Hello Will,
The certificate exchange looks fine, do you have an AD computer auth
source? (using ServicePrincipalName as an attribute)
Also is the CA in the radiusd/eap.conf, and is it installed on the client?
You could also try to run RADIUS in debug to have more infos:
raddebug -f /usr/local/pf/var/run/radiusd.sock -t3600
Thanks
On 07/05/2017 11:13 AM, Will Halsall via PacketFence-users wrote:
Hi All,
I have tried to setup mspki to use ad computer authentication and have
folloed the Qick instaolation guide but cannot get the clients to work.
The client is a windows 10 domain laptop
The server is PF 7.1.0
The CA is installed on windows2012R2
When I try to connect I get the following in the radius log. Could
anyone advise on how to go about resolving this issue or if its even
possible?
Willh
RADIUS Request
User-Name = "host/Stuart-PC.college.farnborough"
NAS-IP-Address = 172.16.36.30
NAS-Port = 0
Service-Type = Login-User
Framed-MTU = 1100
State = 0x7e1adcc07913d16fa3fa9452e2e3aa94
Called-Station-Id = "04:bd:88:c4:e2:60"
Calling-Station-Id = "00:24:2b:60:ff:79"
NAS-Identifier = "IAP Cluster FCOT"
NAS-Port-Type = Wireless-802.11
Event-Timestamp = "Jul 5 2017 16:00:37 BST"
EAP-Message = 0x020900060d00
Message-Authenticator = 0x5cf158a0b8216591e4a2125a9c68ee90
Aruba-Essid-Name = "test"
Aruba-Location-Id = "N2 - outside"
Aruba-AP-Group = "IAP Cluster"
EAP-Type = TLS
Stripped-User-Name = "host/Stuart-PC.college.farnborough"
Realm = "null"
FreeRADIUS-Client-IP-Address = 172.16.36.30
Called-Station-SSID = "test"
Tmp-String-1 = "00242b60ff79"
TLS-Cert-Serial = "72c5b6d2120648b44e26747040ed5949"
TLS-Cert-Expiration = "220701135414Z"
TLS-Cert-Issuer = "/DC=farnborough/DC=college/CN=azure"
TLS-Cert-Subject = "/DC=farnborough/DC=college/CN=azure"
TLS-Cert-Common-Name = "azure"
TLS-Client-Cert-Serial = "7d00000060dfebbdb604c4cc82000200000060"
TLS-Client-Cert-Expiration = "190705141544Z"
TLS-Client-Cert-Issuer = "/DC=farnborough/DC=college/CN=azure"
TLS-Client-Cert-Subject = "/CN=Stuart-PC.college.farnborough"
TLS-Client-Cert-Common-Name = "Stuart-PC.college.farnborough"
TLS-Client-Cert-X509v3-Extended-Key-Usage = "TLS Web Server Authentication
TLS Web Client Authentication"
TLS-Client-Cert-X509v3-Subject-Key-Identifier =
"6D:D8:A4:E6:C5:9F:BC:58:D1:A9:89:AE:A6:D4:C1:60:F4:C2:DF:F2"
TLS-Client-Cert-X509v3-Authority-Key-Identifier =
"keyid:81:0F:70:98:FB:13:46:81:60:6E:0C:46:EC:DA:B8:64:47:E9:6A:8C\n"
TLS-Client-Cert-Subject-Alt-Name-Dns = "Stuart-PC.college.farnborough"
Module-Failure-Message = "rest: Server returned:"
Module-Failure-Message = "rest:
{\"control:PacketFence-Authorization-Status\":\"allow\"}"
User-Password = "******"
SQL-User-Name = "host/Stuart-PC.college.farnborough"
RADIUS Reply
MS-MPPE-Recv-Key =
0x10c55a8412cf0b3fc533006069e474e5933f2778dc0bb095abe95eef2ac56f1d
MS-MPPE-Send-Key =
0x5e2d706a0e612d4797052c9a8d0e1eb8a4fe42afada4b42d24176d025157fa6a
EAP-MSK =
0x10c55a8412cf0b3fc533006069e474e5933f2778dc0bb095abe95eef2ac56f1d5e2d706a0e612d4797052c9a8d0e1eb8a4fe42afada4b42d24176d025157fa6a
EAP-EMSK =
0xc5bfd638609e0698282b0bf2de29ddf6b9fdf7139a9f904b7b3ad26fc2d15ea55533869cdd945115bb9ec75e0662627807100d8aae044f3232bd63f3c1f22282
EAP-Session-Id =
0x0d595cff1448a9ab1b5f34620219363a29ba87e4f2ff3058941f15a081ef0de171595cff15d2572d184a352a5e88a3b0af21328a83b299dec4f4ca938c86f0941f
EAP-Message = 0x03090004
Message-Authenticator = 0x00000000000000000000000000000000
Stripped-User-Name = "host/Stuart-PC.college.farnborough"
<https://www.farn-ct.ac.uk/about/Events>
This message is intended only for the use of the person(s) to
whom it is addressed, and may contain privileged and confidential
information.
If it has come to you in error, please contact the sender as soon as
possible,
and note that you must take no action based on the content, nor must
you copy,
distribute, or show the content to any other person.
In accordance with its legal obligations, Farnborough College of
Technology reserves the right to monitor the content of e-mails sent and
received, but will not do so routinely.
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Antoine Amacher
[email protected] :: www.inverse.ca
+1.514.447.4918 x130 :: +1 (866) 353-6153 x130
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users