Hi,

Here is my mscap file.
I played a little bit with the ntlm_auth options there for enable debugging
(--debuglevel=10) but without success.


# -*- text -*-

#

#  $Id$


# Microsoft CHAP authentication

#

#  This module supports MS-CHAP and MS-CHAPv2 authentication.

#  It also enforces the SMB-Account-Ctrl attribute.

#

mschap {

#

#  If you are using /etc/smbpasswd, see the 'passwd'

#  module for an example of how to use /etc/smbpasswd


# if use_mppe is not set to no mschap will

# add MS-CHAP-MPPE-Keys for MS-CHAPv1 and

# MS-MPPE-Recv-Key/MS-MPPE-Send-Key for MS-CHAPv2

#

use_mppe = yes


# if mppe is enabled require_encryption makes

# encryption moderate

#

require_encryption = yes


# require_strong always requires 128 bit key

# encryption

#

require_strong = yes


# Windows sends us a username in the form of

# DOMAIN\user, but sends the challenge response

# based on only the user portion.  This hack

# corrects for that incorrect behavior.

#

with_ntdomain_hack = yes


# The module can perform authentication itself, OR

# use a Windows Domain Controller.  This configuration

# directive tells the module to call the ntlm_auth

# program, which will do the authentication, and return

# the NT-Key.  Note that you MUST have "winbindd" and

# "nmbd" running on the local machine for ntlm_auth

# to work.  See the ntlm_auth program documentation

# for details.

#

# If ntlm_auth is configured below, then the mschap

# module will call ntlm_auth for every MS-CHAP

# authentication request.  If there is a cleartext

# or NT hashed password available, you can set

# "MS-CHAP-Use-NTLM-Auth := No" in the control items,

# and the mschap module will do the authentication itself,

# without calling ntlm_auth.

#

# Be VERY careful when editing the following line!

#

# You can also try setting the user name as:

#

# ... --username=%{mschap:User-Name} ...

#

# In that case, the mschap module will look at the User-Name

# attribute, and do prefix/suffix checks in order to obtain

# the "best" user name for the request.

#

    # Call ntlm_auth through the logging wrapper. Make sure to preserve the
-- separator to distinguish between

    # the args to the wrapper and those to the ntlm_auth executable itself

    ntlm_auth = "/usr/local/pf/bin/ntlm_auth_wrapper -- \

         --request-nt-key --username=%{mschap:User-Name:-None}
--challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"


# ntlm_auth should take less than three seconds.

# If it takes longer than that, something is probably wrong.

#

ntlm_auth_timeout = 3


# For Apple Server, when running on the same machine as

# Open Directory.  It has no effect on other systems.

#

#use_open_directory = yes


# On failure, set (or not) the MS-CHAP error code saying

# "retries allowed".

# Be careful setting this to yes. It could allow a device to hog the thread
by never replying.

#

allow_retry = no


# An optional retry message.

#

#retry_msg = "Re-enter (or reset) the password"

}


mschap chrooted_mschap {

#

#  If you are using /etc/smbpasswd, see the 'passwd'

#  module for an example of how to use /etc/smbpasswd


# if use_mppe is not set to no mschap will

# add MS-CHAP-MPPE-Keys for MS-CHAPv1 and

# MS-MPPE-Recv-Key/MS-MPPE-Send-Key for MS-CHAPv2

#

use_mppe = yes


# if mppe is enabled require_encryption makes

# encryption moderate

#

require_encryption = yes


# require_strong always requires 128 bit key

# encryption

#

require_strong = yes


# Windows sends us a username in the form of

# DOMAIN\user, but sends the challenge response

# based on only the user portion.  This hack

# corrects for that incorrect behavior.

#

with_ntdomain_hack = yes


# The module can perform authentication itself, OR

# use a Windows Domain Controller.  This configuration

# directive tells the module to call the ntlm_auth

# program, which will do the authentication, and return

# the NT-Key.  Note that you MUST have "winbindd" and

# "nmbd" running on the local machine for ntlm_auth

# to work.  See the ntlm_auth program documentation

# for details.

#

# If ntlm_auth is configured below, then the mschap

# module will call ntlm_auth for every MS-CHAP

# authentication request.  If there is a cleartext

# or NT hashed password available, you can set

# "MS-CHAP-Use-NTLM-Auth := No" in the control items,

# and the mschap module will do the authentication itself,

# without calling ntlm_auth.

#

# Be VERY careful when editing the following line!

#

# You can also try setting the user name as:

#

# ... --username=%{mschap:User-Name} ...

#

# In that case, the mschap module will look at the User-Name

# attribute, and do prefix/suffix checks in order to obtain

# the "best" user name for the request.

#

    # Call ntlm_auth through the logging wrapper. Make sure to preserve the
-- separator to distinguish between

    # the args to the wrapper and those to the ntlm_auth executable itself

    ntlm_auth = "/usr/bin/sudo /usr/sbin/chroot
/chroots/%{PacketFence-Domain} /usr/local/pf/bin/ntlm_auth_wrapper -- \

         --request-nt-key --username=%{mschap:User-Name:-None}
--challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"

# ntlm_auth should take less than three seconds.

# If it takes longer than that, something is probably wrong.

#

ntlm_auth_timeout = 3


# For Apple Server, when running on the same machine as

# Open Directory.  It has no effect on other systems.

#

#use_open_directory = yes


# On failure, set (or not) the MS-CHAP error code saying

# "retries allowed".

# Be careful setting this to yes. It could allow a device to hog the thread
by never replying.

#

allow_retry = no


# An optional retry message.

#

#retry_msg = "Re-enter (or reset) the password"

}

2016-03-29 16:48 GMT+02:00 Louis Munro <[email protected]>:

>
>
> On Mar 29, 2016, at 3:45 , Tobias Friede <[email protected]> wrote:
>
> Hi,
>
> now I have reinstalled the PF server and configured the AD Auth like
> described in the documentation but with no success.
> I get the same error message like before.
>
> I have no idea where the mistake is.  Maybe there is a bug?
>
>
>
> Anything is possible.
>
> Can you please post the contents of your raddb/modules/mschap?
>
> Regards,
> --
> Louis Munro
> [email protected]  ::  www.inverse.ca
> +1.514.447.4918 x125  :: +1 (866) 353-6153 x125
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (
> www.packetfence.org)
>
>
> ------------------------------------------------------------------------------
> Transform Data into Opportunity.
> Accelerate data analysis in your applications with
> Intel Data Analytics Acceleration Library.
> Click to learn more.
> http://pubads.g.doubleclick.net/gampad/clk?id=278785471&iu=/4140
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://pubads.g.doubleclick.net/gampad/clk?id=278785471&iu=/4140
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to