Subversion Repositories configs

Rev

Rev 4 | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
4 - 1
# -*- text -*-
2
#
34 - 3
#  $Id: 0a26c9c1672823e46219d831e2be18890450c2a7 $
4 - 4
 
5
#
6
#  Sample configuration for an EAP module that occurs *inside*
7
#  of a tunneled method.  It is used to limit the EAP types that
8
#  can occur inside of the inner tunnel.
9
#
10
#  See also raddb/sites-available/inner-tunnel
11
#
12
#  To use this module, edit raddb/sites-available/inner-tunnel, and
13
#  replace the references to "eap" with "inner-eap".
14
#
15
#  See raddb/eap.conf for full documentation on the meaning of the
16
#  configuration entries here.
17
#
18
eap inner-eap {
19
	# This is the best choice for PEAP.
20
	default_eap_type = mschapv2
21
	timer_expire     = 60
22
 
23
	#  This should be the same as the outer eap "max sessions"
24
	max_sessions = 2048
25
 
26
	# Supported EAP-types
27
	md5 {
28
	}
29
 
30
	gtc {
31
		#  The default challenge, which many clients
32
		#  ignore..
33
		#challenge = "Password: "
34
 
35
		auth_type = PAP
36
	}
37
 
38
	mschapv2 {
39
	}
40
 
41
	# No TTLS or PEAP configuration should be listed here.
42
 
43
	## EAP-TLS
44
	#
45
	#  You SHOULD use different certificates than are used
46
	#  for the outer EAP configuration!
47
	#
48
	#  Support for PEAP/TLS and RFC 5176 TLS/TLS is experimental.
49
	#
50
	tls {
51
		#
52
		#  These is used to simplify later configurations.
53
		#
54
		certdir = ${confdir}/certs
55
		cadir = ${confdir}/certs
56
 
57
		private_key_password = whatever
58
		private_key_file = ${certdir}/server.pem
59
 
60
		#  If Private key & Certificate are located in
61
		#  the same file, then private_key_file &
62
		#  certificate_file must contain the same file
63
		#  name.
64
		#
65
		#  If CA_file (below) is not used, then the
66
		#  certificate_file below MUST include not
67
		#  only the server certificate, but ALSO all
68
		#  of the CA certificates used to sign the
69
		#  server certificate.
70
		certificate_file = ${certdir}/server.pem
71
 
72
		#  Trusted Root CA list
73
		#
74
		#  ALL of the CA's in this list will be trusted
75
		#  to issue client certificates for authentication.
76
		#
77
		#  In general, you should use self-signed
78
		#  certificates for 802.1x (EAP) authentication.
79
		#  In that case, this CA file should contain
80
		#  *one* CA certificate.
81
		#
82
		#  This parameter is used only for EAP-TLS,
83
		#  when you issue client certificates.  If you do
84
		#  not use client certificates, and you do not want
85
		#  to permit EAP-TLS authentication, then delete
86
		#  this configuration item.
87
		CA_file = ${cadir}/ca.pem
88
 
89
		#
90
		#  For DH cipher suites to work, you have to
91
		#  run OpenSSL to create the DH file first:
92
		#
93
		#  	openssl dhparam -out certs/dh 1024
94
		#
95
		dh_file = ${certdir}/dh
96
		random_file = ${certdir}/random
97
 
98
		#
99
		#  This can never exceed the size of a RADIUS
100
		#  packet (4096 bytes), and is preferably half
101
		#  that, to accomodate other attributes in
102
		#  RADIUS packet.  On most APs the MAX packet
103
		#  length is configured between 1500 - 1600
104
		#  In these cases, fragment size should be
105
		#  1024 or less.
106
		#
107
	#	fragment_size = 1024
108
 
109
		#  include_length is a flag which is
110
		#  by default set to yes If set to
111
		#  yes, Total Length of the message is
112
		#  included in EVERY packet we send.
113
		#  If set to no, Total Length of the
114
		#  message is included ONLY in the
115
		#  First packet of a fragment series.
116
		#
117
	#	include_length = yes
118
 
119
		#  Check the Certificate Revocation List
120
		#
121
		#  1) Copy CA certificates and CRLs to same directory.
122
		#  2) Execute 'c_rehash <CA certs&CRLs Directory>'.
123
		#    'c_rehash' is OpenSSL's command.
124
		#  3) uncomment the line below.
125
		#  5) Restart radiusd
126
	#	check_crl = yes
127
	#	CA_path = /path/to/directory/with/ca_certs/and/crls/
128
 
129
	       #
130
	       #  If check_cert_issuer is set, the value will
131
	       #  be checked against the DN of the issuer in
132
	       #  the client certificate.  If the values do not
133
	       #  match, the cerficate verification will fail,
134
	       #  rejecting the user.
135
	       #
136
	#       check_cert_issuer = "/C=GB/ST=Berkshire/L=Newbury/O=My Company Ltd"
137
 
138
	       #
139
	       #  If check_cert_cn is set, the value will
140
	       #  be xlat'ed and checked against the CN
141
	       #  in the client certificate.  If the values
142
	       #  do not match, the certificate verification
143
	       #  will fail rejecting the user.
144
	       #
145
	       #  This check is done only if the previous
146
	       #  "check_cert_issuer" is not set, or if
147
	       #  the check succeeds.
148
	       #
149
	#	check_cert_cn = %{User-Name}
150
	#
151
		# Set this option to specify the allowed
152
		# TLS cipher suites.  The format is listed
153
		# in "man 1 ciphers".
154
		cipher_list = "DEFAULT"
155
 
156
		#
157
		#  The session resumption / fast reauthentication
158
		#  cache CANNOT be used for inner sessions.
159
		#
160
	}
161
}