• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Allow Setting RADIUS Timeout for EAP-RADIUS?

IPsec
3
8
2.0k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L
    ltctech
    last edited by Mar 21, 2018, 10:45 PM

    There is currently no way to adjust the RADIUS timeout for EAP-RADIUS authentication in conjunction with Mobile IKEv2. The "Authentication Timeout" setting in System -> User Manager -> Authentication Servers is ignored.

    Instead the following defaults are used:
    https://github.com/strongswan/strongswan/blob/5.6.0/conf/plugins/eap-radius.opt

    
    charon.plugins.eap-radius.retransmit_base = 1.4
    	Base to use for calculating exponential back off.
    
    charon.plugins.eap-radius.retransmit_timeout = 2.0
    	Timeout in seconds before sending first retransmit.
    
    charon.plugins.eap-radius.retransmit_tries = 4
            Number of times to retransmit a packet before giving up.
    
    charon.plugins.eap-radius.sockets = 1
            Number of sockets (ports) to use, increase for high load.
    
    

    Retransmit explained: https://wiki.strongswan.org/projects/1/wiki/Retransmission

    To use 2FA/MFA with RADIUS the timeout needs to be adjusted to 60s, retries eliminated, and sockets need to be adjusted to allow more than one concurrent authentication.

    For now I made a hardcoded change under the eap-radius section in /etc/inc/vpn.inc:
    https://github.com/pfsense/pfsense/blob/v2.4.2_1/src/etc/inc/vpn.inc

    
    	/* write an eap-radius config section if appropriate */
    	if (strlen($radius_server_txt) && ($mobile_ipsec_auth === "eap-radius")) {
    		$strongswan .= << <eod<br>eap-radius {
    			class_group = yes
    			eap_start = no
    
                            sockets = 10
                            retransmit_tries = 1
                            retransmit_base = 1.0
                            retransmit_timeout = 60.0
    
    			{$radius_accounting}
    			servers {
                                {$radius_server_txt}
    			}
    		}</eod<br> 
    

    It'd be great if these four settings were added to the "Extended Authentication (Xauth)" section in VPN -> IPsec -> Mobile Clients.

    1 Reply Last reply Reply Quote 0
    • V
      viktor_g Netgate
      last edited by Jan 2, 2021, 1:49 PM

      feature request created: https://redmine.pfsense.org/issues/11211

      K 1 Reply Last reply Nov 11, 2021, 11:13 PM Reply Quote 0
      • K
        keyser Rebel Alliance @viktor_g
        last edited by Nov 11, 2021, 11:13 PM

        @viktor_g said in Allow Setting RADIUS Timeout for EAP-RADIUS?:

        feature request created: https://redmine.pfsense.org/issues/11211

        Sorry to “wake” this thread again. But I can see from redmine request #11211 that it is completed/done and included in 21.05 / 2.5.2 but:

        I cannot see what the fix really did? As there are no new/additional GUI settings as first requested, does the fix then just make EAP-Redius in IPsec respect the radius time-out setting in user-manager -> authentication servers?

        Or is all it does make some advanced settings available in strongswan.conf that you can edit without having to hardcode it in build files?

        Love the no fuss of using the official appliances :-)

        K 1 Reply Last reply Nov 15, 2021, 10:25 PM Reply Quote 0
        • K
          keyser Rebel Alliance @keyser
          last edited by Nov 15, 2021, 10:25 PM

          @keyser BUMP… anyone?

          Love the no fuss of using the official appliances :-)

          V 1 Reply Last reply Nov 16, 2021, 5:04 AM Reply Quote 0
          • V
            viktor_g Netgate @keyser
            last edited by Nov 16, 2021, 5:04 AM

            @keyser see the VPN / IPsec / Mobile Clients page:
            🔒 Log in to view

            K 1 Reply Last reply Nov 16, 2021, 8:32 AM Reply Quote 2
            • K
              keyser Rebel Alliance @viktor_g
              last edited by Nov 16, 2021, 8:32 AM

              @viktor_g Cool, I didn’t notice that.

              Do you have e breif explanation how to cover “best use” scenario’s?

              The primary problem is that a lot of users are in countries where azure MFA notifications might take a while to surface on users authenticate app on phones.

              Love the no fuss of using the official appliances :-)

              V 1 Reply Last reply Nov 16, 2021, 9:07 AM Reply Quote 0
              • V
                viktor_g Netgate @keyser
                last edited by Nov 16, 2021, 9:07 AM

                @keyser You can try to increase the Retransmit Timeout (>10) to give your users time for MFA

                K 1 Reply Last reply Nov 16, 2021, 9:41 AM Reply Quote 1
                • K
                  keyser Rebel Alliance @viktor_g
                  last edited by Nov 16, 2021, 9:41 AM

                  @viktor_g Thanks - i'll give that a try

                  Love the no fuss of using the official appliances :-)

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.