hi - we're seeing a Lucent Stinger device sending radius requests with a
passowrd field that is less than the 16 octets as per protocol.
now, some radius servers seem not to like this - but freeradius seems to
work fine with this. i suspect that is because freeradius either ignores the
length of that field, or copies it to a zero-padded buffer.
am i right? see section of an email below for details...
tariq
-----
have the Password and Chap-Password fields with 16 and
17 octects respectively - as seen in the trace 5 logs. This is as per
protocol.
however, the problem stinger seems to send "short" passwords such as :
Password = "<249>!<19><31><236><170><172>"
Password = "<252><7><217><213><237><134><130>"
Password = "<249>!<19><31><236><170><172>"
and so on .. these are less than the normal:
Password = "<215>y<160><1>F<224><193><187>OM<'<0><222><197><227>"
- 16 octects
CHAP-Password =
<1><193><202>t<186><136><24><147><145><210>n<233>.{9!; - 17 octects
is this evidence that the problem lucent stinger is malforming its packets?
or are there valid cases when the Password field is short?
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html