Sponsored Content
Full Discussion: Solaris 11 iscsi chap auth
Operating Systems Solaris Solaris 11 iscsi chap auth Post 302933512 by hicksd8 on Friday 30th of January 2015 06:52:03 AM
Old 01-30-2015
So are you saying that you've fixed your problem?

With iSCSI a target may support host chap authenication and/or individual volume chap authenication. Perhaps one of them, perhaps both.

Similarly, an iSCSI initiator may support host chap authenication and/or individual volume chap authenication. Perhaps one of them, perhaps both.

So, for example, if you are unfortunate enough to have your initiator only support host chap and your target only supports volume chap then you cannot make any chap authenication work.

Run a test to see if host chap works, yes or no, then run a test to see if volume chap works, yes or no.

Then you will know whether you can use one, both, or none.

Of course, if you've changed your host or initiator software then what works and doesn't work changes.
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Solaris 10 auth issue

Very strange one, we've got a recently build server (Sol10 via JET flash). Bascially you can ssh to it fine, but telnet will allow entry of username, but will then feed in a carriage return on the passwd field, this also happens on any auth type command, ie passwd on a user account will also... (4 Replies)
Discussion started by: itsupplies
4 Replies

2. UNIX for Advanced & Expert Users

iscsi commands iscsiadm solaris 10

I'm running solaris 10 and this packages is installed SUNWiscsir - Sun iSCSI Device Driver (root) SUNWiscsiu - Sun iSCSI Management Utilities (usr) But the commands iscsiadm or iscsitadm dont work. He are not in my system. Do you know the problem. (1 Reply)
Discussion started by: simonquest
1 Replies

3. Solaris

Solaris 10 10/08 sparc + iSCSI

hi, I have installed Solaris 10 10/08 on sparc machine. I would like to configure iSCSI on that to mount SAN Volumes. Is there any need to install any additional patches for iSCSI to work. Thanks, Prashant. (4 Replies)
Discussion started by: prashantbhushan
4 Replies

4. Solaris

iscsi device on solaris 10 (x64)

Hello! I have several disks discovered using iscsi protocol. There disks are represented in OS like c2txd0 . logs: Is it possible to change drive path, for example, from c2t6d0 to c2t7d0? It's important for me because I have to install oracle RAC on RAW devices. NIck (0 Replies)
Discussion started by: skelet
0 Replies

5. Solaris

Solaris 10 and DELL TL-2000 Tape Library with ISCSI

Hello, i am trying to get following configuration up running, but get no access to the library roboter. Server: SunOS 5.10 Generic_138889-03 i86pc i386 i86pc DELL TL-2000: 1 Tape: IBM ULT3580-HH4 and Robot: 3573-TL, connected via ISCSI Bridge (build into the TL) ... (1 Reply)
Discussion started by: austin73
1 Replies

6. UNIX for Advanced & Expert Users

Solaris 10 10/09 u8, iSCSI and SUN Trunking

I am running Solaris 10 on a V490. I have Dell EqualLogic SAN attached. I would like to take full advantage of the iSCSI initiator. I have a primary network interface and IP addresses for all four SAN ports. Since the four ports are SUN GigaSwift (legacy), I cannot utilize dladm, so I downloaded... (2 Replies)
Discussion started by: KSFlyer
2 Replies

7. Solaris

Set up iscsi LUN on solaris 9?

Hi, I need to set up iscsi LUN on Solaris 9. I've done it on Solaris 10 with iscsiadm. How do you do it on Solaris 9 though? Currently using Solaris 9 update 2. Your help is appreciated. Thanks, Sparcman (6 Replies)
Discussion started by: sparcman
6 Replies

8. UNIX for Dummies Questions & Answers

How to change ethernet cable of iscsi initiator (iscsi client)?

how to change ethernet cable of iscsi initiator (iscsi client) (0 Replies)
Discussion started by: pankajd
0 Replies

9. Solaris

Can You Mount FAT32 iSCSI Target in Solaris 10 (sparc)?

I get "mount: I/O error" when trying to mount an existing FAT32 iSCSI target. I also tried formatting the iSCSI target with fdisk and got fdisk: "Error in ioctl DKIOCSMBOOT" Details -- According to the format command, the whole disk is allocated to slice 6 and /dev/rdsk shows this as:... (0 Replies)
Discussion started by: ctafret
0 Replies
SPPPCONTROL(8)						    BSD System Manager's Manual 					    SPPPCONTROL(8)

NAME
spppcontrol -- display or set parameters for an sppp interface SYNOPSIS
spppcontrol [-v] ifname [parameter[=value]] [...] DESCRIPTION
The sppp(4) driver might require a number of additional arguments or optional parameters besides the settings that can be adjusted with ifconfig(8). These are things like authentication protocol parameters, but also other tunable configuration variables. The spppcontrol utility can be used to display the current settings, or adjust these parameters as required. For whatever intent spppcontrol is being called, at least the parameter ifname needs to be specified, naming the interface for which the set- tings are to be performed or displayed. Use ifconfig(8), or netstat(1) to see which interfaces are available. If no other parameter is given, spppcontrol will just list the current settings for ifname and exit. The reported settings include the cur- rent PPP phase the interface is in, which can be one of the names dead, establish, authenticate, network, or terminate. If an authentication protocol is configured for the interface, the name of the protocol to be used, as well as the system name to be used or expected will be dis- played, plus any possible options to the authentication protocol if applicable. Note that the authentication secrets (sometimes also called keys) are not being returned by the underlying system call, and are thus not displayed. If any additional parameter is supplied, superuser privileges are required, and the command works in the ``set'' mode. This is normally done quietly, unless the option -v is also enabled, which will cause a final printout of the settings as described above once all other actions have been taken. Use of this mode will be rejected if the interface is currently in any other phase than dead. Note that you can force an interface into dead phase by calling ifconfig(8) with the parameter down. The currently supported parameters include: authproto=protoname Set both, his and my authentication protocol to protoname. The protocol name can be one of ``chap'', ``pap'', or ``none''. In the latter case, the use of an authentication protocol will be turned off for the named interface. This has the side-effect of clearing the other authentication-related parameters for this interface as well (i.e., system name and authentication secret will be forgotten). myauthproto=protoname Same as above, but only for my end of the link. I.e., this is the protocol when remote is authenticator, and I am the peer required to authenticate. hisauthproto=protoname Same as above, but only for his end of the link. myauthname=name Set my system name for the authentication protocol. hisauthname=name Set his system name for the authentication protocol. For CHAP, this will only be used as a hint, causing a warning message if remote did supply a different name. For PAP, it is the name remote must use to authenticate himself (in connection with his secret). myauthsecret=secret Set my secret (key, password) for use in the authentication phase. For CHAP, this will be used to compute the response hash value, based on remote's challenge. For PAP, it will be transmitted as plain text together with the system name. Do not for- get to quote the secrets from the shell if they contain shell metacharacters (or white space). myauthkey=secret Same as above. hisauthsecret=secret Same as above, to be used if we are an authenticator and the remote peer needs to authenticate. hisauthkey=secret Same as above. callin Require remote to authenticate himself only when he is calling in, but not when we are caller. This is required for some peers that do not implement the authentication protocols symmetrically (like Ascend routers, for example). always The opposite of callin. Require remote to always authenticate, regardless of which side is placing the call. This is the default, and will not be explicitly displayed in the ``list'' mode. norechallenge Only meaningful with CHAP. Do not re-challenge peer once the initial CHAP handshake was successful. Used to work around bro- ken peer implementations that cannot grok being re-challenged once the connection is up. rechallenge With CHAP, send re-challenges at random intervals while the connection is in network phase. (The intervals are currently in the range of 300 through approximately 800 seconds.) This is the default, and will not be explicitly displayed in the ``list'' mode. lcp-timeout=timeout-value Allows to change the value of the LCP restart timer. Values are specified in milliseconds. The value must be between 10 and 20000 ms, defaulting to 3000 ms. enable-vj Enable negotiation of Van Jacobsen header compression. (Enabled by default.) disable-vj Disable negotiation of Van Jacobsen header compression. enable-ipv6 Enable negotiation of the IPv6 network control protocol. (Enabled by default if the kernel has IPv6 enabled.) disable-ipv6 Disable negotiation of the IPv6 network control protocol. Since every IPv4 interface in an IPv6-enabled kernel automatically gets an IPv6 address assigned, this option provides for a way to administratively prevent the link from attempting to negotiate IPv6. Note that initialization of an IPv6 interface causes a multicast packet to be sent, which can cause unwanted traffic costs (for dial-on-demand interfaces). EXAMPLES
# spppcontrol bppp0 bppp0: phase=dead myauthproto=chap myauthname="uriah" hisauthproto=chap hisauthname="ifb-gw" norechallenge lcp-timeout=3000 enable-vj enable-ipv6 Display the settings for bppp0. The interface is currently in dead phase, i.e., the LCP layer is down, and no traffic is possible. Both ends of the connection use the CHAP protocol, my end tells remote the system name ``uriah'', and remote is expected to authenticate by the name ``ifb-gw''. Once the initial CHAP handshake was successful, no further CHAP challenges will be transmitted. There are supposedly some known CHAP secrets for both ends of the link which are not being shown. # spppcontrol bppp0 authproto=chap myauthname=uriah myauthsecret='some secret' hisauthname=ifb-gw hisauthsecret='another' norechallenge A possible call to spppcontrol that could have been used to bring the interface into the state shown by the previous example. SEE ALSO
netstat(1), sppp(4), ifconfig(8) B. Lloyd and W. Simpson, PPP Authentication Protocols, RFC 1334. W. Simpson, Editor, The Point-to-Point Protocol (PPP), RFC 1661. W. Simpson, PPP Challenge Handshake Authentication Protocol (CHAP), RFC 1994. HISTORY
The spppcontrol utility appeared in FreeBSD 3.0. AUTHORS
The program was written by Jorg Wunsch, Dresden. BSD
December 30, 2001 BSD
All times are GMT -4. The time now is 06:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy