Thanks for the response Alan, and sorry.

802.1x authentication is working via PEAP/mschap v2 and ntlm_auth utilizing
Active Directory as a backend. I'm still having problems adding local
accounts into the mix.

I've read the comments from the radiusd.conf file and I guess I still don't
get it.

I've tried this and a few other things in the users file.
test Auth-Type = Local, Password = "testing"

With this set up radtest works See output:

houston:/etc/raddb # radtest test testing houston 43.191.112.164 SECRET
Sending Access-Request of id 207 to 43.191.104.39:1812
        User-Name = "test"
        User-Password = "testing"
        NAS-IP-Address = houston
        NAS-Port = 43
rad_recv: Access-Accept packet from host 43.191.104.39:1812, id=207,
length=20

Authentication against the AD backend works from my clients with mschap v2.
But my local users still don't work when sent through mschap.


Any help would be appreciated,
~Brandon




Here is debug output:

Waking up in 6 seconds...
rad_recv: Access-Request packet from host 43.191.112.162:2604, id=53,
length=161
        User-Name = "test"
        Cisco-AVPair = "ssid=sdb5-3"
        NAS-IP-Address = 43.191.112.162
        Called-Station-Id = "00409641c15f"
        Calling-Station-Id = "000d28d00217"
        NAS-Identifier = "AP350-41c15f"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0xc1b4f1f6a1eb428d51588b5a150afaf2
        NAS-Port-Type = Wireless-802.11
        Service-Type = Login-User
        EAP-Message = 0x020d00061900
        Message-Authenticator = 0xc75d85067706046c6b4cd5e9665f68eb
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 10
  modcall[authorize]: module "preprocess" returns ok for request 10
  modcall[authorize]: module "chap" returns noop for request 10
  modcall[authorize]: module "mschap" returns noop for request 10
    rlm_realm: No '@' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 10
    users: Matched test at 90
  modcall[authorize]: module "files" returns ok for request 10
    rlm_realm: No '\' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 10
  rlm_eap: EAP packet type response id 13 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 10
modcall: group authorize returns updated for request 10
  rad_check_password:  Found Auth-Type Local
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'test'
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 10
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3 
  eaptls_process returned 3 
  rlm_eap_peap: EAPTLS_SUCCESS
  modcall[authenticate]: module "eap" returns handled for request 10
modcall: group authenticate returns handled for request 10
Sending Access-Challenge of id 53 to 43.191.112.162:2604
        EAP-Message =
0x010e002019001703010015476ada932e352a8179b36b2660a5302ffc14de6212
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x04f23059be33b4ad387d1e4375c7fa73
Finished request 10
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 43.191.112.162:2605, id=54,
length=187
        User-Name = "test"
        Cisco-AVPair = "ssid=sdb5-3"
        NAS-IP-Address = 43.191.112.162
        Called-Station-Id = "00409641c15f"
        Calling-Station-Id = "000d28d00217"
        NAS-Identifier = "AP350-41c15f"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0x04f23059be33b4ad387d1e4375c7fa73
        NAS-Port-Type = Wireless-802.11
        Service-Type = Login-User
        EAP-Message =
0x020e00201900170301001541861b8157e8d5b41373cfcd48e7814f071adc6a5e
        Message-Authenticator = 0x9263ef3e7cd830fc464a1f6d14083894
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 11
  modcall[authorize]: module "preprocess" returns ok for request 11
  modcall[authorize]: module "chap" returns noop for request 11
  modcall[authorize]: module "mschap" returns noop for request 11
    rlm_realm: No '@' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 11
    users: Matched test at 90
  modcall[authorize]: module "files" returns ok for request 11
    rlm_realm: No '\' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 11
  rlm_eap: EAP packet type response id 14 length 32
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 11
modcall: group authorize returns updated for request 11
  rad_check_password:  Found Auth-Type Local
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'test'
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 11
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - test
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled identity of test
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to test
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 11
  modcall[authorize]: module "preprocess" returns ok for request 11
  modcall[authorize]: module "chap" returns noop for request 11
  modcall[authorize]: module "mschap" returns noop for request 11
    rlm_realm: No '@' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 11
    users: Matched test at 90
  modcall[authorize]: module "files" returns ok for request 11
    rlm_realm: No '\' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 11
  rlm_eap: EAP packet type response id 14 length 9
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 11
modcall: group authorize returns updated for request 11
  rad_check_password:  Found Auth-Type Local
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'test'
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 11
  rlm_eap: EAP Identity
  rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
  modcall[authenticate]: module "eap" returns handled for request 11
modcall: group authenticate returns handled for request 11
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 11
modcall: group authenticate returns handled for request 11
Sending Access-Challenge of id 54 to 43.191.112.162:2605
        EAP-Message =
0x010f00351900170301002ac6d26be585be81cf6f350157d85f304e25d6afb778d37204f409
39ae8408de921ebffc6f3e44ddc0ebd9
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xdb8a2cf83f7f4b1155dd53787c199cbb
Finished request 11
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 43.191.112.162:2606, id=55,
length=241
        User-Name = "test"
        Cisco-AVPair = "ssid=sdb5-3"
        NAS-IP-Address = 43.191.112.162
        Called-Station-Id = "00409641c15f"
        Calling-Station-Id = "000d28d00217"
        NAS-Identifier = "AP350-41c15f"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0xdb8a2cf83f7f4b1155dd53787c199cbb
        NAS-Port-Type = Wireless-802.11
        Service-Type = Login-User
        EAP-Message =
0x020f00561900170301004b46b31e9f3feb7d7a73d6dbbfc1561734cd59b746f20ed4265443
d0ea49c6ac5939fd342521be0cc9e40adb7b06620a13a83e25a25518d332413a57faa7126c35
edb458b9df9565e888263f
        Message-Authenticator = 0xa82dde033215bf05b67016366294340d
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 12
  modcall[authorize]: module "preprocess" returns ok for request 12
  modcall[authorize]: module "chap" returns noop for request 12
  modcall[authorize]: module "mschap" returns noop for request 12
    rlm_realm: No '@' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 12
    users: Matched test at 90
  modcall[authorize]: module "files" returns ok for request 12
    rlm_realm: No '\' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 12
  rlm_eap: EAP packet type response id 15 length 86
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 12
modcall: group authorize returns updated for request 12
  rad_check_password:  Found Auth-Type Local
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'test'
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 12
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Setting User-Name to test
  PEAP: Adding old state with af e4
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 12
  modcall[authorize]: module "preprocess" returns ok for request 12
  modcall[authorize]: module "chap" returns noop for request 12
  modcall[authorize]: module "mschap" returns noop for request 12
    rlm_realm: No '@' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 12
    users: Matched test at 90
  modcall[authorize]: module "files" returns ok for request 12
    rlm_realm: No '\' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 12
  rlm_eap: EAP packet type response id 15 length 63
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 12
modcall: group authorize returns updated for request 12
  rad_check_password:  Found Auth-Type Local
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'test'
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 12
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  Processing the authenticate section of radiusd.conf
modcall: entering group Auth-Type for request 12
  rlm_mschap: Told to do MS-CHAPv2 for test with NT-Password
radius_xlat: Running registered xlat function of module mschap for string
'Challenge'
 mschap2: f1
radius_xlat: Running registered xlat function of module mschap for string
'NT-Response'
radius_xlat:  '/usr/bin/ntlm_auth --request-nt-key --domain=AM
--username=test --challenge=4cd9c1a15948bb64
--nt-response=0f8afe37aac4a6d8c1f42aae8f2c4582f90e8f33e07877cd'
Exec-Program: /usr/bin/ntlm_auth --request-nt-key --domain=AM
--username=test --challenge=4cd9c1a15948bb64
--nt-response=0f8afe37aac4a6d8c1f42aae8f2c4582f90e8f33e07877cd
Exec-Program output: Account locked out (0xc0000234) 
Exec-Program-Wait: plaintext: Account locked out (0xc0000234) 
Exec-Program: returned: 1
  rlm_mschap: External script failed.
  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
  modcall[authenticate]: module "mschap" returns reject for request 12
modcall: group Auth-Type returns reject for request 12
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns reject for request 12
modcall: group authenticate returns reject for request 12
auth: Failed to validate the user.
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
  modcall[authenticate]: module "eap" returns handled for request 12
modcall: group authenticate returns handled for request 12
Sending Access-Challenge of id 55 to 43.191.112.162:2606
        EAP-Message =
0x011000261900170301001b97673c8147c0de7d96098d4712e29d1a1a08b322be8f575bebe8
e6
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x7141e2f3b74cad2180b9d2c7144056fb
Finished request 12
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 43.191.112.162:2607, id=56,
length=193
        User-Name = "test"
        Cisco-AVPair = "ssid=sdb5-3"
        NAS-IP-Address = 43.191.112.162
        Called-Station-Id = "00409641c15f"
        Calling-Station-Id = "000d28d00217"
        NAS-Identifier = "AP350-41c15f"
        NAS-Port = 41
        Framed-MTU = 1400
        State = 0x7141e2f3b74cad2180b9d2c7144056fb
        NAS-Port-Type = Wireless-802.11
        Service-Type = Login-User
        EAP-Message =
0x021000261900170301001b978acbddb8934460bc81621b9c0f8a47c441f00c33520adf657c
97
        Message-Authenticator = 0x3f00f080b19cbff1bc2cc8a8a8e2b5ea
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 13
  modcall[authorize]: module "preprocess" returns ok for request 13
  modcall[authorize]: module "chap" returns noop for request 13
  modcall[authorize]: module "mschap" returns noop for request 13
    rlm_realm: No '@' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 13
    users: Matched test at 90
  modcall[authorize]: module "files" returns ok for request 13
    rlm_realm: No '\' in User-Name = "test", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "ntdomain" returns noop for request 13
  rlm_eap: EAP packet type response id 16 length 38
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 13
modcall: group authorize returns updated for request 13
  rad_check_password:  Found Auth-Type Local
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'test'
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 13
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap:  Had sent TLV failure, rejecting.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 13
modcall: group authenticate returns invalid for request 13
auth: Failed to validate the user.
Delaying request 13 for 1 seconds
Finished request 13
Going to the next request
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 55 to 43.191.112.164:21657
        EAP-Message = 0x04020004
        Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 1 seconds..

 




-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Alan DeKok
Sent: Thursday, February 03, 2005 11:29 AM
To: [email protected]
Subject: Re: MSCHAP V2 local 

"DeYoung, Brandon" <[EMAIL PROTECTED]> wrote:
> I'm now trying to add a hand full of local accounts, for people/devices
who
> do not have AD accounts. I've tried adding things like this to the
> /etc/raddb/users file:
> 
>  test      Auth-Type := MS-CHAP, User-Password == "testing"

  And that will cause problems.

> I've tried a few different derivatives of this but so far couldn't get
> anything to work.

  First, see the FAQ about statements like "it doesn't work".

  Second, read radiusd.conf, the comments above the "authenticate" section.

  Alan DeKok.

- 
List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to