freeradius and ntlm_auth howto

Stieven.Struyf at komatsu.eu Stieven.Struyf at komatsu.eu
Thu Oct 26 16:24:06 CEST 2006


All,
I am trying to authenticate my wifi users via our AD. I'm finding bits and 
pieces on the internet to configure things, but no completely usable 
howto.
Can someone of the users look at the ouput below and point me to the 
correct solution/howto?

I setup smb.conf,krb5.conf and freeradius. I joined the server to the 
domain and tested the connection with ntlm_auth:
[root at belx11ke ~]# /usr/bin/ntlm_auth --request-nt-key --username=sstruyf 
--domain=KMT-EU.KMTG.NET
password:
NT_STATUS_OK: Success (0x0)
[root at belx11ke ~]#

rights of the winbind pipe: 
ls -l /var/cache/samba/winbindd_privileged
total 0
srwxrwxrwx  1 root root 0 Oct 25 14:46 pipe

below is the debug output of freeradius

  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
        EAP-Message = 
0x020900521a0209004d3137d2b9533b5dbce9ca720a00d56208c30000   
0000000000008a0b7468748de41ff9fc510e9cc7afb6e1f9faaf0d9a9972004b4d542d45552e4b4d54472e4e45545c73737472757966
  PEAP: Setting User-Name to KMT-EU.KMTG.NET\sstruyf
  PEAP: Adding old state with a4 c3
  PEAP: Sending tunneled request
        EAP-Message = 
0x020900521a0209004d3137d2b9533b5dbce9ca720a00d56208c30000   
0000000000008a0b7468748de41ff9fc510e9cc7afb6e1f9faaf0d9a9972004b4d542d45552e4b4d54472e4e45545c73737472757966
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = "KMT-EU.KMTG.NET\\sstruyf"
        State = 0xa4c337a92357e8d90a5f8c64b37d2df1
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
    rlm_realm: No '@' in User-Name = "KMT-EU.KMTG.NET\sstruyf", looking up 
realm   NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "kmt-eu.kmtg.net" returns noop for request 7
    rlm_realm: Looking up realm "KMT-EU.KMTG.NET" for User-Name = 
"KMT-EU.KMTG.NET\sstruyf"
    rlm_realm: Found realm "KMT-EU.KMTG.NET"
    rlm_realm: Adding Stripped-User-Name = "sstruyf"
    rlm_realm: Proxying request from user sstruyf to realm KMT-EU.KMTG.NET
    rlm_realm: Adding Realm = "KMT-EU.KMTG.NET"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 7
  rlm_eap: EAP packet type response id 9 length 82
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched sstruyf at 98
  modcall[authorize]: module "files" returns ok for request 7
modcall: group authorize returns updated for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  Processing the authenticate section of radiusd.conf
modcall: entering group Auth-Type for request 7
  rlm_mschap: No User-Password configured.  Cannot create LM-Password.
  rlm_mschap: No User-Password configured.  Cannot create NT-Password.
  rlm_mschap: NT Domain delimeter found, should we have enabled 
with_ntdomain_hack?
  rlm_mschap: Told to do MS-CHAPv2 for KMT-EU.KMTG.NET\sstruyf with 
NT-Password
radius_xlat: Running registered xlat function of module mschap for string 
'Challenge'
 mschap2: 95
  rlm_mschap: NT Domain delimeter found, should we have enabled 
with_ntdomain_hack?
radius_xlat: Running registered xlat function of module mschap for string 
'NT-Response'
radius_xlat:  '/usr/bin/ntlm_auth --request-nt-key --username=sstruyf 
--challeng e=7b634e5c9dd73ddc 
--nt-response=8a0b7468748de41ff9fc510e9cc7afb6e1f9faaf0d9a9972'
Exec-Program: /usr/bin/ntlm_auth --request-nt-key --username=sstruyf 
--challenge=7b634e5c9dd73ddc 
--nt-response=8a0b7468748de41ff9fc510e9cc7afb6e1f9faaf0d9a9972
Exec-Program output: winbind client not authorized to use 
winbindd_pam_auth_crap.  Ensure permissions on 
/var/cache/samba/winbindd_privileged are set correctly.   (0xc0000022)
Exec-Program-Wait: plaintext: winbind client not authorized to use 
winbindd_pam_auth_crap.  Ensure permissions on 
/var/cache/samba/winbindd_privileged are set correctly. (0xc0000022)
Exec-Program: returned: 1
  rlm_mschap: External script failed.
  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
  modcall[authenticate]: module "mschap" returns reject for request 7
modcall: group Auth-Type returns reject for request 7
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns reject for request 7
modcall: group authenticate returns reject for request 7
auth: Failed to validate the user.
Login incorrect: [KMT-EU.KMTG.NET\\sstruyf/<no User-Password attribute>] 
(from client localhost port 0)
  Processing the post-auth section of radiusd.conf
modcall: entering group Post-Auth-Type for request 7

Stieven Struyf
M.I.S. Division - System Operations 
Komatsu Europe International NV
Mechelsesteenweg 586
B-1800 Vilvoorde
Stieven.Struyf at komatsu.eu
Tel. +32 (0)2 2552551
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20061026/f91d4766/attachment.html>


More information about the Freeradius-Users mailing list