Hello Carlos,
my remark below.
Le 19-02-18 à 09 h 04, Carlos Wetli via PacketFence-users a écrit :
Hello Fabrice,
Many thanks Fabrice for your reply on that matter, which is very
appreciated.
Please find enclosed the extract as you suggested:
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) INFO:
[mac:80:ce:62:a1:2e:75] handling radius autz request: from switch_ip
=> (172.29.180.68), connection_type => Ethernet-EAP,switch_mac =>
(70:35:09:b9:d2:03), mac => [80:ce:62:a1:2e:75], port => 50103,
username => "[email protected]" (pf::radius::authorize)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) INFO:
[mac:80:ce:62:a1:2e:75] Instantiate profile AD_LOGIN
(pf::Connection::ProfileFactory::_from_profile)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) INFO:
[mac:80:ce:62:a1:2e:75] Found authentication source(s) : '' for realm
'null' (pf::config::util::filter_authentication_sources)
realm is null , do you have a realm ad.cwe.local configured in packetfence ?
Also in your AD_LOGIN connection profile, does the source you defined is
configured to match the null realm ? (or ad.cwe.local) (edit the
authentication source)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Calling match with empty/invalid rule class.
Defaulting to 'authentication' (pf::authentication::match2)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) INFO:
[mac:80:ce:62:a1:2e:75] Using sources for matching
(pf::authentication::match2)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value in string eq at
/usr/local/pf/lib/pf/role.pm <http://role.pm> line 736.
(pf::role::_check_bypass)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) INFO:
[mac:80:ce:62:a1:2e:75] Role has already been computed and we don't
want to recompute it. Getting role from node_info
(pf::role::getRegisteredRole)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $role in
concatenation (.) or string at /usr/local/pf/lib/pf/role.pm
<http://role.pm> line 478.
(pf::role::getRegisteredRole)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) INFO:
[mac:80:ce:62:a1:2e:75] Username was NOT defined or unable to match a
role - returning node based role '' (pf::role::getRegisteredRole)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) INFO:
[mac:80:ce:62:a1:2e:75] PID: "[email protected]", Status: reg Returned
VLAN: (undefined), Role: (undefined) (pf::role::fetchRoleForNode)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $vlanName in hash
element at /usr/local/pf/lib/pf/Switch.pm line 792.
(pf::Switch::getVlanByName)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $vlanName in
concatenation (.) or string at /usr/local/pf/lib/pf/Switch.pm line 795.
(pf::Switch::getVlanByName)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] No parameter Vlan found in conf/switches.conf
for the switch 172.29.180.68 (pf::Switch::getVlanByName)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $roleName in hash
element at /usr/local/pf/lib/pf/Switch.pm line 775.
(pf::Switch::getRoleByName)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $roleName in
concatenation (.) or string at /usr/local/pf/lib/pf/Switch.pm line 778.
(pf::Switch::getRoleByName)
Feb 18 13:43:49 srv1 pfqueue: pfqueue(11366) INFO: [mac:unknown]
undefined source id provided (pf::lookup::person::lookup_person)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) INFO:
[mac:80:ce:62:a1:2e:75] Match rule 1:eap (pf::access_filter::radius::test)
It match a rule in the radius filter but there is no answer1.
Can you share the radius filters ?
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $answer[1] in
pattern match (m//) at /usr/local/pf/lib/pf/access_filter/radius.pm
<http://radius.pm> line 69.
(pf::access_filter::radius::handleAnswerInRule)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $range in pattern
match (m//) at /usr/local/pf/lib/pf/access_filter/radius.pm
<http://radius.pm> line 174.
(pf::access_filter::radius::rangeValidator)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $item in pattern
match (m//) at /usr/share/perl5/vendor_perl/Number/Range.pm line 43.
(Number::Range::initialize)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $item in split at
/usr/share/perl5/vendor_perl/Number/Range.pm line 44.
(Number::Range::initialize)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $answer in
substitution (s///) at /usr/local/pf/lib/pf/access_filter/radius.pm
<http://radius.pm> line 147.
(pf::access_filter::radius::evalParam)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $answer in
substitution (s///) at /usr/local/pf/lib/pf/access_filter/radius.pm
<http://radius.pm> line 148.
(pf::access_filter::radius::evalParam)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value $return in split at
/usr/local/pf/lib/pf/access_filter/radius.pm <http://radius.pm> line 128.
(pf::access_filter::radius::evalAnswer)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value in substitution
(s///) at /usr/local/pf/lib/pf/access_filter/radius.pm
<http://radius.pm> line 129.
(pf::access_filter::radius::evalAnswer)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) WARN:
[mac:80:ce:62:a1:2e:75] Use of uninitialized value in hash element at
/usr/local/pf/lib/pf/access_filter/radius.pm <http://radius.pm> line 133.
(pf::access_filter::radius::evalAnswer)
Feb 18 13:43:49 srv1 packetfence_httpd.aaa: httpd.aaa(8458) INFO:
[mac:80:ce:62:a1:2e:75] violation 1300003 force-closed for
80:ce:62:a1:2e:75 (pf::violation::violation_force_close)
Regards
Fabrice
Many thanks for you support and any possbile hint.
Regards,
carlos
Am Sa., 16. Feb. 2019 um 00:26 Uhr schrieb Durand fabrice via
PacketFence-users <[email protected]
<mailto:[email protected]>>:
Hello Carlos,
can you check in packetfence.log if you see the eap-tls
authentication coming ?
It's a line like that:
packetfence_httpd.aaa: httpd.aaa(2265) INFO:
[mac:00:11:22:33:44:55] handling radius autz request: from
switch_ip => (10.0.0.1), connection_type => Wireless-802.1
1-NoEAP,switch_mac => (ff:24:8d:79:8c:24), mac =>
[00:11:22:33:44:55], port => 3, username => "001122334455, ssid =>
bob (pf::radius::authorize)
And if it exist can you paste what you have after that?
If there is no line like that then it mean that the eap-tls
authentication failled on the freeradius side.
Regards
Fabrice
Le 19-02-15 à 10 h 50, Carlos Wetli via PacketFence-users a écrit :
Hello,
I am trying to do machine authentication against AD (EAP-TLS) and
i am not sure that the authentication is successful. How can i
check that the authentication over AD is successful
(logfiles/node audit)? If not successfull, how can i check which
authentication source is considered during authentication.
What I can see for now is the following:
(11) Fri Feb 15 16:19:50 2019: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) {
(11) Fri Feb 15 16:19:50 2019: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) -> FALSE
(11) Fri Feb 15 16:19:50 2019: Debug: } # policy
filter_password = updated
(11) Fri Feb 15 16:19:50 2019: Debug: [preprocess] = ok
(11) Fri Feb 15 16:19:50 2019: Debug: suffix: Checking for suffix
after "@"
(11) Fri Feb 15 16:19:50 2019: Debug: suffix: No '@' in User-Name
= "host/M-1.ad.cwe.local", skipping NULL due to config.
(11) Fri Feb 15 16:19:50 2019: Debug: [suffix] = noop
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: Checking for
prefix before "\"
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: No '\' in
User-Name = "host/M-1.ad.cwe.local", looking up realm NULL
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: Found realm "null"
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: Adding
Stripped-User-Name = "host/M-1.ad.cwe.local"
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: Adding Realm = "null"
(11) Fri Feb 15 16:19:50 2019: Debug: ntdomain: Authentication
realm is LOCAL
(11) Fri Feb 15 16:19:50 2019: Debug: [ntdomain] = ok
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Peer sent EAP Response
(code 2) ID 9 length 6
(11) Fri Feb 15 16:19:50 2019: Debug: eap: No EAP Start, assuming
it's an on-going EAP conversation
(11) Fri Feb 15 16:19:50 2019: Debug: [eap] = updated
(11) Fri Feb 15 16:19:50 2019: Debug: if ( !EAP-Message ) {
(11) Fri Feb 15 16:19:50 2019: Debug: if ( !EAP-Message ) ->
FALSE
(11) Fri Feb 15 16:19:50 2019: Debug: policy
packetfence-eap-mac-policy {
(11) Fri Feb 15 16:19:50 2019: Debug: if ( &EAP-Type ) {
(11) Fri Feb 15 16:19:50 2019: Debug: if ( &EAP-Type ) -> TRUE
(11) Fri Feb 15 16:19:50 2019: Debug: if ( &EAP-Type ) {
(11) Fri Feb 15 16:19:50 2019: Debug: if (&User-Name &&
(&User-Name =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(11) Fri Feb 15 16:19:50 2019: Debug: if (&User-Name &&
(&User-Name =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
-> FALSE
(11) Fri Feb 15 16:19:50 2019: Debug: } # if ( &EAP-Type )
= updated
(11) Fri Feb 15 16:19:50 2019: Debug: [noop] = noop
(11) Fri Feb 15 16:19:50 2019: Debug: } # policy
packetfence-eap-mac-policy = updated
(11) Fri Feb 15 16:19:50 2019: WARNING: pap:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(11) Fri Feb 15 16:19:50 2019: WARNING: pap: !!! Ignoring
control:User-Password. Update your !!!
(11) Fri Feb 15 16:19:50 2019: WARNING: pap: !!! configuration so
that the "known good" clear text !!!
(11) Fri Feb 15 16:19:50 2019: WARNING: pap: !!! password is in
Cleartext-Password and NOT in !!!
(11) Fri Feb 15 16:19:50 2019: WARNING: pap: !!! User-Password. !!!
(11) Fri Feb 15 16:19:50 2019: WARNING: pap:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(11) Fri Feb 15 16:19:50 2019: Debug: [pap] = noop
(11) Fri Feb 15 16:19:50 2019: Debug: } # authorize = updated
(11) Fri Feb 15 16:19:50 2019: Debug: Found Auth-Type = eap
(11) Fri Feb 15 16:19:50 2019: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(11) Fri Feb 15 16:19:50 2019: Debug: authenticate {
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Expiring EAP session
with state 0x4ef4a14549fdace8
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Finished EAP session
with state 0x4ef4a14549fdace8
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Previous EAP request
found for state 0x4ef4a14549fdace8, released from the list
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Peer sent packet with
method EAP TLS (13)
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Calling submodule
eap_tls to process data
(11) Fri Feb 15 16:19:50 2019: Debug: eap_tls: Continuing EAP-TLS
(11) Fri Feb 15 16:19:50 2019: Debug: eap_tls: Peer ACKed our
handshake fragment. handshake is finished
(11) Fri Feb 15 16:19:50 2019: Debug: eap_tls: [eaptls verify] =
success
(11) Fri Feb 15 16:19:50 2019: Debug: eap_tls: [eaptls process] =
success
(11) Fri Feb 15 16:19:50 2019: Debug: eap: Sending EAP Success
(code 3) ID 9 length 4
(11) Fri Feb 15
I have followed the instruction already seen on the support page,
which is to :
- create a profile with a rule eap for the authentication
- create an authentication source for the machine authentication
- create a realm towards the AD
When browsing the AD manually, i can see my host in the correct
Base Search DN.
Thank you for a short advice,
Regards,
Carlos
_______________________________________________
PacketFence-users mailing list
[email protected]
<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users