I got in to a discussion with a list serve at novell, for using 802.1x &
freeradius, against Novells LDAP server included with eDirectory. 
Novell is working on a solution to make eDirectory authentication &
mschapv2 possible with freeradius. Currently it is not!!!  The LDAP
server included with eDirectory, will not supply a clear text password
to freeradius.  I spent much time trying to make this work....bottom
line, the Novell LDAP server supplies a hash of the user password and
mschapv2 needs clear text.

http://forums.novell.com/group/novell.support.bordermanager.bmas-nmas-radius/readerNoFrame.tpt/@[EMAIL
 PROTECTED]@[EMAIL PROTECTED]@D-,[EMAIL PROTECTED]/@[EMAIL PROTECTED]

Quote from forum:
You are correct that the FreeRADIUS LDAP module cannot authenticate a
MS-CHAP password against eDirectory. This is because the RADIUS server
receives only a hash of the password from the client. To verify the
password, the server must lookup a clear-text version of the password,
then
compute a hash using the clear-text password with a nonce provided in
the
access-request packet. If the server generated hash matches the hash
provided by the client, then authentication is accepted.

The FreeRADIUS LDAP module is quite simple, and just does an LDAP
search
followed by a simple bind. Since you're trying to do an MS-CHAPv2
authentication, FreeRADIUS is trying to bind to eDirectory with an
MS-CHAPv2
hash, which obviously does not work. You can do this type of
authentication
over LDAP, but you have to use SASL, and FreeRADIUS does not support
SASL.

If you've been reading the other posts in this group, then you probably
know
that there is a team at Novell working on integrating FreeRADIUS more
tightly with eDirectory. Part of this work will be to allow FreeRADIUS
to
authenticate CHAP, MS-CHAPv1/MSCHAPv2, and LEAP passwords against
eDirectory. This will allow you to process PEAP/MSCHAPv2
authentications
using your users' Universal Passwords in eDirectory.


Daniel D. Hesse
Technology Administrator
Methodist Manor Retirement Community
712-732-1120 Ext.116   [EMAIL PROTECTED]

>>> [EMAIL PROTECTED] 12/8/2004 9:12:48 AM >>>
I installed Freeradius ver.1.0.1 and successfully authenticated against
local 
users on my Red Hat Enterprise ver.2.1 system.  I then tried to
configure it 
to authenticated users on a Novell server via LDAP. It did not work. 
Here is 
the log from the Novell server:

[2004/12/08  9:24:43] Found available monitor 0x93a 
                            
[2004/12/08  9:24:43] New SSL connection 0xcb2d9760, monitor = 0x93a,
index = 
1 
[2004/12/08  9:24:43] Monitor 0x93a initiating handshake on connection

0xcb2d976
0 
                                                                       
      
[2004/12/08  9:24:43] DoHandshake on connection 0xcb2d9760 
                     
[2004/12/08  9:24:43] Connection 0xcb2d9760 failed SSL handshake, err =
-25 
    
         Check the client's certificate 
                                         
[2004/12/08  9:24:43] Server closing connection 0xcb2d9760, socket
error = -25 


Here is the output from the freeradius debugger:


rad_recv: Access-Request packet from host 10.192.1.11:1407, id=22,
length=45
--- Walking the entire request list ---
Waking up in 31 seconds...
Thread 2 got semaphore
Thread 2 handling request 1, (1 handled so far)
         User-Name = "admin"
         User-Password = "password"
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
   modcall[authorize]: module "preprocess" returns ok for request 1
   modcall[authorize]: module "chap" returns noop for request 1
   modcall[authorize]: module "mschap" returns noop for request 1
     rlm_realm: No '@' in User-Name = "admin", looking up realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 1
   rlm_eap: No EAP-Message, not doing EAP
   modcall[authorize]: module "eap" returns noop for request 1
     users: Matched DEFAULT at 152
   modcall[authorize]: module "files" returns ok for request 1
rlm_ldap: - authorize
rlm_ldap: performing user authorization for admin
radius_xlat:  '(uid=admin)'
radius_xlat:  'o=ADMIN'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: attempting LDAP reconnection
rlm_ldap: (re)connect to 10.192.1.250:636, authentication 0
rlm_ldap: setting TLS mode to 1
rlm_ldap: could not set LDAP_OPT_X_TLS option Success
rlm_ldap: bind as cn=admin,o=ADMIN/ to 10.192.1.250:636
rlm_ldap: waiting for bind result ...
rlm_ldap: ldap_result()
rlm_ldap: cn=admin,o=ADMIN bind to 10.192.1.250:636 failed: Can't
contact LDAP 
server
rlm_ldap: (re)connection attempt failed
rlm_ldap: search failed
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns fail for request 1
modcall: group authorize returns fail for request 1
Finished request 1
Going to the next request
Thread 2 waiting to be assigned a request
--- Walking the entire request list ---
Cleaning up request 1 ID 22 with timestamp 41b70ead
Nothing to do.  Sleeping until we see a request.

                                                                                
                
Michael Basso
                                                                                
                
Michael Basso
Network Specialist
Bedford Central School District
(914) 241-6186
                                                
                                                                                
                                                                                

- 
List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html 


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to