Le 17/01/2017 à 22:34, Fabrice Durand a écrit :
> Hello Denis,
>
> so first you added it in packetfence-tunnel (which is correct) but you
> test it with radclient and it will never go in packetfence-tunnel.
>
> What you have to do is to use eapol_test in order to test 802.1x.
>
> http://deployingradius.com/scripts/eapol_test/
Ok, finally, I found a spare wifi AP for testing, it will be more
efficient...
>
> Also radius debug mean :
> raddebug -f var/run/radiusd.sock -t 300
219) Thu Jan 19 09:32:52 2017: Debug: packetfence: &request:State =
$RAD_REQUEST{'State'} -> '0x7246971f72418d32cc55830e57797d34'
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence:
&request:MS-CHAP-Challenge = $RAD_REQUEST{'MS-CHAP-Challenge'} ->
'0xb5965af9164e8fef4e8bef0a10d33f30'
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence:
&request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '172.16.1.120'
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence:
&request:FreeRADIUS-Proxied-To = $RAD_REQUEST{'FreeRADIUS-Proxied-To'}
-> '127.0.0.1'
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence:
&request:Event-Timestamp = $RAD_REQUEST{'Event-Timestamp'} -> 'janv. 19
2017 09:32:52 CET'
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence: &request:EAP-Type =
$RAD_REQUEST{'EAP-Type'} -> 'MSCHAPv2'
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence:
&request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} ->
'44:74:6c:50:25:e7'
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence: &control:NT-Password
= $RAD_CHECK{'NT-Password'} ->
'0x.............................................................'
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence: &control:Auth-Type =
$RAD_CHECK{'Auth-Type'} -> 'eap'
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence:
&control:MD5-Password = $RAD_CHECK{'MD5-Password'} ->
'0x.............................................................................................
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence: &control:LDAP-UserDN
= $RAD_CHECK{'LDAP-UserDN'} ->
'uid=denis.bonnenfant,ou=People,dc=diderot,dc=org'
(219) Thu Jan 19 09:32:52 2017: Debug: packetfence:
&control:Proxy-To-Realm = $RAD_CHECK{'Proxy-To-Realm'} -> 'LOCAL'
(219) Thu Jan 19 09:32:52 2017: Debug: [packetfence] = noop
(219) Thu Jan 19 09:32:52 2017: Debug: if (PacketFence-Domain) {
(219) Thu Jan 19 09:32:52 2017: Debug: if (PacketFence-Domain) -> FALSE
(219) Thu Jan 19 09:32:52 2017: Debug: else {
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: Found NT-Password
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: Creating challenge hash
with username: denis.bonnenfant
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: Client is using MS-CHAPv2
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: Executing:
/usr/local/pf/bin/ntlm_auth_wrapper -- Â Â Â Â --request-nt-key
--username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}
--challenge=%{mschap:Challenge:-00} --nt-respon{mschap:NT-Response:-00}:
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: EXPAND
--username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: -->
--username=denis.bonnenfant
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: Creating challenge hash
with username: denis.bonnenfant
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: EXPAND
--challenge=%{mschap:Challenge:-00}
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: -->
--challenge=aeca09a8e5925c2c
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: EXPAND
--nt-response=%{mschap:NT-Response:-00}
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: -->
--nt-response=4e944e2ad2edcb5a562284dafb74ea693c14bffea2c590eb
(219) Thu Jan 19 09:32:52 2017: ERROR: mschap: Program returned code (1)
and output 'Reading winbind reply failed! (0xc0000001)'
(219) Thu Jan 19 09:32:52 2017: Debug: mschap: External script failed
(219) Thu Jan 19 09:32:52 2017: ERROR: mschap: External script says:
Reading winbind reply failed! (0xc0000001)
(219) Thu Jan 19 09:32:52 2017: ERROR: mschap: MS-CHAP2-Response is
incorrect
(219) Thu Jan 19 09:32:52 2017: Debug: [mschap] = reject
(219) Thu Jan 19 09:32:52 2017: Debug: } # else = reject
(219) Thu Jan 19 09:32:52 2017: Debug: } # Auth-Type MS-CHAP = reject
(219) Thu Jan 19 09:32:52 2017: Debug: eap: Sending EAP Failure (code 4)
ID 7 length 4
(219) Thu Jan 19 09:32:52 2017: Debug: eap: Freeing handler
(219) Thu Jan 19 09:32:52 2017: Debug: [eap] = reject
(219) Thu Jan 19 09:32:52 2017: Debug: } # authenticate = reject
(219) Thu Jan 19 09:32:52 2017: Debug: Failed to authenticate the user
(219) Thu Jan 19 09:32:52 2017: Debug: Using Post-Auth-Type Reject
(219) Thu Jan 19 09:32:52 2017: Debug: # Executing group from file
raddb//sites-enabled/packetfence-tunnel
:
It seems that it tries to use winbind, it is really strange, as my
config is not AD, and normally i configured to read directly nt-password
in ldap, but logs show no password nequest :
(219) Thu Jan 19 09:32:52 2017: Debug: ldap: EXPAND
(uid=%{%{mschap:User-Name}:-%{User-Name}})
(219) Thu Jan 19 09:32:52 2017: Debug: ldap: --> (uid=denis.bonnenfant)
(219) Thu Jan 19 09:32:52 2017: Debug: ldap: Performing search in
"dc=diderot,dc=org" with filter "(uid=denis.bonnenfant)", scope "sub"
(219) Thu Jan 19 09:32:52 2017: Debug: ldap: Waiting for search result...
(219) Thu Jan 19 09:32:52 2017: Debug: ldap: User object found at DN
"uid=denis.bonnenfant,ou=People,dc=diderot,dc=org"
(219) Thu Jan 19 09:32:52 2017: Debug: ldap: Processing user attributes
(219) Thu Jan 19 09:32:52 2017: Debug: [ldap] = updated
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users