Quoting Arnauld Dravet <[EMAIL PROTECTED]>:

> >   That shouldn't be necessary.
> 
> well i'll double check tomorrow, i've done so many tests so far that maybe it's 
> not usefull anymore .. I know for sure that in debug logs, it shows the password 
> grabbed as {CRYPT}xxxxxxx.
> 
> > > rlm_ldap: Adding userPassword as Crypt-Password, value { & op=21
> > 
> >   That value doesn't look like a password.
> 

I am having this same problem when I use the Crypt-Password attribute.  Has anyone else
had this problem and overcome it?


> yes i know, and i think that's the problem. When i just use password_attribute 
> it grabs the whole password (displayed in debug logs), and not anymore when i 
> use the mapping for Crypt-Password, of course on the same ldap attribute for 
> both. i thought the '{' displayed was from the first caracter it met ( from 
> {CRYPT}xxxx ) so i tried to re-enable the password_header field in the ldap 
> section of radiusd.conf, without any good result.
> 
> >   That value should have a "0x" in front of it.
> 

We are using PEAP with MS-CHAPv2 and LDAP and a Win2000 supplicant for testing.  Do I
need to use the NT-Password attribute?  Right now our directory only stores a
userPassword attribute which is encrypted.


I guess my big question is do the encrypted passwords in the LDAP directory make
authenticating impossible?  Do they need to be clear-text with the setup we have?  We
are running FreeRadius 1.0.0pre3 on Fedora with LDAP to store attributes (userPassword
is the only password (encrypted) attribute) and using PEAP with MS-CHAPv2 to
authenticate my win2000 client.

-Al

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to