Palo Alto RADIUS authentication against Microsoft NPS is broken

Announcements

Changes to the LIVEcommunity experience are coming soon... Here's what you need to know.

Reply
nwsol
L2 Linker

Palo Alto RADIUS authentication against Microsoft NPS is broken

Has anyone managed to get authentication on PAN-OS 7.0 working with microsoft NPS servers?

 

Since version 7.0 authentication against our microsoft NPS radius servers is broken. Because the firewall now always first tries CHAP instead op PAP (see this article) and microsoft NPS always replies with a ACCESS-REJECT massage (see this article -> item 9).

 

As it's insane to start storing our AD credentials with reversible encryption I guess microsoft NPS isn't compatible anymore with Palo Alto? Or am I missing something here?


Accepted Solutions
nwsol
L2 Linker

Recreating the RADIUS server profile did the trick. (actually, changed the timeout and retry from 3 to 2 and pushed from panorama). The system log now says it switched to PAP for that radius server.

 

That's a nasty bug... Never would have tought 'touching' the radius config could fix the issue...

View solution in original post


All Replies
pankaku
L5 Sessionator

I have configure radius authentication with NPS and it works perfect. I am using 7.0.2

nwsol
L2 Linker

What are the settings of your policy? I've enable only PAP as an allowed authentication method.

 

I can't figure out how to trigger the PAP failover on palo alto. It keeps on using CHAP which isn't supported on our domain.

pankaku
L5 Sessionator

I have followed this video

 

https://www.youtube.com/watch?v=1yYywwPWXys

nwsol
L2 Linker

Oh, so you are running the windows 2012 version of NPS?

 

We're running it on 2008 R2. It might be there's a behaviour change between the 2 windows versions.

BLH
L2 Linker

Are you using the NPS for administrator or GlobalProtect access?

What version of PAN-OS?

What does the Event Viewer on the NPS say? Event Viewer -> Server Roles -> Network Policy Server

nwsol
L2 Linker

We're using it for admin access on PAN-OS 7.0.2.

 

NPS logs give an error (19): No reversibly encrypted password is stored for the user account. This means you should enable reversible encryption on you domain controllers with the policy setting "Store password using reversible encryption for all users in the domain" which is not something we can do.

 

Packet captures show only 1 request and an ACCESS-REJECT radius reply from NPS (because of the CHAP). So no second attempt by the firewall.using PAP 

BLH
L2 Linker

Is the Network Policy (or Connection Request Policy, if using overrides), specifically configured to only allow PAP?

 

pap.PNG

nwsol
L2 Linker

Yes, The NPS settings are exactly the same as on your screenshot. I also see you're running windows server 2012.

 

Maybe 2012 does not reply on CHAP requests triggering a timeout, while 2008 replies with an access-reject?

BLH
L2 Linker

All versions of NPS (2008 <-> 2012 R2) should behave the same way.

Dump below is from a 2012 R2. First a CHAP request is sent, that is rejected, and then PAP is tried.

 

2015-10-05_1441.png

The Event Viewer will also indicate two logins. Subsequent logins are only sent using PAP though.

 

Might be worth a shot to re-create the RADIUS server profile on the firewall.

What does a Wireshark trace from the NPS look like?

 

The whole CHAP implementation in 7.0 is pretty silly. The failover only works half the time for the inital logins, it causes massive issues with Multi Factor Authentication solutions using RADIUS Challenge/Response, there's no tickbox to turn it off and completely baffling that CHAP, instead of MS-CHAPv2 is supported..

 

 

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!