Freeradius authentication for VSP VOSS Switch

marki jm+freeradiususer at roth.lu
Fri Mar 3 09:20:01 UTC 2023


This is a problem with the switch/NAS, not with freeradius.

On March 3, 2023 1:07:27 AM GMT+01:00, shamsher singh <mr.shamshersingh at gmail.com> wrote:
>Hello List,
>
>I have been trying to authenticate using radius with Extreme VSP
>switch, the radius seems to accept the authentication, but the switch
>still fails
>
>
>Listening on authentication address * port 1812
>
>Listening on accounting address * port 1813
>
>Listening on authentication address 127.0.0.1 port 18120 as server inner-tunnel
>
>Listening on proxy address * port 1814
>
>Ready to process requests.
>
>rad_recv: Access-Request packet from host 131.232.33.8 port 44016,
>id=243, length=68
>
>User-Name = "test"
>
>User-Password = "test"
>
>NAS-IP-Address = 131.232.33.8
>
>NAS-Port = 1
>
>NAS-Port-Type = Async
>
>Service-Type = Administrative-User
>
># Executing section authorize from file /etc/freeradius/sites-enabled/default
>
>+group authorize {
>
>++[preprocess] = ok
>
>++[chap] = noop
>
>++[mschap] = noop
>
>++[digest] = noop
>
>[suffix] No '@' in User-Name = "test", looking up realm NULL
>
>[suffix] No such realm "NULL"
>
>++[suffix] = noop
>
>[eap] No EAP-Message, not doing EAP
>
>++[eap] = noop
>
>[files] users: Matched entry test at line 2
>
>++[files] = ok
>
>++[expiration] = noop
>
>++[logintime] = noop
>
>++[pap] = updated
>
>+} # group authorize = updated
>
>Found Auth-Type = PAP
>
># Executing group from file /etc/freeradius/sites-enabled/default
>
>+group PAP {
>
>[pap] login attempt with password "test"
>
>[pap] Using clear text password "test"
>
>[pap] User authenticated successfully
>
>++[pap] = ok
>
>+} # group PAP = ok
>
># Executing section post-auth from file /etc/freeradius/sites-enabled/default
>
>+group post-auth {
>
>++[exec] = noop
>
>+} # group post-auth = noop
>
>Sending Access-Accept of id 243 to 131.232.33.8 port 44016
>
>Service-Type = Administrative-User
>
>Finished request 0.
>
>Going to the next request
>
>Waking up in 4.9 seconds.
>
>Cleaning up request 0 ID 243 with timestamp +73
>
>Ready to process requests.
>
>-------------
>
>ssh test at 131.232.33.8
>
>
>Using security software from Mocana Corporation. Please visit
>https://www.mocana.com/ for more information
>
>
>Copyright(c) 2010-2022 Extreme Networks.
>
>All Rights Reserved.
>
>Virtual Services Platform  7200
>
>VSP Operating System Software Build 8.8.0.0
>
>General Availability Released Software, Fully supported
>
>
>This product is protected by one or more US patents listed at
>http://www.extremenetworks.com/patents along with their foreign
>counterparts.
>
>
>EXTREME NETWORKS VOSS COMMAND LINE INTERFACE
>
>
>test at 131.232.33.8's password:
>
>Permission denied, please try again.
>
>test at 131.232.33.8's password:
>
>------
>
>1 2023-03-02T17:00:37.225-07:00 LAB7K902 CP1 - 0x000d8602 - 00000000
>GlobalRouter SSH INFO SSH session closed by server for user test on
>host 131.232.90.103, session_id = 2
>
>1 2023-03-02T17:00:37.225-07:00 LAB7K902 CP1 - 0x000d8602 - 00000000
>GlobalRouter SSH INFO SSH authentication time expired for user test on
>host 131.232.90.103, session_id = 2
>
>1 2023-03-02T17:00:23.615-07:00 LAB7K902 CP1 - 0x0004060b - 00000000
>GlobalRouter WEB INFO SSL session with client 131.232.90.103 closed.
>
>1 2023-03-02T16:59:40.417-07:00 LAB7K902 CP1 - 0x000d8602 - 00000000
>GlobalRouter SSH INFO SSH invalid username/password for user test on
>host 131.232.90.103, session_id = 2
>
>1 2023-03-02T16:59:40.417-07:00 LAB7K902 CP1 - 0x000a45fc - 00000000
>GlobalRouter RADIUS INFO Radius message:
>
>1 2023-03-02T16:59:40.417-07:00 LAB7K902 CP1 - 0x000a45c0 - 00000000
>GlobalRouter RADIUS INFO RADIUS authentication failed on server
>131.232.33.170
>
>1 2023-03-02T16:59:40.417-07:00 LAB7K902 CP1 - 0x000a45fc - 00000000
>GlobalRouter RADIUS INFO Radius message:
>
>Thank you,
>Shamsher
>-
>List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


More information about the Freeradius-Users mailing list