Debian FreeRadius LDAP (GSSAPI)
Ich habe einen FreeRadius Server und habe ein Problem mit der LDAP Useranmeldung.
Hier erhalte ich folgende Fehlermeldung:
Hier gibt es ein Problem mit dem Password-With-Header ({SASL})
Ich Habe einen LDAP Server inklusive MIT-Kerberos. Meine Passwortinformationen stehen im Kerberos User. Im LDAP User ist mit GSSAPI ein Verweis auf den Kerberos Benutzer ({SASL}LDAP-TestUser@DOMAIN.NET)
Hier erhalte ich folgende Fehlermeldung:
(0) Received Access-Request Id 82 from 127.0.0.1:48866 to 127.0.0.1:1812 length 83
(0) User-Name = "LDAP-TestUser"
(0) User-Password = "TestPassword"
(0) NAS-IP-Address = FreeRadiusIP
(0) NAS-Port = 10
(0) Message-Authenticator = 0xba5f4a20ca45691be281da55ea037dc2
(0) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default
(0) authorize {
(0) policy filter_username {
(0) if (&User-Name) {
(0) if (&User-Name) -> TRUE
(0) if (&User-Name) {
(0) if (&User-Name =~ / /) {
(0) if (&User-Name =~ / /) -> FALSE
(0) if (&User-Name =~ /@[^@]*@/ ) {
(0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
(0) if (&User-Name =~ /\.\./ ) {
(0) if (&User-Name =~ /\.\./ ) -> FALSE
(0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(0) if (&User-Name =~ /\.$/) {
(0) if (&User-Name =~ /\.$/) -> FALSE
(0) if (&User-Name =~ /@\./) {
(0) if (&User-Name =~ /@\./) -> FALSE
(0) } # if (&User-Name) = notfound
(0) } # policy filter_username = notfound
(0) [preprocess] = ok
(0) [chap] = noop
(0) [mschap] = noop
(0) [digest] = noop
(0) suffix: Checking for suffix after "@"
(0) suffix: No '@' in User-Name = "LDAP-TestUser", looking up realm NULL
(0) suffix: No such realm "NULL"
(0) [suffix] = noop
(0) eap: No EAP-Message, not doing EAP
(0) [eap] = noop
(0) [files] = noop
rlm_ldap (ldap): Reserved connection (0)
(0) ldap: EXPAND (uid=%{%{Stripped-User-Name}:-%{User-Name}})
(0) ldap: --> (uid=LDAP-TestUser)
(0) ldap: Performing search in "dc=domain,dc=net" with filter "(uid=LDAP-TestUser)", scope "sub"
(0) ldap: Waiting for search result...
(0) ldap: User object found at DN "cn=Test Benutzer,ou=users,dc=domain,dc=net"
(0) ldap: Processing user attributes
(0) ldap: control:Password-With-Header += '{SASL}LDAP-TestUser@DOMAIN.NET'
rlm_ldap (ldap): Released connection (0)
Need 5 more connections to reach 10 spares
rlm_ldap (ldap): Opening additional connection (5), 1 of 27 pending slots used
rlm_ldap (ldap): Connecting to ldaps://LDAP-ServerIP:636
rlm_ldap (ldap): Waiting for bind result...
rlm_ldap (ldap): Bind successful
(0) [ldap] = updated
(0) [expiration] = noop
(0) [logintime] = noop
(0) pap: Unknown header {{SASL}} in Password-With-Header, re-writing to Cleartext-Password
(0) pap: Removing &control:Password-With-Header
(0) [pap] = updated
(0) } # authorize = updated
(0) Found Auth-Type = PAP
(0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
(0) Auth-Type PAP {
(0) pap: Login attempt with password
(0) pap: Comparing with "known good" Cleartext-Password
(0) pap: ERROR: Cleartext password does not match "known good" password
(0) pap: Passwords don't match
(0) [pap] = reject
(0) } # Auth-Type PAP = reject
(0) Failed to authenticate the user
(0) Using Post-Auth-Type Reject
(0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
(0) Post-Auth-Type REJECT {
(0) attr_filter.access_reject: EXPAND %{User-Name}
(0) attr_filter.access_reject: --> LDAP-TestUser
(0) attr_filter.access_reject: Matched entry DEFAULT at line 11
(0) [attr_filter.access_reject] = updated
(0) [eap] = noop
(0) policy remove_reply_message_if_eap {
(0) if (&reply:EAP-Message && &reply:Reply-Message) {
(0) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE
(0) else {
(0) [noop] = noop
(0) } # else = noop
(0) } # policy remove_reply_message_if_eap = noop
(0) } # Post-Auth-Type REJECT = updated
(0) Delaying response for 1.000000 seconds
Waking up in 0.3 seconds.
Waking up in 0.6 seconds.
(0) Sending delayed response
(0) Sent Access-Reject Id 82 from 127.0.0.1:1812 to 127.0.0.1:48866 length 20
Waking up in 3.9 seconds.
(0) Cleaning up request packet ID 82 with timestamp +3
Hier gibt es ein Problem mit dem Password-With-Header ({SASL})
Ich Habe einen LDAP Server inklusive MIT-Kerberos. Meine Passwortinformationen stehen im Kerberos User. Im LDAP User ist mit GSSAPI ein Verweis auf den Kerberos Benutzer ({SASL}LDAP-TestUser@DOMAIN.NET)
Bitte markiere auch die Kommentare, die zur Lösung des Beitrags beigetragen haben
Content-ID: 497718
Url: https://administrator.de/forum/debian-freeradius-ldap-gssapi-497718.html
Ausgedruckt am: 21.04.2025 um 17:04 Uhr