Downloads

Transcription

Downloads
KB 160053
How to enable and read the full trace file for
IDENTIKEY Authentication Server (IAS) 3.6, step
by step.
Creation date: 22/12/2014
Last Review: 22/12/2014
Document type: How To
Revision number: 2
Security status: EXTERNAL
Summary
To be able to troubleshoot an IDENTIKEY Authentication Server installation you have
to enable and examine the full trace file.
This is a step by step guide how to enable full tracing and where you can find the file.
This article also includes some basic information you can find in the trace file.
details.
How to enable the full tracing?
There are two possibilities to enable Full tracing in IDENTIKEY:
1. Using the Web Administration tool.
Select Server Configuration from the SYSTEM tab, and edit the General tab.
Applies to: IDENTIKEY Authentication Server 3.6
KB 160053– 22/12/2014
 2014 VASCO Data Security. All rights reserved.
Page 1 of 7
Set the Tracing level to Full. It is recommended to enable Rotate Trace logs so the
trace files do not grow too large. You can rotate based on days or size. After
pressing the SAVE button the tracing starts, there is no need to restart the
IDENTIKEY Service.
2. Using IDENTIKEY Authentication Server configuration utility.
Open the IDENTIKEY Authentication Server Configuration GUI from the Windows
Start menu All Programs IDENTIKEY Authentication Server IDENTIKEY
Authentication Server Configuration.
In the general settings, Select Full Tracing and specify and file rotation settings.
The default file location for the trace file will be
C:\Program Files\VASCO\IDENTIKEY Authentication Server 3.6\log\ias.trace.
Applies to: IDENTIKEY Authentication Server 3.6
KB 160053– 22/12/2014
 2014 VASCO Data Security. All rights reserved.
Page 2 of 7
Click YES when you are asked to restart the service:
Where can I find the trace file?
After restarting the service, or enabling the tracing via Webadmin, you can find the
Applies to: IDENTIKEY Authentication Server 3.6
KB 160053– 22/12/2014
 2014 VASCO Data Security. All rights reserved.
Page 3 of 7
trace file in the log directory of IDENTIKEY Authentication Server (default location is
C:\Program Files\VASCO\IDENTIKEY Authentication Server 3.6\log\)
Below is the trace data generated when an authentication attempt is handled by
IDENTIKEY Authentication Server 3.6:
[2013/08/19|19:19:54.524125UTC][05068][DEBUG][SocketManager::getPendingSockets] > Waiting to acquire connection lock
mutex.
[2013/08/19|19:19:54.539750UTC][05068][DEBUG][SocketManager::getPendingSockets] > Acquired connection lock mutex.
[2013/08/19|19:19:54.539750UTC][05068][DEBUG][SocketManager::getPendingSockets] > Releasing connection lock mutex.
[2013/08/19|19:19:54.555375UTC][05776][DEBUG][ValidationTask::getSharedSecretStore] > Looking for RADIUS Client with
Shared Secret
[2013/08/19|19:19:54.555375UTC][05776][DEBUG][ComponentLoader::fetchComponent]
>
Existing
Component
record
[RADIUS
Client:192.168.17.1] returned from Component Cache
[2013/08/19|19:19:54.555375UTC][05776][INFO ][ValidationTask::process] > Received request is from NAS location 10.1.1.101
[2013/08/19|19:19:54.555375UTC][05776][DEBUG][ValidationTask::processPossibleRequestRepeat] > Failed to find entry in
request cache. Must be a new request. Caching new request
[2013/08/19|19:19:54.555375UTC][05776][VINFO][Manager::getElementFromRequest] > Packet contains no state attribute,
assuming this is a new request
[2013/08/19|19:19:54.571000UTC][05776][DEBUG][ComponentLoader::fetchComponent] > Component cache says there is no
Component record [RADIUS Client:10.1.1.101]
[2013/08/19|19:19:54.571000UTC][05776][DEBUG][ComponentLoader::fetchComponent]
>
Existing
Component
record
[RADIUS
Client:192.168.17.1] returned from Component Cache
IDENTIKEY found a client component with the IP address of the client
location
[2013/08/19|19:19:54.571000UTC][05776][VINFO][ComponentCheckUtils::checkClientComponent]
>
Client
component
check
succeeded
[2013/08/19|19:19:54.586625UTC][05776][VINFO][ComponentCheckUtils::checkClientComponent] > Client license check skipped
[2013/08/19|19:19:54.586625UTC][05776][VINFO][ValidationTask::routePacket] > Processing packet data
[2013/08/19|19:19:54.586625UTC][05776][VINFO][RADIUSLayer::dispatchCommandTask] > Retrieving handler for packet
[2013/08/19|19:19:54.586625UTC][05776][DEBUG][RADIUSHandlerFactory::getHandler] > Creating PAP handler
[2013/08/19|19:19:54.602250UTC][05776][INFO ][adt_record] > Audit: {Info} {RADIUS} {I-006001} {A RADIUS Access-Request has
been received.} {0xDA009133786EE52E41E8B256A5BA614D}
[2013/08/19|19:19:54.602250UTC][05776][INFO
][adt_record]
>
Audit:
{Client
Location:192.168.17.1:51943,
Source
Location:192.168.17.95, Request ID:8, Password Protocol:PAP, Input Details:RADIUS Code:1, RADIUS Id:8, , UserName:user@master, NAS-IP-Address:10.1.1.101, NAS-Port:1, NAS-Identifier:Vasco Radius Simulator, User-Password:********,
Calling-Station-Id:13080, Action:Process}
[2013/08/19|19:19:54.602250UTC][05776][VINFO][Distributor::acquireConnection] > Node.Connector allocated
[2013/08/19|19:19:54.649125UTC][05776][VINFO][Distributor::releaseConnection] > Node.Connector released
[2013/08/19|19:19:54.664750UTC][05776][MAJOR][alert_record] > plugin not initialized
[2013/08/19|19:19:54.664750UTC][05776][DATA ][RADIUSLayer::dispatchCommandTask] > Retrieved from packet - Attributes : '
{Password : ********}', Params: '
{User ID : user@master}
{Password : ********}
{Raw User ID : 0x75736572406D6173746572}
{Password Format : 0}
{Protocol ID : RADIUS}
{Protocol Specific Data : 0xC0A81101E7CA0850172110214174142063541626427246}'
[2013/08/19|19:19:54.664750UTC][05776][VINFO][RADIUSLayer::dispatchCommandTask] > Authentication request received.
[2013/08/19|19:19:54.664750UTC][05776][VINFO][RADIUSLayer::dispatchCommandTask]
>
Executing
authentication
scenario
command.
[2013/08/19|19:19:54.680375UTC][05776][DEBUG][CommandFactory::generateCommand] > Request for command: <20:1>
[2013/08/19|19:19:54.680375UTC][05776][DEBUG][CommandFactory::generateCommand] > Found factory - creating command
[2013/08/19|19:19:54.680375UTC][05776][DEBUG][ComponentLoader::fetchComponent] > Existing Component record [Identikey
Server:192.168.17.95] returned from Component Cache The IDENTIKEY Server that will authenticate the user
[2013/08/19|19:19:54.680375UTC][05776][DEBUG][ComponentCheckUtils::checkServerComponent] > Protocol field <RADIUS> was
successfully located in license.
[2013/08/19|19:19:54.680375UTC][05776][DEBUG][ComponentCheckUtils::checkServerComponent] > Scenario field <Authentication>
was successfully located in license.
[2013/08/19|19:19:54.696000UTC][05776][DEBUG][ComponentCheckUtils::checkServerComponent] > For scenario Authentication
protocol RADIUS was successfully located in license.
[2013/08/19|19:19:54.696000UTC][05776][VINFO][ComponentCheckUtils::checkServerComponent] > Server component and license
check succeeded
[2013/08/19|19:19:54.696000UTC][05776][DEBUG][ComponentLoader::fetchComponent] > Component cache says there is no
Component record [RADIUS Client:10.1.1.101]
[2013/08/19|19:19:54.696000UTC][05776][DEBUG][ComponentLoader::fetchComponent]
>
Existing
Component
record
[RADIUS
Client:192.168.17.1] returned from Component Cache
[2013/08/19|19:19:54.696000UTC][05776][VINFO][ComponentCheckUtils::checkClientComponent]
>
Client
component
check
succeeded
[2013/08/19|19:19:54.711625UTC][05776][VINFO][ComponentCheckUtils::checkClientComponent] > Client license check skipped
[2013/08/19|19:19:54.711625UTC][05776][INFO ][AuthenticateRequest::execute] > Processing user authentication request...
[2013/08/19|19:19:54.711625UTC][05776][INFO ][AuthenticateRequest::execute] > Fast authentication is <false>
[2013/08/19|19:19:54.711625UTC][05776][VINFO][AuthenticateRequest::execute] > Password format is [Cleartext combined]
[2013/08/19|19:19:54.711625UTC][05776][DATA ][Policy::traceDetails] > *** Effective Policy Settings ***
[2013/08/19|19:19:54.727250UTC][05776][DATA ][Policy::traceDetails] > Policy ID
: [Identikey Local
Authentication] Policy Settings used for the client found
[2013/08/19|19:19:54.727250UTC][05776][DATA ][Policy::traceDetails] > Parent Policy ID
: [Base Policy]
[2013/08/19|19:19:54.742875UTC][05776][DATA ][Policy::traceDetails] > DUR
: [No]
[2013/08/19|19:19:54.742875UTC][05776][DATA ][Policy::traceDetails] > Autolearn
: [No]
[2013/08/19|19:19:54.742875UTC][05776][DATA ][Policy::traceDetails] > Stored Pwd Proxy
: [No]
[2013/08/19|19:19:54.758500UTC][05776][DATA ][Policy::traceDetails] > Assignment Mode
: [Neither]
[2013/08/19|19:19:54.758500UTC][05776][DATA ][Policy::traceDetails] > Assign Search Up OU Path
: [No]
[2013/08/19|19:19:54.774125UTC][05776][DATA ][Policy::traceDetails] > Grace Period
: [0]
[2013/08/19|19:19:54.774125UTC][05776][DATA ][Policy::traceDetails] > Application Names
: []
[2013/08/19|19:19:54.774125UTC][05776][DATA ][Policy::traceDetails] > Application Type
: [No Restriction]
[2013/08/19|19:19:54.789750UTC][05776][DATA ][Policy::traceDetails] > Digipass Types
: []
[2013/08/19|19:19:54.789750UTC][05776][DATA ][Policy::traceDetails] > Local Authentication
:
[Digipass/Password]
[2013/08/19|19:19:54.789750UTC][05776][DATA ][Policy::traceDetails] > BackEnd Authentication
: [None]
[2013/08/19|19:19:54.789750UTC][05776][DATA ][Policy::traceDetails] > BackEnd Protocol ID
: []
[2013/08/19|19:19:54.805375UTC][05776][DATA ][Policy::traceDetails] > Default Domain
: []
[2013/08/19|19:19:54.805375UTC][05776][DATA ][Policy::traceDetails] > Group List
: []
[2013/08/19|19:19:54.805375UTC][05776][DATA ][Policy::traceDetails] > Group Check Mode
: [No Check]
[2013/08/19|19:19:54.805375UTC][05776][DATA ][Policy::traceDetails] > User Lock Threshold
: [3]
[2013/08/19|19:19:54.821000UTC][05776][DATA ][Policy::traceDetails] > One-Step Chall/Response
: [No]
[2013/08/19|19:19:54.821000UTC][05776][DATA ][Policy::traceDetails] > One-Step CR Chall Length
: [0]
[2013/08/19|19:19:54.821000UTC][05776][DATA ][Policy::traceDetails] > One-Step CR Check Digit
: [1]
[2013/08/19|19:19:54.821000UTC][05776][DATA ][Policy::traceDetails] > Backup VDP Enabled
: [No]
Applies to: IDENTIKEY Authentication Server 3.6
KB 160053– 22/12/2014
 2014 VASCO Data Security. All rights reserved.
Page 4 of 7
[2013/08/19|19:19:54.821000UTC][05776][DATA ][Policy::traceDetails] > Backup VDP Maximum Days
: [0]
[2013/08/19|19:19:54.821000UTC][05776][DATA ][Policy::traceDetails] > Backup VDP Max Uses
: [0]
[2013/08/19|19:19:54.821000UTC][05776][DATA ][Policy::traceDetails] > Pin Change Allowed
: [Yes]
[2013/08/19|19:19:54.836625UTC][05776][DATA ][Policy::traceDetails] > Self-Assign Separator
: []
[2013/08/19|19:19:54.836625UTC][05776][DATA ][Policy::traceDetails] > Challenge Request Method
: [Keyword]
[2013/08/19|19:19:54.836625UTC][05776][DATA ][Policy::traceDetails] > Challenge Request Keyword
: []
[2013/08/19|19:19:54.836625UTC][05776][DATA ][Policy::traceDetails] > Primary VDP Rqst Method
: [Password]
[2013/08/19|19:19:54.836625UTC][05776][DATA ][Policy::traceDetails] > Primary VDP Rqst Keyword
: []
[2013/08/19|19:19:54.852250UTC][05776][DATA ][Policy::traceDetails] > Backup VDP Rqst Method
: [KeywordPassword]
[2013/08/19|19:19:54.852250UTC][05776][DATA ][Policy::traceDetails] > Backup VDP Rqst Keyword
: [otp]
[2013/08/19|19:19:54.852250UTC][05776][DATA ][Policy::traceDetails] > ITimeWindow
: [20]
[2013/08/19|19:19:54.852250UTC][05776][DATA ][Policy::traceDetails] > STimeWindow
: [20]
[2013/08/19|19:19:54.867875UTC][05776][DATA ][Policy::traceDetails] > EventWindow
: [20]
[2013/08/19|19:19:54.867875UTC][05776][DATA ][Policy::traceDetails] > SyncWindow
: [6]
[2013/08/19|19:19:54.867875UTC][05776][DATA ][Policy::traceDetails] > IThreshold
: [0]
[2013/08/19|19:19:54.867875UTC][05776][DATA ][Policy::traceDetails] > SThreshold
: [0]
[2013/08/19|19:19:54.883500UTC][05776][DATA ][Policy::traceDetails] > Check Challenge
: [1]
[2013/08/19|19:19:54.883500UTC][05776][DATA ][Policy::traceDetails] > OnlineSG
: [0]
[2013/08/19|19:19:54.883500UTC][05776][DATA ][Policy::traceDetails] > Check Inactive Days
: [0]
[2013/08/19|19:19:54.883500UTC][05776][DATA ][Policy::traceDetails] > Offline Auth Enabled
: [No]
[2013/08/19|19:19:54.899125UTC][05776][DATA ][Policy::traceDetails] > Offline Time Interval
: [21]
[2013/08/19|19:19:54.899125UTC][05776][DATA ][Policy::traceDetails] > Offline Max Events
: [300]
[2013/08/19|19:19:54.899125UTC][05776][DATA ][Policy::traceDetails] > DCR
: [No]
[2013/08/19|19:19:54.914750UTC][05776][DATA ][Policy::traceDetails] > Chg Win Pwd Enabled
: [No]
[2013/08/19|19:19:54.914750UTC][05776][DATA ][Policy::traceDetails] > Chg Win Pwd Length
: [16]
[2013/08/19|19:19:54.914750UTC][05776][DATA ][Policy::traceDetails] > Client Group List
: []
[2013/08/19|19:19:54.930375UTC][05776][DATA ][Policy::traceDetails] > Client Group Mode
: [No Check]
[2013/08/19|19:19:54.930375UTC][05776][DATA ][Policy::traceDetails] > 2OTP Sync Enabled
: [No]
[2013/08/19|19:19:54.946000UTC][05776][DATA ][Policy::traceDetails] > VDP Delivery Method
: [SMS]
[2013/08/19|19:19:54.946000UTC][05776][DATA ][Policy::traceDetails] > Reply Radius Attribute Enabled
: [No]
[2013/08/19|19:19:54.946000UTC][05776][DATA ][Policy::traceDetails] > Radius Attribute Group List
: []
[2013/08/19|19:19:54.961625UTC][05776][DATA ][Policy::traceDetails] > Radius Allowed Protocols
: [Any]
[2013/08/19|19:19:54.961625UTC][05776][DATA ][Policy::traceDetails] > Radius Session Lifetime
: [3600]
[2013/08/19|19:19:54.961625UTC][05776][DATA ][Policy::traceDetails] > Radius Session Ticket Lifetime
: [86400]
[2013/08/19|19:19:54.977250UTC][05776][DATA ][Policy::traceDetails] > Radius Session Ticket Reuse
: [48]
[2013/08/19|19:19:54.977250UTC][05776][DATA ][Policy::traceDetails] > Radius Session Group List
: []
[2013/08/19|19:19:54.977250UTC][05776][DATA ][Policy::traceDetails] > Static Password Diff To Prev
: [4]
[2013/08/19|19:19:54.977250UTC][05776][DATA ][Policy::traceDetails] > Static Password Min Length
: [7]
[2013/08/19|19:19:54.992875UTC][05776][DATA ][Policy::traceDetails] > Static Password Min Lower Alpha : [1]
[2013/08/19|19:19:54.992875UTC][05776][DATA ][Policy::traceDetails] > Static Password Min Upper Alpha : [1]
[2013/08/19|19:19:54.992875UTC][05776][DATA ][Policy::traceDetails] > Static Password Min Number
: [1]
[2013/08/19|19:19:54.992875UTC][05776][DATA ][Policy::traceDetails] > Static Password Min Symbol
: [0]
[2013/08/19|19:19:54.992875UTC][05776][DATA ][Policy::traceDetails] > Static Password Not UserId Based : [Yes]
[2013/08/19|19:19:54.992875UTC][05776][DATA ][Policy::traceDetails] > Multi Digipass Application Mode
: [Multiple
DIGIPASS Applications Allowed]
[2013/08/19|19:19:54.992875UTC][05776][DATA ][Policy::traceDetails] > Privileged Users : [Reject]
[2013/08/19|19:19:55.008500UTC][05776][DATA ][Policy::traceDetails] > *********************************
[2013/08/19|19:19:55.008500UTC][05776][DATA ][UserChecks::resolveUserAndGroupCheck] > userId is [user@master]
user
authenticating
[2013/08/19|19:19:55.008500UTC][05776][DATA ][UserChecks::resolveUserAndGroupCheck] > domain is []
[2013/08/19|19:19:55.008500UTC][05776][INFO ][ODBCStorageConnector::connect] > Trying to connect to the ODBC data source
[2013/08/19|19:19:55.024125UTC][05776][INFO ][ODBCSource::Connect] > Already connected
[2013/08/19|19:19:55.024125UTC][05776][INFO ][ODBCRequestContext::doUserNameTranslation] > Not doing Windows user name
translation
[2013/08/19|19:19:55.024125UTC][05776][DEBUG][ODBCRequestContext::doUserNameTranslation] > Found domain '<master>' in
cache and it exists - using
[2013/08/19|19:19:55.039750UTC][05776][DATA ][ODBCStatement::PrepareSQL] > Prepared SQL statement "SELECT vdsDomain,
vdsUserId, vdsOrgUnit, vdsUserName, vdsMobile, vdsEmail, vdsStaticPwd, vdsLinkUserDomain, vdsLinkUserId, vdsLocalAuth,
vdsBackEndAuth, vdsLockCount, vdsLocked, vdsDisabled, vdsAdminPrivileges, vdsOfflineAuthEnabled, vdsStaticPwdHistory,
vdsCreateTime, vdsLastAuthTime, vdsExpirationTime FROM vdsUser WHERE (vdsDomain = ?) AND (vdsUserId = ?) ORDER BY
vdsDomain, vdsUserId, vdsOrgUnit"
[2013/08/19|19:19:55.055375UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 1 to string "master"
[2013/08/19|19:19:55.055375UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 2 to string "user"
[2013/08/19|19:19:55.071000UTC][05776][DATA ][ODBCResultSet::GetRowCount] > Returned row-count 1
[2013/08/19|19:19:55.086625UTC][05776][DATA ][ODBCStatement::PrepareSQL] > Prepared SQL statement "SELECT vdsSerialNo FROM
vdsDigipass WHERE (vdsDomain = ?) AND (vdsUserId = ?)"
[2013/08/19|19:19:55.086625UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 1 to string "master"
[2013/08/19|19:19:55.086625UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 2 to string "user"
[2013/08/19|19:19:55.102250UTC][05776][DATA ][vasco::CryptoEngine::decryptWithEmbeddedProvider] > Decrypt the content
using embedded crypto provider.
[2013/08/19|19:19:55.102250UTC][05776][VINFO][SoftwareCryptoBase::preDecryptProcess] > First 2 byte of cipher text 0x[00]
0x[0A]
[2013/08/19|19:19:55.102250UTC][05776][DATA ][SoftwareCryptoBase::custom_aes128cbc_key_derive] > Block size for aes is
[16]
[2013/08/19|19:19:55.117875UTC][05776][DATA ][vasco::CryptoEngine::decryptWithEmbeddedProvider] > Data is decrypted using
embedded crypto provider.
[2013/08/19|19:19:55.117875UTC][05776][INFO ][UserChecks::userChecks] > Digipass User account found
[2013/08/19|19:19:55.117875UTC][05776][DEBUG][UserChecks::userChecks] > Checking User login inactivity: 'true'
[2013/08/19|19:19:55.117875UTC][05776][DEBUG][UserChecks::userChecks] > User login inactivity time: [90]
[2013/08/19|19:19:55.117875UTC][05776][DEBUG][UserChecks::userChecks] > Checking user activity
[2013/08/19|19:19:55.133500UTC][05776][INFO ][UserChecks::userChecks] > Setting m_userChecksState to [User Exists]
[2013/08/19|19:19:55.133500UTC][05776][DATA ][User::traceDetails] > *** User Details ***
[2013/08/19|19:19:55.133500UTC][05776][DATA ][User::traceDetails] > User ID
: [user]
[2013/08/19|19:19:55.133500UTC][05776][DATA ][User::traceDetails] > Mobile no.
: []
[2013/08/19|19:19:55.133500UTC][05776][DATA ][User::traceDetails] > Email.
: []
[2013/08/19|19:19:55.133500UTC][05776][DATA ][User::traceDetails] > Domain
: [master]
[2013/08/19|19:19:55.149125UTC][05776][DATA ][User::traceDetails] > Org Unit
: []
[2013/08/19|19:19:55.149125UTC][05776][DATA ][User::traceDetails] > LDAP DN
: []
[2013/08/19|19:19:55.149125UTC][05776][DATA ][User::traceDetails] > Local Auth
: [Digipass/Password]
[2013/08/19|19:19:55.149125UTC][05776][DATA ][User::traceDetails] > Back End Auth
: [None]
[2013/08/19|19:19:55.180375UTC][05776][DATA ][User::traceDetails] > Offline Auth Enabled : [No]
[2013/08/19|19:19:55.196000UTC][05776][DATA ][User::traceDetails] > Use DP from UserID : []
[2013/08/19|19:19:55.196000UTC][05776][DATA ][User::traceDetails] > Use DP from domain : []
[2013/08/19|19:19:55.196000UTC][05776][DATA ][User::traceDetails] > Use DP from LDAP DN: []
[2013/08/19|19:19:55.196000UTC][05776][DATA ][User::traceDetails] > ********************
[2013/08/19|19:19:55.196000UTC][05776][DEBUG][UserChecks::adminPrivilegeCheck] > 'Privileged Users' policy setting set to
'Reject' however this user does not have administrative privileges. The admin privilege check for this user has therefore
succeeded.
[2013/08/19|19:19:55.211625UTC][05776][VINFO][LocalAuthenticationChecks::localVerification] > Length of password entered
is [6] bytes
[2013/08/19|19:19:55.211625UTC][05776][DATA ][ODBCStatement::PrepareSQL] > Prepared SQL statement "SELECT vdsDomain,
Applies to: IDENTIKEY Authentication Server 3.6
KB 160053– 22/12/2014
 2014 VASCO Data Security. All rights reserved.
Page 5 of 7
vdsSerialNo,
vdsOrgUnit,
vdsDPType,
vdsGPExpires,
vdsBVDPEnabled,
vdsBVDPExpires,
vdsBVDPUsesLeft,
vdsUserId,
vdsDPSoftParamsID, vdsActivLocs, vdsActivCount, vdsLastActivTime FROM vdsDigipass WHERE (vdsDomain = ?) AND vdsOrgUnit IS
NULL AND (vdsUserId = ?) ORDER BY vdsDomain, vdsSerialNo, vdsDPDescription"
[2013/08/19|19:19:55.211625UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 1 to string "master"
[2013/08/19|19:19:55.211625UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 2 to string "user"
[2013/08/19|19:19:55.227250UTC][05776][DATA ][ODBCResultSet::GetRowCount] > Returned row-count 1
[2013/08/19|19:19:55.242875UTC][05776][DATA
][ODBCStatement::PrepareSQL]
>
Prepared
SQL
statement
"SELECT
vdsDPApplication.vdsSerialNo,
vdsDPApplication.vdsApplName,
vdsDPApplication.vdsApplNo,
vdsDPApplication.vdsApplType,
vdsDPApplication.vdsActive,
vdsDPApplication.vdsBlob,
vdsDigipass.vdsDomain,
vdsDigipass.vdsOrgUnit,
vdsDigipass.vdsuserid, vdsDPApplication.vdsCreateTime, vdsDPApplication.vdsModifyTime, vdsDPApplication.vdsStorageKeyID,
vdsDPApplication.vdsSensitiveKeyID FROM (vdsDPApplication INNER JOIN vdsDigipass
ON (vdsDPApplication.vdsSerialNo =
vdsDigipass.vdsSerialNo))
WHERE
(vdsDPApplication.vdsSerialNo
=
?)
ORDER
BY
vdsDPApplication.vdsSerialNo,
vdsDPApplication.vdsApplName"
[2013/08/19|19:19:55.242875UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 1 to string "0091234582"
[2013/08/19|19:19:55.258500UTC][05776][DATA ][ODBCResultSet::GetRowCount] > Returned row-count 1
[2013/08/19|19:19:55.258500UTC][05776][INFO ][vasco::CryptoEngine::storageDecrypt] > Decrypting digipass Blob.
[2013/08/19|19:19:55.258500UTC][05776][INFO ][vasco::CryptoEngine::storageDecrypt] > Decrypting digipass Blob.
[2013/08/19|19:19:55.274125UTC][05776][DATA ][vasco::CryptoEngine::decryptWithEmbeddedProvider] > Decrypt the content
using embedded crypto provider.
[2013/08/19|19:19:55.274125UTC][05776][VINFO][SoftwareCryptoBase::preDecryptProcess] > First 2 byte of cipher text 0x[00]
0x[0A]
[2013/08/19|19:19:55.274125UTC][05776][DATA ][SoftwareCryptoBase::custom_aes128cbc_key_derive] > Block size for aes is
[16]
[2013/08/19|19:19:55.274125UTC][05776][DATA ][vasco::CryptoEngine::decryptWithEmbeddedProvider] > Data is decrypted using
embedded crypto provider.
[2013/08/19|19:19:55.289750UTC][05776][DATA ][Digipass::traceDetails] > *** Digipass Details ***
[2013/08/19|19:19:55.289750UTC][05776][DATA ][Digipass::traceDetails] > Serial No.
: [0091234582]
[2013/08/19|19:19:55.289750UTC][05776][DATA ][Digipass::traceDetails] > Domin
: [master]
[2013/08/19|19:19:55.289750UTC][05776][DATA ][Digipass::traceDetails] > Org Unit
: []
[2013/08/19|19:19:55.289750UTC][05776][DATA ][Digipass::traceDetails] > LDAP DN
: []
[2013/08/19|19:19:55.289750UTC][05776][DATA ][Digipass::traceDetails] > Backup VDP Enabled : [No]
[2013/08/19|19:19:55.305375UTC][05776][DATA ][Digipass::traceDetails] > Grace Period Expiry : [2013/08/19]
[2013/08/19|19:19:55.305375UTC][05776][DATA ][Digipass::traceDetails] > Backup VDP Expiry
: []
[2013/08/19|19:19:55.305375UTC][05776][DATA ][Digipass::traceDetails] > Backup VDP Uses Left: []
[2013/08/19|19:19:55.305375UTC][05776][DATA ][Digipass::traceDetails] > ************************
[2013/08/19|19:19:55.305375UTC][05776][DATA ][CryptoKeyLoader::getKeyData] > key [SSMINSTALLSTORAGEKEY] found in the cache
[2013/08/19|19:19:55.305375UTC][05776][INFO ][CryptoKeyDataFactory::createSSMStorageDataKey] > SSM Storage Crypto Key Data
object is created.
[2013/08/19|19:19:55.321000UTC][05776][DATA ][CryptoKeyLoader::getKeyData] > key [SSMINSTALLSTORAGEKEY] found in the cache
[2013/08/19|19:19:55.321000UTC][05776][INFO ][CryptoKeyDataFactory::createSSMStorageDataKey] > SSM Storage Crypto Key Data
object is created.
[2013/08/19|19:19:55.321000UTC][05776][INFO ][DigipassAppl::verifyPlainTextOTPCombined] > Combined parameters.
[2013/08/19|19:19:55.336625UTC][05776][DATA ][CryptoKeyLoader::getKeyData] > key [SSMINSTALLSTORAGEKEY] found in the cache
[2013/08/19|19:19:55.336625UTC][05776][INFO ][CryptoKeyDataFactory::createSSMStorageDataKey] > SSM Storage Crypto Key Data
object is created.
[2013/08/19|19:19:55.336625UTC][05776][MAJOR][DigipassAppl::verifyPlainTextOTPCombined] > Password length too short
[2013/08/19|19:19:55.336625UTC][05776][INFO ][Digipass::verifyResponse] > Serial 0091234582 Application APPLI 1 OTP
Incorrect - Password length too short We get a respose too small error because we did not give the PIN.
[2013/08/19|19:19:55.352250UTC][05776][INFO ][Digipass::verifyResponse] > Failed to verify response for serial number
0091234582 application APPLI 1
[2013/08/19|19:19:55.352250UTC][05776][INFO ][DigipassList::verifyResponse] > Response verification has failed for
digipass 0091234582
[2013/08/19|19:19:55.352250UTC][05776][DEBUG][LocalAuthenticationChecks::doResponseChecking] > There was no definite One
Time Password in the credentials
[2013/08/19|19:19:55.367875UTC][05776][DEBUG][LocalAuthenticationChecks::doResponseChecking] > One or more DIGIPASS are
outside of grace period
[2013/08/19|19:19:55.367875UTC][05776][DATA ][CryptoKeyLoader::getKeyData] > key [SSMINSTALLSTORAGEKEY] found in the cache
[2013/08/19|19:19:55.367875UTC][05776][INFO ][CryptoKeyDataFactory::createSSMStorageDataKey] > SSM Storage Crypto Key Data
object is created.
[2013/08/19|19:19:55.367875UTC][05776][VINFO][LocalAuthenticationChecks::isAnyTriggerPassword] >
A
challenge
request
method is 'password', but no DIGIPASS of the correct type was found
[2013/08/19|19:19:55.399125UTC][05776][VINFO][LocalAuthenticationChecks::doResponseChecking]
>
Set
localAuthState
to
[Definite Fail]
[2013/08/19|19:19:55.399125UTC][05776][ALERT][LocalAuthenticationChecks::verifyStaticPassword] > Incorrect static password
[2013/08/19|19:19:55.399125UTC][05776][INFO
][LocalAuthenticationChecks::verifyStaticPassword]
>
Password
failed
verification with stored password
[2013/08/19|19:19:55.399125UTC][05776][INFO ][AuthenticateRequest::dbUpdate] > Fast authentication is <false>
[2013/08/19|19:19:55.414750UTC][05776][INFO ][DigipassList::update] > Updating 1 digipasses.
[2013/08/19|19:19:55.414750UTC][05776][VINFO][AuthenticateRequest::dbUpdate] > User's lock count is now [3]
[2013/08/19|19:19:55.414750UTC][05776][ALERT][AuthenticateRequest::dbUpdate] > User's account is now locked! Account is
now locked due to too maily failed attempts
[2013/08/19|19:19:55.414750UTC][05776][DEBUG][ODBCConnection::TransactionStart] > Starting transaction
[2013/08/19|19:19:55.430375UTC][05776][DATA ][ODBCStatement::PrepareSQL] > Prepared SQL statement "UPDATE vdsUser SET
vdsLockCount = ?, vdsLocked = ?, vdsModifyTime = ? WHERE (vdsDomain = ?) AND (vdsUserId = ?)"
[2013/08/19|19:19:55.430375UTC][05776][DATA ][ODBCStatement::BindInteger] > Bound parameter 1 to integer 0
[2013/08/19|19:19:55.430375UTC][05776][DATA ][ODBCStatement::BindInteger] > Bound parameter 2 to integer 1
[2013/08/19|19:19:55.430375UTC][05776][DATA ][ODBCStatement::BindTimeStamp] > Bound parameter 3 to timestamp Mon Aug 19
19:19:55 2013
[2013/08/19|19:19:55.446000UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 4 to string "master"
[2013/08/19|19:19:55.446000UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 5 to string "user"
[2013/08/19|19:19:55.446000UTC][05776][DATA ][ODBCResultSet::GetRowCount] > Returned row-count 1
[2013/08/19|19:19:55.461625UTC][05776][DATA ][ODBCStatement::PrepareSQL] > Prepared SQL statement "SELECT vdsDomain,
vdsUserId, vdsOrgUnit, vdsUserName, vdsDescription, vdsPhone, vdsMobile, vdsEmail, vdsStaticPwd, vdsLinkUserDomain,
vdsLinkUserId,
vdsLocalAuth,
vdsBackEndAuth,
vdsLockCount,
vdsLocked,
vdsDisabled,
vdsAdminPrivileges,
vdsOfflineAuthEnabled, vdsLastPwdSetTime, vdsStaticPwdHistory, vdsKeyID, vdsCreateTime, vdsModifyTime, vdsLastAuthTime,
vdsExpirationTime FROM vdsUser WHERE (vdsDomain = ?) AND (vdsUserId = ?) ORDER BY vdsDomain, vdsUserId, vdsOrgUnit"
[2013/08/19|19:19:55.461625UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 1 to string "master"
[2013/08/19|19:19:55.461625UTC][05776][DATA ][ODBCStatement::BindString] > Bound parameter 2 to string "user"
[2013/08/19|19:19:55.508500UTC][05776][DATA ][ODBCResultSet::GetRowCount] > Returned row-count 1
[2013/08/19|19:19:55.555375UTC][05776][DEBUG][ODBCConnection::TransactionCommit] > Committed transaction
[2013/08/19|19:19:55.555375UTC][05776][INFO ][AuthenticateRequest::generateResponse] > Set status code [1012], message
[The One Time Password failed validation]
[2013/08/19|19:19:55.555375UTC][05776][INFO ][adt_record] > Audit: {Warning} {Authentication} {W-011003} {A DIGIPASS User
Account has become locked.} {0x2F34EFCA518DE78F1B1E629A2CB2C9F4}
[2013/08/19|19:19:55.571000UTC][05776][INFO ][adt_record] > Audit: {Source Location:192.168.17.95, User ID:user,
Domain:master, Client Location:10.1.1.101, Client Type:RADIUS Client}
[2013/08/19|19:19:55.571000UTC][05776][VINFO][Distributor::acquireConnection] > Node.Connector allocated
[2013/08/19|19:19:55.586625UTC][05776][VINFO][Distributor::releaseConnection] > Node.Connector released
[2013/08/19|19:19:55.602250UTC][05776][MAJOR][alert_record] > plugin not initialized
[2013/08/19|19:19:55.664750UTC][05776][INFO
][adt_record]
>
Audit:
{Failure}
{Authentication}
{F-002001}
{User
authentication failed.} {0xA72E591E609AB4B0CF58987232D6618B}
Applies to: IDENTIKEY Authentication Server 3.6
KB 160053– 22/12/2014
 2014 VASCO Data Security. All rights reserved.
Page 6 of 7
[2013/08/19|19:19:55.680375UTC][05776][INFO ][adt_record] > Audit: {Source Location:192.168.17.95, Policy ID:Identikey
Local Authentication, User ID:user, Domain:master, Input Details:
{User ID : user@master}
{Password : ********}
{Raw User ID : 0x75736572406D6173746572}
{Password Format : 0}
{Protocol ID : RADIUS}
{Protocol Specific Data : 0xC0A81101E7CA0850172110214174142063541626427246}, Output Details:
{Status Message : The One Time Password failed validation}
{Auxiliary Message :
{Error Code: '(1012)' ; Error Message: 'Password length too short'}
{Error Code: '(1012)' ; Error Message: 'Serial 0091234582 Application APPLI 1 OTP Incorrect - Password length too short'}
{Error Code: '(1011)' ; Error Message: 'Incorrect static password'}}
{Notification that a user has a token assigned : ********}, Local Authentication:yes, Back-End Authentication:None,
Reason:The One Time Password failed validation, Client Location:10.1.1.101, Client Type:RADIUS Client}
[2013/08/19|19:19:55.696000UTC][05776][VINFO][Distributor::acquireConnection] > Node.Connector allocated
[2013/08/19|19:19:55.742875UTC][05776][VINFO][Distributor::releaseConnection] > Node.Connector released
[2013/08/19|19:19:55.742875UTC][05776][MAJOR][alert_record] > plugin not initialized
[2013/08/19|19:19:55.742875UTC][05776][INFO ][AuthenticateRequest::execute] > User authentication request - exit state
[Denied]
[2013/08/19|19:19:55.742875UTC][05776][MAJOR][AuthenticateUserCommand::execute]
>
===
Error
Stack
=========================
[2013/08/19|19:19:55.758500UTC][05776][MAJOR][AuthenticateUserCommand::execute] > Error code: <1011> Error message:
<Incorrect static password>
[2013/08/19|19:19:55.774125UTC][05776][MAJOR][AuthenticateUserCommand::execute] > Error code: <1012> Error message:
<Serial 0091234582 Application APPLI 1 OTP Incorrect - Password length too short>
[2013/08/19|19:19:55.774125UTC][05776][MAJOR][AuthenticateUserCommand::execute] > Error code: <1012> Error message:
<Password length too short>
[2013/08/19|19:19:55.789750UTC][05776][MAJOR][AuthenticateUserCommand::execute]
>
===
End
of
Error
Stack
==================
[2013/08/19|19:19:55.789750UTC][05776][VINFO][RADIUSLayer::dispatchCommandTask] > No response found in request cache,
generating response packet locally.
[2013/08/19|19:19:55.789750UTC][05776][VINFO][RADIUSLayer::dispatchCommandTask] > Auth action (based on command results)
is: 'ERROR'.
[2013/08/19|19:19:55.789750UTC][05776][INFO ][adt_record] > Audit: {Info} {RADIUS} {I-007003} {A RADIUS Access-Reject has
been issued.} {0xFE7CFBA7C9EB1E3BB4F55695C1E96FE0}
[2013/08/19|19:19:55.805375UTC][05776][INFO
][adt_record]
>
Audit:
{Client
Location:192.168.17.1:51943,
Source
Location:192.168.17.95, Request ID:8, Password Protocol:PAP, Output Details:RADIUS Code:1, RADIUS Id:8, , UserName:user@master, NAS-IP-Address:10.1.1.101, NAS-Port:1, NAS-Identifier:Vasco Radius Simulator, User-Password:********,
Calling-Station-Id:13080, Reason:Authentication processing error}
[2013/08/19|19:19:55.805375UTC][05776][VINFO][Distributor::acquireConnection] > Node.Connector allocated
[2013/08/19|19:19:55.899125UTC][05776][VINFO][Distributor::releaseConnection] > Node.Connector released
[2013/08/19|19:19:55.899125UTC][05776][MAJOR][alert_record] > plugin not initialized
As you can see from the log file, the OTP verification did not succeed. The problem
here is the response too small (because we forgot to enter the pin). We also see that
the user is not locked.
When you have error messages in your full trace file it is always advised to search the
KB articles. Problems that are recurrent are often addressed in a KB article.
Applies to: IDENTIKEY Authentication Server 3.6
KB 160053– 22/12/2014
 2014 VASCO Data Security. All rights reserved.
Page 7 of 7

Similar documents