So in failing to get eap-ttls pap to work with azure ad I thought I would
try to atleast get connected to active directory per the freeradius howto But I keep running into issues with ntlm trying to run and then saying permission denied my net join worked and wbind returns users and gives me status ok when i try with a user and password Here is my debug FreeRADIUS Version 3.0.21 Copyright (C) 1999-2019 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ... including dictionary file /usr/share/freeradius/dictionary including dictionary file /usr/share/freeradius/dictionary.dhcp including dictionary file /usr/share/freeradius/dictionary.vqp including dictionary file /etc/freeradius/dictionary including configuration file /etc/freeradius/radiusd.conf including configuration file /etc/freeradius/proxy.conf including configuration file /etc/freeradius/clients.conf including files in directory /etc/freeradius/mods-enabled/ including configuration file /etc/freeradius/mods-enabled/sradutmp including configuration file /etc/freeradius/mods-enabled/files including configuration file /etc/freeradius/mods-enabled/chap including configuration file /etc/freeradius/mods-enabled/preprocess including configuration file /etc/freeradius/mods-enabled/passwd including configuration file /etc/freeradius/mods-enabled/eap including configuration file /etc/freeradius/mods-enabled/unix including configuration file /etc/freeradius/mods-enabled/cache_eap including configuration file /etc/freeradius/mods-enabled/replicate including configuration file /etc/freeradius/mods-enabled/detail.log including configuration file /etc/freeradius/mods-enabled/echo including configuration file /etc/freeradius/mods-enabled/expiration including configuration file /etc/freeradius/mods-enabled/always including configuration file /etc/freeradius/mods-enabled/soh including configuration file /etc/freeradius/mods-enabled/utf8 including configuration file /etc/freeradius/mods-enabled/linelog including configuration file /etc/freeradius/mods-enabled/date including configuration file /etc/freeradius/mods-enabled/logintime including configuration file /etc/freeradius/mods-enabled/dynamic_clients including configuration file /etc/freeradius/mods-enabled/ntlm_auth including configuration file /etc/freeradius/mods-enabled/radutmp including configuration file /etc/freeradius/mods-enabled/mschap including configuration file /etc/freeradius/mods-enabled/exec including configuration file /etc/freeradius/mods-enabled/attr_filter including configuration file /etc/freeradius/mods-enabled/expr including configuration file /etc/freeradius/mods-enabled/unpack including configuration file /etc/freeradius/mods-enabled/realm including configuration file /etc/freeradius/mods-enabled/detail including configuration file /etc/freeradius/mods-enabled/pap including configuration file /etc/freeradius/mods-enabled/digest including files in directory /etc/freeradius/policy.d/ including configuration file /etc/freeradius/policy.d/eap including configuration file /etc/freeradius/policy.d/accounting including configuration file /etc/freeradius/policy.d/abfab-tr including configuration file /etc/freeradius/policy.d/operator-name including configuration file /etc/freeradius/policy.d/rfc7542 including configuration file /etc/freeradius/policy.d/dhcp including configuration file /etc/freeradius/policy.d/debug including configuration file /etc/freeradius/policy.d/cui including configuration file /etc/freeradius/policy.d/canonicalization including configuration file /etc/freeradius/policy.d/filter including configuration file /etc/freeradius/policy.d/control including configuration file /etc/freeradius/policy.d/moonshot-targeted-ids including files in directory /etc/freeradius/sites-enabled/ including configuration file /etc/freeradius/sites-enabled/default including configuration file /etc/freeradius/sites-enabled/inner-tunnel main { security { user = "freerad" group = "freerad" allow_core_dumps = no } name = "freeradius" prefix = "/usr" localstatedir = "/var" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" } main { name = "freeradius" prefix = "/usr" localstatedir = "/var" sbindir = "/usr/sbin" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" libdir = "/usr/lib/freeradius" radacctdir = "/var/log/freeradius/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 16384 pidfile = "/var/run/freeradius/freeradius.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = no auth_badpass = no auth_goodpass = no colourise = yes msg_denied = "You are already logged in - access denied" } resources { } security { max_attributes = 200 reject_delay = 1.000000 status_server = yes } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = <<< secret >>> response_window = 20.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 120 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server_pool my_auth_failover { type = fail-over home_server = localhost } realm example.com { auth_pool = my_auth_failover } realm LOCAL { } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = <<< secret >>> nas_type = "other" proto = "*" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client localhost_ipv6 { ipv6addr = ::1 require_message_authenticator = no secret = <<< secret >>> limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client my_wifi { ipaddr = 68.45.161.30 require_message_authenticator = no secret = <<< secret >>> limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Debugger not attached systemd watchdog is disabled # Creating Auth-Type = ntlm_auth # Creating Auth-Type = mschap # Creating Auth-Type = digest # Creating Auth-Type = eap # Creating Auth-Type = PAP # Creating Auth-Type = CHAP # Creating Auth-Type = MS-CHAP radiusd: #### Instantiating modules #### modules { # Loaded module rlm_radutmp # Loading module "sradutmp" from file /etc/freeradius/mods-enabled/sradutmp radutmp sradutmp { filename = "/var/log/freeradius/sradutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 420 caller_id = no } # Loaded module rlm_files # Loading module "files" from file /etc/freeradius/mods-enabled/files files { filename = "/etc/freeradius/mods-config/files/authorize" acctusersfile = "/etc/freeradius/mods-config/files/accounting" preproxy_usersfile = "/etc/freeradius/mods-config/files/pre-proxy" } # Loaded module rlm_chap # Loading module "chap" from file /etc/freeradius/mods-enabled/chap # Loaded module rlm_preprocess # Loading module "preprocess" from file /etc/freeradius/mods-enabled/preprocess preprocess { huntgroups = "/etc/freeradius/mods-config/preprocess/huntgroups" hints = "/etc/freeradius/mods-config/preprocess/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } # Loaded module rlm_passwd # Loading module "etc_passwd" from file /etc/freeradius/mods-enabled/passwd passwd etc_passwd { filename = "/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":" ignore_nislike = no ignore_empty = yes allow_multiple_keys = no hash_size = 100 } # Loaded module rlm_eap # Loading module "eap" from file /etc/freeradius/mods-enabled/eap eap { default_eap_type = "md5" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 16384 } # Loaded module rlm_unix # Loading module "unix" from file /etc/freeradius/mods-enabled/unix unix { radwtmp = "/var/log/freeradius/radwtmp" } Creating attribute Unix-Group # Loaded module rlm_cache # Loading module "cache_eap" from file /etc/freeradius/mods-enabled/cache_eap cache cache_eap { driver = "rlm_cache_rbtree" key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}" ttl = 15 max_entries = 0 epoch = 0 add_stats = no } # Loaded module rlm_replicate # Loading module "replicate" from file /etc/freeradius/mods-enabled/replicate # Loaded module rlm_detail # Loading module "auth_log" from file /etc/freeradius/mods-enabled/detail.log detail auth_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "reply_log" from file /etc/freeradius/mods-enabled/detail.log detail reply_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "pre_proxy_log" from file /etc/freeradius/mods-enabled/detail.log detail pre_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "post_proxy_log" from file /etc/freeradius/mods-enabled/detail.log detail post_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loaded module rlm_exec # Loading module "echo" from file /etc/freeradius/mods-enabled/echo exec echo { wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request" output_pairs = "reply" shell_escape = yes } # Loaded module rlm_expiration # Loading module "expiration" from file /etc/freeradius/mods-enabled/expiration # Loaded module rlm_always # Loading module "reject" from file /etc/freeradius/mods-enabled/always always reject { rcode = "reject" simulcount = 0 mpp = no } # Loading module "fail" from file /etc/freeradius/mods-enabled/always always fail { rcode = "fail" simulcount = 0 mpp = no } # Loading module "ok" from file /etc/freeradius/mods-enabled/always always ok { rcode = "ok" simulcount = 0 mpp = no } # Loading module "handled" from file /etc/freeradius/mods-enabled/always always handled { rcode = "handled" simulcount = 0 mpp = no } # Loading module "invalid" from file /etc/freeradius/mods-enabled/always always invalid { rcode = "invalid" simulcount = 0 mpp = no } # Loading module "userlock" from file /etc/freeradius/mods-enabled/always always userlock { rcode = "userlock" simulcount = 0 mpp = no } # Loading module "notfound" from file /etc/freeradius/mods-enabled/always always notfound { rcode = "notfound" simulcount = 0 mpp = no } # Loading module "noop" from file /etc/freeradius/mods-enabled/always always noop { rcode = "noop" simulcount = 0 mpp = no } # Loading module "updated" from file /etc/freeradius/mods-enabled/always always updated { rcode = "updated" simulcount = 0 mpp = no } # Loaded module rlm_soh # Loading module "soh" from file /etc/freeradius/mods-enabled/soh soh { dhcp = yes } # Loaded module rlm_utf8 # Loading module "utf8" from file /etc/freeradius/mods-enabled/utf8 # Loaded module rlm_linelog # Loading module "linelog" from file /etc/freeradius/mods-enabled/linelog linelog { filename = "/var/log/freeradius/linelog" escape_filenames = no syslog_severity = "info" permissions = 384 format = "This is a log message for %{User-Name}" reference = "messages.%{%{reply:Packet-Type}:-default}" } # Loading module "log_accounting" from file /etc/freeradius/mods-enabled/linelog linelog log_accounting { filename = "/var/log/freeradius/linelog-accounting" escape_filenames = no syslog_severity = "info" permissions = 384 format = "" reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loaded module rlm_date # Loading module "date" from file /etc/freeradius/mods-enabled/date date { format = "%b %e %Y %H:%M:%S %Z" utc = no } # Loading module "wispr2date" from file /etc/freeradius/mods-enabled/date date wispr2date { format = "%Y-%m-%dT%H:%M:%S" utc = no } # Loaded module rlm_logintime # Loading module "logintime" from file /etc/freeradius/mods-enabled/logintime logintime { minimum_timeout = 60 } # Loaded module rlm_dynamic_clients # Loading module "dynamic_clients" from file /etc/freeradius/mods-enabled/dynamic_clients # Loading module "ntlm_auth" from file /etc/freeradius/mods-enabled/ntlm_auth exec ntlm_auth { wait = yes program = "ntlm_auth --request-nt-key --domain=developertown.com --username=%{mschap:User-Name} --password=%{User-Password}" shell_escape = yes } # Loading module "radutmp" from file /etc/freeradius/mods-enabled/radutmp radutmp { filename = "/var/log/freeradius/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 384 caller_id = yes } # Loaded module rlm_mschap # Loading module "mschap" from file /etc/freeradius/mods-enabled/mschap mschap { use_mppe = yes require_encryption = no require_strong = no with_ntdomain_hack = yes passchange { } allow_retry = yes winbind_retry_with_normalised_username = no } # Loading module "exec" from file /etc/freeradius/mods-enabled/exec exec { wait = no input_pairs = "request" shell_escape = yes timeout = 10 } # Loaded module rlm_attr_filter # Loading module "attr_filter.post-proxy" from file /etc/freeradius/mods-enabled/attr_filter attr_filter attr_filter.post-proxy { filename = "/etc/freeradius/mods-config/attr_filter/post-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.pre-proxy" from file /etc/freeradius/mods-enabled/attr_filter attr_filter attr_filter.pre-proxy { filename = "/etc/freeradius/mods-config/attr_filter/pre-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.access_reject" from file /etc/freeradius/mods-enabled/attr_filter attr_filter attr_filter.access_reject { filename = "/etc/freeradius/mods-config/attr_filter/access_reject" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.access_challenge" from file /etc/freeradius/mods-enabled/attr_filter attr_filter attr_filter.access_challenge { filename = "/etc/freeradius/mods-config/attr_filter/access_challenge" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.accounting_response" from file /etc/freeradius/mods-enabled/attr_filter attr_filter attr_filter.accounting_response { filename = "/etc/freeradius/mods-config/attr_filter/accounting_response" key = "%{User-Name}" relaxed = no } # Loaded module rlm_expr # Loading module "expr" from file /etc/freeradius/mods-enabled/expr expr { safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" } # Loaded module rlm_unpack # Loading module "unpack" from file /etc/freeradius/mods-enabled/unpack # Loaded module rlm_realm # Loading module "IPASS" from file /etc/freeradius/mods-enabled/realm realm IPASS { format = "prefix" delimiter = "/" ignore_default = no ignore_null = no } # Loading module "suffix" from file /etc/freeradius/mods-enabled/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } # Loading module "bangpath" from file /etc/freeradius/mods-enabled/realm realm bangpath { format = "prefix" delimiter = "!" ignore_default = no ignore_null = no } # Loading module "realmpercent" from file /etc/freeradius/mods-enabled/realm realm realmpercent { format = "suffix" delimiter = "%" ignore_default = no ignore_null = no } # Loading module "ntdomain" from file /etc/freeradius/mods-enabled/realm realm ntdomain { format = "prefix" delimiter = "\\" ignore_default = no ignore_null = no } # Loading module "detail" from file /etc/freeradius/mods-enabled/detail detail { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loaded module rlm_pap # Loading module "pap" from file /etc/freeradius/mods-enabled/pap pap { normalise = yes } # Loaded module rlm_digest # Loading module "digest" from file /etc/freeradius/mods-enabled/digest instantiate { } # Instantiating module "files" from file /etc/freeradius/mods-enabled/files reading pairlist file /etc/freeradius/mods-config/files/authorize reading pairlist file /etc/freeradius/mods-config/files/accounting reading pairlist file /etc/freeradius/mods-config/files/pre-proxy # Instantiating module "preprocess" from file /etc/freeradius/mods-enabled/preprocess reading pairlist file /etc/freeradius/mods-config/preprocess/huntgroups reading pairlist file /etc/freeradius/mods-config/preprocess/hints # Instantiating module "etc_passwd" from file /etc/freeradius/mods-enabled/passwd rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no # Instantiating module "eap" from file /etc/freeradius/mods-enabled/eap # Linked to sub-module rlm_eap_md5 # Linked to sub-module rlm_eap_leap # Linked to sub-module rlm_eap_gtc gtc { challenge = "Password: " auth_type = "PAP" } # Linked to sub-module rlm_eap_tls tls { tls = "tls-common" } tls-config tls-common { verify_depth = 0 ca_path = "/etc/freeradius/certs" pem_file_type = yes private_key_file = "/etc/freeradius/certs/server.pem" certificate_file = "/etc/freeradius/certs/server.pem" ca_file = "/etc/freeradius/certs/ca.pem" private_key_password = <<< secret >>> dh_file = "/etc/freeradius/certs/dh" fragment_size = 1024 include_length = yes auto_chain = yes check_crl = no check_all_crl = no cipher_list = "DEFAULT" cipher_server_preference = no ecdh_curve = "prime256v1" disable_tlsv1 = yes disable_tlsv1_1 = yes tls_max_version = "1.2" tls_min_version = "1.2" cache { enable = no lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = no } } Please use tls_min_version and tls_max_version instead of disable_tlsv1 Please use tls_min_version and tls_max_version instead of disable_tlsv1_2 # Linked to sub-module rlm_eap_ttls ttls { tls = "tls-common" default_eap_type = "md5" copy_request_to_tunnel = no use_tunneled_reply = no virtual_server = "inner-tunnel" include_length = yes require_client_cert = no } tls: Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_peap peap { tls = "tls-common" default_eap_type = "mschapv2" copy_request_to_tunnel = no use_tunneled_reply = no proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel" soh = no require_client_cert = no } tls: Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } # Instantiating module "cache_eap" from file /etc/freeradius/mods-enabled/cache_eap rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked # Instantiating module "auth_log" from file /etc/freeradius/mods-enabled/detail.log rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output # Instantiating module "reply_log" from file /etc/freeradius/mods-enabled/detail.log # Instantiating module "pre_proxy_log" from file /etc/freeradius/mods-enabled/detail.log # Instantiating module "post_proxy_log" from file /etc/freeradius/mods-enabled/detail.log # Instantiating module "expiration" from file /etc/freeradius/mods-enabled/expiration # Instantiating module "reject" from file /etc/freeradius/mods-enabled/always # Instantiating module "fail" from file /etc/freeradius/mods-enabled/always # Instantiating module "ok" from file /etc/freeradius/mods-enabled/always # Instantiating module "handled" from file /etc/freeradius/mods-enabled/always # Instantiating module "invalid" from file /etc/freeradius/mods-enabled/always # Instantiating module "userlock" from file /etc/freeradius/mods-enabled/always # Instantiating module "notfound" from file /etc/freeradius/mods-enabled/always # Instantiating module "noop" from file /etc/freeradius/mods-enabled/always # Instantiating module "updated" from file /etc/freeradius/mods-enabled/always # Instantiating module "linelog" from file /etc/freeradius/mods-enabled/linelog # Instantiating module "log_accounting" from file /etc/freeradius/mods-enabled/linelog # Instantiating module "logintime" from file /etc/freeradius/mods-enabled/logintime # Instantiating module "mschap" from file /etc/freeradius/mods-enabled/mschap rlm_mschap (mschap): using internal authentication # Instantiating module "attr_filter.post-proxy" from file /etc/freeradius/mods-enabled/attr_filter reading pairlist file /etc/freeradius/mods-config/attr_filter/post-proxy # Instantiating module "attr_filter.pre-proxy" from file /etc/freeradius/mods-enabled/attr_filter reading pairlist file /etc/freeradius/mods-config/attr_filter/pre-proxy # Instantiating module "attr_filter.access_reject" from file /etc/freeradius/mods-enabled/attr_filter reading pairlist file /etc/freeradius/mods-config/attr_filter/access_reject # Instantiating module "attr_filter.access_challenge" from file /etc/freeradius/mods-enabled/attr_filter reading pairlist file /etc/freeradius/mods-config/attr_filter/access_challenge # Instantiating module "attr_filter.accounting_response" from file /etc/freeradius/mods-enabled/attr_filter reading pairlist file /etc/freeradius/mods-config/attr_filter/accounting_response # Instantiating module "IPASS" from file /etc/freeradius/mods-enabled/realm # Instantiating module "suffix" from file /etc/freeradius/mods-enabled/realm # Instantiating module "bangpath" from file /etc/freeradius/mods-enabled/realm # Instantiating module "realmpercent" from file /etc/freeradius/mods-enabled/realm # Instantiating module "ntdomain" from file /etc/freeradius/mods-enabled/realm # Instantiating module "detail" from file /etc/freeradius/mods-enabled/detail # Instantiating module "pap" from file /etc/freeradius/mods-enabled/pap } # modules radiusd: #### Loading Virtual Servers #### server { # from file /etc/freeradius/radiusd.conf } # server server default { # from file /etc/freeradius/sites-enabled/default # Loading authenticate {...} # Loading authorize {...} Ignoring "sql" (see raddb/mods-available/README.rst) Ignoring "ldap" (see raddb/mods-available/README.rst) # Loading preacct {...} # Loading accounting {...} # Loading post-proxy {...} # Loading post-auth {...} } # server default server inner-tunnel { # from file /etc/freeradius/sites-enabled/inner-tunnel # Loading authenticate {...} # Loading authorize {...} # Loading session {...} # Loading post-proxy {...} # Loading post-auth {...} # Skipping contents of 'if' as it is always 'false' -- /etc/freeradius/sites-enabled/inner-tunnel:337 } # server inner-tunnel radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "auth" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "auth" ipaddr = 127.0.0.1 port = 18120 } Listening on auth address * port 1812 bound to server default Listening on acct address * port 1813 bound to server default Listening on auth address :: port 1812 bound to server default Listening on acct address :: port 1813 bound to server default Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel Listening on proxy address * port 57880 Listening on proxy address :: port 49174 Ready to process requests (0) Received Access-Request Id 183 from 127.0.0.1:38280 to 127.0.0.1:1812 length 75 (0) User-Name = "user" (0) User-Password = "password" (0) NAS-IP-Address = 10.0.1.5 (0) NAS-Port = 0 (0) Message-Authenticator = 0xf284051fc743741000f85a70054afb86 (0) # Executing section authorize from file /etc/freeradius/sites-enabled/default (0) authorize { (0) policy filter_username { (0) if (&User-Name) { (0) if (&User-Name) -> TRUE (0) if (&User-Name) { (0) if (&User-Name =~ / /) { (0) if (&User-Name =~ / /) -> FALSE (0) if (&User-Name =~ /@[^@]*@/ ) { (0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (0) if (&User-Name =~ /\.\./ ) { (0) if (&User-Name =~ /\.\./ ) -> FALSE (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (0) if (&User-Name =~ /\.$/) { (0) if (&User-Name =~ /\.$/) -> FALSE (0) if (&User-Name =~ /@\./) { (0) if (&User-Name =~ /@\./) -> FALSE (0) } # if (&User-Name) = notfound (0) } # policy filter_username = notfound (0) [preprocess] = ok (0) [chap] = noop (0) [mschap] = noop (0) [digest] = noop (0) suffix: Checking for suffix after "@" (0) suffix: No '@' in User-Name = "user", looking up realm NULL (0) suffix: No such realm "NULL" (0) [suffix] = noop (0) eap: No EAP-Message, not doing EAP (0) [eap] = noop (0) files: users: Matched entry DEFAULT at line 1 (0) [files] = ok (0) [expiration] = noop (0) [logintime] = noop Not doing PAP as Auth-Type is already set. (0) [pap] = noop (0) } # authorize = ok (0) Found Auth-Type = ntlm_auth (0) # Executing group from file /etc/freeradius/sites-enabled/default (0) authenticate { (0) ntlm_auth: Executing: /etc/freeradius/mods-enabled/ntlm_auth --request-nt-key --domain=mydomain --username=%{mschap:User-Name} --password=%{User-Password}: (0) ntlm_auth: EXPAND --username=%{mschap:User-Name} (0) ntlm_auth: --> --username=user (0) ntlm_auth: EXPAND --password=%{User-Password} (0) ntlm_auth: --> --password=password (0) ntlm_auth: ERROR: Program returned code (2) and output 'Failed to execute "ntlm_auth": Permission denied' (0) [ntlm_auth] = fail (0) } # authenticate = fail (0) Failed to authenticate the user (0) Using Post-Auth-Type Reject (0) # Executing group from file /etc/freeradius/sites-enabled/default (0) Post-Auth-Type REJECT { (0) attr_filter.access_reject: EXPAND %{User-Name} (0) attr_filter.access_reject: -->user (0) attr_filter.access_reject: Matched entry DEFAULT at line 11 (0) [attr_filter.access_reject] = updated (0) [eap] = noop (0) policy remove_reply_message_if_eap { (0) if (&reply:EAP-Message && &reply:Reply-Message) { (0) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE (0) else { (0) [noop] = noop (0) } # else = noop (0) } # policy remove_reply_message_if_eap = noop (0) } # Post-Auth-Type REJECT = updated (0) Delaying response for 1.000000 seconds Waking up in 0.3 seconds. Waking up in 0.6 seconds. (0) Sending delayed response (0) Sent Access-Reject Id 183 from 127.0.0.1:1812 to 127.0.0.1:38280 length 20 Waking up in 3.9 seconds. ^Croot@aerify-radius-2:/etc/freeradius/mods-available# root@aerify-radius-2:/etc/freeradius/mods-available# - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
On 15/12/2020 21:52, Bryce Long wrote: > (0) authenticate { > (0) ntlm_auth: Executing: /etc/freeradius/mods-enabled/ntlm_auth > --request-nt-key --domain=mydomain --username=%{mschap:User-Name} > --password=%{User-Password}: This should point to the ntlm_auth binary, not to the FreeRADIUS config file. -- Matthew - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
Thanks for the tip,
Do you know where the binary is located? On Tue, Dec 15, 2020 at 4:56 PM Matthew Newton <[hidden email]> wrote: > > > On 15/12/2020 21:52, Bryce Long wrote: > > (0) authenticate { > > (0) ntlm_auth: Executing: /etc/freeradius/mods-enabled/ntlm_auth > > --request-nt-key --domain=mydomain --username=%{mschap:User-Name} > > --password=%{User-Password}: > > This should point to the ntlm_auth binary, not to the FreeRADIUS config > file. > > -- > Matthew > - > List info/subscribe/unsubscribe? See > http://www.freeradius.org/list/users.html List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
On 15/12/2020 22:15, Bryce Long wrote: > Thanks for the tip, > > Do you know where the binary is located? Usually /usr/bin/ntlm_auth, or /usr/sbin/ntlm_auth -- Matthew - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
'which ntlm_auth' should tell you where it is on your system.
On Tue, Dec 15, 2020 at 4:30 PM Matthew Newton <[hidden email]> wrote: > > > On 15/12/2020 22:15, Bryce Long wrote: > > Thanks for the tip, > > > > Do you know where the binary is located? > > Usually /usr/bin/ntlm_auth, or /usr/sbin/ntlm_auth > > -- > Matthew > - > List info/subscribe/unsubscribe? See > http://www.freeradius.org/list/users.html -- *Tony Skalski* System Administrator | IT *Office: *507-786-3227 <(507)786-3227> 1510 St. Olaf Avenue Northfield, MN 55057 stolaf.edu - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
In reply to this post by Bryce Long
This part :
program = "ntlm_auth --request-nt-key --domain=developertown.com --username=%{mschap:User-Name} --password=% Read : https://wiki.samba.org/index.php/Authenticating_Freeradius_against_Active_Directory --allow-mschapv2 << is what your missing at least. --domain=developertown.com I would like to see this as : --domain=REALM.TLD --domain=NT4DOM (so caps). > -----Oorspronkelijk bericht----- > Van: Freeradius-Users [mailto:freeradius-users- > bounces+belle=[hidden email]] Namens Bryce Long > Verzonden: dinsdag 15 december 2020 22:53 > Aan: FreeRadius users mailing list > Onderwerp: Issue with ntlm_auth permission denied > > So in failing to get eap-ttls pap to work with azure ad I thought I would > try to atleast get connected to active directory per the freeradius howto > > But I keep running into issues with ntlm trying to run and then saying > permission denied > > my net join worked and wbind returns users and gives me status ok when i > try with a user and password > > Here is my debug > > FreeRADIUS Version 3.0.21 > Copyright (C) 1999-2019 The FreeRADIUS server project and contributors > There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A > PARTICULAR PURPOSE > You may redistribute copies of FreeRADIUS under the terms of the > GNU General Public License > For more information about these matters, see the file named COPYRIGHT > Starting - reading configuration files ... > including dictionary file /usr/share/freeradius/dictionary > including dictionary file /usr/share/freeradius/dictionary.dhcp > including dictionary file /usr/share/freeradius/dictionary.vqp > including dictionary file /etc/freeradius/dictionary > including configuration file /etc/freeradius/radiusd.conf > including configuration file /etc/freeradius/proxy.conf > including configuration file /etc/freeradius/clients.conf > including files in directory /etc/freeradius/mods-enabled/ > including configuration file /etc/freeradius/mods-enabled/sradutmp > including configuration file /etc/freeradius/mods-enabled/files > including configuration file /etc/freeradius/mods-enabled/chap > including configuration file /etc/freeradius/mods-enabled/preprocess > including configuration file /etc/freeradius/mods-enabled/passwd > including configuration file /etc/freeradius/mods-enabled/eap > including configuration file /etc/freeradius/mods-enabled/unix > including configuration file /etc/freeradius/mods-enabled/cache_eap > including configuration file /etc/freeradius/mods-enabled/replicate > including configuration file /etc/freeradius/mods-enabled/detail.log > including configuration file /etc/freeradius/mods-enabled/echo > including configuration file /etc/freeradius/mods-enabled/expiration > including configuration file /etc/freeradius/mods-enabled/always > including configuration file /etc/freeradius/mods-enabled/soh > including configuration file /etc/freeradius/mods-enabled/utf8 > including configuration file /etc/freeradius/mods-enabled/linelog > including configuration file /etc/freeradius/mods-enabled/date > including configuration file /etc/freeradius/mods-enabled/logintime > including configuration file /etc/freeradius/mods-enabled/dynamic_clients > including configuration file /etc/freeradius/mods-enabled/ntlm_auth > including configuration file /etc/freeradius/mods-enabled/radutmp > including configuration file /etc/freeradius/mods-enabled/mschap > including configuration file /etc/freeradius/mods-enabled/exec > including configuration file /etc/freeradius/mods-enabled/attr_filter > including configuration file /etc/freeradius/mods-enabled/expr > including configuration file /etc/freeradius/mods-enabled/unpack > including configuration file /etc/freeradius/mods-enabled/realm > including configuration file /etc/freeradius/mods-enabled/detail > including configuration file /etc/freeradius/mods-enabled/pap > including configuration file /etc/freeradius/mods-enabled/digest > including files in directory /etc/freeradius/policy.d/ > including configuration file /etc/freeradius/policy.d/eap > including configuration file /etc/freeradius/policy.d/accounting > including configuration file /etc/freeradius/policy.d/abfab-tr > including configuration file /etc/freeradius/policy.d/operator-name > including configuration file /etc/freeradius/policy.d/rfc7542 > including configuration file /etc/freeradius/policy.d/dhcp > including configuration file /etc/freeradius/policy.d/debug > including configuration file /etc/freeradius/policy.d/cui > including configuration file /etc/freeradius/policy.d/canonicalization > including configuration file /etc/freeradius/policy.d/filter > including configuration file /etc/freeradius/policy.d/control > including configuration file /etc/freeradius/policy.d/moonshot-targeted- > ids > including files in directory /etc/freeradius/sites-enabled/ > including configuration file /etc/freeradius/sites-enabled/default > including configuration file /etc/freeradius/sites-enabled/inner-tunnel > main { > security { > user = "freerad" > group = "freerad" > allow_core_dumps = no > } > name = "freeradius" > prefix = "/usr" > localstatedir = "/var" > logdir = "/var/log/freeradius" > run_dir = "/var/run/freeradius" > } > main { > name = "freeradius" > prefix = "/usr" > localstatedir = "/var" > sbindir = "/usr/sbin" > logdir = "/var/log/freeradius" > run_dir = "/var/run/freeradius" > libdir = "/usr/lib/freeradius" > radacctdir = "/var/log/freeradius/radacct" > hostname_lookups = no > max_request_time = 30 > cleanup_delay = 5 > max_requests = 16384 > pidfile = "/var/run/freeradius/freeradius.pid" > checkrad = "/usr/sbin/checkrad" > debug_level = 0 > proxy_requests = yes > log { > stripped_names = no > auth = no > auth_badpass = no > auth_goodpass = no > colourise = yes > msg_denied = "You are already logged in - access denied" > } > resources { > } > security { > max_attributes = 200 > reject_delay = 1.000000 > status_server = yes > } > } > radiusd: #### Loading Realms and Home Servers #### > proxy server { > retry_delay = 5 > retry_count = 3 > default_fallback = no > dead_time = 120 > wake_all_if_all_dead = no > } > home_server localhost { > ipaddr = 127.0.0.1 > port = 1812 > type = "auth" > secret = <<< secret >>> > response_window = 20.000000 > response_timeouts = 1 > max_outstanding = 65536 > zombie_period = 40 > status_check = "status-server" > ping_interval = 30 > check_interval = 30 > check_timeout = 4 > num_answers_to_alive = 3 > revive_interval = 120 > limit { > max_connections = 16 > max_requests = 0 > lifetime = 0 > idle_timeout = 0 > } > coa { > irt = 2 > mrt = 16 > mrc = 5 > mrd = 30 > } > } > home_server_pool my_auth_failover { > type = fail-over > home_server = localhost > } > realm example.com { > auth_pool = my_auth_failover > } > realm LOCAL { > } > radiusd: #### Loading Clients #### > client localhost { > ipaddr = 127.0.0.1 > require_message_authenticator = no > secret = <<< secret >>> > nas_type = "other" > proto = "*" > limit { > max_connections = 16 > lifetime = 0 > idle_timeout = 30 > } > } > client localhost_ipv6 { > ipv6addr = ::1 > require_message_authenticator = no > secret = <<< secret >>> > limit { > max_connections = 16 > lifetime = 0 > idle_timeout = 30 > } > } > client my_wifi { > ipaddr = 68.45.161.30 > require_message_authenticator = no > secret = <<< secret >>> > limit { > max_connections = 16 > lifetime = 0 > idle_timeout = 30 > } > } > Debugger not attached > systemd watchdog is disabled > # Creating Auth-Type = ntlm_auth > # Creating Auth-Type = mschap > # Creating Auth-Type = digest > # Creating Auth-Type = eap > # Creating Auth-Type = PAP > # Creating Auth-Type = CHAP > # Creating Auth-Type = MS-CHAP > radiusd: #### Instantiating modules #### > modules { > # Loaded module rlm_radutmp > # Loading module "sradutmp" from file > /etc/freeradius/mods-enabled/sradutmp > radutmp sradutmp { > filename = "/var/log/freeradius/sradutmp" > username = "%{User-Name}" > case_sensitive = yes > check_with_nas = yes > permissions = 420 > caller_id = no > } > # Loaded module rlm_files > # Loading module "files" from file /etc/freeradius/mods-enabled/files > files { > filename = "/etc/freeradius/mods-config/files/authorize" > acctusersfile = "/etc/freeradius/mods-config/files/accounting" > preproxy_usersfile = "/etc/freeradius/mods-config/files/pre-proxy" > } > # Loaded module rlm_chap > # Loading module "chap" from file /etc/freeradius/mods-enabled/chap > # Loaded module rlm_preprocess > # Loading module "preprocess" from file > /etc/freeradius/mods-enabled/preprocess > preprocess { > huntgroups = "/etc/freeradius/mods-config/preprocess/huntgroups" > hints = "/etc/freeradius/mods-config/preprocess/hints" > with_ascend_hack = no > ascend_channels_per_line = 23 > with_ntdomain_hack = no > with_specialix_jetstream_hack = no > with_cisco_vsa_hack = no > with_alvarion_vsa_hack = no > } > # Loaded module rlm_passwd > # Loading module "etc_passwd" from file > /etc/freeradius/mods-enabled/passwd > passwd etc_passwd { > filename = "/etc/passwd" > format = "*User-Name:Crypt-Password:" > delimiter = ":" > ignore_nislike = no > ignore_empty = yes > allow_multiple_keys = no > hash_size = 100 > } > # Loaded module rlm_eap > # Loading module "eap" from file /etc/freeradius/mods-enabled/eap > eap { > default_eap_type = "md5" > timer_expire = 60 > ignore_unknown_eap_types = no > cisco_accounting_username_bug = no > max_sessions = 16384 > } > # Loaded module rlm_unix > # Loading module "unix" from file /etc/freeradius/mods-enabled/unix > unix { > radwtmp = "/var/log/freeradius/radwtmp" > } > Creating attribute Unix-Group > # Loaded module rlm_cache > # Loading module "cache_eap" from file > /etc/freeradius/mods-enabled/cache_eap > cache cache_eap { > driver = "rlm_cache_rbtree" > key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}" > ttl = 15 > max_entries = 0 > epoch = 0 > add_stats = no > } > # Loaded module rlm_replicate > # Loading module "replicate" from file > /etc/freeradius/mods-enabled/replicate > # Loaded module rlm_detail > # Loading module "auth_log" from file > /etc/freeradius/mods-enabled/detail.log > detail auth_log { > filename = > "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src- > IPv6-Address}}/auth-detail-%Y%m%d" > header = "%t" > permissions = 384 > locking = no > escape_filenames = no > log_packet_header = no > } > # Loading module "reply_log" from file > /etc/freeradius/mods-enabled/detail.log > detail reply_log { > filename = > "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src- > IPv6-Address}}/reply-detail-%Y%m%d" > header = "%t" > permissions = 384 > locking = no > escape_filenames = no > log_packet_header = no > } > # Loading module "pre_proxy_log" from file > /etc/freeradius/mods-enabled/detail.log > detail pre_proxy_log { > filename = > "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src- > IPv6-Address}}/pre-proxy-detail-%Y%m%d" > header = "%t" > permissions = 384 > locking = no > escape_filenames = no > log_packet_header = no > } > # Loading module "post_proxy_log" from file > /etc/freeradius/mods-enabled/detail.log > detail post_proxy_log { > filename = > "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src- > IPv6-Address}}/post-proxy-detail-%Y%m%d" > header = "%t" > permissions = 384 > locking = no > escape_filenames = no > log_packet_header = no > } > # Loaded module rlm_exec > # Loading module "echo" from file /etc/freeradius/mods-enabled/echo > exec echo { > wait = yes > program = "/bin/echo %{User-Name}" > input_pairs = "request" > output_pairs = "reply" > shell_escape = yes > } > # Loaded module rlm_expiration > # Loading module "expiration" from file > /etc/freeradius/mods-enabled/expiration > # Loaded module rlm_always > # Loading module "reject" from file /etc/freeradius/mods-enabled/always > always reject { > rcode = "reject" > simulcount = 0 > mpp = no > } > # Loading module "fail" from file /etc/freeradius/mods-enabled/always > always fail { > rcode = "fail" > simulcount = 0 > mpp = no > } > # Loading module "ok" from file /etc/freeradius/mods-enabled/always > always ok { > rcode = "ok" > simulcount = 0 > mpp = no > } > # Loading module "handled" from file /etc/freeradius/mods-enabled/always > always handled { > rcode = "handled" > simulcount = 0 > mpp = no > } > # Loading module "invalid" from file /etc/freeradius/mods-enabled/always > always invalid { > rcode = "invalid" > simulcount = 0 > mpp = no > } > # Loading module "userlock" from file /etc/freeradius/mods- > enabled/always > always userlock { > rcode = "userlock" > simulcount = 0 > mpp = no > } > # Loading module "notfound" from file /etc/freeradius/mods- > enabled/always > always notfound { > rcode = "notfound" > simulcount = 0 > mpp = no > } > # Loading module "noop" from file /etc/freeradius/mods-enabled/always > always noop { > rcode = "noop" > simulcount = 0 > mpp = no > } > # Loading module "updated" from file /etc/freeradius/mods-enabled/always > always updated { > rcode = "updated" > simulcount = 0 > mpp = no > } > # Loaded module rlm_soh > # Loading module "soh" from file /etc/freeradius/mods-enabled/soh > soh { > dhcp = yes > } > # Loaded module rlm_utf8 > # Loading module "utf8" from file /etc/freeradius/mods-enabled/utf8 > # Loaded module rlm_linelog > # Loading module "linelog" from file /etc/freeradius/mods- > enabled/linelog > linelog { > filename = "/var/log/freeradius/linelog" > escape_filenames = no > syslog_severity = "info" > permissions = 384 > format = "This is a log message for %{User-Name}" > reference = "messages.%{%{reply:Packet-Type}:-default}" > } > # Loading module "log_accounting" from file > /etc/freeradius/mods-enabled/linelog > linelog log_accounting { > filename = "/var/log/freeradius/linelog-accounting" > escape_filenames = no > syslog_severity = "info" > permissions = 384 > format = "" > reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" > } > # Loaded module rlm_date > # Loading module "date" from file /etc/freeradius/mods-enabled/date > date { > format = "%b %e %Y %H:%M:%S %Z" > utc = no > } > # Loading module "wispr2date" from file /etc/freeradius/mods- > enabled/date > date wispr2date { > format = "%Y-%m-%dT%H:%M:%S" > utc = no > } > # Loaded module rlm_logintime > # Loading module "logintime" from file > /etc/freeradius/mods-enabled/logintime > logintime { > minimum_timeout = 60 > } > # Loaded module rlm_dynamic_clients > # Loading module "dynamic_clients" from file > /etc/freeradius/mods-enabled/dynamic_clients > # Loading module "ntlm_auth" from file > /etc/freeradius/mods-enabled/ntlm_auth > exec ntlm_auth { > wait = yes > program = "ntlm_auth --request-nt-key --domain=developertown.com > --username=%{mschap:User-Name} --password=%{User-Password}" > shell_escape = yes > } > # Loading module "radutmp" from file /etc/freeradius/mods- > enabled/radutmp > radutmp { > filename = "/var/log/freeradius/radutmp" > username = "%{User-Name}" > case_sensitive = yes > check_with_nas = yes > permissions = 384 > caller_id = yes > } > # Loaded module rlm_mschap > # Loading module "mschap" from file /etc/freeradius/mods-enabled/mschap > mschap { > use_mppe = yes > require_encryption = no > require_strong = no > with_ntdomain_hack = yes > passchange { > } > allow_retry = yes > winbind_retry_with_normalised_username = no > } > # Loading module "exec" from file /etc/freeradius/mods-enabled/exec > exec { > wait = no > input_pairs = "request" > shell_escape = yes > timeout = 10 > } > # Loaded module rlm_attr_filter > # Loading module "attr_filter.post-proxy" from file > /etc/freeradius/mods-enabled/attr_filter > attr_filter attr_filter.post-proxy { > filename = "/etc/freeradius/mods-config/attr_filter/post-proxy" > key = "%{Realm}" > relaxed = no > } > # Loading module "attr_filter.pre-proxy" from file > /etc/freeradius/mods-enabled/attr_filter > attr_filter attr_filter.pre-proxy { > filename = "/etc/freeradius/mods-config/attr_filter/pre-proxy" > key = "%{Realm}" > relaxed = no > } > # Loading module "attr_filter.access_reject" from file > /etc/freeradius/mods-enabled/attr_filter > attr_filter attr_filter.access_reject { > filename = "/etc/freeradius/mods-config/attr_filter/access_reject" > key = "%{User-Name}" > relaxed = no > } > # Loading module "attr_filter.access_challenge" from file > /etc/freeradius/mods-enabled/attr_filter > attr_filter attr_filter.access_challenge { > filename = "/etc/freeradius/mods-config/attr_filter/access_challenge" > key = "%{User-Name}" > relaxed = no > } > # Loading module "attr_filter.accounting_response" from file > /etc/freeradius/mods-enabled/attr_filter > attr_filter attr_filter.accounting_response { > filename = "/etc/freeradius/mods-config/attr_filter/accounting_response" > key = "%{User-Name}" > relaxed = no > } > # Loaded module rlm_expr > # Loading module "expr" from file /etc/freeradius/mods-enabled/expr > expr { > safe_characters = > "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: > /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" > } > # Loaded module rlm_unpack > # Loading module "unpack" from file /etc/freeradius/mods-enabled/unpack > # Loaded module rlm_realm > # Loading module "IPASS" from file /etc/freeradius/mods-enabled/realm > realm IPASS { > format = "prefix" > delimiter = "/" > ignore_default = no > ignore_null = no > } > # Loading module "suffix" from file /etc/freeradius/mods-enabled/realm > realm suffix { > format = "suffix" > delimiter = "@" > ignore_default = no > ignore_null = no > } > # Loading module "bangpath" from file /etc/freeradius/mods-enabled/realm > realm bangpath { > format = "prefix" > delimiter = "!" > ignore_default = no > ignore_null = no > } > # Loading module "realmpercent" from file > /etc/freeradius/mods-enabled/realm > realm realmpercent { > format = "suffix" > delimiter = "%" > ignore_default = no > ignore_null = no > } > # Loading module "ntdomain" from file /etc/freeradius/mods-enabled/realm > realm ntdomain { > format = "prefix" > delimiter = "\\" > ignore_default = no > ignore_null = no > } > # Loading module "detail" from file /etc/freeradius/mods-enabled/detail > detail { > filename = > "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src- > IPv6-Address}}/detail-%Y%m%d" > header = "%t" > permissions = 384 > locking = no > escape_filenames = no > log_packet_header = no > } > # Loaded module rlm_pap > # Loading module "pap" from file /etc/freeradius/mods-enabled/pap > pap { > normalise = yes > } > # Loaded module rlm_digest > # Loading module "digest" from file /etc/freeradius/mods-enabled/digest > instantiate { > } > # Instantiating module "files" from file > /etc/freeradius/mods-enabled/files > reading pairlist file /etc/freeradius/mods-config/files/authorize > reading pairlist file /etc/freeradius/mods-config/files/accounting > reading pairlist file /etc/freeradius/mods-config/files/pre-proxy > # Instantiating module "preprocess" from file > /etc/freeradius/mods-enabled/preprocess > reading pairlist file /etc/freeradius/mods-config/preprocess/huntgroups > reading pairlist file /etc/freeradius/mods-config/preprocess/hints > # Instantiating module "etc_passwd" from file > /etc/freeradius/mods-enabled/passwd > rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no > # Instantiating module "eap" from file /etc/freeradius/mods-enabled/eap > # Linked to sub-module rlm_eap_md5 > # Linked to sub-module rlm_eap_leap > # Linked to sub-module rlm_eap_gtc > gtc { > challenge = "Password: " > auth_type = "PAP" > } > # Linked to sub-module rlm_eap_tls > tls { > tls = "tls-common" > } > tls-config tls-common { > verify_depth = 0 > ca_path = "/etc/freeradius/certs" > pem_file_type = yes > private_key_file = "/etc/freeradius/certs/server.pem" > certificate_file = "/etc/freeradius/certs/server.pem" > ca_file = "/etc/freeradius/certs/ca.pem" > private_key_password = <<< secret >>> > dh_file = "/etc/freeradius/certs/dh" > fragment_size = 1024 > include_length = yes > auto_chain = yes > check_crl = no > check_all_crl = no > cipher_list = "DEFAULT" > cipher_server_preference = no > ecdh_curve = "prime256v1" > disable_tlsv1 = yes > disable_tlsv1_1 = yes > tls_max_version = "1.2" > tls_min_version = "1.2" > cache { > enable = no > lifetime = 24 > max_entries = 255 > } > verify { > skip_if_ocsp_ok = no > } > ocsp { > enable = no > override_cert_url = yes > url = "http://127.0.0.1/ocsp/" > use_nonce = yes > timeout = 0 > softfail = no > } > } > Please use tls_min_version and tls_max_version instead of disable_tlsv1 > Please use tls_min_version and tls_max_version instead of disable_tlsv1_2 > # Linked to sub-module rlm_eap_ttls > ttls { > tls = "tls-common" > default_eap_type = "md5" > copy_request_to_tunnel = no > use_tunneled_reply = no > virtual_server = "inner-tunnel" > include_length = yes > require_client_cert = no > } > tls: Using cached TLS configuration from previous invocation > # Linked to sub-module rlm_eap_peap > peap { > tls = "tls-common" > default_eap_type = "mschapv2" > copy_request_to_tunnel = no > use_tunneled_reply = no > proxy_tunneled_request_as_eap = yes > virtual_server = "inner-tunnel" > soh = no > require_client_cert = no > } > tls: Using cached TLS configuration from previous invocation > # Linked to sub-module rlm_eap_mschapv2 > mschapv2 { > with_ntdomain_hack = no > send_error = no > } > # Instantiating module "cache_eap" from file > /etc/freeradius/mods-enabled/cache_eap > rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) > loaded and linked > # Instantiating module "auth_log" from file > /etc/freeradius/mods-enabled/detail.log > rlm_detail (auth_log): 'User-Password' suppressed, will not appear in > detail output > # Instantiating module "reply_log" from file > /etc/freeradius/mods-enabled/detail.log > # Instantiating module "pre_proxy_log" from file > /etc/freeradius/mods-enabled/detail.log > # Instantiating module "post_proxy_log" from file > /etc/freeradius/mods-enabled/detail.log > # Instantiating module "expiration" from file > /etc/freeradius/mods-enabled/expiration > # Instantiating module "reject" from file > /etc/freeradius/mods-enabled/always > # Instantiating module "fail" from file > /etc/freeradius/mods-enabled/always > # Instantiating module "ok" from file /etc/freeradius/mods- > enabled/always > # Instantiating module "handled" from file > /etc/freeradius/mods-enabled/always > # Instantiating module "invalid" from file > /etc/freeradius/mods-enabled/always > # Instantiating module "userlock" from file > /etc/freeradius/mods-enabled/always > # Instantiating module "notfound" from file > /etc/freeradius/mods-enabled/always > # Instantiating module "noop" from file > /etc/freeradius/mods-enabled/always > # Instantiating module "updated" from file > /etc/freeradius/mods-enabled/always > # Instantiating module "linelog" from file > /etc/freeradius/mods-enabled/linelog > # Instantiating module "log_accounting" from file > /etc/freeradius/mods-enabled/linelog > # Instantiating module "logintime" from file > /etc/freeradius/mods-enabled/logintime > # Instantiating module "mschap" from file > /etc/freeradius/mods-enabled/mschap > rlm_mschap (mschap): using internal authentication > # Instantiating module "attr_filter.post-proxy" from file > /etc/freeradius/mods-enabled/attr_filter > reading pairlist file /etc/freeradius/mods-config/attr_filter/post-proxy > # Instantiating module "attr_filter.pre-proxy" from file > /etc/freeradius/mods-enabled/attr_filter > reading pairlist file /etc/freeradius/mods-config/attr_filter/pre-proxy > # Instantiating module "attr_filter.access_reject" from file > /etc/freeradius/mods-enabled/attr_filter > reading pairlist file /etc/freeradius/mods- > config/attr_filter/access_reject > # Instantiating module "attr_filter.access_challenge" from file > /etc/freeradius/mods-enabled/attr_filter > reading pairlist file > /etc/freeradius/mods-config/attr_filter/access_challenge > # Instantiating module "attr_filter.accounting_response" from file > /etc/freeradius/mods-enabled/attr_filter > reading pairlist file > /etc/freeradius/mods-config/attr_filter/accounting_response > # Instantiating module "IPASS" from file > /etc/freeradius/mods-enabled/realm > # Instantiating module "suffix" from file > /etc/freeradius/mods-enabled/realm > # Instantiating module "bangpath" from file > /etc/freeradius/mods-enabled/realm > # Instantiating module "realmpercent" from file > /etc/freeradius/mods-enabled/realm > # Instantiating module "ntdomain" from file > /etc/freeradius/mods-enabled/realm > # Instantiating module "detail" from file > /etc/freeradius/mods-enabled/detail > # Instantiating module "pap" from file /etc/freeradius/mods-enabled/pap > } # modules > radiusd: #### Loading Virtual Servers #### > server { # from file /etc/freeradius/radiusd.conf > } # server > server default { # from file /etc/freeradius/sites-enabled/default > # Loading authenticate {...} > # Loading authorize {...} > Ignoring "sql" (see raddb/mods-available/README.rst) > Ignoring "ldap" (see raddb/mods-available/README.rst) > # Loading preacct {...} > # Loading accounting {...} > # Loading post-proxy {...} > # Loading post-auth {...} > } # server default > server inner-tunnel { # from file /etc/freeradius/sites-enabled/inner- > tunnel > # Loading authenticate {...} > # Loading authorize {...} > # Loading session {...} > # Loading post-proxy {...} > # Loading post-auth {...} > # Skipping contents of 'if' as it is always 'false' -- > /etc/freeradius/sites-enabled/inner-tunnel:337 > } # server inner-tunnel > radiusd: #### Opening IP addresses and Ports #### > listen { > type = "auth" > ipaddr = * > port = 0 > limit { > max_connections = 16 > lifetime = 0 > idle_timeout = 30 > } > } > listen { > type = "acct" > ipaddr = * > port = 0 > limit { > max_connections = 16 > lifetime = 0 > idle_timeout = 30 > } > } > listen { > type = "auth" > ipv6addr = :: > port = 0 > limit { > max_connections = 16 > lifetime = 0 > idle_timeout = 30 > } > } > listen { > type = "acct" > ipv6addr = :: > port = 0 > limit { > max_connections = 16 > lifetime = 0 > idle_timeout = 30 > } > } > listen { > type = "auth" > ipaddr = 127.0.0.1 > port = 18120 > } > Listening on auth address * port 1812 bound to server default > Listening on acct address * port 1813 bound to server default > Listening on auth address :: port 1812 bound to server default > Listening on acct address :: port 1813 bound to server default > Listening on auth address 127.0.0.1 port 18120 bound to server inner- > tunnel > Listening on proxy address * port 57880 > Listening on proxy address :: port 49174 > Ready to process requests > (0) Received Access-Request Id 183 from 127.0.0.1:38280 to 127.0.0.1:1812 > length 75 > (0) User-Name = "user" > (0) User-Password = "password" > (0) NAS-IP-Address = 10.0.1.5 > (0) NAS-Port = 0 > (0) Message-Authenticator = 0xf284051fc743741000f85a70054afb86 > (0) # Executing section authorize from file > /etc/freeradius/sites-enabled/default > (0) authorize { > (0) policy filter_username { > (0) if (&User-Name) { > (0) if (&User-Name) -> TRUE > (0) if (&User-Name) { > (0) if (&User-Name =~ / /) { > (0) if (&User-Name =~ / /) -> FALSE > (0) if (&User-Name =~ /@[^@]*@/ ) { > (0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE > (0) if (&User-Name =~ /\.\./ ) { > (0) if (&User-Name =~ /\.\./ ) -> FALSE > (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { > (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) - > > > FALSE > (0) if (&User-Name =~ /\.$/) { > (0) if (&User-Name =~ /\.$/) -> FALSE > (0) if (&User-Name =~ /@\./) { > (0) if (&User-Name =~ /@\./) -> FALSE > (0) } # if (&User-Name) = notfound > (0) } # policy filter_username = notfound > (0) [preprocess] = ok > (0) [chap] = noop > (0) [mschap] = noop > (0) [digest] = noop > (0) suffix: Checking for suffix after "@" > (0) suffix: No '@' in User-Name = "user", looking up realm NULL > (0) suffix: No such realm "NULL" > (0) [suffix] = noop > (0) eap: No EAP-Message, not doing EAP > (0) [eap] = noop > (0) files: users: Matched entry DEFAULT at line 1 > (0) [files] = ok > (0) [expiration] = noop > (0) [logintime] = noop > Not doing PAP as Auth-Type is already set. > (0) [pap] = noop > (0) } # authorize = ok > (0) Found Auth-Type = ntlm_auth > (0) # Executing group from file /etc/freeradius/sites-enabled/default > (0) authenticate { > (0) ntlm_auth: Executing: /etc/freeradius/mods-enabled/ntlm_auth > --request-nt-key --domain=mydomain --username=%{mschap:User-Name} > --password=%{User-Password}: > (0) ntlm_auth: EXPAND --username=%{mschap:User-Name} > (0) ntlm_auth: --> --username=user > (0) ntlm_auth: EXPAND --password=%{User-Password} > (0) ntlm_auth: --> --password=password > (0) ntlm_auth: ERROR: Program returned code (2) and output 'Failed to > execute "ntlm_auth": Permission denied' > (0) [ntlm_auth] = fail > (0) } # authenticate = fail > (0) Failed to authenticate the user > (0) Using Post-Auth-Type Reject > (0) # Executing group from file /etc/freeradius/sites-enabled/default > (0) Post-Auth-Type REJECT { > (0) attr_filter.access_reject: EXPAND %{User-Name} > (0) attr_filter.access_reject: -->user > (0) attr_filter.access_reject: Matched entry DEFAULT at line 11 > (0) [attr_filter.access_reject] = updated > (0) [eap] = noop > (0) policy remove_reply_message_if_eap { > (0) if (&reply:EAP-Message && &reply:Reply-Message) { > (0) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE > (0) else { > (0) [noop] = noop > (0) } # else = noop > (0) } # policy remove_reply_message_if_eap = noop > (0) } # Post-Auth-Type REJECT = updated > (0) Delaying response for 1.000000 seconds > Waking up in 0.3 seconds. > Waking up in 0.6 seconds. > (0) Sending delayed response > (0) Sent Access-Reject Id 183 from 127.0.0.1:1812 to 127.0.0.1:38280 > length > 20 > Waking up in 3.9 seconds. > ^Croot@aerify-radius-2:/etc/freeradius/mods-available# > root@aerify-radius-2:/etc/freeradius/mods-available# > - > List info/subscribe/unsubscribe? See > http://www.freeradius.org/list/users.html - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
Thanks for all the help!, I was able to get this working after pointing the
path to the binary On Wed, Dec 16, 2020 at 4:00 AM L.P.H. van Belle via Freeradius-Users < [hidden email]> wrote: > This part : > > program = "ntlm_auth --request-nt-key --domain=developertown.com > --username=%{mschap:User-Name} --password=% > > Read : > https://wiki.samba.org/index.php/Authenticating_Freeradius_against_Active_Directory > > --allow-mschapv2 << is what your missing at least. > > --domain=developertown.com > I would like to see this as : > > --domain=REALM.TLD > --domain=NT4DOM > (so caps). > > > > > -----Oorspronkelijk bericht----- > > Van: Freeradius-Users [mailto:freeradius-users- > > bounces+belle=[hidden email]] Namens Bryce Long > > Verzonden: dinsdag 15 december 2020 22:53 > > Aan: FreeRadius users mailing list > > Onderwerp: Issue with ntlm_auth permission denied > > > > So in failing to get eap-ttls pap to work with azure ad I thought I would > > try to atleast get connected to active directory per the freeradius howto > > > > But I keep running into issues with ntlm trying to run and then saying > > permission denied > > > > my net join worked and wbind returns users and gives me status ok when i > > try with a user and password > > > > Here is my debug > > > > FreeRADIUS Version 3.0.21 > > Copyright (C) 1999-2019 The FreeRADIUS server project and contributors > > There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A > > PARTICULAR PURPOSE > > You may redistribute copies of FreeRADIUS under the terms of the > > GNU General Public License > > For more information about these matters, see the file named COPYRIGHT > > Starting - reading configuration files ... > > including dictionary file /usr/share/freeradius/dictionary > > including dictionary file /usr/share/freeradius/dictionary.dhcp > > including dictionary file /usr/share/freeradius/dictionary.vqp > > including dictionary file /etc/freeradius/dictionary > > including configuration file /etc/freeradius/radiusd.conf > > including configuration file /etc/freeradius/proxy.conf > > including configuration file /etc/freeradius/clients.conf > > including files in directory /etc/freeradius/mods-enabled/ > > including configuration file /etc/freeradius/mods-enabled/sradutmp > > including configuration file /etc/freeradius/mods-enabled/files > > including configuration file /etc/freeradius/mods-enabled/chap > > including configuration file /etc/freeradius/mods-enabled/preprocess > > including configuration file /etc/freeradius/mods-enabled/passwd > > including configuration file /etc/freeradius/mods-enabled/eap > > including configuration file /etc/freeradius/mods-enabled/unix > > including configuration file /etc/freeradius/mods-enabled/cache_eap > > including configuration file /etc/freeradius/mods-enabled/replicate > > including configuration file /etc/freeradius/mods-enabled/detail.log > > including configuration file /etc/freeradius/mods-enabled/echo > > including configuration file /etc/freeradius/mods-enabled/expiration > > including configuration file /etc/freeradius/mods-enabled/always > > including configuration file /etc/freeradius/mods-enabled/soh > > including configuration file /etc/freeradius/mods-enabled/utf8 > > including configuration file /etc/freeradius/mods-enabled/linelog > > including configuration file /etc/freeradius/mods-enabled/date > > including configuration file /etc/freeradius/mods-enabled/logintime > > including configuration file /etc/freeradius/mods-enabled/dynamic_clients > > including configuration file /etc/freeradius/mods-enabled/ntlm_auth > > including configuration file /etc/freeradius/mods-enabled/radutmp > > including configuration file /etc/freeradius/mods-enabled/mschap > > including configuration file /etc/freeradius/mods-enabled/exec > > including configuration file /etc/freeradius/mods-enabled/attr_filter > > including configuration file /etc/freeradius/mods-enabled/expr > > including configuration file /etc/freeradius/mods-enabled/unpack > > including configuration file /etc/freeradius/mods-enabled/realm > > including configuration file /etc/freeradius/mods-enabled/detail > > including configuration file /etc/freeradius/mods-enabled/pap > > including configuration file /etc/freeradius/mods-enabled/digest > > including files in directory /etc/freeradius/policy.d/ > > including configuration file /etc/freeradius/policy.d/eap > > including configuration file /etc/freeradius/policy.d/accounting > > including configuration file /etc/freeradius/policy.d/abfab-tr > > including configuration file /etc/freeradius/policy.d/operator-name > > including configuration file /etc/freeradius/policy.d/rfc7542 > > including configuration file /etc/freeradius/policy.d/dhcp > > including configuration file /etc/freeradius/policy.d/debug > > including configuration file /etc/freeradius/policy.d/cui > > including configuration file /etc/freeradius/policy.d/canonicalization > > including configuration file /etc/freeradius/policy.d/filter > > including configuration file /etc/freeradius/policy.d/control > > including configuration file /etc/freeradius/policy.d/moonshot-targeted- > > ids > > including files in directory /etc/freeradius/sites-enabled/ > > including configuration file /etc/freeradius/sites-enabled/default > > including configuration file /etc/freeradius/sites-enabled/inner-tunnel > > main { > > security { > > user = "freerad" > > group = "freerad" > > allow_core_dumps = no > > } > > name = "freeradius" > > prefix = "/usr" > > localstatedir = "/var" > > logdir = "/var/log/freeradius" > > run_dir = "/var/run/freeradius" > > } > > main { > > name = "freeradius" > > prefix = "/usr" > > localstatedir = "/var" > > sbindir = "/usr/sbin" > > logdir = "/var/log/freeradius" > > run_dir = "/var/run/freeradius" > > libdir = "/usr/lib/freeradius" > > radacctdir = "/var/log/freeradius/radacct" > > hostname_lookups = no > > max_request_time = 30 > > cleanup_delay = 5 > > max_requests = 16384 > > pidfile = "/var/run/freeradius/freeradius.pid" > > checkrad = "/usr/sbin/checkrad" > > debug_level = 0 > > proxy_requests = yes > > log { > > stripped_names = no > > auth = no > > auth_badpass = no > > auth_goodpass = no > > colourise = yes > > msg_denied = "You are already logged in - access denied" > > } > > resources { > > } > > security { > > max_attributes = 200 > > reject_delay = 1.000000 > > status_server = yes > > } > > } > > radiusd: #### Loading Realms and Home Servers #### > > proxy server { > > retry_delay = 5 > > retry_count = 3 > > default_fallback = no > > dead_time = 120 > > wake_all_if_all_dead = no > > } > > home_server localhost { > > ipaddr = 127.0.0.1 > > port = 1812 > > type = "auth" > > secret = <<< secret >>> > > response_window = 20.000000 > > response_timeouts = 1 > > max_outstanding = 65536 > > zombie_period = 40 > > status_check = "status-server" > > ping_interval = 30 > > check_interval = 30 > > check_timeout = 4 > > num_answers_to_alive = 3 > > revive_interval = 120 > > limit { > > max_connections = 16 > > max_requests = 0 > > lifetime = 0 > > idle_timeout = 0 > > } > > coa { > > irt = 2 > > mrt = 16 > > mrc = 5 > > mrd = 30 > > } > > } > > home_server_pool my_auth_failover { > > type = fail-over > > home_server = localhost > > } > > realm example.com { > > auth_pool = my_auth_failover > > } > > realm LOCAL { > > } > > radiusd: #### Loading Clients #### > > client localhost { > > ipaddr = 127.0.0.1 > > require_message_authenticator = no > > secret = <<< secret >>> > > nas_type = "other" > > proto = "*" > > limit { > > max_connections = 16 > > lifetime = 0 > > idle_timeout = 30 > > } > > } > > client localhost_ipv6 { > > ipv6addr = ::1 > > require_message_authenticator = no > > secret = <<< secret >>> > > limit { > > max_connections = 16 > > lifetime = 0 > > idle_timeout = 30 > > } > > } > > client my_wifi { > > ipaddr = 68.45.161.30 > > require_message_authenticator = no > > secret = <<< secret >>> > > limit { > > max_connections = 16 > > lifetime = 0 > > idle_timeout = 30 > > } > > } > > Debugger not attached > > systemd watchdog is disabled > > # Creating Auth-Type = ntlm_auth > > # Creating Auth-Type = mschap > > # Creating Auth-Type = digest > > # Creating Auth-Type = eap > > # Creating Auth-Type = PAP > > # Creating Auth-Type = CHAP > > # Creating Auth-Type = MS-CHAP > > radiusd: #### Instantiating modules #### > > modules { > > # Loaded module rlm_radutmp > > # Loading module "sradutmp" from file > > /etc/freeradius/mods-enabled/sradutmp > > radutmp sradutmp { > > filename = "/var/log/freeradius/sradutmp" > > username = "%{User-Name}" > > case_sensitive = yes > > check_with_nas = yes > > permissions = 420 > > caller_id = no > > } > > # Loaded module rlm_files > > # Loading module "files" from file /etc/freeradius/mods-enabled/files > > files { > > filename = "/etc/freeradius/mods-config/files/authorize" > > acctusersfile = "/etc/freeradius/mods-config/files/accounting" > > preproxy_usersfile = "/etc/freeradius/mods-config/files/pre-proxy" > > } > > # Loaded module rlm_chap > > # Loading module "chap" from file /etc/freeradius/mods-enabled/chap > > # Loaded module rlm_preprocess > > # Loading module "preprocess" from file > > /etc/freeradius/mods-enabled/preprocess > > preprocess { > > huntgroups = "/etc/freeradius/mods-config/preprocess/huntgroups" > > hints = "/etc/freeradius/mods-config/preprocess/hints" > > with_ascend_hack = no > > ascend_channels_per_line = 23 > > with_ntdomain_hack = no > > with_specialix_jetstream_hack = no > > with_cisco_vsa_hack = no > > with_alvarion_vsa_hack = no > > } > > # Loaded module rlm_passwd > > # Loading module "etc_passwd" from file > > /etc/freeradius/mods-enabled/passwd > > passwd etc_passwd { > > filename = "/etc/passwd" > > format = "*User-Name:Crypt-Password:" > > delimiter = ":" > > ignore_nislike = no > > ignore_empty = yes > > allow_multiple_keys = no > > hash_size = 100 > > } > > # Loaded module rlm_eap > > # Loading module "eap" from file /etc/freeradius/mods-enabled/eap > > eap { > > default_eap_type = "md5" > > timer_expire = 60 > > ignore_unknown_eap_types = no > > cisco_accounting_username_bug = no > > max_sessions = 16384 > > } > > # Loaded module rlm_unix > > # Loading module "unix" from file /etc/freeradius/mods-enabled/unix > > unix { > > radwtmp = "/var/log/freeradius/radwtmp" > > } > > Creating attribute Unix-Group > > # Loaded module rlm_cache > > # Loading module "cache_eap" from file > > /etc/freeradius/mods-enabled/cache_eap > > cache cache_eap { > > driver = "rlm_cache_rbtree" > > key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}" > > ttl = 15 > > max_entries = 0 > > epoch = 0 > > add_stats = no > > } > > # Loaded module rlm_replicate > > # Loading module "replicate" from file > > /etc/freeradius/mods-enabled/replicate > > # Loaded module rlm_detail > > # Loading module "auth_log" from file > > /etc/freeradius/mods-enabled/detail.log > > detail auth_log { > > filename = > > "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src- > > IPv6-Address}}/auth-detail-%Y%m%d" > > header = "%t" > > permissions = 384 > > locking = no > > escape_filenames = no > > log_packet_header = no > > } > > # Loading module "reply_log" from file > > /etc/freeradius/mods-enabled/detail.log > > detail reply_log { > > filename = > > "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src- > > IPv6-Address}}/reply-detail-%Y%m%d" > > header = "%t" > > permissions = 384 > > locking = no > > escape_filenames = no > > log_packet_header = no > > } > > # Loading module "pre_proxy_log" from file > > /etc/freeradius/mods-enabled/detail.log > > detail pre_proxy_log { > > filename = > > "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src- > > IPv6-Address}}/pre-proxy-detail-%Y%m%d" > > header = "%t" > > permissions = 384 > > locking = no > > escape_filenames = no > > log_packet_header = no > > } > > # Loading module "post_proxy_log" from file > > /etc/freeradius/mods-enabled/detail.log > > detail post_proxy_log { > > filename = > > "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src- > > IPv6-Address}}/post-proxy-detail-%Y%m%d" > > header = "%t" > > permissions = 384 > > locking = no > > escape_filenames = no > > log_packet_header = no > > } > > # Loaded module rlm_exec > > # Loading module "echo" from file /etc/freeradius/mods-enabled/echo > > exec echo { > > wait = yes > > program = "/bin/echo %{User-Name}" > > input_pairs = "request" > > output_pairs = "reply" > > shell_escape = yes > > } > > # Loaded module rlm_expiration > > # Loading module "expiration" from file > > /etc/freeradius/mods-enabled/expiration > > # Loaded module rlm_always > > # Loading module "reject" from file /etc/freeradius/mods-enabled/always > > always reject { > > rcode = "reject" > > simulcount = 0 > > mpp = no > > } > > # Loading module "fail" from file /etc/freeradius/mods-enabled/always > > always fail { > > rcode = "fail" > > simulcount = 0 > > mpp = no > > } > > # Loading module "ok" from file /etc/freeradius/mods-enabled/always > > always ok { > > rcode = "ok" > > simulcount = 0 > > mpp = no > > } > > # Loading module "handled" from file > /etc/freeradius/mods-enabled/always > > always handled { > > rcode = "handled" > > simulcount = 0 > > mpp = no > > } > > # Loading module "invalid" from file > /etc/freeradius/mods-enabled/always > > always invalid { > > rcode = "invalid" > > simulcount = 0 > > mpp = no > > } > > # Loading module "userlock" from file /etc/freeradius/mods- > > enabled/always > > always userlock { > > rcode = "userlock" > > simulcount = 0 > > mpp = no > > } > > # Loading module "notfound" from file /etc/freeradius/mods- > > enabled/always > > always notfound { > > rcode = "notfound" > > simulcount = 0 > > mpp = no > > } > > # Loading module "noop" from file /etc/freeradius/mods-enabled/always > > always noop { > > rcode = "noop" > > simulcount = 0 > > mpp = no > > } > > # Loading module "updated" from file > /etc/freeradius/mods-enabled/always > > always updated { > > rcode = "updated" > > simulcount = 0 > > mpp = no > > } > > # Loaded module rlm_soh > > # Loading module "soh" from file /etc/freeradius/mods-enabled/soh > > soh { > > dhcp = yes > > } > > # Loaded module rlm_utf8 > > # Loading module "utf8" from file /etc/freeradius/mods-enabled/utf8 > > # Loaded module rlm_linelog > > # Loading module "linelog" from file /etc/freeradius/mods- > > enabled/linelog > > linelog { > > filename = "/var/log/freeradius/linelog" > > escape_filenames = no > > syslog_severity = "info" > > permissions = 384 > > format = "This is a log message for %{User-Name}" > > reference = "messages.%{%{reply:Packet-Type}:-default}" > > } > > # Loading module "log_accounting" from file > > /etc/freeradius/mods-enabled/linelog > > linelog log_accounting { > > filename = "/var/log/freeradius/linelog-accounting" > > escape_filenames = no > > syslog_severity = "info" > > permissions = 384 > > format = "" > > reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" > > } > > # Loaded module rlm_date > > # Loading module "date" from file /etc/freeradius/mods-enabled/date > > date { > > format = "%b %e %Y %H:%M:%S %Z" > > utc = no > > } > > # Loading module "wispr2date" from file /etc/freeradius/mods- > > enabled/date > > date wispr2date { > > format = "%Y-%m-%dT%H:%M:%S" > > utc = no > > } > > # Loaded module rlm_logintime > > # Loading module "logintime" from file > > /etc/freeradius/mods-enabled/logintime > > logintime { > > minimum_timeout = 60 > > } > > # Loaded module rlm_dynamic_clients > > # Loading module "dynamic_clients" from file > > /etc/freeradius/mods-enabled/dynamic_clients > > # Loading module "ntlm_auth" from file > > /etc/freeradius/mods-enabled/ntlm_auth > > exec ntlm_auth { > > wait = yes > > program = "ntlm_auth --request-nt-key --domain=developertown.com > > --username=%{mschap:User-Name} --password=%{User-Password}" > > shell_escape = yes > > } > > # Loading module "radutmp" from file /etc/freeradius/mods- > > enabled/radutmp > > radutmp { > > filename = "/var/log/freeradius/radutmp" > > username = "%{User-Name}" > > case_sensitive = yes > > check_with_nas = yes > > permissions = 384 > > caller_id = yes > > } > > # Loaded module rlm_mschap > > # Loading module "mschap" from file /etc/freeradius/mods-enabled/mschap > > mschap { > > use_mppe = yes > > require_encryption = no > > require_strong = no > > with_ntdomain_hack = yes > > passchange { > > } > > allow_retry = yes > > winbind_retry_with_normalised_username = no > > } > > # Loading module "exec" from file /etc/freeradius/mods-enabled/exec > > exec { > > wait = no > > input_pairs = "request" > > shell_escape = yes > > timeout = 10 > > } > > # Loaded module rlm_attr_filter > > # Loading module "attr_filter.post-proxy" from file > > /etc/freeradius/mods-enabled/attr_filter > > attr_filter attr_filter.post-proxy { > > filename = "/etc/freeradius/mods-config/attr_filter/post-proxy" > > key = "%{Realm}" > > relaxed = no > > } > > # Loading module "attr_filter.pre-proxy" from file > > /etc/freeradius/mods-enabled/attr_filter > > attr_filter attr_filter.pre-proxy { > > filename = "/etc/freeradius/mods-config/attr_filter/pre-proxy" > > key = "%{Realm}" > > relaxed = no > > } > > # Loading module "attr_filter.access_reject" from file > > /etc/freeradius/mods-enabled/attr_filter > > attr_filter attr_filter.access_reject { > > filename = "/etc/freeradius/mods-config/attr_filter/access_reject" > > key = "%{User-Name}" > > relaxed = no > > } > > # Loading module "attr_filter.access_challenge" from file > > /etc/freeradius/mods-enabled/attr_filter > > attr_filter attr_filter.access_challenge { > > filename = "/etc/freeradius/mods-config/attr_filter/access_challenge" > > key = "%{User-Name}" > > relaxed = no > > } > > # Loading module "attr_filter.accounting_response" from file > > /etc/freeradius/mods-enabled/attr_filter > > attr_filter attr_filter.accounting_response { > > filename = > "/etc/freeradius/mods-config/attr_filter/accounting_response" > > key = "%{User-Name}" > > relaxed = no > > } > > # Loaded module rlm_expr > > # Loading module "expr" from file /etc/freeradius/mods-enabled/expr > > expr { > > safe_characters = > > "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: > > /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" > > } > > # Loaded module rlm_unpack > > # Loading module "unpack" from file /etc/freeradius/mods-enabled/unpack > > # Loaded module rlm_realm > > # Loading module "IPASS" from file /etc/freeradius/mods-enabled/realm > > realm IPASS { > > format = "prefix" > > delimiter = "/" > > ignore_default = no > > ignore_null = no > > } > > # Loading module "suffix" from file /etc/freeradius/mods-enabled/realm > > realm suffix { > > format = "suffix" > > delimiter = "@" > > ignore_default = no > > ignore_null = no > > } > > # Loading module "bangpath" from file > /etc/freeradius/mods-enabled/realm > > realm bangpath { > > format = "prefix" > > delimiter = "!" > > ignore_default = no > > ignore_null = no > > } > > # Loading module "realmpercent" from file > > /etc/freeradius/mods-enabled/realm > > realm realmpercent { > > format = "suffix" > > delimiter = "%" > > ignore_default = no > > ignore_null = no > > } > > # Loading module "ntdomain" from file > /etc/freeradius/mods-enabled/realm > > realm ntdomain { > > format = "prefix" > > delimiter = "\\" > > ignore_default = no > > ignore_null = no > > } > > # Loading module "detail" from file /etc/freeradius/mods-enabled/detail > > detail { > > filename = > > "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src- > > IPv6-Address}}/detail-%Y%m%d" > > header = "%t" > > permissions = 384 > > locking = no > > escape_filenames = no > > log_packet_header = no > > } > > # Loaded module rlm_pap > > # Loading module "pap" from file /etc/freeradius/mods-enabled/pap > > pap { > > normalise = yes > > } > > # Loaded module rlm_digest > > # Loading module "digest" from file /etc/freeradius/mods-enabled/digest > > instantiate { > > } > > # Instantiating module "files" from file > > /etc/freeradius/mods-enabled/files > > reading pairlist file /etc/freeradius/mods-config/files/authorize > > reading pairlist file /etc/freeradius/mods-config/files/accounting > > reading pairlist file /etc/freeradius/mods-config/files/pre-proxy > > # Instantiating module "preprocess" from file > > /etc/freeradius/mods-enabled/preprocess > > reading pairlist file /etc/freeradius/mods-config/preprocess/huntgroups > > reading pairlist file /etc/freeradius/mods-config/preprocess/hints > > # Instantiating module "etc_passwd" from file > > /etc/freeradius/mods-enabled/passwd > > rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no > > # Instantiating module "eap" from file /etc/freeradius/mods-enabled/eap > > # Linked to sub-module rlm_eap_md5 > > # Linked to sub-module rlm_eap_leap > > # Linked to sub-module rlm_eap_gtc > > gtc { > > challenge = "Password: " > > auth_type = "PAP" > > } > > # Linked to sub-module rlm_eap_tls > > tls { > > tls = "tls-common" > > } > > tls-config tls-common { > > verify_depth = 0 > > ca_path = "/etc/freeradius/certs" > > pem_file_type = yes > > private_key_file = "/etc/freeradius/certs/server.pem" > > certificate_file = "/etc/freeradius/certs/server.pem" > > ca_file = "/etc/freeradius/certs/ca.pem" > > private_key_password = <<< secret >>> > > dh_file = "/etc/freeradius/certs/dh" > > fragment_size = 1024 > > include_length = yes > > auto_chain = yes > > check_crl = no > > check_all_crl = no > > cipher_list = "DEFAULT" > > cipher_server_preference = no > > ecdh_curve = "prime256v1" > > disable_tlsv1 = yes > > disable_tlsv1_1 = yes > > tls_max_version = "1.2" > > tls_min_version = "1.2" > > cache { > > enable = no > > lifetime = 24 > > max_entries = 255 > > } > > verify { > > skip_if_ocsp_ok = no > > } > > ocsp { > > enable = no > > override_cert_url = yes > > url = "http://127.0.0.1/ocsp/" > > use_nonce = yes > > timeout = 0 > > softfail = no > > } > > } > > Please use tls_min_version and tls_max_version instead of disable_tlsv1 > > Please use tls_min_version and tls_max_version instead of disable_tlsv1_2 > > # Linked to sub-module rlm_eap_ttls > > ttls { > > tls = "tls-common" > > default_eap_type = "md5" > > copy_request_to_tunnel = no > > use_tunneled_reply = no > > virtual_server = "inner-tunnel" > > include_length = yes > > require_client_cert = no > > } > > tls: Using cached TLS configuration from previous invocation > > # Linked to sub-module rlm_eap_peap > > peap { > > tls = "tls-common" > > default_eap_type = "mschapv2" > > copy_request_to_tunnel = no > > use_tunneled_reply = no > > proxy_tunneled_request_as_eap = yes > > virtual_server = "inner-tunnel" > > soh = no > > require_client_cert = no > > } > > tls: Using cached TLS configuration from previous invocation > > # Linked to sub-module rlm_eap_mschapv2 > > mschapv2 { > > with_ntdomain_hack = no > > send_error = no > > } > > # Instantiating module "cache_eap" from file > > /etc/freeradius/mods-enabled/cache_eap > > rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) > > loaded and linked > > # Instantiating module "auth_log" from file > > /etc/freeradius/mods-enabled/detail.log > > rlm_detail (auth_log): 'User-Password' suppressed, will not appear in > > detail output > > # Instantiating module "reply_log" from file > > /etc/freeradius/mods-enabled/detail.log > > # Instantiating module "pre_proxy_log" from file > > /etc/freeradius/mods-enabled/detail.log > > # Instantiating module "post_proxy_log" from file > > /etc/freeradius/mods-enabled/detail.log > > # Instantiating module "expiration" from file > > /etc/freeradius/mods-enabled/expiration > > # Instantiating module "reject" from file > > /etc/freeradius/mods-enabled/always > > # Instantiating module "fail" from file > > /etc/freeradius/mods-enabled/always > > # Instantiating module "ok" from file /etc/freeradius/mods- > > enabled/always > > # Instantiating module "handled" from file > > /etc/freeradius/mods-enabled/always > > # Instantiating module "invalid" from file > > /etc/freeradius/mods-enabled/always > > # Instantiating module "userlock" from file > > /etc/freeradius/mods-enabled/always > > # Instantiating module "notfound" from file > > /etc/freeradius/mods-enabled/always > > # Instantiating module "noop" from file > > /etc/freeradius/mods-enabled/always > > # Instantiating module "updated" from file > > /etc/freeradius/mods-enabled/always > > # Instantiating module "linelog" from file > > /etc/freeradius/mods-enabled/linelog > > # Instantiating module "log_accounting" from file > > /etc/freeradius/mods-enabled/linelog > > # Instantiating module "logintime" from file > > /etc/freeradius/mods-enabled/logintime > > # Instantiating module "mschap" from file > > /etc/freeradius/mods-enabled/mschap > > rlm_mschap (mschap): using internal authentication > > # Instantiating module "attr_filter.post-proxy" from file > > /etc/freeradius/mods-enabled/attr_filter > > reading pairlist file /etc/freeradius/mods-config/attr_filter/post-proxy > > # Instantiating module "attr_filter.pre-proxy" from file > > /etc/freeradius/mods-enabled/attr_filter > > reading pairlist file /etc/freeradius/mods-config/attr_filter/pre-proxy > > # Instantiating module "attr_filter.access_reject" from file > > /etc/freeradius/mods-enabled/attr_filter > > reading pairlist file /etc/freeradius/mods- > > config/attr_filter/access_reject > > # Instantiating module "attr_filter.access_challenge" from file > > /etc/freeradius/mods-enabled/attr_filter > > reading pairlist file > > /etc/freeradius/mods-config/attr_filter/access_challenge > > # Instantiating module "attr_filter.accounting_response" from file > > /etc/freeradius/mods-enabled/attr_filter > > reading pairlist file > > /etc/freeradius/mods-config/attr_filter/accounting_response > > # Instantiating module "IPASS" from file > > /etc/freeradius/mods-enabled/realm > > # Instantiating module "suffix" from file > > /etc/freeradius/mods-enabled/realm > > # Instantiating module "bangpath" from file > > /etc/freeradius/mods-enabled/realm > > # Instantiating module "realmpercent" from file > > /etc/freeradius/mods-enabled/realm > > # Instantiating module "ntdomain" from file > > /etc/freeradius/mods-enabled/realm > > # Instantiating module "detail" from file > > /etc/freeradius/mods-enabled/detail > > # Instantiating module "pap" from file /etc/freeradius/mods-enabled/pap > > } # modules > > radiusd: #### Loading Virtual Servers #### > > server { # from file /etc/freeradius/radiusd.conf > > } # server > > server default { # from file /etc/freeradius/sites-enabled/default > > # Loading authenticate {...} > > # Loading authorize {...} > > Ignoring "sql" (see raddb/mods-available/README.rst) > > Ignoring "ldap" (see raddb/mods-available/README.rst) > > # Loading preacct {...} > > # Loading accounting {...} > > # Loading post-proxy {...} > > # Loading post-auth {...} > > } # server default > > server inner-tunnel { # from file /etc/freeradius/sites-enabled/inner- > > tunnel > > # Loading authenticate {...} > > # Loading authorize {...} > > # Loading session {...} > > # Loading post-proxy {...} > > # Loading post-auth {...} > > # Skipping contents of 'if' as it is always 'false' -- > > /etc/freeradius/sites-enabled/inner-tunnel:337 > > } # server inner-tunnel > > radiusd: #### Opening IP addresses and Ports #### > > listen { > > type = "auth" > > ipaddr = * > > port = 0 > > limit { > > max_connections = 16 > > lifetime = 0 > > idle_timeout = 30 > > } > > } > > listen { > > type = "acct" > > ipaddr = * > > port = 0 > > limit { > > max_connections = 16 > > lifetime = 0 > > idle_timeout = 30 > > } > > } > > listen { > > type = "auth" > > ipv6addr = :: > > port = 0 > > limit { > > max_connections = 16 > > lifetime = 0 > > idle_timeout = 30 > > } > > } > > listen { > > type = "acct" > > ipv6addr = :: > > port = 0 > > limit { > > max_connections = 16 > > lifetime = 0 > > idle_timeout = 30 > > } > > } > > listen { > > type = "auth" > > ipaddr = 127.0.0.1 > > port = 18120 > > } > > Listening on auth address * port 1812 bound to server default > > Listening on acct address * port 1813 bound to server default > > Listening on auth address :: port 1812 bound to server default > > Listening on acct address :: port 1813 bound to server default > > Listening on auth address 127.0.0.1 port 18120 bound to server inner- > > tunnel > > Listening on proxy address * port 57880 > > Listening on proxy address :: port 49174 > > Ready to process requests > > (0) Received Access-Request Id 183 from 127.0.0.1:38280 to > 127.0.0.1:1812 > > length 75 > > (0) User-Name = "user" > > (0) User-Password = "password" > > (0) NAS-IP-Address = 10.0.1.5 > > (0) NAS-Port = 0 > > (0) Message-Authenticator = 0xf284051fc743741000f85a70054afb86 > > (0) # Executing section authorize from file > > /etc/freeradius/sites-enabled/default > > (0) authorize { > > (0) policy filter_username { > > (0) if (&User-Name) { > > (0) if (&User-Name) -> TRUE > > (0) if (&User-Name) { > > (0) if (&User-Name =~ / /) { > > (0) if (&User-Name =~ / /) -> FALSE > > (0) if (&User-Name =~ /@[^@]*@/ ) { > > (0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE > > (0) if (&User-Name =~ /\.\./ ) { > > (0) if (&User-Name =~ /\.\./ ) -> FALSE > > (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { > > (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) > - > > > > > FALSE > > (0) if (&User-Name =~ /\.$/) { > > (0) if (&User-Name =~ /\.$/) -> FALSE > > (0) if (&User-Name =~ /@\./) { > > (0) if (&User-Name =~ /@\./) -> FALSE > > (0) } # if (&User-Name) = notfound > > (0) } # policy filter_username = notfound > > (0) [preprocess] = ok > > (0) [chap] = noop > > (0) [mschap] = noop > > (0) [digest] = noop > > (0) suffix: Checking for suffix after "@" > > (0) suffix: No '@' in User-Name = "user", looking up realm NULL > > (0) suffix: No such realm "NULL" > > (0) [suffix] = noop > > (0) eap: No EAP-Message, not doing EAP > > (0) [eap] = noop > > (0) files: users: Matched entry DEFAULT at line 1 > > (0) [files] = ok > > (0) [expiration] = noop > > (0) [logintime] = noop > > Not doing PAP as Auth-Type is already set. > > (0) [pap] = noop > > (0) } # authorize = ok > > (0) Found Auth-Type = ntlm_auth > > (0) # Executing group from file /etc/freeradius/sites-enabled/default > > (0) authenticate { > > (0) ntlm_auth: Executing: /etc/freeradius/mods-enabled/ntlm_auth > > --request-nt-key --domain=mydomain --username=%{mschap:User-Name} > > --password=%{User-Password}: > > (0) ntlm_auth: EXPAND --username=%{mschap:User-Name} > > (0) ntlm_auth: --> --username=user > > (0) ntlm_auth: EXPAND --password=%{User-Password} > > (0) ntlm_auth: --> --password=password > > (0) ntlm_auth: ERROR: Program returned code (2) and output 'Failed to > > execute "ntlm_auth": Permission denied' > > (0) [ntlm_auth] = fail > > (0) } # authenticate = fail > > (0) Failed to authenticate the user > > (0) Using Post-Auth-Type Reject > > (0) # Executing group from file /etc/freeradius/sites-enabled/default > > (0) Post-Auth-Type REJECT { > > (0) attr_filter.access_reject: EXPAND %{User-Name} > > (0) attr_filter.access_reject: -->user > > (0) attr_filter.access_reject: Matched entry DEFAULT at line 11 > > (0) [attr_filter.access_reject] = updated > > (0) [eap] = noop > > (0) policy remove_reply_message_if_eap { > > (0) if (&reply:EAP-Message && &reply:Reply-Message) { > > (0) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE > > (0) else { > > (0) [noop] = noop > > (0) } # else = noop > > (0) } # policy remove_reply_message_if_eap = noop > > (0) } # Post-Auth-Type REJECT = updated > > (0) Delaying response for 1.000000 seconds > > Waking up in 0.3 seconds. > > Waking up in 0.6 seconds. > > (0) Sending delayed response > > (0) Sent Access-Reject Id 183 from 127.0.0.1:1812 to 127.0.0.1:38280 > > length > > 20 > > Waking up in 3.9 seconds. > > ^Croot@aerify-radius-2:/etc/freeradius/mods-available# > > root@aerify-radius-2:/etc/freeradius/mods-available# > > - > > List info/subscribe/unsubscribe? See > > http://www.freeradius.org/list/users.html > > > - > List info/subscribe/unsubscribe? See > http://www.freeradius.org/list/users.html List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
Free forum by Nabble | Edit this page |