summaryrefslogtreecommitdiffstats
path: root/usr.sbin/ppp/radius.h
Commit message (Collapse)AuthorAgeFilesLines
* Compensate for dodgy Win98/WinME MSCHAPv2 responses later in the codebrian2002-06-171-1/+1
| | | | | | | | | | | | | | | | path... after we've talked to any RADIUS servers involved, so that we haven't touched the data before it gets to the server. Make it clearer in the code that this compensation is done by setting a flag to a value of zero, a flag which rfc2759 says *MUST* be zero. While we're here, don't bother passing the peer challenge into radius_Authenticate(). It's already part of the key we're passing in (this becomes obvious now that I've structured that data...). This ``fix'' doesn't help to authenticate Win98/WinME users in my test environment as ports/net/freeradius seems to ignore the flag completely anyway, but it may help with other RADIUS servers.
* Remove whitespace at the end of lines.brian2002-06-151-1/+1
|
* Understand the following Microsoft Vendor Specific RADIUS attributes:brian2002-06-121-0/+14
| | | | | | | | | | | | | | | | | RAD_MICROSOFT_MS_MPPE_ENCRYPTION_POLICY RAD_MICROSOFT_MS_MPPE_ENCRYPTION_TYPES RAD_MICROSOFT_MS_MPPE_RECV_KEY RAD_MICROSOFT_MS_MPPE_SEND_KEY These attributes may be supplied by a RADIUS server when MSCHAPv2 is used to authenticate. It *should* now be possible to build ppp with -DNODES and still support CHAP/MSCHAP/MSCHAPv2/MPPE via a RADIUS server, but the code isn't yet smart enough to do that (building with -DNODES just looses these facilities). Sponsored by: Monzoon
* Handle MS-CHAPv2 authentication correctly via the RADIUS server (if it'sbrian2002-05-161-3/+4
| | | | | | | | | | configured). Handle internal failures in radius_Authenticate() correctly. Bump the ppp version number. This doesn't yet work with MPPE. More will follow. Sponsored by: Mozoon
* Add support for MS-CHAP authentication via a RADIUS server.brian2002-05-101-0/+2
| | | | | | Add support for Reply-Message and MS-CHAP-Error. Sponsored by: Monzoon
* Understand the Session-Timeout RADIUS attributebrian2002-05-071-0/+2
| | | | | | Store the Filter-Id attribute (we don't do anything with it yet) Submitted mostly by: andrew pavlov <and@kremenchug.net>
* Get tun P2P address from the local pool if RADIUS server returnedhosokawa2002-04-041-0/+3
| | | | | | 255.255.255.254 as client ipaddr. Reviewed-By: freebsd-net mailing list
* Don't assume challenges and responses don't contain embedded '\0's.brian2001-04-011-1/+2
| | | | | | | | Mschapv2 response generation may produce embedded NULs... causing us to send a bogus response to the radius server and end up failing the client's valid response. Problem pointed out by: Eugene Vigovskiy <vigov@com2com.ru>
* MAXPATHLEN -> PATH_MAXbrian2001-03-081-1/+1
| | | | | | Don't assume MAXHOSTNAMELEN includes the NUL Correct a diagnostic Use "localhost" in our prompt instead of ""
* Support radius accounting, and add a packet count to throughputbrian2000-08-281-0/+19
| | | | | | | | | statistics as a side effect. Submitted by: Marcin Cieslak <saper@system.pl> with some tweaks to RAD_ACCT_SESSION_ID and RAD_ACCT_MULTI_SESSION_ID generation by me.
* To avoid namespace polution in NetBSD:brian2000-03-141-1/+1
| | | | ``struct descriptor'' -> ``struct fdescriptor''
* $Id$ -> $FreeBSD$peter1999-08-281-1/+1
|
* Decouple pap & chap output routines from the correspondingbrian1999-02-061-3/+13
| | | | | | | | | | | | | | | | | | | | | | | input routines and take advantage of the new init/continue interface in libradius. This allows a timely response on other links in an MP setup while RADIUS requests are in progress as well as the ability to handle other data from the peer in parallel. It should also make the future addition of PAM support trivial. While I'm in there, validate pap & chap header IDs if ``idcheck'' is enabled (the default) for other FSM packet types. NOTE: This involved integrating the generation of chap challenges and the validation of chap responses (and commenting what's going on in those routines). I currently have no way of testing ppps ability to respond to M$Chap CHALLENGEs correctly, so if someone could do the honours, it'd be much appreciated (it *looks* ok!). Sponsored by: Internet Business Solutions Ltd., Switzerland
* Initial RADIUS support (using libradius). See the man page forbrian1999-01-281-0/+48
details. Compiling with -DNORADIUS (the default for `release') removes support. TODO: The functionality in libradius::rad_send_request() needs to be supplied as a set of routines so that ppp doesn't have to wait indefinitely for the radius server(s). Instead, we need to get a descriptor back, select() on the descriptor, and ask libradius to service it when necessary. For now, ppp blocks SIGALRM while in rad_send_request(), so it misses PAP/CHAP retries & timeouts if they occur. Only PAP is functional. When CHAP is attempted, libradius complains that no User-Password has been specified... rfc2138 says that it *mustn't* be used for CHAP :-( Sponsored by: Internet Business Solutions Ltd., Switzerland
OpenPOWER on IntegriCloud