Hey guys,
I just finished setting up my OpenOTP + Radiusd setup in my test environment and I can't seem to get past an authentication issue.
WebADM is setup by way of virtual appliance
Webadm/openotp is successfully connected to my test active directory environment . It enumerates the users/groups without an issue, Adding the openotp attributes to users/groups works fine.
The cisco asa is successfully authenticating with the radiusd daemon.
If I test the authentication from the cisco -> the OpenOTP/Radiusd servers at the cisco cli it works
" test aaa-server authentication OPENOTP host x.x.x.x username testuser password password+openotpkey" - I get a successful authentication message.
snippet from test on cisco ASA:
INFO: Attempting Authentication test to IP address <x.x.x.x> (timeout: 12 seconds)
INFO: Authentication Successful
If I try my VPN I get an error with the following logs/entries
==> radiusd.log <==
Mon Nov 25 20:51:36 2013 : Auth: rlm_openotp: OpenOTP Authentication succeeded
Mon Nov 25 20:51:39 2013 : Auth: rlm_openotp: OpenOTP Authentication failed
==> requests.log <==
Mon Nov 25 20:51:36 2013 : Auth: Login OK: [remotevpnuser] (from client x.x.x.x port 9502720 y.y.y.y)
Mon Nov 25 20:51:39 2013 : Auth: Login incorrect: [remotevpnuser] (from client x.x.x.x port 9502720 cli y.y.y.y)
I tried changing the authentication mode from LDAPOTP -> LDAP, just to see if I can get it to authenticate successfully.
So I changed the Mode from LDAPOTP -> LDAP, logged into the cisco ASA, attempted the following
" test aaa-server authentication OPENOTP host x.x.x.x username testuser password password"
...it fails.
I try that same user again with
" test aaa-server authentication OPENOTP host x.x.x.x username testuser password password+openotpkey"
...it succeeds.
So the issue is two-part. OpenOTP seems to be ignoring my change from LDAPOTP to LDAP - I sort of don't care about this because ultimately I want LDAPOTP to be working. It might have been useful to isolate that behavior first. Ideally I'd like to be able to use IPSEC VPN's to the Cisco ASA with the Password+OTP
Versions:
Webadm v1.2
Radiusd v2.2.2
OpenOTP.Conf
-bash-3.2# grep "^[^#;]" openotp.conf
server_url = "
http://127.0.0.1:8080/openotp/"
password_mode = 3
password_separator = "+"
domain_separator = "\\"
Thank you all for the assistance.
Regards,
Paul