Re: AP> FR> LDAP authentication reject

2012-12-27 Thread Olivier Beytrison
On 28.12.2012 08:39, Thanakorn Rattanatikul wrote:
> In LDAP server , for user "sun" , store password in clear-text in this test
So if you have a clear-text password in the ldap, use the ldap
attribute-map to add it in the control list. Looking at the logs I guess
you are running version 2.x, then you should have a file called
/etc/raddb/ldap.attrmap, add a line with

checkitem   Cleartext-Password  

And reference the ldap.attrmap in the ldap module (if not already done)

dictionary_mapping = ${confdir}/ldap.attrmap

And finally you need to ensure that the user defined in the ldap module
(identity) has sufficient rights in the LDAP to retrieve the attribute
containing the clear text password.

Olivier
-- 

 Olivier Beytrison
 Network & Security Engineer, HES-SO Fribourg
 Mobile: +41 (0)78 619 73 53
 Mail: oliv...@heliosnet.org
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


RE: AP> FR> LDAP authentication reject

2012-12-27 Thread Thanakorn Rattanatikul

In LDAP server , for user "sun" , store password in clear-text in this test.

Thank you very much for your time and help.


thanakorn

  -
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Re: AP> FR> LDAP authentication reject

2012-12-27 Thread Olivier Beytrison
On 28.12.2012 06:17, Thanakorn Rattanatikul wrote:
> I'm trying to setup the server to authenticate using LDAP. I'm having
> some problem and hope to get some help from the list.
> 
> I'm trying to setup AP->FR->LDAP. FreeRadius is new installation on
> CentOS. LDAP is Sun Java System Directory Server.
> I'm trying radtest ->FR->LDAP pass but AP->FR->LDAP not pass.
It works with radtest because it does pap. The password is sent in
cleartext in the request. Freeradius can then bind to the LDAP with the
user/password supplied to authenticate the user.

With your Access Point, you're doing EAP-PEAP with MSCHAPv2, which mean
you need the clear text password or a NT/LM_Password in your backend, or
via NTLM_Auth. If Freeradius doesn't have them, it can't do the
challenge/response. You have Plenty of warning that this will happen ...

> [ldap] expand: ou=guest,dc=ku,dc=ac,dc=th -> ou=guest,dc=ku,dc=ac,dc=th
>   [ldap] ldap_get_conn: Checking Id: 0
>   [ldap] ldap_get_conn: Got Id: 0
>   [ldap] attempting LDAP reconnection
>   [ldap] (re)connect to 158.108.8.214:389, authentication 0
>   [ldap] bind as uid=thanakorn,ou=guest,dc=ku,dc=ac,dc=th/testtest to
> 158.108.8.214:389
>   [ldap] waiting for bind result ...
>   [ldap] Bind was successful
>   [ldap] performing search in ou=guest,dc=ku,dc=ac,dc=th, with filter
> (uid=sun)
> [ldap] looking for check items in directory...
> [ldap] looking for reply items in directory...
See here ?
> WARNING: No "known good" password was found in LDAP.  Are you sure that
> the user is configured correctly?
>   [ldap] ldap_release_conn: Release Id: 0
> ++[ldap] returns ok
> ++[expiration] returns noop
> ++[logintime] returns noop
Or Here ?
> [pap] WARNING! No "known good" password found
> for the user.  Authentication may fail because of this.
> ++[pap] returns noop
And those ?
> [mschapv2] # Executing group from file /etc/raddb/sites-enabled/default
> [mschapv2] +- entering group MS-CHAP {...}
> [mschap] No Cleartext-Password configured.  Cannot create LM-Password.
> [mschap] No Cleartext-Password configured.  Cannot create NT-Password.
> [mschap] Creating challenge hash with username: sun
> [mschap] Told to do MS-CHAPv2 for sun wit! h NT-Password
> [mschap] FAILED: No NT/LM-Password.  Cannot perform authentication.
> [mschap] FAILED: MS-CHAP2-Response is incorrect
And here again ...
> [peap]  The users session was previously rejected: returning reject (again.)
> [peap]  *** This means you need to read the PREVIOUS messages in the
> debug output
> [peap]  *** to find out the reason why the user was rejected.
> [peap]  *** Look for "reject" or "fail".  Those earlier messages will
> tell you.
> [peap]  *** what went wrong, and how to fix the problem.
> [eap] Handler failed in EAP/peap
> [eap] Failed in EAP select
> ++[eap] returns invalid

In the default LDAP configuration file, it's clearly stated that :

#  However, LDAP can be used for authentication ONLY when the
#  Access-Request packet contains a clear-text User-Password
#  attribute.  LDAP authentication will NOT work for any other
#  authentication method.
#  This means that LDAP servers don't understand EAP.  If you
#  force "Auth-Type = LDAP", and then send the server a
#  request containing EAP authentication, then authentication
#  WILL NOT WORK.

You need either the clear-text password in your LDAP, Store the user
password in the userfile, or use another way of getting the password
(sql database, ntlm_auth to active directory).

Read the comments in the default configuration, and look for Warning and
error in the debug output. It tells you what goes wrong, and what you
should do. In your case : Provide a Cleartext-Password

Olivier
-- 

 Olivier Beytrison
 Network & Security Engineer, HES-SO Fribourg
 Mobile: +41 (0)78 619 73 53
 Mail: oliv...@heliosnet.org
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: 802.1x computer authentication config issue/question

2012-12-27 Thread spartan1833
@Phil,

Thank you very much for the code snippet - only had to make minor 
mods for it to work perfectly ("noop" instead of "notfound" in the 
reject code within the sites-enabled routine). Also I had to do an 
$INCLUDE in the users file that points to the tls_clients file 
otherwise I get unpredictable behavior - other than that working as 
envisioned. Next phase, a remote database for clients (LDAP or 
SQLnot sure which yet - thats for 2013)

Again, many, many thanks for the help - Happy Holidays...


On Thu, 27 Dec 2012 10:40:15 -0500 "Phil Mayers" 
 wrote:
>On 12/27/2012 03:19 PM, spartan1...@hushmail.com wrote:
>
>> ...but if not then ok I was simply trying to figure out if I was
>> able to control machine-only 802.1x authentication against
>> FreeRADIUS in a manner similar to how "simple" user 
>authentication
>> appears to be done (via the users file). From your response, it
>> appears that the answer is "NO" and that an LDAP configuration /
>> LDAP groups will be required.
>
>Not so - that's not what Alan said. You mentioned LDAP - he 
>naturally 
>assumed you were looking in that direction.
>
>You can use the "users" file; but you need to alter the config 
>slightly, 
>and due to the way EAP-TLS runs in 2.x, you need to use it in a 
>particular way.
>
>Try this:
>
>/etc/raddb/modules/tls_clients:
>
>files tls_clients {
>   key = "%{TLS-Client-Cert-Common-Name}"
>   usersfile = "/etc/raddb/tls_clients"
>}
>
>/etc/raddb/sites-enabled/default
>
>post-auth {
>   ...
>   if (TLS-Client-Cert-Common-Name) {
> tls_clients.authorize
> if (notfound) {
>   # reject unknown users
>   reject
> }
>   }
>   ...
>}
>
>Modify as appropriate for your needs.
>
>>
>> I'll look into that as time allows...and while I appreciate your
>> quick response, I think that your comment below is a bit
>> unwarranted - one of the points of user groups is to be able to 
>ask
>> the question "I don't know how...at least this has been the case
>> for the last 15 years that I have been doing this stuff."
>
>Unfortunately, the FreeRADIUS community does not have the depth 
>and 
>breadth to provide the level of support and documentation that 
>something 
>like Apache or Samba does. This means there is more onus on you to 

>be 
>specific.
>
>I have my theories about *why* this difference exists - 
>specifically, 
>that FR is a complex infrastructure daemon, which people set up 
>and 
>forget, as opposed to a framework that they constantly use. You 
>see 
>similar issues on other projects (ISC bind, for example) that have 

>these 
>attributes. But whatever the reason, most people post to this list 

>a few 
>times, then vanish - they don't answer questions to people who 
>follow 
>them, write docs or wiki articles, or contribute code.
>
>This leads to a relatively small pool of people who can answer, 
>and to 
>the expectation that you be specific so those people can use their 

>time 
>efficiently. Don't take it personally - it's just a function of 
>the 
>community size.
>
>Cheers,
>Phil
>-
>List info/subscribe/unsubscribe? See 
>http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: 802.1x computer authentication config issue/question

2012-12-27 Thread spartan1833
@Phil,

Thanks for the example - I'll do some work with it. Appreciate the 
additional information too...I imagine that there is a huge amount 
of variation within FR configurations so I get it that requests for 
assistance need to be as concise as possibledon't always know 
"exactly" what to ask sometimes though :)

Thanks again

On Thu, 27 Dec 2012 10:40:15 -0500 "Phil Mayers" 
 wrote:
>On 12/27/2012 03:19 PM, spartan1...@hushmail.com wrote:
>
>> ...but if not then ok I was simply trying to figure out if I was
>> able to control machine-only 802.1x authentication against
>> FreeRADIUS in a manner similar to how "simple" user 
>authentication
>> appears to be done (via the users file). From your response, it
>> appears that the answer is "NO" and that an LDAP configuration /
>> LDAP groups will be required.
>
>Not so - that's not what Alan said. You mentioned LDAP - he 
>naturally 
>assumed you were looking in that direction.
>
>You can use the "users" file; but you need to alter the config 
>slightly, 
>and due to the way EAP-TLS runs in 2.x, you need to use it in a 
>particular way.
>
>Try this:
>
>/etc/raddb/modules/tls_clients:
>
>files tls_clients {
>   key = "%{TLS-Client-Cert-Common-Name}"
>   usersfile = "/etc/raddb/tls_clients"
>}
>
>/etc/raddb/sites-enabled/default
>
>post-auth {
>   ...
>   if (TLS-Client-Cert-Common-Name) {
> tls_clients.authorize
> if (notfound) {
>   # reject unknown users
>   reject
> }
>   }
>   ...
>}
>
>Modify as appropriate for your needs.
>
>>
>> I'll look into that as time allows...and while I appreciate your
>> quick response, I think that your comment below is a bit
>> unwarranted - one of the points of user groups is to be able to 
>ask
>> the question "I don't know how...at least this has been the case
>> for the last 15 years that I have been doing this stuff."
>
>Unfortunately, the FreeRADIUS community does not have the depth 
>and 
>breadth to provide the level of support and documentation that 
>something 
>like Apache or Samba does. This means there is more onus on you to 

>be 
>specific.
>
>I have my theories about *why* this difference exists - 
>specifically, 
>that FR is a complex infrastructure daemon, which people set up 
>and 
>forget, as opposed to a framework that they constantly use. You 
>see 
>similar issues on other projects (ISC bind, for example) that have 

>these 
>attributes. But whatever the reason, most people post to this list 

>a few 
>times, then vanish - they don't answer questions to people who 
>follow 
>them, write docs or wiki articles, or contribute code.
>
>This leads to a relatively small pool of people who can answer, 
>and to 
>the expectation that you be specific so those people can use their 

>time 
>efficiently. Don't take it personally - it's just a function of 
>the 
>community size.
>
>Cheers,
>Phil
>-
>List info/subscribe/unsubscribe? See 
>http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: 802.1x computer authentication config issue/question

2012-12-27 Thread Alan DeKok
spartan1...@hushmail.com wrote:
> Thanks you for the...quick reply - thought I had spelled out what I 
> was trying to figure out in fairly clear terms:

  Yes, but you didn't saw *how* you wanted this done.  You needed to do
user group checking.  OK, FreeRADIUS isn't a database.  I asked you a
*specific* question about where the groups were stored.

  You failed to answer the question.  Do you know why the question and
answer were important?

 You have to get away from the Microsoft thinking of "the product has
one UI to do everything".  And get to the Unix thinking of "a RADIUS
server does RADIUS.  A database stores data".

> ...but if not then ok I was simply trying to figure out if I was 
> able to control machine-only 802.1x authentication against 
> FreeRADIUS in a manner similar to how "simple" user authentication 
> appears to be done (via the users file). From your response, it 
> appears that the answer is "NO" and that an LDAP configuration / 
> LDAP groups will be required.

No.  You can store groups in LDAP, SQL, flat-text files, etc.
 The documentation contains examples for EACH of those.  Just (a) read
it, and (b) follow the instructions.  It's not hard.

  And You CAN control EAP-TLS via the "users" file.  Just look at the
debug output.  Take the fields from their (User-Name, etc.), and enter
them into the "users" file, with whatever policy you want.  Read the
"users" file documentation for how to create policies with it.

  LDAP is *only* to make your life easier.

> I'll look into that as time allows...and while I appreciate your 
> quick response, I think that your comment below is a bit 
> unwarranted - one of the points of user groups is to be able to ask 
> the question "I don't know how...at least this has been the case 
> for the last 15 years that I have been doing this stuff."

  I asked you specific questions about what you wanted to do, and what
you already had.  You didn't answer them.  So... I'm trying to engage
you in a conversation, and you're stone-walling me.

  As a hint: I've been doing this for 15 years.  If I ask a question,
it's because the answer HELPS ME HELP YOU.  Whining about my response is
ridiculous, and just annoys the people who are trying to help you.

  If you're not going to follow instructions, you will be unsubscribed
and banned.  I've had 15 years of trying to convince people to REALLY
READ THE DOCUMENTATION, and also to REALLY FOLLOW INSTRUCTIONS.  I have
no more patience for people who can't be bothered to help themselves.

  Make no mistake, we *are* here to help.  But this is a free support
list.  We assume that you can (a) describe the problem you're having,
(b) read the documentation, and (c) follow instructions to fix it.

  That's all we ask.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: 802.1x computer authentication config issue/question

2012-12-27 Thread spartan1833

@Phil,

Thanks for the info - appreciate the professional responseI'll 
do some additional research.

On Thu, 27 Dec 2012 10:13:43 -0500 "Phil Mayers" 
 wrote:
>On 12/27/2012 02:32 PM, spartan1...@hushmail.com wrote:
>
>> I played around with the users file in FreeRADIUS but it didn't
>> seem to have any effect unless I put a DEFAULT Auth-Type Reject 
>in
>> the file which blocked everyone regardless of what else I had in
>> the users file. I've Googled around a bit but haven't found any
>> definitive guides on how I would do a FreeRADIUS analog to 
>Windows
>> IAS/NPS policies other than having to include ldap servers 
>and/or
>> other types of external authentication systems which I'm not 
>really
>> interested (at this point) in doing.
>
>LDAP is not an authentication system (not really). It's a 
>directory, 
>which is a form of database.
>
>You are, obviously, going to need some form of "database" in which 

>your 
>policy "memberships" are stored; FreeRADIUS provides several built-

>in 
>modules (LDAP, SQL, files, passwd-style) that can do this.
>
>However - you're going to run into the fact that EAP-TLS as 
>implemented 
>in the 2.x branch doesn't offer very much in the way of 
>authorization - 
>the only place you can run a database lookup and be sure you have 
>the 
>TLS cert details is post-auth (a virtual server step was added in 
>master/3.x).
>
>Basically:
>
>  1. Define a local attribute in raddb/dictionary to hold your 
>groups. 
>Note carefully the stuff in the default dictionary file about 
>local 
>attribute numbers.
>
>  2. Configure one of the various data lookup modules (passwd and 
>files 
>are the simplest but least flexible) to lookup the groups based on 

>the 
>TLS cert attributes (see below)
>
>  3. Run this module in the post-auth section, and act on the 
>result.
>
>raddb/sites-available/default contains comments to this effect in 
>post-auth - search for "TLS-Client" in that file, which also tells 

>you 
>the various TLS cert attributes you can use.
>
>About the only difficult bit is step 2; I thought I'd written 
>something 
>in the wiki about this, but I can't find it (and I can't log in 
>anymore).
>
>If you've got a more specific question, I'll try to reply, but 
>you'll 
>need to do a bit of research into the various "database" modules 
>and 
>decide which one you want to use first.
>-
>List info/subscribe/unsubscribe? See 
>http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: Wiki requires email?

2012-12-27 Thread Alan DeKok
Phil Mayers wrote:
> I can no longer log into the wiki with my github account - seems the
> wiki now requires that I expose an email publicly in my github profile
> (something I am not going to do). Is this intentional? What's the
> rationale?

  Too many retards destroying the Wiki.

  There were weekly page deletions, so that's been forbidden.  There
were nearly daily edits of "ha ha, I can change this".

  Instead of trying to control and ban people, we just publish their
stupidity.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: 802.1x computer authentication config issue/question

2012-12-27 Thread Phil Mayers

On 12/27/2012 03:19 PM, spartan1...@hushmail.com wrote:


...but if not then ok I was simply trying to figure out if I was
able to control machine-only 802.1x authentication against
FreeRADIUS in a manner similar to how "simple" user authentication
appears to be done (via the users file). From your response, it
appears that the answer is "NO" and that an LDAP configuration /
LDAP groups will be required.


Not so - that's not what Alan said. You mentioned LDAP - he naturally 
assumed you were looking in that direction.


You can use the "users" file; but you need to alter the config slightly, 
and due to the way EAP-TLS runs in 2.x, you need to use it in a 
particular way.


Try this:

/etc/raddb/modules/tls_clients:

files tls_clients {
  key = "%{TLS-Client-Cert-Common-Name}"
  usersfile = "/etc/raddb/tls_clients"
}

/etc/raddb/sites-enabled/default

post-auth {
  ...
  if (TLS-Client-Cert-Common-Name) {
tls_clients.authorize
if (notfound) {
  # reject unknown users
  reject
}
  }
  ...
}

Modify as appropriate for your needs.



I'll look into that as time allows...and while I appreciate your
quick response, I think that your comment below is a bit
unwarranted - one of the points of user groups is to be able to ask
the question "I don't know how...at least this has been the case
for the last 15 years that I have been doing this stuff."


Unfortunately, the FreeRADIUS community does not have the depth and 
breadth to provide the level of support and documentation that something 
like Apache or Samba does. This means there is more onus on you to be 
specific.


I have my theories about *why* this difference exists - specifically, 
that FR is a complex infrastructure daemon, which people set up and 
forget, as opposed to a framework that they constantly use. You see 
similar issues on other projects (ISC bind, for example) that have these 
attributes. But whatever the reason, most people post to this list a few 
times, then vanish - they don't answer questions to people who follow 
them, write docs or wiki articles, or contribute code.


This leads to a relatively small pool of people who can answer, and to 
the expectation that you be specific so those people can use their time 
efficiently. Don't take it personally - it's just a function of the 
community size.


Cheers,
Phil
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: 802.1x computer authentication config issue/question

2012-12-27 Thread Phil Mayers

On 12/27/2012 02:32 PM, spartan1...@hushmail.com wrote:


I played around with the users file in FreeRADIUS but it didn't
seem to have any effect unless I put a DEFAULT Auth-Type Reject in
the file which blocked everyone regardless of what else I had in
the users file. I've Googled around a bit but haven't found any
definitive guides on how I would do a FreeRADIUS analog to Windows
IAS/NPS policies other than having to include ldap servers and/or
other types of external authentication systems which I'm not really
interested (at this point) in doing.


LDAP is not an authentication system (not really). It's a directory, 
which is a form of database.


You are, obviously, going to need some form of "database" in which your 
policy "memberships" are stored; FreeRADIUS provides several built-in 
modules (LDAP, SQL, files, passwd-style) that can do this.


However - you're going to run into the fact that EAP-TLS as implemented 
in the 2.x branch doesn't offer very much in the way of authorization - 
the only place you can run a database lookup and be sure you have the 
TLS cert details is post-auth (a virtual server step was added in 
master/3.x).


Basically:

 1. Define a local attribute in raddb/dictionary to hold your groups. 
Note carefully the stuff in the default dictionary file about local 
attribute numbers.


 2. Configure one of the various data lookup modules (passwd and files 
are the simplest but least flexible) to lookup the groups based on the 
TLS cert attributes (see below)


 3. Run this module in the post-auth section, and act on the result.

raddb/sites-available/default contains comments to this effect in 
post-auth - search for "TLS-Client" in that file, which also tells you 
the various TLS cert attributes you can use.


About the only difficult bit is step 2; I thought I'd written something 
in the wiki about this, but I can't find it (and I can't log in anymore).


If you've got a more specific question, I'll try to reply, but you'll 
need to do a bit of research into the various "database" modules and 
decide which one you want to use first.

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: 802.1x computer authentication config issue/question

2012-12-27 Thread spartan1833
Hi,

Thanks you for the...quick reply - thought I had spelled out what I 
was trying to figure out in fairly clear terms:

> or can guide me in how to do local (to the RADIUS server) 
> machine policies - I just want to be able to say "laptop1234...", 

> etc are part of a local group and are authorized (provided that 
> they are properly provisioned with certs, etc).

...but if not then ok I was simply trying to figure out if I was 
able to control machine-only 802.1x authentication against 
FreeRADIUS in a manner similar to how "simple" user authentication 
appears to be done (via the users file). From your response, it 
appears that the answer is "NO" and that an LDAP configuration / 
LDAP groups will be required.

I'll look into that as time allows...and while I appreciate your 
quick response, I think that your comment below is a bit 
unwarranted - one of the points of user groups is to be able to ask 
the question "I don't know how...at least this has been the case 
for the last 15 years that I have been doing this stuff."

Regards...

On Thu, 27 Dec 2012 09:50:03 -0500 "Alan DeKok" 
 wrote:
>spartan1...@hushmail.com wrote:
>> 802.1x appears to be working; any laptop with the certs/config 
>is 
>> able to access the wired and/or wireless network and any laptop 
>> without is denied access. However, in my previous experience 
>with 
>> RADIUS (IAS/NPS in the Windows world), I am able to control 
>access 
>> at a policy level as well; any machine not part of a specific 
>group 
>> is denied access, regardless of what certificate is installed 
>and 
>> what configuration is present on the laptop.
>
>  You can do that in FreeRADIUS, too.  You can do LDAP group 
>comparisons:
>
>http://wiki.freeradius.org/modules/Rlm_ldap
>
>> I played around with the users file in FreeRADIUS but it didn't 
>> seem to have any effect unless I put a DEFAULT Auth-Type Reject 
>in 
>> the file which blocked everyone regardless of what else I had in 

>
>> the users file.
>
>  Well... playing around isn't useful.  You need to first define 
>the
>problem, and then look for a solution.  The problem here seems to 
>be
>looking up groups in LDAP, right?
>
>  So... configure the LDAP module.  Read it's documentation.
>
>> I've Googled around a bit but haven't found any 
>> definitive guides on how I would do a FreeRADIUS analog to 
>Windows 
>> IAS/NPS policies other than having to include ldap servers 
>and/or 
>> other types of external authentication systems which I'm not 
>really 
>> interested (at this point) in doing.
>
>  Are groups are stored in LDAP?  If so, you need to configure
>FreeRADIUS to talk to the LDAP server.
>
>> Guessing that I'm missing something so hoping that someone elss 
>has 
>> done this or can guide me in how to do local (to the RADIUS 
>server) 
>> machine policies - I just want to be able to say 
>"laptop1234...", 
>> etc are part of a local group and are authorized (provided that 
>> they are properly provisioned with certs, etc).
>
>  Where are those groups defined?
>
>  Right now, your question is "I want to do stuff but I don't know 

>how".
> You need to describe what you want to do, in detail.
>
>  Alan DeKok.
>-
>List info/subscribe/unsubscribe? See 
>http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Wiki requires email?

2012-12-27 Thread Phil Mayers
I can no longer log into the wiki with my github account - seems the 
wiki now requires that I expose an email publicly in my github profile 
(something I am not going to do). Is this intentional? What's the rationale?

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: 802.1x computer authentication config issue/question

2012-12-27 Thread Alan DeKok
spartan1...@hushmail.com wrote:
> 802.1x appears to be working; any laptop with the certs/config is 
> able to access the wired and/or wireless network and any laptop 
> without is denied access. However, in my previous experience with 
> RADIUS (IAS/NPS in the Windows world), I am able to control access 
> at a policy level as well; any machine not part of a specific group 
> is denied access, regardless of what certificate is installed and 
> what configuration is present on the laptop.

  You can do that in FreeRADIUS, too.  You can do LDAP group comparisons:

http://wiki.freeradius.org/modules/Rlm_ldap

> I played around with the users file in FreeRADIUS but it didn't 
> seem to have any effect unless I put a DEFAULT Auth-Type Reject in 
> the file which blocked everyone regardless of what else I had in 
> the users file.

  Well... playing around isn't useful.  You need to first define the
problem, and then look for a solution.  The problem here seems to be
looking up groups in LDAP, right?

  So... configure the LDAP module.  Read it's documentation.

> I've Googled around a bit but haven't found any 
> definitive guides on how I would do a FreeRADIUS analog to Windows 
> IAS/NPS policies other than having to include ldap servers and/or 
> other types of external authentication systems which I'm not really 
> interested (at this point) in doing.

  Are groups are stored in LDAP?  If so, you need to configure
FreeRADIUS to talk to the LDAP server.

> Guessing that I'm missing something so hoping that someone elss has 
> done this or can guide me in how to do local (to the RADIUS server) 
> machine policies - I just want to be able to say "laptop1234...", 
> etc are part of a local group and are authorized (provided that 
> they are properly provisioned with certs, etc).

  Where are those groups defined?

  Right now, your question is "I want to do stuff but I don't know how".
 You need to describe what you want to do, in detail.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


802.1x computer authentication config issue/question

2012-12-27 Thread spartan1833
Hi,

First post and new to FreeRadius though have been using RADIUS in 
the Windows world for many years. I have a small network with a 
Linux server and a mix of Windows XP and Windows 7 laptops that I 
am trying to run 802.1x authentication on. I only want to use 
computer/machine auth (user auth handled elsewhere) so I have 
FreeRADIUS set up to use EAP-TLS. I have the CA cert and the 
appropriate client certs installed on the laptops and appropriate 
client configurations for the switch and AP. I've also config'd the 
laptops to use machine auth only.

802.1x appears to be working; any laptop with the certs/config is 
able to access the wired and/or wireless network and any laptop 
without is denied access. However, in my previous experience with 
RADIUS (IAS/NPS in the Windows world), I am able to control access 
at a policy level as well; any machine not part of a specific group 
is denied access, regardless of what certificate is installed and 
what configuration is present on the laptop.

I played around with the users file in FreeRADIUS but it didn't 
seem to have any effect unless I put a DEFAULT Auth-Type Reject in 
the file which blocked everyone regardless of what else I had in 
the users file. I've Googled around a bit but haven't found any 
definitive guides on how I would do a FreeRADIUS analog to Windows 
IAS/NPS policies other than having to include ldap servers and/or 
other types of external authentication systems which I'm not really 
interested (at this point) in doing.

Guessing that I'm missing something so hoping that someone elss has 
done this or can guide me in how to do local (to the RADIUS server) 
machine policies - I just want to be able to say "laptop1234...", 
etc are part of a local group and are authorized (provided that 
they are properly provisioned with certs, etc).

Any thoughts - thanks in advance :) 

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: Question about the behavior of sql.conf

2012-12-27 Thread Phil Mayers

On 12/27/2012 06:00 AM, ichiro tanaka wrote:

Hello

I'm using freeradius 2.1.12. I'm trying to set up sql.conf.
But there is one question.
I made a set of 'safe-character' connection config of the sql.conf.
However,the safe-character's being used in connection is the last(B)
(When I use the A.but B will be used in this case)

Do you think there is a reason what is this?


This is a limitation of 2.x

It is fixed in the "master" branch, which will become 3.0
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: Question about the behavior of sql.conf

2012-12-27 Thread Phil Mayers

On 12/27/2012 06:20 AM, Fajar A. Nugraha wrote:

On Thu, Dec 27, 2012 at 1:00 PM, ichiro tanaka  wrote:


I made a set of 'safe-character' connection config of the sql.conf.
However,the safe-character's being used in connection is the last(B)
(When I use the A.but B will be used in this case)

Do you think there is a reason what is this?


Short version: known problem, hard to fix.

http://www.mail-archive.com/freeradius-users@lists.freeradius.org/msg72933.html



Actually - not any more! Fixed in HEAD/3.0. We re-worked the xlat stuff 
to pass "context" arguments to xlat functions. So, safe-characters is 
now per-instance.


I need to add SQL driver-based escaping next.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re: Fwd: FW:

2012-12-27 Thread Alan DeKok
Arpit Jain wrote:
> I am sending an Access-Request packet using radeapclient without
> password,

  Which is allowed.

> But server is sending Access-Reject to the request.
> 
> Following are the logs of radeapclient:

  So... you're trying to debug the server, but looking at what the
client is doing.

  How about instead running the server in debugging mode, as suggested
in the FAQ, README, "man" page, web pages, and daily on this list?

> But EAP RFC3579 and RFC2869 states that User-Password should not be part
> of a radius packet containing EAP-Message attribute,

  You're debugging the server by reading the RFCs.  Is that right?

> Please let me know if any specific configuration need to be done on the
> server so that server sends Access-Accept.

  Read the documentation.  It's not hard.

  Read my web site:  http://deployingradius.com

  If it takes you more than 5 minutes to get an Access-Accept, you're
not following instructions.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


Re:

2012-12-27 Thread Alan DeKok
Arpit Jain wrote:
> Hi,
> 
> can we send accounting request using radeapclient ??

  No.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


[no subject]

2012-12-27 Thread Arpit Jain
Hi,

can we send accounting request using radeapclient ??

  

I am getting the following error:

** **

radeapclient -x 172.168.200.15 acct testing123

User-Name= " testuser "

EAP-Code = Response

EAP-Id = 210

EAP-Type-Identity = " testuser "

Message-Authenticator = 0x00

** **

** **

+++> About to send encoded packet:

User-Name = " testuser "

EAP-Code = Response

EAP-Id = 210

EAP-Type-Identity = " testuser "

Message-Authenticator = 0x00

rlm_eap: EAP-Message not found

<+++ EAP decoded packet:

**


Regards,

Arpit
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Fwd: FW:

2012-12-27 Thread Arpit Jain
Hi,

I am sending an Access-Request packet using radeapclient without password,**
**

I am giving the following attributes in radeapclient:

User-Name= "testuser"

EAP-Code = Response

EAP-Id = 210

EAP-Type-Identity = " testuser "

Message-Authenticator = 0x00

** **

** **

But server is sending Access-Reject to the request.

Following are the logs of radeapclient:

** **

User-Name= "testuser"

EAP-Code = Response

EAP-Id = 210

EAP-Type-Identity = "testuser"

Message-Authenticator = 0x00

** **

** **

+++> About to send encoded packet:

User-Name = "testuser"

EAP-Code = Response

EAP-Id = 210

EAP-Type-Identity = "testuser"

Message-Authenticator = 0x00

<+++ EAP decoded packet:

EAP-Message = 0x01d3001604107b44069aa80b67319a536bfd4f8ac713

Message-Authenticator = 0xb4499f3ee54742d9dd8469980720dcf6

State = 0x8a52e3488a81e7f33f4b54075fcd3936

EAP-Id = 211

EAP-Code = Request

EAP-Type-MD5 = 0x107b44069aa80b67319a536bfd4f8ac713

** **

+++> About to send encoded packet:

User-Name = "testuser"

EAP-Code = Response

EAP-Id = 211

Message-Authenticator = 0x

EAP-Type-MD5 = 0x10d2c45d5e328b2b2db8bd66c7d171635d

State = 0x8a52e3488a81e7f33f4b54075fcd3936

<+++ EAP decoded packet:

EAP-Message = 0x04d30004

Message-Authenticator = 0xf6f7e2707ef22ea86a660a4ddce7fb30

EAP-Id = 211

EAP-Code = Failure

** **

On further investigation, i found an example to test eap-md5  in the source
code{ freeradius-2.1.8 }  in src/tests

** **

Example is :

** **

echo 'User-Name = "eapmd5"'

echo 'Cleartext-Password = "md5md5"'

echo 'NAS-IP-Address = marajade.sandelman.ottawa.on.ca'

echo 'EAP-Code = Response'

echo 'EAP-Id = 210'

echo 'EAP-Type-Identity = "eapsim'

echo 'Message-Authenticator = 0'

echo 'NAS-Port = 0' )

** **

** **

But EAP RFC3579 and RFC2869 states that User-Password should not be part of
a radius packet containing EAP-Message attribute,

** **

 

it written that “An Access-Request that contains either a User-Password or**
**

CHAP-Password or ARAP-Password or one or more EAP-Message attributes

MUST NOT contain more than one type of those four attributes. If it

does not contain any of those four attributes, it SHOULD contain a

Message-Authenticator. If any packet type contains an EAP-Message

attribute it MUST also contain a Message-Authenticator.”

** **

** **

Please let me know if any specific configuration need to be done on the
server so that server sends Access-Accept.

  

** **

Thanks in advance.

Arpit
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html