Agent Smith wrote:
This was taken from radiusd -X, and then I logged in
with a username,password and domain name too.
Ideally I'd like to make it so that it works either
way but for now I'll settle with ability to login when
the domainname was supplied. Thanks,

rad_recv: Access-Request packet from host
192.168.3.44:1645, id=139, length=139
        User-Name = "UPG\\test"
        Framed-MTU = 1400
        Called-Station-Id = "0013.8032.40d1"
        Calling-Station-Id = "0090.4b1d.86cc"
        Service-Type = Login-User
        Message-Authenticator =
0x719f121abfb3b27a8746acabe0e1b6c6
        EAP-Message = 0x0202000f123d4544566a726176616c

Unless I'm mistaken, the username in the EAP-Message it not just different but completely different. But anyway...

        NAS-Port-Type = Wireless-802.11
        NAS-Port = 1527
        NAS-IP-Address = 192.168.3.44
        NAS-Identifier = "Cisco_AP"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 32
  modcall[authorize]: module "preprocess" returns ok
for request 32
  rlm_eap: EAP packet type response id 2 length 15
  rlm_eap: No EAP Start, assuming it's an on-going EAP
conversation
  modcall[authorize]: module "eap" returns updated for
request 32
    rlm_realm: No '/' in User-Name = "test", looking
up realm NULL

Ok, FR thinks the username is "test" not UPG\test here. Therefore you've got ntdomain_hack enabled in preprocess. Turn it off.

You've already stated that ntlm_auth then fails - that's because your ntlm_auth command line is incorrect. You can fix it a number of ways:

 1. set "with_ntdomain_hack = yes" on the mschap module (NOT in preprocess)
 2. set the "ntlm_auth" command to (all on one line):

/path/to/ntlm_auth --request-nt-key --username=%{mschap:User-Name} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}

...note the use of the mschap:User-Name which will always strip the domain\ before doing the chal/resp (and in CVS head turn host/foo into foo$ as well)



    rlm_realm: Found realm "NULL"
    rlm_realm: Adding Stripped-User-Name = "test"
    rlm_realm: Proxying request from user test to
realm NULL
    rlm_realm: Adding Realm = "NULL"
    rlm_realm: Authentication realm is LOCAL.

Also, you typically do not want "/" realms, and I seriously doubt you want them configured like this (matching NULL).


  modcall[authorize]: module "suffix" returns noop for
request 32
    users: Matched entry DEFAULT at line 1
  modcall[authorize]: module "files" returns ok for
request 32
  modcall[authorize]: module "etc_smbpasswd" returns
notfound for request 32
modcall: group authorize returns updated for request
32
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 32
rlm_eap: Identity does not match User-Name, setting
from EAP Identity.
  rlm_eap: Failed in handler
  modcall[authenticate]: module "eap" returns invalid
for request 32
modcall: group authenticate returns invalid for
request 32
auth: Failed to validate the user.
Delaying request 32 for 1 seconds
Finished request 32
Going to the next request
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 139 to 192.168.3.44:1645
Waking up in 4 seconds...
--- Walking the entire request list ---
Cleaning up request 32 ID 139 with timestamp 441affff
Nothing to do.  Sleeping until we see a request.


--- Alan DeKok <[EMAIL PROTECTED]> wrote:

Agent Smith <[EMAIL PROTECTED]> wrote:
When a user connectes, they are presented with a
login
box (username, password and domain name) if they
put a
domain name in the domain field, radius can't
authenticate them and gives that error message.
when
the domain field is left empty, it works fine.
  You should be able to use a module before 'eap" to
fix the Username.

I read some posting that talked about how you have
to
turn off ntdomain_hack off and I tried that, it
didn't
gave me that error but then the ntlm_auth failed
saying 'NO SUCH USER' so my guess is that the
user-name has to be exactly same as what gets sent
into EAP message.
  If you're using ntlm_auth, you're not using
EAP-TLS.  You're using
EAP-PEAP, there's a difference.

  And the ntlm_auth program is run *only* inside of
the TLS tunnel,
where there's no certificate, so matching username
to certificate
isn't a problem.

has anyone else ran into this? any ideas on how to
fix
it?
  Run the server in debugging mode and post the
results to the list.
Odds are there's a simple way to do what you want.

  Alan DeKok.

- List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html



__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam
protection around http://mail.yahoo.com
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to