ntlm_auth: hex decode of 00 failed
Scott Pickles
scottpickles at yahoo.com
Thu Jul 30 20:27:45 CEST 2015
Figured this part out: had the same ntlm_auth setting in both MS-CHAP AND ntlm_auth module. So I DID have to change the configuration of the ntlm_auth module. I now get a successful authentication, but was still failing with 'No Auth-Type':
>>Program returned code (0) and output 'NT_STATUS_OK: Success (0x0)'>>(0) ntlm_auth : Program executed successfully>>(0) [ntlm_auth] = ok>>(0) [expiration] = noop>>(0) [logintime] = noop>>(0) WARNING: pap : No "known good" password found for the user. Not setting Auth-Type>>(0) WARNING: pap : Authentication will fail unless a "known good" password is available>>(0) [pap] = noop>>(0) } # authorize = ok>>(0) ERROR: No Auth-Type found: rejecting the user via Post-Auth-Type = Reject>>(0) Failed to authenticate the user>>(0) Using Post-Auth-Type Reject
So I updated my ntlm_auth section per Alan B.
>>ldap >> if(Ldap-Group == "VPN-Internal") {>> ok>> } >>else { >> reject>> }
>>ntlm_auth>> if ((ok || updated) && User-Password) {>> update { >> control:Auth-Type := ldap>> } >> }
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnd success!From the firewall:
>>Gateway# test aaa-server authentication RADIUS host 172.18.2.100 username spic$>>INFO: Attempting Authentication test to IP address <HOST_172.18.2.100> (timeout: 12 seconds)>>INFO: Authentication Successful
>>Program returned code (0) and output 'NT_STATUS_OK: Success (0x0)'>>(0) ntlm_auth : Program executed successfully>>(0) [ntlm_auth] = ok>>(0) if ((ok || updated) && User-Password) >>(0) if ((ok || updated) && User-Password) -> TRUE>>(0) if ((ok || updated) && User-Password) {>>(0) update {>>(0) control:Auth-Type := LDAP>>(0) } # update = noop>>(0) } # if ((ok || updated) && User-Password) = noop>>(0) [expiration] = noop>>(0) [logintime] = noop>>(0) WARNING: pap : No "known good" password found for the user. Not setting Auth-Type>>(0) WARNING: pap : Authentication will fail unless a "known good" password is available>>(0) [pap] = noop>>(0) } # authorize = ok>>(0) Found Auth-Type = LDAP>>(0) # Executing group from file /etc/raddb/sites-enabled/default>>(0) Auth-Type LDAP {>>(0) ldap : Login attempt by "spickles">>rlm_ldap (ldap): Reserved connection (4)>>(0) ldap : Using user DN from request "CN=Scott Pickles,CN=Users,DC=myDomain,DC=com">>(0) ldap : Waiting for bind result...>>(0) ldap : Bind successful>>(0) ldap : Bind as user "CN=Scott Pickles,CN=Users,DC=myDomain,DC=com" was successful>>rlm_ldap (ldap): Released connection (4)>>(0) [ldap] = ok>>(0) } # Auth-Type LDAP = ok>>(0) # Executing section post-auth from file /etc/raddb/sites-enabled/default>>(0) post-auth {>>(0) [exec] = noop>>(0) remove_reply_message_if_eap remove_reply_message_if_eap {>>(0) if (&reply:EAP-Message && &reply:Reply-Message) >>(0) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE>>(0) else else {>>(0) [noop] = noop>>(0) } # else else = noop>>(0) } # remove_reply_message_if_eap remove_reply_message_if_eap = noop>>(0) } # post-auth = noop>>(0) Sending Access-Accept packet to host 172.18.1.2 port 1025, id=81, length=0
Thanks so much to all of those that supported me over the last two weeks getting this going. I still have a LONG way to go with this, but I really appreciate the help! I'd like to specifically acknowledge Alan B. and Alan D.!!!
On Thursday, July 30, 2015 12:55 PM, Scott Pickles via Freeradius-Users <freeradius-users at lists.freeradius.org> wrote:
>>Executing: /usr/bin/ntlm_auth --request-nt-key --username=%{%{Stripped-User-Name}:-%{%{User-Name}:-None}} --domain=%{%{mschap:NT-Domain}:-FESYSTEMSCOM} --challenge=%{%{mschap:Challenge}:-00} --nt-response=%{%{mschap:NT-Response}:-00}:>>(0) ntlm_auth : EXPAND --username=%{%{Stripped-User-Name}:-%{%{User-Name}:-None}}>>(0) ntlm_auth : --> --username=spickles>>(0) ERROR: ntlm_auth : No NT-Domain was found in the User-Name>>(0) ntlm_auth : EXPAND --domain=%{%{mschap:NT-Domain}:-FESYSTEMSCOM}>>(0) ntlm_auth : --> --domain=FESYSTEMSCOM>>(0) ERROR: ntlm_auth : No MS-CHAP-Challenge in the request>>(0) ntlm_auth : EXPAND --challenge=%{%{mschap:Challenge}:-00}>>(0) ntlm_auth : --> --challenge=00>>(0) ERROR: ntlm_auth : No MS-CHAP-Response or MS-CHAP2-Response was found in the request>>(0) ntlm_auth : EXPAND --nt-response=%{%{mschap:NT-Response}:-00}>>(0) ntlm_auth : --> --nt-response=00>>hex decode of 00 failed! (only got 1 bytes)
I ultimately want to use FreeRADIUS to authenticate user logins to my Cisco infrastructure, VPN connections to my ASA, and MS-PEAP for WiFi. Currently I'm just trying to run a test connection from my ASA firewall using the RADIUS test built in:
>>test aaa-server authorization RADIUS host 172.18.2.100 username spickles
I'm failing at the ntlm_auth portion above, and if I'm understanding it correctly it's because the test from the ASA is likely sending something like a pap request as opposed to an mschap?
>>ERROR: ntlm_auth : No MS-CHAP-Challenge in the request
This is expected and the default is then '00' based on the setting 'ntlm_auth : EXPAND --challenge=%{%{mschap:Challenge}:-00}'. So I guess at this point I'm looking for some guidance on how I can make all of this work because the RADIUS test isn't going to send an MS-CHAP challenge. Do I need to modify the ntlm_auth configuration to include a 'password' option?
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
More information about the Freeradius-Users
mailing list