Hello Carlos,
can you check in packetfence.log if you see the eap-tls authentication
coming ?
It's a line like that:
packetfence_httpd.aaa: httpd.aaa(2265) INFO: [mac:00:11:22:33:44:55]
handling radius autz request: from switch_ip => (10.0.0.1),
connection_type => Wireless-802.1
1-NoEAP,switch_mac => (ff:24:8d:79:8c:24), mac => [00:11:22:33:44:55],
port => 3, username => "001122334455, ssid => bob (pf::radius::authorize)
And if it exist can you paste what you have after that?
If there is no line like that then it mean that the eap-tls
authentication failled on the freeradius side.
Regards
Fabrice
Le 19-02-15 à 10 h 50, Carlos Wetli via PacketFence-users a écrit :
Hello,
I am trying to do machine authentication against AD (EAP-TLS) and i am
not sure that the authentication is successful. How can i check that
the authentication over AD is successful (logfiles/node audit)? If not
successfull, how can i check which authentication source is considered
during authentication.
What I can see for now is the following:
(11) Fri Feb 15 16:19:50 2019: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) {
(11) Fri Feb 15 16:19:50 2019: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) -> FALSE
(11) Fri Feb 15 16:19:50 2019: Debug: } # policy filter_password =
updated
(11) Fri Feb 15 16:19:50 2019: Debug: [preprocess] = ok
(11) Fri Feb 15 16:19:50 2019: Debug: suffix: Checking for suffix
after "@"
(11) Fri Feb 15 16:19:50 2019: Debug: suffix: No '@' in User-Name =
"host/M-1.ad.cwe.local", skipping NULL due to config.
(11) Fri Feb 15 16:19:50 2019: Debug: [suffix] = noop
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: Checking for prefix
before "\"
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: No '\' in User-Name =
"host/M-1.ad.cwe.local", looking up realm NULL
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: Found realm "null"
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: Adding
Stripped-User-Name = "host/M-1.ad.cwe.local"
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: Adding Realm = "null"
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: Authentication realm
is LOCAL
(11) Fri Feb 15 16:19:50 2019: Debug: [ntdomain] = ok
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Peer sent EAP Response
(code 2) ID 9 length 6
(11) Fri Feb 15 16:19:50 2019: Debug: eap: No EAP Start, assuming it's
an on-going EAP conversation
(11) Fri Feb 15 16:19:50 2019: Debug: [eap] = updated
(11) Fri Feb 15 16:19:50 2019: Debug: if ( !EAP-Message ) {
(11) Fri Feb 15 16:19:50 2019: Debug: if ( !EAP-Message ) -> FALSE
(11) Fri Feb 15 16:19:50 2019: Debug: policy
packetfence-eap-mac-policy {
(11) Fri Feb 15 16:19:50 2019: Debug: if ( &EAP-Type ) {
(11) Fri Feb 15 16:19:50 2019: Debug: if ( &EAP-Type ) -> TRUE
(11) Fri Feb 15 16:19:50 2019: Debug: if ( &EAP-Type ) {
(11) Fri Feb 15 16:19:50 2019: Debug: if (&User-Name &&
(&User-Name =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(11) Fri Feb 15 16:19:50 2019: Debug: if (&User-Name &&
(&User-Name =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
-> FALSE
(11) Fri Feb 15 16:19:50 2019: Debug: } # if ( &EAP-Type ) =
updated
(11) Fri Feb 15 16:19:50 2019: Debug: [noop] = noop
(11) Fri Feb 15 16:19:50 2019: Debug: } # policy
packetfence-eap-mac-policy = updated
(11) Fri Feb 15 16:19:50 2019: WARNING: pap:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(11) Fri Feb 15 16:19:50 2019: WARNING: pap: !!! Ignoring
control:User-Password. Update your !!!
(11) Fri Feb 15 16:19:50 2019: WARNING: pap: !!! configuration so that
the "known good" clear text !!!
(11) Fri Feb 15 16:19:50 2019: WARNING: pap: !!! password is in
Cleartext-Password and NOT in !!!
(11) Fri Feb 15 16:19:50 2019: WARNING: pap: !!!
User-Password. !!!
(11) Fri Feb 15 16:19:50 2019: WARNING: pap:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(11) Fri Feb 15 16:19:50 2019: Debug: [pap] = noop
(11) Fri Feb 15 16:19:50 2019: Debug: } # authorize = updated
(11) Fri Feb 15 16:19:50 2019: Debug: Found Auth-Type = eap
(11) Fri Feb 15 16:19:50 2019: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(11) Fri Feb 15 16:19:50 2019: Debug: authenticate {
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Expiring EAP session with
state 0x4ef4a14549fdace8
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Finished EAP session with
state 0x4ef4a14549fdace8
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Previous EAP request found
for state 0x4ef4a14549fdace8, released from the list
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Peer sent packet with
method EAP TLS (13)
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Calling submodule eap_tls
to process data
(11) Fri Feb 15 16:19:50 2019: Debug: eap_tls: Continuing EAP-TLS
(11) Fri Feb 15 16:19:50 2019: Debug: eap_tls: Peer ACKed our
handshake fragment. handshake is finished
(11) Fri Feb 15 16:19:50 2019: Debug: eap_tls: [eaptls verify] = success
(11) Fri Feb 15 16:19:50 2019: Debug: eap_tls: [eaptls process] = success
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Sending EAP Success (code
3) ID 9 length 4
(11) Fri Feb 15
I have followed the instruction already seen on the support page,
which is to :
- create a profile with a rule eap for the authentication
- create an authentication source for the machine authentication
- create a realm towards the AD
When browsing the AD manually, i can see my host in the correct Base
Search DN.
Thank you for a short advice,
Regards,
Carlos
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users