Hello Eugene,

Even if you will integrate PacketFence with AD you can use local users for another purpose (like guest source with create local account enable in order to use this account on a 802.1x ssid)

For mariadb, there are few services that are not managed by packetfence, like packetfence-config, packetfence-redis-cache and packetfence-mariadb.

So if you want to restart one of them then you need to use systemctl restart packetfence-mariadb

Regards

Fabrice



Le 2018-01-03 à 20:36, E.P. a écrit :

The year started with boring and hectic problems, only now had time to get back to PF.

Well, I knew that I’m getting closer ;)

First of all I did uncomment “packefence-local-auth” sometime ago but when both Fabrice and you mentioned it again I went through the file and found a second line with this parameter that was commented.

In the section for “inner-tunnel server” it was still commented.

Now database password encryption type. For some reason it just doesn’t want to work to me when I had it set to NTLM.

Changed it to Plain-text and then had to recreate the local users to make it work.

I’m not very concerned about the passwords encryption type for now as we plan to integrate PF with AD.

By the way, is there any way to restart MariaDB service from PF GUI ? I couldn’t find it in the “Status-Services” section.

And CentOS says that it is pf-mariadb but it can’t be restarted with the regular OS script systemctl

Thank you very much, Fabrice and Timothy!

Eugene

*From:*Timothy Mullican [mailto:[email protected]]
*Sent:* Wednesday, January 03, 2018 6:08 AM
*To:* [email protected]
*Cc:* Fabrice Durand; [email protected]
*Subject:* Re: [PacketFence-users] Need an advice and maybe assistance with FreeRADIUS

Eugene,

Did you uncomment the “packetfence-local-auth” line in /usr/local/pf/conf/radiusd/packetfence-tunnel ?

Also you will have to change the database password encryption type to plain or NTLM under Configuration->System Configuration->Main Configuration->Database passwords hashing mechanism.

I would then try restarting all the PacketFence services. Let me know if this doesn’t work.

Thanks,

Tim

Sent from mobile phone


On Jan 3, 2018, at 07:50, Fabrice Durand via PacketFence-users <[email protected] <mailto:[email protected]>> wrote:

    I tried to add the DAS parameter directly in the configuration
    file of the AP and it works (CoA), but the limitation is that you
    can enable it only on one ssid.

    https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf

    Regards

    Fabrice

    Le 2017-12-29 à 16:18, Timothy Mullican via PacketFence-users a
    écrit :

        It may be possible to skip the controller and run the
        deauthentication command on the AP itself, but it is product
        specific as opposed to the controller API, which is
        cross-product. The UniFi code on PacketFence would have to be
        modified to support this.

        See
        
https://community.ubnt.com/t5/UniFi-Wireless/Issue-manual-kick-sta-command/m-p/1197157/highlight/true#M95831

        Sent from mobile phone


        On Dec 29, 2017, at 15:12, Timothy Mullican via
        PacketFence-users <[email protected]
        <mailto:[email protected]>> wrote:

            I am running UniFi AP 3.9.15.8011 and Controller 5.6.26
            (I’m using linuxserver/UniFi docker image on CentOS 7.4).

            First, make sure you applied the UniFi patch (see
            
https://community.ubnt.com/t5/UniFi-Wireless/Packetfence-7-1-Out-of-Band-Dynamic-VLAN-with-Unifi/m-p/2134984/highlight/true#M261219).
            This enables dynamic VLAN assignment using radius and
            802.1x on the PacketFence side. The latest UniFi firmware
            also allows dynamic vlan assignment using MAC
            authentication (i.e., guest access). If you have any
            questions about this let me know and I can help you (also
            see my earlier thread).

            If you are using the PacketFence captive portal
            authentication to assign a user’s VLAN, PacketFence
            requires the UniFi controller to deauthenticate clients
            from the AP. If you look at
            
https://github.com/inverse-inc/packetfence/pull/2735/files#diff-8b99f599546e7710d1df6b776d184569,
            you can see the deauthentication method used is an HTTPS
            API call to the controller running the “kick-sta” command
            on the client MAC address. As you are probably aware, the
            user must reauthenticate in order to be placed in the
            correct VLAN after successfully authenticating.
            PacketFence automates this process in several ways
            (HTTP/HTTPS, SNMP, Telnet/SSH, RADIUS CoA).

            As far as I know, the only way to deauthenticate a client
            on the AP is using the Controller API over HTTPS (no
            support for CoA yet). If CoA is implemented we should be
            able to bypass the controller and send direct client
            RADIUS deauthentication requests to the AP.

            If you are using 802.1x without the captive portal, you
            may be able to get away without relying on the controller,
            since the VLAN is only assigned once at logon to the AP,
            but I have not tested this yet.

            Fabrice may be able to help if I didn’t explain something
            correctly above.

            Tim


                On Dec 29, 2017, at 12:38, E.P. <[email protected]
                <mailto:[email protected]>> wrote:

                    Hi Timothy,

                    I’m really-really grateful to you and your comments.

                    May I ask you what firmware level you run on your
                    Unifi AP ?

                    And by the way, just out of curiosity, why we need
                    controller IP address in the settings for AP/switch ?

                    I thought that the real RADIUS client is the AP
                    and the controller’s only job is to push settings
                    including WPA-Enterprise/RADIUS to AP

                    Eugene

                    *From:*Timothy Mullican
                    [mailto:[email protected]]
                    *Sent:* Friday, December 29, 2017 9:34 AM
                    *To:* [email protected]
                    <mailto:[email protected]>
                    *Cc:* E.P.; Fabrice Durand
                    *Subject:* Re: [PacketFence-users] Need an advice
                    and maybe assistance with FreeRADIUS

                    Eugene,

                    Just a thought, but can you change the
                    deauthentication method to HTTPS and specify the
                    UniFi controller IP? See my setup below:

                    https://i.imgsafe.org/0c/0cff2c7f19.png

                    https://i.imgsafe.org/0c/0cff2dfd99.png

                    My UniFi AP is 192.168.20.7

                    My UniFi controller is 192.168.20.6

                    This is my UniFi AP setup:

                    https://i.imgsafe.org/05/05bbb5eafe.png

                    https://i.imgsafe.org/05/05bbd86ab4.png

                    Also please make sure you have the latest UniFi AP
                    and controller firmware as they were just updated
                    a few days ago.

                    See my earlier post on the PacketFence-Users forum
                    if you have questions.

                    Tim

                    Sent from mobile phone


                    On Dec 29, 2017, at 07:59, Fabrice Durand via
                    PacketFence-users
                    <[email protected]
                    <mailto:[email protected]>>
                    wrote:

                        For me it looks that 172.19.254.2 is define twice.

                        Can you do in /usr/local/pf/raddb:

                        grep 172.19.254.2 * -r

                        Also can you try to run radiusd in debug mode
                        and see if you can see 172.19.254.2 (radiusd
                        -d /usr/local/pf/raddb -n auth -X)

                        Regards

                        Fabrice

                        Le 2017-12-29 à 01:26, E.P. a écrit :

                            Nah…

                            No luck at all, Fabrice. I’m becoming
                            desperate ;)

                            I thought it has to do with Unifi
                            controller (reading it here in other
                            threads that it is far from being
                            error-free) but I pointed it to FreeRADIUS
                            running on DaloRADIUS host and the regular
                            user authentication worked nice.

                            I just don’t like DaloRADIUS due to its
                            limitations and support and hold my
                            aspiration towards PF.

                            Well, here we go again, I reconfigured the
                            entry in switches file and it looks very
                            simplistic, 172.19.254.2 is the IP address
                            of Unifi AP.

                            /[root@PacketFence-ZEN conf]# cat
                            ./switches.conf/

                            /[172.19.254.2]/

                            /VoIPCDPDetect=N/

                            /VoIPDHCPDetect=N/

                            /deauthMethod=RADIUS/

                            /description=Test-WAP/

                            /VoIPLLDPDetect=N/

                            /radiusSecret=1234567890/

                            /VlanMap=N/

                            Someone who uses Unifi may be jump in to
                            validate my settings please.

                            In the settings for a specific wireless
                            network I select “WPA Enterprise” and
                            select RADIUS profile that I configured
                            separately pointing to PF IP address. The
                            RADIUS profile is configured as usual, i.e.

                            IP address, ports which are 1812/1813 and
                            shared secret, nothing fancy about it.

                            Both radius log files show the same
                            consistent error:

                            /Dec 29 06:10:24 PacketFence-ZEN
                            acct[13247]: Dropping packet without
                            response because of error: Received
                            Accounting-Request packet from client
                            172.19.254.2 with invalid Request
                            Authenticator!  (Shared secret is incorrect.)/

                            //

                            /Dec 29 06:20:29 PacketFence-ZEN
                            auth[13273]: Dropping packet without
                            response because of error: Received packet
                            from 172.19.254.2 with invalid
                            Message-Authenticator! (Shared secret is
                            incorrect.)/

                            I don’t think I have to start radius in
                            debugging mode to have more output, do I ?

                            Eugene

                            *From:*Durand fabrice
                            [mailto:[email protected]]
                            *Sent:* Thursday, December 28, 2017 5:17 PM
                            *To:* E.P.;
                            [email protected]
                            <mailto:[email protected]>
                            *Subject:* Re: [PacketFence-users] Need an
                            advice and maybe assistance with FreeRADIUS

                            Can you try pfcmd configreload hard and
                            restart radius. (pfcmd service radiusd
                            restart)

                            Le 2017-12-28 à 19:20, E.P. a écrit :

                                I should have made my previous email
                                shorter because my main question fell
                                into cracks.

                                Why do I have an error with the shared
                                secret? Quoting it here again:

                                When I test this with a real network
                                device, Unifi WAP for example, I don’t
                                go anywhere.

                                I see that NAD is added, here’s an
                                entry from radius.log

                                /Dec 28 07:42:46 PacketFence-ZEN
                                auth[16806]: Adding client
                                172.19.254.2/32 with shared secret
                                "123456"/

                                When I try to authenticate from an
                                endpoint to a specific SSID I see this
                                error in radius-acct.log

                                /Dec 28 07:38:58 PacketFence-ZEN
                                acct[16780]: Dropping packet without
                                response because of error: Received
                                Accounting-Request packet from client
                                172.19.254.2 with invalid Request
                                Authenticator! (Shared secret is
                                incorrect.)/

                                I added this WAP under “Policies and
                                access control” in Switches section
                                using the shared secret as shown above
                                and following the admin guide. What am
                                I doing wrong ?

                                Here’s how the switches.conf file
                                looks like after I added this WAP:

                                /[root@PacketFence-ZEN conf]# cat
                                ./switches.conf/

                                /[172.19.254.2]/

                                /VoIPCDPDetect=N/

                                /VoIPDHCPDetect=N/

                                /deauthMethod=RADIUS/

                                /description=Test-WAP/

                                /VoIPLLDPDetect=N/

                                /radiusSecret=123456/

                                /VlanMap=N/

                                Eugene

                                *From:*Durand fabrice via
                                PacketFence-users
                                [mailto:[email protected]]

                                *Sent:* Thursday, December 28, 2017
                                3:30 PM
                                *To:*
                                [email protected]
                                <mailto:[email protected]>
                                *Cc:* Durand fabrice
                                *Subject:* Re: [PacketFence-users]
                                Need an advice and maybe assistance
                                with FreeRADIUS

                                Hello Eugene,

                                in fact for 802.1x you need to use
                                eapol_test instead of radtest.
                                (http://deployingradius.com/scripts/eapol_test/)

                                Also use the port 1812 instead of 18120.

                                Regards

                                Fabrice

                                Le 2017-12-28 à 03:07, E.P. via
                                PacketFence-users a écrit :

                                    Guys,

                                    I still hope someone with more
                                    experience with PF give me a hand
                                    with this trivial issue (if it is
                                    an issue)

                                    I’m on my way to test PF with baby
                                    steps and just created a user
                                    under Users section in PF GUI.

                                    Then I test it using a simple
                                    command like this and it seems to
                                    work using the local identity store.

                                    /[//root@PacketFence-ZEN bin]#
                                    ./pftest authentication test1 123456/

                                    /Testing authentication for "test1"/

                                    //

                                    /Authenticating against local/

                                    /Authentication SUCCEEDED against
                                    local (Authentication successful.)/

                                    /Matched against local for
                                    'authentication' rules/

                                    /set_access_level : User Manager/

                                    /set_unreg_date : 0000-00-00 00:00:00/

                                    /Matched against local for
                                    'administration' rules/

                                    /set_access_level : User Manager/

                                    /set_unreg_date : 0000-00-00 00:00:00/

                                    Then I’m following the admin guide
                                    and want to test this user
                                    authentication using radtest
                                    command as in

                                    /[root@PacketFence-ZEN bin]#
                                    radtest test1 123456
                                    localhost:18120 12 testing123/

                                    /Sent Access-Request Id 136 from
                                    0.0.0.0:45055 to 127.0.0.1:18120
                                    length 75/

                                    /User-Name = "test1"/

                                    /User-Password = "123456"/

                                    /NAS-IP-Address = 172.16.0.222/

                                    /NAS-Port = 12/

                                    /Message-Authenticator = 0x00/

                                    /Cleartext-Password = "123456"/

                                    /Received Access-Reject Id 136
                                    from 127.0.0.1:18120 to 0.0.0.0:0
                                    length 20/

                                    (0)/-: Expected Access-Accept got
                                    Access-Reject/

                                    Why am I rejected here ? Am I not
                                    supposed to use this test1 user to
                                    test RADIUS with the proxy module ?

                                    And finally, when I test this with
                                    a real network device, Unifi WAP
                                    for example, I don’t go anywhere.

                                    I see that NAD is added, here’s an
                                    entry from radius.log

                                    /Dec 28 07:42:46 PacketFence-ZEN
                                    auth[16806]: Adding client
                                    172.19.254.2/32 with shared secret
                                    "123456"/

                                    When I try to authenticate for an
                                    endpoint to a specific SSID I see
                                    this error in radius-acct.log

                                    /Dec 28 07:38:58 PacketFence-ZEN
                                    acct[16780]: Dropping packet
                                    without response because of error:
                                    Received Accounting-Request packet
                                    from client 172.19.254.2 with
                                    invalid Request Authenticator!
                                    (Shared secret is incorrect.)/

                                    I added this WAP under “Policies
                                    and access control” in Switches
                                    section using the shared secret as
                                    shown above and following the
                                    admin guide. What am I doing wrong ?

                                    Here’s how the switches.conf file
                                    looks like after I added this WAP:

                                    /[root@PacketFence-ZEN conf]# cat
                                    ./switches.conf/

                                    /[172.19.254.2]/

                                    /VoIPCDPDetect=N/

                                    /VoIPDHCPDetect=N/

                                    /deauthMethod=RADIUS/

                                    /description=Test-WAP/

                                    /VoIPLLDPDetect=N/

                                    /radiusSecret=123456/

                                    /VlanMap=N/

                                    Just to confirm, I’m not doing any
                                    inline mode, nor guest or web
                                    authentication, just pure
                                    WPA-Enterprise with RADIUS
                                    internal users identity store.

                                    Eugene







                                    
------------------------------------------------------------------------------

                                    Check out the vibrant tech community on one 
of the world's most

                                    engaging tech sites,Slashdot.org 
<http://Slashdot.org>!http://sdm.link/slashdot







                                    
_______________________________________________

                                    PacketFence-users mailing list

                                    [email protected]
                                    
<mailto:[email protected]>

                                    
https://lists.sourceforge.net/lists/listinfo/packetfence-users




--
                        Fabrice Durand

                        [email protected] <mailto:[email protected]>  ::  
+1.514.447.4918 (x135) ::www.inverse.ca <http://www.inverse.ca>

                        Inverse inc. :: Leaders behind SOGo 
(http://www.sogo.nu) and PacketFence (http://packetfence.org)

                        
------------------------------------------------------------------------------
                        Check out the vibrant tech community on one of
                        the world's most
                        engaging tech sites, Slashdot.org
                        <http://Slashdot.org>! http://sdm.link/slashdot

                        _______________________________________________
                        PacketFence-users mailing list
                        [email protected]
                        <mailto:[email protected]>
                        
https://lists.sourceforge.net/lists/listinfo/packetfence-users

            
------------------------------------------------------------------------------
            Check out the vibrant tech community on one of the world's
            most
            engaging tech sites, Slashdot.org <http://Slashdot.org>!
            http://sdm.link/slashdot

            _______________________________________________
            PacketFence-users mailing list
            [email protected]
            <mailto:[email protected]>
            https://lists.sourceforge.net/lists/listinfo/packetfence-users




        
------------------------------------------------------------------------------

        Check out the vibrant tech community on one of the world's most

        engaging tech sites,Slashdot.org 
<http://Slashdot.org>!http://sdm.link/slashdot




        _______________________________________________

        PacketFence-users mailing list

        [email protected]
        <mailto:[email protected]>

        https://lists.sourceforge.net/lists/listinfo/packetfence-users



--
    Fabrice Durand

    [email protected] <mailto:[email protected]>  ::  +1.514.447.4918 (x135) 
::www.inverse.ca <http://www.inverse.ca>

    Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)

    
------------------------------------------------------------------------------
    Check out the vibrant tech community on one of the world's most
    engaging tech sites, Slashdot.org <http://Slashdot.org>!
    http://sdm.link/slashdot

    _______________________________________________
    PacketFence-users mailing list
    [email protected]
    <mailto:[email protected]>
    https://lists.sourceforge.net/lists/listinfo/packetfence-users


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to