Tuesday, 2011-12-06

*** Vipin (0cb66102@gateway/web/freenode/ip.12.182.97.2) has joined #wikid01:36
VipinHello WIKID , anyone online01:37
*** Vipin has quit (Client Quit)01:38
*** Vj (0cb66102@gateway/web/freenode/ip.12.182.97.2) has joined #wikid02:26
VjHi Nick02:26
VjHi Nick02:27
*** Vj has quit (Ping timeout: 265 seconds)02:53
*** CheckDavid (~Dave@89.181.154.186) has joined #wikid04:44
*** CheckDavid has parted #wikid ("Leaving")04:45
*** perestrelka has quit (Ping timeout: 240 seconds)11:14
*** perestrelka (~vladdy@194.242.5.49) has joined #wikid11:16
*** nowen (~nowen@adsl-74-176-212-133.asm.bellsouth.net) has joined #wikid15:20
*** XaaS (ce705fb4@gateway/web/freenode/ip.206.112.95.180) has joined #wikid17:34
XaaSHi - I am in need of some assistance with using WiKID with NPS supporting multiple WiKID domains17:34
nowenok17:37
XaaSHi Nick17:37
nowen:) hi17:38
XaaSCan I call you?17:38
nowenI'm actually on a webinar right now17:38
XaaSI have a bunch of questions...17:38
XaaS:(17:38
XaaSwhen will you have time?17:38
nowenwhat are you trying to do?17:38
XaaSI am really frustrated - I know I am close but I can't seem to get certain things to work as we need them17:38
XaaSI want to use a single NPS server to act as a RADIUS proxy to WiKID for several security domains17:39
nowenand what is going wrong?17:39
XaaSand have all of the network clients attach to the NPS server17:39
XaaS1) The NPS server when I have NTRadPing on it and try to authenticate fails, but from another PC it works17:40
XaaS2) Multiple attempts to authenticate seem to disable an incorrect security domain (ie I am trying to authenticate against the Firewall security domain, but the VPN security domain account gets disabled after three attempts....)17:41
nowen1) is this with WiKID OTPs?17:41
XaaSThat one is really really wierd17:41
XaaSyes17:42
XaaSI can do a GoToMeeting with you if you have the time17:42
XaaSso you can see for yourself17:42
XaaSI have been pushing for WiKID as the 2FA for us17:42
nowenIRC is my preferred support method.17:42
XaaSI know - but you can't see the behavior that way17:42
XaaS.17:42
nowenok, so you are on a PC, and enter the OTP and username.  the OTP and username are proxied to WiKID and authenticated?17:43
XaaSso - to make things simple.17:43
XaaSI am on the NPS server - with NPS de-installed17:43
XaaSI have NTRadPing installed on the NPS server17:43
XaaSI have a Network Client configured for the NPS server with the NPS server's IP and a unique secret key17:44
XaaSin WiKID17:44
nowenok17:44
XaaSI use NTRadPing to authenticate with the OTP token pointing to the WiKID's IP using that unique secret17:45
XaaSit is failing17:45
nowenwhat is the error in the WiKIDAdmin logs?17:45
XaaSowever, if I do the same thing on a different system, it works17:45
XaaSI haven't disected the WiKIDAdmin Logs17:45
XaaSI can do so17:45
nowenplease do.17:46
nowenyou can set the radius logger to debug: http://www.wikidsystems.com/support/wikid-support-center/troubleshooting-faq/how-can-i-set-radius-logging-to-debug-how-can-i-see-if-wikid-is-getting-the-radius-requests?searchterm=radius+debug17:48
XaaSI just modified the WiKID RADIUS logging to debug17:52
XaaSI am going to do the test now17:53
nowenok17:54
XaaSdamn - it just worked17:54
nowenLOL!17:55
nowenclearly, I am magic!17:55
XaaSso - question - is it allowed to have 2 or more network clients at the same IP with different domains and secrets???17:56
nowendon't think so, that would probably cause some confusion17:56
XaaSOK - so how would one have a single NPS server supporting multiple security domains17:57
nowendoes NPS do your authorization?17:57
XaaSNo - it's to be our RADIUS Proxy - basically working ike a switchboard17:58
nowenthen what purpose does it serve?17:58
XaaSBetter rules and RADIUS Accounting17:58
nowenwhat do you mean by rules?17:59
XaaSyou can put conditional rules into the policies17:59
nowenisn't that authorization?17:59
XaaSin addition to the authorization - example OTP matches and PAP is in use18:00
XaaSAs well as the RADIUS Accounting to SQL18:01
XaaSer MS SQL18:01
nowenok - well, most people that would set up a radius server between WiKID and a service do it so that the radius server can handle authorization and they can use a single domain.  You could also set up multiple domains and multiple Network clients on WiKID without NPS.18:01
nowenI guess what I'm suggesting is that it would probably be easier to set use NPS to handle the authorization and use one WiKID domain18:02
XaaSI am sure the one WiKID domain would work - I have done it and it does18:03
XaaSbut what do you do when you need multiple WiKID domains to work and you only have one NPS server to work with?18:03
nowenI don't really know - no one has had to do that, to my knowledge18:05
nowentell me again why you need multiple domains?18:07
XaaSIn a cloud environment, we have to have multiple tenancies - we have to have a token that provides 1 or more security domains, and we don't want to have to have multiple NPS servers in order to do so18:07
nowenyeah, I don't think you do need multiple NPS servers.  Are your users in AD in groups?18:07
XaaSCorporate users are in AD, howerver customers may not be.... what ideas are you thinking about?18:08
*** Chris_____ (6c30280d@gateway/web/freenode/ip.108.48.40.13) has joined #wikid18:09
nowenwell, most setups would put their users in groups, then when the request comes in from Service A, NPS would check to see if that user had the right to use that service18:10
XaaSThat is if we were using AD for group access you mean?18:11
XaaSI guess we could use AD for customers18:11
nowenif you're not using AD for customers, then does the logging, etc work?  also, if you're not using AD, what are you using?18:11
XaaSAD is only for internal corporate, on other VLANs/subnets, there can be workgroup VMs18:12
XaaSThoses workgroup VMs will not be tied to AD and will need to have access control18:13
XaaSIf WiKID had the ability to have support for multiple Network Clients at the same IP but with different secret passphrases/domains it would do the trick18:16
nowenhave you tried it?18:17
XaaSYes - I think that is the issue I have been having where things aren't authenticating properly18:17
nowenyeah, I think that the server does not know which network client to use.18:18
XaaSThat might be what I am seeing18:18
nowenso, you have multiple network clients with the same IP and different domains18:19
nowen?18:19
XaaSI don't know if I can put multiple IPs on to the NPS, and more importantly force it to use those different IPs18:19
XaaSI have multiple firewa ll and VPN devices, with multiple security domains, where I wish to use the NPS server to proxy the requests from the Firewall and VPN devices to the respective WiKID security domains.18:20
nowenI just think that is what is radius is for.18:21
XaaSI don't understand your response, NPS can act as a RADIUS Server or a RADIUS Proxy (forwarding AAA requests to an external RADIUS server)18:22
nowenok - so you can totally proxy the authentication requests to WiKID via NPS18:23
nowenbut the way the domain is determined is by the IP address of the Network client18:24
XaaSin this case, we can do it with a single WiKID domain, with different devices through NPS, but now how do we support multiple WiKID domains though that same architecture18:24
XaaSexactly re: domain is determined is by the IP address of the Network client - how do you support multiple WiKID domains in this manner?18:25
nowenwe do not18:25
nowenbecause if you are using a radius server, you typically do not need WiKID to do anything but authorization18:25
XaaSso, in order to have RADIUS Accounting, etc. we have to stand up multiple NPS servers?18:26
XaaSeach with a seperate IP address, so that WiKID won't get confused?18:26
nowenthat would work, but I think you can do the same job with 1 wikid server, NPS doing authorization and one WiKID network client18:27
XaaSWhere does the RADIUS Accounting get provided for all of the WiKID domains?18:28
XaaSWiKID doesn't provide RADIUS Accounting, correct?18:28
nowennot really18:29
XaaSSo that is a critical part of our security, the ability to audit logins18:29
nowenok18:30
XaaSNPS allows us to have Accounting, but our issue is WiKIDs inablity to support multiple security domains tied to a single IP then. Is it possible for you to look into correcting this?18:31
nowenI am still missing something18:33
XaaSOK, what?18:33
nowenwhy can you not have NPS do the authorization and WiKID do the Authentication?18:33
XaaSI think the issue isn't NPS at this point - NPS I think could do it - the issue is WiKID's inability to properly handle RADIUS network clients at the same IP address but with different secret passphrases....18:35
nowenit's not a bug - we need a method to make sure that the user is associated with the correct domain and that they are connecting from the appropriate network client.  If not, there is a possibility that the user could be validated via a side-channel attack18:37
XaaSI agree - but if the secret passphrases are different, you have your method to maintain segregation18:37
XaaSThat way everyone is happy, NPS provides authorization and accounting, WiKID provides authentication, etc.18:38
XaaSand WiKID can then provide multiple security domain support utilizing less resources (1 NPS server versus multiple)18:39
nowenI can put it in as a feature request, but it is an edge case.  All of our current NPS-based customers are using just one NPS server.18:40
XaaSBut only having one security domain, correct?18:40
nowenprobably18:41
nowenbut for multiple services18:41
XaaSOK, well I will have to adjust for this deficiency in the product...18:41
XaaSit will be an additional cost (CPU, RAM, Disk, etc.) to be able to provide the necessary auditing support for each security domain we wish to stand up.18:42
XaaSWiKID should consider this for cloud companies that need to support multi-tenant issues.18:43
XaaSas well as providing sub-admin accounts for managing users for those security domains only18:44
nowenhmm18:45
nowenwell, you can do sub-admins through the API. it was specifically created for that18:45
XaaSYou know the issue is - it has to work out of the box18:46
XaaSThe API makes a lot of companies with only network guys and not developers queasy18:46
nowenI can see that18:48
XaaSOK - well everyone here is loving the tokens on the iPhone and Android18:49
nowengreat18:49
XaaSlet me know when you want to work with us on the advanced version18:49
nowendid the update for the Android token get pushed out ok?18:49
nowenwill do18:49
XaaSI don't know  - I haven't checked it yet...18:49
Chris_____I'm having the problem with iPhone and iPad  connecting over WiFi still but it's a minor issue18:50
XaaSMy phone has over 400 apps on it - it's constantly needing updates......18:50
nowenLOL18:50
Chris_____Me too18:50
nowenChris_____: who is your DNS provider?18:50
Chris_____We are. I'm with XaaS. We spoke a while ago over the phone18:51
Chris_____Well, where I'm using it from it's Open DNS18:51
Chris_____They're doing the lookup at the two locations I use the devices at, but when I use ATT it works fine18:51
nowenthey are not failing DNS properly.18:52
nowengo to their management interface and add wikidsystems.net as a domain that doesn't get intercepted.18:52
Chris_____Will do.18:52
XaaSI find most carriers DNS suck and I love how fast OpenDNS updates it's cache18:53
Chris_____Once we get this NPS issue worked out I'll be contacting you. Love the product.18:53
nowenthanks18:53
nowensorry for the issue with radius18:53
Chris_____Well, we're on the edge. I think you know that.18:53
Chris_____Of this technology I mean18:53
nowenhaha - I hope that's what you meant :)18:54
Chris_____I mean pushing the edge.18:54
XaaSOK thanks nowen18:59
XaaStalk with you soon18:59
Chris_____Thanks Owen19:00
Chris_____Bye19:00
*** Chris_____ has parted #wikid (None)19:00
*** XaaS has quit (Quit: Page closed)19:00
*** Carl_ (82cfdac4@gateway/web/freenode/ip.130.207.218.196) has joined #wikid20:14
Carl_Anybody home?20:16
nowenyep20:16
Carl_Ever seen persistent 404's when hitting the WiKID server even though the ports are open and there do not appear to be errors in the logs?20:17
nowenis this a new setup?20:17
Carl_yes, it is.20:17
nowenwhat OS?20:17
Carl_RHEL6.120:17
nowenand you get the 404's on WiKIDAdmin?20:18
Carl_I do.  As well as / /index.jsp /index.html, etc.20:18
nowenwhat do you see in /opt/WiKID/tomcat/webapps/WiKIDAdmin?20:19
nowenapache isn't running on 443 or 80, right?20:19
Carl_It is not.  I have nothing but a ROOT directory in the WiKIDAdmin directory.20:19
Carl_Well, I guess I should have said I do not have a WiKIDAdmin dir...just a ROOT under webapps20:20
nowenwhat is in /opt/WiKID/tomcat/webapps?20:20
nowenoh20:20
nowensorry - now using my eyes to read :)20:20
nowenso, it appears that you install didn't quite take20:21
nowendid you check the md5sums?20:21
Carl_A ha.  That'd do it.  I did check the sums, yes, but I could surely have bungled something else.  My database seems intact, is there a way to reinstall just the files or should I begin anew?20:22
nowenI think an rpm -Uvh --force would reinstall20:22
Carl_Hmm.  I reloaded the file, and now I have 2 .war files in my webapps directory but am still not getting anything when I hit it with the browser.20:28
nowendid directories with the war file names get created?20:29
nowenwhat install doc are you following?20:29
Carl_I see no directories with the war file names, just the .war files themselves.  I have Quick Start Guide v3.020:31
nowenand you ran 'wikidctl setup'?20:33
nowencheck /opt/WiKID/tomcat/logs/catalina.out20:34
nowenI bet the error is in there20:34
Carl_I confess I jumped right to "start" but it DID ask me a bunch of questions (make a cert, do some stuff to the db, etc.) .  I will now blow my installation away and start over...20:36
nowenhehe20:36
nowenmight be a good idea20:36
nowenalso, just so you know, our ISO is built on centos 5.420:36
Carl_That is very good to know...!20:37
nowenIf you need RHEL for support, the rpm is not too hard, but the iso has everything.20:38
nowenCarl_: any luck?21:47
*** Carl_ has quit (Ping timeout: 265 seconds)23:09
*** nowen has quit (Quit: Leaving.)23:14

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!