Monday, 2012-10-29

*** vladdy has quit (Read error: Operation timed out)06:52
*** vladdy (~vladdy@194.242.5.47) has joined #wikid06:56
*** nowen (~nowen@50-194-249-126-static.hfc.comcastbusiness.net) has joined #wikid12:16
joevanomorning nowen12:25
nowenmorning joevano12:25
joevanodid you guys have any issues with Sandy?12:26
nowenno, just some wind down here12:26
joevanohave to thank the Bulldogs for knocking down Florida, allowed us to move up to #312:28
nowenwe do what we can ;)12:28
*** jpreston (d8e79e1a@gateway/web/freenode/ip.216.231.158.26) has joined #wikid19:55
*** jpreston has quit (Client Quit)19:57
*** Roger_ (d8e79f10@gateway/web/freenode/ip.216.231.159.16) has joined #wikid20:57
Roger_How are you guys doing?20:57
nowengood, how about you?20:58
Roger_Great..........having issues with my current WIKID setup at work using TACACS thought :-/20:58
Roger_though*20:58
nowenit's a bit tricky,  there are not a lot of opensource tacacs tools20:58
nowenso, we had limited options20:59
nowenis it not starting?20:59
Roger_Well, so im a network guy and our desktop guy has setup up the box for TACACS and he set me up as a user and i downloaded the WIKID software to generate a code,,,,,,,,,,,,,and from our Cisoc ASA, I test authentication and get this in my debug..................21:00
Roger_test aaa-server authentication TACACS host 10.1.100.130 username roger password **********21:01
Roger_ERROR: Authentication Rejected: Unspecified21:01
nowenon the WiKID server, run 'netstat -anp | grep 49'21:01
Roger_and the desktop guy says my user is setup in WIKID and that im generating the passcode21:01
Roger_to see if port 49 is listening im guessing?21:02
nowenyes21:02
Roger_one sec....and thanks21:02
Roger_ok so the very first line, i see the following21:05
Roger_tcp        0      0 0.0.0.0:49                  0.0.0.0:*                   LISTEN      1496/tac_plus21:06
nowenwell, that's good21:06
Roger_yep21:06
nowenrun 'tcpdump port 49' on the WiKID server and then try to auth again.21:07
nowenoh, and run 'iptables -L -n' and see if port 49 is open for that IP21:08
Roger_awesome ....doign that now21:08
Roger_ACCEPT     tcp  --  10.1.0.2             0.0.0.0/0           state NEW tcp dpt:4921:12
nowenok - and that's your cisco?21:12
Roger_10.1.0.2 is the firewall im testing authentication from21:12
Roger_yep exactly21:12
Roger_i can do the tcpdump real quick21:12
nowenand via the WiKIDAdmin UI, can you check the logs?21:13
*** jpreston (d8e79e1a@gateway/web/freenode/ip.216.231.158.26) has joined #wikid21:13
Roger_Actually Jpreston is here now ....he is in charge of the WIKID server21:14
nowenok21:14
nowenjpreston: via the WiKIDAdmin UI, can you check the logs?21:14
nowenset the log level to debug and hit the filter button21:14
jprestonsure21:15
jprestonthe last log is from 20-22201221:15
jprestonsorry 10-22-201221:15
nowenhmm21:15
nowenon the terminal, can you run21:16
nowen'date'21:16
jprestonit's 10-29-2012 15:09 MDT21:16
nowenok21:16
nowenon the logs page, you'll see a link to Configure Loggers, go to that page and set the three middle loggers to debug, and apply changes21:17
jprestongot it. and i applied the changes21:18
nowenok - run that tcpdump command  'tcpdump port 49' and try to auth again21:19
nowenalso, make sure that the user is enabled21:19
jprestonrunning tcpdump now21:20
Roger_we have the tcpdump output but not sure if we can get it into this chat21:25
nowenthat's fine21:25
Roger_i see a syn, syn ack, and ack ...so the 3 way handshake looks good21:25
nowenyeah, so that is working21:25
nowenwhat is in the WiKIDAdmin logs?21:26
Roger_which is verified with my Cisco ASA reject message coming from the WIKID server21:26
jprestonstill nothing in the WiKID logs from today21:26
nowendo you see the OTP request?21:27
nowenis the user enabled?21:28
jprestonno...still showing 10-22 as the last logged21:28
jprestonyes the account is enabled21:29
nowenyou have 'log level' set to Debug?21:29
jprestonyes21:29
nowenyou should see the OTP request21:30
jprestonstill nothing, but i checked the runing processes on the server and i do not see a syslog service running. so that is probably why we are not getting logging on the WiKID server21:31
Roger_and Just FYI from this same Cisco ASA i can successfully authenticate to our Active Directory server using RADIUS everytime21:31
nowenno, the WiKID logs are internal21:31
jprestonhmm.....21:32
nowenwell, if you want to use radius, then that's quite easy.  tacacs is a pita21:32
Roger_lol unfortunaely...its not free :-/21:35
nowenand if you're using AD, you should use NPS to route the requests through AD. Unless you need tacacs for something specific21:35
nowenno21:35
jprestonwell one of the requirments is not to use AD at all.21:36
Roger_I thought it cost money with WIKID21:36
nowenradius requires the Enterprise version, so yes $$21:36
Roger_Yep, exactly.21:38
nowenprobably the logs are being written to the file system somewhere. you can check in /opt/WiKID/logs21:42
jprestoni'm looking at the centralLogger.log there are a lot of log4j:ERROR problem appending event, org.portgresql.util.PSQLExecption: ERROR: duplicate key value violates unique constraint "logging_event_pkey"21:47
jprestonnot much of anything else in that one21:47
nowenno, it would be something with tacacs in the name21:48
jprestonin /opt/WiKID/logs there are no logs with tacacs in the name21:49
nowenrun 'updatedb; locate tacacs*'21:57
jprestonbrb21:57
nowentime for me to go home22:16
nowenI'll be back tomorrow22:16
*** nowen has parted #wikid (None)22:16
*** jpreston has quit (Quit: Page closed)22:27

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!