Hello Wifi Guy, Can you show me your profile.conf and authentication?
Hide personal information. Thanks, Ludovic Zammit lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) :: www.inverse.ca <http://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) and PacketFence (http://packetfence.org <http://packetfence.org/>) > On Nov 30, 2018, at 11:00 AM, Wifi Guy via PacketFence-users > <packetfence-users@lists.sourceforge.net> wrote: > > This is it not working for machine.... > > Node Information > <https://a3.skynet-home.co.uk:1443/admin/auditing#nodeInformation> > Device Information > <https://a3.skynet-home.co.uk:1443/admin/auditing#switchInformation> > RADIUS <https://a3.skynet-home.co.uk:1443/admin/auditing#radiusInformation> > MAC Address 8c:85:90:24:56:2a > Auth Status Accept > Auth Type eap > Auto Registration yes > Calling Station ID 8c:85:90:24:56:2a > Computer name PC1 > EAP Type TLS > Event Type Radius-Access-Request > IP Address > Is a Phone no > Node status reg > Domain > Profile Secure > Realm null > Reason > Role N/A > Source N/A > Stripped User Name host/PC1.skynet-home.co.uk > <http://pc1.skynet-home.co.uk/> > User Name host/PC1.skynet-home.co.uk <http://pc1.skynet-home.co.uk/> > Unique ID > Create at > 2018-11-30 15:59:47 > > > request_time 1 > RADIUS Request User-Name = "host/PC1.skynet-home.co.uk > <http://pc1.skynet-home.co.uk/>" NAS-IP-Address = 172.16.0.63 NAS-Port = 0 > Service-Type = Framed-User Framed-MTU = 1500 State = > 0x69a47a026f7477b337b5a73185ad654b Called-Station-Id = > "34:85:84:01:ad:e4:Secure" Calling-Station-Id = "8c:85:90:24:56:2a" > NAS-Identifier = "AP-Living Room" NAS-Port-Type = Wireless-802.11 > Acct-Session-Id = "97AE1E134BCDFF20" Acct-Multi-Session-Id = > "14EE5B922493DD46" Event-Timestamp = "Nov 30 2018 15:59:46 UTC" Connect-Info > = "11ac" EAP-Message = 0x02d000060d00 Message-Authenticator = > 0x5938ec0d8636f372977291ab5284b7c3 WLAN-Pairwise-Cipher = 1027076 > WLAN-Group-Cipher = 1027076 WLAN-AKM-Suite = 1027073 EAP-Type = TLS > Stripped-User-Name = "host/PC1.skynet-home.co.uk > <http://pc1.skynet-home.co.uk/>" Realm = "null" FreeRADIUS-Client-IP-Address > = 172.16.0.63 Called-Station-SSID = "Secure" Tmp-String-1 = "8c859024562a" > TLS-Cert-Serial = "40ba1f957d9defac4bb5cb77b86c839d" TLS-Cert-Expiration = > "231116144940Z" TLS-Cert-Issuer = > "/DC=uk/DC=co/DC=skynet-home/CN=skynet-home-CA" TLS-Cert-Subject = > "/DC=uk/DC=co/DC=skynet-home/CN=skynet-home-CA" TLS-Cert-Common-Name = > "skynet-home-CA" TLS-Client-Cert-Serial = > "6000000039b80f00dd8d7f8258000000000039" TLS-Client-Cert-Expiration = > "191130094831Z" TLS-Client-Cert-Issuer = > "/DC=uk/DC=co/DC=skynet-home/CN=skynet-home-CA" > TLS-Client-Cert-X509v3-Extended-Key-Usage = "TLS Web Client Authentication" > TLS-Client-Cert-X509v3-Subject-Key-Identifier = > "52:BD:9A:9B:D8:AD:71:57:DF:85:7D:45:CF:55:7D:21:1E:25:95:1B" > TLS-Client-Cert-X509v3-Authority-Key-Identifier = > "keyid:0B:28:C9:C3:08:39:78:F4:9B:F0:9A:0D:8E:E7:34:F0:65:B5:17:F7\n" > TLS-Client-Cert-Subject-Alt-Name-Dns = "PC1.skynet-home.co.uk > <http://pc1.skynet-home.co.uk/>" TLS-Client-Cert-Subject-Alt-Name-Upn = > "PC1$@skynet-home.co.uk <http://skynet-home.co.uk/>" > TLS-Client-Cert-X509v3-Extended-Key-Usage-OID = "1.3.6.1.5.5.7.3.2" > Attr-26.26928.1 = 0x00000000 Attr-26.26928.6 = 0x00000004 User-Password = > "******" SQL-User-Name = "host/PC1.skynet-home.co.uk > <http://pc1.skynet-home.co.uk/>" > RADIUS Reply MS-MPPE-Recv-Key = > 0x326817d7721fa00d316c92b6b5c3c7abce47e842d097cc69a097666c3069b501 > MS-MPPE-Send-Key = > 0x2ee8af1bcefb38b9d258e5d201bccfea1ad4deffd4d2eab456ea76113d2e265e EAP-MSK = > 0x326817d7721fa00d316c92b6b5c3c7abce47e842d097cc69a097666c3069b5012ee8af1bcefb38b9d258e5d201bccfea1ad4deffd4d2eab456ea76113d2e265e > EAP-EMSK = > 0x85fe135bbe618ec9a8982c8406095d81a3292de5f4fb74f7169a8bfa918939d3f06bf1db1c558ed02caf9fa3fa07b2d6af9c7188a2f7ef48252fb5ae82fcc747 > EAP-Session-Id = > 0x0d5c015d7e486efb06c2f3495018f9a0a2c18af148b5d31107a581ffa97d67d577a40013b29fc7c73e4afefe95cea7432dc0db0a4d445d498b160684c08f098211 > EAP-Message = 0x03d00004 Message-Authenticator = > 0x00000000000000000000000000000000 User-Name = "host/PC1.skynet-home.co.uk > <http://pc1.skynet-home.co.uk/>" > > This shows it working for user auth > > Node Information > <https://a3.skynet-home.co.uk:1443/admin/auditing#nodeInformation> > Device Information > <https://a3.skynet-home.co.uk:1443/admin/auditing#switchInformation> > RADIUS <https://a3.skynet-home.co.uk:1443/admin/auditing#radiusInformation> > MAC Address 8c:85:90:24:56:2a > Auth Status Accept > Auth Type eap > Auto Registration yes > Calling Station ID 8c:85:90:24:56:2a > Computer name PC1 > EAP Type TLS > Event Type Radius-Access-Request > IP Address > Is a Phone no > Node status reg > Domain > Profile Secure > Realm skynet-home.co.uk <http://skynet-home.co.uk/> > Reason > Role Corp > Source AD-Source > Stripped User Name Administrator > User Name administra...@skynet-home.co.uk > <mailto:administra...@skynet-home.co.uk> > Unique ID > Create at 2018-11-30 15:41:21 > > request_time 0 > RADIUS Request > RADIUS Reply MS-MPPE-Recv-Key = > 0xd2fb2f02da1a4880014f9aa15da91dbaf827b968eea350a9467cbaa384864e8b > MS-MPPE-Send-Key = > 0x3b9989e0b39d9a618ff68836eddde883b9374c7dc8734702ec2b6298f4acaded EAP-MSK = > 0xd2fb2f02da1a4880014f9aa15da91dbaf827b968eea350a9467cbaa384864e8b3b9989e0b39d9a618ff68836eddde883b9374c7dc8734702ec2b6298f4acaded > EAP-EMSK = > 0x152283637273fde4ce343bbd289615bfe1d235d7b016e632c596ba3afbc76b268d901ad0d03d74f4cc41d1bd0a7f9ff143fe907267bba73669d12bd3f8165770 > EAP-Session-Id = > 0x0d5c01592c4fc98e50464be9a2b6a20fc3644556096b63ea0d4d5ab60e63e7be99459699f3ba887243bfe5d4825a4b9c0f91a207b41fc7d926642e16af86e1a760 > EAP-Message = 0x03560004 Message-Authenticator = > 0x00000000000000000000000000000000 User-Name = > "administra...@skynet-home.co.uk <mailto:administra...@skynet-home.co.uk>" > Filter-Id = "Corp" > > Its seems that the role is not assigned for machine/computer auth??? > > The AD-source has the correct SPN applied as per the docs. > > Anyone got any tips? > > Thanks > Wi-Fi Guy > > > On Thu, 29 Nov 2018 at 18:30, Wifi Guy <wifisp...@gmail.com > <mailto:wifisp...@gmail.com>> wrote: > Thanks Bill. I had also thought this possible. Ideally all be one in one > place on one platform, we shall see where we get to. > > For anyone wanting to see the request, this is whats happening so far, > computer auth seems to not work.... > > RADIUS Request User-Name = "host/Comp2.skynet-home.co.uk > <http://comp2.skynet-home.co.uk/>" NAS-IP-Address = 172.16.0.63 NAS-Port = 0 > Service-Type = Framed-User Framed-MTU = 1500 State = > 0x4a59ea914ccce7c96fd408ff597208e6 Called-Station-Id = > "34:85:84:01:ad:e4:Secure" Calling-Station-Id = "8c:85:90:24:56:2a" > NAS-Identifier = "AP-Living Room" NAS-Port-Type = Wireless-802.11 > Acct-Session-Id = "8C377B2F5EC8C6E8" Acct-Multi-Session-Id = > "55DEB027006475D0" Event-Timestamp = "Nov 29 2018 18:26:02 UTC" Connect-Info > = "11ac" EAP-Message = 0x029500060d00 Message-Authenticator = > 0xf3d6630a0279319ddd21ec0038cb9fb2 WLAN-Pairwise-Cipher = 1027076 > WLAN-Group-Cipher = 1027076 WLAN-AKM-Suite = 1027073 EAP-Type = TLS > Stripped-User-Name = "host/Comp2.skynet-home.co.uk > <http://comp2.skynet-home.co.uk/>" Realm = "null" > FreeRADIUS-Client-IP-Address = 172.16.0.63 Called-Station-SSID = "Secure" > Tmp-String-1 = "8c859024562a" TLS-Cert-Serial = > "40ba1f957d9defac4bb5cb77b86c839d" TLS-Cert-Expiration = "231116144940Z" > TLS-Cert-Issuer = "/DC=uk/DC=co/DC=skynet-home/CN=skynet-home-CA" > TLS-Cert-Subject = "/DC=uk/DC=co/DC=skynet-home/CN=skynet-home-CA" > TLS-Cert-Common-Name = "skynet-home-CA" TLS-Client-Cert-Serial = > "600000002a559898304333138d00000000002a" TLS-Client-Cert-Expiration = > "191129095447Z" TLS-Client-Cert-Issuer = > "/DC=uk/DC=co/DC=skynet-home/CN=skynet-home-CA" > TLS-Client-Cert-X509v3-Extended-Key-Usage = "TLS Web Client Authentication" > TLS-Client-Cert-X509v3-Subject-Key-Identifier = > "EB:D0:BA:71:7B:BC:9F:D4:B5:FA:0F:2F:6A:95:9F:C1:E5:BC:B8:28" > TLS-Client-Cert-X509v3-Authority-Key-Identifier = > "keyid:0B:28:C9:C3:08:39:78:F4:9B:F0:9A:0D:8E:E7:34:F0:65:B5:17:F7\n" > TLS-Client-Cert-Subject-Alt-Name-Dns = "Comp2.skynet-home.co.uk > <http://comp2.skynet-home.co.uk/>" TLS-Client-Cert-Subject-Alt-Name-Upn = > "COMP2$@skynet-home.co.uk <http://skynet-home.co.uk/>" > TLS-Client-Cert-X509v3-Extended-Key-Usage-OID = "1.3.6.1.5.5.7.3.2" > Attr-26.26928.1 = 0x00000000 Attr-26.26928.6 = 0x00000004 User-Password = > "******" SQL-User-Name = "host/Comp2.skynet-home.co.uk > <http://comp2.skynet-home.co.uk/>" > RADIUS Reply MS-MPPE-Recv-Key = > 0x2537ef4f41cf418e01bb08dc2d7d2805a6474a6385f6f3339ffdce5d3a27cc7b > MS-MPPE-Send-Key = > 0xa009111ab01003ef31da762261b75ad1de387d2b2d1947734667b2ac76a19945 EAP-MSK = > 0x2537ef4f41cf418e01bb08dc2d7d2805a6474a6385f6f3339ffdce5d3a27cc7ba009111ab01003ef31da762261b75ad1de387d2b2d1947734667b2ac76a19945 > EAP-EMSK = > 0x956f280f1fe7599572c8ad65a88f18f7b1dca087e2fa8ae49474301ba63d1a728f2c372b9edcb2474c7999d6b18b6f1d1eb1ca46b7e5e20bd0e4bbbe6fc512a9 > EAP-Session-Id = > 0x0d5c002e455258a0a13ea478d0252c9efdb0790555d37f5d27c5a4d2805bc89eb9182f7d037da2b3c163e44c9214c05d1a1659afc33651323e83856864a3009a3f > EAP-Message = 0x03950004 Message-Authenticator = > 0x00000000000000000000000000000000 User-Name = "host/Comp2.skynet-home.co.uk > <http://comp2.skynet-home.co.uk/>" > > > On Thu, 29 Nov 2018 at 13:37, Bill Rosenbaum <brose...@mc3.edu > <mailto:brose...@mc3.edu>> wrote: > We have considered something similar in our environment, but haven’t yet > spent the time that you have to evaluate and test. > > > > One thing that we considered to help with distinguishing college issued vs. > BYOD, was to leverage different CA’s for issuing certificates. Use Active > Directory Certificate Services for college issued devices, and a separate CA > (Packetfence PKI or 3rd party SecureW2…Cloudpath…etc). Then leverage the > difference in certificate issuer in the role assignment process. Again, all > theoretical and not sure if it would work or worth the overhead, but thought > I would share the thought in case it helps. > > > > If it doesn’t help, I appreciate any feedback that will help us to avoid > wasting time when we get further down this path. Thanks – Bill > > > > > > Bill Rosenbaum > > Director of IT Security > > Montgomery County Community College > > brose...@mc3.edu <mailto:brose...@mc3.edu> | (215) 641-6677 > > > > > > > > From: Wifi Guy via PacketFence-users <packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net>> > Sent: Thursday, November 29, 2018 6:03 AM > To: packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net> > Cc: Wifi Guy <wifisp...@gmail.com <mailto:wifisp...@gmail.com>> > Subject: [PacketFence-users] EAP-TLS Computer and User Auth > > > > Good Morning all, > > > > I have managed to get very far to date with my installation. > > > > Howver I am struggling with the last piece of the puzzle, how to handle BYOD > device that authenticate via EAP-TLS (onboarding process) and distinguishing > that with corp users. > > > > So I thought the best way to handle this is that for Corp users that > authenticate with EAP-TLS will use Machine Auth and be assigned into a > machine role and other users will be assigned into a BYOD policy. Is this the > best approach? > > > > So to the setup I managed to get a reg vlan setup. This allows users who are > not part of the domain to authenticate via a CWP. There are provisioners > setup to assign the device the TLS cert. This works great! :) > > > > For my corp machines, currently the GPO etc are setup. User and computer > certs are sent on domain join, so no issues with auto enrollment. Also the > machine has the SSID specified with TLS set and the option computer > authentication selected. In an ideal world I would be able to chain the > authentication (something like TEAP) where computer auth happens at login and > then user auth happens at login. But I cant see a way to do this without > breaking the BYOD issue? > > > > My question is what should the GUI setup look like? Currently I have two > internal AD sources, one for computer auth (servicePrincipalName) and one for > user auth. For the documentation its not clear how the connection profiles > should look? What order things should be in and if I am looking at this the > wrong way. > > > > Any advice, help etc would be much helpful. > > > > WiFiGuy > > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users