Hello Fabrice, Thank you for your explanation.
Regards, Irvan. On Fri, Nov 4, 2022 at 7:37 PM Fabrice Durand <oeufd...@gmail.com> wrote: > Hello Irvan, > > yes it's normal, we did some unlang to mimic the way the realm is set when > packetfence receives a machine authentication. > > > https://github.com/inverse-inc/packetfence/blob/devel/raddb/policy.d/packetfence#L36 > > Regards > Fabrice > > > Le ven. 4 nov. 2022 à 08:34, Irvan via PacketFence-users < > packetfence-users@lists.sourceforge.net> a écrit : > >> Hello Ludovic, >> >> Thank you for your explanation. >> How about the realm? According to log, when windows sends computer >> account as login, Packetfence put it on Realm = "binus.local". But we never >> stup that realm. >> Is it normal to? >> >> >> >> Regards, >> Irvan. >> >> On Thu, Nov 3, 2022 at 12:16 AM Zammit, Ludovic <luza...@akamai.com> >> wrote: >> >>> Hello Irvan, >>> >>> It looks pretty normal that the windows sends the computer account >>> because it’s the default behavior. >>> >>> What is not normal, is that if you have at least one successful >>> authentication on the wifi with a username password, it should keep that >>> one and not re-ask again. >>> >>> All that can be configured on the SSID profile on windows. >>> >>> Thanks, >>> >>> >>> *Ludovic Zammit* >>> *Product Support Engineer Principal Lead* >>> *Cell:* +1.613.670.8432 >>> Akamai Technologies - Inverse >>> 145 Broadway >>> Cambridge, MA 02142 >>> Connect with Us: <https://community.akamai.com> >>> <http://blogs.akamai.com> <https://twitter.com/akamai> >>> <http://www.facebook.com/AkamaiTechnologies> >>> <http://www.linkedin.com/company/akamai-technologies> >>> <http://www.youtube.com/user/akamaitechnologies?feature=results_main> >>> >>> On Nov 2, 2022, at 1:45 AM, Irvan via PacketFence-users < >>> packetfence-users@lists.sourceforge.net> wrote: >>> >>> Hello Everyone, >>> >>> >>> We have strange behaviour with Windows Client connecting to dot1x WiFi >>> on Packetfence using AD Authentication source. >>> >>> The symptoms are : >>> >>> - When the first time Windows client connect to SSID, it was asked for >>> username and password for login. >>> - But if client forget the SSID and try to reconnect, Windows never >>> asked username and password, it was automatically send hostname as login to >>> packetfence, and accepted by packetfence. >>> - The same thing happened when user comeback in the next day, Windows >>> send hostname as login instead of username and it also accepted by >>> packetfence >>> >>> We don't setup any machine auth, only user auth. Drill down to radius >>> log, we saw that hostname login hit a non-existe realm. Using username and >>> password client hit null realm. But when windows send hostname it hit >>> binus.local realm, which is never exist. >>> >>> Bellow are radius log and realm.conf >>> >>> 1. Using user auth >>> =============== >>> Request Time >>> 0 >>> >>> RADIUS Request >>> User-Name = "loudy.owen" >>> NAS-IP-Address = 10.21.36.41 >>> NAS-Port = 4 >>> Service-Type = Framed-User >>> State = 0x6067228e61c0382594e9daec37da5a60 >>> Called-Station-Id = "90:3a:72:03:18:90:BinusWifi-Staff.1x" >>> Calling-Station-Id = "70:66:55:34:28:f3" >>> NAS-Identifier = "90-3A-72-03-18-90" >>> NAS-Port-Type = Wireless-802.11 >>> Acct-Session-Id = "6361F1F4-03189001" >>> Acct-Multi-Session-Id = "88DA8FBC70CEC821" >>> Event-Timestamp = "Nov 2 2022 11:28:41 WIB" >>> Connect-Info = "CONNECT 802.11" >>> EAP-Message = 0x02a700061a03 >>> Chargeable-User-Identity = 0x00 >>> Location-Data = 0x31304944170d42696e7573205379616864616e >>> WLAN-Pairwise-Cipher = 1027076 >>> WLAN-Group-Cipher = 1027076 >>> WLAN-AKM-Suite = 1027073 >>> FreeRADIUS-Proxied-To = 127.0.0.1 >>> Ruckus-SSID = "BinusWifi-Staff.1x" >>> Ruckus-Wlan-Id = 508 >>> Ruckus-Location = "Binus Syahdan" >>> Ruckus-SCG-CBlade-IP = 180933220 >>> Ruckus-VLAN-ID = 1220 >>> Ruckus-BSSID = 0x903a7243189d >>> Ruckus-Zone-Name = "AP-Zone-Syahdan" >>> Ruckus-Wlan-Name = "VlanPool2" >>> EAP-Type = MSCHAPv2 >>> Stripped-User-Name = "loudy.owen" >>> Realm = "null" >>> Called-Station-SSID = "BinusWifi-Staff.1x" >>> PacketFence-Domain = "binus" >>> PacketFence-KeyBalanced = "10a6d36fd6ec338584a72fcbe75f86ba" >>> PacketFence-Radius-Ip = "10.200.210.87" >>> PacketFence-NTLMv2-Only = "" >>> PacketFence-Outer-User = "loudy.owen" >>> Attr-26.25053.155 = 0x5379616864616e2043616d707573 >>> User-Password = "******" >>> SQL-User-Name = "loudy.owen" >>> >>> RADIUS Reply >>> EAP-Message = 0x03a70004 >>> Message-Authenticator = 0x00000000000000000000000000000000 >>> User-Name = "loudy.owen" >>> REST-HTTP-Status-Code = 200 >>> >>> ============================================== >>> >>> 2. Using hostname >>> =============== >>> Request Time >>> 0 >>> >>> RADIUS Request >>> User-Name = "host/NB202007000166.binus.local" >>> NAS-IP-Address = 10.21.36.41 >>> NAS-Port = 4 >>> Service-Type = Framed-User >>> State = 0xb4483109b5402b5768b5cf1f24ad1e9e >>> Called-Station-Id = "90:3a:72:03:18:90:BinusWifi-Staff.1x" >>> Calling-Station-Id = "70:66:55:34:28:f3" >>> NAS-Identifier = "90-3A-72-03-18-90" >>> NAS-Port-Type = Wireless-802.11 >>> Acct-Session-Id = "6361F350-03189001" >>> Acct-Multi-Session-Id = "3DD47C3ED408529E" >>> Event-Timestamp = "Nov 2 2022 11:34:26 WIB" >>> Connect-Info = "CONNECT 802.11" >>> EAP-Message = 0x020800061a03 >>> Chargeable-User-Identity = 0x00 >>> Location-Data = 0x31304944170d42696e7573205379616864616e >>> WLAN-Pairwise-Cipher = 1027076 >>> WLAN-Group-Cipher = 1027076 >>> WLAN-AKM-Suite = 1027073 >>> FreeRADIUS-Proxied-To = 127.0.0.1 >>> Ruckus-SSID = "BinusWifi-Staff.1x" >>> Ruckus-Wlan-Id = 508 >>> Ruckus-Location = "Binus Syahdan" >>> Ruckus-SCG-CBlade-IP = 180933220 >>> Ruckus-VLAN-ID = 1220 >>> Ruckus-BSSID = 0x903a7243189d >>> Ruckus-Zone-Name = "AP-Zone-Syahdan" >>> Ruckus-Wlan-Name = "VlanPool2" >>> EAP-Type = MSCHAPv2 >>> Realm = "binus.local" >>> Called-Station-SSID = "BinusWifi-Staff.1x" >>> PacketFence-Domain = "binus" >>> PacketFence-KeyBalanced = "e080ae33e5dd7f64d0155f1a8dc95245" >>> PacketFence-Radius-Ip = "10.200.210.87" >>> PacketFence-NTLMv2-Only = "" >>> PacketFence-Outer-User = "host/NB202007000166.binus.local" >>> Attr-26.25053.155 = 0x5379616864616e2043616d707573 >>> User-Password = "******" >>> SQL-User-Name = "host/NB202007000166.binus.local" >>> >>> RADIUS Reply >>> MS-MPPE-Encryption-Policy = Encryption-Required >>> MS-MPPE-Encryption-Types = 4 >>> MS-MPPE-Send-Key = 0xb45a79e25b9f5bda45259afc13d0dc5c >>> MS-MPPE-Recv-Key = 0xe52d30f3e2977a2c1219c4200bc44678 >>> EAP-Message = 0x03080004 >>> Message-Authenticator = 0x00000000000000000000000000000000 >>> User-Name = "host/NB202007000166.binus.local" >>> REST-HTTP-Status-Code = 200 >>> >>> >>> 3. realm.conf >>> ========== >>> # Copyright (C) Inverse inc. >>> [1 DEFAULT] >>> radius_auth_compute_in_pf=enabled >>> radius_acct= >>> eduroam_radius_auth= >>> radius_auth= >>> eduroam_radius_acct= >>> radius_auth_proxy_type=keyed-balance >>> eduroam_radius_acct_proxy_type=load-balance >>> eduroam_radius_auth_proxy_type=keyed-balance >>> permit_custom_attributes=disabled >>> radius_acct_proxy_type=load-balance >>> eduroam_radius_auth_compute_in_pf=enabled >>> domain=binus >>> >>> [1 LOCAL] >>> eduroam_radius_acct= >>> radius_auth= >>> radius_acct= >>> eduroam_radius_acct_proxy_type=load-balance >>> radius_acct_proxy_type=load-balance >>> eduroam_radius_auth= >>> radius_auth_compute_in_pf=enabled >>> radius_auth_proxy_type=keyed-balance >>> permit_custom_attributes=disabled >>> eduroam_radius_auth_compute_in_pf=enabled >>> eduroam_radius_auth_proxy_type=keyed-balance >>> >>> [1 NULL] >>> radius_auth_compute_in_pf=enabled >>> radius_acct= >>> radius_auth= >>> eduroam_radius_auth= >>> eduroam_radius_auth_proxy_type=keyed-balance >>> eduroam_radius_acct= >>> radius_auth_proxy_type=keyed-balance >>> eduroam_radius_acct_proxy_type=load-balance >>> permit_custom_attributes=disabled >>> radius_acct_proxy_type=load-balance >>> eduroam_radius_auth_compute_in_pf=enabled >>> domain=binus >>> >>> ============================= >>> >>> How could this happened? Any advice? >>> >>> >>> Thanks in advance >>> >>> >>> Regards, >>> Irvan >>> _______________________________________________ >>> PacketFence-users mailing list >>> PacketFence-users@lists.sourceforge.net >>> >>> https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!SFNRQV2PR8ry-00A8fXYEKuTzZqZg4CQPmHkOABxoBZ8BUuBihHqubUhd6DemK1cAhf2LKJJakTGi6H5RFEO2J7YKZ2Qp9SUd0HP4Q$ >>> >>> >>> >> >> _______________________________________________ >> PacketFence-users mailing list >> PacketFence-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users