]> git.ipfire.org Git - thirdparty/freeradius-server.git/commitdiff
Config docs: Clients aggregators may be RADIUS proxies and set proxy-state
authorTerry Burton <tez@terryburton.co.uk>
Mon, 8 Jul 2024 14:55:44 +0000 (15:55 +0100)
committerMatthew Newton <matthew-git@newtoncomputing.co.uk>
Mon, 8 Jul 2024 15:22:45 +0000 (16:22 +0100)
raddb/radiusd.conf.in

index 860a6e9ad742374dda6eb12b2a98059a56699d23..44fee628e74bbc7ee69c905a6892f2841b7b840b 100644 (file)
@@ -744,9 +744,16 @@ security {
        #    packets which contain Proxy-State MUST also contain
        #    Message-Authenticator, otherwise they are discarded.
        #
-       #    This setting is safe for all NASes, GGSNs, BRAS, etc.
-       #    No known RADIUS client sends Proxy-State for normal
-       #    Access-Request packets.
+       #    This setting is safe for most NASes, GGSNs, BRAS, etc.
+       #    Most regular RADIUS clients do not send Proxy-State
+       #    attributes for Access-Request packets that they originate.
+       #    However some aggregators (e.g. Wireless LAN Controllers)
+       #    may act as a RADIUS proxy for requests from their cohort
+       #    of managed devices, and in such cases will provide a
+       #    Proxy-State attribute. For those systems, you _must_ look
+       #    at the actual packets to determine what to do. It may be
+       #    that the only way to fix the vulnerability is to upgrade
+       #    the WLC, and set "require_message_authenticator" to "yes".
        #
        #  * "auto" - Automatically determine the value of the flag,
        #    based on the first packet received from that client.