Re: [PacketFence-users] MD5 error

2018-11-28 Thread Amjad Ali via PacketFence-users
Hello Fabrice,

Issue solved, this link helped.
https://sourceforge.net/p/packetfence/mailman/message/35737713/

add packetfence-local-auth in

raddb//sites-enabled/packetfence (conf/radiusd/packetfence if you
restart radius from pf)




Thanks,
Ali

On Mon, Nov 26, 2018 at 11:04 AM Amjad Ali  wrote:

> Hello Fabrice
>
> The error is:
>
> Module-Failure-Message = "eap_md5: Cleartext-Password is required for
> EAP-MD5 authentication" Module-Failure-Message = "eap: Failed continuing
> EAP MD5 (4) session. EAP sub-module failed"
>
> My database password hashing is set to plaintext, and I set MD5 on the
> client PC (linux machine) for 802.1X connection.
> I have uncommented *packetfence-local-auth.*
> The connection profile filter is EAP-Ethernet and source is local
> The username password is added to PF database, by the way, the same client
> works without problems when I chose PEAP on the client machine.
>
> Below is the raddebug output in full detail:
>
> (28137) Mon Nov 26 10:42:36 2018: Debug: Received Access-Request Id 4 from
> 10.10.51.224:1812 to 10.10.50.204:1812 length 119
> (28137) Mon Nov 26 10:42:36 2018: Debug:   User-Name = "pica8"
> (28137) Mon Nov 26 10:42:36 2018: Debug:   NAS-IP-Address = 0.0.0.0
> (28137) Mon Nov 26 10:42:36 2018: Debug:   NAS-Port-Type = Ethernet
> (28137) Mon Nov 26 10:42:36 2018: Debug:   NAS-Port = 23
> (28137) Mon Nov 26 10:42:36 2018: Debug:   Called-Station-Id =
> "A8-2B-B5-F6-CA-01"
> (28137) Mon Nov 26 10:42:36 2018: Debug:   Calling-Station-Id =
> "08-9E-01-9E-CC-FE"
> (28137) Mon Nov 26 10:42:36 2018: Debug:   Framed-MTU = 1500
> (28137) Mon Nov 26 10:42:36 2018: Debug:   EAP-Message =
> 0x02da017069636138
> (28137) Mon Nov 26 10:42:36 2018: Debug:   Message-Authenticator =
> 0xe8c76845b7dd499ff147277f9a3f4443
> (28137) Mon Nov 26 10:42:36 2018: Debug: # Executing section authorize
> from file /usr/local/pf/raddb/sites-enabled/packetfence
> (28137) Mon Nov 26 10:42:36 2018: Debug:   authorize {
> (28137) Mon Nov 26 10:42:36 2018: Debug: update {
> (28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND
> %{Packet-Src-IP-Address}
> (28137) Mon Nov 26 10:42:36 2018: Debug:  --> 10.10.51.224
> (28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND %l
> (28137) Mon Nov 26 10:42:36 2018: Debug:  --> 1543200156
> (28137) Mon Nov 26 10:42:36 2018: Debug: } # update = noop
> (28137) Mon Nov 26 10:42:36 2018: Debug: policy
> packetfence-set-tenant-id {
> (28137) Mon Nov 26 10:42:36 2018: Debug:   if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> (28137) Mon Nov 26 10:42:36 2018: Debug:  --> 0
> (28137) Mon Nov 26 10:42:36 2018: Debug:   if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
> (28137) Mon Nov 26 10:42:36 2018: Debug:   if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
> (28137) Mon Nov 26 10:42:36 2018: Debug: update control {
> (28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND %{User-Name}
> (28137) Mon Nov 26 10:42:36 2018: Debug:  --> pica8
> (28137) Mon Nov 26 10:42:36 2018: Debug:   SQL-User-Name set to
> 'pica8'
> (28137) Mon Nov 26 10:42:36 2018: Debug:   Executing select
> query:  SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
> '10.10.51.224'), 0)
> (28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND %{sql: SELECT
> IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
> '%{Packet-Src-IP-Address}'), 0)}
> (28137) Mon Nov 26 10:42:36 2018: Debug:  --> 1
> (28137) Mon Nov 26 10:42:36 2018: Debug: } # update control = noop
> (28137) Mon Nov 26 10:42:36 2018: Debug:   } # if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
> (28137) Mon Nov 26 10:42:36 2018: Debug:   if (
> :PacketFence-Tenant-Id == 0 ) {
> (28137) Mon Nov 26 10:42:36 2018: Debug:   if (
> :PacketFence-Tenant-Id == 0 )  -> FALSE
> (28137) Mon Nov 26 10:42:36 2018: Debug: } # policy
> packetfence-set-tenant-id = noop
> (28137) Mon Nov 26 10:42:36 2018: Debug: policy
> rewrite_calling_station_id {
> (28137) Mon Nov 26 10:42:36 2018: Debug:   if ( &&
> ( =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> {
> (28137) Mon Nov 26 10:42:36 2018: Debug:   if ( &&
> ( =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> -> TRUE
> (28137) Mon Nov 26 10:42:36 2018: Debug:   if ( &&
> ( =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> {
> (28137) Mon Nov 26 10:42:36 2018: Debug: update request {
> (28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND
> %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
> (28137) Mon Nov 

Re: [PacketFence-users] MD5 error

2018-11-25 Thread Amjad Ali via PacketFence-users
Hello Fabrice

The error is:

Module-Failure-Message = "eap_md5: Cleartext-Password is required for
EAP-MD5 authentication" Module-Failure-Message = "eap: Failed continuing
EAP MD5 (4) session. EAP sub-module failed"

My database password hashing is set to plaintext, and I set MD5 on the
client PC (linux machine) for 802.1X connection.
I have uncommented *packetfence-local-auth.*
The connection profile filter is EAP-Ethernet and source is local
The username password is added to PF database, by the way, the same client
works without problems when I chose PEAP on the client machine.

Below is the raddebug output in full detail:

(28137) Mon Nov 26 10:42:36 2018: Debug: Received Access-Request Id 4 from
10.10.51.224:1812 to 10.10.50.204:1812 length 119
(28137) Mon Nov 26 10:42:36 2018: Debug:   User-Name = "pica8"
(28137) Mon Nov 26 10:42:36 2018: Debug:   NAS-IP-Address = 0.0.0.0
(28137) Mon Nov 26 10:42:36 2018: Debug:   NAS-Port-Type = Ethernet
(28137) Mon Nov 26 10:42:36 2018: Debug:   NAS-Port = 23
(28137) Mon Nov 26 10:42:36 2018: Debug:   Called-Station-Id =
"A8-2B-B5-F6-CA-01"
(28137) Mon Nov 26 10:42:36 2018: Debug:   Calling-Station-Id =
"08-9E-01-9E-CC-FE"
(28137) Mon Nov 26 10:42:36 2018: Debug:   Framed-MTU = 1500
(28137) Mon Nov 26 10:42:36 2018: Debug:   EAP-Message =
0x02da017069636138
(28137) Mon Nov 26 10:42:36 2018: Debug:   Message-Authenticator =
0xe8c76845b7dd499ff147277f9a3f4443
(28137) Mon Nov 26 10:42:36 2018: Debug: # Executing section authorize from
file /usr/local/pf/raddb/sites-enabled/packetfence
(28137) Mon Nov 26 10:42:36 2018: Debug:   authorize {
(28137) Mon Nov 26 10:42:36 2018: Debug: update {
(28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND
%{Packet-Src-IP-Address}
(28137) Mon Nov 26 10:42:36 2018: Debug:  --> 10.10.51.224
(28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND %l
(28137) Mon Nov 26 10:42:36 2018: Debug:  --> 1543200156
(28137) Mon Nov 26 10:42:36 2018: Debug: } # update = noop
(28137) Mon Nov 26 10:42:36 2018: Debug: policy
packetfence-set-tenant-id {
(28137) Mon Nov 26 10:42:36 2018: Debug:   if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(28137) Mon Nov 26 10:42:36 2018: Debug:  --> 0
(28137) Mon Nov 26 10:42:36 2018: Debug:   if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
(28137) Mon Nov 26 10:42:36 2018: Debug:   if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
(28137) Mon Nov 26 10:42:36 2018: Debug: update control {
(28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND %{User-Name}
(28137) Mon Nov 26 10:42:36 2018: Debug:  --> pica8
(28137) Mon Nov 26 10:42:36 2018: Debug:   SQL-User-Name set to
'pica8'
(28137) Mon Nov 26 10:42:36 2018: Debug:   Executing select query:
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'10.10.51.224'), 0)
(28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'%{Packet-Src-IP-Address}'), 0)}
(28137) Mon Nov 26 10:42:36 2018: Debug:  --> 1
(28137) Mon Nov 26 10:42:36 2018: Debug: } # update control = noop
(28137) Mon Nov 26 10:42:36 2018: Debug:   } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
(28137) Mon Nov 26 10:42:36 2018: Debug:   if (
:PacketFence-Tenant-Id == 0 ) {
(28137) Mon Nov 26 10:42:36 2018: Debug:   if (
:PacketFence-Tenant-Id == 0 )  -> FALSE
(28137) Mon Nov 26 10:42:36 2018: Debug: } # policy
packetfence-set-tenant-id = noop
(28137) Mon Nov 26 10:42:36 2018: Debug: policy
rewrite_calling_station_id {
(28137) Mon Nov 26 10:42:36 2018: Debug:   if ( &&
( =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(28137) Mon Nov 26 10:42:36 2018: Debug:   if ( &&
( =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
-> TRUE
(28137) Mon Nov 26 10:42:36 2018: Debug:   if ( &&
( =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(28137) Mon Nov 26 10:42:36 2018: Debug: update request {
(28137) Mon Nov 26 10:42:36 2018: Debug:   EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(28137) Mon Nov 26 10:42:36 2018: Debug:  --> 08:9e:01:9e:cc:fe
(28137) Mon Nov 26 10:42:36 2018: Debug: } # update request = noop
(28137) Mon Nov 26 10:42:36 2018: Debug: [updated] = updated
(28137) Mon Nov 26 10:42:36 2018: Debug:   } # if (
&& ( =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
= updated
(28137) Mon Nov 26 10:42:36 2018: Debug:   ... skipping else: 

Re: [PacketFence-users] MD5 error

2018-11-22 Thread Durand fabrice via PacketFence-users

Hello Amjad,

can you paste the raddebug output, it will help to understand what happen.

Regards

Fabrice


Le 18-11-22 à 06 h 01, Amjad Ali via PacketFence-users a écrit :

Hi All,

Just want to know that WIRED 802.1X and WIRED MAC AUTH authentication 
works well with PEAP but is giving error with MD5,
Is MD5 not supported for these two or do I need to change some 
configuration?


Thanks
Ali

--
Amjad Ali


___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
___
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users