[2018-09-09 19:45:44] [127.0.0.1] [DEBUG:17640:ldap_frm.php:debug_log] LDAP read: (objectclass=*) (cn=Denny Fuchs,ou=People,dc=example,dc=com)
[2018-09-09 19:45:44] [127.0.0.1] [OpenOTP:94UZWDK3] Found 42 user settings: LoginMode=LDAPMFA,OTPType=TOKEN,OTPLength=8,ChallengeMode=No,ChallengeTimeout=90,ChallengeFake=Yes,MobileTimeout=30,EnableLogin=Yes,HOTPLookAheadWindow=25,TOTPTimeStep=30,TOTPTimeOffsetWindow=120,OCRASuite=OCRA-1:HOTP-SHA1-6:QN06-T1M,DeviceType=U2F,SMSType=Normal,SMSMode=Ondemand,MailMode=Ondemand,PrefetchExpire=10,LastOTPTime=300,ListChallengeMode=ShowID
[2018-09-09 19:45:44] [127.0.0.1] [OpenOTP:94UZWDK3] Found 11 user data: LoginCount,RejectCount,LastOTP,TokenType,TokenKey,TokenState,TokenID,TokenSerial,Token2Type,Token2Key,Token2State
[2018-09-09 19:45:44] [127.0.0.1] [OpenOTP:94UZWDK3] Last OTP expired 2018-09-09 19:41:19
[2018-09-09 19:45:44] [127.0.0.1] [OpenOTP:94UZWDK3] Found 2 registered OTP tokens (YUBIKEY,TOTP)
[2018-09-09 19:45:44] [127.0.0.1] [OpenOTP:94UZWDK3] Challenge mode disabled (checking concatenated passwords)
[2018-09-09 19:45:44] [127.0.0.1] [OpenOTP:94UZWDK3] Requested login factors: LDAP & OTP
[2018-09-09 19:45:44] [127.0.0.1] [DEBUG:17640:watchd_frm.php:debug_log] Watchd LDAP server: qh-a07-auth-01
[2018-09-09 19:45:44] [127.0.0.1] [DEBUG:17640:watchd_frm.php:debug_log] Watchd LDAP server: qh-a07-auth-01
[2018-09-09 19:45:44] [127.0.0.1] [OpenOTP:94UZWDK3] Wrong LDAP password
[2018-09-09 19:45:44] [127.0.0.1] [OpenOTP:94UZWDK3] Wrong YUBIKEY password (token #1)
[2018-09-09 19:45:44] [127.0.0.1] [OpenOTP:94UZWDK3] Wrong TOTP password (token #2)
[2018-09-09 19:45:44] [127.0.0.1] [OpenOTP:94UZWDK3] Updated user data
[2018-09-09 19:45:44] [127.0.0.1] [DEBUG:17640:sql_frm.php:debug_log] SQL query: INSERT INTO "WebSrv" ("Time","Session","Text","Application","DN","Host") VALUES (?,?,?,?,?,?)
[2018-09-09 19:45:44] [127.0.0.1] [DEBUG:17640:sql_frm.php:debug_log] > Param #1: 2018-09-09 19:45:44
[2018-09-09 19:45:44] [127.0.0.1] [DEBUG:17640:sql_frm.php:debug_log] > Param #2: replaced
[2018-09-09 19:45:44] [127.0.0.1] [DEBUG:17640:sql_frm.php:debug_log] > Param #3: Authentication failed (LDAP & TOKEN)
[2018-09-09 19:45:44] [127.0.0.1] [DEBUG:17640:sql_frm.php:debug_log] > Param #4: OpenOTP
[2018-09-09 19:45:44] [127.0.0.1] [DEBUG:17640:sql_frm.php:debug_log] > Param #5: cn=Denny Fuchs,ou=People,dc=example,dc=com
[2018-09-09 19:45:44] [127.0.0.1] [DEBUG:17640:sql_frm.php:debug_log] > Param #6: 127.0.0.1
[2018-09-09 19:45:45] [127.0.0.1] [OpenOTP:94UZWDK3] Sent failure response
[2018-09-09 19:45:45] [127.0.0.1] [DEBUG:17640] Process execution time: 0.12 seconds
Then you will be able to grant privileges to a user account. There are fourtypes of user accounts. The list below displays the four types of accounts andthe vendor-specific attributes.•radius_admin:Password: "123456"Vendor-Specific Attributes: "H=4, I=4"•radius_operator:Password: "654321"Vendor-Specific Attributes: "H=3, I=3"•radius_user:Password: "654321"Vendor-Specific Attributes: "H=2, I=2"•radius_callback:Password: "654321"Vendor-Specific Attributes: "H=1, I=1"A-2
When you disable the challenge mode, you have to enter the LDAP password and Yubikey password in the same password field (concatened mode)According to your logs, ldap password is wrong and yubikey password too.
From which client it doesn't work as expected ?
# -*- text -*-
# Copyright (C) 2015 The FreeRADIUS Server project and contributors
#
# dictionary.lcs
#
# originally by
# "Eugen K. " <>
#
VENDOR SUPERMICRO 21317
BEGIN-VENDOR Supermicro
# Attributes
# Callback H=1, I=1 Attr-26 = 0x483D312C20493D31
# User H=2, I=2 Attr-26 = 0x483D322C20493D32
# Operator H=3, I=3 Attr-26 = 0x483D332C20493D33
# Administrator H=4, I=4 Attr-26 = 0x483D342C20493D34
ATTRIBUTE IPMI-26 27 string
ATTRIBUTE IPMI 8 string
END-VENDOR Supermicro
client sw-mgmt {
ipaddr = *
shortname = sw
secret = averylongstring
}
(4) Wed Sep 12 17:44:01 2018: Auth: Login OK: [foobar] (from client mgmt port 1)
Mon Sep 10 11:49:04 2018
Acct-Status-Type = Accounting-On
NAS-Identifier = "lan-02"
Acct-Delay-Time = 0
NAS-IP-Address = 192.168.1.9
Timestamp = 1536572944
[root@webadm1 ~]# /opt/radiusd/bin/radtest
Usage: radtest user [server[:port]] [secret]
[root@webadm1 ~]# /opt/radiusd/bin/radtest Administrator 127.0.0.1:1812 testing123
Hello,To be sure, you can perform a radtest authentication on your webadm server.