freeradius + ldap (AD) + dot1x

Paweł Grzęda pawel.grzeda at kamieniarstwo.pl
Sun Jun 11 11:41:27 CEST 2017


Hello,

I'm newbie at FreeRADIUS. I'm trying to prepare a solution which will
provide authentication for PC/laptop's in corporate network. I need this
for Cisco switches and Ubiquiti APs/controller. There is Samba4
configured as domain controller which is central authentication point. I
installed Freeradius 3.0.14 on Fedora 25. I red all the man pages and
documentation stored in configuration files and to be honest it's huge
amount of information which is not clear for a newbie. I also used
tutorial which seems to be third-party, however link was on official
freeradius wiki I think.

Tutorial:

http://confluence.diamond.ac.uk/display/PAAUTH/Using+LDAP+as+authentication+source

I use start_tls to securely bind to LDAP (which is Samba4 AD DC) and the
binding works, however I still can't get Access-Accept message. I think
my problem is related to clear-text passwords (warning about no known
good password), however I don't know how to fix it. Is it a way to
configure this to be securely?

radiusd -X
Ready to process requests
(0) Received Access-Request Id 193 from 127.0.0.1:47794 to
127.0.0.1:1812 length 72
(0)   User-Name = "mn"
(0)   User-Password = "password"
(0)   NAS-IP-Address = 10.10.150.150
(0)   NAS-Port = 18120
(0)   Message-Authenticator = 0xdbdb908f917ea12c4cce408922a4b23d
(0) # Executing section authorize from file /etc/raddb/sites-enabled/default
(0)   authorize {
(0)     policy filter_username {
(0)       if (&User-Name) {
(0)       if (&User-Name)  -> TRUE
(0)       if (&User-Name)  {
(0)         if (&User-Name =~ / /) {
(0)         if (&User-Name =~ / /)  -> FALSE
(0)         if (&User-Name =~ /@[^@]*@/ ) {
(0)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE
(0)         if (&User-Name =~ /\.\./ ) {
(0)         if (&User-Name =~ /\.\./ )  -> FALSE
(0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {
(0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  
-> FALSE
(0)         if (&User-Name =~ /\.$/)  {
(0)         if (&User-Name =~ /\.$/)   -> FALSE
(0)         if (&User-Name =~ /@\./)  {
(0)         if (&User-Name =~ /@\./)   -> FALSE
(0)       } # if (&User-Name)  = notfound
(0)     } # policy filter_username = notfound
(0)     [preprocess] = ok
(0)     [chap] = noop
(0)     [mschap] = noop
(0)     [digest] = noop
(0) suffix: Checking for suffix after "@"
(0) suffix: No '@' in User-Name = "mn", looking up realm NULL
(0) suffix: No such realm "NULL"
(0)     [suffix] = noop
(0) eap: No EAP-Message, not doing EAP
(0)     [eap] = noop
(0)     [files] = noop
(0)     [expiration] = noop
(0)     [logintime] = noop
(0) pap: WARNING: No "known good" password found for the user.  Not
setting Auth-Type
(0) pap: WARNING: Authentication will fail unless a "known good"
password is available
(0)     [pap] = noop
(0)   } # authorize = ok
(0) ERROR: No Auth-Type found: rejecting the user via Post-Auth-Type =
Reject
(0) Failed to authenticate the user
(0) Using Post-Auth-Type Reject
(0) # Executing group from file /etc/raddb/sites-enabled/default
(0)   Post-Auth-Type REJECT {
(0) attr_filter.access_reject: EXPAND %{User-Name}
(0) attr_filter.access_reject:    --> mn
(0) attr_filter.access_reject: Matched entry DEFAULT at line 11
(0)     [attr_filter.access_reject] = updated
(0)     [eap] = noop
(0)     policy remove_reply_message_if_eap {
(0)       if (&reply:EAP-Message && &reply:Reply-Message) {
(0)       if (&reply:EAP-Message && &reply:Reply-Message)  -> FALSE
(0)       else {
(0)         [noop] = noop
(0)       } # else = noop
(0)     } # policy remove_reply_message_if_eap = noop
(0)   } # Post-Auth-Type REJECT = updated
(0) Delaying response for 1.000000 seconds
Waking up in 0.3 seconds.
Waking up in 0.6 seconds.
(0) Sending delayed response
(0) Sent Access-Reject Id 193 from 127.0.0.1:1812 to 127.0.0.1:47794
length 20
Waking up in 3.9 seconds.
(0) Cleaning up request packet ID 193 with timestamp +21
Ready to process requests



More information about the Freeradius-Users mailing list