Hello Irvan,

It looks pretty normal that the windows sends the computer account because it’s 
the default behavior.

What is not normal, is that if you have at least one successful authentication 
on the wifi with a username password, it should keep that one and not re-ask 
again.

All that can be configured on the SSID profile on windows.

Thanks,


Ludovic Zammit
Product Support Engineer Principal Lead

Cell: +1.613.670.8432
Akamai Technologies - Inverse
145 Broadway
Cambridge, MA 02142
Connect with Us:         <https://community.akamai.com/>  
<http://blogs.akamai.com/>  <https://twitter.com/akamai>  
<http://www.facebook.com/AkamaiTechnologies>  
<http://www.linkedin.com/company/akamai-technologies>  
<http://www.youtube.com/user/akamaitechnologies?feature=results_main>

> On Nov 2, 2022, at 1:45 AM, Irvan via PacketFence-users 
> <packetfence-users@lists.sourceforge.net> wrote:
> 
> Hello Everyone,
> 
> 
> We have strange behaviour with Windows Client connecting to dot1x WiFi on 
> Packetfence using AD Authentication source.
> 
> The symptoms are :
> 
> - When the first time Windows client connect to SSID, it was asked for 
> username and password for login.
> - But if client forget the SSID and try to reconnect, Windows never asked 
> username and password, it was automatically send hostname as login to 
> packetfence, and accepted by packetfence.
> - The same thing happened when user comeback in the next day, Windows send 
> hostname as login instead of username and it also accepted by packetfence
> 
> We don't setup any machine auth, only user auth. Drill down to radius log, we 
> saw that hostname login hit a non-existe realm. Using username and password 
> client hit null realm. But when windows send hostname it hit binus.local 
> realm, which is never exist.
> 
> Bellow are radius log and realm.conf
> 
> 1. Using user auth
> ===============
> Request Time
> 0
> 
> RADIUS Request
> User-Name = "loudy.owen"
> NAS-IP-Address = 10.21.36.41
> NAS-Port = 4
> Service-Type = Framed-User
> State = 0x6067228e61c0382594e9daec37da5a60
> Called-Station-Id = "90:3a:72:03:18:90:BinusWifi-Staff.1x"
> Calling-Station-Id = "70:66:55:34:28:f3"
> NAS-Identifier = "90-3A-72-03-18-90"
> NAS-Port-Type = Wireless-802.11
> Acct-Session-Id = "6361F1F4-03189001"
> Acct-Multi-Session-Id = "88DA8FBC70CEC821"
> Event-Timestamp = "Nov  2 2022 11:28:41 WIB"
> Connect-Info = "CONNECT 802.11"
> EAP-Message = 0x02a700061a03
> Chargeable-User-Identity = 0x00
> Location-Data = 0x31304944170d42696e7573205379616864616e
> WLAN-Pairwise-Cipher = 1027076
> WLAN-Group-Cipher = 1027076
> WLAN-AKM-Suite = 1027073
> FreeRADIUS-Proxied-To = 127.0.0.1
> Ruckus-SSID = "BinusWifi-Staff.1x"
> Ruckus-Wlan-Id = 508
> Ruckus-Location = "Binus Syahdan"
> Ruckus-SCG-CBlade-IP = 180933220
> Ruckus-VLAN-ID = 1220
> Ruckus-BSSID = 0x903a7243189d
> Ruckus-Zone-Name = "AP-Zone-Syahdan"
> Ruckus-Wlan-Name = "VlanPool2"
> EAP-Type = MSCHAPv2
> Stripped-User-Name = "loudy.owen"
> Realm = "null"
> Called-Station-SSID = "BinusWifi-Staff.1x"
> PacketFence-Domain = "binus"
> PacketFence-KeyBalanced = "10a6d36fd6ec338584a72fcbe75f86ba"
> PacketFence-Radius-Ip = "10.200.210.87"
> PacketFence-NTLMv2-Only = ""
> PacketFence-Outer-User = "loudy.owen"
> Attr-26.25053.155 = 0x5379616864616e2043616d707573
> User-Password = "******"
> SQL-User-Name = "loudy.owen"
> 
> RADIUS Reply
> EAP-Message = 0x03a70004
> Message-Authenticator = 0x00000000000000000000000000000000
> User-Name = "loudy.owen"
> REST-HTTP-Status-Code = 200
> 
> ==============================================
> 
> 2. Using hostname
> ===============
> Request Time
> 0
> 
> RADIUS Request
> User-Name = "host/NB202007000166.binus.local"
> NAS-IP-Address = 10.21.36.41
> NAS-Port = 4
> Service-Type = Framed-User
> State = 0xb4483109b5402b5768b5cf1f24ad1e9e
> Called-Station-Id = "90:3a:72:03:18:90:BinusWifi-Staff.1x"
> Calling-Station-Id = "70:66:55:34:28:f3"
> NAS-Identifier = "90-3A-72-03-18-90"
> NAS-Port-Type = Wireless-802.11
> Acct-Session-Id = "6361F350-03189001"
> Acct-Multi-Session-Id = "3DD47C3ED408529E"
> Event-Timestamp = "Nov  2 2022 11:34:26 WIB"
> Connect-Info = "CONNECT 802.11"
> EAP-Message = 0x020800061a03
> Chargeable-User-Identity = 0x00
> Location-Data = 0x31304944170d42696e7573205379616864616e
> WLAN-Pairwise-Cipher = 1027076
> WLAN-Group-Cipher = 1027076
> WLAN-AKM-Suite = 1027073
> FreeRADIUS-Proxied-To = 127.0.0.1
> Ruckus-SSID = "BinusWifi-Staff.1x"
> Ruckus-Wlan-Id = 508
> Ruckus-Location = "Binus Syahdan"
> Ruckus-SCG-CBlade-IP = 180933220
> Ruckus-VLAN-ID = 1220
> Ruckus-BSSID = 0x903a7243189d
> Ruckus-Zone-Name = "AP-Zone-Syahdan"
> Ruckus-Wlan-Name = "VlanPool2"
> EAP-Type = MSCHAPv2
> Realm = "binus.local"
> Called-Station-SSID = "BinusWifi-Staff.1x"
> PacketFence-Domain = "binus"
> PacketFence-KeyBalanced = "e080ae33e5dd7f64d0155f1a8dc95245"
> PacketFence-Radius-Ip = "10.200.210.87"
> PacketFence-NTLMv2-Only = ""
> PacketFence-Outer-User = "host/NB202007000166.binus.local"
> Attr-26.25053.155 = 0x5379616864616e2043616d707573
> User-Password = "******"
> SQL-User-Name = "host/NB202007000166.binus.local"
> 
> RADIUS Reply
> MS-MPPE-Encryption-Policy = Encryption-Required
> MS-MPPE-Encryption-Types = 4
> MS-MPPE-Send-Key = 0xb45a79e25b9f5bda45259afc13d0dc5c
> MS-MPPE-Recv-Key = 0xe52d30f3e2977a2c1219c4200bc44678
> EAP-Message = 0x03080004
> Message-Authenticator = 0x00000000000000000000000000000000
> User-Name = "host/NB202007000166.binus.local"
> REST-HTTP-Status-Code = 200
> 
> 
> 3. realm.conf
> ==========
> # Copyright (C) Inverse inc.
> [1 DEFAULT]
> radius_auth_compute_in_pf=enabled
> radius_acct=
> eduroam_radius_auth=
> radius_auth=
> eduroam_radius_acct=
> radius_auth_proxy_type=keyed-balance
> eduroam_radius_acct_proxy_type=load-balance
> eduroam_radius_auth_proxy_type=keyed-balance
> permit_custom_attributes=disabled
> radius_acct_proxy_type=load-balance
> eduroam_radius_auth_compute_in_pf=enabled
> domain=binus
> 
> [1 LOCAL]
> eduroam_radius_acct=
> radius_auth=
> radius_acct=
> eduroam_radius_acct_proxy_type=load-balance
> radius_acct_proxy_type=load-balance
> eduroam_radius_auth=
> radius_auth_compute_in_pf=enabled
> radius_auth_proxy_type=keyed-balance
> permit_custom_attributes=disabled
> eduroam_radius_auth_compute_in_pf=enabled
> eduroam_radius_auth_proxy_type=keyed-balance
> 
> [1 NULL]
> radius_auth_compute_in_pf=enabled
> radius_acct=
> radius_auth=
> eduroam_radius_auth=
> eduroam_radius_auth_proxy_type=keyed-balance
> eduroam_radius_acct=
> radius_auth_proxy_type=keyed-balance
> eduroam_radius_acct_proxy_type=load-balance
> permit_custom_attributes=disabled
> radius_acct_proxy_type=load-balance
> eduroam_radius_auth_compute_in_pf=enabled
> domain=binus
> 
> =============================
> 
> How could this happened? Any advice?
> 
> 
> Thanks in advance
> 
> 
> Regards,
> Irvan
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!SFNRQV2PR8ry-00A8fXYEKuTzZqZg4CQPmHkOABxoBZ8BUuBihHqubUhd6DemK1cAhf2LKJJakTGi6H5RFEO2J7YKZ2Qp9SUd0HP4Q$
>  

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to