[RP-PPPoE] Question on PPPoE with radius.
Ben Greear
greearb at candelatech.com
Wed Jun 15 01:47:45 EDT 2011
Ok, getting farther now.
Seems there is no freeradius-client rpm on Fedora, so I installed
it from freeradius.org.
That fixes up the dictionary stuff.
I had to comment out the bindaddr and deadtime config options,
probably because the pppd radius.so is old. I haven't found
out how to upgrade that, but maybe it doesn't matter.
I do see radius messages now, and there's a chance that the radius
server is responding correctly. But, on the pppoe server side,
still no joy:
Jun 14 22:34:36 build-32 pppoe-server[12510]: Session 40 created for client 00:90:0b:13:ed:ea (10.67.15.40) on br0 using Service-Name ''
Jun 14 22:34:36 build-32 pppd[12510]: Plugin radius.so loaded.
Jun 14 22:34:36 build-32 pppd[12510]: RADIUS plugin initialized.
Jun 14 22:34:36 build-32 pppd[12510]: Plugin radattr.so loaded.
Jun 14 22:34:36 build-32 pppd[12510]: RADATTR plugin initialized.
Jun 14 22:34:36 build-32 pppd[12510]: pppd 2.4.5 started by root, uid 0
Jun 14 22:34:36 build-32 pppd[12510]: Using interface ppp0
Jun 14 22:34:36 build-32 pppd[12510]: Connect: ppp0 <--> /dev/pts/9
Jun 14 22:34:37 build-32 pppd[12510]: EAP: Identity prompt "Name"
Jun 14 22:34:37 build-32 pppd[12510]: EAP: received too many Request messages
Jun 14 22:34:37 build-32 pppd[12510]: Connection terminated.
Jun 14 22:34:37 build-32 pppoe[12511]: read (asyncReadFromPPP): Session 40: Input/output error
Jun 14 22:34:37 build-32 pppd[12510]: Exit.
I'm not sure what that EAP too many messages thing is about, but it appears
to be the problem now.
Here's freeradius output in case that helps:
...
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group CHAP {...}
[chap] login attempt by "ben" with CHAP password
[chap] Using clear text password "ben1" for user ben authentication.
[chap] chap user ben authenticated succesfully
++[chap] returns ok
# Executing section post-auth from file /etc/raddb/sites-enabled/default
+- entering group post-auth {...}
++[exec] returns noop
Sending Access-Accept of id 30 to 192.168.100.20 port 58305
Finished request 6.
Going to the next request
Waking up in 0.7 seconds.
Cleaning up request 4 ID 28 with timestamp +14
Waking up in 2.1 seconds.
[root at lec2010-ath9k-1 raddb]# tshark -n -i eth0 host 192.168.100.20
Running as user "root" and group "root". This could be dangerous.
Capturing on eth0
0.000000 00:30:48:d8:f1:d4 -> ff:ff:ff:ff:ff:ff ARP Who has 192.168.100.138? Tell 192.168.100.20
0.000112 00:90:0b:13:ed:ea -> 00:30:48:d8:f1:d4 ARP 192.168.100.138 is at 00:90:0b:13:ed:ea
0.000332 192.168.100.20 -> 192.168.100.138 RADIUS Access-Request(1) (id=34, l=86)
0.001270 192.168.100.138 -> 192.168.100.20 RADIUS Access-Accept(2) (id=34, l=20)
2.141805 192.168.100.20 -> 192.168.100.138 RADIUS Access-Request(1) (id=35, l=88)
2.142492 192.168.100.138 -> 192.168.100.20 RADIUS Access-Accept(2) (id=35, l=20)
4.272625 192.168.100.20 -> 192.168.100.138 RADIUS Access-Request(1) (id=36, l=89)
4.273987 192.168.100.138 -> 192.168.100.20 RADIUS Access-Accept(2) (id=36, l=20)
5.004679 00:90:0b:13:ed:ea -> 00:30:48:d8:f1:d4 ARP Who has 192.168.100.20? Tell 192.168.100.138
5.004820 00:30:48:d8:f1:d4 -> 00:90:0b:13:ed:ea ARP 192.168.100.20 is at 00:30:48:d8:f1:d4
6.399908 192.168.100.20 -> 192.168.100.138 RADIUS Access-Request(1) (id=37, l=86)
6.400416 192.168.100.138 -> 192.168.100.20 RADIUS Access-Accept(2) (id=37, l=20)
8.527968 192.168.100.20 -> 192.168.100.138 RADIUS Access-Request(1) (id=38, l=89)
8.528509 192.168.100.138 -> 192.168.100.20 RADIUS Access-Accept(2) (id=38, l=20)
10.664774 192.168.100.20 -> 192.168.100.138 RADIUS Access-Request(1) (id=39, l=93)
10.665274 192.168.100.138 -> 192.168.100.20 RADIUS Access-Accept(2) (id=39, l=20)
12.782692 192.168.100.20 -> 192.168.100.138 RADIUS Access-Request(1) (id=40, l=92)
12.783145 192.168.100.138 -> 192.168.100.20 RADIUS Access-Accept(2) (id=40, l=20)
14.910039 192.168.100.20 -> 192.168.100.138 RADIUS Access-Request(1) (id=41, l=86)
14.910605 192.168.100.138 -> 192.168.100.20 RADIUS Access-Accept(2) (id=41, l=20)
17.041755 192.168.100.20 -> 192.168.100.138 RADIUS Access-Request(1) (id=42, l=86)
17.042187 192.168.100.138 -> 192.168.100.20 RADIUS Access-Accept(2) (id=42, l=20)
--
Ben Greear <greearb at candelatech.com>
Candela Technologies Inc http://www.candelatech.com
More information about the RP-PPPoE
mailing list