C) 1999-2009 The FreeRADIUS server project and contributors.
> There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
> PARTICULAR PURPOSE.
> You may redistribute copies of FreeRADIUS under the terms of the
> GNU General Public License v2.
> Starting - reading configuration files ...
> including configuration file /usr/local/etc/raddb/radiusd.conf
> including configuration file /usr/local/etc/raddb/proxy.conf
> including configuration file /usr/local/etc/raddb/clients.conf
> including files in directory /usr/local/etc/raddb/modules/
> including configuration file /usr/local/etc/raddb/modules/etc_group
> including configuration file 
> /usr/local/etc/raddb/modules/detail.example.com
> including configuration file /usr/local/etc/raddb/modules/smbpasswd
> including configuration file /usr/local/etc/raddb/modules/linelog
> including configuration file /usr/local/etc/raddb/modules/digest
> including configuration file /usr/local/etc/raddb/modules/detail
> including configuration file 
> /usr/local/etc/raddb/modules/sqlcounter_expire_on_login
> including configuration file /usr/local/etc/raddb/modules/chap
> including configuration file /usr/local/etc/raddb/modules/acct_unique
> including configuration file /usr/local/etc/raddb/modules/files
> including configuration file /usr/local/etc/raddb/modules/expiration
> including configuration file /usr/local/etc/raddb/modules/perl
> including configuration file /usr/local/etc/raddb/modules/mschap
> including configuration file /usr/local/etc/raddb/modules/pap
> including configuration file /usr/local/etc/raddb/modules/mac2vlan
> including configuration file /usr/local/etc/raddb/modules/expr
> including configuration file 
> /usr/local/etc/raddb/modules/ldap-hudson-radius
> including configuration file /usr/local/etc/raddb/modules/smsotp
> including configuration file /usr/local/etc/raddb/modules/attr_rewrite
> including configuration file /usr/local/etc/raddb/modules/preprocess
> including configuration file /usr/local/etc/raddb/modules/sql_log
> including configuration file /usr/local/etc/raddb/modules/mac2ip
> including configuration file /usr/local/etc/raddb/modules/unix
> including configuration file /usr/local/etc/raddb/modules/wimax
> including configuration file 
> /usr/local/etc/raddb/modules/ldap-server1-radius
> including configuration file /usr/local/etc/raddb/modules/ippool
> including configuration file /usr/local/etc/raddb/modules/ldap-server1
> including configuration file /usr/local/etc/raddb/modules/counter
> including configuration file /usr/local/etc/raddb/modules/krb5
> including configuration file /usr/local/etc/raddb/modules/attr_filter
> including configuration file /usr/local/etc/raddb/modules/detail.log
> including configuration file /usr/local/etc/raddb/modules/always
> including configuration file /usr/local/etc/raddb/modules/radutmp
> including configuration file /usr/local/etc/raddb/modules/checkval
> including configuration file /usr/local/etc/raddb/modules/ldap-hudson
> including configuration file /usr/local/etc/raddb/modules/cui
> including configuration file /usr/local/etc/raddb/modules/policy
> including configuration file /usr/local/etc/raddb/modules/pam
> including configuration file /usr/local/etc/raddb/modules/echo
> including configuration file /usr/local/etc/raddb/modules/ntlm_auth
> including configuration file /usr/local/etc/raddb/modules/inner-eap
> including configuration file /usr/local/etc/raddb/modules/logintime
> including configuration file /usr/local/etc/raddb/modules/passwd
> including configuration file /usr/local/etc/raddb/modules/exec
> including configuration file /usr/local/etc/raddb/modules/realm
> including configuration file /usr/local/etc/raddb/modules/otp
> including configuration file /usr/local/etc/raddb/modules/sradutmp
> including configuration file /usr/local/etc/raddb/eap.conf
> including configuration file /usr/local/etc/raddb/policy.conf
> including files in directory /usr/local/etc/raddb/sites-enabled/
> including configuration file 
> /usr/local/etc/raddb/sites-enabled/inner-tunnel
> including configuration file /usr/local/etc/raddb/sites-enabled/default
> including configuration file 
> /usr/local/etc/raddb/sites-enabled/control-socket
> main {
>         user = "radiusd"
>         group = "radiusd"
>         allow_core_dumps = no
> }
> including dictionary file /usr/local/etc/raddb/dictionary
> main {
>         prefix = "/usr/local"
>         localstatedir = "/var"
>         logdir = "/var/log/radius"
>         libdir = "/usr/local/lib"
>         radacctdir = "/var/log/radius/radacct"
>         hostname_lookups = no
>         max_request_time = 60
>         cleanup_delay = 5
>         max_requests = 10240
>         pidfile = "/var/run/radiusd/radiusd.pid"
>         checkrad = "/usr/local/sbin/checkrad"
>         debug_level = 0
>         proxy_requests = yes
>  log {
>         stripped_names = no
>         auth = yes
>         auth_badpass = yes
>         auth_goodpass = no
>  }
>  security {
>         max_attributes = 200
>         reject_delay = 1
>         status_server = yes
>  }
> }
> radiusd: #### Loading Realms and Home Servers ####
>  proxy server {
>         retry_delay = 5
>         retry_count = 3
>         default_fallback = no
>         dead_time = 120
>         wake_all_if_all_dead = no
>  }
>  home_server localhost {
>         ipaddr = 127.0.0.1
>         port = 1812
>         type = "auth"
>         secret = "testing123"
>         response_window = 20
>         max_outstanding = 65536
>         require_message_authenticator = no
>         zombie_period = 40
>         status_check = "status-server"
>         ping_interval = 30
>         check_interval = 30
>         num_answers_to_alive = 3
>         num_pings_to_alive = 3
>         revive_interval = 120
>         status_check_timeout = 4
>         irt = 2
>         mrt = 16
>         mrc = 5
>         mrd = 30
>  }
>  home_server_pool my_auth_failover {
>         type = fail-over
>         home_server = localhost
>  }
>  realm example.com {
>         auth_pool = my_auth_failover
>  }
>  realm LOCAL {
>  }
> radiusd: #### Loading Clients ####
>  client localhost {
>         ipaddr = 127.0.0.1
>         require_message_authenticator = no
>         secret = "testing123"
>         nastype = "other"
>  }
>  client 172.19.65.101 {
>         require_message_authenticator = no
>         secret = "secret"
>         shortname = "MSM765zl"
>  }
>  client 172.19.72.22 {
>         require_message_authenticator = no
>         secret = "secret"
>         shortname = "HPTest"
>  }
> radiusd: #### Instantiating modules ####
>  instantiate {
>  Module: Linked to module rlm_exec
>  Module: Instantiating exec
>   exec {
>         wait = no
>         input_pairs = "request"
>         shell_escape = yes
>   }
>  Module: Linked to module rlm_expr
>  Module: Instantiating expr
>  Module: Linked to module rlm_expiration
>  Module: Instantiating expiration
>   expiration {
>         reply-message = "Password Has Expired  "
>   }
>  Module: Linked to module rlm_logintime
>  Module: Instantiating logintime
>   logintime {
>         reply-message = "You are calling outside your allowed timespan  "
>         minimum-timeout = 60
>   }
>  }
> radiusd: #### Loading Virtual Servers ####
> server inner-tunnel {
>  modules {
>  Module: Checking authenticate {...} for more modules to load
>  Module: Linked to module rlm_pap
>  Module: Instantiating pap
>   pap {
>         encryption_scheme = "auto"
>         auto_header = no
>   }
>  Module: Linked to module rlm_chap
>  Module: Instantiating chap
>  Module: Linked to module rlm_mschap
>  Module: Instantiating mschap
>   mschap {
>         use_mppe = yes
>         require_encryption = no
>         require_strong = no
>         with_ntdomain_hack = no
>   }
>  Module: Linked to module rlm_unix
>  Module: Instantiating unix
>   unix {
>         radwtmp = "/var/log/radius/radwtmp"
>   }
>  Module: Linked to module rlm_eap
>  Module: Instantiating eap
>   eap {
>         default_eap_type = "md5"
>         timer_expire = 60
>         ignore_unknown_eap_types = no
>         cisco_accounting_username_bug = no
>         max_sessions = 4096
>   }
>  Module: Linked to sub-module rlm_eap_md5
>  Module: Instantiating eap-md5
>  Module: Linked to sub-module rlm_eap_leap
>  Module: Instantiating eap-leap
>  Module: Linked to sub-module rlm_eap_gtc
>  Module: Instantiating eap-gtc
>    gtc {
>         challenge = "Password: "
>         auth_type = "PAP"
>    }
>  Module: Linked to sub-module rlm_eap_tls
>  Module: Instantiating eap-tls
>    tls {
>         rsa_key_exchange = no
>         dh_key_exchange = yes
>         rsa_key_length = 512
>         dh_key_length = 512
>         verify_depth = 0
>         pem_file_type = yes
>         private_key_file = "/usr/local/etc/raddb/certs/server.pem"
>         certificate_file = "/usr/local/etc/raddb/certs/server.pem"
>         CA_file = "/usr/local/etc/raddb/certs/ca.pem"
>         private_key_password = "whatever"
>         dh_file = "/usr/local/etc/raddb/certs/dh"
>         random_file = "/usr/local/etc/raddb/certs/random"
>         fragment_size = 1024
>         include_length = yes
>         check_crl = no
>         cipher_list = "DEFAULT"
>         make_cert_command = "/usr/local/etc/raddb/certs/bootstrap"
>     cache {
>         enable = no
>         lifetime = 24
>         max_entries = 255
>     }
>    }
>  Module: Linked to sub-module rlm_eap_ttls
>  Module: Instantiating eap-ttls
>    ttls {
>         default_eap_type = "md5"
>         copy_request_to_tunnel = no
>         use_tunneled_reply = no
>         virtual_server = "inner-tunnel"
>         include_length = yes
>    }
>  Module: Linked to sub-module rlm_eap_peap
>  Module: Instantiating eap-peap
>    peap {
>         default_eap_type = "mschapv2"
>         copy_request_to_tunnel = no
>         use_tunneled_reply = no
>         proxy_tunneled_request_as_eap = yes
>         virtual_server = "inner-tunnel"
>    }
>  Module: Linked to sub-module rlm_eap_mschapv2
>  Module: Instantiating eap-mschapv2
>    mschapv2 {
>         with_ntdomain_hack = no
>    }
>  Module: Checking authorize {...} for more modules to load
>  Module: Linked to module rlm_realm
>  Module: Instantiating suffix
>   realm suffix {
>         format = "suffix"
>         delimiter = "@"
>         ignore_default = no
>         ignore_null = no
>   }
>  Module: Linked to module rlm_files
>  Module: Instantiating files
>   files {
>         usersfile = "/usr/local/etc/raddb/users"
>         acctusersfile = "/usr/local/etc/raddb/acct_users"
>         preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
>         compat = "no"
>   }
>  Module: Checking session {...} for more modules to load
>  Module: Linked to module rlm_radutmp
>  Module: Instantiating radutmp
>   radutmp {
>         filename = "/var/log/radius/radutmp"
>         username = "%{User-Name}"
>         case_sensitive = yes
>         check_with_nas = yes
>         perm = 384
>         callerid = yes
>   }
>  Module: Checking post-proxy {...} for more modules to load
>  Module: Checking post-auth {...} for more modules to load
>  Module: Linked to module rlm_attr_filter
>  Module: Instantiating attr_filter.access_reject
>   attr_filter attr_filter.access_reject {
>         attrsfile = "/usr/local/etc/raddb/attrs.access_reject"
>         key = "%{User-Name}"
>   }
>  } # modules
> } # server
> server {
>  modules {
>  Module: Checking authenticate {...} for more modules to load
>  Module: Linked to module rlm_ldap
>  Module: Instantiating ldap-server1
>   ldap ldap-server1 {
>         server = "ldap://server1.coas.oregonstate.edu"
>         port = 389
>         password = "secret"
>         identity = "uid=admin,o=radtree"
>         net_timeout = 1
>         timeout = 4
>         timelimit = 3
>         tls_mode = no
>         start_tls = yes
>         tls_require_cert = "allow"
>    tls {
>         start_tls = yes
>         cacertdir = "/etc/pki/tls/certs/"
>         require_cert = "demand"
>    }
>         basedn = "ou=People,o=mydomain"
>         filter = "(uid=%{%{Stripped-User-Name}:-%{User-Name}})"
>         base_filter = "(objectclass=radiusprofile)"
>         password_attribute = "userPassword"
>         auto_header = yes
>         access_attr_used_for_allow = yes
>         groupname_attribute = "cn"
>         groupmembership_filter = 
> "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))" 
> 
>         dictionary_mapping = "/usr/local/etc/raddb/ldap.pap.attrmap"
>         ldap_debug = 0
>         ldap_connections_number = 5
>         compare_check_items = no
>         do_xlat = yes
>         set_auth_type = yes
>   }
> rlm_ldap: Registering ldap_groupcmp for Ldap-Group
> rlm_ldap: Creating new attribute ldap-server1-Ldap-Group
> rlm_ldap: Registering ldap_groupcmp for ldap-server1-Ldap-Group
> rlm_ldap: Registering ldap_xlat with xlat_name ldap-server1
> rlm_ldap: reading ldap<->radius mappings from file 
> /usr/local/etc/raddb/ldap.pap.attrmap
> rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
> rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
> rlm_ldap: LDAP radiusAuthType mapped to RADIUS Auth-Type
> rlm_ldap: LDAP radiusSimultaneousUse mapped to RADIUS Simultaneous-Use
> rlm_ldap: LDAP radiusCalledStationId mapped to RADIUS Called-Station-Id
> rlm_ldap: LDAP radiusCallingStationId mapped to RADIUS Calling-Station-Id
> rlm_ldap: LDAP lmPassword mapped to RADIUS LM-Password
> rlm_ldap: LDAP ntPassword mapped to RADIUS NT-Password
> rlm_ldap: LDAP sambaLmPassword mapped to RADIUS LM-Password
> rlm_ldap: LDAP sambaNtPassword mapped to RADIUS NT-Password
> rlm_ldap: LDAP dBCSPwd mapped to RADIUS LM-Password
> rlm_ldap: LDAP userPassword mapped to RADIUS Crypt-Password
> rlm_ldap: LDAP acctFlags mapped to RADIUS SMB-Account-CTRL-TEXT
> rlm_ldap: LDAP radiusExpiration mapped to RADIUS Expiration
> rlm_ldap: LDAP radiusNASIpAddress mapped to RADIUS NAS-IP-Address
> rlm_ldap: LDAP radiusServiceType mapped to RADIUS Service-Type
> rlm_ldap: LDAP radiusFramedProtocol mapped to RADIUS Framed-Protocol
> rlm_ldap: LDAP radiusFramedIPAddress mapped to RADIUS Framed-IP-Address
> rlm_ldap: LDAP radiusFramedIPNetmask mapped to RADIUS Framed-IP-Netmask
> rlm_ldap: LDAP radiusFramedRoute mapped to RADIUS Framed-Route
> rlm_ldap: LDAP radiusFramedRouting mapped to RADIUS Framed-Routing
> rlm_ldap: LDAP radiusFilterId mapped to RADIUS Filter-Id
> rlm_ldap: LDAP radiusFramedMTU mapped to RADIUS Framed-MTU
> rlm_ldap: LDAP radiusFramedCompression mapped to RADIUS Framed-Compression
> rlm_ldap: LDAP radiusLoginIPHost mapped to RADIUS Login-IP-Host
> rlm_ldap: LDAP radiusLoginService mapped to RADIUS Login-Service
> rlm_ldap: LDAP radiusLoginTCPPort mapped to RADIUS Login-TCP-Port
> rlm_ldap: LDAP radiusCallbackNumber mapped to RADIUS Callback-Number
> rlm_ldap: LDAP radiusCallbackId mapped to RADIUS Callback-Id
> rlm_ldap: LDAP radiusFramedIPXNetwork mapped to RADIUS Framed-IPX-Network
> rlm_ldap: LDAP radiusClass mapped to RADIUS Class
> rlm_ldap: LDAP radiusSessionTimeout mapped to RADIUS Session-Timeout
> rlm_ldap: LDAP radiusIdleTimeout mapped to RADIUS Idle-Timeout
> rlm_ldap: LDAP radiusTerminationAction mapped to RADIUS Termination-Action
> rlm_ldap: LDAP radiusLoginLATService mapped to RADIUS Login-LAT-Service
> rlm_ldap: LDAP radiusLoginLATNode mapped to RADIUS Login-LAT-Node
> rlm_ldap: LDAP radiusLoginLATGroup mapped to RADIUS Login-LAT-Group
> rlm_ldap: LDAP radiusFramedAppleTalkLink mapped to RADIUS 
> Framed-AppleTalk-Link
> rlm_ldap: LDAP radiusFramedAppleTalkNetwork mapped to RADIUS 
> Framed-AppleTalk-Network
> rlm_ldap: LDAP radiusFramedAppleTalkZone mapped to RADIUS 
> Framed-AppleTalk-Zone
> rlm_ldap: LDAP radiusPortLimit mapped to RADIUS Port-Limit
> rlm_ldap: LDAP radiusLoginLATPort mapped to RADIUS Login-LAT-Port
> rlm_ldap: LDAP radiusReplyMessage mapped to RADIUS Reply-Message
> rlm_ldap: LDAP radiusTunnelType mapped to RADIUS Tunnel-Type
> rlm_ldap: LDAP radiusTunnelMediumType mapped to RADIUS Tunnel-Medium-Type
> rlm_ldap: LDAP radiusTunnelPrivateGroupId mapped to RADIUS 
> Tunnel-Private-Group-Id
> conns: 0x1480f5e0
>  Module: Checking authorize {...} for more modules to load
>  Module: Linked to module rlm_preprocess
>  Module: Instantiating preprocess
>   preprocess {
>         huntgroups = "/usr/local/etc/raddb/huntgroups"
>         hints = "/usr/local/etc/raddb/hints"
>         with_ascend_hack = no
>         ascend_channels_per_line = 23
>         with_ntdomain_hack = no
>         with_specialix_jetstream_hack = no
>         with_cisco_vsa_hack = no
>         with_alvarion_vsa_hack = no
>   }
>  Module: Linked to module rlm_detail
>  Module: Instantiating auth_log
>   detail auth_log {
>         detailfile = 
> "/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d"
>         header = "%t"
>         detailperm = 384
>         dirperm = 493
>         locking = no
>         log_packet_header = no
>   }
>  Module: Checking preacct {...} for more modules to load
>  Module: Linked to module rlm_acct_unique
>  Module: Instantiating acct_unique
>   acct_unique {
>         key = "User-Name, Acct-Session-Id, NAS-IP-Address, 
> Client-IP-Address, NAS-Port"
>   }
>  Module: Checking accounting {...} for more modules to load
>  Module: Instantiating detail
>   detail {
>         detailfile = 
> "/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
>         header = "%t"
>         detailperm = 384
>         dirperm = 493
>         locking = no
>         log_packet_header = no
>   }
>  Module: Instantiating attr_filter.accounting_response
>   attr_filter attr_filter.accounting_response {
>         attrsfile = "/usr/local/etc/raddb/attrs.accounting_response"
>         key = "%{User-Name}"
>   }
>  Module: Checking session {...} for more modules to load
>  Module: Checking post-proxy {...} for more modules to load
>  Module: Checking post-auth {...} for more modules to load
>  } # modules
> } # server
> radiusd: #### Opening IP addresses and Ports ####
> listen {
>         type = "auth"
>         ipaddr = *
>         port = 0
> }
> listen {
>         type = "acct"
>         ipaddr = *
>         port = 0
> }
> listen {
>         type = "control"
>  listen {
>         socket = "/var/run/radiusd/radiusd.sock"
>  }
> }
> Listening on authentication address * port 1812
> Listening on accounting address * port 1813
> Listening on command file /var/run/radiusd/radiusd.sock
> Listening on proxy address * port 1814
> Ready to process requests.
> rad_recv: Access-Request packet from host 172.19.65.101 port 32775, 
> id=181, length=246
>         Acct-Session-Id = "7bb08bbc"
>         NAS-Port = 1
>         NAS-Port-Type = Wireless-802.11
>         User-Name = "testuser"
>         Calling-Station-Id = "D8-30-62-6C-70-61"
>         Called-Station-Id = "00-03-52-80-C6-20"
>         Framed-IP-Address = 10.10.10.117
>         User-Password = "testpassword"
>         NAS-Identifier = "Wireless"
>         NAS-IP-Address = 172.19.65.101
>         Framed-MTU = 1496
>         Connect-Info = "HTTPS"
>         Framed-Protocol = PPP
>         Service-Type = Framed-User
>         Colubris-AVPair = "ssid=COAS Guest"
>         Colubris-AVPair = "group=COAS"
>         Colubris-AVPair = "vsc-unique-id=2"
>         Colubris-Attr-254 = 0x00
>         Colubris-Attr-246 = 0x01
>         Colubris-Attr-251 = 0x00000000
>         Colubris-Attr-253 = 0x01
>         Colubris-Attr-252 = 0x00000002
>         Message-Authenticator = 0x0ca189d41adf5509f9f77dd476d78e82
> +- entering group authorize {...}
> ++[preprocess] returns ok
> [auth_log]      expand: 
> /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d -> 
> /var/log/radius/radacct/172.19.65.101/auth-detail-20100722
> [auth_log] 
> /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d expands 
> to /var/log/radius/radacct/172.19.65.101/auth-detail-20100722
> [auth_log]      expand: %t -> Thu Jul 22 17:01:30 2010
> ++[auth_log] returns ok
> ++[chap] returns noop
> [eap] No EAP-Message, not doing EAP
> ++[eap] returns noop
> ++[unix] returns notfound
> [files] users: Matched entry DEFAULT at line 172
> ++[files] returns ok
> [ldap-server1] performing user authorization for testuser
> [ldap-server1]  expand: %{Stripped-User-Name} ->
> [ldap-server1]  ... expanding second conditional
> [ldap-server1]  expand: %{User-Name} -> testuser
> [ldap-server1]  expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) -> 
> (uid=testuser)
> [ldap-server1]  expand: ou=People,o=mydomain -> ou=People,o=mydomain
>   [ldap-server1] ldap_get_conn: Checking Id: 0
>   [ldap-server1] ldap_get_conn: Got Id: 0
>   [ldap-server1] attempting LDAP reconnection
>   [ldap-server1] (re)connect to ldap://server1.coas.oregonstate.edu, 
> authentication 0
>   [ldap-server1] setting TLS CACert Directory to /etc/pki/tls/certs/
>   [ldap-server1] setting TLS Require Cert to demand
>   [ldap-server1] starting TLS
>   [ldap-server1] bind as uid=admin,o=radtree/secret to 
> ldap://server1.coas.oregonstate.edu
>   [ldap-server1] waiting for bind result ...
>   [ldap-server1] Bind was successful
>   [ldap-server1] performing search in ou=People,o=mydomain, with filter 
> (uid=testuser)
> [ldap-server1] Added Crypt-Password = 4gOgBZqZgtwIw in check items
> [ldap-server1] looking for check items in directory...
>   [ldap-server1] userPassword -> Crypt-Password == "{crypt}4gOgBZqZgtwIw"
> [ldap-server1] looking for reply items in directory...
> WARNING: No "known good" password was found in LDAP.  Are you sure that 
> the user is configured correctly?
> [ldap-server1] user testuser authorized to use remote access
>   [ldap-server1] ldap_release_conn: Release Id: 0
> ++[ldap-server1] returns ok
> ++[expiration] returns noop
> ++[logintime] returns noop
> ++[pap] returns updated
> Found Auth-Type = PAP
> +- entering group PAP {...}
> [pap] login attempt with password "testpassword"
> [pap] Using CRYPT encryption.
> [pap] Passwords don't match
> ++[pap] returns reject
> Failed to authenticate the user.
> Login incorrect (rlm_pap: CRYPT password check failed): 
> [testuser/testpassword] (from client MSM765zl port 1 cli D8-30-62-6C-70-61)
> Using Post-Auth-Type Reject
> +- entering group REJECT {...}
> [attr_filter.access_reject]     expand: %{User-Name} -> testuser
>  attr_filter: Matched entry DEFAULT at line 11
> ++[attr_filter.access_reject] returns updated
> Delaying reject of request 0 for 1 seconds
> Going to the next request
> Waking up in 0.7 seconds.
> Sending delayed reject for request 0
> Sending Access-Reject of id 181 to 172.19.65.101 port 32775
> Waking up in 4.9 seconds.
> Cleaning up request 0 ID 181 with timestamp +9
> Ready to process requests.
> 
> 



More information about the Freeradius-Users mailing list