[RADIATOR] Experiences with using Radiator to act as TACACS server?
ehodge at mmm.com
ehodge at mmm.com
Tue Nov 18 12:39:06 CST 2008
Hi everyone,
My coworkers and I are trying to configure Radiator to act as a TACACS+
server, converting TACACS+ requests into RADIUS requests.
Our main goal is to use Radiator for admin authentication attempts to Cisco
devices: switches, routers, IOS wireless access points.
We want the Radiator/TACACS to return a privilege level of 15, so that
users enter read-write mode immediately upon login.
We have the following configuration piece added to Radiator:
<ServerTACACSPLUS>
Key 1qaz8ik,4rfv3edc6yhn5tgb7ujm2wsx
Port 49
AuthorizationAdd aironet:admin-capability=ident+admin+write
AuthorizationAdd service=shell cmd\* {priv-lvl=15}
</ServerTACACSPLUS>
I'm currently testing with the IOS wireless AP's web interface login. When
running debugs on the AP and viewing the Radiator logs, it appears that the
AP receives a "PASS", but it seems to receive the value in a format that it
can't process, because I'm prompted for a web login all over again. Here's
a piece of the AP debug:
*Mar 1 00:06:14.000: TPLUS: Queuing AAA Authorization request 0 for
processing
*Mar 1 00:06:14.000: TPLUS: processing authorization request id 0
*Mar 1 00:06:14.001: TPLUS: Inappropriate protocol: 23
*Mar 1 00:06:14.001: TPLUS: Sending AV service=shell
*Mar 1 00:06:14.001: TPLUS: Sending AV cmd*
*Mar 1 00:06:14.001: TPLUS: Authorization request created for
0(User0001)
*Mar 1 00:06:14.002: TPLUS: Using server 10.0.0.4
*Mar 1 00:06:14.002: TPLUS(00000000)/0/NB_WAIT/BBB9BC: Started 5 sec
timeout
*Mar 1 00:06:14.004: TPLUS(00000000)/0/NB_WAIT: socket event 2
*Mar 1 00:06:14.004: TPLUS(00000000)/0/NB_WAIT: wrote entire 46 bytes
request
*Mar 1 00:06:14.004: TPLUS(00000000)/0/READ: socket event 1
*Mar 1 00:06:14.004: TPLUS(00000000)/0/READ: Would block while reading
*Mar 1 00:06:14.008: TPLUS(00000000)/0/READ: socket event 1
*Mar 1 00:06:14.008: TPLUS(00000000)/0/READ: read entire 12 header
bytes (expect 39 bytes data)
*Mar 1 00:06:14.008: TPLUS(00000000)/0/READ: socket event 1
*Mar 1 00:06:14.008: TPLUS(00000000)/0/READ: read entire 51 bytes
response
*Mar 1 00:06:14.008: TPLUS(00000000)/0/BBB9BC: Processing the reply
packet
*Mar 1 00:06:14.009: TPLUS (00000000): Got response service = INVALID
value Converted to NO_TYPE
*Mar 1 00:06:14.009: TPLUS: Processed AV service=shell cmd*
{priv-lvl=15}
*Mar 1 00:06:14.009: TPLUS: received authorization response for 0: PASS
And a piece of the TACACS log:
Fri Nov 14 01:47:30 2008: DEBUG: STEP1: completed; bound to LDAP as
utility user
Fri Nov 14 01:47:30 2008: DEBUG: STEP2: completed; have distinguished
name of user.
Fri Nov 14 01:47:30 2008: DEBUG: STEP3: completed; bound to LDAP as
user.
Fri Nov 14 01:47:30 2008: DEBUG: STEP4: found user in group GROUPOPS
Fri Nov 14 01:47:30 2008: DEBUG: STEP4: completed; searched 1 groups for
user membership.
Fri Nov 14 01:47:30 2008: DEBUG: AuthBy ADAM result: ACCEPT,
Fri Nov 14 01:47:30 2008: DEBUG: Access accepted for User0001
Fri Nov 14 01:47:30 2008: DEBUG: Packet dump:
*** Reply to TACACSPLUS request:
Code: Access-Accept
Identifier: UNDEF
Authentic: <223><139>s<145>"l<152><147>S<141><165><226>$<137><11>P
Attributes:
Fri Nov 14 01:47:30 2008: DEBUG: TacacsplusConnection result
Access-Accept
Fri Nov 14 01:47:30 2008: DEBUG: TacacsplusConnection Authentication
REPLY 1, 0, ,
Fri Nov 14 01:47:30 2008: DEBUG: TacacsplusConnection disconnected from
10.0.0.2:11003
Fri Nov 14 01:47:30 2008: DEBUG: New TacacsplusConnection created for
10.0.0.2:11004
Fri Nov 14 01:47:30 2008: DEBUG: TacacsplusConnection request 192, 2, 1,
0, 409174207, 34
Fri Nov 14 01:47:30 2008: DEBUG: TacacsPlus request packet dump: <dump
removed>
Fri Nov 14 01:47:30 2008: DEBUG: Decrypting TacacsPlus request
Fri Nov 14 01:47:30 2008: DEBUG: TacacsPlus request decrypted body: <
removed >
Fri Nov 14 01:47:30 2008: DEBUG: TacacsplusConnection Authorization
REQUEST 1, 1, 0, 0, User0001, , , 2, service=shell cmd*
Fri Nov 14 01:47:30 2008: DEBUG: TacacsplusConnection Authorization
RESPONSE 1, , , service=shell cmd* {priv-lvl=15}
Fri Nov 14 01:47:30 2008: DEBUG: TacacsplusConnection disconnected from
10.0.0.2:11004
Has anyone gone through this process for their Cisco network devices?
Would you mind sharing your TACACS config piece? We're wondering if we
formatted the config incorrectly, we're pretty new to TACACS...
And even more specifically, has anyone tried to make this work for the
Cisco IOS wireless AP's web interface - could you make admin authentication
work for the web login??
Thanks!
Regards,
Emily
More information about the radiator
mailing list