Hello Fabrice,
Thank for your reply.
Indeed, the problem seems to come from the assignment of the role in the
source of authentication.
When I test with eapol_test for the andenne\administrator account, it
doesn't work.
If I just test with administrator account it works.
FYI, there are no conditions defined in the authentication rules.
I feel like the problem is because the username variable contains the
domain\username.
Here is an excerpt from raddebug:
(346) Thu Feb 2 11:00:46 2023: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(346) Thu Feb 2 11:00:46 2023: Debug: Post-Auth-Type REJECT {
(346) Thu Feb 2 11:00:46 2023: Debug: update {
(346) Thu Feb 2 11:00:46 2023: Debug: } # update = noop
(346) Thu Feb 2 11:00:46 2023: Debug: if (! EAP-Type || (EAP-Type
!= TTLS && EAP-Type != PEAP) ) {
(346) Thu Feb 2 11:00:46 2023: Debug: if (! EAP-Type || (EAP-Type
!= TTLS && EAP-Type != PEAP) ) -> FALSE
(346) Thu Feb 2 11:00:46 2023: Debug: if
("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
(346) Thu Feb 2 11:00:46 2023: Debug: EXPAND
%{%{control:PacketFence-Proxied-From}:-False}
(346) Thu Feb 2 11:00:46 2023: Debug: --> False
(346) Thu Feb 2 11:00:46 2023: Debug: if
("%{%{control:PacketFence-Proxied-From}:-False}" == "True") -> FALSE
(346) Thu Feb 2 11:00:46 2023: Debug: attr_filter.access_reject: EXPAND
%{User-Name}
(346) Thu Feb 2 11:00:46 2023: Debug: attr_filter.access_reject: -->
andenne\\administrateur
(346) Thu Feb 2 11:00:46 2023: Debug: attr_filter.access_reject:
Matched entry DEFAULT at line 11
(346) Thu Feb 2 11:00:46 2023: Debug: [attr_filter.access_reject] = updated
(346) Thu Feb 2 11:00:46 2023: Debug:
attr_filter.packetfence_post_auth: EXPAND %{User-Name}
(346) Thu Feb 2 11:00:46 2023: Debug:
attr_filter.packetfence_post_auth: --> andenne\\administrateur
(346) Thu Feb 2 11:00:46 2023: Debug:
attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10
(346) Thu Feb 2 11:00:46 2023: Debug:
[attr_filter.packetfence_post_auth] = updated
(346) Thu Feb 2 11:00:46 2023: Debug: [eap] = noop
(346) Thu Feb 2 11:00:46 2023: Debug: policy
remove_reply_message_if_eap {
(346) Thu Feb 2 11:00:46 2023: Debug: if (&reply:EAP-Message &&
&reply:Reply-Message) {
(346) Thu Feb 2 11:00:46 2023: Debug: if (&reply:EAP-Message &&
&reply:Reply-Message) -> FALSE
(346) Thu Feb 2 11:00:46 2023: Debug: else {
(346) Thu Feb 2 11:00:46 2023: Debug: [noop] = noop
(346) Thu Feb 2 11:00:46 2023: Debug: } # else = noop
(346) Thu Feb 2 11:00:46 2023: Debug: } # policy
remove_reply_message_if_eap = noop
(346) Thu Feb 2 11:00:46 2023: Debug: linelog: EXPAND
messages.%{%{reply:Packet-Type}:-default}
(346) Thu Feb 2 11:00:46 2023: Debug: linelog: -->
messages.Access-Reject
(346) Thu Feb 2 11:00:46 2023: Debug: linelog: EXPAND
[mac:%{Calling-Station-Id}] Rejected user: %{User-Name}
(346) Thu Feb 2 11:00:46 2023: Debug: linelog: -->
[mac:02:00:00:00:00:01] Rejected user: andenne\administrateur
(346) Thu Feb 2 11:00:46 2023: Debug: linelog: EXPAND stdout
(346) Thu Feb 2 11:00:46 2023: Debug: linelog: --> stdout
(346) Thu Feb 2 11:00:46 2023: Debug: [linelog] = ok
(346) Thu Feb 2 11:00:46 2023: Debug: } # Post-Auth-Type REJECT = updated
(346) Thu Feb 2 11:00:46 2023: Debug: Delaying response for 1.000000
seconds
(346) Thu Feb 2 11:00:47 2023: Debug: Sending delayed response
(346) Thu Feb 2 11:00:47 2023: Debug: Sent Access-Reject Id 9 from
127.0.0.1:1812 to 127.0.0.1:58643 length 44
Thank for your help, best regards,
Didier.
***Didi**er Wa**lraet*
*Gestionnaire informatique*
CPAS Ville d'Andenne
GSM: 0475 800 796
didier.walr...@cpas-andenne.be
Le 01-02-23 à 17:19, Fabrice Durand a écrit :
Hello Didier,
Rejected in post-auth means that it has been rejected by the logic in
PacketFence.
Verify in the packetfence.log file to see what happens exactly when
the device connects.
Regards
Fabrice
Le mer. 1 févr. 2023 à 07:24, Didier Walraet via PacketFence-users
<packetfence-users@lists.sourceforge.net> a écrit :
Hi everybody,
We have a problem with authentication from Windows sessions.
When I check with pftest it works :
Authenticating against 'dcandenne' in context 'admin'
Authentication SUCCEEDED against dcandenne (Authentication
successful.)
Matched against dcandenne for 'authentication' rule catchall
set_role : default
set_access_duration : 1D
Did not match against dcandenne for 'administration' rules
Authenticating against 'dcandenne' in context 'portal'
Authentication SUCCEEDED against dcandenne (Authentication
successful.)
Matched against dcandenne for 'authentication' rule catchall
set_role : default
set_access_duration : 1D
When I test with eapol_test it works :
EAPOL: SUPP_BE entering state RECEIVE
Received 184 bytes from RADIUS server
Received RADIUS message
RADIUS message: code=2 (Access-Accept) identifier=9 length=184
Attribute 1 (User-Name) length=24
Value: 'andenne\\administrateur'
Attribute 26 (Vendor-Specific) length=58
Value:
000001371134c13273280210014b8952df27af1d66ef0394150828ddd278c2f3d80b7dd3b9b73d86f83a263ac27392fa5212d77f55bb4b58
Attribute 26 (Vendor-Specific) length=58
Value:
000001371034cf04b7c73dd8aae9b040a0061f528848602d0fadc4ca1fc08fec82bec34b09131f81621125e838d23812afec44aa01c6ac66
Attribute 79 (EAP-Message) length=6
Value: 038c0004
Attribute 80 (Message-Authenticator) length=18
Value: 5b9fb6bccfe5dd977dd2dcf5039787f3
STA 02:00:00:00:00:01: Received RADIUS packet matched with a
pending request, round trip time 0.00 sec
RADIUS packet matching with station
MS-MPPE-Send-Key (sign) - hexdump(len=32): f8 f2 d3 fb 41 8e 70 62
33 4f e4 b4 86 f0 82 6a 02 dc b7 e2 70 52 8f bb 1d b9 6c 63 07 6d
d8 05
MS-MPPE-Recv-Key (crypt) - hexdump(len=32): de 31 38 73 0f 11 42
a6 1a c9 92 c8 be a8 10 14 62 b6 26 dc 8d 85 5c 63 7a fd 41 6b a8
09 6c cb
decapsulated EAP packet (code=3 id=140 len=4) from RADIUS server:
EAP Success
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: Status notification: completion (param=success)
EAP: EAP entering state SUCCESS
CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames
required
WPA: EAPOL processing complete
Cancelling authentication timeout
State: DISCONNECTED -> COMPLETED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
eapol_sm_cb: result=1
EAPOL: Successfully fetched key (len=32)
PMK from EAPOL - hexdump(len=32): de 31 38 73 0f 11 42 a6 1a c9 92
c8 be a8 10 14 62 b6 26 dc 8d 85 5c 63 7a fd 41 6b a8 09 6c cb
No EAP-Key-Name received from server
WPA: Clear old PMK and PTK
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
MPPE keys OK: 1 mismatch: 0
SUCCESS
But when I try authentication from Windows, before opening of the
user session, with user credentials domain\username, it doesn't work :
Feb 1 09:00:11 packetfence auth[9916]: (3332) Rejected in
post-auth: [ANDENNE\Administrateur] (from client 10.185.2.154/32
<http://10.185.2.154/32> port 1 cli 04:7b:cb:43:d9:37 via TLS tunnel)
Feb 1 09:00:11 packetfence auth[9916]: (3332) Login incorrect:
[ANDENNE\Administrateur] (from client 10.185.2.154/32
<http://10.185.2.154/32> port 1 cli 04:7b:cb:43:d9:37 via TLS tunnel)
Feb 1 09:00:11 packetfence auth[9916]: (3333) Login incorrect
(eap_peap: The users session was previously rejected: returning
reject (again.)): [ANDENNE\Administrateur] (from client
10.185.2.154/32 <http://10.185.2.154/32> port 1 cli 04:7b:cb:43:d9:37)
Feb 1 09:00:21 packetfence auth[9916]: (3343) Rejected in
post-auth: [ANDENNE\Administrateur] (from client 10.185.2.154/32
<http://10.185.2.154/32> port 1 cli 04:7b:cb:43:d9:37 via TLS tunnel)
Feb 1 09:00:21 packetfence auth[9916]: (3343) Login incorrect:
[ANDENNE\Administrateur] (from client 10.185.2.154/32
<http://10.185.2.154/32> port 1 cli 04:7b:cb:43:d9:37 via TLS tunnel)
When I test with same username on Linux system it works :
Feb 1 08:52:55 packetfence auth[9916]: (3293) Login OK:
[administrateur] (from client 10.185.2.154/32
<http://10.185.2.154/32> port 1 cli 04:0e:3c:f0:ed:5c via TLS tunnel)
Feb 1 08:52:55 packetfence auth[9916]: (3294) Login OK:
[administrateur] (from client 10.185.2.154/32
<http://10.185.2.154/32> port 1 cli 04:0e:3c:f0:ed:5c)
Feb 1 09:00:10 packetfence auth[9916]: Adding client
10.185.2.154/32 <http://10.185.2.154/32>
Can anyone help me ?
Best regards,
Didier.
--
***Didi**er Wa**lraet*
*Gestionnaire informatique*
CPAS Ville d'Andenne
GSM: 0475 800 796
didier.walr...@cpas-andenne.be
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users