Dear Federico sir.

I really appreciate your very fast response.

I think I misunderstood the docs.

So, basically it's freeradius's requirement to all backend to provide 
'clear-text-password' right ?

If that so, 
How you provide it since I don't see any 'clear text' field in your models?
How you get 'clear text' password from django password storage ?

Note : 
Currently, since my app only support PAP ... i just use 
django.contrib.auth.authenticate ... and whenever valid I just use that PAP 
password as 'Clear-Text-Password' attribute.
But if I want CHAP ... my App will not got clear-text-password from 
Freeradius call ... we need to 'count' it. So I will not able to use 
'django.contrib.auth.authenticate' to authenticate user agains django user 
table.

Sincerely
-bino-

On Thursday, October 25, 2018 at 4:22:07 PM UTC+7, Federico Capoano wrote:
>
> Hi Bino and welcome,
>
> we use the rml-rest module of freeradius to authorize users via a REST API 
> <https://github.com/openwisp/django-freeradius/blob/master/django_freeradius/api/views.py>,
>  
> although it is still possible to use radius checks as well as described 
> here:
>
> https://django-freeradius.readthedocs.io/en/latest/general/freeradius.html#using-radius-checks-for-authorization-information
>
> If you need to see the freeradius configuration required to make this 
> work, it's also shown in the same page I just linked.
>
> Cheers
> Federico
>
> On Thu, Oct 25, 2018 at 11:00 AM Bino Oetomo <[email protected] 
> <javascript:>> wrote:
>
>> Dear All.
>>
>> I just found your great django-freeradius today.
>>
>> Actualy, I wrote a django application with the same function as yours 
>> back in october 2016.
>> I guarantee there is a bunch of noodle script in it, away away from 'good 
>> enough' to be published.
>>
>> Currently, those up is used in-house.
>> it also serve as a backend for freeradius DHCP.
>> it's full 'rest', so that freeradius didn't need mysql access.
>>
>> BUT ... errhhh
>> I don't satisfied with my app (and or system).
>> Most important things that I hate from it :It need to provide 
>> 'Clear-Text-Password' to FreeRadius.
>>
>> Looks like your app don't need to give 'Clear-Text-Password' attribute to 
>> FreeRadius, could you please tell me how you do it ?
>>
>> Here is my FreeRadius rest config :
>>
>> rest {
>>     #
>>     #  This subsection configures the tls related items
>>     #  that control how FreeRADIUS connects to a HTTPS
>>     #  server.
>>     #
>>     tls {
>>     }
>>
>>     my_uri = "http://127.0.0.1:8000/hotspot/";
>>     my_uri_acct = "http://127.0.0.1:8001/hotspot/";
>>     authorize {
>>         uri = "${..my_uri}"
>>         method = 'post'
>>         body = 'json'
>>         tls = ${..tls}
>>     }
>>     authenticate {
>>         uri = "${..my_uri}"
>>         method = 'post'
>>         body = 'json'
>>         tls = ${..tls}
>>     }
>>     accounting {
>>         uri = "${..my_uri_acct}"
>>         method = 'post'
>>         body = 'json'
>>         tls = ${..tls}
>>     }
>>     post-auth {
>>         #uri = 
>> "${..my_uri}/user/%{User-Name}/mac/%{Called-Station-ID}?action=post-auth"
>>         uri = "${..my_uri}"
>>         method = 'post'
>>         body = 'json'
>>         tls = ${..tls}
>>     }
>>
>>     pool {
>>         start = ${thread[pool].start_servers}
>>
>>         min = ${thread[pool].min_spare_servers}
>>
>>         max = ${thread[pool].max_servers}
>>
>>         spare = ${thread[pool].max_spare_servers}
>>
>>         uses = 0
>>
>>         retry_delay = 30
>>
>>         lifetime = 0
>>
>>         idle_timeout = 60
>>
>>     }
>> }
>>
>>
>>
>>
>>
>> and here is some from default site config
>>
>> authorize {
>>     rest
>>     mschap
>>     pap
>>     eap
>> }
>> authenticate {
>>     pap
>>     mschap
>>     eap
>> }
>>
>> preacct {
>>     preprocess
>>     acct_unique
>>     suffix
>>     files
>> }
>>
>>
>> accounting {
>>     rest
>>     detail
>>     exec
>> }
>>
>> post-auth {
>>     update {
>>         &reply: += &session-state:
>>     }
>>     -sql
>>     exec
>>     remove_reply_message_if_eap
>>     Post-Auth-Type REJECT {
>>         # log failed authentications in SQL, too.
>>         -sql
>>         attr_filter.access_reject
>>
>>         # Insert EAP-Failure message if the request was
>>         # rejected by policy instead of because of an
>>         # authentication failure
>>         eap
>>
>>         #  Remove reply message if the response contains an EAP-Message
>>         remove_reply_message_if_eap
>>     }
>> }
>>
>>
>>
>> Sincerely
>> -bino-
>>
>> -- 
>> You received this message because you are subscribed to the Google Groups 
>> "OpenWISP" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to [email protected] <javascript:>.
>> For more options, visit https://groups.google.com/d/optout.
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"OpenWISP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to