On Sun, 21 Mar 2004, Alan DeKok wrote:

> Peter Stamfest <[EMAIL PROTECTED]> wrote:
> > One solution would be to base the authorization on the content of the 
> > certificate (its DN or DN parts).
> > 
> > Is this possible with current sources?
> 
>   If it's not in the current CVS, I do know there was a patch posted a
> while back.  My "patches" mail folder says:
> 
> Nov. 26  Michael Griego     [Patch] Add CN Checking for EAP-TLS authentication

This patch is not in CVS. It seems not to apply anymore.

>   It's worse than that.  Simultaneous-Use is problematic for *any* EAP
> method.  The AP often doesn't keep track of who's logged on, so
> checrad doesn't work.  It often doesn't supply things like NAS-Port,
> so radutmp doesn't work.

Agreed, I'm seeing this very effect in reality. I meant: Even if 
everything else would work perfectly on the technical side then users 
could still break it. 

>   And when using certificates, TTLS and PEAP are problematic.  There's
> an "outer" User-Name, and an "inner" User-Name.  Which one do you use?
> You can send a User-Name back in an Access-Accept, but you need to
> send the inner one, as the outer is often "anonymous".  But if you do
> that, everyone else on the network can see that inner
> username... which was previously hidden in a TLS tunnel.
> 
>   It's not nice.

Certainly not.

peter


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to