Hi Stephen,
It would be more interesting to compare user authenticated ntlm_auth from the
command line versus Radius ntlm_auth for the same user.
What FreeRadius is nothing fancier than forking an ntlm_auth process and
passing it the arguments you defined in raddb/modules/mschap.
It checks the return code and then considers 0 to mean success and anything
else to be failure.
Try this and see if it helps:
Replace this line in your mschap configuration
> ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key
> --username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}
> --challenge=%{mschap:Challenge:-00} --ntresponse=%{mschap:NT-Response:-00}"
With this:
ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --username=%{mschap:User-Name}
--challenge=%{%{mschap:Challenge}:-00}
--nt-response=%{%{mschap:NT-Response}:-00}"
See how it goes and post the output of radiusd -d raddb -X.
Regards,
--
Louis Munro
[email protected] :: www.inverse.ca
+1.514.447.4918 *125 :: +1 (866) 353-6153
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
On 2014-08-13, at 14:31 , "Stormont, Stephen (IMS)" <[email protected]>
wrote:
> Yes, the users and computers are all in the same domain (as
> with the servers). I did attempt to stick the laptop in an OU that has
> policy inheritance blocked.
>
> Ntlm as user succeeds:
> -bash-4.1$ ntlm_auth --username=stormont
> password:
> NT_STATUS_OK: Success (0x0)
> -bash-4.1$ ntlm_auth --username=zzhoppy
> password:
> NT_STATUS_OK: Success (0x0)
> -bash-4.1$
>
> And from log.winbindd (during interactive user authentication
> listed above)
> [2014/08/13 12:48:11.379309, 3]
> winbindd/winbindd_misc.c:384(winbindd_interface_version)
> [38847]: request interface version
> [2014/08/13 12:48:11.379440, 3]
> winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
> [38847]: request location of privileged pipe
> [2014/08/13 12:48:11.379608, 3]
> winbindd/winbindd_misc.c:394(winbindd_domain_name)
> [38847]: request domain name
> [2014/08/13 12:48:15.921652, 3] winbindd/winbindd_misc.c:372(winbindd_info)
> [38847]: request misc info
> [2014/08/13 12:48:15.921795, 3]
> winbindd/winbindd_pam_auth.c:54(winbindd_pam_auth_send)
> [38847]: pam auth OMNI\stormont
> [2014/08/13 12:48:26.815876, 3]
> winbindd/winbindd_misc.c:384(winbindd_interface_version)
> [38848]: request interface version
> [2014/08/13 12:48:26.816002, 3]
> winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
> [38848]: request location of privileged pipe
> [2014/08/13 12:48:26.816106, 3]
> winbindd/winbindd_misc.c:394(winbindd_domain_name)
> [38848]: request domain name
> [2014/08/13 12:48:31.267636, 3] winbindd/winbindd_misc.c:372(winbindd_info)
> [38848]: request misc info
> [2014/08/13 12:48:31.267793, 3]
> winbindd/winbindd_pam_auth.c:54(winbindd_pam_auth_send)
> [38848]: pam auth OMNI\zzhoppy
>
>
> Ntlm as machine still fails:
> [root@pfcv logs]# ntlm_auth --username=LT-T430-3\$
> --challenge=4ab096b446376d5f
> --ntresponse=4df85dd62db46ee5bef1aa07fe499e87fc16eca72bd529e7
> Logon failure (0xc000006d)
>
> Below is log.winbindd from when the laptop attempted machine
> auth:
> [2014/08/13 13:37:43.894898, 3]
> winbindd/winbindd_misc.c:384(winbindd_interface_version)
> [38912]: request interface version
> [2014/08/13 13:37:43.895143, 3]
> winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
> [38912]: request location of privileged pipe
> [2014/08/13 13:37:43.895372, 3]
> winbindd/winbindd_misc.c:394(winbindd_domain_name)
> [38912]: request domain name
> [2014/08/13 13:37:43.895587, 3]
> winbindd/winbindd_pam_auth_crap.c:56(winbindd_pam_auth_crap_send)
> [38912]: pam auth crap domain: [OMNI] user: LT-T430-3$
>
>
> From: Louis Munro [mailto:[email protected]]
> Sent: Wednesday, August 13, 2014 9:49 AM
> To: [email protected]
> Subject: Re: [PacketFence-users] "No trusted SAM account"
>
> On 2014-08-12, at 15:58 , "Stormont, Stephen (IMS)" <[email protected]>
> wrote:
>
>
> When I entered the command that you suggested on the PacketFence/FreeRadius
> server, I got this:
>
> [root@pfcv sbin]# ntlm_auth --username=LT-T430-3\$
> --challenge=4ab096b446376d5f
> --ntresponse=4df85dd62db46ee5bef1aa07fe499e87fc16eca72bd529e7
> Logon failure (0xc000006d)
>
> Contents of mschp are below:
>
> mschap {
> use_mppe = yes
> require_encryption = yes
> require_strong = yes
> with_ntdomain_hack = yes
> ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key
> --username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}
> --challenge=%{mschap:Challenge:-00} --ntresponse=%{mschap:NT-Response:-00}"
> }
>
> Well, at least you can reproduce it reliably…
>
> Your mschap file looks about right.
> So I think the first step is to get user authentication working reliably.
> It's probably easier to figure out why user auth is not working first since
> it's easier to know if your password is correct.
>
> What happens when you try user auth at the command line using ntlm_auth?
>
> I.e.
> # ntlm_auth --username=whatever
>
> And if we compare with the FreeRADIUS debugging output for the same section?
> Can you post the relevant lines for that please (same ones as for the
> computer authentication)?
>
> What happens when you try to authenticate a user with the same arguments to
> ntlm_auth that FreeRadius uses (just as for the computer auth)?
>
> If user authentication works when you enter the password manually but not
> when freeradius tries it, then either the 802.1x client is not using a valid
> password or the AD cannot find that user.
>
> See this article for some background on ntlm:
> http://msdn.microsoft.com/en-ca/library/windows/desktop/aa378749(v=vs.85).aspx
>
>
> Have a look at the winbind logs (/var/log/samba/log.winbindd ).
> There should be a line for each authentication attempt like the following:
>
> [2014/08/13 09:31:56.156551, 3]
> winbindd/winbindd_pam_auth.c:54(winbindd_pam_auth_send)
> [ 7023]: pam auth inverse.local\lmunro
>
> How does the line differ between when you are authentication manually (from
> the command line) as opposed to when FreeRadius calls winbind (and fails)?
> Is the domain the same?
>
>
> Of course it may help if you have some logs from the AD side as well.
>
> Regards,
> --
> Louis Munro
> [email protected] :: www.inverse.ca
> +1.514.447.4918 *125 :: +1 (866) 353-6153
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
> (www.packetfence.org)
>
>
> Information in this e-mail may be confidential. It is intended only for the
> addressee(s) identified above. If you are not the addressee(s), or an
> employee or agent of the addressee(s), please note that any dissemination,
> distribution, or copying of this communication is strictly prohibited. If you
> have received this e-mail in error, please notify the sender of the error.
> ------------------------------------------------------------------------------
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users