g Windows 7 clients and Server 2008R2.
Thanks,
Michael
--
Michael Rodrigues
Technical Support Services Manager
Gevirtz Graduate School of Education
Education Building 4203
(805) 893-8031
h...@education.ucsb.edu
___
radiator mailing list
radiator@open.
some details about the cert to the user that they
can verify manually (name, fingerprint, expiry date).
Thanks,
Michael
--
Michael Rodrigues
Technical Support Services Manager
Gevirtz Graduate School of Education
Education Building 4203
(805) 893-8031
h...@education.ucsb.edu
s using
PEAP and EAP? I'd like to be as secure as possible without resorting to
client-side certificates.
Thanks,
Michael
--
Michael Rodrigues
Technical Support Services Manager
Gevirtz Graduate School of Education
Education Building 4203
(805) 893-8031
h...@education.ucsb.edu
___
hoping it was something simple like a missing newline. It works
with the comma, so I have the added advantage of being able to add
arbitrary Reply attributes, as compared to the RewriteUsername to
lowercase method. Thanks for your help on this; the list is always
helpful, and I could spend all day
cation requests
Identifier NON_EAP_HANDLER
Identifier NON_EAP_REJECT
AddToReplyReply-Message = Use an EAP method.
RequestHook sub { &main::log($main::LOG_DEBUG, "Non-EAP
authentication requested, rejecting request..."); return $main::REJECT;}
On 5/6/14, 1:15 PM, Heikki Vatiainen wrote:
> On 05/06/2014 10:22 PM, Michael Rodrigues wrote:
>
>> I did end up putting the blacklist in the outer handler because all of
>> my attempts to grab the inner_identity within the Inner Handler for PEAP
>> would give me a blank
r_identity};
${$rep}->changeUserName($rep_username);
&main::log($main::LOG_DEBUG, "Hook changed User-Name to
$rep_username for Access-Accept");
}
}
-----
Thanks,
Michael
On 4/
ba 50 16 82 c7 f0 aa
47 92 22 b9 01 02 4f 08 01 01 00 06 19 20 50 12
bd c9 eb a2 b2 cd 56 77 df 9a 3b 5a e1 d9 e7 0b
Code: Access-Challenge
Identifier: 42
Authentic: *oU<155>"<186>P<22><130><199><240><170>G<146>"<185>
Attributes:
On 4/9/2014 8:01 AM, Heikki Vatiainen wrote:
> On 04/08/2014 11:36 PM, Michael Rodrigues wrote:
>
>> When untarring the patches tarball patches-4.12.1-20140407.tar.gz in the
>> Radiator directory and testing the build, test "1d" fails to pass. Am I
>> applying
above.
>> Note: I noticed that if EAP, for example EAP-MSCHAP-V2, is used for
>> inner TTLS, the export seems not to work currently. We'll need to check why.
> This is now fixed in the latest patches for 4.12.1. The EAP identity or
> User-Name from TTLS tunnelled message is
eyFile /etc/radiator/certs/cert-srv.pem
EAPTLS_PrivateKeyFile /etc/radiator/certs/radiatordev.key
#EAPTLS_PrivateKeyPassword whatever
AutoMPPEKeys
PostAuthHook file:"goodies/eap_acct_username.pl"
#This logs to /var/log/radius/logf
pem
EAPTLS_CertificateFile /etc/radiator/certs/cert-srv.pem
EAPTLS_CertificateType PEM
EAPTLS_PrivateKeyFile /etc/radiator/certs/cert-srv.pem
EAPTLS_PrivateKeyPassword whatever
AutoMPPEKeys
#PostProcessingHook file:"/etc/radiator/eap_acct_username.p
12 matches
Mail list logo