Friday, 2014-12-19

*** nowen (~nowen@2601:0:9f80:a700:5d1d:ef63:f5b3:a6e0) has joined #wikid14:01
*** intymike01 (~teladm01@47.19.119.130) has joined #wikid14:59
nowenhi intymike0114:59
intymike01hi there14:59
intymike01how are you?14:59
nowenpretty good, and you?15:00
intymike01pretty good thx.15:00
intymike01Im having an issue with a WikID setup. Im trying to get my astaro security gateway to use radius for authentication...15:01
nowenok15:01
intymike01when I add my WikiD info, the astaro device never talks to the WIKID id server , port 181215:01
intymike01welll. im not sure if it talks, but the astor times out and says it received nothing15:01
intymike01is there a way I can see in WikID my test request?15:02
nowendid you restart wikid after creating the astaro as a network client?15:02
intymike01yes15:02
nowencheck out this page: https://www.wikidsystems.com/support/wikid-support-center/troubleshooting-faq/how-can-i-set-radius-logging-to-debug-how-can-i-see-if-wikid-is-getting-the-radius-requests15:02
nowentcpdump is a good first start15:03
intymike01heading there now15:03
intymike01yeah, I'll do a tcpdump15:03
nowenalso note that the WiKIDAdmin logs are not javascripty so you have to hit the filter button to see the action15:03
intymike01I only so far verified that ports 1812,1813 were indeed listening15:03
nowenok - that's good15:03
nowenradius requires that the IP of the network client be what's expected15:04
intymike01got it15:04
intymike01good, tcpdump shows my astaro is talking to the WikID system:  gw1.ct.tdoc.com.44591 > vault1.ct.tdoc.com.radius: RADIUS, length: 20Access Request (1), id: 0xe5, Authenticator: 225a32b02f330f16657e0ee91daa40fc.15:26
intymike01I didnt see anything in the debug log.15:27
nowenis the last thing you see the OTP request?15:27
intymike01no, i dont beleive so15:28
nowenis the level set to Debug?15:29
intymike01yes.15:29
nowenSource is None?15:29
intymike01Im going to restart again, to make sure the log settings load15:29
nowenlog settings will reset on restart unless you save them not to15:29
intymike01i chose "Save currrent configuration as startup configuration"15:30
nowenyes, but I doubt that's the problem15:30
intymike01ok15:31
nowencan you see the IP address of gw1.ct.tdoc.com in the radius request?15:31
intymike01no IP address in the request (as seen in tcpdump)15:32
nowenwhat do you have on the network client's page? the ip or the dns?15:33
intymike01the ip address of "192.168.70.99"15:33
intymike01which is the IP address of my widiD system, not the astaro, which is 192.168.70.115:34
nowenahh - you want the astaro there15:34
intymike01ah, doh!15:34
nowen;-)15:34
intymike01yeah, got it.15:34
nowenmake the change and restart15:34
nowenradius cachese15:34
intymike01doing it now15:34
intymike01ok, i went through the config and veirifed everything again. logging, I see: Access-Request(1) LEN=20 192.168.70.1:34147 PACKET DROPPED - Packet type of Access-Request(1) is unknown to the Acct port from unknown NAS [192.168.70.1]15:51
nowenhmm15:51
nowenwhat port do you have configured on the Astaro?  1812?15:51
nowenthat makes it sound like it's trying to send on the accounting port which is 181315:52
intymike01basically the Astaro has a "test" area in which you put the secret passcode into, then press "test". I have it set to use port 181215:52
nowendoes it say anything in the WiKIDAdmin logs?15:53
intymike01dbmigrations.log-- log4j:ERROR Could not connect to remote log4j server at [localhost], wauth.log-- log4j:WARN No appenders could be found for logger (com.wikidsystems.biz.licence.parser.LicenceParserImpl). log4j:WARN Please initialize the log4j system properly.Server Ready to Accept Secure Client Requests.15:58
intymike01nothing glaring15:58
nowenthat can be ignored15:58
nowendo you see "Issued passcode to device ..."?15:59
intymike01in the tcpdump, I did see this, when someone else tried to login to the vpn (outside of my test) Access Request (1), id: 0xe5, Authenticator: 38fa6f4e72d48c8a27928e09efcacb3716:00
intymike01  Username Attribute (1), length: 10, Value: ghochron  Password Attribute (2), length: 18, Value:   NAS ID Attribute (32), length: 5, Value: ssl16:00
nowenAre you getting an OTP from the token before you try to login?16:01
intymike01ugh, i cant get my wikidtoken client to connect at the moment16:03
nowenare you inside the FW?16:04
intymike01sorry, I had the wrong server ID.16:05
nowennp16:05
nowen;-)16:05
intymike01I go "registration successful" from the WikiD client. and I see the OTP16:05
nowenok - and is the token also registered on the server?16:05
intymike01yes, I see the registration.  in the user management page16:07
intymike01so, obviously the issue lies within the astaro.16:08
nowenok - you click on reg # and enter in the username16:08
intymike01"UserID testuser Registered. "16:09
nowenok - is that for the token you are using?16:11
intymike01yes16:11
nowenok - what loggers do you have set for debug?16:11
intymike01com.wikidsystems, com.wikidsystems.radius.log.DBSvrLogImpl16:12
nowenhmm, when I have the log level set to debug I see Issued passcode to device -8823594947368976249 in the logs.16:16
nowenhow did you install? ISO? or a package?16:16
intymike01package16:16
nowenrpm?16:16
intymike01yes, rpm.   I also have a setup from ISO i can play with16:17
nowendate is correct on the server?16:17
intymike01in the log i see: Issued registration code 3qxU5xh0 / 5uiTCzqI to deviceID 809676288881725923216:18
intymike01I just had an issue in viewing the log entries in the web page16:18
nowenok - now get an OTP from the token and hit the filter button again16:18
intymike01ok16:18
intymike01Issued passcode to device 809676288881725923216:20
nowenYay!16:20
nowenok - now try the astaro again16:20
intymike01will do16:20
intymike01"Error: receive failed" is seen in the astaro16:21
intymike01im guessing, the way I registered my desktop, I need to so something similar on the astaro so it acts a client?16:22
nowenwell, the Astaro should be a "network client' on the WiKID server using the radius protocol and specifying the domain that the user is registered to16:23
nowenwhen you create a network client it tells radius to accept packets from that IP on 1812 and it opens up the firewall for that address16:24
intymike01got it16:25
intymike01basically I followed this document: http://www.howtoforge.com/add-wikid-two-factor-authentication-to-astaro-security-gateway16:26
intymike01I have a version 8, but its all applicable16:26
nowenwhat doc did you follow for the WiKID setup?16:27
intymike01https://www.wikidsystems.com/support/wikid-support-center/manual/how-to-install-the-wikid-strong-authentication-server16:28
nowenok16:28
nowenso you get "Error: receive failed"  on the astaro, but you don't see anything in the WiKIDAdmin logs?16:29
intymike01correct16:30
nowencan you re-try and use the -vvv flag on tcpdump16:31
intymike0111:32:43.992039 IP (tos 0x0, ttl 64, id 35488, offset 0, flags [DF], proto UDP (17), length 48) ct-edge1.25042 > vault1.ct.td.com.radius: [bad udp cksum dde5!] RADIUS, length: 2016:34
intymike01Access Request (1), id: 0xe5, Authenticator: 5a7c9413d3c322d71a3d7869247bf70b16:34
intymike0111:32:55.938247 IP (tos 0x0, ttl 64, id 47434, offset 0, flags [DF], proto UDP (17), length 48) ct-edge1.31221 > vault1.ct.td.com.radius: [bad udp cksum f740!] RADIUS, length: 20Access Request (1), id: 0xe5, Authenticator: dab696638ae85b5b33638c55926176a316:34
intymike01WIKID:11:32:55.939685 IP (tos 0x0, ttl 64, id 47434, offset 0, flags [DF], proto UDP (17), length 48)    gw1.ct.td.com.31221 > vault1.ct.td.com.radius: [udp sum ok] RADIUS, length: 20 Access Request (1), id: 0xe5, Authenticator: dab696638ae85b5b33638c55926176a316:34
nowenso it looks like WiKID is not responding, right? Otherwise, we would see some < traffic16:35
intymike01yeah16:36
nowenwhat do you have on the Astaro? Are you using the IP Address of WiKID?  or DNS?16:36
intymike01the IP address of WIKID is defined as an object16:38
intymike01you do see that tcpdump captures something over 1812....i just dont see anything going bak from the wikid16:39
nowennot sure the implications of that are, but I'm guessing that WiKID is rejecting the packets because it is not coming from the expected network client16:39
nowenusually you would see the IP address in tcpdump16:40
intymike01oh16:40
intymike01tcpdump: listening on em1, link-type EN10MB (Ethernet), capture size 65535 bytes16:41
intymike0111:41:07.998969 IP (tos 0x0, ttl 64, id 15206, offset 0, flags [DF], proto UDP (17), length 48)16:41
intymike01    192.168.70.1.44004 > 192.168.70.103.radius: [udp sum ok] RADIUS, length: 20Access Request (1), id: 0xe5, Authenticator: 6dcce44d89bf605f7ea45d85dcef84e416:41
intymike01(tcpdump -n )16:41
nowenhmm. ok - and  192.168.70.1 is listed as the Network Client?16:42
intymike01yes, it is listed as the network client16:42
nowenodd16:42
intymike01indeed16:42
nowenrun 'iptables -L -n'16:42
nowendoes it show  192.168.70.1?16:42
intymike01yes,16:43
intymike01it is acceping 1812,1813,8388, and others16:44
intymike01for  192.168.70.116:44
nowenhmm16:45
nowenand you created a localhost cert?16:45
intymike01yes16:45
nowenwhat the heck16:47
intymike01yeah, sorry16:48
nowenis it the only network client?16:48
nowenno problem - I like a good puzzle ;-).  sorry for you16:48
intymike01it is the only network client16:49
intymike01but what is interesting, I see another IP address in iptables "192.168.70.44"16:49
nowenhuh16:49
intymike01I am assuming it is from some mac OSX laptop on my network16:49
nowenok16:50
intymike01im confused why it shows up in iptables, but I assume if any system tries to use radius for auth, it finds my WiKID server16:50
nowenit should only be network clients16:51
intymike01interesting16:51
intymike01OMG . I restarted, and I see "server test passed"16:55
nowenlol16:55
intymike01now i'll just test my OTP  with my user16:56
intymike01so now im in a good state. I go on further with my testing.16:58
intymike01I appreciate you working with me.16:59
nowengreat!16:59
intymike01I'll let you know how it goes.16:59
nowenplease do16:59
nowenbtw, how did you find us?16:59
intymike01have a happy holiday if I dont talk to you by then16:59
nowenyou too16:59
intymike01oh, well16:59
intymike01I typed in "Astaro 2 factor vpn" in google17:00
nowenahh17:00
intymike01I also heard of you before, but never installed it.17:00
nowenok - thanks17:00
intymike01once I get this working, I'll get all of my users on here (200+)17:00
nowenglad people are hearing about us. we're not great at marketing17:00
nowensweet!17:00
intymike01no problem. Im quite excited that your product exists.17:00
intymike01bye for now17:01
nowenI am too ;-)17:01
nowenlater17:01
*** intymike01 has quit (Quit: Leaving)17:01
*** linuxgeek_ (~linuxgeek@2a03:b0c0:2:d0::5f:2001) has joined #wikid19:08
*** linuxgeek has quit (Ping timeout: 244 seconds)19:08
*** linuxgeek_ is now known as Guest5285219:08
*** intymike01 (~teladm01@47.19.119.130) has joined #wikid19:55
intymike01hi there nowen.19:55
intymike01Im back. I cam able to use two factor on my SSL vpn and pptp vpn now.19:56
intymike01I just have one issue where I can only register my device when im connected to the office network.19:56
intymike01How can I make it so devices can register over cellular, or interent19:57
intymike01?19:57
nowenhmm19:57
nowendid you use an external IP for the domain identifier?19:57
intymike01no19:57
intymike01it was a little confusing in the setup docs.19:57
intymike01I recall it saying "do not expose radius over the internet"19:58
intymike01then I was thinking how can users devices get to me then?19:58
nowenthe tokens communicate with the server in order exchange keys and get OTPs etc. If you use an external IP - it can be NAT'd or proxied - external tokens would work19:58
intymike01ok, I'll set up the domain to use the external IP address19:59
intymike01which means creating a new domian with the server code representing the external IP?20:00
nowenwe have some jsp pages that can allow users to reg themselves after logging in with their AD creds, but they are meant to be used on the internal network20:00
nowenyes20:00
intymike01ok, I created the new domain. do I forward a port to the wikid server from the firewall?20:03
nowenyes - port 80 for the tokens.20:03
intymike01ok20:03
nowenWiKIDAdmin uses 443, so don't open that one20:03
intymike01cool20:04
nowensee this page: https://www.wikidsystems.com/support/wikid-support-center/installation-how-tos/how-to-let-users-add-themselves-using-ad-credentials?searchterm=ADreg20:04
nowenon use reg20:04
nowenyou may have read about example.jsp in the manual too. that has all the api functions20:05
intymike01oh, nice20:05
nowenalso: https://www.wikidsystems.com/support/wikid-support-center/faq/how-can-i-configure-wikid-to-start-automatically?searchterm=start+autom20:09
*** nowen has quit (Quit: Leaving.)22:35
*** intymike01 has quit (Quit: Leaving)23:10

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!