Block guest VPN
Jonathan Davis
jonathan at prioritycolo.com
Wed Sep 22 15:27:21 CEST 2021
Looks like user isn't a member of GAST, then it pulls an NT-Password which matches what's supplied, so auth OK using PAP.
(0) pap: Login attempt with password
(0) pap: Comparing with "known-good" NT-Password
(0) pap: User authenticated successfully
Jonathan Davis - Priority Colo Inc.
jonathan at prioritycolo.com - https://www.prioritycolo.com
1-888-AS-30176 (1-888-273-0176) x304
On 2021-09-22 9:19 a.m., Sazzad Hossain wrote:
> Hello Alan,
>
> Thanks for your time.
>
> Another question, although after those two changes [mentioned above], the
> server is still allowing the GUEST users to login.What i am doing wrong?
> Any help will be thankfully appreciated.
>
> Have a nice day!
>
>
> __________________________________________________________________________________________________________________
>
> (0) Received Access-Request Id 164 from 127.0.0.1:56127 to 127.0.1.1:1812
> length 76
> (0) User-Name = "riedel"
> (0) User-Password = "testtest1A"
> (0) NAS-IP-Address = 127.0.1.1
> (0) NAS-Port = 1812
> (0) Message-Authenticator = 0xf39ecbe7fd56fcc239189fe5e548c9cc
> (0) # Executing section authorize from file
> /etc/freeradius/3.0/sites-enabled/default
> (0) authorize {
> (0) policy filter_username {
> (0) if (&User-Name) {
> (0) if (&User-Name) -> TRUE
> (0) if (&User-Name) {
> (0) if (&User-Name =~ / /) {
> (0) if (&User-Name =~ / /) -> FALSE
> (0) if (&User-Name =~ /@[^@]*@/ ) {
> (0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
> (0) if (&User-Name =~ /\.\./ ) {
> (0) if (&User-Name =~ /\.\./ ) -> FALSE
> (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
> (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) ->
> FALSE
> (0) if (&User-Name =~ /\.$/) {
> (0) if (&User-Name =~ /\.$/) -> FALSE
> (0) if (&User-Name =~ /@\./) {
> (0) if (&User-Name =~ /@\./) -> FALSE
> (0) } # if (&User-Name) = notfound
> (0) } # policy filter_username = notfound
> (0) [preprocess] = ok
> (0) [chap] = noop
> (0) [mschap] = noop
> (0) [digest] = noop
> (0) suffix: Checking for suffix after "@"
> (0) suffix: No '@' in User-Name = "riedel", looking up realm NULL
> (0) suffix: No such realm "NULL"
> (0) [suffix] = noop
> (0) eap: No EAP-Message, not doing EAP
> (0) [eap] = noop
> *(0) files: Searching for user in group "Gast"*
> rlm_ldap (ldap): Reserved connection (0)
> (0) files: EXPAND (uid=%{%{Stripped-User-Name}:-%{User-Name}})
> (0) files: --> (uid=riedel)
> (0) files: Performing search in "ou=people,dc=fr" with filter
> "(uid=riedel)", scope "sub"
> (0) files: Waiting for search result...
> (0) files: User object found at DN
> "uid=riedel,ou=people,dc=uni-potsdam,dc=de"
> (0) files: Checking user object's memberOf attributes
> (0) files: Performing unfiltered search in "uid=riedel,ou=people,dc=fr",
> scope "base"
> (0) files: Waiting for search result...
> (0) files: Search returned no results
> (0) files: Can't check membership attributes, user object not found
> rlm_ldap (ldap): Released connection (0)
> Need 5 more connections to reach 10 spares
> rlm_ldap (ldap): Opening additional connection (5), 1 of 27 pending slots
> used
> rlm_ldap (ldap): Connecting to ldap://10.9.25.56:389
> rlm_ldap (ldap): Waiting for bind result...
> rlm_ldap (ldap): Bind successful
> (0) files: User is not a member of "Gast"
> (0) [files] = noop
> rlm_ldap (ldap): Reserved connection (1)
> (0) ldap: EXPAND (uid=%{%{Stripped-User-Name}:-%{User-Name}})
> (0) ldap: --> (uid=riedel)
> (0) ldap: Performing search in "ou=people,dc=fr" with filter
> "(uid=riedel)", scope "sub"
> (0) ldap: Waiting for search result...
> (0) ldap: User object found at DN "uid=riedel,ou=people,dc=fr"
> (0) ldap: Processing user attributes
> (0) ldap: control:NT-Password :=
> 0x3937316136326634626234393063623639653936363163616333356132323734
> rlm_ldap (ldap): Released connection (1)
> (0) [ldap] = updated
> (0) if (Ldap-Group == "Gast") {
> (0) Searching for user in group "Gast"
> rlm_ldap (ldap): Reserved connection (2)
> (0) Using user DN from request "uid=riedel,ou=people,dc=fr"
> (0) Checking user object's memberOf attributes
> (0) Performing unfiltered search in "uid=riedel,ou=people,dc=fr",
> scope "base"
> (0) Waiting for search result...
> (0) Search returned no results
> (0) Can't check membership attributes, user object not found
> rlm_ldap (ldap): Released connection (2)
> (0) User is not a member of "Gast"
> (0) if (Ldap-Group == "Gast") -> FALSE
> (0) [expiration] = noop
> (0) [logintime] = noop
> (0) pap: Normalizing NT-Password from hex encoding, 32 bytes -> 16 bytes
> (0) [pap] = updated
> (0) } # authorize = updated
> (0) Found Auth-Type = PAP
> (0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
> (0) Auth-Type PAP {
> (0) pap: Login attempt with password
> (0) pap: Comparing with "known-good" NT-Password
> (0) pap: User authenticated successfully
> (0) [pap] = ok
> (0) } # Auth-Type PAP = ok
> (0) # Executing section post-auth from file
> /etc/freeradius/3.0/sites-enabled/default
> (0) post-auth {
> (0) if (session-state:User-Name && reply:User-Name && request:User-Name
> && (reply:User-Name == request:User-Name)) {
> (0) if (session-state:User-Name && reply:User-Name && request:User-Name
> && (reply:User-Name == request:User-Name)) -> FALSE
> (0) update {
> (0) No attributes updated for RHS &session-state:
> (0) } # update = noop
> (0) [exec] = noop
> (0) policy remove_reply_message_if_eap {
> (0) if (&reply:EAP-Message && &reply:Reply-Message) {
> (0) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE
> (0) else {
> (0) [noop] = noop
> (0) } # else = noop
> (0) } # policy remove_reply_message_if_eap = noop
> (0) } # post-auth = noop
> *(0) Sent Access-Accept Id 164 from 127.0.1.1:1812 <http://127.0.1.1:1812>
> to 127.0.0.1:56127 <http://127.0.0.1:56127> length 0*
> (0) Finished request
> Waking up in 4.9 seconds.
> (0) Cleaning up request packet ID 164 with timestamp +5
>
>
>
>
>
>
> On Wed, Sep 22, 2021 at 2:49 PM Alan DeKok <aland at deployingradius.com>
> wrote:
>
>> On Sep 22, 2021, at 3:06 AM, Sazzad Hossain <sazzad.suzon89 at gmail.com>
>> wrote:
>>> I want to block our Guest users to use our VPN and i wrote following
>> under /
>>> sites-enable/default.
>>>
>>> *ldap*
>>>
>>> * if (Ldap-Group [*] == "Gast") { update control {
>>> AUth-Type = reject } }*
>> Why add the [*] ?
>>
>> All of the documentation and examples say to just use what you did here:
>>
>>> and under /freeradius/users
>>>
>>>
>>> *DEFAULT Ldap-Group == "Gast", Auth-Type := Reject Fall-Through =
>>> yes*
>> There's no [*] here, which is correct.
>>
>> Alan DeKok.
>>
>>
>> -
>> List info/subscribe/unsubscribe? See
>> http://www.freeradius.org/list/users.html
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
More information about the Freeradius-Users
mailing list