Excellent! Kostas, you are the best. So, I'm back to square one. I'm sure I 
accidently removed that while I was trying to fix an issue I'm currently 
having, Perhaps someone can give advice on it?

    I'm running freeradius 1.0.1 to authenticate wireless and VPN users, using 
the NTpassword and LMpassword attributes stored in LDAP. If windows sends only 
the username and password everything works fine. The problem is wireless 
clients can't connect when windows sends the credentials in the DOMAIN\USER 
form. I originally tried the with_ntdoman_hack = Yes setting but always 
received the following error: 

rlm_eap: Identity does not match User-Name, setting from EAP Identity. 

After doing some research, I found a suggestion to add the following to hints:

DEFAULT Prefix == "DOMAIN\\"
        Hint = "EAP",
        Service-Type = Framed-User,
        Framed-Protocol = EAP

After doing this I now receive this error: 

lm_ldap: performing search in ou=Users,dc=domain,dc=com, with filter 
(uid=testuser)
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaNTPassword as NT-Password, value 
AB6FD631EB61B62587E3E1E1D4108D34 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value 
E8DD557F11182BD16A59F3FB1669ACA0 & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user DOMAIN\testuser authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
  modcall[authorize]: module "ldap" returns ok for request 7
modcall: group authorize returns updated for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap:  Had sent TLV failure, rejecting.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 7
modcall: group authenticate returns invalid for request 7
auth: Failed to validate the user.
Delaying request 7 for 1 seconds
Finished request 7

Any thoughts on why this is happening? Is there another solution?

I would like to find out if I can allow all users in LDAP to access to our 
access point, but at the same time only allowing members of the VPN group to 
have VPN access.  Is there anyway to achieve what I want using a single radius 
server? If so can someone point me to some docs...I've been unable to find 
anything. Thanks for your time...

> 
> From: Kostas Kalevras <[EMAIL PROTECTED]>
> Date: 2005/04/26 Tue AM 09:08:29 EDT
> To: [email protected]
> Subject: Re: Restricting access by LDAP group.
> 
> On Mon, 25 Apr 2005 [EMAIL PROTECTED] wrote:
> 
> > I had this working, I don't know why but for some reason it doesn't 
> > anymore. 
> > Any user in LDAP receives an Access-Accept. Here's my entire radiusd.conf 
> > and 
> > the output of a user that is not in the "VPN" group receiving an 
> > Access-Accept 
> > using radtest. Is there something wrong with my configuration?
> >
> > Thanks
> 
> > authorize {
> >        preprocess
> >        chap
> >        mschap
> >        suffix
> >        eap
> >        ldap
> > }
> 
> You don't have the files (users file) module in the authorize section.
> 
> --
> Kostas Kalevras               Network Operations Center
> [EMAIL PROTECTED]     National Technical University of Athens, Greece
> Work Phone:           +30 210 7721861
> 'Go back to the shadow'       Gandalf
> 
> - 
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
> 


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to