Active Directory + LDAP + groups for dynamic VLAN assignment

2013-01-09 Thread Matthew Ceroni
Hi: I am using FreeRadius version 2.1.12 on CentOS6. I am authenticating against Active Directory (that works). And authorizing against LDAP (that works as well). I am trying to return attributes, used for VLAN assignment, based on the usersDN. In my /etc/raddb/sites-enabled/default (and inner

FreeRadius (version 2.1.12) + ntlm_auth (AD) authentication + LDAP authorization

2013-01-08 Thread Matthew Ceroni
is on the authorization side in which I am using LDAP to grab the groups a user is in. In order to authentication against ldap my bind DN has to be DOMAIN\username (ie: DOMAIN1\mceroni). I am wondering how I modify the User-Name or Stripped user name just for the LDAP authorization part so make it DOMAIN

RE: AP FR LDAP authentication reject

2012-12-28 Thread Thanakorn Rattanatikul
Still unable to connect. Do you have any configuration files for connecting with LDAP form AP FR LDAP ? I tried every way but nothing works. Thank you very much for your time and help. thanakorn - List info/subscribe/unsubscribe? See http

Re: AP FR LDAP authentication reject

2012-12-28 Thread Olivier Beytrison
On 28.12.2012 09:38, Thanakorn Rattanatikul wrote: Still unable to connect. Do you have any configuration files for connecting with LDAP form AP FR LDAP ? I tried every way but nothing works. Send a full output of freeradius -X -- Olivier Beytrison Network Security Engineer, HES-SO

Re: AP FR LDAP authentication reject

2012-12-28 Thread Alan DeKok
Thanakorn Rattanatikul wrote: In LDAP server , for user sun , store password in clear-text in this test. No, it doesn't. Or, it's not available. Or the user isn't found. Read the debug log. Look for anything related to LDAP. It isn't hard: [ldap] performing search in ou=guest,dc

RE: AP FR LDAP authentication reject

2012-12-28 Thread Thanakorn Rattanatikul
Date: Fri, 28 Dec 2012 10:46:45 +0100 From: oliv...@heliosnet.org To: freeradius-users@lists.freeradius.org Subject: Re: AP FR LDAP authentication reject On 28.12.2012 09:38, Thanakorn Rattanatikul wrote: Still unable to connect. Do you have any configuration files for connecting

RE: AP FR LDAP authentication reject

2012-12-28 Thread Phil Mayers
Sigh. No. There are no packets in that debug. How do you expect people to read a debug unless it contains an authentication attempt? ... adding new socket proxy address * port 51195 Listening on authentication address * port 1812 Listening on accounting address * port 1813 Listening on command

Re: AP FR LDAP authentication reject

2012-12-27 Thread Olivier Beytrison
On 28.12.2012 06:17, Thanakorn Rattanatikul wrote: I'm trying to setup the server to authenticate using LDAP. I'm having some problem and hope to get some help from the list. I'm trying to setup AP-FR-LDAP. FreeRadius is new installation on CentOS. LDAP is Sun Java System Directory Server

RE: AP FR LDAP authentication reject

2012-12-27 Thread Thanakorn Rattanatikul
In LDAP server , for user sun , store password in clear-text in this test. Thank you very much for your time and help. thanakorn - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: AP FR LDAP authentication reject

2012-12-27 Thread Olivier Beytrison
On 28.12.2012 08:39, Thanakorn Rattanatikul wrote: In LDAP server , for user sun , store password in clear-text in this test So if you have a clear-text password in the ldap, use the ldap attribute-map to add it in the control list. Looking at the logs I guess you are running version 2.x

AW: Freeradius + LDAP

2012-12-10 Thread Matthias Nagel
Hello, what exactly ist your problem? a) Do you want to know how to configure a web administration GUI (phpldapadmin) for your LDAP server? Then your problem is purly related to LDAP server, PHP and a web server. Hence, this is Thermometer wrong mailing list to ask for advice. b) Or do you

Freeradius + LDAP

2012-12-10 Thread Brekler Custodio
Hello guys, i was wondering, anyone knows how to configure an LDAP (phpldapadmin) to work with freeradius ?I search all over the web and couldnt find a tutorial that teachs how to configure a simple DB to work with FR.The FR is configured already, its very simple, but the LDAP i cant handle

ldap eDir support in master branch

2012-12-06 Thread Olivier Beytrison
Hi, Now that I have my packages, i've started deploying FR3 for our eduroam federation. And I just saw that the eDir support is gone. now my question is : 1. is it abandoned ? 2. is it not yet ported to the new rlm_ldap code ? Olivier -- Olivier Beytrison Network Security Engineer, HES-SO

Re: ldap eDir support in master branch

2012-12-06 Thread Phil Mayers
On 06/12/12 16:45, Olivier Beytrison wrote: Hi, Now that I have my packages, i've started deploying FR3 for our eduroam federation. And I just saw that the eDir support is gone. now my question is : 1. is it abandoned ? 2. is it not yet ported to the new rlm_ldap code ? No-one who has eDir

Re: ldap eDir support in master branch

2012-12-06 Thread Olivier Beytrison
On 06.12.2012 17:45, Olivier Beytrison wrote: Hi, Now that I have my packages, i've started deploying FR3 for our eduroam federation. And I just saw that the eDir support is gone. now my question is : 1. is it abandoned ? 2. is it not yet ported to the new rlm_ldap code ? Nevermind my

Error: [ldap] All ldap connections are in use

2012-11-21 Thread Phil Brown
We have started seeing problems our radius server with the Error Error: [ldap] All ldap connections are in use We have increased the ldap_connections_number from 5 to 20 which has largely resolved the issue. we now receive over 100,000 authentications a day, is there any guide

Re: Error: [ldap] All ldap connections are in use

2012-11-21 Thread Arran Cudbard-Bell
On 21 Nov 2012, at 13:00, Phil Brown phil.br...@port.ac.uk wrote: We have started seeing problems our radius server with the Error Error: [ldap] All ldap connections are in use We have increased the ldap_connections_number from 5 to 20 which has largely resolved the issue. we now

Personalizing ldap filters from users file

2012-11-19 Thread Angel L. Mateo
Hello, I have freeradius (2.2.0) using ldap as backend for user information. This radius server is used by different applications to authenticate and authorize users. I want now to use different ldap filters for different applications. In LDAP I'm using SCHAC schema and schacUserStatus

Re: Personalizing ldap filters from users file

2012-11-19 Thread Phil Mayers
On 11/19/2012 09:48 AM, Angel L. Mateo wrote: ldap { ... filter = ((mail=%{User-Name})(schacUserStatus=urn prefix: %{X-Atica-Service}:enabled)) ... } DEFAULT X-Actica-Service = 'vpn', Auth-Type = LDAP, Realm == um.es User-Name := `%{User-Name}`, Fall-Through

Re: Personalizing ldap filters from users file

2012-11-19 Thread Angel L. Mateo
El 19/11/12 11:17, Phil Mayers escribió: On 11/19/2012 09:48 AM, Angel L. Mateo wrote: ldap { ... filter = ((mail=%{User-Name})(schacUserStatus=urn prefix: %{X-Atica-Service}:enabled)) ... } DEFAULT X-Actica-Service = 'vpn', Auth-Type = LDAP, Realm == um.es User-Name

Re: LDAP group child domain

2012-11-10 Thread Alan DeKok
I would like to do is write it like that: DEFAULT Ldap-Group == “cn=groupname, ou=OUofGroup, dc=toto, dc=tata” No. The LDAP group is the name of the group. Nothing else. If anyone got some insight on how to solve this problem, I would greatly appreciate. If you want to query two

Re: help:freeradius + ldap + cisco ap can not work

2012-11-09 Thread Matthew Newton
On Fri, Nov 09, 2012 at 04:59:44PM +0800, Manifold Yu wrote: pap against LDAP works find,but others can not works find (eg:mschap) . [ldap] looking for check items in directory... [ldap] userPassword - Cleartext-Password == {MD5}85Q3W/VY9rt11BfdBNzdfQ== Your password, from LDAP

redundant with ldap and sql not working

2012-11-09 Thread Hocine M
work server eduroam-inner-tunnel { listen { ipaddr = 127.0.0.1 port = 18120 type = auth } authorize { chap mschap suffix update control { Proxy-To-Realm := LOCAL } eap { ok = return } redundant { ldap sql_auth

LDAP group child domain

2012-11-09 Thread Menard, Yannick
Hi, I'm in an active directory domain with child domain, tata as my primary, and toto as my child domain. I'm doing authorization based on LDAP group. My User connect to freeradius using 802.1x and PEAP. Using mschap and ntlm this is working great. Now I want to give users access/or radius

Re: LDAP attribute mapping

2012-10-31 Thread Alan DeKok
Phil Mayers wrote: +1 Personally I'd rather the latter format everywhere, even unlang: update { request:foo = 1 } Yeah. That shouldn't be hard. Maybe I can look at it in 2 weeks, after IETF. Alan DeKok. - List info/subscribe/unsubscribe? See

Re: LDAP attribute mapping

2012-10-31 Thread Arran Cudbard-Bell
or... update [default list] { ... } update reply { config:Auth-Type = Reject Reply-Message = Go away } That one gets my vote. update { } defaults to request. -Arran - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

LDAP attribute mapping

2012-10-30 Thread Arran Cudbard-Bell
Quick poll. For 3.0 the ldap module will be moving away from using the ldap.attrmap file and instead use a config based mapping. There are a few ways we are considering for organising the mapping. We can use something like the existing unlang: update control { Cleartext-Password

Re: LDAP attribute mapping

2012-10-30 Thread Bruce Nunn
I pull out only the attributes I need and change ldap.attrmap to match my schema. Personally, I can live with either config method. Arran Cudbard-Bell a.cudba...@freeradius.org wrote: Quick poll. For 3.0 the ldap module will be moving away from using the ldap.attrmap file and instead use

Re: LDAP attribute mapping

2012-10-30 Thread John Dennis
On 10/30/2012 06:38 AM, Arran Cudbard-Bell wrote: Quick poll. For 3.0 the ldap module will be moving away from using the ldap.attrmap file and instead use a config based mapping. There are a few ways we are considering for organising the mapping. We can use something like the existing unlang

Re: LDAP attribute mapping

2012-10-30 Thread Arran Cudbard-Bell
On 30 Oct 2012, at 13:00, John Dennis jden...@redhat.com wrote: On 10/30/2012 06:38 AM, Arran Cudbard-Bell wrote: Quick poll. For 3.0 the ldap module will be moving away from using the ldap.attrmap file and instead use a config based mapping. There are a few ways we are considering

Re: LDAP attribute mapping

2012-10-30 Thread Arran Cudbard-Bell
If rlm_rest and rlm_cache have attribute models that are elegant and well thought out then let's move everything to that model. On the other hand if ulang is conceptually cleaner then lets move rlm_rest and rlm_cache to a ulang solution. Pick one idea and make everything follow those

Re: LDAP attribute mapping

2012-10-30 Thread Phil Mayers
+1 Personally I'd rather the latter format everywhere, even unlang: update { request:foo = 1 } John Dennis jden...@redhat.com wrote: What I'd like to see is the individual modules converging on common behavior so there is a consistent model. I suspect a number of the modules were written

Re: LDAP attribute mapping

2012-10-30 Thread Matthew Newton
On Tue, Oct 30, 2012 at 07:02:02PM +, Phil Mayers wrote: +1 Personally I'd rather the latter format everywhere, even unlang: update { request:foo = 1 } Agreed - having that option would make things much tidier when several things in different lists are being updated at once.

Re: MS-CHAP-V2 allow_retry on ldap authentification

2012-10-23 Thread Phil Mayers
On 10/22/2012 09:13 AM, Daniel Ekman wrote: Hi list, I have a fairly large user base doing WPA2-enterprise from various OS'es and smartphones, our FreeRADIUS is running v.2.1.12 and is authenticating via LDAP and things are running pretty well, only snag I have currently with this is when

Re: MS-CHAP-V2 allow_retry on ldap authentification

2012-10-23 Thread Daniel Ekman
and smartphones, our FreeRADIUS is running v.2.1.12 and is authenticating via LDAP and things are running pretty well, only snag I have currently with this is when people change their password. I Change their password where? Elsewhere, right? So, you want to prompt the clients to enter a new

Re: MS-CHAP-V2 allow_retry on ldap authentification

2012-10-23 Thread Phil Mayers
On 23/10/12 10:52, Daniel Ekman wrote: the send_error was added to version 2.1.11 as a bug fix Allow EAP-MSCHAPv2 to send error message to client. This change allows some clients to prompt the user for a new password. See raddb/eap.conf, mschapv2 section, send_error. I know that. I mean like

MS-CHAP-V2 allow_retry on ldap authentification

2012-10-22 Thread Daniel Ekman
Hi list, I have a fairly large user base doing WPA2-enterprise from various OS'es and smartphones, our FreeRADIUS is running v.2.1.12 and is authenticating via LDAP and things are running pretty well, only snag I have currently with this is when people change their password. I realize this has

Authentification Problem with Cisco AP, freeradius and LDAP

2012-10-11 Thread Florian Arenz
/freeradius/modules/ldap to let my radius know where the LDAP is and some other things it looks like this: -- /etc/freeradius/modules/ldap ldap { server = 172.26.100.1 identity= uid=binduser,cn=users,ou= Infrastruktur,dc=tarent,dc=de password=

Re: Authentification Problem with Cisco AP, freeradius and LDAP

2012-10-11 Thread Alan Buxey
1 there is no such word as authentification, its just 'authentication' 2 your client is trying to do EAP-TLS 3 check FreeRADIUS compatability matrix because when you do use eg PEAP (and have the CA cert on the client, the MSCHAPv2 will only work with passwords from LDAP in certain formats

read ldap groups for a user not specified in User-Name

2012-09-27 Thread David Aldwinckle
are in separate LDAP databases. 2. Normally, I just need to handle authentication for the guest accounts. That part is easy, I have PEAP configured with LDAP and NT hashes. 3. the special requirement is that IF the sponsor account gets locked (deleted, expired, etc), then the guest account can no longer

Re: read ldap groups for a user not specified in User-Name

2012-09-27 Thread Matthew Newton
check there? Look at the filter option for the ldap module. You can set it to search for anything, not necessarily just User-Name. Use a second instantiation of the ldap module to do your locked user checks on the main LDAP server after you've first searched for User-Name on the guest LDAP server

Re: Dynamic realm+home_server_pool from LDAP/SQL

2012-09-25 Thread Alan DeKok
Wilco Baan Hofman wrote: Okay, I understand this.. I was actually looking more for specifics on how you would want to have this implemented. Perhaps similarly to the dynamic clients using unlang? Or perhaps by configuring a configuration backend for realms or something.. I would start off

Dynamic realm+home_server_pool from LDAP/SQL

2012-09-21 Thread Wilco Baan Hofman
Hi, I'm looking through the code and documentation of freeradius now to see if it is possible to use freeradius with a backend database for realms. For clients this can be fixed with dynamic clients and overwriting attributes.. but for realms this does not seem possible. Did I miss something?

Re: Dynamic realm+home_server_pool from LDAP/SQL

2012-09-21 Thread Arran Cudbard-Bell
I'm looking through the code and documentation of freeradius now to see if it is possible to use freeradius with a backend database for realms. Not to define new realms no. For clients this can be fixed with dynamic clients and overwriting attributes.. but for realms this does not seem

Re: Dynamic realm+home_server_pool from LDAP/SQL

2012-09-21 Thread Alan DeKok
Wilco Baan Hofman wrote: I'm looking through the code and documentation of freeradius now to see if it is possible to use freeradius with a backend database for realms. Realms, maybe. It's a lot more difficult with home servers. For clients this can be fixed with dynamic clients and

Re: Dynamic realm+home_server_pool from LDAP/SQL

2012-09-21 Thread Wilco Baan Hofman
On Fri, 2012-09-21 at 13:05 +0200, Alan DeKok wrote: Wilco Baan Hofman wrote: I'm looking through the code and documentation of freeradius now to see if it is possible to use freeradius with a backend database for realms. I'm looking to implement this if it's not there, in what way can I

Re: authorization based on ldap attribute

2012-09-20 Thread Stefano Zanmarchi
Thank you very much Phil! exactly what I needed, very well explained. I just did it the other way round if (reply:Eduroam-Enabled == N) { reject } and it's working fine. Have a nice day, Stefano - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: authorization based on ldap attribute

2012-09-20 Thread Phil Mayers
On 20/09/12 13:35, Gregg Douglas wrote: With this reject command in the authorize section is there a method to supply a custom reply message? Sure. if (...) { update reply { Reply-Message = whatever you want } reject } This is pretty basic use. I think people should be able to

Re: authorization based on ldap attribute

2012-09-20 Thread Stefano Zanmarchi
Thanks again, you pointed out a very important issue. I'll definitively apply one of the two suggested methods to check if the attribute is present before allowing a user access. - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: Using ldap_xlat in unlang with Chars not allowed in an ldap search

2012-09-20 Thread Phil Mayers
On 29/08/12 17:42, Phil Mayers wrote: There's no easy way to do this with the built-in LDAP code. When the xlat is called, it's called with one big string i.e. the un-escaped value is already inside the string, and can't be escaped. Actually, following this up: I'm wrong here, due

authorization based on ldap attribute

2012-09-19 Thread Stefano Zanmarchi
Hallo, I've configured freeradius to authenticate users with PEAP, using openldap to store NTLM hashes. It works fine. Now I'd like to authorize only people who have the ldap attribute haDirittoEduroam set to Y (or the other way round: not to authorize users with haDirittoEduroam set to N). Below

Re: authorization based on ldap attribute

2012-09-19 Thread Phil Mayers
On 19/09/12 17:03, Stefano Zanmarchi wrote: Hallo, I've configured freeradius to authenticate users with PEAP, using openldap to store NTLM hashes. It works fine. Now I'd like to authorize only people who have the ldap attribute haDirittoEduroam set to Y (or the other way round: not to authorize

Re: LDAP module file using localhost instead of external?

2012-09-11 Thread Jennifer Mehl
the hostname that is different. For example: Module: Instantiating module ucsbnetid from file /etc/freeradius/modules/ldap server = localhost filter = (uid=%u) base_filter = (objectclass=radiusprofile) Here is my /etc/freeradius/modules/ldap file (password obfuscated

LDAP module file using localhost instead of external?

2012-09-10 Thread Jennifer Mehl
. I'm in the process of setting FreeRADIUS for authentication to our campus' LDAP server. I've verified connectivity to the server using the OpenLDAP ldapsearch tools from the same host. However, when I define the server in the /etc/freeradius/modules/ldap files, it doesn't appear to be read

Re: LDAP module file using localhost instead of external?

2012-09-10 Thread Phil Mayers
the hostname that is different. For example: Module: Instantiating module ucsbnetid from file /etc/freeradius/modules/ldap server = localhost filter = (uid=%u) base_filter = (objectclass=radiusprofile) Here is my /etc/freeradius/modules/ldap file (password obfuscated

Using ldap_xlat in unlang with Chars not allowed in an ldap search

2012-08-29 Thread Daniel Finger
Hi! I have a Problem using the ldap Module to search in the ldap Tree for a specific Attribute Containing a (. I am using FreeRadius (2.1.12) for 802.1X Authentification (EAP-TLS) which is working fine. After successful EAP Authentication, I want to check if the User has an Entry in the LDAP

Re: Using ldap_xlat in unlang with Chars not allowed in an ldap search

2012-08-29 Thread Phil Mayers
Umlauts or an Char. There's no easy way to do this with the built-in LDAP code. When the xlat is called, it's called with one big string i.e. the un-escaped value is already inside the string, and can't be escaped. Maybe there's room for an xlat in the server core: %{urlquote:%{Value

user groups in ldap

2012-08-21 Thread Aqdas Muneer
Hello, I have setup freeradius with ldap lookup to authentication Cisco shell access. As if now i have 2 groups setup in the ldap database. One is for network admins who have full access to every device. The second group is for support staff that only have read access to all the devices

Re: LDAP and FreeRadius

2012-08-16 Thread Alan DeKok
: That's what has been working for ~10 years. I'm wary of breaking peoples systems in a minor release. However, this will change for 3.0. There are major updates to the LDAP module which use the new connection pool, clean up the code, and generally make it more consistent with the rest of the server

Re: LDAP and FreeRadius

2012-08-16 Thread Phil Mayers
On 08/16/2012 05:58 AM, Fajar A. Nugraha wrote: https://github.com/alandekok/freeradius-server/blob/v2.1.x/src/modules/rlm_ldap/rlm_ldap.c#L1545 In particular, AFAICT if password_attribute is set, and auto_header is unset, then the attribute added will be User-Password. Hmm ... I wonder if

Re: LDAP and FreeRadius

2012-08-16 Thread Phil Mayers
On 08/16/2012 08:00 AM, Alan DeKok wrote: Phil Mayers wrote: Bear in mind that rlm_ldap has some quite complex password processing rules hard-coded into the source. In particular, I think that code still, incorrectly, uses PW_USER_PASSWORD as the attribute, then overrides it based on the

Re: LDAP and FreeRadius

2012-08-16 Thread Sonny Taberman
16 aug 2012 kl. 13:02 skrev Phil Mayers p.may...@imperial.ac.uk: Oh totally - I'm not suggesting fiddling with the existing code, just noting that the reason the OP was getting the warning about User-Password versus Cleartext-Password was (I guess) rlm_ldap doing it, rather than anything he

Re: LDAP and FreeRadius

2012-08-16 Thread Alan DeKok
Phil Mayers wrote: On a wider node, I wonder if the code inside rlm_ldap for password_header is even useful anymore - rlm_pap has support for auto-detecting the header, so it's just duplication. Yes. The LDAP auto-header code has been deprecated for ~5 years. It will go away in version 3

LDAP and FreeRadius

2012-08-15 Thread Sonny Taberman
Hi everyone. This is my first post to this list. I have set up freeradius (V2.1.12) together with openldap (V2.4.31) and so with some success I think. But I have to say that setting this up using only users-file was a breeze. Setting up freeradius with ldap not so simple. I am using cleartext

Re: LDAP and FreeRadius

2012-08-15 Thread Fajar A. Nugraha
-file was a breeze. Setting up freeradius with ldap not so simple. I am using cleartext password in ldap. I am not using any special schema for freeradius in my ldap-setup. My problem is something I noticed many other users has struggled with and that is this part from my debug output: ++[pap

Re: LDAP and FreeRadius

2012-08-15 Thread Sonny Taberman
Hi. 15 aug 2012 kl. 16:01 skrev Fajar A. Nugraha l...@fajar.net: Does your ldap.attrmap look like this? https://github.com/alandekok/freeradius-server/blob/v2.1.x/raddb/ldap.attrmap In particular look for Password-With-Header Yes it look the same exactly. I guess you are referring to this

Re: LDAP and FreeRadius

2012-08-15 Thread Sonny Taberman
I have to correct my self. The third column is the LDAP-name so that can't be it. I mean that is the container where the password is saved. Or am I missing something here? /Sonny 15 aug 2012 kl. 16:51 skrev Sonny Taberman sonny.taber...@lan-master.eu: Hi. 15 aug 2012 kl. 16:01 skrev Fajar

Re: LDAP and FreeRadius

2012-08-15 Thread Phil Mayers
Yes it look the same exactly. So do you mean that I should change that line to: checkitem Password-With-Header cleartextPassword That depends. Can you give an example, suitably redacted, of what one of the LDAP entries looks like? e.g. does it look like this: dn: cn=user,ou=blah userPassword

Re: LDAP and FreeRadius

2012-08-15 Thread Fajar A. Nugraha
On Wed, Aug 15, 2012 at 9:54 PM, Sonny Taberman sonny.taber...@lan-master.eu wrote: I have to correct my self. The third column is the LDAP-name so that can't be it. I mean that is the container where the password is saved. Or am I missing something here? Something is setting User-Password

Re: LDAP and FreeRadius

2012-08-15 Thread Phil Mayers
On 15/08/12 16:13, Fajar A. Nugraha wrote: Something is setting User-Password check item. If you store the Bear in mind that rlm_ldap has some quite complex password processing rules hard-coded into the source. In particular, I think that code still, incorrectly, uses PW_USER_PASSWORD as

Re: LDAP and FreeRadius

2012-08-15 Thread Sonny Taberman
15 aug 2012 kl. 17:08 skrev Phil Mayers p.may...@imperial.ac.uk: That depends. Can you give an example, suitably redacted, of what one of the LDAP entries looks like? e.g. does it look like this: dn: cn=user,ou=blah userPassword: someplaintext ...or what? It looks exactly like

Re: LDAP and FreeRadius

2012-08-15 Thread Sonny Taberman
...@fajar.net: On Wed, Aug 15, 2012 at 9:54 PM, Sonny Taberman sonny.taber...@lan-master.eu wrote: I have to correct my self. The third column is the LDAP-name so that can't be it. I mean that is the container where the password is saved. Or am I missing something here? Something is setting User

Re: LDAP and FreeRadius

2012-08-15 Thread Fajar A. Nugraha
On Wed, Aug 15, 2012 at 10:45 PM, Phil Mayers p.may...@imperial.ac.uk wrote: On 15/08/12 16:13, Fajar A. Nugraha wrote: Something is setting User-Password check item. If you store the Bear in mind that rlm_ldap has some quite complex password processing rules hard-coded into the source. In

RE: Tricky problem with ldap and primary groups in AD

2012-08-03 Thread Franks Andy (RLZ) IT Systems Engineer
That works fine. However I'm still intrigued about why the other method fails, and I also presume this method doesn't allow multiple attribute types to be updated as per the exec-program-wait script in the example documentation? Yes Maybe it's not supported? Must admit I am a

Re: Tricky problem with ldap and primary groups in AD

2012-08-03 Thread Alan DeKok
Franks Andy (RLZ) IT Systems Engineer wrote: It's working from the rlm_exec module as intended now, not sure what I did wrong yesterday. No idea. I tried output_pairs=control in the module but it didn't like it, - should that work if =config is v1 stuff? It should, I guess. As

Re: Tricky problem with ldap and primary groups in AD

2012-08-02 Thread Phil Mayers
On 08/01/2012 10:52 PM, Franks Andy (RLZ) IT Systems Engineer wrote: user on a specific client machine. The Ldap-Group doesn’t see the primary group as it’s set to do a“memberof” lookup. Other groups are seen fine. Yes. Sadly this is an AD-specific behaviour, and there's no way to change

RE: Tricky problem with ldap and primary groups in AD

2012-08-02 Thread Franks Andy (RLZ) IT Systems Engineer
On 08/01/2012 10:52 PM, Franks Andy (RLZ) IT Systems Engineer wrote: user on a specific client machine. The Ldap-Group doesn't see the primary group as it's set to do amemberof lookup. Other groups are seen fine. Yes. Sadly this is an AD-specific behaviour, and there's no way

Re: Tricky problem with ldap and primary groups in AD

2012-08-02 Thread Phil Mayers
On 02/08/12 14:18, Franks Andy (RLZ) IT Systems Engineer wrote: Correct. You can however check them in unlang authorize { ... ldap if (Ldap-Group == mygroup) { # they're a member via memberof

RE: Tricky problem with ldap and primary groups in AD

2012-08-02 Thread Franks Andy (RLZ) IT Systems Engineer
Hi, I've got another query to do with this issue. I'm trying to follow up running an external script that could feasibly update a control value within freeradius. It's working fine to push the variable outwards, and recording that passed variable to a file using the bash redirect , however I've

Re: Tricky problem with ldap and primary groups in AD

2012-08-02 Thread Alan DeKok
Franks Andy (RLZ) IT Systems Engineer wrote: and am assigning the Reply-Message attribute the value that should be returned from the script using update reply { Reply-Message := %{control:My-Local-Integer} } You can just do: update reply { Reply-Message :=

RE: Tricky problem with ldap and primary groups in AD

2012-08-02 Thread Franks Andy (RLZ) IT Systems Engineer
[mailto:freeradius-users-bounces+andy.franks=sath.nhs.uk@lists.freeradiu s.org] On Behalf Of Alan DeKok Sent: 02 August 2012 17:19 To: FreeRadius users mailing list Subject: Re: Tricky problem with ldap and primary groups in AD Franks Andy (RLZ) IT Systems Engineer wrote: and am assigning the Reply-Message

Re: Tricky problem with ldap and primary groups in AD

2012-08-02 Thread Alan DeKok
Franks Andy (RLZ) IT Systems Engineer wrote: That works fine. However I'm still intrigued about why the other method fails, and I also presume this method doesn't allow multiple attribute types to be updated as per the exec-program-wait script in the example documentation? Yes Maybe

Tricky problem with ldap and primary groups in AD

2012-08-01 Thread Franks Andy (RLZ) IT Systems Engineer
Hi All, I've been searching for half the day and can't find an answer for a question I have. I'm new to freeradius and so far am finding it a rewarding challenge. I have freeradius 2.1.10 up and running, querying AD via ldap and authenticating with ntlm_auth fine. I'm using Ldap-Group checks

Re: Tricky problem with ldap and primary groups in AD

2012-08-01 Thread Alan DeKok
policies directly in the configuration files. It’s also tedious to have to know the primarygroupIDs for each group. I’d quite like the users file to be the main source of passing radius attributes back to clients, but there may be another way? LDAP makes this difficult. Alan DeKok. - List info

Win7 Ldap Auth without RootCA

2012-07-18 Thread mpi
Hello, I'm trying to run ldap auth with FreeRADIUS Version 2.1.10 (Debian Squeeze) and FreeRADIUS Version 2.1.12 (FreeBSD 9.0) with a self-signed certificate. It is working for all platform excepted Win7 supplicant. I found few stuff talking about this problem but i want to be sure. Any way

Re: Win7 Ldap Auth without RootCA

2012-07-18 Thread Alan DeKok
mpi wrote: Any way to do this working without change security settings on all roaming clients? You need to add the root CA to all Windows clients. This is how PEAP works. Alan DeKok. - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Freeradius 8021x with LDAP

2012-07-18 Thread Francesc Zacarias
Hi there! We're trying to set up Freeradius wtih 8021x. Freeradius should query a OpenLDAP server for autentication and check if the user belongs to certain groups and return different VLAN IDs depending on that. Unfortunately, we're having issues with the LDAP autentication part. We only managed

Re: Freeradius 8021x with LDAP

2012-07-18 Thread Alan DeKok
independently, they should work together. Unfortunately, we're having issues with the LDAP autentication part. So what did you configure? Did you read raddb/sites-available/default, and look for ldap? I'm looking at the ldap queries performed by freeradius it is only checking if the user

Re: Freeradius 8021x with LDAP

2012-07-18 Thread alan buxey
Hi, you need to ensure that LDAP is being called in the authenticate section of the inner-tunnel (in the EAP phase) and that it is being given the cleartext password that you say is being stored there. you also need to protect your authorize calls to LDAP - as your debug clearly shows that its

ldap attribute

2012-07-11 Thread sandm...@uni-greifswald.de
Hello, i want to get different attribute from ldap. Something like cn. Is this possible and where must be set it? Mit freundlichen Grüßen David Sandmann *** Fachinformatiker für Systemintegration Ernst-Moritz-Arndt-Universität Rechenzentrum Felix-Hausdorff

Re: problem with multiple ldap

2012-07-09 Thread Prateek Kumar
Thanks Alan Matthew. Regards, Prateek - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: problem with multiple ldap

2012-07-07 Thread Alan Buxey
You don't have the preprocess module listed in inner-tunnel alan - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: problem with multiple ldap

2012-07-07 Thread Matthew Newton
On Sat, Jul 07, 2012 at 07:10:49PM +0530, Prateek Kumar wrote: NAS-IP-Address so clients (using PEAP/MSCHAPv2) associating to particular ... Is there some thing I have missed ? set copy_request_to_tunnel=yes in the peap {} section of eap.conf Matthew -- Matthew Newton, Ph.D. m...@le.ac.uk

Re: LDAP authentication trouble on 3.0

2012-07-06 Thread Alan DeKok
David Aldwinckle wrote: (0) WARNING: Empty pre-proxy section. Using default return values. Proxying to virtual server captive_portal (0) # Executing section authorize from file /etc/raddb/sites-enabled/default That doesn't make sense. You've broken the configuration somehow. Don't do

Re: LDAP authentication trouble on 3.0

2012-07-05 Thread Phil Mayers
On 07/05/2012 12:24 AM, David Aldwinckle wrote: Hello, I am having a problem getting LDAP authentication working on FreeRADIUS Version 3.0.0. The behaviour I am experiencing is that the server will send an Access-Accept message without doing any checking of credentials. I would expect to see

Re: LDAP authentication trouble on 3.0

2012-07-05 Thread David Aldwinckle
Hi, That is what I originally hoped for. Your post made me go back and rewrite my ldap module config, which in the end didn't change anything. I also did a search on the entire directory for any instances of Auth-Type to verify that I had not set it to Accept. I found no occurrences

How LDAP Authentication works

2012-06-22 Thread Tobias Hachmer
Hello list, I know this isn't a direct FR related issue, but I think the people here have deep know how or some further links I can get my information I need. What I'm interested in is how the LDAP user/password authentication works, especially how FR does it. In LDAP module configuration I

Re: How LDAP Authentication works

2012-06-22 Thread Fajar A. Nugraha
On Fri, Jun 22, 2012 at 1:30 PM, Tobias Hachmer li...@kokelnet.de wrote: In LDAP module configuration I set an identity. For my understanding this is for the ldap bind user. With this identity FR will get access to the ldap database, to do groupmembership information or attributes and so

Re: How LDAP Authentication works

2012-06-22 Thread Tobias Hachmer
On 22.06.2012 10:18, Fajar A. Nugraha wrote: But is this identity also needed for authentication only? There are several ways you can use LDAP for authentication. For normal LDAP servers which stores user password in an accessible attribute with optional supported encrypted schema, you only

Re: How LDAP Authentication works

2012-06-22 Thread Alan DeKok
Tobias Hachmer wrote: The Test MS AD Server has domain functional level 2008 R2 and quite default settings. Active directory is not really an LDAP server. The reasons are complicated. It's almost an LDAP server, but it's different in critical ways. In radiusd -X output the ldap module

<    1   2   3   4   5   6   7   8   9   10   >