Nah…

No luck at all, Fabrice. I’m becoming desperate ;)

I thought it has to do with Unifi controller (reading it here in other
threads that it is far from being error-free) but I pointed it to FreeRADIUS
running on DaloRADIUS host and the regular user authentication worked nice.

I just don’t like DaloRADIUS due to its limitations and support and hold my
aspiration towards PF.

Well, here we go again, I reconfigured the entry in switches file and it
looks very simplistic, 172.19.254.2 is the IP address of Unifi AP.

 

[root@PacketFence-ZEN conf]# cat ./switches.conf

[172.19.254.2]

VoIPCDPDetect=N

VoIPDHCPDetect=N

deauthMethod=RADIUS

description=Test-WAP

VoIPLLDPDetect=N

radiusSecret=1234567890

VlanMap=N

 

Someone who uses Unifi may be jump in to validate my settings please.

In the settings for a specific wireless network I select “WPA Enterprise”
and select RADIUS profile that I configured separately pointing to PF IP
address. The RADIUS profile is configured as usual, i.e.

IP address, ports which are 1812/1813 and shared secret, nothing fancy about
it.

 

Both radius log files show the same consistent error:

 

Dec 29 06:10:24 PacketFence-ZEN acct[13247]: Dropping packet without
response because of error: Received Accounting-Request packet from client
172.19.254.2 with invalid Request Authenticator!  (Shared secret is
incorrect.)

 

Dec 29 06:20:29 PacketFence-ZEN auth[13273]: Dropping packet without
response because of error: Received packet from 172.19.254.2 with invalid
Message-Authenticator!  (Shared secret is incorrect.)

 

I don’t think I have to start radius in debugging mode to have more output,
do I ? 

 

Eugene

 

From: Durand fabrice [mailto:[email protected]] 
Sent: Thursday, December 28, 2017 5:17 PM
To: E.P.; [email protected]
Subject: Re: [PacketFence-users] Need an advice and maybe assistance with
FreeRADIUS

 

Can you try pfcmd configreload hard and restart radius. (pfcmd service
radiusd restart)

 

Le 2017-12-28 à 19:20, E.P. a écrit :

I should have made my previous email shorter because my main question fell
into cracks.

Why do I have an error with the shared secret? Quoting it here again:

 

When I test this with a real network device, Unifi WAP for example, I don’t
go anywhere.

I see that NAD is added, here’s an entry from radius.log

 

Dec 28 07:42:46 PacketFence-ZEN auth[16806]: Adding client 172.19.254.2/32
with shared secret "123456"

 

When I try to authenticate from an endpoint to a specific SSID I see this
error in radius-acct.log 

 

Dec 28 07:38:58 PacketFence-ZEN acct[16780]: Dropping packet without
response because of error: Received Accounting-Request packet from client
172.19.254.2 with invalid Request Authenticator!  (Shared secret is
incorrect.)

 

I added this WAP under “Policies and access control” in Switches section
using the shared secret as shown above and following the admin guide. What
am I doing wrong ?

Here’s how the switches.conf file looks like after I added this WAP:

 

[root@PacketFence-ZEN conf]# cat ./switches.conf

[172.19.254.2]

VoIPCDPDetect=N

VoIPDHCPDetect=N

deauthMethod=RADIUS

description=Test-WAP

VoIPLLDPDetect=N

radiusSecret=123456

VlanMap=N

 

Eugene

 

From: Durand fabrice via PacketFence-users
[mailto:[email protected]] 
Sent: Thursday, December 28, 2017 3:30 PM
To: [email protected]
Cc: Durand fabrice
Subject: Re: [PacketFence-users] Need an advice and maybe assistance with
FreeRADIUS

 

Hello Eugene,

in fact for 802.1x you need to use eapol_test instead of radtest.
(http://deployingradius.com/scripts/eapol_test/)

Also use the port 1812 instead of 18120.

Regards

Fabrice

 

 

Le 2017-12-28 à 03:07, E.P. via PacketFence-users a écrit :

Guys,

I still hope someone with more experience with PF give me a hand with this
trivial issue (if it is an issue)

I’m on my way to test PF with baby steps and just created a user under Users
section in PF GUI.

Then I test it using a simple command like this and it seems to work using
the local identity store.

 

[root@PacketFence-ZEN bin]# ./pftest authentication test1 123456

Testing authentication for "test1"

 

Authenticating against local

  Authentication SUCCEEDED against local (Authentication successful.)

  Matched against local for 'authentication' rules

    set_access_level : User Manager

    set_unreg_date : 0000-00-00 00:00:00

  Matched against local for 'administration' rules

    set_access_level : User Manager

    set_unreg_date : 0000-00-00 00:00:00

 

Then I’m following the admin guide and want to test this user authentication
using radtest command as in

 

 

[root@PacketFence-ZEN bin]# radtest test1 123456 localhost:18120 12
testing123

Sent Access-Request Id 136 from 0.0.0.0:45055 to 127.0.0.1:18120 length 75

        User-Name = "test1"

        User-Password = "123456"

        NAS-IP-Address = 172.16.0.222

        NAS-Port = 12

        Message-Authenticator = 0x00

        Cleartext-Password = "123456"

Received Access-Reject Id 136 from 127.0.0.1:18120 to 0.0.0.0:0 length 20

(0)   -: Expected Access-Accept got Access-Reject

 

Why am I rejected here ? Am I not supposed to use this test1 user to test
RADIUS with the proxy module ?

 

And finally, when I test this with a real network device, Unifi WAP for
example, I don’t go anywhere.

I see that NAD is added, here’s an entry from radius.log

 

Dec 28 07:42:46 PacketFence-ZEN auth[16806]: Adding client 172.19.254.2/32
with shared secret "123456"

 

When I try to authenticate for an endpoint to a specific SSID I see this
error in radius-acct.log 

 

Dec 28 07:38:58 PacketFence-ZEN acct[16780]: Dropping packet without
response because of error: Received Accounting-Request packet from client
172.19.254.2 with invalid Request Authenticator!  (Shared secret is
incorrect.)

 

I added this WAP under “Policies and access control” in Switches section
using the shared secret as shown above and following the admin guide. What
am I doing wrong ?

Here’s how the switches.conf file looks like after I added this WAP:

 

[root@PacketFence-ZEN conf]# cat ./switches.conf

[172.19.254.2]

VoIPCDPDetect=N

VoIPDHCPDetect=N

deauthMethod=RADIUS

description=Test-WAP

VoIPLLDPDetect=N

radiusSecret=123456

VlanMap=N

 

Just to confirm, I’m not doing any inline mode, nor guest or web
authentication, just pure WPA-Enterprise with RADIUS internal users identity
store.

 

Eugene

 







----------------------------------------------------------------------------
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot







_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

 

 

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to