Hi Derek,
Yes I did restart the services (service packetfence restart) and after
receiving your question, I also rebooted the system. Still no
PACKETFENCE DEBUGGING.
Should this line appear in packetfence.log or radiusd debug mode? Should
I enable DEBUG or trace in log.conf?
This is what I now have in Aironet_WDS.pm file (only the extractSsid
function)
# Same as in pf::SNMP::Cisco::Aironet. Please keep both in sync. Once
Moose push in a role.
sub extractSsid {
my ($self, $radius_request) = @_;
my $logger = Log::Log4perl::get_logger(__PACKAGE__);
use Data::Dumper;
$logger->info("PACKETFENCE DEBUGGING: " . Dump($radius_request));
if (defined($radius_request->{'Cisco-AVPair'})) {
if ($radius_request->{'Cisco-AVPair'} =~ /^ssid=(.*)$/) { # ex:
Cisco-AVPair = "ssid=PacketFence-Secure"
return $1;
} else {
$logger->info("Unable to extract SSID of Cisco-AVPair:
".$radius_request->{'Cisco-AVPair'});
}
}
$logger->warn(
"Unable to extract SSID for module " . ref($self) . ".
SSID-based VLAN assignments won't work. "
. "Make sure you enable Vendor Specific Attributes (VSA) on the
AP if you want them to work."
);
return;
}
Pedro.
Em 20-09-2013 13:55, Derek Wuelfrath escreveu:
> Pedro,
>
> Have you restarted PacketFence after adding the lines, cause I don't see the
> PACKETFENCE DEBUGGING line in the logs.
>
> Derek
>
> --
> Derek Wuelfrath
> dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected] :: +1.514.447.4918
> (x110) :: www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
> (www.packetfence.org)
>
> On 2013-09-20, at 6:02 AM, Pedro Tavares
> <[email protected]> wrote:
>
>>
>>
>>
>> Hello Derek,
>>
>> Thank you for your help on this.
>>
>> I've done as you instructed and here are the logs (packetfence.log and
>> radiusd -X)
>>
>> Hopefully those are the relevant logs :)
>>
>> Best regards,
>>
>> Pedro
>>
>>
>> ####Packetfence.log
>>
>>
>> Sep 20 09:34:40 pf::WebAPI(8473) INFO: handling radius autz request:
>> from switch_ip => 192.168.69.244, connection_type =>
>> Wireless-802.11-NoEAP mac => 04:46:65:5a:f9:d5, port => 333, username =>
>> 0446655af9d5 (pf::radius::authorize)
>> Sep 20 09:34:40 pf::WebAPI(8473) WARN: Unable to extract SSID for module
>> pf::SNMP::Cisco::Aironet_1250. SSID-based VLAN assignments won't work.
>> Make sure you enable Vendor Specific Attributes (VSA) on the AP if you
>> want them to work. (pf::SNMP::Cisco::Aironet::extractSsid)
>> Sep 20 09:34:41 pf::WebAPI(8473) INFO: highest priority violation for
>> 04:46:65:5a:f9:d5 is 1200001. Target VLAN for violation: registration
>> (11) (pf::vlan::getViolationVlan)
>> Sep 20 09:34:41 pf::WebAPI(8473) WARN: Role-based Network Access Control
>> is not supported on network device type pf::SNMP::Cisco::Aironet_1250.
>> (pf::SNMP::supportsRoleBasedEnforcement)
>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: DHCPOFFER from 10.10.150.1
>> (00:1d:09:f0:64:26) to host 04:46:65:5a:f9:d5 (10.10.150.10)
>> (main::parse_dhcp_offer)
>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: DHCPREQUEST from
>> 04:46:65:5a:f9:d5 (10.10.150.10) (main::parse_dhcp_request)
>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: could not resolve
>> 10.10.150.10 to mac in ARP table (pf::iplog::ip2macinarp)
>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: resolved 10.10.150.10 to mac
>> (04:46:65:5a:f9:d5) in ARP table (pf::iplog::ip2macinarp)
>> Sep 20 09:34:49 pfdhcplistener(8540) INFO: oldip (192.168.70.10) and
>> newip (10.10.150.10) are different for 04:46:65:5a:f9:d5 - closing iplog
>> entry (main::update_iplog)
>> Sep 20 09:34:50 pfdhcplistener(8540) INFO: 04:46:65:5a:f9:d5 requested
>> an IP. DHCP Fingerprint: OS::1112 (Samsung Android). Modified node with
>> last_dhcp = 2013-09-20 09:34:50,computername =
>> android-cfbfb835f3c74cd4,dhcp_fingerprint = 1,33,3,6,15,28,51,58,59
>> (main::listen_dhcp)
>>
>>
>>
>> Radiusd -X -d /usr/local/pf/raddb
>>
>> [root@pfense bin]# radiusd -X -d /usr/local/pf/raddb/
>> FreeRADIUS Version 2.2.0, for host x86_64-unknown-linux-gnu, built on
>> Oct 18 2012 at 13:58:38
>> Copyright (C) 1999-2012 The FreeRADIUS server project and contributors.
>> There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
>> PARTICULAR PURPOSE.
>> You may redistribute copies of FreeRADIUS under the terms of the
>> GNU General Public License v2.
>> Starting - reading configuration files ...
>> including configuration file /usr/local/pf/raddb//radiusd.conf
>> including configuration file /usr/local/pf/raddb//proxy.conf
>> including configuration file /usr/local/pf/raddb//clients.conf
>> including files in directory /usr/local/pf/raddb//modules/
>> including configuration file /usr/local/pf/raddb//modules/always
>> including configuration file /usr/local/pf/raddb//modules/pap
>> including configuration file /usr/local/pf/raddb//modules/unix
>> including configuration file /usr/local/pf/raddb//modules/mschap
>> including configuration file
>> /usr/local/pf/raddb//modules/sqlcounter_expire_on_login
>> including configuration file /usr/local/pf/raddb//modules/realm
>> including configuration file /usr/local/pf/raddb//modules/otp
>> including configuration file /usr/local/pf/raddb//modules/ntlm_auth
>> including configuration file /usr/local/pf/raddb//modules/counter
>> including configuration file /usr/local/pf/raddb//modules/checkval
>> including configuration file /usr/local/pf/raddb//modules/inner-eap
>> including configuration file /usr/local/pf/raddb//modules/soh
>> including configuration file /usr/local/pf/raddb//modules/pam
>> including configuration file /usr/local/pf/raddb//modules/mac2vlan
>> including configuration file /usr/local/pf/raddb//modules/acct_unique
>> including configuration file /usr/local/pf/raddb//modules/expiration
>> including configuration file /usr/local/pf/raddb//modules/smsotp
>> including configuration file /usr/local/pf/raddb//modules/etc_group
>> including configuration file /usr/local/pf/raddb//modules/preprocess
>> including configuration file /usr/local/pf/raddb//modules/perl
>> including configuration file /usr/local/pf/raddb//modules/ippool
>> including configuration file /usr/local/pf/raddb//modules/sql_log
>> including configuration file /usr/local/pf/raddb//modules/wimax
>> including configuration file /usr/local/pf/raddb//modules/chap
>> including configuration file /usr/local/pf/raddb//modules/digest
>> including configuration file /usr/local/pf/raddb//modules/rediswho
>> including configuration file /usr/local/pf/raddb//modules/detail
>> including configuration file /usr/local/pf/raddb//modules/logintime
>> including configuration file /usr/local/pf/raddb//modules/detail.log
>> including configuration file /usr/local/pf/raddb//modules/ldap
>> including configuration file /usr/local/pf/raddb//modules/echo
>> including configuration file /usr/local/pf/raddb//modules/mac2ip
>> including configuration file /usr/local/pf/raddb//modules/attr_rewrite
>> including configuration file /usr/local/pf/raddb//modules/policy
>> including configuration file /usr/local/pf/raddb//modules/radutmp
>> including configuration file /usr/local/pf/raddb//modules/smbpasswd
>> including configuration file /usr/local/pf/raddb//modules/expr
>> including configuration file /usr/local/pf/raddb//modules/attr_filter
>> including configuration file /usr/local/pf/raddb//modules/replicate
>> including configuration file /usr/local/pf/raddb//modules/sradutmp
>> including configuration file /usr/local/pf/raddb//modules/redis
>> including configuration file /usr/local/pf/raddb//modules/linelog
>> including configuration file /usr/local/pf/raddb//modules/detail.example.com
>> including configuration file /usr/local/pf/raddb//modules/passwd
>> including configuration file /usr/local/pf/raddb//modules/dynamic_clients
>> including configuration file /usr/local/pf/raddb//modules/cui
>> including configuration file /usr/local/pf/raddb//modules/files
>> including configuration file /usr/local/pf/raddb//modules/exec
>> including configuration file /usr/local/pf/raddb//modules/opendirectory
>> including configuration file /usr/local/pf/raddb//eap.conf
>> including configuration file /usr/local/pf/raddb//sql.conf
>> including configuration file /usr/local/pf/raddb//sql/mysql/packetfence.conf
>> including configuration file /usr/local/pf/raddb//policy.conf
>> including files in directory /usr/local/pf/raddb//sites-enabled/
>> including configuration file /usr/local/pf/raddb//sites-enabled/default
>> including configuration file /usr/local/pf/raddb//sites-enabled/packetfence
>> including configuration file
>> /usr/local/pf/raddb//sites-enabled/packetfence-soh
>> including configuration file
>> /usr/local/pf/raddb//sites-enabled/control-socket
>> including configuration file
>> /usr/local/pf/raddb//sites-enabled/packetfence-tunnel
>> including configuration file /usr/local/pf/raddb//sites-enabled/inner-tunnel
>> main {
>> user = "pf"
>> group = "pf"
>> allow_core_dumps = no
>> }
>> including dictionary file /usr/local/pf/raddb//dictionary
>> main {
>> name = "radiusd"
>> prefix = "/usr"
>> localstatedir = "/usr/local/pf/var"
>> sbindir = "/usr/sbin"
>> logdir = "/usr/local/pf/logs"
>> run_dir = "/usr/local/pf/var/run"
>> libdir = "/usr/lib/freeradius"
>> radacctdir = "/usr/local/pf/logs/radacct"
>> hostname_lookups = no
>> max_request_time = 30
>> cleanup_delay = 5
>> max_requests = 1024
>> pidfile = "/usr/local/pf/var/run/radiusd.pid"
>> checkrad = "/usr/sbin/checkrad"
>> debug_level = 0
>> proxy_requests = yes
>> log {
>> stripped_names = no
>> auth = yes
>> auth_badpass = no
>> auth_goodpass = no
>> }
>> security {
>> max_attributes = 200
>> reject_delay = 1
>> status_server = yes
>> }
>> }
>> radiusd: #### Loading Realms and Home Servers ####
>> proxy server {
>> retry_delay = 5
>> retry_count = 3
>> default_fallback = no
>> dead_time = 120
>> wake_all_if_all_dead = no
>> }
>> home_server localhost {
>> ipaddr = 127.0.0.1
>> port = 1812
>> type = "auth"
>> secret = "XXXXXXXXX:REMOVED"
>> response_window = 20
>> max_outstanding = 65536
>> require_message_authenticator = yes
>> zombie_period = 40
>> status_check = "status-server"
>> ping_interval = 30
>> check_interval = 30
>> num_answers_to_alive = 3
>> num_pings_to_alive = 3
>> revive_interval = 120
>> status_check_timeout = 4
>> coa {
>> irt = 2
>> mrt = 16
>> mrc = 5
>> mrd = 30
>> }
>> }
>> home_server_pool my_auth_failover {
>> type = fail-over
>> home_server = localhost
>> }
>> realm example.com {
>> auth_pool = my_auth_failover
>> }
>> realm LOCAL {
>> }
>> radiusd: #### Loading Clients ####
>> client localhost {
>> ipaddr = 127.0.0.1
>> require_message_authenticator = no
>> secret = "XXXXXXXXX:REMOVED"
>> nastype = "other"
>> }
>> radiusd: #### Instantiating modules ####
>> instantiate {
>> Module: Linked to module rlm_exec
>> Module: Instantiating module "exec" from file
>> /usr/local/pf/raddb//modules/exec
>> exec {
>> wait = no
>> input_pairs = "request"
>> shell_escape = yes
>> }
>> Module: Linked to module rlm_expr
>> Module: Instantiating module "expr" from file
>> /usr/local/pf/raddb//modules/expr
>> Module: Linked to module rlm_expiration
>> Module: Instantiating module "expiration" from file
>> /usr/local/pf/raddb//modules/expiration
>> expiration {
>> reply-message = "Password Has Expired "
>> }
>> Module: Linked to module rlm_logintime
>> Module: Instantiating module "logintime" from file
>> /usr/local/pf/raddb//modules/logintime
>> logintime {
>> reply-message = "You are calling outside your allowed timespan "
>> minimum-timeout = 60
>> }
>> }
>> radiusd: #### Loading Virtual Servers ####
>> server { # from file /usr/local/pf/raddb//radiusd.conf
>> modules {
>> Module: Creating Auth-Type = digest
>> Module: Creating Post-Auth-Type = REJECT
>> Module: Checking authenticate {...} for more modules to load
>> Module: Linked to module rlm_pap
>> Module: Instantiating module "pap" from file
>> /usr/local/pf/raddb//modules/pap
>> pap {
>> encryption_scheme = "auto"
>> auto_header = no
>> }
>> Module: Linked to module rlm_chap
>> Module: Instantiating module "chap" from file
>> /usr/local/pf/raddb//modules/chap
>> Module: Linked to module rlm_mschap
>> Module: Instantiating module "mschap" from file
>> /usr/local/pf/raddb//modules/mschap
>> mschap {
>> use_mppe = yes
>> require_encryption = yes
>> require_strong = no
>> with_ntdomain_hack = yes
>> ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key
>> --username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}
>> --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-response:-00}"
>> allow_retry = yes
>> }
>> Module: Linked to module rlm_digest
>> Module: Instantiating module "digest" from file
>> /usr/local/pf/raddb//modules/digest
>> Module: Linked to module rlm_unix
>> Module: Instantiating module "unix" from file
>> /usr/local/pf/raddb//modules/unix
>> unix {
>> radwtmp = "/usr/local/pf/logs/radwtmp"
>> }
>> Module: Linked to module rlm_eap
>> Module: Instantiating module "eap" from file /usr/local/pf/raddb//eap.conf
>> eap {
>> default_eap_type = "peap"
>> timer_expire = 60
>> ignore_unknown_eap_types = no
>> cisco_accounting_username_bug = no
>> max_sessions = 2048
>> }
>> Module: Linked to sub-module rlm_eap_md5
>> Module: Instantiating eap-md5
>> Module: Linked to sub-module rlm_eap_tls
>> Module: Instantiating eap-tls
>> tls {
>> rsa_key_exchange = no
>> dh_key_exchange = yes
>> rsa_key_length = 512
>> dh_key_length = 512
>> verify_depth = 0
>> pem_file_type = yes
>> private_key_file = "/usr/local/pf/conf/ssl/server.key"
>> certificate_file = "/usr/local/pf/conf/ssl/server.crt"
>> dh_file = "/usr/local/pf/raddb//certs/dh"
>> random_file = "/dev/urandom"
>> fragment_size = 1024
>> include_length = yes
>> check_crl = no
>> cipher_list = "DEFAULT"
>> make_cert_command = "/usr/local/pf/raddb//certs/bootstrap"
>> cache {
>> enable = no
>> lifetime = 24
>> max_entries = 255
>> }
>> verify {
>> }
>> ocsp {
>> enable = no
>> override_cert_url = yes
>> url = "http://127.0.0.1/ocsp/"
>> use_nonce = yes
>> timeout = 0
>> softfail = no
>> }
>> }
>> Module: Linked to sub-module rlm_eap_ttls
>> Module: Instantiating eap-ttls
>> ttls {
>> default_eap_type = "md5"
>> copy_request_to_tunnel = yes
>> use_tunneled_reply = yes
>> virtual_server = "packetfence-tunnel"
>> include_length = yes
>> }
>> Module: Linked to sub-module rlm_eap_peap
>> Module: Instantiating eap-peap
>> peap {
>> default_eap_type = "mschapv2"
>> copy_request_to_tunnel = yes
>> use_tunneled_reply = yes
>> proxy_tunneled_request_as_eap = yes
>> virtual_server = "packetfence-tunnel"
>> soh = no
>> }
>> Module: Linked to sub-module rlm_eap_mschapv2
>> Module: Instantiating eap-mschapv2
>> mschapv2 {
>> with_ntdomain_hack = no
>> send_error = no
>> }
>> Module: Checking authorize {...} for more modules to load
>> Module: Linked to module rlm_preprocess
>> Module: Instantiating module "preprocess" from file
>> /usr/local/pf/raddb//modules/preprocess
>> preprocess {
>> huntgroups = "/usr/local/pf/raddb//huntgroups"
>> hints = "/usr/local/pf/raddb//hints"
>> with_ascend_hack = no
>> ascend_channels_per_line = 23
>> with_ntdomain_hack = no
>> with_specialix_jetstream_hack = no
>> with_cisco_vsa_hack = no
>> with_alvarion_vsa_hack = no
>> }
>> reading pairlist file /usr/local/pf/raddb//huntgroups
>> reading pairlist file /usr/local/pf/raddb//hints
>> Module: Linked to module rlm_realm
>> Module: Instantiating module "suffix" from file
>> /usr/local/pf/raddb//modules/realm
>> realm suffix {
>> format = "suffix"
>> delimiter = "@"
>> ignore_default = no
>> ignore_null = no
>> }
>> Module: Linked to module rlm_files
>> Module: Instantiating module "files" from file
>> /usr/local/pf/raddb//modules/files
>> files {
>> usersfile = "/usr/local/pf/raddb//users"
>> acctusersfile = "/usr/local/pf/raddb//acct_users"
>> preproxy_usersfile = "/usr/local/pf/raddb//preproxy_users"
>> compat = "no"
>> }
>> reading pairlist file /usr/local/pf/raddb//users
>> reading pairlist file /usr/local/pf/raddb//acct_users
>> reading pairlist file /usr/local/pf/raddb//preproxy_users
>> Module: Checking preacct {...} for more modules to load
>> Module: Linked to module rlm_acct_unique
>> Module: Instantiating module "acct_unique" from file
>> /usr/local/pf/raddb//modules/acct_unique
>> acct_unique {
>> key = "User-Name, Acct-Session-Id, NAS-IP-Address,
>> Client-IP-Address, NAS-Port"
>> }
>> Module: Checking accounting {...} for more modules to load
>> Module: Linked to module rlm_detail
>> Module: Instantiating module "detail" from file
>> /usr/local/pf/raddb//modules/detail
>> detail {
>> detailfile =
>> "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
>> header = "%t"
>> detailperm = 384
>> dirperm = 493
>> locking = no
>> log_packet_header = no
>> }
>> Module: Linked to module rlm_radutmp
>> Module: Instantiating module "radutmp" from file
>> /usr/local/pf/raddb//modules/radutmp
>> radutmp {
>> filename = "/usr/local/pf/logs/radutmp"
>> username = "%{User-Name}"
>> case_sensitive = yes
>> check_with_nas = yes
>> perm = 384
>> callerid = yes
>> }
>> Module: Linked to module rlm_attr_filter
>> Module: Instantiating module "attr_filter.accounting_response" from
>> file /usr/local/pf/raddb//modules/attr_filter
>> attr_filter attr_filter.accounting_response {
>> attrsfile = "/usr/local/pf/raddb//attrs.accounting_response"
>> key = "%{User-Name}"
>> relaxed = no
>> }
>> reading pairlist file /usr/local/pf/raddb//attrs.accounting_response
>> Module: Checking session {...} for more modules to load
>> Module: Checking post-proxy {...} for more modules to load
>> Module: Checking post-auth {...} for more modules to load
>> Module: Instantiating module "attr_filter.access_reject" from file
>> /usr/local/pf/raddb//modules/attr_filter
>> attr_filter attr_filter.access_reject {
>> attrsfile = "/usr/local/pf/raddb//attrs.access_reject"
>> key = "%{User-Name}"
>> relaxed = no
>> }
>> reading pairlist file /usr/local/pf/raddb//attrs.access_reject
>> } # modules
>> } # server
>> server packetfence { # from file
>> /usr/local/pf/raddb//sites-enabled/packetfence
>> modules {
>> Module: Checking authenticate {...} for more modules to load
>> Module: Checking authorize {...} for more modules to load
>> Module: Linked to module rlm_perl
>> Module: Instantiating module "packetfence" from file
>> /usr/local/pf/raddb//modules/perl
>> perl packetfence {
>> module = "/usr/local/pf/raddb//packetfence.pm"
>> func_authorize = "authorize"
>> func_authenticate = "authenticate"
>> func_accounting = "accounting"
>> func_preacct = "preacct"
>> func_checksimul = "checksimul"
>> func_detach = "detach"
>> func_xlat = "xlat"
>> func_pre_proxy = "pre_proxy"
>> func_post_proxy = "post_proxy"
>> func_post_auth = "post_auth"
>> func_recv_coa = "recv_coa"
>> func_send_coa = "send_coa"
>> }
>> Module: Checking preacct {...} for more modules to load
>> Module: Checking accounting {...} for more modules to load
>> Module: Linked to module rlm_sql
>> Module: Instantiating module "sql" from file /usr/local/pf/raddb//sql.conf
>> sql {
>> driver = "rlm_sql_mysql"
>> server = "localhost"
>> port = "3306"
>> login = "pf"
>> password = "XXXXXXXXX:REMOVED"
>> radius_db = "pf"
>> read_groups = yes
>> sqltrace = no
>> sqltracefile = "/usr/local/pf/logs/sqltrace.sql"
>> readclients = yes
>> deletestalesessions = yes
>> num_sql_socks = 5
>> lifetime = 0
>> max_queries = 0
>> sql_user_name = "%{User-Name}"
>> default_user_profile = ""
>> nas_query = "SELECT id, nasname, shortname, type, secret FROM
>> radius_nas"
>> authorize_check_query = "SELECT id, username, attribute, value,
>> op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
>> authorize_reply_query = "SELECT id, username, attribute, value,
>> op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
>> authorize_group_check_query = "SELECT id, groupname, attribute,
>> Value, op FROM radgroupcheck WHERE groupname = '%{Sql-Group}'ORDER BY id"
>> authorize_group_reply_query = "SELECT id, groupname, attribute,
>> value, op FROM radgroupreply WHERE groupname = '%{Sql-Group}'ORDER BY id"
>> accounting_onoff_query = "UPDATE radacct SET acctstoptime='%S',
>> acctsessiontime = unix_timestamp('%S') - unix_timestamp(acctstarttime),
>> acctterminatecause = '%{Acct-Terminate-Cause}', acctstopdelay =
>> %{%{Acct-Delay-Time}:-0} WHERE acctstoptime IS NULL AND nasipaddress =
>> '%{NAS-IP-Address}' AND acctstarttime <= '%S'"
>> accounting_update_query = "CALL acct_update ('%S',
>> '%{Acct-Session-Time}','%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Ac
>> ct-Input-Octets}:-0}',
>> '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Ac
>> ct-Output-Octets}:-0}','%{Acct-Session-Id}', '%{SQL-User-Name}' ,
>> '%{NAS-IP-Address}', '%{Framed-IP-Address}', '%{Acct-Status-Type}')"
>> accounting_update_query_alt = "INSERT INTO
>> radacct(acctsessionid, acctuniqueid, username,
>> realm, nasipaddress, nasportid,
>> nasporttype, acctstarttime, acctsessiontime,
>> acctauthentic, connectinfo_start, acctinputoctets, acctoutputoctets,
>> calledstationid, callingstationid, servicetype, framedprotocol,
>> framedipaddress, acctstartdelay, xascendsessionsvrkey) VALUES
>> ('%{Acct-Session-Id}',
>> '%{Acct-Unique-Session-Id}','%{SQL-User-Name}','%{Realm}',
>> '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}',
>> DATE_SUB('%S',INTERVAL (%{%{Acct-Session-Time}:-0} +
>> %{%{Acct-Delay-Time}:-0}) SECOND), '%{Acct-Session-Time}',
>> '%{Acct-Authentic}', '', '%{%{Acct-Input-Gigawords}:-0}' << 32 |
>> '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 |
>> '%{%{Acct-Output-Octets}:-0}',
>> REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
>> REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''),
>> '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0',
>> '%{X-Ascend-Session-Svr-Key}')"
>> accounting_start_query = "CALL acct_start
>> ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}',
>> '%{SQL-User-Name}', '%{Realm}',
>> '%{NAS-IP-Address}', '%{NAS-Port}','%{NAS-Port-Type}', '%S', NULL, '0',
>> '%{Acct-Authentic}', '%{Connect-Info}',
>> '', '0', '0',
>> REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
>> REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '',
>> '%{Service-Type}', '%{Framed-Protocol}',
>> '%{Framed-IP-Address}','%{%{Acct-Delay-Time}:-0}', '0',
>> '%{X-Ascend-Session-Svr-Key}', '%{Acct-Status-Type}')"
>> accounting_start_query_alt = "UPDATE radacct SET acctstarttime
>> = '%S', acctstartdelay = '%{%{Acct-Delay-Time
>> }:-0}', connectinfo_start =
>> '%{Connect-Info}' WHERE acctsessionid = '%{Acct-Session-Id}'AND
>> username = '%{SQL-User-Name}' AND nasipaddress =
>> '%{NAS-IP-Address}'"
>> accounting_stop_query = "CALL acct_stop
>> ('%S','%{Acct-Session-Time}','%{%{Acct-Input-Gigawords}:-0}' <<
>> 32 | '%{%{Acct-Input-Octets}:-0}',
>> '%{%{Acct-Output-Gigawords}:-0}' << 32 |
>> '%{%{Acct-Output-Octets}:-0}', '%{Acct-Terminate-Cause}',
>> '%{%{Acct-Delay-Time}:-0}', '%{Connect-Info}', '%{Acct-Session-Id}',
>> '%{SQL-User-Name}', '%{NAS-IP-Address}', '%{Acct-Status-Type}')"
>> accounting_stop_query_alt = "INSERT INTO radacct(acctsessionid,
>> acctuniqueid, username, realm, nasipaddress, naspor tid, nasporttype,
>> acctstarttime, acctstoptime, acctsessiontime, acctauthentic,
>> connectinfo_start, connectinfo_stop, acctinputoctets,
>> acctoutputoctets,calledstationid, callingstationid, acctterminatecause,
>> servicetype, framedprotocol, framedipaddress, acctstartdelay,
>> acctstopdelay) VALUES ('%{Acct-Session-Id}',
>> '%{Acct-Unique-Session-Id}','%{SQL-User-Name}', '%{Realm}',
>> '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S',
>> INTERVAL (%{%{Acct-Session-Time}:-0} + %{%{Acct-Delay-Time}:-0})
>> SECOND), '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '',
>> '%{Connect-Info}', '%{%{Acct-Input-Gigawords}:-0}' << 32 |
>> '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 |
>> '%{%{Acct-Output-Octets}:-0}',
>> REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
>> REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':', ''),
>> '%{Acct-Terminate-Cause}', '%{Service-Type}', '%{Framed-Protocol}',
>> '%{Framed-IP-Address}', '0', '%{%{Acct-Delay-Time}:-0}')"
>> group_membership_query = "SELECT groupname FROM radusergroup
>> WHERE username = '%{SQL-User-Name}' ORDER BY priority"
>> connect_failure_retry_delay = 60
>> simul_count_query = ""
>> simul_verify_query = "SELECT radacctid, acctsessionid,
>> username, nasipaddress, nasportid, framedipaddress, callingstationid,
>> framedprotocol FROM radacct WHERE username = '%{SQL-User-Name}' AND
>> acctstoptime IS NULL"
>> postauth_query = "INSERT INTO radpostauth(username, pass,
>> reply, authdate) VALUES
>> ('%{User-Name}','%{%{User-Password}:-%{Chap-Password}}','%{reply:Packet-Type}',
>> '%S')"
>> safe-characters =
>> "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
>> }
>> rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
>> rlm_sql (sql): Attempting to connect to pf@localhost:3306/pf
>> rlm_sql (sql): starting 0
>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #0
>> rlm_sql_mysql: Starting connect to MySQL server for #0
>> rlm_sql (sql): Connected new DB handle, #0
>> rlm_sql (sql): starting 1
>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #1
>> rlm_sql_mysql: Starting connect to MySQL server for #1
>> rlm_sql (sql): Connected new DB handle, #1
>> rlm_sql (sql): starting 2
>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #2
>> rlm_sql_mysql: Starting connect to MySQL server for #2
>> rlm_sql (sql): Connected new DB handle, #2
>> rlm_sql (sql): starting 3
>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #3
>> rlm_sql_mysql: Starting connect to MySQL server for #3
>> rlm_sql (sql): Connected new DB handle, #3
>> rlm_sql (sql): starting 4
>> rlm_sql (sql): Attempting to connect rlm_sql_mysql #4
>> rlm_sql_mysql: Starting connect to MySQL server for #4
>> rlm_sql (sql): Connected new DB handle, #4
>> rlm_sql (sql): Processing generate_sql_clients
>> rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname,
>> shortname, type, secret FROM radius_nas
>> rlm_sql (sql): Reserving sql socket id: 4
>> rlm_sql (sql): Read entry
>> nasname=192.168.69.244,shortname=192.168.69.244,secret=XXXXXXXXX:REMOVED
>> rlm_sql (sql): Adding client 192.168.69.244 (192.168.69.244,
>> server=<none>) to clients list
>> rlm_sql (sql): Read entry
>> nasname=192.168.69.246,shortname=192.168.69.246,secret=XXXXXXXXX:REMOVED
>> rlm_sql (sql): Adding client 192.168.69.246 (192.168.69.246,
>> server=<none>) to clients list
>> rlm_sql (sql): Released sql socket id: 4
>> Module: Checking post-proxy {...} for more modules to load
>> Module: Checking post-auth {...} for more modules to load
>> } # modules
>> } # server
>> server soh-server { # from file
>> /usr/local/pf/raddb//sites-enabled/packetfence-soh
>> modules {
>> Module: Checking authorize {...} for more modules to load
>> Module: Instantiating module "packetfence-soh" from file
>> /usr/local/pf/raddb//modules/perl
>> perl packetfence-soh {
>> module = "/usr/local/pf/raddb//packetfence-soh.pm"
>> func_authorize = "authorize"
>> func_authenticate = "authenticate"
>> func_accounting = "accounting"
>> func_preacct = "preacct"
>> func_checksimul = "checksimul"
>> func_detach = "detach"
>> func_xlat = "xlat"
>> func_pre_proxy = "pre_proxy"
>> func_post_proxy = "post_proxy"
>> func_post_auth = "post_auth"
>> func_recv_coa = "recv_coa"
>> func_send_coa = "send_coa"
>> }
>> } # modules
>> } # server
>> server packetfence-tunnel { # from file
>> /usr/local/pf/raddb//sites-enabled/packetfence-tunnel
>> modules {
>> Module: Checking authenticate {...} for more modules to load
>> Module: Checking authorize {...} for more modules to load
>> Module: Instantiating module "ntdomain" from file
>> /usr/local/pf/raddb//modules/realm
>> realm ntdomain {
>> format = "prefix"
>> delimiter = "\"
>> ignore_default = no
>> ignore_null = no
>> }
>> Module: Checking session {...} for more modules to load
>> Module: Checking post-proxy {...} for more modules to load
>> Module: Checking post-auth {...} for more modules to load
>> } # modules
>> } # server
>> server inner-tunnel { # from file
>> /usr/local/pf/raddb//sites-enabled/inner-tunnel
>> modules {
>> Module: Checking authenticate {...} for more modules to load
>> Module: Checking authorize {...} for more modules to load
>> Module: Checking session {...} for more modules to load
>> Module: Checking post-proxy {...} for more modules to load
>> Module: Checking post-auth {...} for more modules to load
>> } # modules
>> } # server
>> radiusd: #### Opening IP addresses and Ports ####
>> listen {
>> type = "auth"
>> virtual_server = "packetfence"
>> ipaddr = 192.168.69.247
>> port = 0
>> }
>> listen {
>> type = "acct"
>> virtual_server = "packetfence"
>> ipaddr = 192.168.69.247
>> port = 0
>> }
>> listen {
>> type = "control"
>> listen {
>> socket = "/usr/local/pf/var/run/radiusd.sock"
>> mode = "rw"
>> }
>> }
>> listen {
>> type = "auth"
>> ipaddr = 127.0.0.1
>> port = 18120
>> }
>> ... adding new socket proxy address * port 56024
>> Listening on authentication address 192.168.69.247 port 1812 as server
>> packetfence
>> Listening on accounting address 192.168.69.247 port 1813 as server
>> packetfence
>> Listening on command file /usr/local/pf/var/run/radiusd.sock
>> Listening on authentication address 127.0.0.1 port 18120 as server
>> inner-tunnel
>> Listening on proxy address 192.168.69.247 port 1814
>> Ready to process requests.
>> rad_recv: Access-Request packet from host 192.168.69.244 port 1645,
>> id=185, length=173
>> User-Name = "0446655af9d5"
>> User-Password = "0446655af9d5"
>> Called-Station-Id = "00-23-5E-B0-38-00"
>> Calling-Station-Id = "04-46-65-5A-F9-D5"
>> Cisco-AVPair = "ssid=TWGuest"
>> Service-Type = Login-User
>> Cisco-AVPair = "service-type=Login"
>> NAS-Port-Type = Wireless-802.11
>> NAS-Port = 333
>> NAS-Port-Id = "333"
>> NAS-IP-Address = 192.168.69.244
>> NAS-Identifier = "wifi02"
>> server packetfence {
>> # Executing section authorize from file
>> /usr/local/pf/raddb//sites-enabled/packetfence
>> +- entering group authorize {...}
>> [suffix] No '@' in User-Name = "0446655af9d5", looking up realm NULL
>> [suffix] No such realm "NULL"
>> ++[suffix] returns noop
>> ++[preprocess] returns ok
>> [eap] No EAP-Message, not doing EAP
>> ++[eap] returns noop
>> [files] users: Matched entry DEFAULT at line 1
>> ++[files] returns ok
>> ++[expiration] returns noop
>> ++[logintime] returns noop
>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
>> rlm_perl: Added pair Service-Type = Login-User
>> rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5
>> rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00
>> rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest
>> rlm_perl: Added pair Cisco-AVPair = service-type=Login
>> rlm_perl: Added pair User-Name = 0446655af9d5
>> rlm_perl: Added pair NAS-Identifier = wifi02
>> rlm_perl: Added pair User-Password = 0446655af9d5
>> rlm_perl: Added pair NAS-IP-Address = 192.168.69.244
>> rlm_perl: Added pair NAS-Port = 333
>> rlm_perl: Added pair NAS-Port-Id = 333
>> rlm_perl: Added pair Auth-Type = Accept
>> ++[packetfence] returns noop
>> Found Auth-Type = Accept
>> Auth-Type = Accept, accepting the user
>> Login OK: [0446655af9d5] (from client 192.168.69.244 port 333 cli
>> 04-46-65-5A-F9-D5)
>> # Executing section post-auth from file
>> /usr/local/pf/raddb//sites-enabled/packetfence
>> +- entering group post-auth {...}
>> ++[exec] returns noop
>> ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25))
>> ? Evaluating !(EAP-Type ) -> TRUE
>> ?? Skipping (EAP-Type != 21 )
>> ?? Skipping (EAP-Type != 25)
>> ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) -> TRUE
>> ++- entering if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) {...}
>> rlm_perl: Returning vlan 11 to request from 04:46:65:5a:f9:d5 port 333
>> rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK)
>> rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
>> rlm_perl: Added pair Service-Type = Login-User
>> rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00
>> rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5
>> rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest
>> rlm_perl: Added pair Cisco-AVPair = service-type=Login
>> rlm_perl: Added pair User-Name = 0446655af9d5
>> rlm_perl: Added pair NAS-Identifier = wifi02
>> rlm_perl: Added pair User-Password = 0446655af9d5
>> rlm_perl: Added pair NAS-Port = 333
>> rlm_perl: Added pair NAS-IP-Address = 192.168.69.244
>> rlm_perl: Added pair NAS-Port-Id = 333
>> rlm_perl: Added pair Tunnel-Private-Group-ID = 11
>> rlm_perl: Added pair Tunnel-Type = 13
>> rlm_perl: Added pair Tunnel-Medium-Type = 6
>> rlm_perl: Added pair Auth-Type = Accept
>> +++[packetfence] returns ok
>> ++- if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) returns ok
>> } # server packetfence
>> Sending Access-Accept of id 185 to 192.168.69.244 port 1645
>> Tunnel-Private-Group-Id:0 = "11"
>> Tunnel-Type:0 = VLAN
>> Tunnel-Medium-Type:0 = IEEE-802
>> Finished request 0.
>> Going to the next request
>> Waking up in 4.9 seconds.
>> rad_recv: Access-Request packet from host 192.168.69.244 port 1645,
>> id=185, length=173
>> Sending duplicate reply to client 192.168.69.244 port 1645 - ID: 185
>> Sending Access-Accept of id 185 to 192.168.69.244 port 1645
>> Waking up in 4.9 seconds.
>> Cleaning up request 0 ID 185 with timestamp +13
>> Ready to process requests.
>>
>>
>>
>> Em 19-09-2013 14:51, Derek Wuelfrath escreveu:
>>> Hello Pedro
>>>
>>> Can you edit the /usr/local/pf/lib/SNMP/Cisco/Aironet_WDS.pm file and
>>> add the following:
>>>
>>> in sub extractSsid, just after the "my $logger … " line (at line 204 if
>>> you use latest version of PacketFence), add the following two lines
>>>
>>> use Data::Dumper;
>>> $logger->info("PACKETFENCE DEBUGGING: " . Dump($radius_request));
>>>
>>> Then, restart PacketFence and retry. Paste the relevant log output.
>>>
>>> Cheers!
>>> dw.
>>>
>>> --
>>> Derek Wuelfrath
>>> dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected]
>>> <mailto:dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected]>
>>> ::
>>> +1.514.447.4918 (x110) :: www.inverse.ca <http://www.inverse.ca/>
>>> Inverse inc. :: Leaders behind SOGo (www.sogo.nu <http://www.sogo.nu/>)
>>> and PacketFence (www.packetfence.org <http://www.packetfence.org/>)
>>>
>>> On 2013-09-17, at 5:33 AM, "Pedro, Tavares"
>>> <pltavares-re5jqeeqqe8avxtiumwx3w-xmd5yjdbdmrexy1tmh2...@public.gmane.org
>>> <mailto:pltavares-re5jqeeqqe8avxtiumwx3w-xmd5yjdbdmrexy1tmh2...@public.gmane.org>>
>>> wrote:
>>>
>>>> Hello all.
>>>> Regarding this issue, I've been searching for a while and I did found
>>>> others reporting similar issues (same errors in logs) but for some
>>>> reason didn't apply to my case.
>>>> The environment
>>>> PF is in Vlan enforcement mode. Although it's working, I'm aware
>>>> that's not the best configuration. I'm still learning :)
>>>> Native Vlan = 1
>>
>>
>>
>>
>>
>> ------------------------------------------------------------------------------
>> LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
>> 1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint
>> 2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack
>> includes
>> Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13.
>> http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
>> _______________________________________________
>> PacketFence-users mailing list
>> packetfence-users-5nwgofrqmnerv+lv9mx5uipxlwaov...@public.gmane.org
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
> ------------------------------------------------------------------------------
> LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
> 1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint
> 2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack includes
> Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13.
> http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
>
------------------------------------------------------------------------------
LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint
2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack includes
Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13.
http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users