Hello Guys,
i'm trying to implement machine- and user authentication on Windows 10 Clients
via MS-CHAPv2 using Packetfence v11.1. While the user authentication works like
a charm, I'm having trouble setting up the machine authentication. I got the
following log information from the radius debug log:
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: Auth-Type MS-CHAP {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'User-Name'} = &request:User-Name ->
'host/IN19NB-1003.group.asap.de'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'NAS-IP-Address'} = &request:NAS-IP-Address -> '10.23.16.10'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'NAS-Port'} = &request:NAS-Port -> '45'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'Framed-MTU'} = &request:Framed-MTU -> '1500'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'State'} = &request:State -> '************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'Called-Station-Id'} = &request:Called-Station-Id ->
'**************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'Calling-Station-Id'} = &request:Calling-Station-Id ->
'**************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'NAS-Identifier'} = &request:NAS-Identifier -> '**************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'NAS-Port-Type'} = &request:NAS-Port-Type -> 'Ethernet'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'Event-Timestamp'} = &request:Event-Timestamp -> 'Oct 18 2022
18:52:46 CEST'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'EAP-Message'} = &request:EAP-Message -> '************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'NAS-Port-Id'} = &request:NAS-Port-Id -> 'Tengigabitethernet1/0/45'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'EAP-Key-Name'} = &request:EAP-Key-Name -> '0x00'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'FreeRADIUS-Proxied-To'} = &request:FreeRADIUS-Proxied-To ->
'127.0.0.1'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'MS-CHAP-Challenge'} = &request:MS-CHAP-Challenge ->
'************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'MS-CHAP2-Response'} = &request:MS-CHAP2-Response ->
'************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'EAP-Type'} = &request:EAP-Type -> 'MSCHAPv2'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'Realm'} = &request:Realm -> 'group.asap.de'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'MS-CHAP-User-Name'} = &request:MS-CHAP-User-Name ->
'host/IN19NB-1003.group.asap.de'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'PacketFence-Domain'} = &request:PacketFence-Domain -> 'group'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'PacketFence-KeyBalanced'} = &request:PacketFence-KeyBalanced ->
'************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'PacketFence-Radius-Ip'} = &request:PacketFence-Radius-Ip ->
'10.20.10.55'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'PacketFence-NTLMv2-Only'} = &request:PacketFence-NTLMv2-Only ->
'--allow-mschapv2'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_REQUEST{'PacketFence-Outer-User'} = &request:PacketFence-Outer-User ->
'host/IN19NB-1003.group.asap.de'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_CHECK{'Auth-Type'} = &control:Auth-Type -> 'eap'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_CHECK{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'LOCAL'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_CHECK{'NT-Password'} = &control:NT-Password -> '************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_CHECK{'MS-CHAP-Use-NTLM-Auth'} = &control:MS-CHAP-Use-NTLM-Auth -> 'No'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_CHECK{'PacketFence-Tenant-Id'} = &control:PacketFence-Tenant-Id -> '1'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_CONFIG{'Auth-Type'} = &control:Auth-Type -> 'eap'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_CONFIG{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'LOCAL'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_CONFIG{'NT-Password'} = &control:NT-Password -> '************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_CONFIG{'MS-CHAP-Use-NTLM-Auth'} = &control:MS-CHAP-Use-NTLM-Auth -> 'No'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
$RAD_CONFIG{'PacketFence-Tenant-Id'} = &control:PacketFence-Tenant-Id -> '1'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:MS-CHAP-User-Name = $RAD_REQUEST{'MS-CHAP-User-Name'} ->
'host/IN19NB-1003.group.asap.de'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:Event-Timestamp = $RAD_REQUEST{'Event-Timestamp'} -> 'Oct 18 2022
18:52:46 CEST'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:NAS-Port-Type = $RAD_REQUEST{'NAS-Port-Type'} -> 'Ethernet'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence: &request:State =
$RAD_REQUEST{'State'} -> '************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:PacketFence-Domain = $RAD_REQUEST{'PacketFence-Domain'} -> 'group'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:EAP-Key-Name = $RAD_REQUEST{'EAP-Key-Name'} -> '0x00'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:NAS-Port-Id = $RAD_REQUEST{'NAS-Port-Id'} -> 'Tengigabitethernet1/0/45'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence: &request:EAP-Type =
$RAD_REQUEST{'EAP-Type'} -> 'MSCHAPv2'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:PacketFence-Radius-Ip = $RAD_REQUEST{'PacketFence-Radius-Ip'} ->
'10.20.10.55'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence: &request:Framed-MTU
= $RAD_REQUEST{'Framed-MTU'} -> '1500'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:FreeRADIUS-Proxied-To = $RAD_REQUEST{'FreeRADIUS-Proxied-To'} ->
'127.0.0.1'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:Called-Station-Id = $RAD_REQUEST{'Called-Station-Id'} ->
'**************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:NAS-Identifier = $RAD_REQUEST{'NAS-Identifier'} -> '**************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence: &request:Realm =
$RAD_REQUEST{'Realm'} -> 'group.asap.de'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} ->
'**************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence: &request:NAS-Port =
$RAD_REQUEST{'NAS-Port'} -> '45'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:PacketFence-KeyBalanced = $RAD_REQUEST{'PacketFence-KeyBalanced'} ->
'************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:EAP-Message = $RAD_REQUEST{'EAP-Message'} -> '************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:PacketFence-NTLMv2-Only = $RAD_REQUEST{'PacketFence-NTLMv2-Only'} ->
'--allow-mschapv2'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:PacketFence-Outer-User = $RAD_REQUEST{'PacketFence-Outer-User'} ->
'host/IN19NB-1003.group.asap.de'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:MS-CHAP2-Response = $RAD_REQUEST{'MS-CHAP2-Response'} ->
'************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '10.23.16.10'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence: &request:User-Name
= $RAD_REQUEST{'User-Name'} -> 'host/IN19NB-1003.group.asap.de'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&request:MS-CHAP-Challenge = $RAD_REQUEST{'MS-CHAP-Challenge'} ->
'************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&control:MS-CHAP-Use-NTLM-Auth = $RAD_CHECK{'MS-CHAP-Use-NTLM-Auth'} -> 'No'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&control:Proxy-To-Realm = $RAD_CHECK{'Proxy-To-Realm'} -> 'LOCAL'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence: &control:Auth-Type
= $RAD_CHECK{'Auth-Type'} -> 'eap'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&control:NT-Password = $RAD_CHECK{'NT-Password'} -> '************************'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) packetfence:
&control:PacketFence-Tenant-Id = $RAD_CHECK{'PacketFence-Tenant-Id'} -> '1'
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: [packetfence] =
noop
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if
(&control:NT-Password && &control:NT-Password != "") {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if
(&control:NT-Password && &control:NT-Password != "") -> TRUE
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if
(&control:NT-Password && &control:NT-Password != "") {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: update {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2:
&control:PacketFence-NTCacheHash := 1
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: } # update = noop
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) mschap_local: Found NT-Password
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) mschap_local: Creating challenge
hash with username: host/IN19NB-1003.group.asap.de
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) mschap_local: Client is using
MS-CHAPv2
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) mschap_local: ERROR:
MS-CHAP2-Response is incorrect
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: [mschap_local] =
reject
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if (reject ||
fail) {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if (reject ||
fail) -> TRUE
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if (reject ||
fail) {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: policy
packetfence-mschap-authenticate {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if
(PacketFence-Domain) {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if
(PacketFence-Domain) -> TRUE
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if
(PacketFence-Domain) {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if (
"%{User-Name}" =~ /^host\/.*/) {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: EXPAND %{User-Name}
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: -->
host/IN19NB-1003.group.asap.de
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if (
"%{User-Name}" =~ /^host\/.*/) -> TRUE
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: if (
"%{User-Name}" =~ /^host\/.*/) {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) chrooted_mschap_machine: Found
NT-Password
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) chrooted_mschap_machine:
Creating challenge hash with username: host/IN19NB-1003.group.asap.de
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) chrooted_mschap_machine: Client
is using MS-CHAPv2
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) chrooted_mschap_machine: ERROR:
MS-CHAP2-Response is incorrect
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2:
[chrooted_mschap_machine] = reject
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: } # if (
"%{User-Name}" =~ /^host\/.*/) = reject
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: } # if
(PacketFence-Domain) = reject
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: } # policy
packetfence-mschap-authenticate = reject
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: } # if (reject ||
fail) = reject
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: } # if
(&control:NT-Password && &control:NT-Password != "") = reject
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap_mschapv2: } # Auth-Type
MS-CHAP = reject
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) eap: Sending EAP Failure (code
4) ID 10 length 4
It seems like the client provides the password correctly, but something messes
up and fails the authentication. Packetfence also recognizes the auth request
as a machine authentication and extracts the realm correctly.
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) policy
packetfence-set-realm-if-machine {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) -> TRUE
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) update {
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) EXPAND %{2}
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) --> group.asap.de
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) &request:Realm := group.asap.de
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) } # update = noop
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) } # if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) = noop
Oct 18 17:52:46 in19sv-nws18 auth[26857]: (11) } # policy
packetfence-set-realm-if-machine = noop
I created the realm in packetfence and linked it with the corresponding Active
Directory domain.
I searched google but didn't find anything regarding my problem. If you need
any more information from me, I'm happy to provide it.
Thank you in advance!
Kind Regards,
Heiko Matthies
[cid:2018_Signatur_ASAP_Engineering_607ba42f-d9c6-4abe-af16-b2b0953d2657.png]
[cid:MK_FB_Bayerns_Best_50_Mailsignatur_20220808_5e0395c7-1b32-4dd9-96cf-94c702a6ef87.jpg]<https://www.asap.de/newsroom/presse-detail/asap-gruppe-zaehlt-erneut-zu-bayerns-best-50>
ASAP Engineering GmbH Sachsstra?e 1A | 85080 Gaimersheim
Tel. +49 8458 3389 252<tel:+49%208458%203389%20252> | Fax. +49 (8458) 3389
399<fax:+49%20(8458)%203389%20399>
[email protected]<mailto:[email protected]> |
www.asap.de<http://www.asap.de>
Gesch?ftsf?hrer: Michael Neisen, Robert Werner, Christian Schweiger | Sitz der
Gesellschaft: Gaimersheim | Amtsgericht: Ingolstadt HRB 5408
Datenschutz: Ausf?hrliche Informationen zum Umgang mit Ihren personenbezogenen
Daten bei ASAP erhalten Sie auf unserer Website unter
Datenschutz.<http://www.asap.de/datenschutz/>
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users