[RADIATOR] TACACS+ authorisation problem

Markus Moeller huaraz at moeller.plus.com
Mon Oct 18 00:15:05 CDT 2010


Apologies. I didn't read it correctly.

Thank you
Markus

----- Original Message ----- 
From: "Hugh Irvine" <hugh at open.com.au>
To: "Markus Moeller" <huaraz at moeller.plus.com>
Cc: <radiator at open.com.au>
Sent: Sunday, October 17, 2010 11:42 PM
Subject: Re: [RADIATOR] TACACS+ authorisation problem



Hello Markus -

>From section 5.86 in the manual:

….

Incoming TACACS+ authorization requests are approved subject to any Command- 
Auth parameters, and any cisco-avpair reply items from the previous 
authentication RADIUS Access-Accept are used as authorization 
attribute-value pairs.

….

Perhaps I am not understanding what you are wanting?

regards

Hugh


On 18 Oct 2010, at 09:07, Markus Moeller wrote:

> Sorry Hugh,
>
> I may have not been clear.  As far as I understood a line like:
>
> AuthorizeGroup group1 permit service=shell  {cisco-avpair="priv-lvl=12"}
>
> would add priv-lvl=12 to the authorization reply and I agree with that.
>
> But would a handler like:
>
> <Handler Service-Type=Administrative-User>
>  AuthByPolicy ContinueUntilAccept
>  AuthBy Users
>  AuthLog LogAuthentication
>  AddToReply cisco-avpair="priv-lvl=12"
> </Handler>
>
> mean that all authentication AND authorization replys have priv-lvl=12 in 
> their reply ?  That is what I see and not expect and can't see in the 
> documentation.
>
> Markus
>
> ----- Original Message ----- From: "Hugh Irvine" <hugh at open.com.au>
> To: "Markus Moeller" <huaraz at moeller.plus.com>
> Cc: <radiator at open.com.au>
> Sent: Sunday, October 17, 2010 10:13 PM
> Subject: Re: [RADIATOR] TACACS+ authorisation problem
>
>
>
> Hello Markus -
>
> Radiator is operating as intended.
>
> See section 5.86 in the Radiator 4.7 reference manual ("doc/ref.pdf").
>
> regards
>
> Hugh
>
>
> On 18 Oct 2010, at 07:27, Markus Moeller wrote:
>
>> With bug I mean is it intended to add the av pair to the authorisation 
>> exchange ? I would have thought this would be only done as part of the 
>> authorisationgroup command
>>
>> Thank you
>> Markus
>> ----- Original Message -----
>> From: Markus Moeller
>> To: radiator at open.com.au
>> Sent: Sunday, October 17, 2010 1:35 PM
>> Subject: [RADIATOR] TACACS+ authorisation problem
>>
>>
>> I have a problem with TACACS+ command authorisation.
>>
>> If I add am attribute to the authentication reply as shown below it seems 
>> that it is also added to the authorisation reply (see RESPONSE line). 
>> This creates a problem on the cisco router and the command is denied. Is 
>> this a bug ?
>>
>> Thank you
>> Markus
>>
>> <Handler Service-Type=Administrative-User>
>>   AuthByPolicy ContinueUntilAccept
>>   AuthBy Users
>>   AuthLog LogAuthentication
>>   AddToReply cisco-avpair="priv-lvl=15"
>> </Handler>
>>
>>
>> Code:       Access-Accept
>> Identifier: UNDEF
>> Authentic:  <217><2><221>F<29><240><4>w<208>(<242>^<4>W:/
>> Attributes:
>>        cisco-avpair = "priv-lvl=15"
>>
>> Sun Oct 17 12:33:06 2010: DEBUG: TacacsplusConnection result 
>> Access-Accept
>> Sun Oct 17 12:33:06 2010: DEBUG: TacacsplusConnection Authentication 
>> REPLY 1, 0, ,
>> Sun Oct 17 12:33:06 2010: DEBUG: TacacsplusConnection disconnected from 
>> 10.10.10.10:37060
>> Sun Oct 17 12:33:09 2010: DEBUG: New TacacsplusConnection created for 
>> 10.10.10.10:37061
>> Sun Oct 17 12:33:09 2010: DEBUG: TacacsplusConnection request 192, 2, 1, 
>> 0, 4287547660, 88
>> Sun Oct 17 12:33:09 2010: DEBUG: TacacsplusConnection Authorization 
>> REQUEST 6, 1, 1, 1, xxx, tty1, 10.20.1.1, 4, service=
>> shell cmd=show cmd-arg=running-config cmd-arg=<cr>
>> Sun Oct 17 12:33:09 2010: DEBUG: AuthorizeGroup rule match found: permit 
>> service=shell {  }
>> Sun Oct 17 12:33:09 2010: INFO: Authorization permitted for xxx, group 
>> test, args service=shell cmd=show cmd-arg=running-c
>> onfig cmd-arg=<cr>
>> Sun Oct 17 12:33:09 2010: DEBUG: TacacsplusConnection Authorization 
>> RESPONSE 1, , , priv-lvl=15
>> Sun Oct 17 12:33:09 2010: DEBUG: TacacsplusConnection disconnected from 
>> 10.10.10.10:37061
>>
>>
>>
>>
>> _______________________________________________
>> radiator mailing list
>> radiator at open.com.au
>> http://www.open.com.au/mailman/listinfo/radiator
>> _______________________________________________
>> radiator mailing list
>> radiator at open.com.au
>> http://www.open.com.au/mailman/listinfo/radiator
>
>
>
> NB:
>
> Have you read the reference manual ("doc/ref.html")?
> Have you searched the mailing list archive 
> (www.open.com.au/archives/radiator)?
> Have you had a quick look on Google (www.google.com)?
> Have you included a copy of your configuration file (no secrets),
> together with a trace 4 debug showing what is happening?
>
> -- 
> Radiator: the most portable, flexible and configurable RADIUS server
> anywhere. Available on *NIX, *BSD, Windows, MacOS X.
> Includes support for reliable RADIUS transport (RadSec),
> and DIAMETER translation agent.
> -
> Nets: internetwork inventory and management - graphical, extensible,
> flexible with hardware, software, platform and database independence.
>
>
>
>
>
>
>



NB:

Have you read the reference manual ("doc/ref.html")?
Have you searched the mailing list archive 
(www.open.com.au/archives/radiator)?
Have you had a quick look on Google (www.google.com)?
Have you included a copy of your configuration file (no secrets),
together with a trace 4 debug showing what is happening?

-- 
Radiator: the most portable, flexible and configurable RADIUS server
anywhere. Available on *NIX, *BSD, Windows, MacOS X.
Includes support for reliable RADIUS transport (RadSec),
and DIAMETER translation agent.
-
Nets: internetwork inventory and management - graphical, extensible,
flexible with hardware, software, platform and database independence.









More information about the radiator mailing list