Hello, I've gotten palo alto vpn working great with radius_bridge and such for 2FA. I've also been working on getting some linux machines to use OpenOTP for 2FA as well and I noticed that you can pass the "client" name to the OpenOTP server which makes for very nice log entries. However I'm not sure how to make something like that work for the various radius clients:
This is from the radius_bridge vpn system, which works fine, but lacks some useful info:
2013-10-24 22:53:42 OpenOTP OpenOTP CN=User Name,CN=Users,DC... [NA] 162A1EEB Authentication success (LDAP & TOKEN)
2013-10-24 22:53:42 OpenOTP OpenOTP CN=User Name,CN=Users,DC... [NA] 162A1EEB New openotpChallenge request (domain\user)
This is from a linux machine running the openotp modules and such, which allows you to pass whatever client "name" you want in the pam.d config file (so you can actually identify each server that they logged into, and from what IP did started the connection attempt from).
2013-10-24 22:22:28 OpenOTP testserver-SSH CN=User Name,CN=Users,DC... 192.168.114.xxx E24EABFB Authentication success (LDAP & TOKEN)
2013-10-24 22:22:28 OpenOTP testserver-SSH CN=User Name,CN=Users,DC... 192.168.114.xxx E24EABFB New openotpSimpleLogin request (domain\user)
Two things: How can I get the radius_bridge to pass the custom Client Name instead of using "openOTP" and how can I get the original client IP passed through radius_bridge also to the WebSrv logs?