pam_radius_auth updated spec file, please include in future releases

2007-10-30 Thread Florin Andrei
, -- Florin Andrei http://florin.myip.org/ - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: pam_radius_auth updated spec file, please include in future releases

2007-10-30 Thread Florin Andrei
Florin Andrei wrote: I attached an updated spec file for pam_radius_auth. No, I didn't. _Now_ I did. :-/ -- Florin Andrei http://florin.myip.org/ %define name pam_radius_auth %define shortname pam_radius %define version 1.3.17 %define release 0 Name: %{name} Summary: PAM Module for RADIUS

delayed Access Reject response

2007-10-30 Thread Florin Andrei
enters the password the second time. It's like the server waits for the next auth attempt to send back the Reject. What could be the cause? -- Florin Andrei http://florin.myip.org/ - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: delayed Access Reject response

2007-10-30 Thread Florin Andrei
manIP wrote: On 10/30/07, *Florin Andrei* [EMAIL PROTECTED] mailto:[EMAIL PROTECTED] wrote: If the password is incorrect, the Access Reject reply is delayed until the user enters the password the second time. It's like the server waits for the next auth attempt to send back

LDAP authentication

2005-07-12 Thread Florin Andrei
. LDAP is currently used to authenticate various things, and I'd like to point a Radius server to it to use the same user passwords. -- Florin Andrei http://florin.myip.org/ - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: LDAP authentication

2005-07-12 Thread Florin Andrei
On Tue, 2005-07-12 at 13:25 -0700, Florin Andrei wrote: I don't really care about any information that's returned, I only want to authenticate against LDAP. To be more precise, authentication happens during the LDAP Bind request. Subsequent searches are irrelevant. Can freeradius do the same

more detailed logging

2005-03-15 Thread Florin Andrei
cooperation, and i don't want to rely on that. I simply want to log, in SQL, all incoming authentication requests plus their source IP address. I am aware of the IP spoofing issues, i am not solely relying on this data to know what happens where. -- Florin Andrei http://florin.myip.org/ - List