From: Alan T. DeKok Date: Tue, 4 Sep 2012 12:13:51 +0000 (+0200) Subject: Disable EAP-PWD by default. X-Git-Tag: release_3_0_0_beta0~37 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=9b84aef56903eef2c8ead6ec3c9d964ebd08151e;p=thirdparty%2Ffreeradius-server.git Disable EAP-PWD by default. It's not available in all versions of OpenSSL --- diff --git a/raddb/mods-available/eap b/raddb/mods-available/eap index 0ac360e6469..5ec36148293 100644 --- a/raddb/mods-available/eap +++ b/raddb/mods-available/eap @@ -78,14 +78,14 @@ eap { # # EAP-pwd -- secure password-based authentication # - pwd { - group = 19 +# pwd { +# group = 19 # - server_id = theserver@example.com +# server_id = theserver@example.com # This has the same meaning as for TLS. - fragment_size = 1020 +# fragment_size = 1020 # The virtual server which determines the # "known good" password for the user. @@ -93,8 +93,8 @@ eap { # section is processed. EAP-PWD requests can be # distinguished by having a User-Name, but # no User-Password, CHAP-Password, EAP-Message, etc. - virtual_server = "inner-tunnel" - } +# virtual_server = "inner-tunnel" +# } # Cisco LEAP #