Netgate Discussion Forum
    • Kategorien
    • Aktuell
    • Tags
    • Beliebt
    • Benutzer
    • Suche
    • Registrieren
    • Anmelden

    Allow Setting RADIUS Timeout for EAP-RADIUS?

    Geplant Angeheftet Gesperrt Verschoben IPsec
    8 Beiträge 3 Kommentatoren 2.0k Aufrufe
    Lade mehr Beiträge
    • Älteste zuerst
    • Neuste zuerst
    • Meiste Stimmen
    Antworten
    • In einem neuen Thema antworten
    Anmelden zum Antworten
    Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
    • L
      ltctech
      zuletzt editiert von

      There is currently no way to adjust the RADIUS timeout for EAP-RADIUS authentication in conjunction with Mobile IKEv2. The "Authentication Timeout" setting in System -> User Manager -> Authentication Servers is ignored.

      Instead the following defaults are used:
      https://github.com/strongswan/strongswan/blob/5.6.0/conf/plugins/eap-radius.opt

      
      charon.plugins.eap-radius.retransmit_base = 1.4
      	Base to use for calculating exponential back off.
      
      charon.plugins.eap-radius.retransmit_timeout = 2.0
      	Timeout in seconds before sending first retransmit.
      
      charon.plugins.eap-radius.retransmit_tries = 4
              Number of times to retransmit a packet before giving up.
      
      charon.plugins.eap-radius.sockets = 1
              Number of sockets (ports) to use, increase for high load.
      
      

      Retransmit explained: https://wiki.strongswan.org/projects/1/wiki/Retransmission

      To use 2FA/MFA with RADIUS the timeout needs to be adjusted to 60s, retries eliminated, and sockets need to be adjusted to allow more than one concurrent authentication.

      For now I made a hardcoded change under the eap-radius section in /etc/inc/vpn.inc:
      https://github.com/pfsense/pfsense/blob/v2.4.2_1/src/etc/inc/vpn.inc

      
      	/* write an eap-radius config section if appropriate */
      	if (strlen($radius_server_txt) && ($mobile_ipsec_auth === "eap-radius")) {
      		$strongswan .= << <eod<br>eap-radius {
      			class_group = yes
      			eap_start = no
      
                              sockets = 10
                              retransmit_tries = 1
                              retransmit_base = 1.0
                              retransmit_timeout = 60.0
      
      			{$radius_accounting}
      			servers {
                                  {$radius_server_txt}
      			}
      		}</eod<br> 
      

      It'd be great if these four settings were added to the "Extended Authentication (Xauth)" section in VPN -> IPsec -> Mobile Clients.

      1 Antwort Letzte Antwort Antworten Zitieren 0
      • viktor_gV
        viktor_g Netgate
        zuletzt editiert von

        feature request created: https://redmine.pfsense.org/issues/11211

        keyserK 1 Antwort Letzte Antwort Antworten Zitieren 0
        • keyserK
          keyser Rebel Alliance @viktor_g
          zuletzt editiert von

          @viktor_g said in Allow Setting RADIUS Timeout for EAP-RADIUS?:

          feature request created: https://redmine.pfsense.org/issues/11211

          Sorry to “wake” this thread again. But I can see from redmine request #11211 that it is completed/done and included in 21.05 / 2.5.2 but:

          I cannot see what the fix really did? As there are no new/additional GUI settings as first requested, does the fix then just make EAP-Redius in IPsec respect the radius time-out setting in user-manager -> authentication servers?

          Or is all it does make some advanced settings available in strongswan.conf that you can edit without having to hardcode it in build files?

          Love the no fuss of using the official appliances :-)

          keyserK 1 Antwort Letzte Antwort Antworten Zitieren 0
          • keyserK
            keyser Rebel Alliance @keyser
            zuletzt editiert von

            @keyser BUMP… anyone?

            Love the no fuss of using the official appliances :-)

            viktor_gV 1 Antwort Letzte Antwort Antworten Zitieren 0
            • viktor_gV
              viktor_g Netgate @keyser
              zuletzt editiert von

              @keyser see the VPN / IPsec / Mobile Clients page:
              Screenshot from 2021-11-16 08-03-30.png

              keyserK 1 Antwort Letzte Antwort Antworten Zitieren 2
              • keyserK
                keyser Rebel Alliance @viktor_g
                zuletzt editiert von

                @viktor_g Cool, I didn’t notice that.

                Do you have e breif explanation how to cover “best use” scenario’s?

                The primary problem is that a lot of users are in countries where azure MFA notifications might take a while to surface on users authenticate app on phones.

                Love the no fuss of using the official appliances :-)

                viktor_gV 1 Antwort Letzte Antwort Antworten Zitieren 0
                • viktor_gV
                  viktor_g Netgate @keyser
                  zuletzt editiert von

                  @keyser You can try to increase the Retransmit Timeout (>10) to give your users time for MFA

                  keyserK 1 Antwort Letzte Antwort Antworten Zitieren 1
                  • keyserK
                    keyser Rebel Alliance @viktor_g
                    zuletzt editiert von

                    @viktor_g Thanks - i'll give that a try

                    Love the no fuss of using the official appliances :-)

                    1 Antwort Letzte Antwort Antworten Zitieren 0
                    • Erster Beitrag
                      Letzter Beitrag
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.