rlm_cache NT-Password with EAP-PEAP

Arran Cudbard-Bell a.cudbardb at freeradius.org
Fri Feb 27 23:57:59 CET 2015


> On 27 Feb 2015, at 17:48, Alan DeKok <aland at deployingradius.com> wrote:
> 
> On Feb 27, 2015, at 4:20 PM, Sherker, Donald <Donald.Sherker at mybrighthouse.com> wrote:
>> I have made this change and the server is able to cache the hashes for both EAP-PEAP and EAP-TTLS now.  I am now seeing a problem where after MSCHAPv2 finishes it's status is "updated" the first time the user tries to authenticate and then EAP fails.
> 
>  A careful reading of the debug log is helpful here:
> 
> (7) eap_mschapv2:   Auth-Type MS-CHAP {
> (7) mschap: Found Cleartext-Password, hashing to create NT-Password
> (7) mschap: Found Cleartext-Password, hashing to create LM-Password
> (7) mschap: Creating challenge hash with username: qaresdon
> (7) mschap: Client is using MS-CHAPv2
> (7) mschap: Adding MS-CHAPv2 MPPE keys
> (7)     [mschap] = ok
> (7) cache: EXPAND %{User-Name}%{outer.request:Calling-Station-Id}
> (7) cache:    --> qaresdone899c47233d8
> (7) cache: No cache entry found for "qaresdone899c47233d8"
> (7) cache: Creating new cache entry
> (7) cache: EXPAND %{control:NT-Password}
> (7) cache:    --> 0x5835048ce94ad0564e29a924a03510ef
> (7) cache:   control:NT-Password := 0x5835048ce94ad0564e29a924a03510ef
> (7) cache: EXPAND %{control:LM-Password}
> (7) cache:    --> 0xe52cac67419a9a2238f10713b629b565
> (7) cache:   control:LM-Password := 0xe52cac67419a9a2238f10713b629b565
> (7) cache: Merging cache entry into request
> (7) cache:   &control:NT-Password := 0x5835048ce94ad0564e29a924a03510ef
> (7) cache:   &control:LM-Password := 0xe52cac67419a9a2238f10713b629b565
> (7) cache: Commited entry, TTL 86400 seconds
> (7)     [cache.authorize] = updated
> (7)   } # Auth-Type MS-CHAP = updated
> (7) eap: Freeing handler
> (7)       [eap] = reject
> (7)     } # authenticate = reject
> 
>  i.e. the *cache* module returns “updated”.  That can be fixed.  Just add “ok” after “cache.authorize”:

Sure, that's a workaround, but this is a bug in the server. A module returning updated in the authentication
section should not cause authentication to fail.

-Arran

Arran Cudbard-Bell <a.cudbardb at freeradius.org>
FreeRADIUS development team

FD31 3077 42EC 7FCD 32FE 5EE2 56CF 27F9 30A8 CAA2

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 872 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20150227/8faf4872/attachment.sig>


More information about the Freeradius-Users mailing list