Skip to content

Commit

Permalink
Config docs: Clients aggregators may be RADIUS proxies and set proxy-…
Browse files Browse the repository at this point in the history
…state
  • Loading branch information
terryburton authored and mcnewton committed Jul 8, 2024
1 parent 55342c7 commit da643f1
Showing 1 changed file with 10 additions and 3 deletions.
13 changes: 10 additions & 3 deletions raddb/radiusd.conf.in
Original file line number Diff line number Diff line change
Expand Up @@ -766,9 +766,16 @@ security {
# packets which contain Proxy-State MUST also contain
# Message-Authenticator, otherwise they are discarded.
#
# This setting is safe for all NASes, GGSNs, BRAS, etc.
# No known RADIUS client sends Proxy-State for normal
# Access-Request packets.
# This setting is safe for most NASes, GGSNs, BRAS, etc.
# Most regular RADIUS clients do not send Proxy-State
# attributes for Access-Request packets that they originate.
# However some aggregators (e.g. Wireless LAN Controllers)
# may act as a RADIUS proxy for requests from their cohort
# of managed devices, and in such cases will provide a
# Proxy-State attribute. For those systems, you _must_ look
# at the actual packets to determine what to do. It may be
# that the only way to fix the vulnerability is to upgrade
# the WLC, and set "require_message_authenticator" to "yes".
#
# * "auto" - Automatically determine the value of the flag,
# based on the first packet received from that client.
Expand Down

0 comments on commit da643f1

Please sign in to comment.