Setting Framed-MTU in Freeradius
Nick Porter
nick at portercomputing.co.uk
Fri Feb 27 09:19:25 UTC 2026
On 27/02/2026 05:24, Kat via Freeradius-Users wrote:
> Google Gemini is insisting quite strongly that, after changing
> fragment size in the /etc/raddb/mods-enabled/eap, I also need to put
> something in the post-auth part.
>
> The problem is that sometimes AI can be wrong and I cannot find
> alternate sources that back this claim up. My Google-fu may be weak.
This is a case of AI being confidently wrong - but there is wrong
information out there which was probably part of the training set.
Setting fragment size determines the largest EAP fragment which
FreeRADIUS will send in an Access-Challenge - so controlling the RADIUS
server -> client packet.
There is some incorrect information out there which claims that setting
Framed-MTU will influence the client -> server EAP fragment sizes. That
is simply not the case. That attribute can be used in an Access-Accept
for setting the MTU on the connection which is being authenticated, but
it has nothing to do with the packets involved in doing the authenticated.
It is a common issue with EAP authentication where the packet sizes grow
beyond the MTU and get fragmented.
In a well behaved network, the fragments will get re-assembled, but
there are cases where fragments get dropped by firewalls and so the
authentication fails.
> into /etc/raddb/sites-enabled/default in the post-auth section. Gemini
> points to a comment block that says: "# Please do not put "unlang"
> configurations into the "authenticate"
> # section. Put them in the "post-auth" section instead. That's what
> # the post-auth section is for."
That is completely wrong - authenticate is another process section just
like "authorize" and "post-auth" which contains unlang. Usually it's
only module calls to the modules performing the authentication, but it
can have more complex policy. It's all about where in the packet
processing you need to perform given actions.
> In a previous email,
> https://lists.freeradius.org/pipermail/freeradius-users/2022-March/101630.html,
> to this list, it sounds like it could be in sites-available/default
>
> Aren't they symlinks?
Usually sites-available contains symlinks to files in sites-enabled -
but it can have normal files as well. The sites-available /
sites-enabled construct is simply a way to provide a load of sample
virtual servers and then just use a symlink to enable the relevant ones
to the system.
So, you can add that update section to post-auth if you want to - but it
is not likely to be achieving what you want.
If you are running into issues with fragmentation on the packets from
client to server, then usually the key is getting path MTU discovery to
work correctly. Failing that, it is a matter of ensuring that fragments
are not getting dropped by firewalls.
Nick
--
Nick Porter
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 665 bytes
Desc: OpenPGP digital signature
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20260227/e35ef345/attachment.sig>
More information about the Freeradius-Users
mailing list