I've attached what seems to be the relevant part of the radius debug log. Is
ther an issue processing the backslashes?
________________________________
From: Fabrice Durand [mailto:[email protected]]
Sent: Saturday, June 29, 2013 1:25 PM
To: [email protected]
Subject: Re: [PacketFence-users] 802.1x device identifier
Hello Tom,
launch radius in debug mode to see what happen.
Regards
Fabrice
Le 2013-06-27 14:25, Tom Fischer a écrit :
I have PFZEN 4.0.1 running in a test environment. I have PF
authenticating Windows wireless workstations via 802.1x with VLAN enforcement.
The connections are working fine, but the identifier/owner is always logged as
admin. Radius appears to be sending the username, but I don't see PF picking it
up. Is there something I need to change?
Radius log
Thu Jun 27 12:09:41 2013 : Auth: Login OK: [DD\\myname] (from client
a.b.c.d port 8551 cli 0090.4b78.ffff via TLS tunnel)
Thu Jun 27 12:09:43 2013 : Auth: rlm_perl: Returning vlan 1 to request
from 00:90:4b:78:92:70 port 8551
Thu Jun 27 12:09:43 2013 : Auth: Login OK: [DD\\myname] (from client
a.b.c.d port 8551 cli 0090.4b78.ffff)
Packetfence log
Jun 27 12:09:42 pf::WebAPI(7869) INFO: handling radius autz request:
from switch_ip => a.b.c.d, connection_type => Wireless-802.11-EAP mac =>
00:90:4b:78:ff:ff, port => 8551, username => (pf::radius::authorize)
Jun 27 12:09:42 pf::WebAPI(7869) INFO: node 00:90:4b:78:ff:ff does not
yet exist in database. Adding it now (pf::radius::authorize)
Jun 27 12:09:43 pf::WebAPI(7869) INFO: MAC: 00:90:4b:78:ff:ff, PID:
admin, Status: reg. Returned VLAN: 1 (pf::vlan::fetchVlanForNode)
------------------------------------------------------------------------------
This SF.net email is sponsored by Windows:
Build for Windows Store.
http://p.sf.net/sfu/windows-dev2dev
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
++[eap] returns ok
Login OK: [DD\\myname] (from client aa.bb.cc.dd port 9656 cli 0090.4b78.9270
via TLS tunnel)
# Executing section post-auth from file
/usr/local/pf/raddb//sites-enabled/packetfence-tunnel
+- entering group post-auth {...}
++[exec] returns noop
rlm_perl: Returning vlan 1 to request from 00:90:4b:78:92:70 port 9656
rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK)
rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
rlm_perl: Added pair Service-Type = Login-User
rlm_perl: Added pair Called-Station-Id = 0022.90b3.9501
rlm_perl: Added pair State = 0x6eb0af076fb9b5a319b2951250aba871
rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1
rlm_perl: Added pair EAP-Type = MS-CHAP-V2
rlm_perl: Added pair NAS-IP-Address = aa.bb.cc.dd
rlm_perl: Added pair NAS-Port-Id = 9656
rlm_perl: Added pair Calling-Station-Id = 0090.4b78.9270
rlm_perl: Added pair Cisco-AVPair = ssid=OGWN
rlm_perl: Added pair User-Name = DD\\myname
rlm_perl: Added pair NAS-Identifier = ap
rlm_perl: Added pair EAP-Message = 0x020900061a03
rlm_perl: Added pair NAS-Port = 9656
rlm_perl: Added pair WISPr-Location-Name = 3rd floor Conf RM
rlm_perl: Added pair Framed-MTU = 1400
rlm_perl: Added pair MS-MPPE-Send-Key = 0x91fe569be750d8ddc75e67c901a790d5
rlm_perl: Added pair MS-MPPE-Encryption-Types = 0x00000004
rlm_perl: Added pair Tunnel-Type = 13
rlm_perl: Added pair Tunnel-Medium-Type = 6
rlm_perl: Added pair MS-MPPE-Encryption-Policy = 0x00000002
rlm_perl: Added pair Message-Authenticator = 0x00000000000000000000000000000000
rlm_perl: Added pair Tunnel-Private-Group-ID = 1
rlm_perl: Added pair User-Name = DD\\myname
rlm_perl: Added pair MS-MPPE-Recv-Key = 0x123968c6e8f1df6463eeabbd0abfa12d
rlm_perl: Added pair EAP-Message = 0x03090004
rlm_perl: Added pair Auth-Type = EAP
++[packetfence] returns ok
} # server packetfence-tunnel
[peap] Got tunneled reply code 2
MS-MPPE-Send-Key = 0x91fe569be750d8ddc75e67c901a790d5
MS-MPPE-Encryption-Types = 0x00000004
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
MS-MPPE-Encryption-Policy = 0x00000002
Message-Authenticator = 0x00000000000000000000000000000000
Tunnel-Private-Group-Id:0 = "1"
User-Name = "DD\\myname"
MS-MPPE-Recv-Key = 0x123968c6e8f1df6463eeabbd0abfa12d
EAP-Message = 0x03090004
[peap] Got tunneled reply RADIUS code 2
MS-MPPE-Send-Key = 0x91fe569be750d8ddc75e67c901a790d5
MS-MPPE-Encryption-Types = 0x00000004
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
MS-MPPE-Encryption-Policy = 0x00000002
Message-Authenticator = 0x00000000000000000000000000000000
Tunnel-Private-Group-Id:0 = "1"
User-Name = "DD\\myname"
MS-MPPE-Recv-Key = 0x123968c6e8f1df6463eeabbd0abfa12d
EAP-Message = 0x03090004
[peap] Tunneled authentication was successful.
[peap] SUCCESS
[peap] Saving tunneled attributes for later
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 54 to aa.bb.cc.dd port 1645
EAP-Message =
0x010a00261900170301001ba1ade799e99e0dac17d3075727a9ea7a939e3f653a20ef8e31a407
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x1fb7bb5d18bda2d828d16a40d72634da
Finished request 8.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host aa.bb.cc.dd port 1645, id=55,
length=218
User-Name = "DD\\myname"
Framed-MTU = 1400
Called-Station-Id = "0022.90b3.9501"
Calling-Station-Id = "0090.4b78.9270"
Cisco-AVPair = "ssid=OGWN"
WISPr-Location-Name = "3rd floor Conf RM"
Service-Type = Login-User
Message-Authenticator = 0xb0634449be5374f075866f26b076a0f0
EAP-Message =
0x020a00261900170301001bd6df60a39b2f686e64df6edb387c430fbc9ef9ced32c515da151c5
NAS-Port-Type = Wireless-802.11
NAS-Port = 9656
NAS-Port-Id = "9656"
State = 0x1fb7bb5d18bda2d828d16a40d72634da
NAS-IP-Address = aa.bb.cc.dd
NAS-Identifier = "ap"
server packetfence {
# Executing section authorize from file
/usr/local/pf/raddb//sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "DD\myname", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 10 length 38
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] Peap state send tlv success
[peap] Received EAP-TLV response.
[peap] Success
[peap] Using saved attributes from the original Access-Accept
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "1"
User-Name = "DD\\myname"
[eap] Freeing handler
++[eap] returns ok
Login OK: [DD\\myname] (from client aa.bb.cc.dd port 9656 cli 0090.4b78.9270)
# Executing section post-auth from file
/usr/local/pf/raddb//sites-enabled/packetfence
+- entering group post-auth {...}
++[exec] returns noop
++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25))
? Evaluating !(EAP-Type ) -> FALSE
?? Evaluating (EAP-Type != 21 ) -> TRUE
?? Evaluating (EAP-Type != 25) -> FALSE
++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) -> FALSE
} # server packetfence
Sending Access-Accept of id 55 to aa.bb.cc.dd port 1645
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "1"
User-Name = "DD\\myname"
MS-MPPE-Recv-Key =
0x746a2e6f91c251cc562568568fad807911f08a187609629f28486efe6a407071
MS-MPPE-Send-Key =
0x162efb2c74592e7375f9f8655a614dd83bda03221d1a5ddf1478361c09e11b71
EAP-Message = 0x030a0004
Message-Authenticator = 0x00000000000000000000000000000000
Finished request 9.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Accounting-Request packet from host aa.bb.cc.dd port 1646, id=63,
length=247
Acct-Session-Id = "0000260C"
Called-Station-Id = "0022.90b3.9501"
Calling-Station-Id = "0090.4b78.9270"
Cisco-AVPair = "ssid=OGWN"
Cisco-AVPair = "vlan-id=1"
Cisco-AVPair = "nas-location=3rd floor Conf RM"
WISPr-Location-Name = "3rd floor Conf RM"
User-Name = "DD\\myname"
Cisco-AVPair = "connect-progress=Call Up"
Acct-Authentic = RADIUS
Acct-Status-Type = Start
NAS-Port-Type = Wireless-802.11
NAS-Port = 9656
NAS-Port-Id = "9656"
Service-Type = Framed-User
NAS-IP-Address = aa.bb.cc.dd
Acct-Delay-Time = 0
server packetfence {
# Executing section preacct from file
/usr/local/pf/raddb//sites-enabled/packetfence
+- entering group preacct {...}
++[preprocess] returns ok
[acct_unique] Hashing 'NAS-Port = 9656,Client-IP-Address =
aa.bb.cc.dd,NAS-IP-Address = aa.bb.cc.dd,Acct-Session-Id = "0000260C",User-Name
= "DD\\myname"'
[acct_unique] Acct-Unique-Session-ID = "9323b0c43bc08a24".
++[acct_unique] returns ok
[suffix] No '@' in User-Name = "DD\myname", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[files] returns noop
# Executing section accounting from file
/usr/local/pf/raddb//sites-enabled/packetfence
+- entering group accounting {...}
[sql] expand: %{User-Name} -> DD\myname
[sql] sql_set_user escaped user --> 'DD\myname'
[sql] expand: %{Acct-Delay-Time} -> 0
[sql] expand: CALL acct_start ( '%{Acct-Session-Id}',
'%{Acct-Unique-Session-Id}', '%{SQL-User-Name}',
'%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}',
'%S', NULL, '0', '%{Acct-Authentic}', '%{Connect-Info}',
'', '0', '0',
REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '',
'%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}',
'%{%{Acct-Delay-Time}:-0}', '0', '%{X-Ascend-Session-Svr-Key}',
'%{Acct-Status-Type}') -> CALL acct_start ( '0000260C',
'9323b0c43bc08a24', 'OG=5Cmyname', '', 'aa.bb.cc.dd',
'9656', 'Wireless-802.11', '2013-07-01 16:12:35', NULL,
'0', 'RADIUS', '', '', '0', '0',
REPLACE(REPLACE('0022.90b3.9501','-',''),':',''),
REPLACE(REPLACE('0090.4b78.9270','-',''),':',''), '',
'Framed-User', '', '
rlm_sql (sql): Reserving sql socket id: 3
rlm_sql (sql): Released sql socket id: 3
++[sql] returns ok
[attr_filter.accounting_response] expand: %{User-Name} -> DD\myname
attr_filter: Matched entry DEFAULT at line 12
++[attr_filter.accounting_response] returns updated
} # server packetfence
Sending Accounting-Response of id 63 to aa.bb.cc.dd port 1646
Finished request 10.
Cleaning up request 10 ID 63 with timestamp +12
Going to the next request
Waking up in 4.8 seconds.
------------------------------------------------------------------------------
This SF.net email is sponsored by Windows:
Build for Windows Store.
http://p.sf.net/sfu/windows-dev2dev
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users