Re: [RADIATOR] PEAP and realm check

2014-08-19 Thread Roberto Pantoja
On 08/19/2014 11:50 AM, Klara Mall wrote:
> Hi,
>
> we have a problem concerning authentication with PEAP/MSCHAP-V2. We want to 
> use
> different handlers per realm the user authenticates with. This is the
> configuration which does not work:
>
> -
> 
> Identifier ntlm-wifi2vlan
> Domain KIT
> NtlmAuthProg /usr/bin/ntlm_auth --helper-protocol=ntlm-server-1
> UsernameMatchesWithoutRealm
> EAPType MSCHAP-V2
> 
>
> 
> Identifier ldap-ad-kit-eap
> Include %D/server/KIT-DC-01
> BaseDN  dc=kit,dc=edu
> Timeout 5
> ServerChecksPassword
> UsernameAttr sAMAccountName
> PasswordAttr
>
> EAPType PEAP
> EAPTLS_CAFile %D/certificates/chain-kit-ca.pem
> EAPTLS_CertificateFile %D/certificates/server.pem
> EAPTLS_CertificateType PEM
> EAPTLS_MaxFragmentSize 1000
> EAPTLS_PrivateKeyFile %D/certificates/server.key
> EAPTLS_PEAPVersion 0
> EAPTLS_PEAPBrokenV1Label
> AutoMPPEKeys
> 
>
> # this does work
> # 
> # this does not work
> 
> Identifier SCC-WLAN-colubris-test
> AuthBy ntlm-wifi2vlan
> 
>
> 
> AuthBy ldap-ad-kit-eap
> 
>
> -
>
> In the comments you see that the problem is the check of the realm. I test 
> this with eapol_test:
> /usr/bin/eapol_test \
> -N 32:s:colubris-wifi2vlan -c conf.colubris -a xxx.xx.xx.xx -p 1812 
> -s "xxx"
>
> conf.colubris:
> network={
> ssid="wifi2vlantest"
> pairwise=CCMP TKIP
> group=CCMP TKIP WEP104 WEP40
> eap=PEAP
> eapol_flags=0
> key_mgmt=IEEE8021X
> identity="scc-netadmin-0001@colubris-test"
> password="x"
> ca_cert="/etc/ssl/certs/deutsche-telekom-root-ca-2.pem"
> phase2="auth=MSCHAPV2"
> anonymous_identity="qwerty@colubris-test"
> }
>
> I added some debug logging in the radiator source. Then I could see
> that the realm is empty. So if I check for "Realm=" instead for the
> real realm it works, too.
>
> If you need the radiator log file (debug level) just tell. Only two
> eapol_test attempts (one with the non-working and one with the working
> configuration) produce a 82K file. 
>
> BTW: The same setup with EAP-TTLS/PAP is no problem. With TTLS I see that the
> checked realm is the one of the inner identity which seams reasonable for me.
>
> I'm also wondering where User-Name anonymous in the log comes from
> as I don't use "anonymous" as anonymous identity here. 
>
> Can you help here? I need this because later I have to expand ntlm_auth with
> --require-membership-of= with a variable group name (though I had to patch
> radiator for this to work - there will be another email for this :) ).
>
> Thanks in advance
> Klara
>
you can do something similar to this:


AuthByPolicy ContinueUntilAcceptOrChallenge

# ActiveDirectory Group 1

Identifier Group1-PEAP
NtlmAuthProg /usr/bin/ntlm_auth 
--helper-protocol=ntlm-server-1 --require-membership-of=KIT/Group1
Domain KIT
DefaultDomain KIT
EAPType MSCHAP-V2
## Specific configuration for this group
  

# ActiveDirectory Group 2

Identifier Group2-PEAP
NtlmAuthProg /usr/bin/ntlm_auth 
--helper-protocol=ntlm-server-1 --require-membership-of=KIT/Group2
Domain KIT
DefaultDomain KIT
EAPType MSCHAP-V2
## Specific configuration for this group




AuthByPolicy ContinueUntilAcceptOrChallenge

Filename %D/users
EAPType PEAP
EAPTLS_CAFile %D/certificates/cacert.pem
EAPTLS_CertificateFile %D/certificates/radiator-cert.pem
EAPTLS_CertificateType PEM 
EAPTLS_PrivateKeyFile %D/certificates/radiator-key.pem
EAPTLS_PrivateKeyPassword scdm2k13
EAPTLS_MaxFragmentSize 1024
EAPTLS_PEAPVersion 0
EAPTLS_PEAPBrokenV1Lablel
AutoMPPEKeys



Greetings.

-- 


This message has been scanned for malware by Websense. www.websense.com
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator

Re: [RADIATOR] Radiator using WPA2-Enterprise and dynamic VLAN Assignment (Part 1)

2014-03-26 Thread Roberto Pantoja
Thank you, I will try tagging values for the reply...

On 03/26/2014 12:47 PM, Sami Keski-Kasari wrote:
> Hello Roberto,
>
> The RFC2868 defines that tunnel attributes includes Tag field before
> value. Some NASes are needing that it is defined and some not.
>
> Try for example with
>
> mikem2  User-Password=fred
> Service-Type = Framed-User,
> Tunnel-Private-Group-ID = 0:,
> Tunnel-Medium-Type = 0:802,
> Tunnel-Type = 0:VLAN
>
> or
> mikem2  User-Password=fred
> Service-Type = Framed-User,
> Tunnel-Private-Group-ID = 1:,
> Tunnel-Medium-Type = 1:802,
> Tunnel-Type = 1:VLAN
>
>
> Best Regards,
>  Sami
>
> On 03/26/2014 08:16 PM, Roberto Pantoja wrote:
>> Thank you for your promptly answer, but I have the same effect if I put
>> the VLAN name or numeric ID. Do you have any other idea that can help me
>> to resolve this problem.
>>
>> Best regards.
>>
>> On 03/26/2014 11:37 AM, Hartmaier Alexander wrote:
>>> On 2014-03-26 18:40, Roberto Pantoja wrote:
>>>> I have a problem trying to assign dynamic VLANs to users on a 
>>>> WPA2-Enterprise configuration. Users have successful authentication
>>>> and if I don't send the Radius Attribute "Tunnel-Private-Group-ID"
>>>> The Wireless Controller connects me to the default VLan for the SSID,
>>>> but when I send "Tunnel-Private-Group-ID", the Wireless Controller
>>>> simply drops out my connection. The Wireless controller documentation
>>>> says the required attributes in the Access-Accept Reply are
>>>> "Tunnel-Type=VLAN, Tunnel-Medium-Type=802,
>>>> Tunnel-Private-Group-ID=".  Everything works fine using
>>>> Ignition Server (Avaya's Radius Server). But on product's
>>>> documentation says WC8180 comply with RFC Standards and mentions to
>>>> be "compatible and validated" with freeradius and Microsoft IAS, so I
>>>> think my case is a configuration issue.
>>>>
>>>> Regards.
>>>>
>>>> Radiator Version: 4.12.1
>>>> Wireless Controller: AVAYA WC8180
>>>> Wireless Access Points: AVAYA AP8120
>>>>
>>>> Config file:
>>>> *** Config File ***
>>>> # radius.cfg
>>>>
>>>> Foreground
>>>> LogStdout
>>>> LogDir  /var/log/radius
>>>> LogFile %L/logfile.%Y.%m.%d
>>>> DbDir   /etc/radiator
>>>> # User a lower trace level in production systems:
>>>> Trace   4
>>>> AuthPort 1812
>>>> AcctPort 1813
>>>>
>>>> 
>>>> Secret verysecret
>>>> PacketTrace
>>>> Identifier Avaya WC8180
>>>> 
>>>>
>>>> 
>>>> 
>>>> Filename %D/users
>>>> EAPType MSCHAP-V2
>>>> 
>>>> 
>>>>
>>>> 
>>>> 
>>>> Filename %D/users
>>>> EAPType PEAP
>>>> EAPTLS_CAFile %D/certificates/cacert.pem
>>>> #   EAPTLS_CAPath
>>>> EAPTLS_CertificateFile %D/certificates/radiator-cert.pem
>>>> EAPTLS_CertificateType PEM
>>>> EAPTLS_PrivateKeyFile %D/certificates/radiator-key.pem
>>>> EAPTLS_PrivateKeyPassword verysecret
>>>> #   EAPTLS_RandomFile %D/certificates/random
>>>> EAPTLS_MaxFragmentSize 1024
>>>> #   EAPTLS_DHFile %D/certificates/cert/dh
>>>> #EAPTLS_CRLCheck
>>>> #EAPTLS_CRLFile %D/certificates/crl.pem
>>>> #EAPTLS_CRLFile %D/certificates/revocations.pem
>>>> AutoMPPEKeys
>>>> #EAPTLS_SessionResumption 0
>>>> #EAPTLS_SessionResumptionLimit 10
>>>> EAPAnonymous anonymous@localhost
>>>> EAPTLS_PEAPVersion 0
>>>> EAPTTLS_NoAckRequired
>>>> 
>>>> 
>>>> *** EOF Config File ***
>>>>
>>>>
>>>> Users file:
>>>> mikem user without VLAN default VLAN - Quarantine - no IP address
>>>> mikem1 user with VLAN Empleados - IP address range 10.0.21.0/24
>>&

[RADIATOR] Fwd: Re: Radiator using WPA2-Enterprise and dynamic VLAN Assignment (Part 1)

2014-03-26 Thread Roberto Pantoja

Thank you, I will try using the radius proxy to know what are exactly
the attributes Ignition Server sends to WLAN controller. 

On 03/26/2014 12:02 PM, Klara Mall wrote:
> Hi,
>
> On 03/26/2014 06:40 PM, Roberto Pantoja wrote:
>> I have a problem trying to assign dynamic VLANs to users on a 
>> WPA2-Enterprise configuration. Users have successful authentication and
>> if I don't send the Radius Attribute "Tunnel-Private-Group-ID" The
>> Wireless Controller connects me to the default VLan for the SSID, but
>> when I send "Tunnel-Private-Group-ID", the Wireless Controller simply
>> drops out my connection. The Wireless controller documentation says the
>> required attributes in the Access-Accept Reply are "Tunnel-Type=VLAN,
>> Tunnel-Medium-Type=802, Tunnel-Private-Group-ID=". 
>> Everything works fine using Ignition Server (Avaya's Radius Server). But
>> on product's documentation says WC8180 comply with RFC Standards and
>> mentions to be "compatible and validated" with freeradius and Microsoft
>> IAS, so I think my case is a configuration issue.
> Are you sure that it's
> Tunnel-Type=VLAN, Tunnel-Medium-Type=802, Tunnel-Private-Group-ID= of VLAN>
> for your wireless controller?
>
> We have an HP ProCurve WLAN Controller and I have to send:
> Tunnel-Type = 13, Tunnel-Medium-Type = 6, Tunnel-Private-Group-ID =
> 
>
> It's the same for our LANCOM Access Points which are autonomous (no
> controller).
>
> I found a document "Avaya WLAN 8100 Fundamentals" regarding AVAYA WC8180
> WLAN Controller. They say WC8180 is part of the WLAN 8100 solution.
> http://198.152.212.23/css/P8/documents/100161076 (PDF file)
>
> On page 87 they talk about authorization attributes:
> Tunnel-Private-Group-Id: Mobility VLAN Name
> Tunnel-Medium-Type: The value is 6 (IEEE 802)
> Tunnel-Type: The value is 13 (VLAN)
>
> So perhaps you have to send
>
> Tunnel-Type=13, Tunnel-Medium-Type=6, Tunnel-Private-Group-ID=
>
> Apart from that: is it possible to proxy the request of the controller
> through radiator to the Ignition Server i.e. to configure the radiator
> server as a client on the Ignition Server? Then you'd see all attributes
> that the Ignition Server is sending in the radiator debug log.
>
> Regards
> Klara
>


-- 
---
Roberto Carlos Pantoja Valdizón
Analista de Sistemas
ATI/GDEI/LaGeo





This message has been scanned for malware by Websense. www.websense.com
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator


Re: [RADIATOR] Radiator using WPA2-Enterprise and dynamic VLAN Assignment (Part 1)

2014-03-26 Thread Roberto Pantoja
Thank you for your promptly answer, but I have the same effect if I put
the VLAN name or numeric ID. Do you have any other idea that can help me
to resolve this problem.

Best regards.

On 03/26/2014 11:37 AM, Hartmaier Alexander wrote:
> On 2014-03-26 18:40, Roberto Pantoja wrote:
>> I have a problem trying to assign dynamic VLANs to users on a 
>> WPA2-Enterprise configuration. Users have successful authentication
>> and if I don't send the Radius Attribute "Tunnel-Private-Group-ID"
>> The Wireless Controller connects me to the default VLan for the SSID,
>> but when I send "Tunnel-Private-Group-ID", the Wireless Controller
>> simply drops out my connection. The Wireless controller documentation
>> says the required attributes in the Access-Accept Reply are
>> "Tunnel-Type=VLAN, Tunnel-Medium-Type=802,
>> Tunnel-Private-Group-ID=".  Everything works fine using
>> Ignition Server (Avaya's Radius Server). But on product's
>> documentation says WC8180 comply with RFC Standards and mentions to
>> be "compatible and validated" with freeradius and Microsoft IAS, so I
>> think my case is a configuration issue.
>>
>> Regards.
>>
>> Radiator Version: 4.12.1
>> Wireless Controller: AVAYA WC8180
>> Wireless Access Points: AVAYA AP8120
>>
>> Config file:
>> *** Config File ***
>> # radius.cfg
>>
>> Foreground
>> LogStdout
>> LogDir  /var/log/radius
>> LogFile %L/logfile.%Y.%m.%d
>> DbDir   /etc/radiator
>> # User a lower trace level in production systems:
>> Trace   4
>> AuthPort 1812
>> AcctPort 1813
>>
>> 
>> Secret verysecret
>> PacketTrace
>> Identifier Avaya WC8180
>> 
>>
>> 
>> 
>> Filename %D/users
>> EAPType MSCHAP-V2
>> 
>> 
>>
>> 
>> 
>> Filename %D/users
>> EAPType PEAP
>> EAPTLS_CAFile %D/certificates/cacert.pem
>> #   EAPTLS_CAPath
>> EAPTLS_CertificateFile %D/certificates/radiator-cert.pem
>> EAPTLS_CertificateType PEM
>> EAPTLS_PrivateKeyFile %D/certificates/radiator-key.pem
>> EAPTLS_PrivateKeyPassword verysecret
>> #   EAPTLS_RandomFile %D/certificates/random
>> EAPTLS_MaxFragmentSize 1024
>> #   EAPTLS_DHFile %D/certificates/cert/dh
>> #EAPTLS_CRLCheck
>> #EAPTLS_CRLFile %D/certificates/crl.pem
>> #EAPTLS_CRLFile %D/certificates/revocations.pem
>> AutoMPPEKeys
>> #EAPTLS_SessionResumption 0
>> #EAPTLS_SessionResumptionLimit 10
>> EAPAnonymous anonymous@localhost
>> EAPTLS_PEAPVersion 0
>> EAPTTLS_NoAckRequired
>> 
>> 
>> *** EOF Config File ***
>>
>>
>> Users file:
>> mikem user without VLAN default VLAN - Quarantine - no IP address
>> mikem1 user with VLAN Empleados - IP address range 10.0.21.0/24
>> mikem2 user with VLAN ATI - IP address range 10.0.19.0/24
>> *** Users file ***
>> # users
>> # This is an example of how to set up simple user for
>> # AuthBy FILE.
>> # The example user mikem has a password of fred, and will
>> # receive reply attributes suitable for most NASs.
>> # You can do many more interesting things. See the Radiator reference
>> # manual for more details
>> #
>> # You can test this user with the command
>> #  perl radpwtst
>>
>> mikem   User-Password=fred
>> Service-Type = Framed-User,
>> Tunnel-Medium-Type = 802,
>> Tunnel-Type = VLAN
>>
>> mikem1  User-Password=fred
>> Service-Type = Framed-User,
>> Tunnel-Private-Group-ID = Empleados,
>> Tunnel-Medium-Type = 802,
>> Tunnel-Type = VLAN
>>
>> mikem2  User-Password=fred
>> Service-Type = Framed-User,
>> Tunnel-Private-Group-ID = ATI,
>> Tunnel-Medium-Type = 802,
>> Tunnel-Type = VLAN
>>
>> *** EOF users file ***
>
> We're doing that with Cisco WLCs without problems but in our case by
> sending the VLAN ID, not its name like for wired dot1x where Cisco IOS
> switches want the VLAN name:
>
> AddToReply Tunnel-Type=VLAN,\
>Tunnel-Medium-Type=802, \
>Tunnel-Private-G

[RADIATOR] Radiator using WPA2-Enterprise and dynamic VLAN Assignment (Part 1)

2014-03-26 Thread Roberto Pantoja
I have a problem trying to assign dynamic VLANs to users on a 
WPA2-Enterprise configuration. Users have successful authentication and
if I don't send the Radius Attribute "Tunnel-Private-Group-ID" The
Wireless Controller connects me to the default VLan for the SSID, but
when I send "Tunnel-Private-Group-ID", the Wireless Controller simply
drops out my connection. The Wireless controller documentation says the
required attributes in the Access-Accept Reply are "Tunnel-Type=VLAN,
Tunnel-Medium-Type=802, Tunnel-Private-Group-ID=". 
Everything works fine using Ignition Server (Avaya's Radius Server). But
on product's documentation says WC8180 comply with RFC Standards and
mentions to be "compatible and validated" with freeradius and Microsoft
IAS, so I think my case is a configuration issue.

Regards.

Radiator Version: 4.12.1
Wireless Controller: AVAYA WC8180
Wireless Access Points: AVAYA AP8120

Config file:
*** Config File ***
# radius.cfg

Foreground
LogStdout
LogDir  /var/log/radius
LogFile %L/logfile.%Y.%m.%d
DbDir   /etc/radiator
# User a lower trace level in production systems:
Trace   4
AuthPort 1812
AcctPort 1813


Secret verysecret
PacketTrace
Identifier Avaya WC8180




Filename %D/users
EAPType MSCHAP-V2





Filename %D/users
EAPType PEAP
EAPTLS_CAFile %D/certificates/cacert.pem
#   EAPTLS_CAPath
EAPTLS_CertificateFile %D/certificates/radiator-cert.pem
EAPTLS_CertificateType PEM
EAPTLS_PrivateKeyFile %D/certificates/radiator-key.pem
EAPTLS_PrivateKeyPassword verysecret
#   EAPTLS_RandomFile %D/certificates/random
EAPTLS_MaxFragmentSize 1024
#   EAPTLS_DHFile %D/certificates/cert/dh
#EAPTLS_CRLCheck
#EAPTLS_CRLFile %D/certificates/crl.pem
#EAPTLS_CRLFile %D/certificates/revocations.pem
AutoMPPEKeys
#EAPTLS_SessionResumption 0
#EAPTLS_SessionResumptionLimit 10
EAPAnonymous anonymous@localhost
EAPTLS_PEAPVersion 0
EAPTTLS_NoAckRequired


*** EOF Config File ***


Users file:
mikem user without VLAN default VLAN - Quarantine - no IP address
mikem1 user with VLAN Empleados - IP address range 10.0.21.0/24
mikem2 user with VLAN ATI - IP address range 10.0.19.0/24
*** Users file ***
# users
# This is an example of how to set up simple user for
# AuthBy FILE.
# The example user mikem has a password of fred, and will
# receive reply attributes suitable for most NASs.
# You can do many more interesting things. See the Radiator reference
# manual for more details
#
# You can test this user with the command
#  perl radpwtst

mikem   User-Password=fred
Service-Type = Framed-User,
Tunnel-Medium-Type = 802,
Tunnel-Type = VLAN

mikem1  User-Password=fred
Service-Type = Framed-User,
Tunnel-Private-Group-ID = Empleados,
Tunnel-Medium-Type = 802,
Tunnel-Type = VLAN

mikem2  User-Password=fred
Service-Type = Framed-User,
Tunnel-Private-Group-ID = ATI,
Tunnel-Medium-Type = 802,
Tunnel-Type = VLAN

*** EOF users file ***

-- 
---
Roberto Carlos Pantoja Valdizón
Analista de Sistemas
ATI/GDEI/LaGeo



This message has been scanned for malware by Websense. www.websense.com
___
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator