Friday, 2012-08-24

*** nowen (~nowen@adsl-98-66-183-205.asm.bellsouth.net) has joined #wikid12:41
*** nowen has parted #wikid (None)12:59
*** nowen (~nowen@adsl-98-66-183-205.asm.bellsouth.net) has joined #wikid13:00
*** Tom_____ (5b559d01@gateway/web/freenode/ip.91.85.157.1) has joined #wikid13:19
Tom_____Hi13:19
nowenhi13:19
Tom_____Wonder if someone can help... Quick question hopefully13:19
nowenok13:19
Tom_____We use wikid on our system, but I have an issue with users connecting to the domain.. In short I think this is caused by when they log into their laptops, there is obviously no connection, and cannot auth with the domain.. It uses cached passwords. Then, when they start wikid, it asks to lock pc and re enter credentials. Is it possible to run wikid as a service so that when users log into windows, it can auth to domain? Or can I even c13:21
Tom_____Windows VPN natively?13:22
Tom_____What do you think/suggest13:22
Tom_____When you log out, wikid closes connection, so you can never actually log against the domain server.13:22
nowenwhat version of WiKID are you using?13:23
Tom_____Wikid server enterprise 3.4.87-b103913:23
nowenwhat company are you with?13:25
Tom_____Exaxt mortgage experts13:26
nowenahh13:26
nowenStuart still there?13:26
Tom_____Exact mortgage experts13:26
Tom_____He is yeah. - my boss.13:27
nowenahh13:27
Tom_____I have been here since march. Having some issues with laptops, which I think is due to expiring13:28
nowenok, so I'm not sure about your problem13:28
Tom_____I currently have a laptop on the next desk with the issue.. I think if I was to connect using copper, it would fix the issue.13:28
nowenWiKID only provides the otp to login to the VPN13:28
nowenwhat do you mean by "copper"?  you mean wired vs wireless?13:29
nowenalso how do you have the auth set up?  does it go through AD via NPS?13:29
Tom_____Yeah sort of.. I was referring to plugging into the work LAN..13:30
Tom_____I am not families with NPS?13:30
nowenit is the MS radius plugin13:31
nowenit allows you to do Authorization via AD and then proxies the authentication to a separate server, eg, WiKID13:31
nowenrunning as a service doesn't really do it for WiKID.  All we do is get the OTP13:33
nowenso, your users login to their laptop, login to their VPN and then have to login to the domain?13:36
Tom_____I am not sure. What I experience is this- once connected via VPN, windows will prompt for password. Even though the password is set on AD the same as local one. The account gets locked out  without Tthe user typing in any passwords. I think this would be fixable if I plugged into the LAN and bypass VPN... I think the issue lies with not being able to log into the network fron the login screen?13:36
Tom_____The first login prompt they have would be the login for the domain, but in this scenario, the domain isn't available as the VPN is not running.13:37
Tom_____The first login allows them in as the password is cached.13:38
Tom_____The cached password is the same as the domain password, but I still think they are not synced together.13:38
Tom_____If I was to plug into the domain and login, I think this would fix the issue for a short while.13:39
nowenNot sure I can help. It is odd that you'll are the only ones that have come to me with this.13:42
nowenI wonder if running the auth through NPS would fix this13:42
Tom_____Is there a way I can check this?13:44
nowenI don't know.  You can set up NPS13:44
Tom_____I guess most VPN users could be logging in with local accounts? And then perhapse remoting to a ts server.13:45
Tom_____Do you have any further info on NPs for me to read?13:46
nowenI just the feeling that you'll have some extra complexity there you don't need.  Like the requirement to login to the domain.  seems like most companies, once you login to the VPN, you get access13:46
nowenhttp://www.wikidsystems.com/support/wikid-support-center/how-to/how-to-add-two-factor-authentication-to-nps13:46
Tom_____The error message we see In dc when users try to authenticate is "pre-authentication failed"13:47
nowenyeah, you might search the MS knowledge base for that13:47
Tom_____Possibly, but this would have been the preferred method to manage user accounts... Users log into their local laptops as domain users.  Threre services would work as  when they bring their laptops in the office13:49
Tom_____I guess ,my next step is to see if I can fix the issue by r13:50
Tom_____Loggin into domain on LAN. Them try again over VPN,  if this works then I know it has to be relating to the lack of connectivity13:50
Tom_____I might not see all your responses cause my iPad keeps sleeping.13:54
nowen:-13:54
nowen}13:54
nowenwell, it seems like something is not optimal in your VPN set up13:55
nowenbut I don't know what13:55
Tom_____Ok13:55
Tom_____Not really important, but who's13:57
Tom_____Whilst Im here., is wikid VPN supported on iPad??13:57
nowenWiKID is not a vpn, it is a two-factor authentication token.  the token is available on the app store14:02
nowenwhat VPN are you using?14:02
Tom_____Ok. I understand a bit better. It's open VPN14:02
nowenI see14:03
Tom_____Guys, thanks for the help!14:03
nowennp!14:03
*** Tom_____ has quit (Quit: Page closed)14:03
*** __TOM (~wtfnom@66.150.156.1) has joined #wikid17:13
__TOMNick17:13
__TOMim back17:13
nowenwelcome!17:13
__TOMand i got the cert stuff squared.17:13
nowenwhat was it?17:13
__TOMnot sure.  just did what you suggested17:13
__TOMinstalled centos with a simple name17:14
__TOMno dashes.17:14
__TOManyhow,  im up to testing out connecting a wireless client to the system via pub ip17:14
nowenok17:14
__TOMeach time i try to register a domain17:15
__TOMi get error code 417:15
__TOMback17:15
__TOMi've opened tcp 8017:15
nowendoes it work on a PC token?17:15
__TOMMmmmmmmm17:15
__TOMno clue.17:15
__TOMlet me try i guess.17:15
__TOMit was a bb token that was working on the old system17:15
__TOMi just wanted to reg a second domain.17:15
nowenhttp://www.wikidsystems.com/support/wikid-support-center/troubleshooting-faq/how-do-i-run-the-token-in-debug-mode17:16
nowenthat can help too17:16
__TOMhmm17:17
__TOMthats assuming i have a nix client17:17
__TOM?17:17
nowenyou can run it in windows from the dos prompt too, I believe17:17
__TOMpc client okay17:18
__TOMillt ry.17:18
nowenwhat is the domain id?17:18
nowenI can try it too17:18
__TOM06615615011017:23
nowenhere's the url it is trying to reach: http://66.156.150.110/wikid/servlet/com.wikidsystems.server.InitDevice4AES?a=0&S=066156150110&CT=117:25
nowenlooks like it is timing out17:25
__TOMport 80 tcp is open17:25
__TOMare there any other ports i need to open?  im confuzzled.17:26
nowennope17:26
__TOMi can try using the private ip since im on a bes network.17:26
__TOMk17:26
__TOMis there any logging i can enable on the server end to troubleshoot?  I enabled debugging17:27
nowenanything in the WiKIDAdmin logs?17:27
__TOMbut i dont see anything fruitful17:27
nowenyou have the log filter set to debug?17:27
__TOMyes17:27
__TOMand i dont see any output17:27
__TOMand yes, i click on the filter button after modding the level17:27
nowendouble check your firewall, I don't think the requests are getting thru17:28
__TOMi just confirmed and tested from a 3rd party that port 80 tcp is open17:29
nowenhttp://66.156.150.110/ doesn't work for me either17:29
__TOMokay17:30
__TOMill check again...maybe i fatfingered something...17:30
__TOMoops17:32
__TOMi gave you the wrong ip?17:32
nowen;)17:32
__TOM06615015611017:32
__TOMthats the right string17:33
__TOMi have all loggers on the server set to debug17:33
__TOMand still no results17:33
__TOMweird...17:33
__TOMwait, i see something now.17:33
nowenok - now you should see something17:33
nowenReading response iteratively ...17:33
nowenReturning data ... (1 bytes)17:33
nowenRead 1 bytes from the server17:33
nowenInvalid Server Response17:33
__TOMCould not find configuration for domain 066150156110 on this server.17:34
nowencan you get out from the server?17:34
__TOMget out?17:34
__TOMlike where am i getting out to?17:34
nowentry this from the command line:  wget http://www.wikidsystems.com17:34
__TOM[root@WIKID ~]# wget http://www.wikidsystems.com17:34
__TOM--2012-08-24 10:34:42--  http://www.wikidsystems.com/17:34
__TOMResolving www.wikidsystems.com... 174.129.6.10017:34
__TOMConnecting to www.wikidsystems.com|174.129.6.100|:80... connected.17:34
__TOMHTTP request sent, awaiting response... 200 OK17:34
__TOMyeah, i can pull it17:35
nowenhmm17:35
__TOM2012-08-24 10:33:25.210 ERROR com.wikidsystems.server.DeviceTransactionExec Could not find configuration for domain 066150156110 on this server.17:35
__TOMis that a problem?17:35
nowendid you create a domain?17:35
__TOMyes17:35
nowendoes it have the correct IP?17:35
__TOMoh wtf....17:35
nowenhehe17:35
__TOMhow did it warp to 10717:35
__TOMokay...yes! captain obvious.17:36
nowenyour fingers must have had a long week! ;)17:36
__TOMmore like multitasking hell... but thanks ;-)17:36
__TOMand regarding registered URL under domain creation17:36
__TOMthe wikid server would simply pull the ssl cert from whatever url is in there17:37
__TOMand validate its valid17:37
__TOMthats pretty much it?17:37
nowenyes, it pulls the cert from the url17:37
nowenare you planning to do mutual https auth?17:37
__TOMmutual?17:39
__TOMill read up on that one.17:39
nowenthen just leave that box blank for now17:39
__TOMok17:41
__TOMheh17:53
__TOMtheres a slight bug17:53
__TOMi found17:53
nowen?17:53
__TOMi had a domain configured with the wrong server code.17:53
__TOMand i had a client configured for that domain.17:53
__TOMwhat i did was create a new domain, with the same domain name, and device domain name.17:53
__TOMwhether or not that was a prudent decision17:53
__TOMthe gui allowed me to do so17:54
__TOManyhow17:54
__TOMafter that, i removed the client, and both domains.17:54
nowenthe domain name and device name can be the same17:54
__TOMcan be?17:54
__TOMor cant be.17:54
nowencan be17:54
__TOMyes.17:54
__TOManyhow17:54
__TOMnow i recreated the domain, and the client17:54
__TOMin the logs im testing out connecting to a ssl vpn portal17:54
__TOMand the logs on the server state: Access denied for [username], domain code: 066150156107 client: /10.10.0.13617:55
__TOMproblem is that the domain code is incorrect17:55
__TOMits the invalid domain code from the deleted domain.17:55
__TOMmaybe a cleanup/inconsistency issue in the db?17:56
__TOMthe domain code thats in the current domain is 066150156110.17:56
__TOMim going to create everything from scratch17:57
__TOMwith new names17:57
nowencould be that yo u need to edit the network client17:57
nowenI don't think that is needed17:57
__TOMokay17:57
__TOMso what abut the net client?17:57
nowenedit the network client and run 'wikidctl stop'17:57
nowenthen run 'netstat -anp | grep java' to make sure it is all dead17:58
nowenand then start17:58
__TOMyeah baby :)18:03
__TOMit works now.18:03
__TOMim elated.18:03
nowensweet!18:03
__TOMbtw18:03
__TOMrestarting didnt help18:03
__TOMstill same prob18:03
__TOMi eventually just nuked it18:03
__TOMand started with some new domain name and client name18:03
nowenhuh, ok18:04
__TOMbut i got what i needed18:04
__TOMthanks for your help. :)18:04
nowenno problem18:04
nowenwhat's next?18:04
__TOMim likely going to try that mitm validation url18:05
__TOMsee what breaks.18:05
nowenyou want to put the url for your ssl vpn in there18:05
__TOMyes.  just the fqdn.18:05
nowenwtih the https://18:05
__TOMim going to input an invalid url and see if that breaks it all.18:05
__TOMyep18:06
__TOMthanks18:06
nowenany https will work.  a http will not18:06
__TOMhmm18:06
__TOMthe device domain name is what shows up in the client dropdown list18:07
__TOMcorrect?18:07
nowenin the device yes18:07
__TOMah18:07
nowenthe idea is that you can have multiple domains but the users don't know18:07
__TOMis there a way to do multiple URL checks?18:07
__TOMyes.18:08
__TOMi know taht was the idea.18:08
nowenno18:08
__TOMunfortunately my users are clowns.18:08
__TOMso...18:08
__TOMarg this is going to be interesting.18:08
__TOMand what i mean by clowns is that they get confused at the slightest need to do much of anything technical18:09
__TOMso...18:09
__TOMwow, you have a great way of splitting up the domains18:09
__TOMunfortunately thats super complex18:09
__TOMhmm18:09
nowenwhy do you need to split domains?18:09
__TOMwell18:10
__TOMi dont want to18:10
__TOMi have 3 ssl vpn portals18:10
__TOMthat i would like to validate against18:10
__TOMfor mitm.18:10
nowenahh18:10
nowenhow many users per vpn?18:11
__TOMnot sure at this point, but if all goes well, probably roughly 250 per18:11
nowenso, all the users get instructions to use "SSL VPN OTP"18:12
__TOMokay?18:12
nowenbut you have three domains with three names and one device domain name18:12
__TOMah...well.18:13
__TOMthe catch is18:13
__TOMa single user may have a usecase of using all 3 vpn connections18:13
nowenwell, then that is complex18:13
__TOM:-)18:13
__TOMoh18:13
__TOMone other thing18:13
__TOMi remember a long long time agpo18:13
nowencan your vpn handle that instead18:13
__TOMi came in here18:13
__TOMand saw someone complaining about their wikid portal not working18:14
__TOMand in the end18:14
__TOMit turned out to be an expired certificate.18:14
__TOMso... is there an easy way to track those?18:14
__TOMso i know when they need to be recreated?18:14
nowenwhat is your domain again?18:14
__TOMdomain name is CANYON18:14
__TOMright now18:14
__TOMsubject to change*18:14
nowenwe're working on a better system for tracking18:15
nowenshould be up before yours expires18:15
nowenyou got a new one 8/2318:15
__TOMokay, well is the renewal process a pita?18:16
__TOMor is it quick?18:16
__TOMjust for my own edification18:16
nowenvery quick18:16
__TOMk18:16
__TOMbtw, when i punched in my url18:16
__TOMhttps://vpn1.canyonpartnershq.com18:16
__TOMinto the domain18:16
__TOMi dont see any new logs....18:16
__TOMhmm maybe i need to cycle again18:17
nowenhmm, you might need to restart your token.  you might actually have to re-register18:18
nowenthis is  PC tokens only too18:18
__TOMhuh?18:19
__TOMwhat do you mean?18:19
nowenthe smart phone tokens do not do the mutual https authentication, only the PC tokens18:19
__TOMhmmm18:20
__TOMwell18:20
__TOMmaybe im confused how that works.18:20
__TOMi was under the impression if i put in https url into domain18:20
__TOMthat the wikid server will validate the https link before issuing token18:20
nowenhttp://www.wikidsystems.com/learn-more/technology/mutual_authentication18:20
nowenno, the token validates that cert is the same as in the server before presenting the OTP18:21
__TOMi see.18:21
__TOMbtw, is that your voice?18:21
nowenprobably18:21
__TOMlol18:21
__TOMprobably*18:21
__TOMthats an awesome answer.18:21
nowenI specialize in awesome answers!18:22
__TOMthats freaking awesome explanation18:23
__TOMmight encourage me to use the wikid pc client.18:23
nowenthe benefit of using both is that users are unlikely to lose/forget the passphrase for two18:24
nowenso, your risk decision18:27
__TOMwell...18:27
__TOMyuck18:27
__TOMif i use the pc client18:27
__TOMthen i really have to get them to remember a pin18:28
__TOMwhich will have the same problems as their passwords.18:28
__TOMwhereas if i have them use a secondary device18:28
__TOMsuch as their smartphone18:28
nowenthey have to have a PIN with their smartphone token too18:28
__TOMaka blueberry or iFail, then its atleast something else they have.18:28
__TOMi know you and i have had this debate over 2factor effectiveness.18:29
__TOMim using the token purely as a "something they have" play18:29
nowenthe something else is the private key embedded in the token.  the question is how easy it might be to steal that and get the PIN and passphrase18:29
__TOMi dont care about the pin so much18:29
__TOMnot so much that i dont care.18:29
__TOMbut it does not work well in my application18:30
__TOMwhere my users would etch the pin onto the smartphone exterior if they could.18:30
__TOM"WIKID PIN = 1234"18:30
__TOMor whatever if was18:30
__TOMso.  while they can remote into ssl vpn from practically any desktop in the world18:30
__TOMthey would need that particular device.18:30
__TOMto log in. hence, 2 factor.18:31
nowenyep18:31
__TOMi've asked you whether you'd consider writing in a option file to disable pin requirement before18:31
__TOMand i think you said i was smoking18:31
nowenyes18:31
__TOMbut you dont see the possible reason/use case that im presenting as viable?18:32
__TOMim not saying enable it by default,18:32
__TOMbut how about making it some hidden var18:32
__TOMso when some tool like myself enters irc chat18:32
__TOMyou can tell them yeah, do this, but not advised unless youre doing this particular use case.18:33
nowenopens too many holes. there's no way to do securely18:33
__TOMhow are there too many holes in my usecase?18:33
nowenwell, for one, it;s not two-factor auth18:33
__TOMsure it is18:33
__TOMif i use the mobile client18:33
__TOMmobile token18:33
__TOMon a mobile device.18:33
__TOMits something they have.18:34
nowenand?18:34
__TOMk...and something they know, is their domain credentials, e.g. password18:34
nowenbut how does that work on the back end?18:34
__TOMwell18:34
__TOMfor my vpn  im using cisco as a vendor18:35
__TOMbasically cisco does two auth checks18:35
__TOMvalidates user creds via AD LDAP18:35
__TOMand second validates the code via radius18:35
__TOM(from the wikid server)18:35
__TOMif either fail, access denied.18:35
__TOMsame thing for vmware view18:35
__TOMbtw.18:35
__TOMtwo very mainstream use cases18:36
__TOMthink about it, if you want me to whiteboard it, or discuss with you, im more than willing to give you a call to chat about it18:36
__TOMbut i dont think i'm necessarily way off in left field.18:36
nowenbut you can do all that with the otp and username and then not user your lan password outside of the lan18:37
__TOMyes! except...our users are used to RSA18:37
__TOMso...to tell them forget your windows password18:37
__TOMand just use this pin that wikid spits back18:37
__TOMis mindblowing18:37
__TOMlike epic brain implosion18:37
__TOMdoes not compute18:37
__TOMyou get what im saying.18:37
__TOMand of course the C-level execs who dont get the technology18:38
__TOMnor want to get it...18:38
__TOMwill nix the wikid platform18:38
__TOMsaying its not secure.18:38
__TOMhow could it possibly be.18:38
__TOMeven with a good presentation.18:38
__TOMyou know... political problems18:39
nowenso you currently enter in the rsa otp, the PIN and the AD password?18:39
__TOMand i doubt this would be the only org with the same challenges.18:39
__TOMyes.18:39
__TOMgoto .... https://vpn1.canyonpartnershq.com18:39
__TOMand from the drop down, select "CP" domain18:39
__TOMyou will see 3 fields18:39
__TOMusername18:39
__TOMpassword18:39
__TOMpin18:39
nowenshow the execs this http://www.wikidsystems.com/learn-more/features/lessexpensive18:39
nowenand multiply by 318:39
__TOMits not a cost issue18:40
__TOMtrust me...i dont have a cost issue here....18:40
nowenbased on other customers that have moved from RSA to WiKID it shouldn't be that bad18:40
__TOMokay then.18:40
__TOMhonestly Nick18:40
__TOMyoure stopping your entry point into the hedgefund world.18:41
__TOMim telling you right now18:41
nowenessentially to do what you are asking, we re-write all of our tokens18:41
__TOMnot just my company who is interested in wikid18:41
__TOMthey are looking at me for a recommendation into how to deploy into their worlds18:41
__TOMthey dont like eating it with RSA and having to swap out keys whenever they have a breach.18:41
__TOMno way18:41
__TOMwell18:41
__TOMwell, i'm simply giving you a general accepted use case right now18:42
__TOMand how i *must* implement a 2 factor solution18:42
__TOMi totally get the logic behind what youre telling me18:42
__TOMbut it doesnt float well upstream.18:42
nowenI'm lost - is it not the same or easier than what you're doing now?18:43
__TOMfor a technical individual like myself18:43
__TOMyes.18:43
__TOMmuch easier!18:43
__TOMhowever....18:43
__TOMwhats technical easier does not mean is better or gets adopted.18:43
__TOMneccesarily.18:44
__TOMeven wiht a lower pricepoint.18:44
nowenif it is ease of use, then go with the PC token.  The OTP is copied into the clipboard. they go to the vpn, paste and og18:44
nowengo18:44
__TOMthats not the point.18:44
__TOMand i would never do that.18:44
__TOMthats single factor.18:44
nowenbut it's not18:45
__TOMwell.  i've given you my two cents, and honestly i think you have a product that can potentially crush the market, but you'll need to make it a bit more flexible to avoid company execs from cringing.18:46
nowenok - I understand18:46
__TOMnow as far as rewritting tokens.18:46
__TOMyeah, if its a chore. i understand and concede18:46
__TOMbut i dont know whats involved18:46
__TOMso pardon my ignorance.18:46
__TOMim merely telling you from my implementation experience background, whats the norm, and whats required.18:47
__TOMoff to lunch!18:47
nowenwell, apple, blackberry, android, windows mobile18:47
__TOMhope you think about it a bit more...18:47
__TOMyeah,  i know its fragmented.18:47
nowentesting for all18:47
__TOMyeah :-\18:47
nowenand updates to the server18:47
nowenand while this Cisco can do that, not all VPNs can18:48
__TOMsonicwall, palo alto, and juniper can too19:12
__TOMi havent tested them all out yet.19:12
__TOMand in financial space 90% are rolling cisco/juniper.19:13
nowenI'll open a long range ticket for it19:25
__TOMbombs away. :)19:27
nowenso your login as two boxes19:36
nowenwhat are they entering?19:37
__TOM?20:10
__TOM3 login fields20:10
__TOM1) username20:10
__TOM2) password20:10
__TOM3) pin20:10
__TOMA C3P0Registry mbean is already registered. This probably means that an application using c3p0 was undeployed, but not all PooledDataSources were closed prior to undeployment. This may lead to resource leaks over time. Please take care to close all PooledDataSources.20:10
__TOMbtw,  what the heck is a mbean?20:10
nowenhttps://vpn1.canyonpartnershq.com I see, group, username and password20:11
nowenignorable20:11
__TOMswap the group to "CP"20:11
__TOMthats the only one enabled for wikid atm20:11
nowenahh20:11
nowenI would drop the password20:11
__TOMwell the catch is,  this is a test portal20:13
__TOMits not always up20:13
__TOMthe users have a seperate client20:13
__TOMsimilar to this, but installed on their workstation.20:14
__TOMsort of irrelevant for this convo20:14
__TOMbut yes, i hear your comment about dropping password.20:14
__TOMand again, that wont compute here.20:14
nowenoh, so they have an ssl-vpn client?20:14
__TOMthey do...20:14
__TOMcisco is going all out.20:14
nowenI thought the point of ssl-vpns was to not have a client20:15
__TOMyes and no.20:16
__TOMthe background encryption methodology is diff as well20:16
__TOMand lastly, different port usage.20:17
__TOMso friendly with retarded hotels20:17
*** nowen has quit (Quit: Leaving.)21:28
*** __TOM has quit ()22:17

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!