You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
as I needed to enable class support on the freeradius side.
in ./sites-available/default
# Insert class attribute (with unique value) into response,
# aids matching auth and acct records, and protects against duplicate
# Acct-Session-Id. Note: Only works if the NAS has implemented
# RFC 2865 behaviour for the class attribute, AND if the NAS
# supports long Class attributes. Many older or cheap NASes
# only support 16-octet Class attributes.
insert_acct_class
it would be useful to check for empty class and write a log message hinting for that.
I should add that we use TLS client certificates plus ldap user/password validation as 2FA.
New (!) openvpn tunnel requests get processed as intended, auth works and the tunnel get established - great!
however after some time the TLS certificate gets renegotiated (as intended - (note the TLS: soft reset in the openvpn tunnel log below)) and openvpn re-runs the authentication.
and as we are still in the same session, the ovpn-radius client errors the session with
level=error msg="authenticate: failed to save account data with error record already exists\n"
on a side note, I noticed that ovpn-radius uses random session ids.
as we invoke the ovpn-radius program on auth / start / update / stop
we do not properly fill the radius backend account db properly.
each call of ovpn-radius creates a new row.
it would be preferable to have one row for each session and proper start, last update, stop time stamps ...
minor:
please note the typo at
authenticate: Autentication(sic) using filepath
The text was updated successfully, but these errors were encountered:
Thank you for your work on this!
After initial struggle to get this working (as designed), I made some progress on
against a
as I needed to enable class support on the freeradius side.
in ./sites-available/default
it would be useful to check for empty class and write a log message hinting for that.
I should add that we use TLS client certificates plus ldap user/password validation as 2FA.
New (!) openvpn tunnel requests get processed as intended, auth works and the tunnel get established - great!
however after some time the TLS certificate gets renegotiated (as intended - (note the TLS: soft reset in the openvpn tunnel log below)) and openvpn re-runs the authentication.
and as we are still in the same session, the ovpn-radius client errors the session with
The tunnel log shows
on a side note, I noticed that ovpn-radius uses random session ids.
as we invoke the ovpn-radius program on auth / start / update / stop
we do not properly fill the radius backend account db properly.
each call of ovpn-radius creates a new row.
it would be preferable to have one row for each session and proper start, last update, stop time stamps ...
minor:
please note the typo at
The text was updated successfully, but these errors were encountered: