Francois my Hero!  :)

That did the trick.  I had to do some editing on the /root/.ssh/known_host 
files first to delete some of the information from our original work over a 
year ago.  But after that it was clear sailing.

<In by most annoying whiny voice>  
        But I have almost 700 Devices on my networks!  You mean I will have to 
repeat this process for each of those devices?  
<end of whining > 

Something tells me I have some new script writing in my future, or I will be 
giving my 1 assistant a very boring and tedious job :)

Thanks again for getting me back on track.
mlh

[root@pf1 pf]# ssh [email protected]
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
1c:a2:52:d5:80:df:3b:39:e7:69:26:de:26:0d:90:db.
Please contact your system administrator.
Add correct host key in /root/.ssh/known_hosts to get rid of this message.
Offending key in /root/.ssh/known_hosts:4
RSA host key for 10.xx.yy.zz has changed and you have requested strict checking.
Host key verification failed.
[root@pf1 pf]#

-----Original Message-----
From: Francois Gaudreault [mailto:[email protected]] 
Sent: Friday, October 14, 2011 8:30 AM
To: [email protected]
Subject: Re: [Packetfence-users] Webpage redirection after completing 
registration

Michael,

Try this.  Log in your server as root, try to connect SSH to your device.  
Accept the SSH key.

Now do "su - pf", this will pop a shell with the pf user rights.  Do the same 
thing, try to SSH to your device and accept the SSH key.

On 11-10-14 11:04 AM, Hart, Michael wrote:
> Olivier,
>
> There are 2 WAP models in question, both are Cisco.
> The one the Inverse team assisted with configuring is an 
> AIR-AP1231G-A-K9.  (This is the one that work correctly when connected to the 
> cisco 3750 that Inverse also assisted configuring) The other is an 
> AIR-AP1252G-A-K9.
>
> They do use SSH for deauth (the switches use telnet - for some reason).  I 
> don't remember having to log into either the PF server or Switch, or WAP to 
> accept any SSH key, but I could very well be mistaken. If this process 
> documented anywhere?  I looked in the v3 Administration and   
> Network_Device_Configuration guides, but nothing popped out at me.  And I 
> have already gotten myself into trouble by following some of the steps in the 
> Network_device_configuration_guide where it told me I needed to make entries 
> in the /etc./clients.conf files when I was not supposed to.  So I am a bit 
> leery of this documentation.
>
> What logs do you want output from?  I am happy to supply you with any 
> information you need to help resolve this issue.
> mlh
>
> -----Original Message-----
> From: Olivier Bilodeau [mailto:[email protected]]
> Sent: Friday, October 14, 2011 7:18 AM
> To: [email protected]
> Subject: Re: [Packetfence-users] Webpage redirection after completing 
> registration
>
>
>
>> I have a new challenge for the group.
>>
> What WAP are you using? If it's one that performs it's deauth in telnet/ssh 
> then in ssh's case you need to manually connect to the WAP as user root and 
> pf to accept the ssh keys of the WAP.
>
> Otherwise we will need more log evidence.
>
> --
> Olivier Bilodeau
> [email protected]  ::  +1.514.447.4918 *115  ::  www.inverse.ca 
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
> (www.packetfence.org)
>
>
>
> ----------------------------------------------------------------------
> -------- All the data continuously generated in your IT infrastructure 
> contains a definitive record of customers, application performance, 
> security threats, fraudulent activity and more. Splunk takes this data 
> and makes sense of it. Business sense. IT sense. Common sense.
> http://p.sf.net/sfu/splunk-d2d-oct
> _______________________________________________
> Packetfence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
> ----------------------------------------------------------------------
> -------- All the data continuously generated in your IT infrastructure 
> contains a definitive record of customers, application performance, 
> security threats, fraudulent activity and more. Splunk takes this data 
> and makes sense of it. Business sense. IT sense. Common sense.
> http://p.sf.net/sfu/splunk-d2d-oct
> _______________________________________________
> Packetfence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>


--
Francois Gaudreault, ing. jr
[email protected]  ::  +1.514.447.4918 (x130) ::  www.inverse.ca Inverse 
inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org)


------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to