Google authenticator : Access-Reject
servernemesis at tutanota.com
servernemesis at tutanota.com
Wed Apr 25 10:01:53 CEST 2018
I'm using the radtest command on localhost with the secret testing123 (double checked)
25. Avr 2018 09:55 de eero.volotinen at iki.fi <mailto:eero.volotinen at iki.fi>:
> well. radius secret can be wrong also for your client.
>
> radius secret is in client.conf and its tied to client ip address. check it
> out and test again.
>
> anyway. in your config you need use only google code, not password.
>
> Eero
>
> ke 25. huhtik. 2018 klo 10.49 <> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>> > kirjoitti:
>
>> Hello,
>>
>> No because if I login with SSH, it works :
>>
>> Apr 25 09:45:10 SRV-FREERADIUS sshd(pam_google_authenticator)[1885]:
>> Accepted google_authenticator for user
>> Apr 25 09:45:11 SRV-FREERADIUS sshd[1885]: Accepted password for user from
>> 192.168.50.68 port 50020 ssh2
>> Apr 25 09:45:11 SRV-FREERADIUS sshd[1885]: pam_unix(sshd:session): session
>> opened for user user by (uid=0)
>> Apr 25 09:45:11 SRV-FREERADIUS systemd-logind[535]: New session 11 of user
>> user.
>>
>> I don't get why it's not working with the radius...
>>
>> 25. Avr 2018 09:46 de >> eero.volotinen at iki.fi <mailto:eero.volotinen at iki.fi>>> <>> mailto:eero.volotinen at iki.fi <mailto:mailto:eero.volotinen at iki.fi>
>> >:
>>
>>
>> > It means that code is wrong? is the server using ntp and clock is sync
>> and
>> > mobile is in sync.
>> >
>> > Try following: log into user. delete .google* file from user home
>> directory.
>> >
>> > run google-authenticator without params and select time based token/auth
>> > and add new authenticator code to google auth in phone
>> >
>> > Eero
>> >
>> > ke 25. huhtik. 2018 klo 10.39 <> >> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> <mailto:
>> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> >> > kirjoitti:
>> >
>> >> PS : If I disable the domain suffix for the users on the server (being
>> >> able to login with just "user"), I get
>> >>
>> >> Apr 25 09:27:42 SRV-FREERADIUS radiusd(pam_google_authenticator)[1661]:
>> >> Invalid verification code for user
>> >>
>> >>
>> >> 25. Avr 2018 09:15 de >> >> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> <mailto:
>> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> >>> <mailto:
>> >> >> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> <>> mailto:servernemesis at tutanota.com <mailto:mailto:servernemesis at tutanota.com>>> >>> >:
>> >>
>> >>
>> >> > I tried
>> >> >
>> >> > #
>> >> > # /etc/pam.d/radiusd - PAM configuration for FreeRADIUS
>> >> > #
>> >> >
>> >> > # We fall back to the system default in /etc/pam.d/common-*
>> >> > #
>> >> >
>> >> > #@include common-auth
>> >> > #@include common-account
>> >> > #@include common-password
>> >> > #@include common-session
>> >> > auth required /usr/local/lib/security/pam_google_authenticator.so
>> >> >
>> >> > and
>> >> >
>> >> > #
>> >> > # /etc/pam.d/radiusd - PAM configuration for FreeRADIUS
>> >> > #
>> >> >
>> >> > # We fall back to the system default in /etc/pam.d/common-*
>> >> > #
>> >> >
>> >> > #@include common-auth
>> >> > #@include common-account
>> >> > #@include common-password
>> >> > #@include common-session
>> >> > auth requisite /usr/local/lib/security/pam_google_authenticator.so
>> >> forward_pass
>> >> > auth required pam_unix.so use_first_pass
>> >> >
>> >> > In both cases :
>> >> >
>> >> > Apr 25 09:05:43 SRV-FREERADIUS
>> radiusd(pam_google_authenticator)[6847]:
>> >> user("user") not found
>> >> > Apr 25 09:05:43 SRV-FREERADIUS
>> radiusd(pam_google_authenticator)[6847]:
>> >> No secret configured for user user, asking for code anyway.
>> >> > Apr 25 09:05:43 SRV-FREERADIUS
>> radiusd(pam_google_authenticator)[6847]:
>> >> Invalid verification code for user
>> >> >
>> >> >
>> >> >
>> >> > 24. Avr 2018 19:21 de > >> >> eero.volotinen at iki.fi <mailto:eero.volotinen at iki.fi>>> <mailto:
>> eero.volotinen at iki.fi <mailto:eero.volotinen at iki.fi>>> >>> <mailto:
>> >> >> eero.volotinen at iki.fi <mailto:eero.volotinen at iki.fi>>> <>> mailto:eero.volotinen at iki.fi <mailto:mailto:eero.volotinen at iki.fi>>> >>> >> :
>> >> >
>> >> >
>> >> >> You need to enable pam logging on google authenticator.
>> >> >>
>> >> >> what is content of /etc/pam.d/radiusd ?
>> >> >>
>> >> >> Eero
>> >> >>
>> >> >> ti 24. huhtik. 2018 klo 17.29 <>> >> >> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>
>> <>> mailto:servernemesis at tutanota.com <mailto:mailto:servernemesis at tutanota.com>>> >>> <mailto:
>> >> >> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> <>> mailto:servernemesis at tutanota.com <mailto:mailto:servernemesis at tutanota.com>>> >>> >>> >
>> kirjoitti:
>> >> >>
>> >> >>> Thanks, it looks better but it's still failing :
>> >> >>>
>> >> >>> Ready to process requests
>> >> >>> (0) Received Access-Request Id 113 from 127.0.0.1:34793 to
>> >> 127.0.0.1:1812
>> >> >>> length 92
>> >> >>> (0) User-Name = ">>> >> >> user at mydomain.com <mailto:user at mydomain.com>>> <mailto:
>> user at mydomain.com <mailto:user at mydomain.com>>> >>> <>> >> mailto:user at mydomain.com <mailto:mailto:user at mydomain.com>>> <mailto:mailto:
>> user at mydomain.com <mailto:user at mydomain.com>>> >>> >>>>
>> >> <>>> >> >> mailto:user at mydomain.com <mailto:mailto:user at mydomain.com>>> <>> mailto:mailto:user at mydomain.com <mailto:mailto:mailto:user at mydomain.com>>> >>>
>> <>> >> mailto:mailto:user at mydomain.com <mailto:mailto:mailto:user at mydomain.com>>> <mailto:mailto:mailto:
>> user at mydomain.com <mailto:user at mydomain.com>>> >>> >>>> >"
>> >> >>> (0) User-Password = "password123456"
>> >> >>> (0) NAS-IP-Address = 127.0.1.1
>> >> >>> (0) NAS-Port = 18120
>> >> >>> (0) Message-Authenticator = 0xd028fefb31c1de33ebec1d53011953ce
>> >> >>> (0) # Executing section authorize from file
>> >> >>> /etc/freeradius/3.0/sites-enabled/default
>> >> >>> (0) authorize {
>> >> >>> (0) policy filter_username {
>> >> >>> (0) if (&User-Name) {
>> >> >>> (0) if (&User-Name) -> TRUE
>> >> >>> (0) if (&User-Name) {
>> >> >>> (0) if (&User-Name =~ / /) {
>> >> >>> (0) if (&User-Name =~ / /) -> FALSE
>> >> >>> (0) if (&User-Name =~ /@[^@]*@/ ) {
>> >> >>> (0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
>> >> >>> (0) if (&User-Name =~ /\.\./ ) {
>> >> >>> (0) if (&User-Name =~ /\.\./ ) -> FALSE
>> >> >>> (0) if ((&User-Name =~ /@/) && (&User-Name !~
>> >> /@(.+)\.(.+)$/)) {
>> >> >>> (0) if ((&User-Name =~ /@/) && (&User-Name !~
>> /@(.+)\.(.+)$/))
>> >> >>> -> FALSE
>> >> >>> (0) if (&User-Name =~ /\.$/) {
>> >> >>> (0) if (&User-Name =~ /\.$/) -> FALSE
>> >> >>> (0) if (&User-Name =~ /@\./) {
>> >> >>> (0) if (&User-Name =~ /@\./) -> FALSE
>> >> >>> (0) } # if (&User-Name) = notfound
>> >> >>> (0) } # policy filter_username = notfound
>> >> >>> (0) [preprocess] = ok
>> >> >>> (0) [chap] = noop
>> >> >>> (0) [mschap] = noop
>> >> >>> (0) [digest] = noop
>> >> >>> (0) suffix: Checking for suffix after "@"
>> >> >>> (0) suffix: Looking up realm "mydomain.com" for User-Name = "
>> >> >>> >> >> user at mydomain.com <mailto:user at mydomain.com>>> <>> mailto:user at mydomain.com <mailto:mailto:user at mydomain.com>>> >>> <>> mailto:
>> user at mydomain.com <mailto:user at mydomain.com>>> <>> mailto:mailto:user at mydomain.com <mailto:mailto:mailto:user at mydomain.com>>> >>> >>>> <>>> mailto:
>> >> >> user at mydomain.com <mailto:user at mydomain.com>>> <>> mailto:user at mydomain.com <mailto:mailto:user at mydomain.com>>> >>> <>> mailto:mailto:
>> user at mydomain.com <mailto:user at mydomain.com>>> <>> mailto:mailto:mailto:user at mydomain.com <mailto:mailto:mailto:mailto:user at mydomain.com>>> >>> >>>> >"
>> >> >>> (0) suffix: Found realm "mydomain.com"
>> >> >>> (0) suffix: Adding Stripped-User-Name = "user"
>> >> >>> (0) suffix: Adding Realm = "mydomain.com"
>> >> >>> (0) suffix: Authentication realm is LOCAL
>> >> >>> (0) [suffix] = ok
>> >> >>> (0) eap: No EAP-Message, not doing EAP
>> >> >>> (0) [eap] = noop
>> >> >>> (0) files: users: Matched entry DEFAULT at line 221
>> >> >>> (0) [files] = ok
>> >> >>> (0) [expiration] = noop
>> >> >>> (0) [logintime] = noop
>> >> >>> (0) pap: WARNING: No "known good" password found for the user. Not
>> >> >>> setting Auth-Type
>> >> >>> (0) pap: WARNING: Authentication will fail unless a "known good"
>> >> password
>> >> >>> is available
>> >> >>> (0) [pap] = noop
>> >> >>> (0) } # authorize = ok
>> >> >>> (0) Found Auth-Type = pam
>> >> >>> (0) # Executing group from file
>> >> /etc/freeradius/3.0/sites-enabled/default
>> >> >>> (0) authenticate {
>> >> >>> (0) pam: Using pamauth string "radiusd" for pam.conf lookup
>> >> >>> (0) pam: ERROR: pam_authenticate failed: Authentication failure
>> >> >>> (0) [pam] = reject
>> >> >>> (0) } # authenticate = reject
>> >> >>> (0) Failed to authenticate the user
>> >> >>> (0) Using Post-Auth-Type Reject
>> >> >>> (0) # Executing group from file
>> >> /etc/freeradius/3.0/sites-enabled/default
>> >> >>> (0) Post-Auth-Type REJECT {
>> >> >>> (0) attr_filter.access_reject: EXPAND %{User-Name}
>> >> >>> (0) attr_filter.access_reject: --> >>> >> >> user at mydomain.com <mailto:user at mydomain.com>
>> <>> mailto:user at mydomain.com <mailto:mailto:user at mydomain.com>>> >>> <mailto:
>> >> >> user at mydomain.com <mailto:user at mydomain.com>>> <>> mailto:user at mydomain.com <mailto:mailto:user at mydomain.com>>> >>> >>>> <mailto:
>> >> >>> >> >> user at mydomain.com <mailto:user at mydomain.com>>> <>> mailto:user at mydomain.com <mailto:mailto:user at mydomain.com>>> >>> <>> mailto:
>> user at mydomain.com <mailto:user at mydomain.com>>> <>> mailto:mailto:user at mydomain.com <mailto:mailto:mailto:user at mydomain.com>>> >>> >>>> >
>> >> >>> (0) attr_filter.access_reject: Matched entry DEFAULT at line 11
>> >> >>> (0) [attr_filter.access_reject] = updated
>> >> >>> (0) [eap] = noop
>> >> >>> (0) policy remove_reply_message_if_eap {
>> >> >>> (0) if (&reply:EAP-Message && &reply:Reply-Message) {
>> >> >>> (0) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE
>> >> >>> (0) else {
>> >> >>> (0) [noop] = noop
>> >> >>> (0) } # else = noop
>> >> >>> (0) } # policy remove_reply_message_if_eap = noop
>> >> >>> (0) } # Post-Auth-Type REJECT = updated
>> >> >>> (0) Delaying response for 1.000000 seconds
>> >> >>> Waking up in 0.3 seconds.
>> >> >>> Waking up in 0.6 seconds.
>> >> >>> (0) Sending delayed response
>> >> >>> (0) Sent Access-Reject Id 113 from 127.0.0.1:1812 to
>> 127.0.0.1:34793
>> >> >>> length 20
>> >> >>> Waking up in 3.9 seconds.
>> >> >>> (0) Cleaning up request packet ID 113 with timestamp +11
>> >> >>> Ready to process requests
>> >> >>>
>> >> >>>
>> >> >>> 24. Avr 2018 16:40 de >>> >> >> aland at deployingradius.com <mailto:aland at deployingradius.com>>> <mailto:
>> aland at deployingradius.com <mailto:aland at deployingradius.com>>> >>> <mailto:
>> >> >> aland at deployingradius.com <mailto:aland at deployingradius.com>>> <>> mailto:aland at deployingradius.com <mailto:mailto:aland at deployingradius.com>>> >>> >>>>
>> <mailto:
>> >> >>> >> >> aland at deployingradius.com <mailto:aland at deployingradius.com>>> <>> mailto:aland at deployingradius.com <mailto:mailto:aland at deployingradius.com>>> >>>
>> <>> >> mailto:aland at deployingradius.com <mailto:mailto:aland at deployingradius.com>>> <mailto:mailto:
>> aland at deployingradius.com <mailto:aland at deployingradius.com>>> >>> >>>> >:
>> >> >>>
>> >> >>>
>> >> >>> > On Apr 24, 2018, at 10:23 AM, <> >>> >>
>> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> <>> mailto:servernemesis at tutanota.com <mailto:mailto:servernemesis at tutanota.com>>> >
>> >> <>> >> mailto:servernemesis at tutanota.com <mailto:mailto:servernemesis at tutanota.com>>> <mailto:mailto:
>> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> >>> >>>> <mailto:
>> >> >>> >> >> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> <>> mailto:servernemesis at tutanota.com <mailto:mailto:servernemesis at tutanota.com>>> >>>
>> <>> >> mailto:servernemesis at tutanota.com <mailto:mailto:servernemesis at tutanota.com>>> <mailto:mailto:
>> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> >>> >>>> >>
>> >> > <> >>> >> >> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> <mailto:
>> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> >>> <>> >> mailto:servernemesis at tutanota.com <mailto:mailto:servernemesis at tutanota.com>
>> <>> mailto:mailto:servernemesis at tutanota.com <mailto:mailto:mailto:servernemesis at tutanota.com>>> >>> >>>>
>> >> <mailto:
>> >> >>> >> >> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> <>> mailto:servernemesis at tutanota.com <mailto:mailto:servernemesis at tutanota.com>>> >>>
>> <>> >> mailto:servernemesis at tutanota.com <mailto:mailto:servernemesis at tutanota.com>>> <mailto:mailto:
>> servernemesis at tutanota.com <mailto:servernemesis at tutanota.com>>> >>> >>>> >>
>> >> > wrote:
>> >> >>> >>
>> >> >>> >> My FR server is domain joined, and his krb5 realm is
>> mydomain.com
>> >> >>> >> I don't know where I could specify the domain for PAM.
>> >> >>> >
>> >> >>> > I didn't tell you to specify the domain for PAM.
>> >> >>> >
>> >> >>> >> I'm not sure what you mean by "If it doesn't know about the
>> domain,
>> >> >>> then add a realm for "mydomain.com". Make it LOCAL (see
>> proxy.conf)."
>> >> >>> >> Should I edit the /etc/pam.d/radiusd ? What's proxy.conf ?
>> >> >>> >
>> >> >>> > You know you're on the FreeRADIUS mailing list, right?
>> proxy.conf
>> >> is
>> >> >>> for FreeRADIUS, not PAM.
>> >> >>> >
>> >> >>> > No, don't edit the /etc/pam.d/radiusd file. If I had meant to
>> edit
>> >> >>> that file, I would have told you to edit that file.
>> >> >>> >
>> >> >>> > Look in the /etc/raddb (or on debian / Ubuntu) /etc/freeradius
>> >> >>> directory. The proxy.conf file is there. Read it.
>> >> >>> >
>> >> >>> > Alan DeKok.
>> >> >>> >
>> >> >>> >
>> >> >>> > -
>> >> >>> > List info/subscribe/unsubscribe? See >
>> >> >>> >> >> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> <
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> >>> <
>> >> >> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> <
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> >>> >>>> <
>> >> >>> >> >> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> <
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> >>> <
>> >> >> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> <
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> >>> >>>> >
>> >> >>> -
>> >> >>> List info/subscribe/unsubscribe? See
>> >> >>> >> >> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> <
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> >>> <
>> >> >> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> <
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> >>> >
>> >> >> -
>> >> >> List info/subscribe/unsubscribe? See >>
>> >> >> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> <
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> >>> <
>> >> >> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> <
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> >>> >
>> >> -
>> >> List info/subscribe/unsubscribe? See
>> >> >> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> <
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> >
>> > -
>> > List info/subscribe/unsubscribe? See >
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> <
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>>> >
>> -
>> List info/subscribe/unsubscribe? See
>> http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>
> -
> List info/subscribe/unsubscribe? See > http://www.freeradius.org/list/users.html <http://www.freeradius.org/list/users.html>
More information about the Freeradius-Users
mailing list