我正在尝试针对PHP脚本对freeradius用户进行身份验证,但没有成功。 我已经花了好几个小时来配置这个权利,我在Google上发现的所有主题都是死链接或过时的......
radiusd.conf
prefix = /usr
exec_prefix = /usr
sysconfdir = /etc
localstatedir = /var
sbindir = ${exec_prefix}/sbin
logdir = /var/log/freeradius
raddbdir = /etc/freeradius
radacctdir = ${logdir}/radacct
# Name of the running server
name = freeradius
# Location of config and logfiles.
confdir = ${raddbdir}
run_dir = ${localstatedir}/run/${name}
# Should likely be ${localstatedir}/lib/radiusd
db_dir = ${raddbdir}
libdir = /usr/lib/freeradius
pidfile = ${run_dir}/${name}.pid
# user/group: The name (or #number) of the user/group to run radiusd as.
user = freerad
group = freerad
# max_request_time: The maximum time (in seconds) to handle a request.
max_request_time = 30
# cleanup_delay: The time to wait (in seconds) before cleaning up
# a reply which was sent to the NAS.
cleanup_delay = 5
# max_requests: The maximum number of requests which the server keeps
# track of. This should be 256 multiplied by the number of clients.
# e.g. With 4 clients, this number should be 1024.
max_requests = 1024
# listen: Make the server listen on a particular IP address, and send
# replies out from that address. This directive is most useful for
# hosts with multiple IP addresses on one interface.
listen {
type = auth
ipaddr = *
port = 0
}
# This second "listen" section is for listening on the accounting
# port, too.
listen {
ipaddr = *
port = 0
type = acct
}
hostname_lookups = no
allow_core_dumps = no
regular_expressions = yes
extended_expressions = yes
log {
destination = files
file = ${logdir}/radius.log
syslog_facility = daemon
stripped_names = no
auth = no
auth_badpass = no
auth_goodpass = no
}
checkrad = ${sbindir}/checkrad
security {
max_attributes = 200
reject_delay = 1
status_server = yes
}
proxy_requests = off
# CLIENTS CONFIGURATION
client 0.0.0.0/0 {
secret = secret
shortname = wireless
}
# THREAD POOL CONFIGURATION
thread pool {
start_servers = 5
max_servers = 32
min_spare_servers = 3
max_spare_servers = 10
max_requests_per_server = 0
}
# MODULE CONFIGURATION
modules {
$INCLUDE ${confdir}/modules/
$INCLUDE eap.conf
}
# Instantiation
instantiate {
exec
expr
expiration
logintime
}
$INCLUDE policy.conf
$INCLUDE sites-enabled/
模块/ EXEC
exec {
wait = yes
program = "/usr/bin/php -f /usr/local/auth.php %{User-Name} %{User-Password}"
input_pairs = request
output_pairs = reply
shell_escape = yes
}
位点可用/默认
authorize {
preprocess
exec
chap
suffix
files
expiration
logintime
pap
}
authenticate {
Auth-Type PAP {
pap
}
Auth-Type CHAP {
chap
}
eap
}
preacct {
preprocess
acct_unique
suffix
files
}
accounting {
detail
radutmp
exec
attr_filter.accounting_response
}
session {
radutmp
}
post-auth {
exec
Post-Auth-Type REJECT {
attr_filter.access_reject
}
}
pre-proxy {
}
post-proxy {
}
虽然我不知道在用户文件中放什么......
答案 0 :(得分:16)
实际上很容易。删除你所做的一切并重新开始。
进入您的网站启用/默认文件。
进入authorize指令并添加此代码。用正确的脚本替换yourscript.php。确保用户radiusd有权运行脚本。
authorize{
update control {
Auth-Type := `/usr/bin/php -f /etc/raddb/yourscript.php '%{User-Name}' '%{User-Password}' '%{Client-IP-Address}'`
}
确保您的脚本回应"接受"或"拒绝"没有报价。这应该验证您的用户。
由于有人要求如何提取属性 -
打开/ etc / raddb / users文件并更新以下内容 -
DEFAULT Auth-Type = Accept
Exec-Program-Wait = "/usr/bin/php -f /etc/raddb/yourscript.php '%{User-Name}' '%{User-Password}' '%{Client-IP-Address}'"
基本上,如果Auth-Type为Accept,则会告诉它执行以下脚本并提取属性。确保您的PHP脚本只是回显了属性。根据供应商的不同,属性显然会有所不同。
编辑 -
添加了属性信息
已添加'%{Client-IP-Address}'指定用户尝试连接的设备
答案 1 :(得分:-1)
我在Python和PHP中尝试自定义脚本,
并找出Freeradius' Auth-Type将永远是'Auth-Reject'
当脚本具有非零返回码时。
所以我用#34; echo"用PHP和" print"在Python中替换返回代码。
在PHP
中这样if(isUserValid($user['username'], $user['password'])) {
// do nothing
echo 'correct string';
} else {
echo 'incorrect string';
}
return 0 //OR not return anything
或在Python中
if(login success):
print "correct string"
else:
print "incorrect string"
然后使用该字符串确定FreeRadius中的登录成功或失败
if (Tmp-String-0 == 'correct string') {
update control {
Auth-type := Accept
}
update reply{
reply-message += "password correct"
}
}
else {
reject
update reply{
reply-message += "password incorrect"
}
}