OK Alan thanks...do you know if is there any way that let users to change
their own Radius passwords by themselves ???
Thanks again.
Roberto
2013/5/27 Arran Cudbard-Bell a.cudba...@freeradius.org
On 27 May 2013, at 18:03, Arran Cudbard-Bell a.cudba...@freeradius.org
wrote:
On 27 May
Roberto Carna wrote:
OK Alan thanks...do you know if is there any way that let users to
change their own Radius passwords by themselves ???
You were responding to Arran, not Alan.
The only way for users to change the RADIUS password is to give them
some kind of access to the database used
Dear, I have a Linux box authenticating SSH users against Freeradius. It
works OK.
When the users go into the Linux box via SSH, I need them to change their
own radius passwords. For this reason, I edited the /etc/pam.d/passwd file
as follow:
passwordsufficient
Dear, I have a Linux box authenticating SSH users against Freeradius. It
works OK.
When the users go into the Linux box via SSH, I need them to change their
own radius passwords. For this reason, I edited the /etc/pam.d/passwd file
as follow:
password sufficient pam_radius_auth.so
@include
On 27 May 2013, at 15:26, Roberto Carna robertocarn...@gmail.com wrote:
Dear, I have a Linux box authenticating SSH users against Freeradius. It
works OK.
When the users go into the Linux box via SSH, I need them to change their own
radius passwords. For this reason, I edited the /etc
them to change their
own radius passwords. For this reason, I edited the /etc/pam.d/passwd file
as follow:
password sufficient pam_radius_auth.so
@include common-auth
in order to communicate with our freeradius and change the user's password
executing the passwd command
Thanks for the reply.
I am new to FreeRadius and doing analysis on how to remove The identity
and password attributes of LDAP module in radiusd.config and still be
able to authenticate and authorize LDAP users.
Is there any other option/configuration to avoid usernames and plain
text passwords
? set restrictive permission on the file
so that only root and freeradius can read the admin credentials for the
ldap server. And do not let people log as root. Everyone do that. It
works fine.
Is there any other option/configuration to avoid usernames and plain
text passwords in the module ldap
On 04/10/2013 12:03 AM, pramod kulkarni wrote:
Thanks John for the reply.
can I use EAP-TLS method of authentication with LDAP as backend
datastore to check usernames and passwords.
It would be like I bind to RADIUS server with EAP-TLS method using
certificate and check
There are other ways to establish the trust between radiusd and LDAP beside
simple binds which do not involve passwords. All of these use SASL in some
form. Unfortunately rlm_ldap does not support them. I know Alan rewrote
rlm_ldap recently for the upcoming 3.0 version,
I don't know
and passwords.
Please guide me how to achieve this,is there any help/doc how to configure
LDAP SASL bind for RADIUS Server.
Waiting for your inputs.
Thanks and Regards,
Pramod
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
as a backend datastore (lookup
passwords and password hashes after binding as a service) and using LDAP
as a authentication oracle (binding as the user to determine if the user
is authenticated depending on the bind result). From above it sounds
like you've configured LDAP as a backend datastore
Thanks John for the reply.
can I use EAP-TLS method of authentication with LDAP as backend datastore
to check usernames and passwords.
It would be like I bind to RADIUS server with EAP-TLS method using
certificate and check usernames and passwords from LDAP server
if yes on EAP-TLS can you
maximum username length and user
password lengt?
The RFCs say 253 octets for user name, and 128 for password.
I try to use next login passwords without success (checked with radtest):
http://dpaste.com/832115/
Which is (a) pretty much self-evident. And (b) not following the
daily
maximum username length and user
password lengt?
The RFCs say 253 octets for user name, and 128 for password.
I try to use next login passwords without success (checked with
radtest):
http://dpaste.com/832115/
Which is (a) pretty much self-evident. And (b) not following the
daily
Guys, does anybody know something about maximum username length and user
password lengt?
I try to use next login passwords without success (checked with radtest):
http://dpaste.com/832115/
Best Regards,
Dmitry
---
Dmitry KORZHEVIN
System Administrator
STIDIA S.A. - Luxembourg
e
op should be := and (not ==)
On 16.11.2012 16:45, Dmitry Korzhevin wrote:
Guys, does anybody know something about maximum username length and
user password lengt?
I try to use next login passwords without success (checked with radtest):
http://dpaste.com/832115/
Best Regards,
Dmitry
Dmitry Korzhevin wrote:
Guys, does anybody know something about maximum username length and user
password lengt?
The RFCs say 253 octets for user name, and 128 for password.
I try to use next login passwords without success (checked with radtest):
http://dpaste.com/832115/
Which
On Fri, 2012-11-09 at 15:37 -0400, Chris Taylor wrote:
I setup tcpdump to dump to a file (tcpdump -i eth0 -n -s0 port radius
-w rad-capture.lpc) , but when I check it out with wireshark I am
unable to see the password (just the username). Am I going about this
the wrong way?
You can decrypt
On 12 Nov 2012, at 10:24, Øystein Gyland oyst...@usit.uio.no wrote:
On Fri, 2012-11-09 at 15:37 -0400, Chris Taylor wrote:
I setup tcpdump to dump to a file (tcpdump -i eth0 -n -s0 port radius
-w rad-capture.lpc) , but when I check it out with wireshark I am
unable to see the password
I am migrating from one RADIUS setup that checks against a flat file with
usernames and passwords inside it . Over to a RADIUS server with and LDAP
backend. I have used JTR to crack most of the passwords but I still have some
left over that JTR cant crack.
I was thinking of trying to run
) It is almost always simpler to get the user to reset their password
#3) A tcp dump will not give you all the info you need to crack a PW depending
on the encryption method in use.
To summarize:
Don't crack user's passwords without the backing of a bunch of high paid
lawyers and metric ton
Subject: Best way to capture RADIUS passwords
I am migrating from one RADIUS setup that checks against a flat file with
usernames and passwords inside it . Over to a RADIUS server with and LDAP
backend. I have used JTR to crack most of the passwords but I still have
some left over that JTR
On 9 Nov 2012, at 20:09, Steven Staples sstap...@mnsi.net wrote:
Subject: Best way to capture RADIUS passwords
I am migrating from one RADIUS setup that checks against a flat file with
usernames and passwords inside it . Over to a RADIUS server with and LDAP
backend. I have used JTR
No.
You cannot do a successful auth against an incorrect password as you haven't
got agreement from both ends and therefore no keying material required for
WPA-RADIUS...therefore no key for the wireless association. Password change can
only be performed INSIDE the PEAP negotiation. As has
Nagel
matthias.h.na...@gmail.com wrote:
Hello,
I have set up FreeRADIUS Version 2.1.10 on an Ubuntu server 12.04,
Mysql Server version: 5.5.24. Everything is up and running but the
users passwords are stored in plain text in raddacct. I tried changing
the attribute to Crypt-Password
On 10/10/2012 12:31 AM, Jason Agress wrote:
Hi all,
We're currently using Microsoft IAS for RADIUS on our Cisco managed
wireless network. We do wireless logon on our clients, which requires
the user to first authenticate to RADIUS to initiate the wireless
connection, then authenticate against
On 10/10/2012 03:21 AM, Jason Agress wrote:
Will that allow successful RADIUS authentication - and, therefore
wireless access - before the password change is initiated? Because our
clients are Macs that won't prompt for password change until after they
are connected to the wireless and
Thanks, that makes sense. Just out of curiosity, which types of clients
typically support the MSCHAP password change? Does Windows?
Alan Buxey a.l.m.bu...@lboro.ac.uk writes:
No.
You cannot do a successful auth against an incorrect password as you
haven't got agreement from both ends and
This is very promising! Thank you!
Is there any significant downside to using EAP-TTLS/PAP over PEAP?
FreeRadius users mailing list freeradius-users@lists.freeradius.org
writes:
On 10/10/2012 03:21 AM, Jason Agress wrote:
Will that allow successful RADIUS authentication - and, therefore
Hi,
Thanks, that makes sense. Just out of curiosity, which types of clients
typically support the MSCHAP password change? Does Windows?
Windows does - I've used it. for 'incorrect try again' and for 'change password'
alan
-
List info/subscribe/unsubscribe? See
Hi,
Is there any significant downside to using EAP-TTLS/PAP over PEAP?
A few things, one is that you really need to trust the CA/RADIUS server -
as your credentials are all passed in the clear inside the TLS tunnel - so
if you are talking to a dodgy server you then send them everything
, 2012 at 4:02 PM, Matthias Nagel
matthias.h.na...@gmail.com wrote:
Hello,
I have set up FreeRADIUS Version 2.1.10 on an Ubuntu server 12.04,
Mysql Server version: 5.5.24. Everything is up and running but the
users passwords are stored in plain text in raddacct. I tried changing
the attribute
FreeRADIUS Version 2.1.10 on an Ubuntu server 12.04,
Mysql Server version: 5.5.24. Everything is up and running but the
users passwords are stored in plain text in raddacct. I tried changing
the attribute to Crypt-Password but it doesn't change anything.
What do you mean by doesn't change
Hi all,
We're currently using Microsoft IAS for RADIUS on our Cisco managed
wireless network. We do wireless logon on our clients, which requires the
user to first authenticate to RADIUS to initiate the wireless connection,
then authenticate against Active Directory to complete the login process.
commence and
the user can be prompted to change his/her password wirelessly.
Use the git master branch. It supports changing passwords via PEAP.
See raddb/mods-available/mschap
Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
and
the user can be prompted to change his/her password wirelessly.
Use the git master branch. It supports changing passwords via PEAP.
See raddb/mods-available/mschap
Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
Hello,
I have set up FreeRADIUS Version 2.1.10 on an Ubuntu server 12.04,
Mysql Server version: 5.5.24. Everything is up and running but the
users passwords are stored in plain text in raddacct. I tried changing
the attribute to Crypt-Password but it doesn't change anything. Do I
need to make
Hello,
I have set up FreeRADIUS Version 2.1.10 on an Ubuntu server 12.04,
Mysql Server version: 5.5.24. Everything is up and running but the
users passwords are stored in plain text in raddacct. I tried changing
the attribute to Crypt-Password but it doesn't change anything.
What do you mean
Server version: 5.5.24. Everything is up and running but the
users passwords are stored in plain text in raddacct. I tried changing
the attribute to Crypt-Password but it doesn't change anything.
What do you mean by doesn't change anything? If you have changed the
attribute name to Crypt-Password
:
On Mon, Oct 8, 2012 at 4:02 PM, Matthias Nagel
matthias.h.na...@gmail.com wrote:
Hello,
I have set up FreeRADIUS Version 2.1.10 on an Ubuntu server 12.04,
Mysql Server version: 5.5.24. Everything is up and running but the
users passwords are stored in plain text in raddacct. I tried changing
Hi,
I have set up FreeRADIUS Version 2.1.10 on an Ubuntu server 12.04,
Mysql Server version: 5.5.24. Everything is up and running but the
users passwords are stored in plain text in raddacct. I tried changing
the attribute to Crypt-Password but it doesn't change anything. Do I
need to make
I am running Freeradius 2.1.12 on a Centos box. I am able to
authenticate from the server command line, and from a Cisco ASR1k BRAS
via the command line. However, when I attempt to authenticate
customers from the DSL network, I get a reject, even though the
crypt'd passwords match! Here
Hi,
++[unix] returns updated
okay...so I assume you have edited the passwd module to read thew shadow
file?
[files] users: Matched entry DEFAULT at line 169
[files] users: Matched entry DEFAULT at line 172
[files] users: Matched entry DEFAULT at line 186
what do these lines have/say?
What do you mean by editing the passwd module?
As for the users lines, here is what is in that file (first line is
169 and the last one is 186):
DEFAULT Auth-Type == System
Fall-Through == 1
DEFAULT Service-Type == Framed-User
Framed-IP-Address == 255.255.255.254,
On Thu, Aug 16, 2012 at 3:40 AM, Robert Haskins
robert.hask...@gmail.com wrote:
I get a reject, even though the
crypt'd passwords match!
That's not how crypt works. You don't compare the crypted password.
[pap] login attempt with password krt444
that is what the user sends
[pap] Using
On 15 August 2012, at 14:23, Fajar A. Nugraha wrote:
On Thu, Aug 16, 2012 at 3:40 AM, Robert Haskins
robert.hask...@gmail.com wrote:
I get a reject, even though the
crypt'd passwords match!
That's not how crypt works. You don't compare the crypted password.
[pap] login attempt
On Wed, Aug 15, 2012 at 04:46:09PM -0700, Doug Hardie wrote:
[pap] login attempt with password krt444
...
[pap] Using CRYPT password *3u.3LS/VKTOVc
I don't know for sure about your system, but most Unix based
systems will not generate a * in the encrypted password.
Normally that is used
Hi everyone.
We have a freeradius server working great, it authenticate users from a squid
proxy and a wireless ap. The reason of my email is because we would like to use
the same md5 passwords that we use for the squid, the issue is when we try to
use the MD5 passwords. The radius server
On Mon, Apr 23, 2012 at 12:48:33PM -0500, Reyes Jimenez Alfonso Alejandro wrote:
bob Cleartext-Password := Test
and we would like to use the following:
bob MD5-Password := f43ed6ad2f43ea778b65557c626262ysu
There are non-hex chars in that string, so it's never going to work.
What changes
Thanks Mathew I will check that out.
regards.
Alfonso.
On Apr 23, 2012, at 3:14 PM, Matthew Newton wrote:
On Mon, Apr 23, 2012 at 12:48:33PM -0500, Reyes Jimenez Alfonso Alejandro
wrote:
bob Cleartext-Password := Test
and we would like to use the following:
bob MD5-Password :=
Mathew/List
I tried and I'm getting the same issue.
Here's the debug.
rad_recv: Access-Request packet from host 172.16.15.57 port 1034, id=6,
length=245
Message-Authenticator = 0x948b8c046dfeede3e79b0b99ef7afa1a
Service-Type = Framed-User
User-Name = bob
hi,
you said you were doing EAP-MD5
this isnt EAP-MD5 , this is PEAP
to do PEAP you either need the password in plain test, or in HT-hash format
as per the docs, as per deployingradius.com compatibility chart
alan
-
List info/subscribe/unsubscribe? See
to authenticate the user.
expand: password incorrecto - password incorrecto
MS-CHAPv2
I think I'm missing something on the configuration, any ideas?
You can't store passwords in MD5 for PEAP/MS-CHAPv2. You have
three options - clear text, LM-hash or NT-hash.
I'll add the link. I don't
thanks I just don't want to store the passwords in plain text, do you know how
can I hash with HT? is there some linux function or something? I tried to
google it with no luck.
Thanks.
On Apr 23, 2012, at 5:02 PM, alan buxey wrote:
hi,
you said you were doing EAP-MD5
this isnt EAP
On Mon, Apr 23, 2012 at 05:21:38PM -0500, Reyes Jimenez Alfonso Alejandro wrote:
thanks I just don't want to store the passwords in plain text,
do you know how can I hash with HT? is there some linux function
or something? I tried to google it with no luck.
smbencrypt
$ smbencrypt Test
LM
Thank you very much for you help.
Regards
Alfonso.
On Apr 23, 2012, at 5:43 PM, Matthew Newton wrote:
On Mon, Apr 23, 2012 at 05:21:38PM -0500, Reyes Jimenez Alfonso Alejandro
wrote:
thanks I just don't want to store the passwords in plain text,
do you know how can I hash with HT
Hello once again,
Please how can I insert into MySQL database, encrypted passwords for radius
users.
In an earlier mail I posted to the list, Phil suggested
NT hash (MD4 of little-endian UTF-16 form password)
since it was *not possible to do* *MD5 with mschap.
*
I have tried to do:
insert
pamela pomary wrote:
Please how can I insert into MySQL database, encrypted passwords for
radius users.
You use SQL inserts?
In an earlier mail I posted to the list, Phil suggested
NT hash (MD4 of little-endian UTF-16 form password)
since it was *not possible to do* *MD5 with mschap
Hi,
i dont think your SQL is correct - NT hash is required in the insert. you can
test
this manually by using the 'smbencrypt' tool eg
smbencrypt password
will print out 2 values, an LM has and an NT hash eg
LM Hash NT Hash
Thank you Alan and Alan, it worked. :)
# radtest -t mschap viola password localhost 0 key
Sending Access-Request of id 67 to 127.0.0.1 port 1812
User-Name = viola
NAS-IP-Address = x.x.x.x
NAS-Port = 0
Message-Authenticator = 0x
Hello
Please I have a challenge encrypting passwords using md5 in MySQL database
for radius users. When I do a radtest like this: radtest test password
localhost 0 key
for user test with md5(password) in MySQL database it is successful.
However when do this : radtest -t mschap testmd5 password
On 16/03/12 16:14, pamela pomary wrote:
I read online,it is not possible to do md5 with MS-CHAP. I don't want to
This is correct.
save users passwords in clear text. How can I achieve encrypting user's
passwords in MySQL database. I have Freeradius2.1.12 installed. Please I
will be grateful
Mohit Aron wrote:
I'm using the freeradius 2.10 server that comes with Ubuntu 11.10. I'm unable
to set it up so as to authenticate incoming requests from the Unix
username/passwords stored in /etc/{passwd, shadow}.
You should mostly just uncomment unix in raddb/sites-enabled/default
Here
/configuration/ca_import.html
Also: if you are trying to do EAP, you will NOT be able to use Unix
passwords unless you are using EAP-TTLS/PAP or GTC (which are not
supported in Windows), see:
http://deployingradius.com/documents/protocols/compatibility.html
-
List info/subscribe/unsubscribe? See http
On Tue, Feb 28, 2012 at 2:34 PM, Mohit Aron extpr...@gmail.com wrote:
Hello,
I'm using the freeradius 2.10 server that comes with Ubuntu 11.10. I'm unable
to set it up so as to authenticate incoming requests from the Unix
username/passwords stored in /etc/{passwd, shadow}.
Here
send passwords in cleartext
(e.g. TTLS-PAP, EAP-PEAP-GTC).
Sorry I'm new to freeradius. How can I setup this supplicant.
I'd really like to use Unix passwords to authenticate and not create
another setup of passwords for users. The documentation on radius is
really sparse. If you can advise what
a
bug already on launchpad.
Really? They messed up big time then.
You can try my ppa: https://launchpad.net/~freeradius/+archive/stable
It was created based on Natty's 2.1.10, updated to 2.1.12 for
lucid-oneiric and hardy.
You need a third-party supplicant that can send passwords in cleartext
Here is the output with Windows 7.
- Mohit
On Mon, Feb 27, 2012 at 11:34 PM, Mohit Aron extpr...@gmail.com wrote:
Hello,
I'm using the freeradius 2.10 server that comes with Ubuntu 11.10. I'm unable
to set it up so as to authenticate incoming requests from the Unix
username/passwords
Mohit Aron wrote:
Here is the output with Windows 7.
Attaching a .out file isn't useful. The information is text. It
should be pasted into the message. Or, attached as a .txt file.
This is a list for free software. You are making it difficult for
people to help you.
Alan DeKok.
-
Apologies. I'm attaching it again.
On Mon, Feb 27, 2012 at 11:50 PM, Alan DeKok al...@deployingradius.com wrote:
Mohit Aron wrote:
Here is the output with Windows 7.
Attaching a .out file isn't useful. The information is text. It
should be pasted into the message. Or, attached as a .txt
I have a working Freeradius server with user information held in
/etc/raddb/users in the form
username Cleartext-Password = ABCD
We have to store the passwords in some hashed or encrypted format and I'm
posting the the list to ask how this is done. Can the 'users' file support
ciphertext
Peter Moreton wrote:
We have to store the passwords in some hashed or encrypted format and
I’m posting the the list to ask how this is done. Can the ‘users’ file
support ciphertext passwords? Or do we have to store our users in some
SQL database?
The ciphered passwords can be stored
Jim Pazarena wrote:
Ahh. the FreeBSD docs indicate that the default for password encryption
is MD5.
That doesn't matter.
Now I need to learn how to use MD5 within freeradius.
You shouldn't have to. FreeRADIUS has worked on FreeBSD for *years*.
It calls a FreeBSD function to get the
On 1 Dec 2011, at 09:52, Alan DeKok wrote:
Jim Pazarena wrote:
Ahh. the FreeBSD docs indicate that the default for password encryption
is MD5.
If the password encryption is MD5 then you'll have to use PAP or an EAP method
with a PAP inner. Nothing else will work.
-Arran
Arran Cudbard-Bell
Alan DeKok wrote, On 2011-11-30 9:47 AM:
Jim Pazarena wrote:
This is most baffling. When I ran cistron, it just worked; but I switched
No. FreeRADIUS is 64-bit clean.
My guess is that the passwords on 64-bit FreeBSD are *not* encrypted
with the crypt function. There is some other API
On Thu, Dec 1, 2011 at 3:58 AM, Jim Pazarena j...@paz.bz wrote:
Ahh. the FreeBSD docs indicate that the default for password encryption
is MD5.
Now I need to learn how to use MD5 within freeradius.
Suggestions would be most appreciated.
FR should support MD5 just fine. Take a look at
:
On 11/18/2011 06:20 AM, Duong Manh Truong wrote:
Hi,
Thanks for your reply :)
I have a better news that: By using OpenLDAP for FR Authen Authorization
= I can configure multiple passwords for each user (Uid)
and use 1 of those passwords for successfully Authentication!
Although it is done
On Mon, Nov 21, 2011 at 8:52 AM, Duong Manh Truong
ngoahotanglon...@gmail.com wrote:
What i did is that: With each user (Uid) , i created multiple userpassword
attribute values,
then, while authenticating, OpenLDAP will compare the input password with
all the created password values --one by
Hi,
Thanks for your reply :)
I have a better news that: By using OpenLDAP for FR Authen Authorization
= I can configure multiple passwords for each user (Uid)
and use 1 of those passwords for successfully Authentication!
Although it is done manually now, but somehow it solves the matter
On Fri, Nov 18, 2011 at 6:20 PM, Duong Manh Truong
ngoahotanglon...@gmail.com wrote:
Hi,
Thanks for your reply :)
I have a better news that: By using OpenLDAP for FR Authen Authorization
= I can configure multiple passwords for each user (Uid)
and use 1 of those passwords for successfully
On 11/18/2011 06:20 AM, Duong Manh Truong wrote:
Hi,
Thanks for your reply :)
I have a better news that: By using OpenLDAP for FR Authen Authorization
= I can configure multiple passwords for each user (Uid)
and use 1 of those passwords for successfully Authentication!
Although it is done
Thanks Alan, Sven.
SQL server is on the same virtual machine with freeradius. I'm also
creating a web application to manage users, certificates, server settings
etc - it will be hosted on the same machine.
I just thought that keeping ANY passwords ANYWHERE in plaintext form is not
a good idea
Hi all,
I have encounter with an issue and can not find the solution after several
days of thinking :(
I set up FreeRadius Mysql successfully, testing with some account ok,
but my real case: Lot of my users *have more than 1 passwords*,
Example: User: truongdm comes with the password abc123
have more than 1 passwords,
Example: User: truongdm comes with the password abc123 or the password
123abc is both ok
Short version: you can't.
Long version:
it's doable, but ONLY if:
- your user sends clear-text password (read: not using MSCHAP or
PEAP-MS-CHAP v2, which is the one most often
user passwords if I'm using eap-tls?
2a - if I'm using certificates for authentication, do I actually need to
keep user passwords? Cause it seems that they aren't used during
authentication (or I didn't find that part during debuging)
Regards
Peter
-
List info/subscribe/unsubscribe? See http
shared secret in my database?
2 - Can I hash user passwords if I'm using eap-tls?
2a - if I'm using certificates for authentication, do I actually need to
keep user passwords? Cause it seems that they aren't used during
authentication (or I didn't find that part during debuging
easily broken
(l0pthcrack etc.)
2 - Can I hash user passwords if I'm using eap-tls?
2a - if I'm using certificates for authentication, do I actually need to
keep user passwords? Cause it seems that they aren't used during
authentication (or I didn't find that part during debuging)
If 2a
Attached is a minor patch to include support for BASE64_MD5 encoded
passwords in a LDAP directory (or anywhere else it may be, as the pap
module does the authenticate).
In ldap the record would look like:
userPassword: {BASE64_MD5}/F4DjTilcDIIVEHn/nAQsA==
If the password was helloworld
Hey, thanks, I get it. But could you detail in a few steps the procedure of
generating the hash from a new password, so I could change it ?
--
View this message in context:
http://freeradius.1045715.n5.nabble.com/Using-encrypted-passwords-in-users-file-tp4758890p4761351.html
Sent from
for the user test1. But in the users
file I see only the encrypted password. Where is the original password
stored ?
How do I change it ?
Thanks a lot for your help.
--
View this message in context:
http://freeradius.1045715.n5.nabble.com/Using-encrypted-passwords-in-users-file-tp4758890p4758890.html
.n5.nabble.com/Using-encrypted-passwords-in-users-file-tp4758890p4758890.html
Sent from the FreeRadius - User mailing list archive at Nabble.com.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
--
Random quote of the week/month/whenever i get to updating it: Quis
Did my last mail made it?
- Last Mail: -
Phil, you got it working!
All of what you wrote was right:
- added Cleartext-Password2 to
/usr/share/freeradius/dictionary.freeradius.internal
- created user file like this:
user Cleartext-Password := 1, Cleartext-Password2 += 2
- updated
Hi,
I am trying to set up something very basic (at least from my point of view):
I would like to have a User with multiple passwords (two actually). How
would I do this? I tried the following:
*alice Auth-Type=Local, Cleartext-Password := test1
alice Auth-Type=Local, Cleartext-Password := test2
On 07/07/11 09:51, Equin Nix wrote:
Hi,
I am trying to set up something very basic (at least from my point of
view): I would like to have a User with multiple passwords (two
actually). How would I do this? I tried the following:
/alice Auth-Type=Local, Cleartext-Password := test1
alice Auth
to set up something very basic (at least from my point of
view): I would like to have a User with multiple passwords (two
actually). How would I do this? I tried the following:
/alice Auth-Type=Local, Cleartext-Password := test1
alice Auth-Type=Local, Cleartext-Password := test2/
Do not set
of
view): I would like to have a User with multiple passwords (two
actually). How would I do this? I tried the following:
/alice Auth-Type=Local, Cleartext-Password := test1
alice Auth-Type=Local, Cleartext-Password := test2/
Do not set Auth-Type. It's almost always wrong, and is certainly wrong
On Thu, Jul 7, 2011 at 7:18 PM, Equin Nix equin@googlemail.com wrote:
Hi Phil,
thanks a lot for the fast answer! Unfortunatelly your radius-skills seem to
be far far from mine, but I think I get the point.
I tried to add the following to sites-enabled/default (int authorize
section)
from my point of
view): I would like to have a User with multiple passwords (two
actually). How would I do this? I tried the following:
/alice Auth-Type=Local, Cleartext-Password := test1
alice Auth-Type=Local, Cleartext-Password := test2/
Do not set Auth-Type. It's almost always wrong
On 07/07/11 13:18, Equin Nix wrote:
Hi Phil,
thanks a lot for the fast answer! Unfortunatelly your radius-skills seem
to be far far from mine, but I think I get the point.
I tried to add the following to /sites-enabled/default/ (int authorize
section) (Its not a full copy of your text, I
1 - 100 of 504 matches
Mail list logo