> > root@FREERADIUS:/etc/freeradius# ntlm_auth --username=0024D6650564
> > --password=Pa$$w0rd
> > NT_STATUS_OK: Success (0x0)
> > root@FREERADIUS:/etc/freeradius# ntlm_auth --username=0024D670F3A6
> > --password=Pa$$w0rd
> > NT_STATUS_OK: Success (0x0)
> > root@FREERADIUS:/etc/freeradius# ntlm_auth --username=0024D6650564
> > --password=Pa$$w0rd
> > NT_STATUS_OK: Success (0x0)
> >
> > The password Pa$$w0rd is set in the Wireless Controller, if 
> thats what you
> > mean by mschap client?

May I suggest two things:

1)  I'm assuming that the password is not actually 'Pa$$w0rd', but that string 
reminds me that certain special characters - the dollar sign is a notable one - 
are not always handled correctly in password strings.  Even if FreeRADIUS is 
handling it correctly, AD may not, and the wireless controller may not.  I 
suggest setting the password to something simpler.  If your password policy 
requires special characters, use dash, equals, underscore, or dot.  I have used 
passwords with these characters successfully when authenticating via EAP/PEAP 
through FreeRADIUS and then on through MSCHAPv2 to AD via ntlm_auth.  (Same 
chain as you.)

2)  Even if you are confident that your real password's characters are not a 
problem, re-enter it on the wireless controller, MANUALLY.  You may have 
accidentally entered an unprintable character or a space or some similar thing 
that causes the password to APPEAR to be correct, when in fact it doesn't match.

--J
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to