Tuesday, 2013-01-08

*** d1ZZy_ (c3fea40c@gateway/web/freenode/ip.195.254.164.12) has joined #wikid10:34
d1ZZy_hi10:34
d1ZZy_anyone about?10:35
d1ZZy_im getting the following error during the wikidctl setup10:43
d1ZZy_opt/WiKID/sbin/make_tomcat_ssl_cert.sh: line 17: /usr/java//bin/keytool: No such file or directory10:43
d1ZZy_opt/WiKID/sbin/make_tomcat_ssl_cert.sh: line 18: /usr/java//bin/keytool: No such file or directory10:43
d1ZZy_so the setup wont complete10:43
d1ZZy_ive installed the WIKID community edition image10:45
d1ZZy_taken from here;10:45
d1ZZy_http://sourceforge.net/projects/wikid-twofactor/files/VMware%20Image/3.3.10/10:45
*** d1ZZy_ has quit (Ping timeout: 245 seconds)11:27
*** d1ZZy_ (c3fea40c@gateway/web/freenode/ip.195.254.164.12) has joined #wikid11:49
d1ZZy_anyone about yet?11:49
joevanod1ZZy_: nowen usally shows up any time between now and the next hour and a half13:10
joevanoI would think it is a java issue, but I don't really know13:10
joevanod1ZZy_: here is something... http://www.wikidsystems.com/support/wikid-support-center/installation-how-tos/how-to-install-the-wikid-enterprise-rpms13:12
joevanoit deals with the enterprise edition but seems to address the same issue13:12
*** nowen (~nowen@50-194-249-125-static.hfc.comcastbusiness.net) has joined #wikid13:49
d1ZZy_hi thanks for that13:51
d1ZZy_is RADIUS not supported in the community edition?13:51
nowend1ZZy_: no, we use a 3rd party piece of software for that13:52
d1ZZy_when i try to enable the radius protocol its ssay unsupported in this version13:53
nowend1ZZy_: also, that vmware image is probably quite old13:53
d1ZZy_yeah i stopped using that13:53
d1ZZy_ive installed the community edition directly onto a centos 6 box13:53
d1ZZy_thanks nick just got your email13:58
nowen;-)13:58
nowenso, are you testing both?13:58
d1ZZy_my end goal is to setup 2FA to allow remote users access13:58
d1ZZy_nick so how can i use RADIUS with the community edition?14:03
nowenyou can write a plugin for freeradius using the api14:04
d1ZZy_lol - im not that good :p14:04
nowenyeah. me neither14:06
d1ZZy_well i guess this going to put a stopper on me using wikid14:07
nowenyou have no budget?14:07
d1ZZy_well i had some budget, which has now been placed on hold. Was hoping i might be able to use this....14:09
nowenand what type of vpn do you use?14:09
d1ZZy_one of the leading firewall vendors :p14:10
nowendo they support tacacs?14:10
d1ZZy_brb hold on14:10
d1ZZy_yes it supports tacacs14:12
nowenthat might work14:12
nowenour tacacs implementation is a bit kludgy14:12
nowenbut it works14:12
d1ZZy_tacacs+14:13
d1ZZy_is that the same as tacacs14:13
nowenwe use tacacs+14:13
d1ZZy_what do you mean by kludgy?14:13
nowenthe only open source package we could find requires a text file with current valid passcodes.14:13
d1ZZy_so not as secure14:14
nowenwe rewrite the file periodically, but it makes it less one-time than our other protocols14:14
d1ZZy_ahhh so potentially exploited easier14:14
nowenyes, but the risk is minimal IMO.  If someone can get the OTP and use it in less than say a minute, then they can likely get access an easier way14:15
d1ZZy_lol14:19
d1ZZy_true14:19
d1ZZy_when adding a network client and choosing tacacs+ / where does the shared secret come from?14:23
d1ZZy_or do i just create on there and then for each client?14:23
nowenyou have to configure the domain to be a tacacs+ domain first14:27
d1ZZy_so as long as my firewall points to the internal server, the WIKID server should need to be public?14:29
d1ZZy_or does it need the second interface for the token client?14:29
nowenthe tokens need to talk to the WiKID server. so it needs an external IP, but it can be NAT'd14:30
d1ZZy_great14:32
d1ZZy_do you have to configure the client to point to the public server?14:32
nowenyes14:32
d1ZZy_thanks14:32
nowenthe token client14:32
d1ZZy_what protocol does it need to come in on?14:40
d1ZZy_443?14:40
d1ZZy_for NAT14:40
d1ZZy_also, would you advise putting the WIKID server into a DMZ?14:44
nowenthe token client uses http on port 8014:44
d1ZZy_ive been trying to install wikid community all day16:41
d1ZZy_it goes through the setup and starts16:42
nowenany errors?16:42
d1ZZy_then when i try going to it in the browser it just doesn't load16:42
nowencheck in /opt/WiKID/tomcat/logs/catalina.out16:42
d1ZZy_im rebuilding the server and starting from scratch16:42
d1ZZy_so if i have same problem ill check there16:42
d1ZZy_i was trying to install it on a cloned vm16:43
d1ZZy_also, is it acceptable to have one interface16:43
d1ZZy_?16:43
d1ZZy_eth016:43
nowenyes16:43
d1ZZy_thanks16:43
d1ZZy_trying to install now17:14
d1ZZy_on a clean build server fully updated....17:14
d1ZZy_and17:16
d1ZZy_it wont connect to the server17:16
nowenwhat version of the rpm?17:17
d1ZZy_wikid-server-community-3.5.0.b1333-1.noarch.rpm17:17
d1ZZy_wikid-utilities-3.4.2-1.x86_64.rpm17:17
nowenis the port open?17:17
d1ZZy_how can i check?17:18
nowen'iptables -L -n'17:18
nowenlook for 44317:18
nowenalso run 'netstat -anp | grep 44317:18
nowenon the server17:18
d1ZZy_tcp        0      0 :::443                      :::*                        LISTEN      3007/jsvc.exec17:19
nowenso the listener is up17:20
nowenit might be the self-signed cert17:20
d1ZZy_i used the FQDN for the name17:20
nowenwhat browser>17:20
d1ZZy_ie and firefox17:20
d1ZZy_http://FQDN/WiKIDAdmin/17:21
nowentry https17:21
d1ZZy_nope same17:21
d1ZZy_even with ip instead of fqdn17:22
nowendoes iptables list 443?17:22
d1ZZy_ive just nmap'd localhost and it ssays its open17:23
d1ZZy_ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0 ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0 ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:22 REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with icmp-host-prohibited17:23
nowentry 'service iptables stop' and see if it works17:24
d1ZZy_LOL17:25
d1ZZy_it worked17:25
nowen;-)17:25
*** Mustio (1fdd0284@gateway/web/freenode/ip.31.221.2.132) has joined #wikid17:28
MustioHi17:29
nowenhi17:29
d1ZZy_c u tomorrow17:30
d1ZZy_thanks for your help nick!!17:30
nowenok d1ZZy_17:30
nowennp17:30
MustioI was wondering if you can help me. We are looking for Two Factor Authentication Solution17:30
*** d1ZZy_ has quit (Quit: Page closed)17:30
nowenMustio: ok17:30
MustioAnd I have been reading about Wikid17:30
MustioBut I am struggling to know where the two factor authentication is coming into this..17:31
nowenMustio: the two factors are knowledge of the PIN and possession of the private key embedded in the token17:31
nowenyou can think of WiKID compared to certs.  But this cert is only used to encrypt a PIN and send it to your server17:32
Mustiook17:32
nowenbut there are no white/black lists to deal with and you get a password which can be used on all interfaces17:32
nowenis this for PCI compliance?17:32
Mustioyes17:33
Mustioexactely17:33
nowenmost of our customers are using WiKID for pci compliance ;-)17:33
MustioOk17:33
MustioPlease help me understand this. I want an overview picture. Say I have VPN client running my PC/Laptop. Where do I connect to first and what do I need..17:36
MustioJump host?17:36
nowenyou first start the WIKID token.  You enter your PIN and you get back an one-time passcode17:36
nowenyou start your VPN client and enter your username and OTP17:37
nowenthe VPN server passes the credentials to the WiKID server for validation.17:37
nowenif they are valid, the VPN server grants access17:37
MustioOk17:38
nowenyou could also run the authentications through AD using the MS radius plugin NPS17:39
Mustiook17:40
MustioWhen you say you start the WIKIN token? Is this another client? There is no fob involved right?17:42
nowencorrect.  we have only software tokens.  for window, mac, linux, iphone/pad, android etc17:43
Mustiosorry WIKID17:43
MustioSo is this correct process flow:17:44
Mustio1: Start Wikid client to obtain OTP17:44
Mustio2: Use the password in the VPN17:45
MustioSo is this correct process flow:17:45
MustioSo is this correct process flow:17:46
nowenyes17:48
Mustio3: VPN server passes the credentials to the WiKID server for validation.17:48
MustioWhich means I need to client running on my Laptop to get remote access 1: VPN client 2: Wikid client17:50
nowenyes, or the WiKID token on a smart phone17:51
MustioOh Smart phone.. that sounds good. -:) So I will start the Wikid application on my phone get the OTP and use it in my VPN client..17:53
nowenyes17:53
nowenthat's an option17:53
MustioOk17:55
MustioWhat is the other option?18:02
nowenthe PC token18:02
joevanoMustio: our users love it over hardware tokens (our previous 2fa)18:05
Mustiook18:08
MustioThe PC token is a client running on your PC/Laptop right?18:09
nowenwhat vendor are you using?18:09
nowenyes18:09
MustioVendor for which hardware?18:10
Mustiofirewall?18:10
nowenfor the hardware tokens?18:11
MustioWe are not using any hardware tokens at the moment. This is will be our first 2fa18:12
nowenoh - oops, I didn't notice that it was joevano speaking ;)18:12
MustioOk thanks18:13
MustioGuys18:13
MustioI will do some reading :-)18:14
Mustionow18:14
nowenok18:14
nowenI recommend you download and test the server too18:14
MustioOk will do.18:14
MustioWe can run it only linux right. i,e, ubuntu18:15
Mustioserver18:15
nowenyes, but we recommend centos18:15
nowenor rhel18:15
nowenour ISO has all the software you need toi18:15
nowenit is based on centos18:15
Mustiook18:16
MustioThanks18:16
*** nowen has quit (Quit: Leaving.)23:24

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!