Hello
Helloaccording to the documentation I have to have this user in / usr / local / 
pf / raddb / userstitle "Option 2: Local Authentication" through the link 
recommendedLog in packetfence not have any record, but I have a user in the PF 
and the users file.
When I try to authenticate I receive it
I remember I'm trying to authenticate locally on own server PF :)
log (/usr/sbin/radiusd -d /usr/local/pf/raddb/ -X)

rad_recv: Access-Request packet from host 192.168.100.5 port 55170, id=20, 
length=46        User-Name = "ismael"                                           
                     User-Password = "12345678"                                 
                 server packetfence {                                           
                     # Executing section authorize from file 
/usr/local/pf/raddb//sites-enabled/packetfence+group authorize {                
                                                    [suffix] No '@' in 
User-Name = "ismael", skipping NULL due to config.                 ++[suffix] = 
noop                                                                     
[ntdomain] No '\' in User-Name = "ismael", looking up realm NULL                
      [ntdomain] No such realm "NULL"                                           
            ++[ntdomain] = noop                                                 
                  ++[preprocess] = ok                                           
                        Use of uninitialized value $RAD_REQUEST{"Realm"} in 
hash element at /usr/local/pf/raddb//packetfence-multi-domain.pm line 
64.rlm_perl: Added pair User-Name = ismael                                      
                                                rlm_perl: Added pair 
User-Password = 12345678                                                        
                        rlm_perl: Added pair NAS-IP-Address = 192.168.100.5     
                                                                     
++[packetfence-multi-domain] = updated                                          
                                             [eap] No EAP-Message, not doing 
EAP                                                                             
             ++[eap] = noop                                                     
                                                          [files] users: 
Matched entry DEFAULT at line 5                                                 
                              ++[files] = ok                                    
                                                                           
++[expiration] = noop                                                           
                                             ++[logintime] = noop               
                                                                                
          ++update request {                                                    
                                                               expand: 
%{Packet-Src-IP-Address} -> 192.168.100.5                                       
                             ++} # update request = noop                        
                                                                          
++update control {                                                              
                                             ++} # update control = noop        
                                                                                
          rlm_perl: Added pair User-Name = ismael                               
                                                       rlm_perl: Added pair 
User-Password = 12345678                                                        
                        rlm_perl: Added pair NAS-IP-Address = 192.168.100.5     
                                                                     rlm_perl: 
Added pair FreeRADIUS-Client-IP-Address = 192.168.100.5                         
                                   rlm_perl: Added pair PacketFence-RPC-Pass =  
                                                                                
rlm_perl: Added pair PacketFence-RPC-Server = 127.0.0.1                         
                                             rlm_perl: Added pair 
PacketFence-RPC-Proto = http                                                    
                        rlm_perl: Added pair PacketFence-RPC-User =             
                                                                     rlm_perl: 
Added pair Auth-Type = Accept                                                   
                                   rlm_perl: Added pair PacketFence-RPC-Port = 
7070                                                                            
 ++[packetfence] = noop                                                         
                                              +} # group authorize = updated    
                                                                                
           Found Auth-Type = Accept                                             
                                                        Auth-Type = Accept, 
accepting the user                                                              
                         Login OK: [ismael] (from client 
PacketFence-ZEN-5-3.local port 0)                                               
             } # server packetfence                                             
                                                          # Executing section 
post-auth from file /usr/local/pf/raddb//sites-enabled/packetfence              
                         +group post-auth {                                     
                                                                      ++[exec] 
= noop                                                                          
                                    ++? if (!EAP-Type || (EAP-Type != EAP-TTLS  
&& EAP-Type != PEAP))                                                           
 ? Evaluating !(EAP-Type ) -> TRUE                                              
                                              ?? Skipping (EAP-Type != EAP-TTLS 
 )?? Skipping (EAP-Type != PEAP)++? if (!EAP-Type || (EAP-Type != EAP-TTLS  && 
EAP-Type != PEAP)) -> TRUE++if (!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type 
!= PEAP)) {+++update control {+++} # update control = nooprlm_perl: MAC address 
is empty or invalid in this request. It could be normal on certain radius 
callsrlm_perl: Added pair User-Name = ismaelrlm_perl: Added pair User-Password 
= 12345678rlm_perl: Added pair NAS-IP-Address = 192.168.100.5rlm_perl: Added 
pair FreeRADIUS-Client-IP-Address = 192.168.100.5rlm_perl: Added pair 
PacketFence-RPC-Pass =rlm_perl: Added pair PacketFence-RPC-Server = 
127.0.0.1rlm_perl: Added pair PacketFence-RPC-User =rlm_perl: Added pair 
PacketFence-RPC-Proto = httprlm_perl: Added pair Auth-Type = Acceptrlm_perl: 
Added pair PacketFence-RPC-Port = 7070+++[packetfence] = reject++} # if 
(!EAP-Type || (EAP-Type != EAP-TTLS  && EAP-Type != PEAP)) = reject+} # group 
post-auth = rejectUsing Post-Auth-Type Reject# Executing group from file 
/usr/local/pf/raddb//sites-enabled/packetfence+group REJECT 
{[attr_filter.access_reject]     expand: %{User-Name} -> ismaelattr_filter: 
Matched entry DEFAULT at line 11++[attr_filter.access_reject] = updated+} # 
group REJECT = updatedDelaying reject of request 1 for 1 secondsGoing to the 
next requestWaking up in 0.9 seconds.Sending delayed reject for request 
1Sending Access-Reject of id 20 to 192.168.100.5 port 55170Waking up in 4.9 
seconds.Cleaning up request 1 ID 20 with timestamp +35Ready to process requests.


To: [email protected]
From: [email protected]
Date: Tue, 10 Nov 2015 21:20:22 -0500
Subject: Re: [PacketFence-users] Radius authentication


  
    
  
  
    Hello Ismael,

    

    you created a user in radius but it probably doesn't exist on
    packetfence side. (check packetfence.log)

    So remove what you did in /usr/local/pf/raddb/users and follow this
    documentation:

https://github.com/inverse-inc/packetfence/blob/devel/docs/PacketFence_Administration_Guide.asciidoc#option-5-eap-local-user-authentication

    

    Also don't forget to create a portal profile with a specific filter
    (like SSID, switch ... that match your connection) and add local
    authentication source.

    

    Then retry.

    

    Regards

    Fabrice

    

    

    Le 2015-11-10 21:04, ismael flavio
      silva a écrit :

    
    
      
      Hello :)

        

        I am locally test the radius. He appears to accept any user or
        password, and log accuses a problem with the mac-address.

        I see in the community but everybody uses AD or an equivalent
        server.

        

        LOG

        

        /usr/local/pf/logs/radius.log

        

        Tue Nov 10 20:56:47 2015 : Auth: Login OK: [ismael] (from client
        PacketFence-ZEN-5-3.local port 0)

        Tue Nov 10 20:56:47 2015 : Info: rlm_perl: MAC address is empty
        or invalid in this request. It could be normal on certain radius
        calls

        

        -----------------------------------

        

        /usr/sbin/radiusd -d /usr/local/pf/raddb/ -X

        

        ......

        ......

        

        radiusd: #### Opening IP addresses and Ports ####

        listen {

                type = "auth"

                virtual_server = "packetfence"

                ipaddr = 192.168.100.5

                port = 0

        }

        listen {

                type = "acct"

                virtual_server = "packetfence"

                ipaddr = 192.168.100.5

                port = 0

        }

        listen {

                type = "control"

         listen {

                socket = "/usr/local/pf/var/run/radiusd.sock"

                mode = "rw"

         }

        }

        listen {

                type = "auth"

                ipaddr = 127.0.0.1

                port = 18120

        }

         ... adding new socket proxy address * port 49410

        Listening on authentication address 192.168.100.5 port 1812 as
        server packetfence

        Listening on accounting address 192.168.100.5 port 1813 as
        server packetfence

        Listening on command file /usr/local/pf/var/run/radiusd.sock

        Listening on authentication address 127.0.0.1 port 18120 as
        server inner-tunnel

        Listening on proxy address 192.168.100.5 port 1814

        Ready to process requests.

        

        configs

        

        /usr/local/pf/raddb/users

        

        ismael Cleartext-Password := "12345678"

        

        Configuration → Advanced -> plaintext

        

        Thanks

        

      
      

      
      

      
------------------------------------------------------------------------------

      

      
      

      _______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

    
    

  


------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users                  
                  
------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to