Hello all,

We tested for this bug on our test OS X Lion device and we were able to change 
our password correctly.  Did we not do something right to get this bug to 
appear?  I want to make sure we tried everything as our students will be 
returning starting this Wednesday.

Thanks,

Matt




Matt Pendleton | Systems & Network Administrator
University of Florida Department of Housing and Residence Education
PO Box 112100 | Gainesville, FL 32611-2100
office 352.392.2171 x10107 | fax 352.392.6819 | [email protected]
Before printing this email think if it is necessary.

-------- Original Message --------
Subject:        Re: [WIRELESS-LAN] MacOS Lion & Wireless Password Resets
Date:   Tue, 9 Aug 2011 14:26:40 -0400
From:   Holland, Ryan C. <[email protected]>
Reply-To:       The EDUCAUSE Wireless Issues Constituent Group Listserv
<[email protected]>
To:     [email protected]



All,

Per advice from our Apple rep, I have submitted Apple BUG# 9922069. If you 
would, please also submit bug entries for this so they understand the affect of 
this issue. For your ease of submission, here's what I
submitted:

> 09-Aug-2011 02:23 PM Ryan Holland:
> Summary:
> After successfully authenticating via 802.1X to an enterprise Wi-Fi
> network, credentials are stored in Keychain correctly. If the
> username/password are changed on the enterprise side (i.e., user
> changes their password), OS 10.7 continues to use the stored keychain
> item and never prompts the user to reenter their username and
> password. Authentication continuously fails.
>
> Steps to Reproduce:
> 1.) Connect to an 802.1X authenticated WPA2-AES enterprise Wi-Fi
> network (like most higher education institutions) and verify
> credentials are stored in the keychain.
> 2.) Change username and password via the authentication database
> 3.) Disconnect from Wi-Fi on the 10.7 machine.
> 4.) Reconnect/reauthenticate to Wi-Fi
> At this point, reconnection is not possible.
>
> Expected Results:
> OS 10.7 will use the keychain with the now-incorrect username and
> password. Upon failed authentication, the UI should prompt the user to
> reenter their username and password. User would enter their
> now-correct username and password, successfully authenticate, and OS
> 10.7 would update the keychain entry appropriately.
>
> Actual Results:
> UI never prompts for now-correct username and password. Authentication
> continuously fails.
>
> Regression:
> User must manually remove any and all related keychain items that have
> the stored username and password. Then, OS 10.7 UI will prompt user
> for NEW username and password.
>
> Notes:
> Regression is workable on a case-by-case basis. However, we have
> 10,000+ mac users and a 90-day password policy that is enforced. With
> this current bug, users will have to tinker with their keychain at
> least every 90 days.
>
> Please email me at [email protected] <mailto:[email protected]> or
> call at 614-292-9906 to discuss this matter further.
> **THIS NEEDS TO BE PRIORITIZED, AS NUMEROUS UNIVERSITIES ARE AFFECTED
> BY THIS BUG**

==========
Ryan Holland
Network Engineer, Wireless
Office of the Chief Information Officer
The Ohio State University
614-292-9906 [email protected] <mailto:[email protected]>


On Aug 5, 2011, at 11:44 AM, Holland, Ryan C. wrote:

> All,
>
> I used the iPhone configuration utility to create a .mobileconfig
> file, as recommended by apple. Upon double-clicking, it prompts to
> install the profile, and you can optionally enter a username and
> password at that time. Either once you enter those and finish profile
> installation, or if you skip entering there and later enter username
> and password connecting, either way an entry is added to the keychain.
> THEN, if the user changes their password, that keychain entry is still
> there and is used, continuously failing auth. Only workaround I've
> found is to delete the keychain, which results in user prompted for
> username and password, at which point a new keychain item is created.
>
> I think this is more of a keychain behavior problem.....or just a WiFi
> problem on the Apple. Regardless, the Mac supplicant's behavior should
> not try and be stubbornly using wrong credentials over and over. "That
> password didn't work?! Hmm. Maybe I should try it again. Didn't work
> again? Hmm. Maybe I should try it again. Dang! How about now? no!?
>  Hmm.... Now?......"
>
> At this point, Xpressconnect is not an option for us. Also, we can't
> not do 802.1X. Right now, the only I do I have is bold face text on
> the WebUI where users change their password stating that Mac users
> *must* delete their keychain, etc.
>
> Additional ideas?
>
> ===========
> Ryan Holland
>
> On Aug 5, 2011, at 11:06 AM, "Palmer IV, Daniel" <[email protected]
> <mailto:[email protected]>> wrote:
>
>> That was going to be my point.  That profile can be for the user or
>> for the machine.  We are using a user based profile that we modify
>> via script and "slurp" in to create our connection.  (Cannot say
>> which id is being used to validate though, have not had time to test
>> that).
>>
>> dp
>>
>> *Daniel Palmer
>> *University Technology Services (UTS) Emory University Atlanta, GA
>> 30322
>> 404.727.5297 (office)
>> 404.213.1643 (mobile)
>>
>>
>>
>> From: David Blahut <[email protected] <mailto:[email protected]>>
>> Reply-To: The EDUCAUSE Wireless Issues Constituent Group Listserv
>> <[email protected]
>> <mailto:[email protected]>>
>> Date: Fri, 5 Aug 2011 11:00:24 -0400
>> To: <[email protected]
>> <mailto:[email protected]>>
>> Subject: Re: [WIRELESS-LAN] MacOS Lion & Wireless Password Resets
>>
>> Great question, I was surprised to not see the + in the 802.1X
>> window.  When I associated to the secure SSID a dialog box popped up
>> asking for username and password.  I think the credentials are added
>> to the keychain at that point.
>>
>> You can also use Lion server to create a profile.  I haven't tested
>> this but more information can be found here:
>> http://support.apple.com/kb/HT4772
>>
>> -d
>>
>> *From:*The EDUCAUSE Wireless Issues Constituent Group Listserv
>> [mailto:[email protected]] *On Behalf Of *Palmer IV,
>> Daniel
>> *Sent:* Friday, August 05, 2011 9:43 AM
>> *To:* [email protected]
>> <mailto:[email protected]>
>> *Subject:* Re: [WIRELESS-LAN] MacOS Lion & Wireless Password Resets
>>
>> In your test machine... How did you create your 802.1x profile?
>>
>> dp
>>
>> *Daniel Palmer**
>> *University Technology Services (UTS) Emory University Atlanta, GA
>> 30322
>> 404.727.5297 (office)
>> 404.213.1643 (mobile)
>>
>> *From: *David Blahut <[email protected]
>> <mailto:[email protected]>>
>> *Reply-To: *The EDUCAUSE Wireless Issues Constituent Group Listserv
>> <[email protected]
>> <mailto:[email protected]>>
>> *Date: *Fri, 5 Aug 2011 09:13:43 -0400
>> *To: *<[email protected]
>> <mailto:[email protected]>>
>> *Subject: *Re: [WIRELESS-LAN] MacOS Lion & Wireless Password Resets
>>
>> I did some Lion testing yesterday on our 802.1X secured  SSID and
>> discovered the following while watching the RADIUS logs:
>>
>> The laptop had two accounts set up on it, mine and another 'tester'.
>> If you simply switched users the machine would reauthenticate but
>> still use the other username/password (the account switching from).
>>
>> If the laptop was restarted or shut down and started back up the
>> correct username/password would be used to log into the wireless no
>> matter what user was logged in when the restart was initiated.
>>
>> I don't necessarily think this is a big problem in our environment
>> but I can see where it could be in others.
>>
>> -d
>>
>> *From:*The EDUCAUSE Wireless Issues Constituent Group Listserv
>> [mailto:[email protected]] *On Behalf Of *Holland,
>> Ryan C.
>> *Sent:* Thursday, August 04, 2011 5:01 PM
>> *To:* [email protected]
>> <mailto:[email protected]>
>> *Subject:* [WIRELESS-LAN] MacOS Lion & Wireless Password Resets
>>
>> I have finally got my hands on MacOS 10.7 (lion) and have started
>> running it through wireless tests. One item I find very worrisome is
>> this:
>>
>> - Via WPA2-Enterprise (PEAP/MSCHAPv2), I connect to the SSID using
>> username & password1; these credentials are then stored in the
>> keychain
>>
>> - If I change my password to, say, "password2", then the next time I
>> connect, the Mac fails authentication
>>
>> It seems that the Mac, if failing authentication, never prompts for
>> the username & password to be reentered.
>>
>> Our university is soon to roll-out and enforce a 90-day password
>> policy, and I am concerned that users will be unable to authenticate
>> and forced to remove the password from their keychain.
>>
>> Have any of you run into this similar issue? If so, how do handle
>> this behavior? (I don't recall it being this way in MacOS 10.6 or
>> 10.5)
>>
>> ==========
>> Ryan Holland
>> Network Engineer, Wireless
>> Office of the Chief Information Officer The Ohio State University
>> 614-292-9906 [email protected] <mailto:[email protected]>
>>
>> /Submit a Kudos to an OCIO employee!
>> <http://www.surveygizmo.com/s/514095/giveociokudos>/
>>
>> ********** Participation and subscription information for this
>> EDUCAUSE Constituent Group discussion list can be found at
>> http://www.educause.edu/groups/.
>>
>> ********** Participation and subscription information for this
>> EDUCAUSE Constituent Group discussion list can be found at
>> http://www.educause.edu/groups/.
>>
>> ---------------------------------------------------------------------
>> ---
>>
>>
>> This e-mail message (including any attachments) is for the sole use
>> of the intended recipient(s) and may contain confidential and
>> privileged information. If the reader of this message is not the
>> intended recipient, you are hereby notified that any dissemination,
>> distribution or copying of this message (including any attachments)
>> is strictly prohibited.
>>
>> If you have received this message in error, please contact the sender
>> by reply e-mail message and destroy all copies of the original
>> message (including attachments).
>>
>> ********** Participation and subscription information for this
>> EDUCAUSE Constituent Group discussion list can be found at
>> http://www.educause.edu/groups/.
>>
>> ********** Participation and subscription information for this
>> EDUCAUSE Constituent Group discussion list can be found at
>> http://www.educause.edu/groups/.
>>
>> ---------------------------------------------------------------------
>> ---
>>
>> Spam <https://antispam.osu.edu/b.php?i=1235685180&m=8c39183215b1&c=s>
>> Not spam
>> <https://antispam.osu.edu/b.php?i=1235685180&m=8c39183215b1&c=n>
>> Forget previous vote
>> <https://antispam.osu.edu/b.php?i=1235685180&m=8c39183215b1&c=f>
>> ********** Participation and subscription information for this
>> EDUCAUSE Constituent Group discussion list can be found at
>> http://www.educause.edu/groups/.
>>

********** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to