Hello

I think i have a similar problem with a Cisco Aironet SAP2602i.
I use your debug instruction in Aironet.pm.
Cisco-AVPair return an array instead a string.

(pf::SNMP::Cisco::Aironet::extractSsid)
Sep 23 10:44:47 pf::WebAPI(9316) WARN: Radius Request: $VAR1 = {
          'NAS-Port-Type' => 'Wireless-802.11',
          'Service-Type' => 'Login-User',
          'Cisco-NAS-Port' => '1220',
          'Calling-Station-Id' => '2020.7a8e.c9db',
          'Called-Station-Id' => '0c69.03ca.76d0',
          'Cisco-AVPair' => [
                            'ssid=TEST',
                            'service-type=Login'
                          ],
          'User-Name' => '20207a8ec9db',
          'User-Password' => '20207a8ec9db',
          'NAS-IP-Address' => '192.168.XX.XX',
          'NAS-Port' => '1220',
          'NAS-Port-Id' => '1220',
          'WISPr-Location-Name' => 'SALLE DE TESTS'
        };

If I fix the function to read the first line of the table the test works for my new AP but of course not for my oldest AP.

Fabrice

Le 20/09/2013 14:55, Derek Wuelfrath a écrit :
Pedro,

Have you restarted PacketFence after adding the lines, cause I don't see the 
PACKETFENCE DEBUGGING line in the logs.

Derek

--
Derek Wuelfrath
[email protected] :: +1.514.447.4918 (x110) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence 
(www.packetfence.org)

On 2013-09-20, at 6:02 AM, Pedro Tavares <[email protected]> wrote:



Hello Derek,

Thank you for your help on this.

I've done as you instructed and here are the logs (packetfence.log and
radiusd -X)

Hopefully those are the relevant logs :)

Best regards,

Pedro


####Packetfence.log


Sep 20 09:34:40 pf::WebAPI(8473) INFO: handling radius autz request:
from switch_ip => 192.168.69.244, connection_type =>
Wireless-802.11-NoEAP mac => 04:46:65:5a:f9:d5, port => 333, username =>
0446655af9d5 (pf::radius::authorize)
Sep 20 09:34:40 pf::WebAPI(8473) WARN: Unable to extract SSID for module
pf::SNMP::Cisco::Aironet_1250. SSID-based VLAN assignments won't work.
Make sure you enable Vendor Specific Attributes (VSA) on the AP if you
want them to work. (pf::SNMP::Cisco::Aironet::extractSsid)
Sep 20 09:34:41 pf::WebAPI(8473) INFO: highest priority violation for
04:46:65:5a:f9:d5 is 1200001. Target VLAN for violation: registration
(11) (pf::vlan::getViolationVlan)
Sep 20 09:34:41 pf::WebAPI(8473) WARN: Role-based Network Access Control
is not supported on network device type pf::SNMP::Cisco::Aironet_1250.
(pf::SNMP::supportsRoleBasedEnforcement)
Sep 20 09:34:49 pfdhcplistener(8540) INFO: DHCPOFFER from 10.10.150.1
(00:1d:09:f0:64:26) to host 04:46:65:5a:f9:d5 (10.10.150.10)
(main::parse_dhcp_offer)
Sep 20 09:34:49 pfdhcplistener(8540) INFO: DHCPREQUEST from
04:46:65:5a:f9:d5 (10.10.150.10) (main::parse_dhcp_request)
Sep 20 09:34:49 pfdhcplistener(8540) INFO: could not resolve
10.10.150.10 to mac in ARP table (pf::iplog::ip2macinarp)
Sep 20 09:34:49 pfdhcplistener(8540) INFO: resolved 10.10.150.10 to mac
(04:46:65:5a:f9:d5) in ARP table (pf::iplog::ip2macinarp)
Sep 20 09:34:49 pfdhcplistener(8540) INFO: oldip (192.168.70.10) and
newip (10.10.150.10) are different for 04:46:65:5a:f9:d5 - closing iplog
entry (main::update_iplog)
Sep 20 09:34:50 pfdhcplistener(8540) INFO: 04:46:65:5a:f9:d5 requested
an IP. DHCP Fingerprint: OS::1112 (Samsung Android). Modified node with
last_dhcp = 2013-09-20 09:34:50,computername =
android-cfbfb835f3c74cd4,dhcp_fingerprint = 1,33,3,6,15,28,51,58,59
(main::listen_dhcp)



Radiusd -X -d /usr/local/pf/raddb

[root@pfense bin]# radiusd -X -d /usr/local/pf/raddb/
FreeRADIUS Version 2.2.0, for host x86_64-unknown-linux-gnu, built on
Oct 18 2012 at 13:58:38
Copyright (C) 1999-2012 The FreeRADIUS server project and contributors.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License v2.
Starting - reading configuration files ...
including configuration file /usr/local/pf/raddb//radiusd.conf
including configuration file /usr/local/pf/raddb//proxy.conf
including configuration file /usr/local/pf/raddb//clients.conf
including files in directory /usr/local/pf/raddb//modules/
including configuration file /usr/local/pf/raddb//modules/always
including configuration file /usr/local/pf/raddb//modules/pap
including configuration file /usr/local/pf/raddb//modules/unix
including configuration file /usr/local/pf/raddb//modules/mschap
including configuration file
/usr/local/pf/raddb//modules/sqlcounter_expire_on_login
including configuration file /usr/local/pf/raddb//modules/realm
including configuration file /usr/local/pf/raddb//modules/otp
including configuration file /usr/local/pf/raddb//modules/ntlm_auth
including configuration file /usr/local/pf/raddb//modules/counter
including configuration file /usr/local/pf/raddb//modules/checkval
including configuration file /usr/local/pf/raddb//modules/inner-eap
including configuration file /usr/local/pf/raddb//modules/soh
including configuration file /usr/local/pf/raddb//modules/pam
including configuration file /usr/local/pf/raddb//modules/mac2vlan
including configuration file /usr/local/pf/raddb//modules/acct_unique
including configuration file /usr/local/pf/raddb//modules/expiration
including configuration file /usr/local/pf/raddb//modules/smsotp
including configuration file /usr/local/pf/raddb//modules/etc_group
including configuration file /usr/local/pf/raddb//modules/preprocess
including configuration file /usr/local/pf/raddb//modules/perl
including configuration file /usr/local/pf/raddb//modules/ippool
including configuration file /usr/local/pf/raddb//modules/sql_log
including configuration file /usr/local/pf/raddb//modules/wimax
including configuration file /usr/local/pf/raddb//modules/chap
including configuration file /usr/local/pf/raddb//modules/digest
including configuration file /usr/local/pf/raddb//modules/rediswho
including configuration file /usr/local/pf/raddb//modules/detail
including configuration file /usr/local/pf/raddb//modules/logintime
including configuration file /usr/local/pf/raddb//modules/detail.log
including configuration file /usr/local/pf/raddb//modules/ldap
including configuration file /usr/local/pf/raddb//modules/echo
including configuration file /usr/local/pf/raddb//modules/mac2ip
including configuration file /usr/local/pf/raddb//modules/attr_rewrite
including configuration file /usr/local/pf/raddb//modules/policy
including configuration file /usr/local/pf/raddb//modules/radutmp
including configuration file /usr/local/pf/raddb//modules/smbpasswd
including configuration file /usr/local/pf/raddb//modules/expr
including configuration file /usr/local/pf/raddb//modules/attr_filter
including configuration file /usr/local/pf/raddb//modules/replicate
including configuration file /usr/local/pf/raddb//modules/sradutmp
including configuration file /usr/local/pf/raddb//modules/redis
including configuration file /usr/local/pf/raddb//modules/linelog
including configuration file /usr/local/pf/raddb//modules/detail.example.com
including configuration file /usr/local/pf/raddb//modules/passwd
including configuration file /usr/local/pf/raddb//modules/dynamic_clients
including configuration file /usr/local/pf/raddb//modules/cui
including configuration file /usr/local/pf/raddb//modules/files
including configuration file /usr/local/pf/raddb//modules/exec
including configuration file /usr/local/pf/raddb//modules/opendirectory
including configuration file /usr/local/pf/raddb//eap.conf
including configuration file /usr/local/pf/raddb//sql.conf
including configuration file /usr/local/pf/raddb//sql/mysql/packetfence.conf
including configuration file /usr/local/pf/raddb//policy.conf
including files in directory /usr/local/pf/raddb//sites-enabled/
including configuration file /usr/local/pf/raddb//sites-enabled/default
including configuration file /usr/local/pf/raddb//sites-enabled/packetfence
including configuration file
/usr/local/pf/raddb//sites-enabled/packetfence-soh
including configuration file
/usr/local/pf/raddb//sites-enabled/control-socket
including configuration file
/usr/local/pf/raddb//sites-enabled/packetfence-tunnel
including configuration file /usr/local/pf/raddb//sites-enabled/inner-tunnel
main {
         user = "pf"
         group = "pf"
         allow_core_dumps = no
}
including dictionary file /usr/local/pf/raddb//dictionary
main {
         name = "radiusd"
         prefix = "/usr"
         localstatedir = "/usr/local/pf/var"
         sbindir = "/usr/sbin"
         logdir = "/usr/local/pf/logs"
         run_dir = "/usr/local/pf/var/run"
         libdir = "/usr/lib/freeradius"
         radacctdir = "/usr/local/pf/logs/radacct"
         hostname_lookups = no
         max_request_time = 30
         cleanup_delay = 5
         max_requests = 1024
         pidfile = "/usr/local/pf/var/run/radiusd.pid"
         checkrad = "/usr/sbin/checkrad"
         debug_level = 0
         proxy_requests = yes
  log {
         stripped_names = no
         auth = yes
         auth_badpass = no
         auth_goodpass = no
  }
  security {
         max_attributes = 200
         reject_delay = 1
         status_server = yes
  }
}
radiusd: #### Loading Realms and Home Servers ####
  proxy server {
         retry_delay = 5
         retry_count = 3
         default_fallback = no
         dead_time = 120
         wake_all_if_all_dead = no
  }
  home_server localhost {
         ipaddr = 127.0.0.1
         port = 1812
         type = "auth"
         secret = "XXXXXXXXX:REMOVED"
         response_window = 20
         max_outstanding = 65536
         require_message_authenticator = yes
         zombie_period = 40
         status_check = "status-server"
         ping_interval = 30
         check_interval = 30
         num_answers_to_alive = 3
         num_pings_to_alive = 3
         revive_interval = 120
         status_check_timeout = 4
   coa {
         irt = 2
         mrt = 16
         mrc = 5
         mrd = 30
   }
  }
  home_server_pool my_auth_failover {
         type = fail-over
         home_server = localhost
  }
  realm example.com {
         auth_pool = my_auth_failover
  }
  realm LOCAL {
  }
radiusd: #### Loading Clients ####
  client localhost {
         ipaddr = 127.0.0.1
         require_message_authenticator = no
         secret = "XXXXXXXXX:REMOVED"
         nastype = "other"
  }
radiusd: #### Instantiating modules ####
  instantiate {
  Module: Linked to module rlm_exec
  Module: Instantiating module "exec" from file
/usr/local/pf/raddb//modules/exec
   exec {
         wait = no
         input_pairs = "request"
         shell_escape = yes
   }
  Module: Linked to module rlm_expr
  Module: Instantiating module "expr" from file
/usr/local/pf/raddb//modules/expr
  Module: Linked to module rlm_expiration
  Module: Instantiating module "expiration" from file
/usr/local/pf/raddb//modules/expiration
   expiration {
         reply-message = "Password Has Expired  "
   }
  Module: Linked to module rlm_logintime
  Module: Instantiating module "logintime" from file
/usr/local/pf/raddb//modules/logintime
   logintime {
         reply-message = "You are calling outside your allowed timespan  "
         minimum-timeout = 60
   }
  }
radiusd: #### Loading Virtual Servers ####
server { # from file /usr/local/pf/raddb//radiusd.conf
  modules {
   Module: Creating Auth-Type = digest
   Module: Creating Post-Auth-Type = REJECT
  Module: Checking authenticate {...} for more modules to load
  Module: Linked to module rlm_pap
  Module: Instantiating module "pap" from file
/usr/local/pf/raddb//modules/pap
   pap {
         encryption_scheme = "auto"
         auto_header = no
   }
  Module: Linked to module rlm_chap
  Module: Instantiating module "chap" from file
/usr/local/pf/raddb//modules/chap
  Module: Linked to module rlm_mschap
  Module: Instantiating module "mschap" from file
/usr/local/pf/raddb//modules/mschap
   mschap {
         use_mppe = yes
         require_encryption = yes
         require_strong = no
         with_ntdomain_hack = yes
         ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key
--username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}
--challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-response:-00}"
         allow_retry = yes
   }
  Module: Linked to module rlm_digest
  Module: Instantiating module "digest" from file
/usr/local/pf/raddb//modules/digest
  Module: Linked to module rlm_unix
  Module: Instantiating module "unix" from file
/usr/local/pf/raddb//modules/unix
   unix {
         radwtmp = "/usr/local/pf/logs/radwtmp"
   }
  Module: Linked to module rlm_eap
  Module: Instantiating module "eap" from file /usr/local/pf/raddb//eap.conf
   eap {
         default_eap_type = "peap"
         timer_expire = 60
         ignore_unknown_eap_types = no
         cisco_accounting_username_bug = no
         max_sessions = 2048
   }
  Module: Linked to sub-module rlm_eap_md5
  Module: Instantiating eap-md5
  Module: Linked to sub-module rlm_eap_tls
  Module: Instantiating eap-tls
    tls {
         rsa_key_exchange = no
         dh_key_exchange = yes
         rsa_key_length = 512
         dh_key_length = 512
         verify_depth = 0
         pem_file_type = yes
         private_key_file = "/usr/local/pf/conf/ssl/server.key"
         certificate_file = "/usr/local/pf/conf/ssl/server.crt"
         dh_file = "/usr/local/pf/raddb//certs/dh"
         random_file = "/dev/urandom"
         fragment_size = 1024
         include_length = yes
         check_crl = no
         cipher_list = "DEFAULT"
         make_cert_command = "/usr/local/pf/raddb//certs/bootstrap"
     cache {
         enable = no
         lifetime = 24
         max_entries = 255
     }
     verify {
     }
     ocsp {
         enable = no
         override_cert_url = yes
         url = "http://127.0.0.1/ocsp/";
         use_nonce = yes
         timeout = 0
         softfail = no
     }
    }
  Module: Linked to sub-module rlm_eap_ttls
  Module: Instantiating eap-ttls
    ttls {
         default_eap_type = "md5"
         copy_request_to_tunnel = yes
         use_tunneled_reply = yes
         virtual_server = "packetfence-tunnel"
         include_length = yes
    }
  Module: Linked to sub-module rlm_eap_peap
  Module: Instantiating eap-peap
    peap {
         default_eap_type = "mschapv2"
         copy_request_to_tunnel = yes
         use_tunneled_reply = yes
         proxy_tunneled_request_as_eap = yes
         virtual_server = "packetfence-tunnel"
         soh = no
    }
  Module: Linked to sub-module rlm_eap_mschapv2
  Module: Instantiating eap-mschapv2
    mschapv2 {
         with_ntdomain_hack = no
         send_error = no
    }
  Module: Checking authorize {...} for more modules to load
  Module: Linked to module rlm_preprocess
  Module: Instantiating module "preprocess" from file
/usr/local/pf/raddb//modules/preprocess
   preprocess {
         huntgroups = "/usr/local/pf/raddb//huntgroups"
         hints = "/usr/local/pf/raddb//hints"
         with_ascend_hack = no
         ascend_channels_per_line = 23
         with_ntdomain_hack = no
         with_specialix_jetstream_hack = no
         with_cisco_vsa_hack = no
         with_alvarion_vsa_hack = no
   }
reading pairlist file /usr/local/pf/raddb//huntgroups
reading pairlist file /usr/local/pf/raddb//hints
  Module: Linked to module rlm_realm
  Module: Instantiating module "suffix" from file
/usr/local/pf/raddb//modules/realm
   realm suffix {
         format = "suffix"
         delimiter = "@"
         ignore_default = no
         ignore_null = no
   }
  Module: Linked to module rlm_files
  Module: Instantiating module "files" from file
/usr/local/pf/raddb//modules/files
   files {
         usersfile = "/usr/local/pf/raddb//users"
         acctusersfile = "/usr/local/pf/raddb//acct_users"
         preproxy_usersfile = "/usr/local/pf/raddb//preproxy_users"
         compat = "no"
   }
reading pairlist file /usr/local/pf/raddb//users
reading pairlist file /usr/local/pf/raddb//acct_users
reading pairlist file /usr/local/pf/raddb//preproxy_users
  Module: Checking preacct {...} for more modules to load
  Module: Linked to module rlm_acct_unique
  Module: Instantiating module "acct_unique" from file
/usr/local/pf/raddb//modules/acct_unique
   acct_unique {
         key = "User-Name, Acct-Session-Id, NAS-IP-Address,
Client-IP-Address, NAS-Port"
   }
  Module: Checking accounting {...} for more modules to load
  Module: Linked to module rlm_detail
  Module: Instantiating module "detail" from file
/usr/local/pf/raddb//modules/detail
   detail {
         detailfile =
"/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
         header = "%t"
         detailperm = 384
         dirperm = 493
         locking = no
         log_packet_header = no
   }
  Module: Linked to module rlm_radutmp
  Module: Instantiating module "radutmp" from file
/usr/local/pf/raddb//modules/radutmp
   radutmp {
         filename = "/usr/local/pf/logs/radutmp"
         username = "%{User-Name}"
         case_sensitive = yes
         check_with_nas = yes
         perm = 384
         callerid = yes
   }
  Module: Linked to module rlm_attr_filter
  Module: Instantiating module "attr_filter.accounting_response" from
file /usr/local/pf/raddb//modules/attr_filter
   attr_filter attr_filter.accounting_response {
         attrsfile = "/usr/local/pf/raddb//attrs.accounting_response"
         key = "%{User-Name}"
         relaxed = no
   }
reading pairlist file /usr/local/pf/raddb//attrs.accounting_response
  Module: Checking session {...} for more modules to load
  Module: Checking post-proxy {...} for more modules to load
  Module: Checking post-auth {...} for more modules to load
  Module: Instantiating module "attr_filter.access_reject" from file
/usr/local/pf/raddb//modules/attr_filter
   attr_filter attr_filter.access_reject {
         attrsfile = "/usr/local/pf/raddb//attrs.access_reject"
         key = "%{User-Name}"
         relaxed = no
   }
reading pairlist file /usr/local/pf/raddb//attrs.access_reject
  } # modules
} # server
server packetfence { # from file
/usr/local/pf/raddb//sites-enabled/packetfence
  modules {
  Module: Checking authenticate {...} for more modules to load
  Module: Checking authorize {...} for more modules to load
  Module: Linked to module rlm_perl
  Module: Instantiating module "packetfence" from file
/usr/local/pf/raddb//modules/perl
   perl packetfence {
         module = "/usr/local/pf/raddb//packetfence.pm"
         func_authorize = "authorize"
         func_authenticate = "authenticate"
         func_accounting = "accounting"
         func_preacct = "preacct"
         func_checksimul = "checksimul"
         func_detach = "detach"
         func_xlat = "xlat"
         func_pre_proxy = "pre_proxy"
         func_post_proxy = "post_proxy"
         func_post_auth = "post_auth"
         func_recv_coa = "recv_coa"
         func_send_coa = "send_coa"
   }
  Module: Checking preacct {...} for more modules to load
  Module: Checking accounting {...} for more modules to load
  Module: Linked to module rlm_sql
  Module: Instantiating module "sql" from file /usr/local/pf/raddb//sql.conf
   sql {
         driver = "rlm_sql_mysql"
         server = "localhost"
         port = "3306"
         login = "pf"
         password = "XXXXXXXXX:REMOVED"
         radius_db = "pf"
         read_groups = yes
         sqltrace = no
         sqltracefile = "/usr/local/pf/logs/sqltrace.sql"
         readclients = yes
         deletestalesessions = yes
         num_sql_socks = 5
         lifetime = 0
         max_queries = 0
         sql_user_name = "%{User-Name}"
         default_user_profile = ""
         nas_query = "SELECT id, nasname, shortname, type, secret FROM
radius_nas"
         authorize_check_query = "SELECT id, username, attribute, value,
op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
         authorize_reply_query = "SELECT id, username, attribute, value,
op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
         authorize_group_check_query = "SELECT id, groupname, attribute,
Value, op FROM radgroupcheck  WHERE groupname = '%{Sql-Group}'ORDER BY id"
         authorize_group_reply_query = "SELECT id, groupname, attribute,
value, op FROM radgroupreply  WHERE groupname = '%{Sql-Group}'ORDER BY id"
         accounting_onoff_query = "UPDATE radacct SET acctstoptime='%S',
acctsessiontime =  unix_timestamp('%S') - unix_timestamp(acctstarttime),
acctterminatecause =  '%{Acct-Terminate-Cause}', acctstopdelay =
%{%{Acct-Delay-Time}:-0} WHERE acctstoptime IS NULL AND nasipaddress  =
  '%{NAS-IP-Address}' AND acctstarttime  <= '%S'"
         accounting_update_query = "CALL acct_update ('%S',
'%{Acct-Session-Time}','%{%{Acct-Input-Gigawords}:-0}'  << 32 | '%{%{Ac
                         ct-Input-Octets}:-0}',
'%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Ac
  ct-Output-Octets}:-0}','%{Acct-Session-Id}', '%{SQL-User-Name}' ,
'%{NAS-IP-Address}', '%{Framed-IP-Address}', '%{Acct-Status-Type}')"
         accounting_update_query_alt = "INSERT INTO
radacct(acctsessionid,    acctuniqueid,      username,
realm,                                     nasipaddress,      nasportid,
              nasporttype, acctstarttime,  acctsessiontime,
acctauthentic,    connectinfo_start, acctinputoctets, acctoutputoctets,
calledstationid,   callingstationid, servicetype, framedprotocol,
framedipaddress, acctstartdelay,   xascendsessionsvrkey) VALUES
('%{Acct-Session-Id}',
'%{Acct-Unique-Session-Id}','%{SQL-User-Name}','%{Realm}',
'%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}',
DATE_SUB('%S',INTERVAL (%{%{Acct-Session-Time}:-0} +
%{%{Acct-Delay-Time}:-0}) SECOND),  '%{Acct-Session-Time}',
'%{Acct-Authentic}', '',  '%{%{Acct-Input-Gigawords}:-0}' << 32 |
'%{%{Acct-Input-Octets}:-0}',   '%{%{Acct-Output-Gigawords}:-0}' << 32 |
  '%{%{Acct-Output-Octets}:-0}',
REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''),
'%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0',
'%{X-Ascend-Session-Svr-Key}')"
         accounting_start_query = "CALL acct_start
('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}',
'%{SQL-User-Name}',                                      '%{Realm}',
'%{NAS-IP-Address}', '%{NAS-Port}','%{NAS-Port-Type}', '%S', NULL, '0',
'%{Acct-Authentic}', '%{Connect-Info}',
      '', '0', '0',
REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '',
'%{Service-Type}', '%{Framed-Protocol}',
'%{Framed-IP-Address}','%{%{Acct-Delay-Time}:-0}', '0',
'%{X-Ascend-Session-Svr-Key}', '%{Acct-Status-Type}')"
         accounting_start_query_alt = "UPDATE radacct SET acctstarttime
     = '%S',              acctstartdelay    = '%{%{Acct-Delay-Time
                    }:-0}',              connectinfo_start =
'%{Connect-Info}'  WHERE acctsessionid  = '%{Acct-Session-Id}'AND
username         = '%{SQL-User-Name}' AND nasipaddress  =
'%{NAS-IP-Address}'"
         accounting_stop_query = "CALL acct_stop
('%S','%{Acct-Session-Time}','%{%{Acct-Input-Gigawords}:-0}' <<
                  32 | '%{%{Acct-Input-Octets}:-0}',
'%{%{Acct-Output-Gigawords}:-0}'                          << 32 |
'%{%{Acct-Output-Octets}:-0}', '%{Acct-Terminate-Cause}',
'%{%{Acct-Delay-Time}:-0}', '%{Connect-Info}', '%{Acct-Session-Id}',
'%{SQL-User-Name}', '%{NAS-IP-Address}', '%{Acct-Status-Type}')"
         accounting_stop_query_alt = "INSERT INTO radacct(acctsessionid,
acctuniqueid, username, realm, nasipaddress, naspor  tid,  nasporttype,
acctstarttime, acctstoptime, acctsessiontime, acctauthentic,
connectinfo_start, connectinfo_stop, acctinputoctets,
acctoutputoctets,calledstationid, callingstationid, acctterminatecause,
servicetype, framedprotocol, framedipaddress,       acctstartdelay,
acctstopdelay)  VALUES  ('%{Acct-Session-Id}',
'%{Acct-Unique-Session-Id}','%{SQL-User-Name}', '%{Realm}',
'%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S',
INTERVAL (%{%{Acct-Session-Time}:-0} +  %{%{Acct-Delay-Time}:-0})
SECOND), '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '',
'%{Connect-Info}', '%{%{Acct-Input-Gigawords}:-0}' << 32 |
'%{%{Acct-Input-Octets}:-0}',  '%{%{Acct-Output-Gigawords}:-0}' << 32 |
  '%{%{Acct-Output-Octets}:-0}',
REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':', ''),
'%{Acct-Terminate-Cause}',  '%{Service-Type}', '%{Framed-Protocol}',
'%{Framed-IP-Address}', '0', '%{%{Acct-Delay-Time}:-0}')"
         group_membership_query = "SELECT groupname FROM radusergroup
WHERE username = '%{SQL-User-Name}'           ORDER BY priority"
         connect_failure_retry_delay = 60
         simul_count_query = ""
         simul_verify_query = "SELECT radacctid, acctsessionid,
username, nasipaddress, nasportid, framedipaddress,  callingstationid,
framedprotocol  FROM radacct  WHERE username = '%{SQL-User-Name}' AND
acctstoptime IS NULL"
         postauth_query = "INSERT INTO radpostauth(username, pass,
reply, authdate)  VALUES
('%{User-Name}','%{%{User-Password}:-%{Chap-Password}}','%{reply:Packet-Type}',
'%S')"
         safe-characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
   }
rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
rlm_sql (sql): Attempting to connect to pf@localhost:3306/pf
rlm_sql (sql): starting 0
rlm_sql (sql): Attempting to connect rlm_sql_mysql #0
rlm_sql_mysql: Starting connect to MySQL server for #0
rlm_sql (sql): Connected new DB handle, #0
rlm_sql (sql): starting 1
rlm_sql (sql): Attempting to connect rlm_sql_mysql #1
rlm_sql_mysql: Starting connect to MySQL server for #1
rlm_sql (sql): Connected new DB handle, #1
rlm_sql (sql): starting 2
rlm_sql (sql): Attempting to connect rlm_sql_mysql #2
rlm_sql_mysql: Starting connect to MySQL server for #2
rlm_sql (sql): Connected new DB handle, #2
rlm_sql (sql): starting 3
rlm_sql (sql): Attempting to connect rlm_sql_mysql #3
rlm_sql_mysql: Starting connect to MySQL server for #3
rlm_sql (sql): Connected new DB handle, #3
rlm_sql (sql): starting 4
rlm_sql (sql): Attempting to connect rlm_sql_mysql #4
rlm_sql_mysql: Starting connect to MySQL server for #4
rlm_sql (sql): Connected new DB handle, #4
rlm_sql (sql): Processing generate_sql_clients
rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname,
shortname, type, secret FROM radius_nas
rlm_sql (sql): Reserving sql socket id: 4
rlm_sql (sql): Read entry
nasname=192.168.69.244,shortname=192.168.69.244,secret=XXXXXXXXX:REMOVED
rlm_sql (sql): Adding client 192.168.69.244 (192.168.69.244,
server=<none>) to clients list
rlm_sql (sql): Read entry
nasname=192.168.69.246,shortname=192.168.69.246,secret=XXXXXXXXX:REMOVED
rlm_sql (sql): Adding client 192.168.69.246 (192.168.69.246,
server=<none>) to clients list
rlm_sql (sql): Released sql socket id: 4
  Module: Checking post-proxy {...} for more modules to load
  Module: Checking post-auth {...} for more modules to load
  } # modules
} # server
server soh-server { # from file
/usr/local/pf/raddb//sites-enabled/packetfence-soh
  modules {
  Module: Checking authorize {...} for more modules to load
  Module: Instantiating module "packetfence-soh" from file
/usr/local/pf/raddb//modules/perl
   perl packetfence-soh {
         module = "/usr/local/pf/raddb//packetfence-soh.pm"
         func_authorize = "authorize"
         func_authenticate = "authenticate"
         func_accounting = "accounting"
         func_preacct = "preacct"
         func_checksimul = "checksimul"
         func_detach = "detach"
         func_xlat = "xlat"
         func_pre_proxy = "pre_proxy"
         func_post_proxy = "post_proxy"
         func_post_auth = "post_auth"
         func_recv_coa = "recv_coa"
         func_send_coa = "send_coa"
   }
  } # modules
} # server
server packetfence-tunnel { # from file
/usr/local/pf/raddb//sites-enabled/packetfence-tunnel
  modules {
  Module: Checking authenticate {...} for more modules to load
  Module: Checking authorize {...} for more modules to load
  Module: Instantiating module "ntdomain" from file
/usr/local/pf/raddb//modules/realm
   realm ntdomain {
         format = "prefix"
         delimiter = "\"
         ignore_default = no
         ignore_null = no
   }
  Module: Checking session {...} for more modules to load
  Module: Checking post-proxy {...} for more modules to load
  Module: Checking post-auth {...} for more modules to load
  } # modules
} # server
server inner-tunnel { # from file
/usr/local/pf/raddb//sites-enabled/inner-tunnel
  modules {
  Module: Checking authenticate {...} for more modules to load
  Module: Checking authorize {...} for more modules to load
  Module: Checking session {...} for more modules to load
  Module: Checking post-proxy {...} for more modules to load
  Module: Checking post-auth {...} for more modules to load
  } # modules
} # server
radiusd: #### Opening IP addresses and Ports ####
listen {
         type = "auth"
         virtual_server = "packetfence"
         ipaddr = 192.168.69.247
         port = 0
}
listen {
         type = "acct"
         virtual_server = "packetfence"
         ipaddr = 192.168.69.247
         port = 0
}
listen {
         type = "control"
  listen {
         socket = "/usr/local/pf/var/run/radiusd.sock"
         mode = "rw"
  }
}
listen {
         type = "auth"
         ipaddr = 127.0.0.1
         port = 18120
}
  ... adding new socket proxy address * port 56024
Listening on authentication address 192.168.69.247 port 1812 as server
packetfence
Listening on accounting address 192.168.69.247 port 1813 as server
packetfence
Listening on command file /usr/local/pf/var/run/radiusd.sock
Listening on authentication address 127.0.0.1 port 18120 as server
inner-tunnel
Listening on proxy address 192.168.69.247 port 1814
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.69.244 port 1645,
id=185, length=173
         User-Name = "0446655af9d5"
         User-Password = "0446655af9d5"
         Called-Station-Id = "00-23-5E-B0-38-00"
         Calling-Station-Id = "04-46-65-5A-F9-D5"
         Cisco-AVPair = "ssid=TWGuest"
         Service-Type = Login-User
         Cisco-AVPair = "service-type=Login"
         NAS-Port-Type = Wireless-802.11
         NAS-Port = 333
         NAS-Port-Id = "333"
         NAS-IP-Address = 192.168.69.244
         NAS-Identifier = "wifi02"
server packetfence {
# Executing section authorize from file
/usr/local/pf/raddb//sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "0446655af9d5", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] No EAP-Message, not doing EAP
++[eap] returns noop
[files] users: Matched entry DEFAULT at line 1
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
rlm_perl: Added pair Service-Type = Login-User
rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5
rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00
rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest
rlm_perl: Added pair Cisco-AVPair = service-type=Login
rlm_perl: Added pair User-Name = 0446655af9d5
rlm_perl: Added pair NAS-Identifier = wifi02
rlm_perl: Added pair User-Password = 0446655af9d5
rlm_perl: Added pair NAS-IP-Address = 192.168.69.244
rlm_perl: Added pair NAS-Port = 333
rlm_perl: Added pair NAS-Port-Id = 333
rlm_perl: Added pair Auth-Type = Accept
++[packetfence] returns noop
Found Auth-Type = Accept
Auth-Type = Accept, accepting the user
Login OK: [0446655af9d5] (from client 192.168.69.244 port 333 cli
04-46-65-5A-F9-D5)
# Executing section post-auth from file
/usr/local/pf/raddb//sites-enabled/packetfence
+- entering group post-auth {...}
++[exec] returns noop
++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25))
? Evaluating !(EAP-Type ) -> TRUE
?? Skipping (EAP-Type != 21 )
?? Skipping (EAP-Type != 25)
++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) -> TRUE
++- entering if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) {...}
rlm_perl: Returning vlan 11 to request from 04:46:65:5a:f9:d5 port 333
rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK)
rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
rlm_perl: Added pair Service-Type = Login-User
rlm_perl: Added pair Called-Station-Id = 00-23-5E-B0-38-00
rlm_perl: Added pair Calling-Station-Id = 04-46-65-5A-F9-D5
rlm_perl: Added pair Cisco-AVPair = ssid=TWGuest
rlm_perl: Added pair Cisco-AVPair = service-type=Login
rlm_perl: Added pair User-Name = 0446655af9d5
rlm_perl: Added pair NAS-Identifier = wifi02
rlm_perl: Added pair User-Password = 0446655af9d5
rlm_perl: Added pair NAS-Port = 333
rlm_perl: Added pair NAS-IP-Address = 192.168.69.244
rlm_perl: Added pair NAS-Port-Id = 333
rlm_perl: Added pair Tunnel-Private-Group-ID = 11
rlm_perl: Added pair Tunnel-Type = 13
rlm_perl: Added pair Tunnel-Medium-Type = 6
rlm_perl: Added pair Auth-Type = Accept
+++[packetfence] returns ok
++- if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)) returns ok
} # server packetfence
Sending Access-Accept of id 185 to 192.168.69.244 port 1645
         Tunnel-Private-Group-Id:0 = "11"
         Tunnel-Type:0 = VLAN
         Tunnel-Medium-Type:0 = IEEE-802
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.69.244 port 1645,
id=185, length=173
Sending duplicate reply to client 192.168.69.244 port 1645 - ID: 185
Sending Access-Accept of id 185 to 192.168.69.244 port 1645
Waking up in 4.9 seconds.
Cleaning up request 0 ID 185 with timestamp +13
Ready to process requests.



Em 19-09-2013 14:51, Derek Wuelfrath escreveu:
Hello Pedro

Can you edit the /usr/local/pf/lib/SNMP/Cisco/Aironet_WDS.pm file and
add the following:

in sub extractSsid, just after the "my $logger … " line (at line 204 if
you use latest version of PacketFence), add the following two lines

use Data::Dumper;
$logger->info("PACKETFENCE DEBUGGING: " . Dump($radius_request));

Then, restart PacketFence and retry. Paste the relevant log output.

Cheers!
dw.

--
Derek Wuelfrath
dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected]
<mailto:dwuelfrath-tiT8nZ+Z9Bqw5LPnMra/[email protected]> ::
+1.514.447.4918 (x110) :: www.inverse.ca <http://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (www.sogo.nu <http://www.sogo.nu/>)
and PacketFence (www.packetfence.org <http://www.packetfence.org/>)

On 2013-09-17, at 5:33 AM, "Pedro, Tavares"
<[email protected]
<mailto:[email protected]>> wrote:

Hello all.
Regarding this issue, I've been searching for a while and I did found
others reporting similar issues (same errors in logs) but for some
reason didn't apply to my case.
The environment
PF is in Vlan enforcement mode. Although it's working, I'm aware
that's not the best configuration. I'm still learning :)
Native Vlan = 1




------------------------------------------------------------------------------
LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint
2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack includes
Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13.
http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint
2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack includes
Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13.
http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users



<<attachment: fabrice_monnier.vcf>>

------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60133471&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to