net/freeradius: Add option to enable EAP-PWD (#4093)

* Add option to enable EAP-PWD

* also make server_id configurable
This commit is contained in:
Severin Schüller 2025-12-17 09:27:19 +01:00 committed by GitHub
parent 420efa0c47
commit fb27dc4444
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
3 changed files with 25 additions and 3 deletions

View file

@ -29,6 +29,17 @@
<type>dropdown</type>
<help>Choose the certificate the Radius service should use.</help>
</field>
<field>
<id>eap.enable_pwd</id>
<label>Enable EAP-PWD</label>
<type>checkbox</type>
<help>This enables EAP-PWD authentication</help>
</field>
<field>
<id>eap.pwd_serverid</id>
<label>EAP-PWD server id</label>
<type>text</type>
</field>
<field>
<id>eap.crl</id>
<label>CRL</label>

View file

@ -9,6 +9,7 @@
<Multiple>N</Multiple>
<OptionValues>
<md5>MD5</md5>
<pwd>PWD</pwd>
<mschapv2>MSCHAPv2</mschapv2>
<peap>PEAP</peap>
<tls>TLS</tls>
@ -37,6 +38,14 @@
<Type>cert</Type>
<Required>N</Required>
</certificate>
<enable_pwd type="BooleanField">
<default>0</default>
<Required>Y</Required>
</enable_pwd>
<pwd_serverid type="TextField">
<default>theserver@example.com</default>
<Required>Y</Required>
</pwd_serverid>
<crl type="CertificateField">
<Type>crl</Type>
<Required>N</Required>

View file

@ -87,12 +87,13 @@ eap {
}
{% if OPNsense.freeradius.eap.enable_pwd == '1' %}
# EAP-pwd -- secure password-based authentication
#
#pwd {
pwd {
# group = 19
# server_id = theserver@example.com
server_id = {{ OPNsense.freeradius.eap.pwd_serverid }}
# This has the same meaning as for TLS.
#
@ -106,7 +107,8 @@ eap {
# no User-Password, CHAP-Password, EAP-Message, etc.
#
# virtual_server = "inner-tunnel"
#}
}
{% endif %}
# Cisco LEAP