Hello Eugene,

First did you uncomment packetfence-local-auth in
/usr/local/pf/conf/radiusd/packetfence-tunnel ?

Also what type of hashing password did you choose ? (Configuration ->
System configuration -> Advanced ) only ntlm and plaintext are supported
by local auth.

Regards

Fabrice



Le 2018-01-03 à 00:21, E.P. a écrit :
>
> I applied the patch, Tim, and it was successful, I mean the patch
> installation.
>
> Then I restarted RADIUS daemon and tried the local user
> authentication. As I described it in the other email to Fabrice it was
> rejected due to MSCHAPv2. For me it is a sign that I’m getting closer ;)
>
> And yes, Unifi is indeed ubiquitous ;) I inherited the organization
> WiFi setup based on distributed deployment of Unifi in L3 mode and now
> the management is pushing for more security without any significant
> investments.
>
>  
>
> Eugene
>
>  
>
> *From:*Timothy Mullican [mailto:[email protected]]
> *Sent:* Tuesday, January 02, 2018 7:04 PM
> *To:* E.P.
> *Cc:* [email protected]; Fabrice Durand
> *Subject:* Re: [PacketFence-users] Need an advice and maybe assistance
> with FreeRADIUS
>
>  
>
> Eugene,
>
>  
>
> The patch is mandatory in order for PacketFence to recognize that the
> UniFi supports 802.1x (and MAC-based auth). As for the controller, you
> should be able to get away without it if you do not need dynamic VLAN
> assignment. However, without the controller, PacketFence will not be
> able to disassociate or deauthenticate any clients, so keep this in
> mind for any temporary sessions (if applicable). Try applying the
> patch, restarting all the PacketFence services, and see if it fixes
> your problems. Based on the lack of Ubiquiti support for various
> integration issues (802.1x and MAC auth dynamic vlan assignment), the
> patch has been delayed being merged into the core code (per Fabrice),
> so you have to apply it manually. Please let me know if you have any
> additional questions.
>
>  
>
> Thanks,
>
> Tim
>
>  
>
> Sent from mobile phone
>
>
> On Jan 2, 2018, at 16:06, E.P. <[email protected]
> <mailto:[email protected]>> wrote:
>
>     Appreciate those screenshots as well, Tim!
>
>     I’m running latest code of the Unifi controller as well and latest
>     firmware supported on all WAP.
>
>     Quick question, is the IP address of the controller mandatory when
>     I configure WAP in PF switches section?
>
>      
>
>     Eugene
>
>      
>
>     *From:*Timothy Mullican [mailto:[email protected]]
>     *Sent:* Friday, December 29, 2017 9:34 AM
>     *To:* [email protected]
>     <mailto:[email protected]>
>     *Cc:* E.P.; Fabrice Durand
>     *Subject:* Re: [PacketFence-users] Need an advice and maybe
>     assistance with FreeRADIUS
>
>      
>
>     Eugene,
>
>      
>
>     Just a thought, but can you change the deauthentication method to
>     HTTPS and specify the UniFi controller IP? See my setup below:
>
>      
>
>     https://i.imgsafe.org/0c/0cff2c7f19.png
>
>     https://i.imgsafe.org/0c/0cff2dfd99.png
>
>      
>
>     My UniFi AP is 192.168.20.7
>
>     My UniFi controller is 192.168.20.6
>
>      
>
>     This is my UniFi AP setup:
>
>     https://i.imgsafe.org/05/05bbb5eafe.png
>
>     https://i.imgsafe.org/05/05bbd86ab4.png
>
>      
>
>     Also please make sure you have the latest UniFi AP and controller
>     firmware as they were just updated a few days ago. 
>
>      
>
>     See my earlier post on the PacketFence-Users forum if you have
>     questions. 
>
>      
>
>     Tim
>
>      
>
>     Sent from mobile phone
>
>
>     On Dec 29, 2017, at 07:59, Fabrice Durand via PacketFence-users
>     <[email protected]
>     <mailto:[email protected]>> wrote:
>
>         For me it looks that 172.19.254.2 is define twice.
>
>         Can you do in /usr/local/pf/raddb:
>
>         grep 172.19.254.2 * -r 
>
>         Also can you try to run radiusd in debug mode and see if you
>         can see 172.19.254.2 (radiusd -d /usr/local/pf/raddb -n auth -X)
>
>          
>
>         Regards
>
>         Fabrice
>
>          
>
>         Le 2017-12-29 à 01:26, E.P. a écrit :
>
>             Nah…
>
>             No luck at all, Fabrice. I’m becoming desperate ;)
>
>             I thought it has to do with Unifi controller (reading it
>             here in other threads that it is far from being
>             error-free) but I pointed it to FreeRADIUS running on
>             DaloRADIUS host and the regular user authentication worked
>             nice.
>
>             I just don’t like DaloRADIUS due to its limitations and
>             support and hold my aspiration towards PF.
>
>             Well, here we go again, I reconfigured the entry in
>             switches file and it looks very simplistic, 172.19.254.2
>             is the IP address of Unifi AP.
>
>              
>
>             /[root@PacketFence-ZEN conf]# cat ./switches.conf/
>
>             /[172.19.254.2]/
>
>             /VoIPCDPDetect=N/
>
>             /VoIPDHCPDetect=N/
>
>             /deauthMethod=RADIUS/
>
>             /description=Test-WAP/
>
>             /VoIPLLDPDetect=N/
>
>             /radiusSecret=1234567890/
>
>             /VlanMap=N/
>
>              
>
>             Someone who uses Unifi may be jump in to validate my
>             settings please.
>
>             In the settings for a specific wireless network I select
>             “WPA Enterprise” and select RADIUS profile that I
>             configured separately pointing to PF IP address. The
>             RADIUS profile is configured as usual, i.e.
>
>             IP address, ports which are 1812/1813 and shared secret,
>             nothing fancy about it.
>
>              
>
>             Both radius log files show the same consistent error:
>
>              
>
>             /Dec 29 06:10:24 PacketFence-ZEN acct[13247]: Dropping
>             packet without response because of error: Received
>             Accounting-Request packet from client 172.19.254.2 with
>             invalid Request Authenticator!  (Shared secret is incorrect.)/
>
>             / /
>
>             /Dec 29 06:20:29 PacketFence-ZEN auth[13273]: Dropping
>             packet without response because of error: Received packet
>             from 172.19.254.2 with invalid Message-Authenticator! 
>             (Shared secret is incorrect.)/
>
>              
>
>             I don’t think I have to start radius in debugging mode to
>             have more output, do I ?
>
>              
>
>             Eugene
>
>              
>
>             *From:*Durand fabrice [mailto:[email protected]]
>             *Sent:* Thursday, December 28, 2017 5:17 PM
>             *To:* E.P.; [email protected]
>             <mailto:[email protected]>
>             *Subject:* Re: [PacketFence-users] Need an advice and
>             maybe assistance with FreeRADIUS
>
>              
>
>             Can you try pfcmd configreload hard and restart radius.
>             (pfcmd service radiusd restart)
>
>              
>
>             Le 2017-12-28 à 19:20, E.P. a écrit :
>
>                 I should have made my previous email shorter because
>                 my main question fell into cracks.
>
>                 Why do I have an error with the shared secret? Quoting
>                 it here again:
>
>                  
>
>                 When I test this with a real network device, Unifi WAP
>                 for example, I don’t go anywhere.
>
>                 I see that NAD is added, here’s an entry from radius.log
>
>                  
>
>                 /Dec 28 07:42:46 PacketFence-ZEN auth[16806]: Adding
>                 client 172.19.254.2/32 with shared secret "123456"/
>
>                  
>
>                 When I try to authenticate from an endpoint to a
>                 specific SSID I see this error in radius-acct.log
>
>                  
>
>                 /Dec 28 07:38:58 PacketFence-ZEN acct[16780]: Dropping
>                 packet without response because of error: Received
>                 Accounting-Request packet from client 172.19.254.2
>                 with invalid Request Authenticator!  (Shared secret is
>                 incorrect.)/
>
>                  
>
>                 I added this WAP under “Policies and access control”
>                 in Switches section using the shared secret as shown
>                 above and following the admin guide. What am I doing
>                 wrong ?
>
>                 Here’s how the switches.conf file looks like after I
>                 added this WAP:
>
>                  
>
>                 /[root@PacketFence-ZEN conf]# cat ./switches.conf/
>
>                 /[172.19.254.2]/
>
>                 /VoIPCDPDetect=N/
>
>                 /VoIPDHCPDetect=N/
>
>                 /deauthMethod=RADIUS/
>
>                 /description=Test-WAP/
>
>                 /VoIPLLDPDetect=N/
>
>                 /radiusSecret=123456/
>
>                 /VlanMap=N/
>
>                  
>
>                 Eugene
>
>                  
>
>                 *From:*Durand fabrice via PacketFence-users
>                 [mailto:[email protected]]
>                 *Sent:* Thursday, December 28, 2017 3:30 PM
>                 *To:* [email protected]
>                 <mailto:[email protected]>
>                 *Cc:* Durand fabrice
>                 *Subject:* Re: [PacketFence-users] Need an advice and
>                 maybe assistance with FreeRADIUS
>
>                  
>
>                 Hello Eugene,
>
>                 in fact for 802.1x you need to use eapol_test instead
>                 of radtest.
>                 (http://deployingradius.com/scripts/eapol_test/)
>
>                 Also use the port 1812 instead of 18120.
>
>                 Regards
>
>                 Fabrice
>
>                  
>
>                  
>
>                 Le 2017-12-28 à 03:07, E.P. via PacketFence-users a
>                 écrit :
>
>                     Guys,
>
>                     I still hope someone with more experience with PF
>                     give me a hand with this trivial issue (if it is
>                     an issue)
>
>                     I’m on my way to test PF with baby steps and just
>                     created a user under Users section in PF GUI.
>
>                     Then I test it using a simple command like this
>                     and it seems to work using the local identity store.
>
>                      
>
>                     /[//root@PacketFence-ZEN bin]# ./pftest
>                     authentication test1 123456/
>
>                     /Testing authentication for "test1"/
>
>                     / /
>
>                     /Authenticating against local/
>
>                     /  Authentication SUCCEEDED against local
>                     (Authentication successful.)/
>
>                     /  Matched against local for 'authentication' rules/
>
>                     /    set_access_level : User Manager/
>
>                     /    set_unreg_date : 0000-00-00 00:00:00/
>
>                     /  Matched against local for 'administration' rules/
>
>                     /    set_access_level : User Manager/
>
>                     /    set_unreg_date : 0000-00-00 00:00:00/
>
>                      
>
>                     Then I’m following the admin guide and want to
>                     test this user authentication using radtest
>                     command as in
>
>                      
>
>                      
>
>                     /[root@PacketFence-ZEN bin]# radtest test1 123456
>                     localhost:18120 12 testing123/
>
>                     /Sent Access-Request Id 136 from 0.0.0.0:45055 to
>                     127.0.0.1:18120 length 75/
>
>                     /        User-Name = "test1"/
>
>                     /        User-Password = "123456"/
>
>                     /        NAS-IP-Address = 172.16.0.222/
>
>                     /        NAS-Port = 12/
>
>                     /        Message-Authenticator = 0x00/
>
>                     /        Cleartext-Password = "123456"/
>
>                     /Received Access-Reject Id 136 from
>                     127.0.0.1:18120 to 0.0.0.0:0 length 20/
>
>                     (0)   /-: Expected Access-Accept got Access-Reject/
>
>                      
>
>                     Why am I rejected here ? Am I not supposed to use
>                     this test1 user to test RADIUS with the proxy module ?
>
>                      
>
>                     And finally, when I test this with a real network
>                     device, Unifi WAP for example, I don’t go anywhere.
>
>                     I see that NAD is added, here’s an entry from
>                     radius.log
>
>                      
>
>                     /Dec 28 07:42:46 PacketFence-ZEN auth[16806]:
>                     Adding client 172.19.254.2/32 with shared secret
>                     "123456"/
>
>                      
>
>                     When I try to authenticate for an endpoint to a
>                     specific SSID I see this error in radius-acct.log
>
>                      
>
>                     /Dec 28 07:38:58 PacketFence-ZEN acct[16780]:
>                     Dropping packet without response because of error:
>                     Received Accounting-Request packet from client
>                     172.19.254.2 with invalid Request Authenticator! 
>                     (Shared secret is incorrect.)/
>
>                      
>
>                     I added this WAP under “Policies and access
>                     control” in Switches section using the shared
>                     secret as shown above and following the admin
>                     guide. What am I doing wrong ?
>
>                     Here’s how the switches.conf file looks like after
>                     I added this WAP:
>
>                      
>
>                     /[root@PacketFence-ZEN conf]# cat ./switches.conf/
>
>                     /[172.19.254.2]/
>
>                     /VoIPCDPDetect=N/
>
>                     /VoIPDHCPDetect=N/
>
>                     /deauthMethod=RADIUS/
>
>                     /description=Test-WAP/
>
>                     /VoIPLLDPDetect=N/
>
>                     /radiusSecret=123456/
>
>                     /VlanMap=N/
>
>                      
>
>                     Just to confirm, I’m not doing any inline mode,
>                     nor guest or web authentication, just pure
>                     WPA-Enterprise with RADIUS internal users identity
>                     store.
>
>                      
>
>                     Eugene
>
>                      
>
>
>
>
>
>
>
>                     
> ------------------------------------------------------------------------------
>
>                     Check out the vibrant tech community on one of the 
> world's most
>
>                     engaging tech sites, Slashdot.org <http://Slashdot.org>! 
> http://sdm.link/slashdot
>
>
>
>
>
>
>
>                     _______________________________________________
>
>                     PacketFence-users mailing list
>
>                     [email protected]
>                     <mailto:[email protected]>
>
>                     
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>                  
>
>              
>
>
>
>
>         -- 
>
>         Fabrice Durand
>
>         [email protected] <mailto:[email protected]> ::  +1.514.447.4918 
> (x135) ::  www.inverse.ca <http://www.inverse.ca>
>
>         Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
> PacketFence (http://packetfence.org) 
>
>         
> ------------------------------------------------------------------------------
>         Check out the vibrant tech community on one of the world's most
>         engaging tech sites, Slashdot.org <http://Slashdot.org>!
>         http://sdm.link/slashdot
>
>         _______________________________________________
>         PacketFence-users mailing list
>         [email protected]
>         <mailto:[email protected]>
>         https://lists.sourceforge.net/lists/listinfo/packetfence-users
>

-- 
Fabrice Durand
[email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org) 

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to