TinyRadius | reliable Java Radius library capable ofsending
kandi X-RAY | TinyRadius Summary
kandi X-RAY | TinyRadius Summary
TinyRadius is a simple, small and fast Java Radius library capable of sending and receiving Radius packets of all types. It is released under the terms of the LGPL. For documentation, please have a look at doc/tinyradius.html and doc/apidoc. Every method has got JavaDoc comments, and every package has got a package.html document detailing the package usage. Please do not hesitate to contact me if you have got questions or suggestions. Matthias Wuttke post@matthias-wuttke.de
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Adds the user - password attribute
- Encodes a user password into a byte array
- Encodes a plain - text password using the given CHAP challenge
- Returns a string representation of this packet
- Returns the type name of this packet
- Returns a string representation of this attribute
- Decodes the user - password attributes
- Returns a resource attribute of the specified type
- Decodes a PAP password
- Start the RadiusProxy listener
- Reads a Vendor - specific attribute
- Sets the attributes for this packet
- Set the IP address as a long
- Returns the attribute value as a string
- Sets the radius attribute
- Get the vendor id
- Checks the received request authenticator
- Returns the IP address attribute value
- Writes this attribute as a byte array
- Returns a string representation of this radius attribute
- Sets the value of the IPv6 address
- Returns the IP address value
- Adds an AttributeType to the cache
- Set the IP address attribute value
- Method updateRequestAuthenticator
- Handle a proxy packet
TinyRadius Key Features
TinyRadius Examples and Code Snippets
Community Discussions
Trending Discussions on TinyRadius
QUESTION
I am implementing a radius proxy with a help of TinyRadius lib. PAP & CHAP proxying without any problems but EAP messages not. So, i am recalculate Request Authenticator for radius packet after adding a proxy attribute, then i recalculate Message-Authenticator according to RFC3579.
And there is two question:
According to RFC3579: Message-Authenticator = HMAC-MD5 (Type, Identifier, Length, Request Authenticator, Attributes)
1) Length=? Is it a length of radius packet or EAP-message?
2) Request Authenticator - this is authenticator for radius packet, am i right? So, if i add it to the Message-Authenticator attribute into the radius packet - radius packet will be changed and i must to recalculate Request Authenticator but if i recalculate Request Authenticator - Message-Authenticator will be invalid because it depends on Request Authenticator.
Shared secrets for clients and endpoint radius server is the same (checked many times).
All i need - is to teach proxy to proxying EAP messages, but always get:
...ANSWER
Answered 2019-Oct-05 at 18:341) Length is the length of the RADIUS packet which contains one or more EAP-Message attributes if you're performing EAP.
2) No - The request authenticator is a random 16 bit challenge in the RADIUS packet header that's used for duplicate detection and as part of a hashing scheme for attributes like CHAP. It should only change if you're generating a new packet, not when you're retransmitting an existing one.
Message-Authenticator is an attribute in the Access-Request itself. The Message-Authenticator contains a HMAC of the RADIUS packet keyed off the shared secret.
Causes of the Message-Authenticator being incorrect are:
- Shared secret mismatch.
- Bad implementation of the Message-Authenticator HMAC.
- Packet being modified in flight between RADIUS client and server.
And then FreeRADIUS specific issues:
- Wrong client entry being used due to incorrect IP scoping.
- Shared secret being incorrect due to bad home server configuration.
Note: If you're using FreeRADIUS then you shouldn't generate the Message-Authenticator yourself. You just need to set Message-Authenticator = 0x00
in the upstream request and FreeRADIUS will fill in the value automatically.
If you want to generate you own Message-Authenticator values, that's described by RFC 2869 section #5.14.
For Access-Requests:
QUESTION
I have a JSR223 sampler that uses Tiny Radius but when I run the script, jmeter.log fills up with info messages from org.tinyradius.util.RadiusClient and packet information.
Is there something I can add to my jmeter.properties to stop this, or at least drop the logging level to error?
...ANSWER
Answered 2019-Apr-02 at 08:07PRE v3.2
in bin/jmeter.properties
:
QUESTION
I'm using TinyRadius to authenticate my Java WebServer (as Radius Client) to a Windows Server (as Radius Server).
I successfully sent the user Access-Request to the server and received the passcode back.
...ANSWER
Answered 2018-Mar-20 at 12:48There are a few issues in how I was sending the second request to the radius server.
Doing it this way did not work as STATE.getBytes()
returned a differently-encoded String
:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install TinyRadius
You can use TinyRadius like any standard Java library. Please include the the jar files in your classpath. You can also use any IDE and you can run and debug the TinyRadius component as you would do with any other Java program. Best practice is to use a build tool that supports dependency management such as Maven or Gradle. For Maven installation, please refer maven.apache.org. For Gradle installation, please refer gradle.org .
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page