freeradius ntlm
Добавлено: 2011-02-21 18:30:48
Пытаюсь настроить связку freeradius+mschap+ntlm
Самба в домене -
ntlm_auth --request-nt-key --username=userboyko
password:
NT_STATUS_OK: Success (0x0)
Вначале ставил freeradius 2
Позже поставил 1.1.7
NTLM отрабатывает если судить по дебагу
Но клиент все равно продолжает пытаться авторизироваться
Во вложение полный дебаг радиуса
Куда смотреть ? Спасибо за помощь
rlm_eap: processing type mschapv2
Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 13
rlm_mschap: Told to do MS-CHAPv2 for poberezhnyyy with NT-Password
radius_xlat: '--username=poberezhnyyy'
radius_xlat: Running registered xlat function of module mschap for string 'Challenge'
mschap2: 6e
radius_xlat: '--challenge=5630ce92ee0d11f1'
radius_xlat: Running registered xlat function of module mschap for string 'NT-Response'
radius_xlat: '--nt-response=6295a96c436a96a04938222b18ac294f2c4918c9c743bcfd'
Exec-Program output: NT_KEY: 50CF98C96F25B97CA39B2B85E4A868CC
Exec-Program-Wait: plaintext: NT_KEY: 50CF98C96F25B97CA39B2B85E4A868CC
Exec-Program: returned: 0
rlm_mschap: adding MS-CHAPv2 MPPE keys
modcall[authenticate]: module "mschap" returns ok for request 13
modcall: leaving group MS-CHAP (returns ok) for request 13
MSCHAP Success
modcall[authenticate]: module "eap" returns handled for request 13
modcall: leaving group authenticate (returns handled) for request 13
PEAP: Got tunneled Access-Challenge
modcall[authenticate]: module "eap" returns handled for request 13
modcall: leaving group authenticate (returns handled) for request 13
Sending Access-Challenge of id 94 to 10.110.0.14 port 32769
EAP-Message = 0x0109004a1900170301003fb90fbe0f1876167f9092cabed5f4653ece7929ddd1171ddf3e43d702353c62328bdda1d520d2154b74c4cfcca258b49b60ac7f52296bc0e27b15aed1165f9c
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xcf79731b0a91f189d0776ceac2f09358
Finished request 13
Going to the next request
Waking up in 11 seconds...
--- Walking the entire request list ---
Cleaning up request 7 ID 88 with timestamp 4d628073
Самба в домене -
ntlm_auth --request-nt-key --username=userboyko
password:
NT_STATUS_OK: Success (0x0)
Вначале ставил freeradius 2
Позже поставил 1.1.7
NTLM отрабатывает если судить по дебагу
Но клиент все равно продолжает пытаться авторизироваться
Во вложение полный дебаг радиуса
Куда смотреть ? Спасибо за помощь
rlm_eap: processing type mschapv2
Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 13
rlm_mschap: Told to do MS-CHAPv2 for poberezhnyyy with NT-Password
radius_xlat: '--username=poberezhnyyy'
radius_xlat: Running registered xlat function of module mschap for string 'Challenge'
mschap2: 6e
radius_xlat: '--challenge=5630ce92ee0d11f1'
radius_xlat: Running registered xlat function of module mschap for string 'NT-Response'
radius_xlat: '--nt-response=6295a96c436a96a04938222b18ac294f2c4918c9c743bcfd'
Exec-Program output: NT_KEY: 50CF98C96F25B97CA39B2B85E4A868CC
Exec-Program-Wait: plaintext: NT_KEY: 50CF98C96F25B97CA39B2B85E4A868CC
Exec-Program: returned: 0
rlm_mschap: adding MS-CHAPv2 MPPE keys
modcall[authenticate]: module "mschap" returns ok for request 13
modcall: leaving group MS-CHAP (returns ok) for request 13
MSCHAP Success
modcall[authenticate]: module "eap" returns handled for request 13
modcall: leaving group authenticate (returns handled) for request 13
PEAP: Got tunneled Access-Challenge
modcall[authenticate]: module "eap" returns handled for request 13
modcall: leaving group authenticate (returns handled) for request 13
Sending Access-Challenge of id 94 to 10.110.0.14 port 32769
EAP-Message = 0x0109004a1900170301003fb90fbe0f1876167f9092cabed5f4653ece7929ddd1171ddf3e43d702353c62328bdda1d520d2154b74c4cfcca258b49b60ac7f52296bc0e27b15aed1165f9c
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xcf79731b0a91f189d0776ceac2f09358
Finished request 13
Going to the next request
Waking up in 11 seconds...
--- Walking the entire request list ---
Cleaning up request 7 ID 88 with timestamp 4d628073