rlm_mschap.5   [plain text]


.TH rlm_mschap 5 "19 May 2006" "" "FreeRADIUS Module"
.SH NAME
rlm_mschap \- FreeRADIUS Module
.SH DESCRIPTION
The \fIrlm_mschap\fP module provides MS-CHAP and MS-CHAPv2
authentication support. 
.PP
This module validates a user with MS-CHAP or MS-CHAPv2 authentication.
It should be listed in both the \fIauthorize\fP and \fIauthenticate\fP
sections.  In \fIauthorize\fP, it will look for MS-CHAP
Challenge/Response attributes in the Acess-Request, and configure
itself to be the module called for the \fIauthenticate\fP section.
.PP
The module can authenticate the MS-CHAP session via plain-text
passwords (User-Password attribute), or NT passwords (NT-Password
attribute).  The module can perform authentication against an NT
domain by using the \fIntlm_auth\fP program.
.SH SMB Integration
The module also enforces the SMB-Account-Ctrl attribute.  See the
Samba documentation for the meaning of SMB account control.  The
module does not read Samba password files.  Instead, the
\fIrlm_passwd\fP module should be used to read a Samba password file,
and to supply an NT-Password attribute which this module can use.  See
the \fIetc_smbpasswd\fP module in \fIradiusd.conf\fP for more details.
.SH MODULE CONFIGURATION
The main configuration items to be aware of are:
.IP use_mppe
Unless this is set to 'no', FreeRADIUS will add MS-CHAP-MPPE-Keys for
MS-CHAPv1 and MS-MPPE-Recv-Key/MS-MPPE-Send-Key for MS-CHAPv2.  The
default is 'yes'.
.IP require_encryption
If MPPE is enabled, setting this attribute to 'yes' will cause the
MS-MPPE-Encryption-Policy attribute to be set to require encryption.
The default is 'no'.
.IP require_strong
If MPPE is enabled, setting this attribute to 'yes' will cause the
MS-MPPE-Encryption-Types attribute to be set to require a 128 bit key.
The default is 'no'.
.IP with_ntdomain_hack
Windows clients send User-Name in the form of "DOMAIN\\User", but send the
challenge/response based only on the User portion.  Setting this value
to yes, enables a work-around for this error.  The default is 'no'.
.IP ntlm_auth
Use the \fIntlm_auth\fP program for authentication against Samba, or a
Windows NT or Active Directory Domain Controller.  For machine
authentication, the following configuration should be used:
.DS
ntlm_auth = "/path/to/ntlm_auth --username=%{mschap:User-Name:-None} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} --domain=%{mschap:NT-Domain:-YOUR_DEFAULT_DOMAIN}
.DE
If configured, \fIntlm_auth\fP will always be called, even if there is
a clear-text or NT-Password available for the user.  You can force
\fIntlm_auth\fP to not be used by setting
.DS
MS-CHAP-Use-NTLM-Auth := No
.DE
in the \fIusers\fP file, or in a database such as SQL.
.PP
.SH SECTIONS
.BR authorization,
.BR authentication
.PP
.SH FILES
.I /etc/raddb/radiusd.conf
.PP
.SH "SEE ALSO"
.BR radiusd (8),
.BR radiusd.conf (5)
.SH AUTHOR
Chris Parker, cparker@segv.org