Stephen Carville
2010-03-30 22:17:36 UTC
I am trying to get openvpn to authenticate against an active directory
radius server. With no luck so far. I can connect with just with TLS
certificates only. Also pptp running on the same server works with
radius.
Suggestions?
Version:
OpenVPN 2.1.1 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] built on Mar 1 2010
Current configuration
-------------------------------------------------
/etc/openvpn/openvpn.conf
local 198.204.115.84
port 1194
proto udp
dev tun
ca /etc/pki/CA/VPN-CA.crt
cert /etc/pki/tls/certs/orion.lereta.com.crt
key /etc/pki/tls/private/orion.lereta.com.key
dh /etc/pki/tls/private/dh2048.key
server 192.168.100.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "route 10.207.0.0 255.255.0.0"
push "route 10.212.0.0 255.255.0.0"
push "route 172.21.0.0 255.255.0.0"
push "dhcp-option DNS 10.212.3.10"
push "dhcp-option DNS 10.212.3.11"
push "dhcp-option WINS 10.212.3.10"
push "dhcp-option WINS 10.212.3.11"
keepalive 10 120
cipher BF-CBC # Blowfish (default)
max-clients 100
user nobody
group nobody
persist-key
persist-tun
status openvpn-status.log
verb 3
client-cert-not-required
username-as-common-name
# use auth-pam plugin
;plugin /usr/share/openvpn/plugin/lib/openvpn-auth-pam.so login
plugin /usr/share/openvpn/plugin/lib/openvpn-auth-pam.so openvpn
;plugin /usr/share/openvpn/plugin/lib/radiusplugin.so
When using the openvpn-auth-pam.so plugin I tried the following
-------------------------------------------------
/etc/pam/d/openvpn
#%PAM-1.0
account required pam_radius_auth.so debug
account required pam_radius_auth.so debug
auth required pam_radius_auth.so try_first_pass
radius server. With no luck so far. I can connect with just with TLS
certificates only. Also pptp running on the same server works with
radius.
Suggestions?
Version:
OpenVPN 2.1.1 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] built on Mar 1 2010
Current configuration
-------------------------------------------------
/etc/openvpn/openvpn.conf
local 198.204.115.84
port 1194
proto udp
dev tun
ca /etc/pki/CA/VPN-CA.crt
cert /etc/pki/tls/certs/orion.lereta.com.crt
key /etc/pki/tls/private/orion.lereta.com.key
dh /etc/pki/tls/private/dh2048.key
server 192.168.100.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "route 10.207.0.0 255.255.0.0"
push "route 10.212.0.0 255.255.0.0"
push "route 172.21.0.0 255.255.0.0"
push "dhcp-option DNS 10.212.3.10"
push "dhcp-option DNS 10.212.3.11"
push "dhcp-option WINS 10.212.3.10"
push "dhcp-option WINS 10.212.3.11"
keepalive 10 120
cipher BF-CBC # Blowfish (default)
max-clients 100
user nobody
group nobody
persist-key
persist-tun
status openvpn-status.log
verb 3
client-cert-not-required
username-as-common-name
# use auth-pam plugin
;plugin /usr/share/openvpn/plugin/lib/openvpn-auth-pam.so login
plugin /usr/share/openvpn/plugin/lib/openvpn-auth-pam.so openvpn
;plugin /usr/share/openvpn/plugin/lib/radiusplugin.so
When using the openvpn-auth-pam.so plugin I tried the following
-------------------------------------------------
/etc/pam/d/openvpn
#%PAM-1.0
account required pam_radius_auth.so debug
account required pam_radius_auth.so debug
auth required pam_radius_auth.so try_first_pass
--
Stephen Carville
Stephen Carville