• How to configure Windows 10 -> ipsec -> freeradius/ldap -> samba4

    3
    0 Votes
    3 Posts
    4k Views
    F
    Thanks for pointing me in the right direction Jim.  I've gotten it working.  This makes is possible to have a windows PC authenticate over the VPN through pfSense to a Samba4 / AD controller before login using the native windows VPN client. The process is as follows. You should already have Samba4 and FreeRadius installed on the same machine.  Samba4 should already be joined to a domain and / or configured as an AD controller. Validate Samba4 and give radius access After joining the domain, test the connection using wbinfo. wbinfo -a <username>% <password>A successful response should show something like the following: plaintext password authentication failed     Could not authenticate user <username>% <password>with plaintext password     challenge/response password authentication succeeded The critical part is the "challenge/response password authentication succeeded". The plaintext password authentication error is expected as no plain-text passwords are stored in Active Directory. Now attempt an NTLM authentication: ntlm_auth –request-nt-key --domain= <netbios domain="" name="">--username= <username>You are prompted for a password, and on successful authentication, you should see this output: NT_STATUS_OK: Success (0x0) The radiusd user needs access to the winbindd_privileged directory. This directory is typically found at /var/lib/samba/winbindd_privileged/. Check to see if any group besides root has access to the directory. ls -lh /var/lib/samba/ If root is the group as well as the owner, create a new group. If a group already exists, make note of the group name and skip the next two steps. groupadd wbpriv Grant access for the group to the winbindd_privileged directory. chown :wbpriv /var/lib/samba/winbindd_privileged Add the radiusd user to the group that has read access on the winbindd_privileged directory.  usermod -a -G wbpriv radiusd Configuring FreeRadius Edit the freeradius modules/mschap file. It can typically be found at /etc/freeradius/modules/mschap or /etc/raddb/modules/mschap depending on your distribution. Make sure the following lines are uncommented. require_encryption = yes require_strong = yes ntlm_auth = "/path/to/ntlm_auth …" with_ntdomain_hack = yes Modify the ntlm_auth line to point to the location of the ntlm_auth program you used earlier to test NTLM authentication. ntlm_auth is often found at /usr/bin/ntlm_auth. Add "–domain=%{%{mschap:NT-Domain}:-MYDOMAIN}" to the ntlm_auth line (replace MYDOMAIN with the correct domain) so that if finally looks something like: ntlm_auth = "/usr/bin/ntlm_auth –request-nt-key --username=%{mschap:User-Name:-None} --domain=%{%{mschap:NT-Domain}:-TESTDOMAIN} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}" Save the file. In the freeradius sites-available/default and sites-available/inner-tunnel, ensure mschap is enabled in the authentication section. Disable the files module in each of these files if you do not use any of the information in the users file, and if necessary, comment out any uncommented test users in the users.conf file. In the freeradius eap.conf, change default_eap_type to peap . Change the "ttls" section as follows to use EAP-TTLS with EAP-MSCHAPv2 as the inner method. default_eap_type = mschapv2 copy_request_to_tunnel = yes use_tunneled_reply = no Create a new entry in freeradius clients.conf to allow access from pfSense. client pfSense_IP_HERE { secret = REPLACE_THIS_WITH_A_SHARED_SECRET_KEY_THAT_WILL_BE_KNOWN_BY_PFSENSE shortname = pfsense_firewall nastype = other } Change the default secret for the localhost client in clients.conf file. Save the file and restart the FreeRadius service. Validate authenticating via FreeRadius radtest -t mschap TestUser@domain.com Users_Password localhost 0 SecretKeyForLocalHost Should return rad_recv: Access-Accept Setup a new Authentication Server in pfSense. System > User Manager > Authentication Servers Click "Add" Give the server a name - "test-domain-radius-mschapv2" Type = "RADIUS" Hostname = ipaddress of the radius server. Shared Secret = THE_SHARED_SECRET_KEY_CREATED_IN_THE_FREERADIUS_CLIENTS.CONF_FILE Services offered = Authentication Click Save Follow the instructions found at https://doc.pfsense.org/index.php/IKEv2_with_EAP-MSCHAPv2 with the following exceptions. Under Mobile Clients, Set User Authentication to the newly created radius authentication method. Under Phase 1, set the Authentication Method to EAP-MSChapv2 Don't create any Client Pre-Shared keys You should now be able to connect to the pfSense VPN using windows native VPN client and Samba4 / AD credentials. Credit for various pieces of this to the following sites: http://wiki.freeradius.org/guide/FreeRADIUS-Active-Directory-Integration-HOWTO https://www.eduroam.us/node/89 https://blog.practichem.com/configuring-freeradius-for-wpa2-enterprise-with-active-directory-integration-on-ubuntu-1404/ http://deployingradius.com/documents/configuration/active_directory.html http://confluence.diamond.ac.uk/display/PAAUTH/Using+Active+Directory+as+authentication+source</username></netbios></password></username></password></username>
  • Phase 1 Secondary\Backup Remote Gateway

    3
    0 Votes
    3 Posts
    1k Views
    J
    I am just checking to see if this is possible yet?  Is it on the roadmap for a future release that anyone is aware of? I can't just "require" the other end of the tunnel to setup DDNS in my case. TIA!
  • Issue with AD traffic

    1
    0 Votes
    1 Posts
    964 Views
    No one has replied
  • Traffic from pfsense box not going over ipsec tunnel

    2
    0 Votes
    2 Posts
    1k Views
    B
    It seems this might be the answer. https://doc.pfsense.org/index.php/Why_can't_I_query_SNMP,_use_syslog,_NTP,_or_other_services_initiated_by_the_firewall_itself_over_IPsec_VPN
  • IPSEC BINAT , blocking TCP

    1
    0 Votes
    1 Posts
    959 Views
    No one has replied
  • Sonicwall/PFSense - VPN with IPSEC

    2
    0 Votes
    2 Posts
    2k Views
    B
    My sonicwall/pfsense tunnel was working fine but now I'm having a similar problem. I can ping from the sonicwall side to the pfsense side but not pfsense to sonicwall. …and AFAIK nothing has changed! I can't find anything in the logs either. Hmm
  • Mobile IKEv2 Child SA Rekeying Issue on Windows 7

    2
    0 Votes
    2 Posts
    1k Views
    L
    Seems that upping the lifetime to two hours simply made it drop less often. I set it back to one hour and disabled rekeying as a test.
  • IPSEC packet capture

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Help me to config Ipsec VPN between pfsense and cyberoam 200ing

    1
    0 Votes
    1 Posts
    770 Views
    No one has replied
  • DNS, Domainctrl and IPsec??

    1
    0 Votes
    1 Posts
    779 Views
    No one has replied
  • Issues with site to site vpn sonicwall pfsense

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    Did you allow traffic in on Firewall > Rules, IPsec tab? When it comes to NAT, the sonicwall doesn't know about your actual internal network. So their tunnel P2 is built to the NAT network and on the sonicwall side when they try to ping the pfSense side, they ping the NAT network addresses instead.
  • [SOLVED] IPSEC up but no traffic?

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • IPSec three sites configuration

    4
    0 Votes
    4 Posts
    1k Views
    A
    Not resolved, so adopted another solution for the 2nd tunnel.
  • IPSEC behind NAT

    3
    0 Votes
    3 Posts
    2k Views
    J
    according to the WISP, it's is prefered alternative instead of the bridge mode, which gave i'm some problems I'm still trying to solve this I tried openvpn tunnel, same thing.
  • Routes

    5
    0 Votes
    5 Posts
    2k Views
    F
    I finally fixed it using: http://phil.lavin.me.uk/2013/04/how-to-disable-icmp-redirects-in-pfsense/ Thanks
  • Note: pfSense 2.2 + Ipsec psk Xauth + Radius; Must restart service

    3
    0 Votes
    3 Posts
    1k Views
    DerelictD
    When you are making a change to a server with dozens of tunnels in production, stopping and restarting IPsec because of a change made to one tunnel can be a real downer.
  • PSA: If IPSec stops working after upgrading to 2.3.1, try 3DES

    6
    0 Votes
    6 Posts
    3k Views
    M
    Same problem here, but I had to use OpenVPN until 2.3.2 before I could use 3DES.
  • 2.3.2 nanobsd Can't add new P2 entry

    2
    0 Votes
    2 Posts
    844 Views
    K
    gahh, I'm sorry to say, I think it's related to some errant Group Permissions. I've removed and recreated the group (and reassigned permissions), and it now works.
  • Mobile VPN - IPSec - Traffic to Tunnel into VPN

    2
    0 Votes
    2 Posts
    885 Views
    K
    You would create a separate P2 entry for each subnet you need to access.  Also verify that the firewall rules for IPSec are not blocking your traffic.
  • ERROR: unknown Informational exchange received.

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.