Posted by:
admin
9 years ago
This morning I saw a tweet from Johnny Long about them being in hole $2,700 due to unexpected baggage fees. As long time admirers we decided it was time to do something. So, we gave $100 and committed to giving $100 per evaluation certificate created between now and Thanksgiving. No one wants to go into Thanksgiving in the hole.
We are going to make it extra, extra easy for y'all to set up WiKID server and get an evaluation cert. We have created a Virtual Box OVA. Just download the image and use the quick-start configuration file to get an evaluation cert in three steps.
First, download this special WiKID virtual box image. (md5: 65434003098404ef5a348dc6ff4c3b89). It is configured for Bridged Networking. You can change that, but it is best if the server can get out and back to our certificate server.
Login as root/wikid. (Typically you would get prompted to change that, but since we bundled this up as vbox image, you won't.) Run ifconfig to see your IP address. Now, copy the quick config file:
cp /opt/WiKID/conf/sample-quick-setup.properties wikid.conf
Then edit wikid.conf. Change the IP address and the domaincode to your zero-padded IP (that is 192.168.50.2 is 192168050002). Everything else is optional for our purposes (you making us give money away). Change the hostname to HFC.something. Run:
# wikidctl quick-setup configfile=wikid.conf
And that's it. You should have created a cert. Ping us via twitter if you want to remind us.
Run:
# wikidctl start
When prompted for the passphrase, enter 'protectme' unless you edited the config file. You can now browse to https://yourip/WiKIDAdmin and see the server if you like. If you actually created a radius network client then all you need to do is register a token to a user and test.
Happy Holidays.
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)