Yeah, its sucks. Use this option in only secured networks!
Check /etc/pam.d for radiusd file.
/etc/raddb/clients.conf
client 192.168.100.60 { ipv4addr = 192.168.100.60 secret = mysecret shortname = myshortname }
/etc/raddb/radius.conf
You wanna read /etc/shadow? Become root. —> Yeah, its sucks. Use this option in only secured networks!
user = root group = root
/etc/raddb/sites-enabled/default
Section authorize {}: enable unix and pap. Unix should be located above pap.
Section authenticate {}:
Tune
Section authenticate { Auth-Type PAP { pap pam }
and
# Pluggabele Authentication Modules pam
Enable module pam
Enable module unix and add
radwtmp = ${logdir}/radwtmp passwd = /etc/passwd shadow = /etc/shadow group = /etc/group
Generate certs.
Debug:
radiusd -X 2>&1
Test on client machine/server:
radtest -x usernametotest passwordtotest radius_server 0 radius_secret
HINT:
… requires cleartext password means: This module works only with this f..ing local users plain text file.