Hello Joe,

Yes, PacketFence does exactly what you want it to do.

The only thing is that you need to put a LDAP source on a connection profile 
that catches the EAP TLS authentication.

The thing for PF to use the username given from the cert, by default, it would 
try to match the username as a sAMAccountName. Make sure it matches and it 
would work.

You could also do another check, you could create a radius filter / VLAN filter 
that check the MAC OUI of the device and allow only yours, maybe it would be 
less work than creating 800+ AD account.

Thanks,

Ludovic Zammit
Product Support Engineer Principal

Cell: +1.613.670.8432
Akamai Technologies - Inverse
145 Broadway
Cambridge, MA 02142
Connect with Us:         <https://community.akamai.com/>  
<http://blogs.akamai.com/>  <https://twitter.com/akamai>  
<http://www.facebook.com/AkamaiTechnologies>  
<http://www.linkedin.com/company/akamai-technologies>  
<http://www.youtube.com/user/akamaitechnologies?feature=results_main>

> On Jul 2, 2022, at 2:07 PM, Joe Clempka via PacketFence-users 
> <packetfence-users@lists.sourceforge.net> wrote:
> 
> Hey All,
> 
> Is it possible when using EAP-TLS to restrict based on stripped username?
> 
> The VoIP phones I am using send the last few characters of their MAC
> address for username and that is being used as the stripped name, and
> thus forced into the NULL realm (doesn't seem like there is any way
> around that).
> 
> EAP-TLS works fine - phone powers on, sends its cert signed by the
> phone vendor CA, and PacketFence trusts the CA for this EAP profile
> and allows it.
> 
> But the issue is the cert on the phones is generic provided by the
> manufacturer.  This means that ANY VoIP phone by this vendor could
> come onto the network and start the EAP-TLS process, as it will
> present to PacketFence a certificate signed by the CA that I told
> PacketFence to use for EAP-TLS (defined under PKI SSL Certificates
> --.> SSL Certificates --> Certificate Authority, I just paste in the
> CAs I use then map that to TLS Profile and then EAP Profile and then
> map that EAP Profile to the NULL realm).
> 
> The vendor said they don't support PacketFence, and said to use
> Microsoft's NPS server, as that can use EAP-TLS plus looking up
> against AD for a username (that would be equal to the stripped MAC
> address).  So Microsoft's way would be EAP-TLS where the stripped
> username must exist in AD plus have a cert issued by the phone vendor
> (and thus only user objects we create in AD with specific stripped
> names would be allowed).
> 
> In AD, you would have a username with the last part of the MAC
> address, and a cert assigned to that user in AD (extracted from the
> phone).  During EAP-TLS, it verifies the user object exists AND that
> it has a cert issued by the trusted CA.  Versus in PacketFence it just
> cares that the client cert is issued by a trusted CA, and anyone with
> a cert signed by that CA would be trusted (so any VoIP phone by that
> vendor).
> 
> Is that possible in PacketFence to lookup against AD and/or restrict
> based on a list of stripped names (it would be 800+ phone MAC
> names...).
> 
> Thanks!
> 
> 
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!QnpxOcMWOpXMkDB2PlGA4H-YEEZ8032DzfZ7BXr5cA1PzdwpZ_5xevwK8z2GeC0ullpj13chII-QkZ-ej4gA_fm0GrqO1QzDkQYokA$
>  

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to