Monday, 2015-04-27

*** ricardoamaro (~ricardoam@drupal.org/user/74228/view) has joined #wikid08:25
*** joevano has quit (Read error: Connection reset by peer)09:57
*** joevano (~joevano@bzflag/developer/JoeVano) has joined #wikid09:58
*** Mohammed (c3e2f521@gateway/web/freenode/ip.195.226.245.33) has joined #wikid09:59
MohammedHello Guys !09:59
*** Mohammed is now known as Guest5909609:59
Guest59096i am unable to understand how WIKID is working as 2FA10:00
Guest59096could anyone help me understand it10:01
laszlofwhats your question12:22
Guest59096how does WIKID works ?12:23
laszlofBasically you setup the server, and link it up to an application, whether it be a router/firewall,12:24
laszlofor a web application like intranet, wordpress, etc12:24
Guest59096Let us assume Cisco ASA Firewall12:25
laszlofonce thats done, you download the token client to your device, and generate a OTP to use in conjunction with your existing login credentials12:25
laszlofright, those do radius I believe.12:25
Guest59096where is OTP generated ?12:25
laszlofon the wikid server itself, and is sent (securely) to the mobile token client.12:26
Guest59096what is mobile Token Client here ?12:26
laszlofthere are also offline tokens, but I havent done much with those12:26
Guest59096i have not seen such thing in the doc.12:26
laszlofhttps://wikidsystems.com/downloads/token-clients12:26
Guest59096in short the the server setup is such complex i am unable to understand12:27
Guest59096and got completely confused12:28
laszlofits a bit to take in, but once you get into it, its really not too bad12:28
laszlofmy first deployment had a bit of a learning curve12:29
Guest59096yes i believe but i am badly stuck12:29
laszlofwell, where are you at?12:29
laszlofI might be able to help, but its been a while since I've done a deployment12:29
laszlofI mostly just do dev stuff now.12:29
Guest59096i successfully completed till RADIUS initialzation12:29
laszlofok, so you're trying to get it to talk radius to your firewall12:29
Guest59096No no12:30
Guest59096i am following the doc from WIKID and i am still doing server configuration and stuck there12:30
laszlofhttps://www.wikidsystems.com/support/wikid-support-center/how-to/how-to-add-two-factor-authentication-to-a-cisco-asa-550012:30
Guest59096because i cannot blindly follow and do the configuration12:30
laszlofhave you seen that?12:30
laszlofok, so you're on the setup stage12:31
Guest59096i saw that but  i am saying the sever config is not yet complete12:31
laszlofi see.12:31
Guest59096https://www.wikidsystems.com/support/wikid-support-center/manual/how-to-install-the-wikid-strong-authentication-server/referencemanual-all-pages12:31
laszlofgotcha. have you logged into the web admin yet?12:31
Guest59096i am stuck at "Creating a WIKID Authentication Domain"12:32
Guest59096yes i did12:32
laszlofok. The domain is basically what the token clients will use to connect to the wikid server.12:33
*** nowen (~nowen@2602:306:3ae5:cbf0:6e62:6dff:feb0:8f07) has joined #wikid12:33
laszlofthe domain identifier should be the IP address of the wikid server, without dots, and padded by zeros12:33
laszlofso 127.0.0.1 would become 12700000000112:34
nowenyes12:34
nowenthough only a token on the localhost would be able to get to it ;-)12:35
laszlof:)12:35
laszlofthe domain name is basically a textual description of the domain.. it can really be anything.. device domain name is meant to be like a hostname12:35
laszlofbut again, I dont think it matters12:35
laszlofGuest59096: nowen is probably the best person to ask specific questions, as hes the head honcho over there. ;)12:36
Guest59096then Network Clients ?12:37
laszlofnetwork clients are what are used to connect wikid to your device12:37
laszlofby device, i mean your firewall12:37
Guest59096Oh great Hello nowen12:37
laszlofname can be anything.. like "Cisco ASA Firewall" or whatever12:38
laszlofIP address is obviously the IP address of the firewall12:38
nowenhi12:38
laszlofprotocol would probably be radius, and then you assign domains that can access it.12:38
Guest59096IP should be the exact iP12:38
laszlofcorrect12:38
nowenyes - especially with radius12:38
laszloffor reference WAUTH is used for custom integrations where you may be using the API to build your own login system.12:39
Guest59096getting it12:39
Guest59096then what12:39
laszlofdid you create your certificates?12:39
laszlof(Configuration Menu)12:39
Guest59096yes did long back12:39
laszlofk. thats about it for the basics, excluding the specific Cisco ASA stuff you need to do.12:40
laszlofdownload/install a token client and give it a shot12:40
Guest59096may be did a mistake there by given FQDN as "localhsot"12:40
Guest59096i just did already12:40
Guest59096thanks to you for that12:40
nowenYou need to restart the wikid service after adding the network client12:40
nowenwhat's going wrong?12:41
laszlofhe was just a bit lost on the setup12:41
nowenok12:41
Guest59096i mean to say when i generated Intermedia Certificate i gave fqdna as "localhsot"12:41
laszlofyou probably want to use the servers actual hostname for that12:41
laszlofim pretty sure it wont break anything using localhost though12:42
nowenif everything starts fine, it might not be an issue12:42
nowenfor testing12:42
Guest59096yes everything started well12:42
Guest59096so once after i created a network client you are telling most of the job is done12:43
laszlofwell, i havent done a setup on an ASA before12:43
nowenyes12:43
laszlofbut theres probably some stuff you have to do there.12:43
nowenthe ASA is not hard12:43
nowenwill you be using NPS?12:43
Guest59096yes12:44
laszlofbut you should be able to test the clients at this point and make sure you can get a token12:44
Guest59096i want this for ASA & Windows12:44
laszloferm, get a OTP12:44
Guest59096so for testing client i need to enter server code i created while adding domain in my Token Client12:44
Guest59096right ?>12:44
laszlofyes12:44
Guest59096thats all ?12:45
laszlofit will give you a code.12:45
laszlofyou need to go into the user menu, and you should see that code12:45
laszlofat which point you can assign it to a specific username12:45
laszlof(Click manually validate a user, in the user menu)12:45
*** Mohammed (c3e2f521@gateway/web/freenode/ip.195.226.245.33) has joined #wikid12:46
MohammedI am back12:47
*** Mohammed is now known as Guest9208512:47
nowenwelcome back ;-)12:47
laszlofdid you see my last message?12:47
Guest92085no lost it12:47
laszlof12:45 < laszlof> it will give you a code.12:47
laszlof12:45 < laszlof> you need to go into the user menu, and you should see that code12:47
laszlof12:45 < laszlof> at which point you can assign it to a specific username12:47
laszlof12:45 < laszlof> (Click manually validate a user, in the user menu)12:47
Guest92085Ok i just logged in to the GUI and creating a domain12:48
laszlofYup. then just link up a network client.12:49
Guest92085OK domain craeted12:49
Guest92085the Client IP is the IP of my Firewall righ t?12:50
laszlofcorrect.12:50
laszlofit needs to be accessible by the wikid server (radius)12:50
Guest92085what is now Shared-Secret key and all that stuff12:51
Guest92085yes yes its accessible12:51
Guest92085Assign Return Attribute:12:51
laszlofyou need that from your ASA12:51
laszlofits the key used to connect to radius on it12:51
laszlofas for the others, those are specific to the ASA, i didnt need any additional stuff in there12:52
Guest92085is that important and if yes how can i get that12:52
laszlofthe ASA guide I linked earlier should show that, if any.12:52
laszlofhttps://www.wikidsystems.com/support/wikid-support-center/how-to/how-to-add-two-factor-authentication-to-a-cisco-asa-550012:52
laszlofdoesnt look like you need any additional values12:53
laszlofjust the shared secret12:53
Guest92085Ok i will use a basic one12:53
Guest92085done12:54
Guest92085how can i test now the token client12:54
laszlofwhich client are you using?12:55
nowendoesn't the ASA have a radius test option?12:55
Guest92085IOS12:55
Guest92085i dont know about that12:55
laszlofya, just run it, set a passphrase, and add a domain12:55
laszlof(in the ios client)12:56
Guest92085i tried its saying Unable to add domain to token12:56
nowendid you use a routable IP address?12:57
Guest92085what do you mean ?12:57
laszlofthe IP address/domain needs to be publicly available.12:57
laszlofport 443, to be exact.12:57
laszlofand 80?12:57
nowen80 ;-)12:57
laszlofah right12:58
nowen443 for the WiKIDAdmin, 80 for the tokens12:58
laszlofah, thats right12:58
Guest92085you mean WIKID should be publicily available ?12:58
laszlofport 80 on the wikid server is used for token clients to connect and get their OTP12:58
nowenthe token communicate with the server12:58
Guest92085i did add a NAT rule for WIKID Server13:03
Guest92085how the Token Client know to communicate my server only13:03
nowenthat should work,  did you use the external IP for the domain identifier?13:03
laszlofthe domain code does a couple things, it checks for DNS at wikidsystems.net, if that fails, it converts the domain code to a dotted IP address and connects that way13:04
laszlofand ya, like nowen said, your domain code will (usually) have to be the external IP of the NAT box.13:05
Guest92085i am confused here again13:12
Guest92085are you saying my domain identifier should be my PUblic IP13:13
laszlofwithout the dots, padded by zeros, yes13:13
Guest92085example : if its 10.10.10.10 so 101010101013:13
laszlofno13:13
laszlof10010010010013:13
laszloferm13:14
laszlof01001001001013:14
laszlofdomain identifiers are always 12 digits13:14
Guest92085like 172.16.14.19 : 17201601401913:14
laszlofcorrect13:14
Guest92085what about domain name and device domain name ?13:15
Guest92085i cannot update my Domain Identifier13:15
nowendomain is internal to the server, device names shows up on the token13:16
nowenyou can just create a new domain13:16
Guest92085so what should i use for domain and device domain name ?13:20
laszlofwhatever you want, really. The Domain name is just a reference in the admin13:22
laszlofthe device domain name shows up on the token clients.13:22
laszlofso you might want to use your company name for that.13:23
laszlofor something like "Widgets Inc Secure Access"13:23
laszlofor whatever13:23
nowendomain name is only on he WiKID server so "stupid users vpn" , device shows on the token so, "Executive VPN"  ;-)13:23
laszlofhaha13:23
laszlofthe names of these items are probably a little misleading13:24
laszlofbut you have to take "Domain" out of the context of a URL13:24
laszlofthink more of a domain like a PDC on windows13:24
Guest92085Oh i got is working13:24
nowennice13:24
Guest92085my token client is generating codes13:24
Guest92085wohooo !!13:24
laszlofthe token client should give you a reg code. did you add the user?13:25
nowenit needs to be registered to a user on the WIKID server for auth to work13:25
Guest92085so that registration code i have to apply to the network client you mean to verify13:25
laszlofthe "Users" menu, manually validate a user.13:26
laszlofyou should see that reg code listed.13:26
Guest92085yes i can se13:26
laszlofclick it, and assign it to a username. this username should probably be the same as what the user uses to auth with the firewall.13:26
Guest92085that can be any username ?13:27
laszlofI dont think theres any limitation on it.13:27
nowenno limits13:29
nowenyou may want it to match your AD username for later reasons13:29
Guest92085i think only one username can be mapped with one reg id13:30
Guest92085you mean this user should also be in AD ?13:30
laszlofyou can have multiple tokens for the same user.13:31
laszlofbut each token can only have 1 user13:31
Guest92085yes i off-course13:34
Guest92085so now all i have to do is follow the ASA link you have me13:34
nowenssl vpn or ipsec?13:34
Guest92085IPSEC13:35
laszlofpretty much. the token client should work for generating codes at this point.13:35
Guest92085yes its generating13:35
Guest92085yes it it13:35
nowenhttps://www.wikidsystems.com/support/wikid-support-center/how-to/how-to-add-two-factor-authentication-to-a-cisco-asa-5500-ipsec-vpn13:35
Guest92085OMG so its a hell or job13:38
Guest92085so this means at the end of the day if there is no internet the whole process will not work13:38
laszlofif theres no internet, they probably wont be able to access the firewall anyways. but yes. there are offline tokens, though I've never used them13:40
laszlofchrist, freenode is having issues today13:40
Guest92085what are those ?13:42
Guest92085and how i can register them ?13:42
nowenmany of the tokens will default to the offline challenge-response mode if there's no internet connection13:42
nowenthis comes sometimes during testing as sys admins wonder about it, but I can tell you it never comes up in production.  people need internet for vpn and if they have internet they have cell or wifi13:43
Guest92085yes may be13:55
Guest92085does this works with Yubikey13:55
Guest92085Its a USB Token13:55
laszlofno14:01
*** Guest59096 has quit (Ping timeout: 246 seconds)14:02
Guest92085i see14:04
*** ricardoamaro has quit (Read error: Connection reset by peer)14:54
*** ricardoamaro (~ricardoam@drupal.org/user/74228/view) has joined #wikid14:54
nowenGuest92085: I was just tweeting with someone about adding yubikey support14:55
laszlofthat would be interesting15:05
laszlofso, the yubi key would basically bypass the passphrase/pin needed for the token?15:05
laszlofor just the former15:06
Guest92085Ok i understand15:35
nowennot sure, I really haven't looked at it15:37
*** Guest92085 has quit (Ping timeout: 246 seconds)16:00
nowengot to run out for lunch = bbiab16:13
*** nowen has quit (Quit: Leaving.)16:13
*** nowen (~nowen@2602:306:3ae5:cbf0:6e62:6dff:feb0:8f07) has joined #wikid17:13
*** Mohammed (bc47fc50@gateway/web/freenode/ip.188.71.252.80) has joined #wikid19:59
MohammedHello there19:59
*** Mohammed is now known as Guest1000119:59
nowenhi20:00
Guest10001@nowen this is mohammed we had a discussion some hours back you remember20:00
nowenyes, I recall20:00
Guest10001@laszlof was responding me alot20:01
nowenyes20:01
Guest10001that point of time ended with successfully generating tokens and i was going to do the ASA part if you remeber20:02
nowenright20:02
Guest10001i have done some part and stuck again20:02
Guest10001i mean unable to understand20:02
nowenok20:02
Guest10001https://www.wikidsystems.com/support/wikid-support-center/how-to/how-to-add-two-factor-authentication-to-a-cisco-asa-5500-ipsec-vpn20:02
Guest10001i have done RADIUS Server and Server group part20:03
Guest10001i had already one ipsec profile and changed the user authentication to use the created RADIUS20:04
Guest10001because i already added a network client i skipped that part20:04
nowenok20:05
nowenand what happens when you test it?20:05
Guest10001hence my sooftphone is generating the pins right20:05
nowenok20:05
Guest10001but when test it fails20:06
nowenwhat's the error?20:06
Guest10001"That's it for the ASA.  It is ready for two-factor authentication.  At this point, you should configure NPS for two-factor authentication.  We recommend you first test the ASA/NPS connection using AD passwords and then add the WiKID server as a radius server on NPS.  Once that is complete, the users will login with their AD user name and the OTP.  NPS will perform authorization based on the user name alone. No sense in requiring a20:06
Guest10001what is part in the doc. ?20:06
nowenif you want to incorporate AD as the directory, then you would use NPS - the MS radius server20:06
Guest10001no i dont have any AD20:07
Guest10001So i am using the username from users tab and using the password from my softphone token20:07
nowenok20:08
nowenWhat time to do some debugging: https://www.wikidsystems.com/support/wikid-support-center/troubleshooting-faq/how-can-i-set-radius-logging-to-debug-how-can-i-see-if-wikid-is-getting-the-radius-requests20:08
nowenon the WiKIDAdmin logs page, set the log level to debug and hit filter20:09
nowenwhat's the last log entry?20:09
Guest10001when i test it "Authentication test to host xxx.xxx.xxx.xxx failed : Following error occured Error : Authenticated rejected : AAA failure"20:09
Guest10001Ok wait lemme check that log20:10
Guest10001you want that me to paste here20:10
nowenjust the last line20:11
Guest100012015-04-27 23:08:54.558INFOcom.wikidsystems.radius.log.DBSvrLogImpl<3> Access-Request(1) LEN=65 192.168.0.1:64923 Access-Request by sismail Failed: AccessRejectException: Access Denied20:11
nowenok - on the user page make sure sismail is enabled20:11
Guest10001yes its enabled20:12
nowenhmm, and you're entering sismail and the one-time passcode you get back on the token?20:13
Guest10001yes exactly20:13
nowenhmm20:15
nowendouble-check the shared secrets20:15
Guest10001where >20:16
nowenon WiKIDAdmin > Network Clients > Edit and on the Cisco ASA20:16
Guest10001you mean the one i use in network client and ASA20:17
Guest10001same20:18
nowenhmm20:18
nowenok - go into Logs/Configure Loggers and set com.wikidsystems.radius.access.WikidAccess4 and  com.wikidsystems and com.wikidsystems.wauth to debug20:19
nowenthen try to login again20:19
nowenand look at the logs for more info20:20
Guest10001it worked20:22
Guest10001i had to restart the service20:22
Guest10001i did that because i remember you saying restart it after creating a network client before20:23
nowennice!20:23
Guest10001i did that but if you remember i made mistake in first domain creation and then created new domain20:23
Guest10001since then i did not restarted20:23
nowenahh20:24
Guest10001so now i though of doing that and tested it work20:24
Guest10001Wohooo !!120:24
nowenyes, radius caches info, so it needs a restart20:24
Guest10001how can i test with VPN Client ?20:25
nowenyou should be to login with a vpn client if the radius test passes20:27
Guest10001i have to use sismail as username20:29
nowenyes20:29
nowenor add another user20:30
Guest10001so where is two factor here ?20:30
nowenknowledge of the PIN and possession of the private key embedded in the software token20:30
nowenthe tokens use encryption - like PGP20:31
nowenyou can think of WiKID as like certs, but they only do PINs and OTPs.  Using those means you don't need to use the 'infrastructure' of PKI20:31
Guest10001see i can connect using VPN but no access and it disconnects after 15 secs20:35
nowenhmm20:35
laszlofyou could arguably build out a system with AUTH to first authenticate against the local creds, then do the wikid auth, for a more traditional 2FA setup20:35
laszloferm, WAUTH20:35
nowenanything in the cisco logs?20:35
nowenlaszlof: no need to make the user enter something they know twice, it's just more of the same factor20:36
nowenand a worse user experience20:36
laszlof*shrug* thats basically how Duo and GA do it anyways20:36
Guest10001lols20:37
Guest10001now i cannot even connect20:37
nowenlaszlof: that's because they don't have both factors included in their OTP20:38
nowenGuest10001: now maybe the user is disabled - check that again20:38
Guest10001though the RADIUS test is Ok20:38
laszloftoo many failed login attempts will disable the user20:39
Guest10001no enabled only20:39
Guest10001Ok i found that VPN Client Services were stop due to unkwon reasons20:43
Guest10001when i restarted them i can see i can ping inside resources20:43
Guest10001Woohooooooo !!20:43
nowengreat20:48
Guest10001so guys Cisco VPN is working great now21:07
Guest10001could you share with me for Windows Login21:07
nowen Do you mean for ctrl-alt-del?21:08
Guest10001configuring 2fa for widows server 2008 login21:09
nowenthat's a lot tougher21:09
nowenMS doesn't make that easy21:09
Guest10001OMG !21:09
Guest10001do we have any doc. for that21:09
nowenour pci customers that need this use remote access solutions21:10
Guest10001what do you mean by remote access solutions ?21:11
nowenAre these servers in pci scope?21:11
nowenSomething like RDP21:11
Guest10001there are 3 servers in PCI Sco[e21:12
Guest10001and we want RDP to be 2fa21:12
nowenok - RDP gateway supports radius21:12
Guest10001based on PCI as you already know21:12
nowenDo you have RDP Gateway?21:13
Guest10001heard about it but newer ued21:14
Guest10001used21:14
nowenhmm21:15
Guest10001see we want our users to login through 2fa (inside or outside of office using VPN)21:16
nowenI bet the ciscos will do rdp...21:16
Guest10001and i think rdp gateway eliminates the VPN concept itself21:16
Guest10001you mean rdp gateway21:16
nowenwell, I was thinking about the cisco ssl-vpn in the ASA21:17
Guest10001oh not that21:17
Guest10001don't we have solution for widows rdp login ?21:18
nowenonly if you go through RDP-gateway, then you can user radius21:18
Guest10001you mean WiKID RADIUS21:18
nowenwell, RADIUS is just the protocol.  both rdp gateway and WiKID support it.  but just rdp doesn't21:19
Guest10001what if we create a windows RADIUS and create a separate domain in WiKID and users login from there21:20
nowenthe GINA doesn't support radius21:20
nowenGINA is the ctrl-alt-del mechanism21:20
Guest10001so what is the suitable solution now ?21:22
Guest10001RDP Gateway ?21:22
nowenwell, that's my guess.  We have a lot of PCI customers, so i know they are doing something, but I'm not sure they require 2FA for local access21:23
nowenyou can replace the gina with something that does: http://pgina.org/21:23
Guest10001it will be tough for me it seems21:24
Guest10001brb21:25
nowenok21:25
Guest10001yes21:44
Guest10001so if we donot have the options21:45
Guest10001how about having rdp gateway then ?21:45
Guest10001can we do that ?21:45
nowenyes, I don't have a doc on that, but I know it works22:01
Guest10001is it simple ?22:13
nowenwell, it is Microsoft...22:14
nowenWe can do a Teamviewer session if you want some help - I haven't done it but I know what to look for22:14
Guest10001great22:15
Guest10001check my message on the website chat22:15
nowenhmm - I don't see it...22:16
Guest10001i wrote to Nick actually ;)22:16
nowen;)22:17
Guest10001gotem ?22:17
nowenbut I really have no message - I have 'Visitor has left the conversation"22:17
Guest10001OH22:18
Guest10001its offline it seems22:20
nowenok - got it now.22:20
nowenvia email22:20
nowenNot sure why they have me as offline22:20
Guest10001lol22:20
nowentomorrow work ok?22:21
Guest10001yes very Ok22:21
Guest10001what are the prerequisites ?22:21
nowenI prefer Teamviewer22:24
*** Guest10001 has quit (Ping timeout: 246 seconds)22:47
*** nowen has quit (Quit: Leaving.)22:57

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!