-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Part 2 of 2 - EAP-RADIUS ipsec/strongswan support #1342
Conversation
|
I merged the tools part, but still waiting for a final merge in a 17.1.x and feedback from Ad on this. :) |
|
Good :) It has been years since I have touched PHP, so it might need a few changes here and there. I have attached the part of my config here, for people to test: https://forum.opnsense.org/index.php?topic=4323.0 |
|
@GurliGebis I will handle this one next week. |
|
@AdSchellevis Great :) The only parts added to ipsec.conf is the plugins/eap-radius part, with the "server" and "secret". As for the RADIUS part in the pluggable auth framework, I haven't touched that. Does it make sense to go that route, or should I rework this to use the auth framework for selecting RADIUS servers? |
|
Just checked the strongswan documentation - my patch does not enable accounting. I think it would be better to save that for when it is changed to use the auth framework, since it would be possible to define it on the server there, what should be used and what shouldn't. |
|
Okay, I know how this should be done. I will get back with a new pull request :) |
|
Just got confirmation back from strongswan people - it is not possible to define different servers for different connections. https://wiki.strongswan.org/issues/2229 So I plan on doing it the other way around - so to use this, you have to add one or more RADIUS servers to the auth framework. Does that sound like a usefull idea? |
|
I will be recreating my repo, since the patches should not have been commited to the master branch (and it cannot be rolled back now that I has been pushed to github). I will change my implementation like mentioned above, and create a new pull request from the new repository |
|
Done, I have reimplemented it using the servers in the auth framework. Please see the new pull request here: #1345 I'm closing this one, since this version should not be pulled. |
This pull request is split across the tools and core repositories, this is the core part.