Hi Fabrice,
You were right.  As soon as I changed the Auth Source for Domain Computers to 
MemberOf is CN=Domain Computers,OU=Domain Groups,DC=eatontown,DC=local it 
worked the only caveat being that on the client I had to manually add the ssid 
and make sure I set to not check the certificate.  
To eliminate the need to manually add the ssid to the client I created and 
imported a cert from our MSPKI by doing what is on page 215 of the Installation 
Guide and all good now.  The machines join no problem.  The only thing is none 
of the settings I updated in the eap.conf file appear in the PacketFence Admin 
Web Portal.  
Everything in the following sections are still showing what appeared before I 
made the changes to the eap.conf file.  System Configuration > Radius > EAP 
Profiles  System Configuration > Radius > TLS Profiles
System Configuration > SSL Certificates > Radius 

Shouldn't the changes I made be reflected somewhere in the portal?  
Thanks again for the help.  


    On Monday, July 6, 2020, 10:13:31 PM EDT, Durand fabrice 
<fdur...@inverse.ca> wrote:  
 
   

 
 Le 20-07-06 à 22 h 01, Michael Brown a écrit :
  
  Hi Fabrice, 
  When I do a test from the AD_Domain-Computers Auth Source I get a green 
check. 
   
 Ok good.
 
  
  Here is the authentication.conf 
  Thanks for the help. 
    # Copyright (C) Inverse inc. [local] description=Local Users type=SQL 
  [file1] description=Legacy Source path=/usr/local/pf/conf/admin.conf 
type=Htpasswd realms=null 
  [file1 rule admins] description=All admins class=administration match=all 
action0=set_access_level=ALL status=enabled 
  [sms] description=SMS-based registration 
sms_carriers=100056,100057,100061,100058,100059,100060,100062,100063,100071,100064,100116,100066,100117,100112,100067,100065,100068,100069,100070,100118,100115,100072,100073,100074,100075,100076,100077,100085,100086,100080,100079,100081,100083,100082,100084,100087,100088,100111,100089,100090,100091,100092,100093,100094,100095,100096,100098,100097,100099,100100,100101,100113,100102,100103,100104,100106,100105,100107,100108,100109,100114,100110,100078,100119,100120,100121,100122,100123,100124,100125,100126,100127,100128
 type=SMS create_local_account=no 
  [sms rule catchall] description= class=authentication match=all 
action0=set_role=guest action1=set_access_duration=1D status=enabled 
  [email] description=Email-based registration email_activation_timeout=10m 
type=Email allow_localdomain=yes create_local_account=no 
  [email rule catchall] description= class=authentication match=all 
action0=set_role=guest action1=set_access_duration=1D status=enabled 
  [sponsor] description=Sponsor-based registration type=SponsorEmail 
allow_localdomain=yes create_local_account=no 
  [sponsor rule catchall] description= class=authentication match=all 
action0=set_role=guest action1=set_access_duration=1D status=enabled 
  [null] description=Null Source type=Null email_required=no 
set_access_durations_action= 
  [null rule catchall] action0=set_role=empty - None status=enabled match=all 
class=authentication action1=set_access_duration=1D description=catchall 
  [AD-Faculty] cache_match=0 read_timeout=10 realms=domain.org,null 
basedn=OU=Domain_Users,DC=domain,DC=local monitor=1 password=xxxxxxxxxx 
shuffle=0 searchattributes= set_access_durations_action= scope=sub 
email_attribute=mail usernameattribute=sAMAccountName connection_timeout=1 
binddn=CN=Admin\, PacketFence,OU=IT Utilty 
Accounts,OU=Domain_Users,DC=domain,DC=local encryption=none description=Active 
Directory - Faculty All port=389 host=172.20.10.2 write_timeout=5 type=AD 
  [AD-Faculty rule Faculty_All] action0=set_role=default 
condition0=groupMembership,is member of,CN=Faculty - All,OU=Domain 
Groups,DC=domain,DC=local status=enabled match=all class=authentication 
action1=set_access_duration=1h 
  [AD_Domain-Computers] cache_match=0 read_timeout=10 realms=domain.local 
basedn=DC=domain,DC=local monitor=1 password=xxxxxxxxxx shuffle=0 
searchattributes= set_access_durations_action= scope=sub email_attribute=mail 
usernameattribute=servicePrincipalName connection_timeout=1 binddn=CN=Admin\, 
PacketFence,OU=IT Utilty Accounts,OU=Domain_Users,DC=domain,DC=local 
encryption=none description=Active Directory - Domain Computers port=389 
host=172.20.10.2 write_timeout=5 type=AD 
  [AD_Domain-Computers rule Domain_Computers] action0=set_role=default 
condition0=groupMembership,is member of,CN=Domain Computers,OU=Domain 
Groups,DC=domain,DC=local status=enabled match=all class=authentication 
action1=set_access_duration=1h 
     
 
This one probably don't work (Domain_Computers) can you just test without 
condition ?
 
In fact if the dn of the computer is defined in the group then it's 
groupMembership is member of ....
 
If in the dn of the group is define in the computer object then it's memberof 
is ....
 
You can check that with adsiedit.msc or with advanced view in "users and 
computers"
 
regards
 
Fabrice
 

 
 
    [EAPTLS rule Test] action0=set_access_duration=1h 
condition0=SSID,equals,WIFI-EPS status=enabled match=all class=authentication 
action1=set_role=guest 
   
  
      On Monday, July 6, 2020, 09:04:24 PM EDT, Durand fabrice 
<fdur...@inverse.ca> wrote:  
  
     
Hello Michael,
 

 
 Le 20-07-06 à 10 h 37, Michael Brown a écrit :
  
 
    Hey Fabrice, 
  Removed the Host realm, added the domain.local realm.  I set this realm to 
not strip on radius.  Is that correct? 
   yes it 's ok
 
  Still getting can't connect to this network on the test device.   
  Here are the two logs: Radius.log (on the second attempt to join the ssid 
shown below I unchecked verify the server's identity by validating the 
certificate on the Windows machine)   
Jul  6 00:33:32 srv-pf-02 auth[29301]: Adding client 172.20.110.141/32
 
Jul  6 00:33:33 srv-pf-02 auth[29301]: (52074) eap_peap: ERROR: TLS Alert 
read:fatal:unknown CA
 
Jul  6 00:33:33 srv-pf-02 auth[29301]: (52074) eap_peap: ERROR: TLS_accept: 
Failed in error
 
Jul  6 00:33:33 srv-pf-02 auth[29301]: (52074) eap_peap: ERROR: Failed in 
__FUNCTION__ (SSL_read)
 
Jul  6 00:33:33 srv-pf-02 auth[29301]: [mac:00:e0:4c:19:dd:56] Rejected user: 
host/IT-VM-TEST.domain.local
 Jul  6 00:33:33 srv-pf-02 auth[29301]: (52074) Login incorrect (eap_peap: TLS 
Alert read:fatal:unknown CA): [host/IT-VM-TEST. domain.local] (from client 
172.20.110.141/32 port 1 cli 00:e0:4c:19:dd:56) Jul  6 00:34:40 srv-pf-02 
auth[29301]: (52087)   Rejected in post-auth: [host/IT-VM-TEST. domain.local] 
(from client 172.20.110.141/32 port 1 cli 00:e0:4c:19:dd:56 via TLS tunnel)    
 It mean that it's rejected in packetfence and not in freeradius, so the 802.1x 
works.
 
    Jul  6 00:34:40 srv-pf-02 auth[29301]: (52087)   Login incorrect: 
[host/IT-VM-TEST. domain.local] (from client 172.20.110.141/32 port 1 cli 
00:e0:4c:19:dd:56 via TLS tunnel) Jul  6 00:34:40 srv-pf-02 auth[29301]: 
[mac:00:e0:4c:19:dd:56] Rejected user: host/IT-VM-TEST. domain.local Jul  6 
00:34:40 srv-pf-02 auth[29301]: (52088) Login incorrect (eap_peap: The users 
session was previously rejected: returning reject (again.)): [host/IT-VM-TEST. 
domain.local] (from client 172.20.110.141/32 port 1 cli 00:e0:4c:19:dd:56)  
  packetfence.log   
Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) WARN: 
[mac:00:e0:4c:19:dd:56] Unable to extract audit-session-id for module 
pf::Switch::Meraki::MR_v2. SSID-based VLAN assignments won't work. Make sure 
you enable Vendor Specific Attributes (VSA) on the AP if you want them to work. 
(pf::Switch::getCiscoAvPairAttribute)
 Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) INFO: 
[mac:00:e0:4c:19:dd:56] handling radius autz request: from switch_ip => 
(172.20.110.141), connection_type => Wireless-802.11-EAP,switch_mac => 
(92:18:98:40:47:69), mac => [00:e0:4c:19:dd:56], port => 1, username => 
"host/IT-VM-TEST. domain.local", ssid => WIFI-EPS (pf::radius::authorize) Jul  
6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) INFO: 
[mac:00:e0:4c:19:dd:56] is doing machine auth with account 'host/IT-VM-TEST. 
domain.local'. (pf::radius::authorize) 
Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) INFO: 
[mac:00:e0:4c:19:dd:56] Instantiate profile EPS-Wifi 
(pf::Connection::ProfileFactory::_from_profile)
 Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) INFO: 
[mac:00:e0:4c:19:dd:56] Found authentication source(s) : 'AD_Domain-Computers' 
for realm ' domain.local'(pf::config::util::filter_authentication_sources) 
Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) INFO: 
[mac:00:e0:4c:19:dd:56] Using sources AD_Domain-Computers for matching 
(pf::authentication::match2)
 Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) WARN: 
[mac:00:e0:4c:19:dd:56] [AD_Domain-Computers Domain_Computers] Searching for 
(servicePrincipalName=host/IT-VM-TEST. domain.local), from DC= domain,DC=local, 
with scope sub (pf::Authentication::Source::LDAPSource::match_in_subclass) 
Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) INFO: 
[mac:00:e0:4c:19:dd:56] LDAP testing connection (pf::LDAP::expire_if)
 
Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) ERROR: 
[mac:00:e0:4c:19:dd:56] Error binding: 'Connection reset by peer' 
(pf::LDAP::log_error_msg)
    
 Error binding, can you check from the source itself when you click on test 
that it works ?
 
    
Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) WARN: 
[mac:00:e0:4c:19:dd:56] LDAP connection expired (pf::LDAP::expire_if)
 
Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) INFO: 
[mac:00:e0:4c:19:dd:56] No rules matches or no category defined for the node, 
set it as unreg. (pf::role::getNodeInfoForAutoReg)
    
 There is no rules that matched in the AD_Domain-Computers, can you paste the 
content of authentication.conf (remove sensible info).
 
    
Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) WARN: 
[mac:00:e0:4c:19:dd:56] No category computed for autoreg 
(pf::role::getNodeInfoForAutoReg)
 Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) WARN: 
[mac:00:e0:4c:19:dd:56] No role specified or found for pid host/IT-VM-TEST. 
domain.local (MAC 00:e0:4c:19:dd:56); assume maximum number of registered nodes 
is reached (pf::node::is_max_reg_nodes_reached) Jul  6 00:34:40 srv-pf-02 
packetfence_httpd.aaa: httpd.aaa(1907) ERROR: [mac:00:e0:4c:19:dd:56] no role 
computed by any sources - registration of 00:e0:4c:19:dd:56 to host/IT-VM-TEST. 
domain.local failed (pf::registration::setup_node_for_registration) 
Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) ERROR: 
[mac:00:e0:4c:19:dd:56] auto-registration of node failed no role computed by 
any sources (pf::radius::authorize)
 Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) ERROR: 
[mac:00:e0:4c:19:dd:56] Database query failed with non retryable error: Cannot 
add or update a child row: a foreign key constraint fails (`pf`.`node`, 
CONSTRAINT `0_57` FOREIGN KEY (`tenant_id`, `pid`) REFERENCES `person` 
(`tenant_id`, `pid`) ON DELETE CASCADE ON UPDATE CASCADE) (errno: 1452) [INSERT 
INTO `node` ( `autoreg`, `bandwidth_balance`, `bypass_role_id`, `bypass_vlan`, 
`category_id`, `computername`, `detect_date`, `device_class`, 
`device_manufacturer`, `device_score`, `device_type`, `device_version`, 
`dhcp6_enterprise`, `dhcp6_fingerprint`, `dhcp_fingerprint`, `dhcp_vendor`, 
`last_arp`, `last_dhcp`, `last_seen`, `lastskip`, `mac`, `machine_account`, 
`notes`, `pid`, `regdate`, `sessionid`, `status`, `tenant_id`, `time_balance`, 
`unregdate`, `user_agent`, `voip`) VALUES ( ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, 
?, ?, ?, ?, ?, ?, NOW(), ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ? ) ON DUPLICATE 
KEY UPDATE `autoreg` = ?, `last_seen` = NOW(), `machine_account` = ?, `pid` = 
?, `tenant_id` = ?]{yes, NULL, NULL, NULL, NULL, NULL, 2020-07-06 00:09:30, 
NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, 0000-00-00 00:00:00, 
0000-00-00 00:00:00, 0000-00-00 00:00:00, 00:e0:4c:19:dd:56, host/IT-VM-TEST. 
domain.local, NULL, host/IT-VM-TEST. domain.local, 0000-00-00 00:00:00, NULL, 
unreg, 1, NULL, 0000-00-00 00:00:00, NULL, no, yes, host/IT-VM-TEST. 
domain.local, host/IT-VM-TEST. domain.local, 1} (pf::dal::db_execute) 
Jul  6 00:34:40 srv-pf-02 packetfence_httpd.aaa: httpd.aaa(1907) ERROR: 
[mac:00:e0:4c:19:dd:56] Cannot save 00:e0:4c:19:dd:56 error (500) 
(pf::radius::authorize)
  
  Thanks. Mike 
   
 
Regards
  
Fabrice
 

 
 
  
      On Sunday, July 5, 2020, 08:22:42 PM EDT, Durand fabrice via 
PacketFence-users <packetfence-users@lists.sourceforge.net> wrote:  
  
     
Hello Michael,
 

 
 Le 20-06-30 à 00 h 02, Michael Brown via PacketFence-users a écrit :
  
 
      Hi Guys, 
  I am trying to get machine authentication working so that if a machine is a 
member of the Active Directory Domain Computers group it will join wifi without 
prompting the user for anything.   
  The access points are all Meraki.  
  
  On packetfence I have the following: Connection Profile  Automatically 
register devices is turned on Connection Type = Wireless-802.11 EAP 
  Authentication Profile Relam: Host    
Realm can't be Host, it's suppose to be the fqdn of the domain, like 
host/x1234.acme.com the realm is acme.com
 
So create the realm acme.com, associate the domain to it and in the 
authentication source (AD) edit the authentication rule and remove Realm = host
 
Next connect to the ssid and paste the packetfence.log and the radius.log file 
if it still doesn't work.
 
Regards
 
Fabrice
  

 
 
    Group Membership > is a member of > 
CN=DomainComputers,CN=Users,DC=xxxxx,DC=local Role > Default Access Duration > 
1hr  Username Attribute = servicePrincipalName  
  
  On a domain device that is a member of Domain Computers, when I choose to 
join the wireless network it is prompting me for a username and password.   
  Any ideas on how I can get the Domain Computer devices to auto join? 
  Thanks a lot.   Mike 
  
  
  
 
     
  
  _______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
 
    _______________________________________________
 PacketFence-users mailing list
 PacketFence-users@lists.sourceforge.net
 https://lists.sourceforge.net/lists/listinfo/packetfence-users
     
       
   
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to