[EMAIL PROTECTED] wrote:

> Russell Enderby <[EMAIL PROTECTED]> wrote:
> > Since you are going to act like a baby about this I can talk down to
> > your level:
>
>   Hmm... ad hominem attacks.  I didn't call you names.  I didn't talk
> down to you.
>
>   I'll toss a coin... I lost.  I guess I'll respond to the rest of
> your message...
>

When someone asks to understand why CHAP does not work with radius and all you do
is say read the FAQ over and over and point to a function that does an md5 hash.
I am sure you can see how not helpful that is.


>
> > I did not ask for how a CHAP password is encrypted with md5.  I
> > asked for a block diagram of how the CHAP protocol works between the
> > client, nas, and radius server and all the handshaking in between.
>
>   You're perfectly welcome to do a net search yourself.  Please
> understand if I won't hold your hand.

If this is your help when someone posts a message on the list then replying was
not very useful except to waste both of our times.

>
> > This pittly function that calls librad_md5_calc() when passed a string means
> > absolutely nothing about this conversation.
>
>   Umm.. that function implements CHAP password encoding.  If it's
> irrelevant, I don't know why.
>

It is when we are not talking about how a encoded password works.  Instead I was
trying to understand how the actual comparison happens.  This was clearly answered
by Mark.

>
> > I doubt that you comprehend my question and a full understand of the
> > CHAP protocol yourself.
>
>   I feel so hurt by that.
>

Im sure.

>
> > This is key information that I am talking about.  If what you say
> > below about how the radius server sends the encrypted password back
> > to the NAS then the answer to this is:
>
>   No, please read my response again.  I did NOT say that.  The RADIUS
> server NEVER sends the encrypted password back to the NAS.  What I
> said was:
>
> > >   It's the other way around.  The plain text password supplied by the
> > > configuration at the RADIUS server is encrypted using information from
> > > the encrypted CHAP password, as send in the RADIUS packet from the
> > > NAS.
> > >
> > >   This encrypted password is compared to the encrypted CHAP password.
>
>   That is, the RADIU SERVER does the comparison.

Yes.  But the CRITICAL piece of information is that the radius server RECEIVES a
password with a one-way hash and the shadow file has a one-way hash as well so
there is no way to compare.  By simple saying "You MUST have a clear text password
for the radius to work." means nothing.

>
> > No.  The RAS receives the password from the radius server.
>
>   If you really believe that, then you don't understand how RADIUS
> works, either.  The RFC's are publicly available.  The source to the
> radius server is publicly available.  Feel free to read them.
>

Again thanks to Mark for this.


>
> > >   This encrypted password is compared to the encrypted CHAP password.
> >
> > This completely contradicts what you said above.
>
>  Only if you completely misunderstand it's meaning.

>
> > >   Saying that shows you don't understand how CHAP works.  It's in the
> > > FAQ for crying out loud.  Go read the FAQ to understand it better.
> > >
> >
> > The FAQ does NOT EXPLAIN JACK!  If you are referring to section 4.4
> > and 4.5 in the FAQ please show me where in the FAQ the diagrams are
> > that show the PHYSICAL CHAP protocol.  This means the actual size of
> > the packets, the contents of each, the fields in each packets, the
> > sequence of the packets, who initiates the packets and what reponses
> > are expected.
>
>   I refuse to explain that.  Go read the RADIUS RFC's, or the CHAP
> RFC.  They're really not hard to find.  What you want is described
> there.
>
>   If you're unwilling to read the RFC's yourself (as most people
> implementing RADIUS have done already), then please understand if I'm
> not willing to explain them to you.
>

Thanks for Mark again for this.


>
> > The FAQ does not explain any of this and if you think it does then
> > you must have a copy that is not on their website.
>
>  The FAQ explains how CHAP interacts with the password files and
> RADIUS.  If that isn't good enough, go read the RFC's yourself.
>

All it says is that it needs a clear text password.  It does not answer WHY.

>
> > >   To repeat:  The shadow password file does NOT contain the plain text
> > > password.  So it's IMPOSSIBLE for the radius server to use the plain
> > > text password to get an encrypted CHAP password, as the radius server
> > > DOES NOT have access to a plain text password.
> > >
> >
> > I repeat.  This statement is BS.  A shadow password file contains a
> > PLAIN TEXT PASSWORD that you can compare against.
>
>   This is the part where I laugh hysterically.  You're wrong.  A
> simple 'man shadow' on a Unix box would show you:
>

A shadow file contains a clear text password that has been one way hashed.  And
now with Marks information knowing that you are given already a one-way hash it
will be hard to work with.



>
> ------
> SHADOW(3)                                               SHADOW(3)
>
> NAME
>        shadow - encrypted password file routines
> ...
> DESCRIPTION
>        shadow  manipulates  the  contents  of the shadow password
>        file, /etc/shadow.  The structure in the #include file is
>
>        struct spwd {
>                  char *sp_namp; /* user login name */
>                  char *sp_pwdp; /* encrypted password */
> ...
> ----
>
>   See?  the password is encrypted, and it isn't available in plain
> text.
>
>   But I doubt you'll believe me.
>
> > Again here are the two scenarios:
> ...
>
>   They're nonsense.  You even contradict yourself:
>
> > #1: The radius server receives a password to check.  It encrypts it
> > with md5 and does a text compare to the shadow file and your done.
>
>   So here you say that the shadow passwords are encrypted.
> Previously, you said they weren't.
>
> > We are not talking rocket science here.  And the sarcasm your help by saying
> > "EVERYTHING IS IN THE FAQ" is worthless to be posted as a reply.
>
>   ... only if you're unwilling to read and understand the FAQ.
>
> > Saying the same thing over and over gets you know where.
>
>   ... only if the person I'm talking to refuses to listen.
>
>   Sorry, but you've used personal attacks, you've contradicted
> yourself, you've shown that you're unwilling to do any work yourself,
> and that you want everyone else to do the work for you.  You've shown
> that you don't understand simple explanations, and then yell in ALL
> CAPS at other people because they don't understand your confused
> questions.
>
>   These are all the markings of a kook.  Please understand (yeah, right)
> if I don't bother replying to any more of your messages, no matter how
> personal the attacks get.
>
>   Alan DeKok.
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to