> Here's a dump of the radius -X output. Any ideas? For some reason, your request does not seem to be caught and processed by the mschap module.
Can you check your FR config for mschap? You should have an mschap module. Also check your packetfence-tunnel file in /usr/local/pf/raddb and make sure you have an entry for mschap in the authenticate section. It is the first step in the PF Admin Config guide for AD integration. You should have some lines in you debug that begin with [MSCHAP], as it is now I don't see any. That is probably why your auth request is not working. I say probably because you may have another issue to tackle after this. But mschap IS the module that talks to AD, if that module does not get accessed AD auth will not work. Jake Sallee Godfather of Bandwidth System Engineer University of Mary Hardin-Baylor 900 College St. Belton, Texas 76513 Fone: 254-295-4658 Phax: 254-295-4221 ________________________________________ From: Thomas Tsai [[email protected]] Sent: Tuesday, November 05, 2013 11:25 AM To: [email protected] Subject: Re: [PacketFence-users] PF 4.0.6 - wired 802.1x authentication failed Jake, see below: Here's a dump of the radius -X output. Any ideas? rad_recv: Access-Request packet from host 10.10.1.115 port 1645, id=93, length=170 User-Name = "DOMAIN\\USERNAME" Service-Type = Framed-User Framed-MTU = 1500 Called-Station-Id = "50-3D-E5-0F-EF-B0" Calling-Station-Id = "B4-99-BA-EA-DF-3D" EAP-Message = 0x020100150143414e594f4e5c6a7573657231373436 Message-Authenticator = 0xae761de749c1a55e1b4d05dded1d534f NAS-Port-Type = Ethernet NAS-Port = 50048 NAS-Port-Id = "GigabitEthernet0/48" NAS-IP-Address = 10.10.1.115 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] No '@' in User-Name = "DOMAIN\USERNAME", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop ++[preprocess] returns ok [eap] EAP packet type response id 1 length 21 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated ++[files] returns noop ++[expiration] returns noop ++[logintime] returns noop rlm_perl: Added pair NAS-Port-Type = Ethernet rlm_perl: Added pair Service-Type = Framed-User rlm_perl: Added pair Calling-Station-Id = B4-99-BA-EA-DF-3D rlm_perl: Added pair Called-Station-Id = 50-3D-E5-0F-EF-B0 rlm_perl: Added pair Message-Authenticator = 0xae761de749c1a55e1b4d05dded1d534f rlm_perl: Added pair User-Name = DOMAIN\\USERNAME rlm_perl: Added pair EAP-Message = 0x020100150143414e594f4e5c6a7573657231373436 rlm_perl: Added pair EAP-Type = Identity rlm_perl: Added pair NAS-IP-Address = 10.10.1.115 rlm_perl: Added pair NAS-Port = 50048 rlm_perl: Added pair NAS-Port-Id = GigabitEthernet0/48 rlm_perl: Added pair Framed-MTU = 1500 rlm_perl: Added pair Auth-Type = EAP ++[packetfence] returns noop Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] EAP Identity [eap] processing type tls [tls] Initiate [tls] Start returned 1 ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 93 to 10.10.1.115 port 1645 EAP-Message = 0x010200061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xf2a98a36f2ab9394046cddc7cec88b34 Finished request 46. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 10.10.1.115 port 1645, id=94, length=272 User-Name = "DOMAIN\\USERNAME" Service-Type = Framed-User Framed-MTU = 1500 Called-Station-Id = "50-3D-E5-0F-EF-B0" Calling-Station-Id = "B4-99-BA-EA-DF-3D" EAP-Message = 0x0202006919800000005f160301005a0100005603015274598d844ec695ca63a859f4bd1aedfe509ed07656d34cc45857068e02da92000018002f00350005000ac013c014c009c00a003200380013000401000015ff01000100000a0006000400170018000b00020100 Message-Authenticator = 0x05d7dbb67cf4f2d0e39f04809af67d5f NAS-Port-Type = Ethernet NAS-Port = 50048 NAS-Port-Id = "GigabitEthernet0/48" State = 0xf2a98a36f2ab9394046cddc7cec88b34 NAS-IP-Address = 10.10.1.115 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] No '@' in User-Name = "DOMAIN\USERNAME", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop ++[preprocess] returns ok [eap] EAP packet type response id 2 length 105 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS TLS Length 95 [peap] Length Included [peap] eaptls_verify returned 11 [peap] (other): before/accept initialization [peap] TLS_accept: before/accept initialization [peap] <<< TLS 1.0 Handshake [length 005a], ClientHello [peap] TLS_accept: SSLv3 read client hello A [peap] >>> TLS 1.0 Handshake [length 0031], ServerHello [peap] TLS_accept: SSLv3 write server hello A [peap] >>> TLS 1.0 Handshake [length 049b], Certificate [peap] TLS_accept: SSLv3 write certificate A [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone [peap] TLS_accept: SSLv3 write server done A [peap] TLS_accept: SSLv3 flush data [peap] TLS_accept: Need to read more data: SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 94 to 10.10.1.115 port 1645 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0x9e1acdc8b0b6ff82075c7d72 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xf2a98a36f3aa9394046cddc7cec88b34 Finished request 47. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 10.10.1.115 port 1645, id=95, length=173 User-Name = "DOMAIN\\USERNAME" Service-Type = Framed-User Framed-MTU = 1500 Called-Station-Id = "50-3D-E5-0F-EF-B0" Calling-Station-Id = "B4-99-BA-EA-DF-3D" EAP-Message = 0x020300061900 Message-Authenticator = 0xfb0cf43f5ca90a44898b6ca744a8fbb2 NAS-Port-Type = Ethernet NAS-Port = 50048 NAS-Port-Id = "GigabitEthernet0/48" State = 0xf2a98a36f3aa9394046cddc7cec88b34 NAS-IP-Address = 10.10.1.115 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] No '@' in User-Name = "DOMAIN\USERNAME", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop ++[preprocess] returns ok [eap] EAP packet type response id 3 length 6 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] Received TLS ACK [peap] ACK handshake fragment handler [peap] eaptls_verify returned 1 [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 95 to 10.10.1.115 port 1645 EAP-Message = 0x010400ef19007478de62644b56fbb9e13e4924dcd1dfccef0d269562d5527172f22f088441182a8281e50ee6795d00e97f415465aa99a28d72a3acd047a5c248b96894d4aee7b5918da276ad88b5858853503e1b67f582f3b1a84c465eadfcb89ca3e2f442f585415901532fa9aa113084f308be1e8dd6ba3d920104622f99460c6b03994eb25cad48b9816a1632ba401e8e48d3f24c245d80d61c005382a3eb07f861525b55a4fe6897cc7b50742f147ec2c264f56df405e5df427e6bc2845044ea23363132679b3e5e1cf58c04b1748acfbf31394fc8a4b8f8d6645bdcbad08b0a7dc0b9ee16030100040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xf2a98a36f0ad9394046cddc7cec88b34 Finished request 48. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 10.10.1.115 port 1645, id=96, length=505 User-Name = "DOMAIN\\USERNAME" Service-Type = Framed-User Framed-MTU = 1500 Called-Station-Id = "50-3D-E5-0F-EF-B0" Calling-Station-Id = "B4-99-BA-EA-DF-3D" EAP-Message = 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 EAP-Message = 0x77ab76550694a52d50003ede6c511157c4e21e8163c86cf314030100010116030100303a5ee6ba796c0dd31709cc34b11ad709dfc05be7fa039e0eb346bec5bae1c255fd134a1383de604a89b62636d6bbc23c Message-Authenticator = 0x8a26e4ab679106ca7d6b9335fd892395 NAS-Port-Type = Ethernet NAS-Port = 50048 NAS-Port-Id = "GigabitEthernet0/48" State = 0xf2a98a36f0ad9394046cddc7cec88b34 NAS-IP-Address = 10.10.1.115 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] No '@' in User-Name = "DOMAIN\USERNAME", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop ++[preprocess] returns ok [eap] EAP packet type response id 4 length 253 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS TLS Length 326 [peap] Length Included [peap] eaptls_verify returned 11 [peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange [peap] TLS_accept: SSLv3 read client key exchange A [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001] [peap] <<< TLS 1.0 Handshake [length 0010], Finished [peap] TLS_accept: SSLv3 read finished A [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001] [peap] TLS_accept: SSLv3 write change cipher spec A [peap] >>> TLS 1.0 Handshake [length 0010], Finished [peap] TLS_accept: SSLv3 write finished A [peap] TLS_accept: SSLv3 flush data [peap] (other): SSL negotiation finished successfully SSL Connection Established [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 96 to 10.10.1.115 port 1645 EAP-Message = 0x0105004119001403010001011603010030480647625e74ac6f1f89f0c893847071099af84452637b40db643cf2d279322a8512dd85a721a3e2515a957e056430e7 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xf2a98a36f1ac9394046cddc7cec88b34 Finished request 49. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 10.10.1.115 port 1645, id=97, length=173 User-Name = "DOMAIN\\USERNAME" Service-Type = Framed-User Framed-MTU = 1500 Called-Station-Id = "50-3D-E5-0F-EF-B0" Calling-Station-Id = "B4-99-BA-EA-DF-3D" EAP-Message = 0x020500061900 Message-Authenticator = 0x645e8d772c5fc84bf5aacaad66a91a4c NAS-Port-Type = Ethernet NAS-Port = 50048 NAS-Port-Id = "GigabitEthernet0/48" State = 0xf2a98a36f1ac9394046cddc7cec88b34 NAS-IP-Address = 10.10.1.115 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] No '@' in User-Name = "DOMAIN\USERNAME", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop ++[preprocess] returns ok [eap] EAP packet type response id 5 length 6 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] Received TLS ACK [peap] ACK handshake is finished [peap] eaptls_verify returned 3 [peap] eaptls_process returned 3 [peap] EAPTLS_SUCCESS [peap] Session established. Decoding tunneled attributes. [peap] Peap state TUNNEL ESTABLISHED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 97 to 10.10.1.115 port 1645 EAP-Message = 0x0106002b19001703010020be40ea759bceb63342ef620237e0585126b5fba7450c30d6a0a33164faf44aeb Message-Authenticator = 0x00000000000000000000000000000000 State = 0xf2a98a36f6af9394046cddc7cec88b34 Finished request 50. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 10.10.1.115 port 1645, id=98, length=226 User-Name = "DOMAIN\\USERNAME" Service-Type = Framed-User Framed-MTU = 1500 Called-Station-Id = "50-3D-E5-0F-EF-B0" Calling-Station-Id = "B4-99-BA-EA-DF-3D" EAP-Message = 0x0206003b19001703010030804b7f8c93ea32931eb0a69921bea546567f5be7bd79b9f429b5c455e87e7e3d74afb1ae52205a216dd323fdef4e9558 Message-Authenticator = 0xe6339d171a3e1ef02a218ee95f329ebf NAS-Port-Type = Ethernet NAS-Port = 50048 NAS-Port-Id = "GigabitEthernet0/48" State = 0xf2a98a36f6af9394046cddc7cec88b34 NAS-IP-Address = 10.10.1.115 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] No '@' in User-Name = "DOMAIN\USERNAME", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop ++[preprocess] returns ok [eap] EAP packet type response id 6 length 59 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state WAITING FOR INNER IDENTITY [peap] Identity - DOMAIN\USERNAME [peap] Got inner identity 'DOMAIN\USERNAME' [peap] Setting default EAP type for tunneled EAP session. [peap] Got tunneled request EAP-Message = 0x020600150143414e594f4e5c6a7573657231373436 server packetfence { [peap] Setting User-Name to DOMAIN\USERNAME Sending tunneled request EAP-Message = 0x020600150143414e594f4e5c6a7573657231373436 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "DOMAIN\\USERNAME" Service-Type = Framed-User Framed-MTU = 1500 Called-Station-Id = "50-3D-E5-0F-EF-B0" Calling-Station-Id = "B4-99-BA-EA-DF-3D" NAS-Port-Type = Ethernet NAS-Port = 50048 NAS-Port-Id = "GigabitEthernet0/48" NAS-IP-Address = 10.10.1.115 server packetfence-tunnel { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authorize {...} [suffix] No '@' in User-Name = "DOMAIN\USERNAME", looking up realm NULL [suffix] No such realm "NULL" ++[suffix] returns noop [ntdomain] Looking up realm "DOMAIN" for User-Name = "DOMAIN\USERNAME" [ntdomain] No such realm "DOMAIN" ++[ntdomain] returns noop [eap] EAP packet type response id 6 length 21 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated ++[files] returns noop ++[expiration] returns noop ++[logintime] returns noop Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authenticate {...} [eap] EAP Identity [eap] processing type mschapv2 rlm_eap_mschapv2: Issuing Challenge ++[eap] returns handled } # server packetfence-tunnel [peap] Got tunneled reply code 11 EAP-Message = 0x0107002a1a01070025107736675c549aad626fc16fdec6846cde43414e594f4e5c6a7573657231373436 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x47e8768047ef6cc41bd42c0e5212d6bf [peap] Got tunneled reply RADIUS code 11 EAP-Message = 0x0107002a1a01070025107736675c549aad626fc16fdec6846cde43414e594f4e5c6a7573657231373436 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x47e8768047ef6cc41bd42c0e5212d6bf [peap] Got tunneled Access-Challenge ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 98 to 10.10.1.115 port 1645 EAP-Message = 0x0107004b1900170301004018bbdbc9fc3683406a120b5fa612b9d56a2cca7d18f3a4cc337217a0c7d31dc1c2d9ca06551938ef04231c07995d1407ceb1c425887551eac349a68a61051682 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xf2a98a36f7ae9394046cddc7cec88b34 Finished request 51. Going to the next request Waking up in 4.9 seconds. -----Original Message----- From: Sallee, Stephen (Jake) [mailto:[email protected]] Sent: Monday, October 28, 2013 6:46 AM To: [email protected] Subject: Re: [PacketFence-users] PF 4.0.6 - wired 802.1x authentication failed > Question is, I do not know how I would go about configuring authentication > against an AD source for this... Would this be under > /usr/local/pf/conf/authentication/ldap.pm? Did you follow the instructions for AD auth on the admin guide? Also, if you already did that could you post the full debug of your radiusd -X session? You can sanitize it if you want but we need to see the whole session so we can help you find the exact issue. Don't worry about how LONG the email will be with the full session output, we are used to it. Jake Sallee Godfather of Bandwidth System Engineer University of Mary Hardin-Baylor 900 College St. Belton, Texas 76513 Fone: 254-295-4658 Phax: 254-295-4221 ________________________________ From: Thomas Tsai [[email protected]] Sent: Friday, October 25, 2013 8:15 PM To: <[email protected]> Subject: [PacketFence-users] PF 4.0.6 - wired 802.1x authentication failed Using PF 4.0.6, im trying to set up a basic 802.1x authentication using a cisco switch, and a windows 7 client. I believe that the issue is that I do not have a method of validating the windows credentials that packetfence has, and hence why I receive the "Failed to authenticate the user" message below in the radius -X output on the PF server. Question is, I do not know how I would go about configuring authentication against an AD source for this... Would this be under /usr/local/pf/conf/authentication/ldap.pm? [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state send tlv failure [peap] Received EAP-TLV response. [peap] The users session was previously rejected: returning reject (again.) [peap] *** This means you need to read the PREVIOUS messages in the debug output [peap] *** to find out the reason why the user was rejected. [peap] *** Look for "reject" or "fail". Those earlier messages will tell you. [peap] *** what went wrong, and how to fix the problem. [eap] Handler failed in EAP/peap [eap] Failed in EAP select ++[eap] returns invalid Failed to authenticate the user. Login incorrect: [domain\\user] (from client 10.0.0.115 port 50048 cli B4-99-BA-XX-XX-XX) } # server packetfence ------------------------------------------------------------------------------ October Webinars: Code for Performance Free Intel webinars can help you accelerate application performance. Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from the latest Intel processors and coprocessors. See abstracts and register > http://pubads.g.doubleclick.net/gampad/clk?id=60135991&iu=/4140/ostg.clktrk _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users ********************************************** Email Disclaimer: This email, including attachments, may contain proprietary, confidential or privileged information. If you are not the intended recipient, please (i) do not use, disclose, save or retransmit this message or any attachments, (ii) alert the sender by reply email and (iii) destroy or delete this message and any attachments. Delivery of this email to a person other than the intended recipient(s) shall not constitute a waiver of privilege or confidentiality. CP Investments, member FINRA and SIPC, serves as placement agent for investment products advised by Canyon Capital Advisors LLC. This email is not intended to be an offer to sell or a solicitation of an offer to buy any security in any jurisdiction. We review and retain electronic communications traveling through our network. ********************************************** ------------------------------------------------------------------------------ November Webinars for C, C++, Fortran Developers Accelerate application performance with scalable programming models. Explore techniques for threading, error checking, porting, and tuning. Get the most from the latest Intel processors and coprocessors. See abstracts and register http://pubads.g.doubleclick.net/gampad/clk?id=60136231&iu=/4140/ostg.clktrk _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users ------------------------------------------------------------------------------ November Webinars for C, C++, Fortran Developers Accelerate application performance with scalable programming models. Explore techniques for threading, error checking, porting, and tuning. Get the most from the latest Intel processors and coprocessors. See abstracts and register http://pubads.g.doubleclick.net/gampad/clk?id=60136231&iu=/4140/ostg.clktrk _______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
