Hi all,

> So try these things:
> 1. Look at the logs/pfqueue.log and see what errors there may be.
> Please post them here for our enlightenment.
There are three different ERROR: messages in the log
1. Use of uninitialized value....
2. Can't bind : IO::Socket::INET: connect: Interrupted system call
3. Can't bind : IO::Socket::INET: connect: Connection refused

Here is a short section of the pfqueue.log

Dec 09 17:00:00 pfqueue(13611) INFO: [mac:d0:a6:37:eb:45:ed] Node 
d0:a6:37:eb:45:ed registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:00:00 pfqueue(13609) INFO: [mac:d0:a6:37:eb:45:ed] Node 
d0:a6:37:eb:45:ed registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:00:01 pfqueue(13611) ERROR: [mac:00:1c:c5:74:db:c0] Can't bind : 
IO::Socket::INET: connect: Interrupted system call
Dec 09 17:00:22 pfqueue(13604) INFO: [mac:5c:8d:4e:27:73:a1] Node 
5c:8d:4e:27:73:a1 registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:00:22 pfqueue(13607) INFO: [mac:5c:8d:4e:27:73:a1] Node 
5c:8d:4e:27:73:a1 registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:01:09 pfqueue(13607) INFO: [mac:38:0f:4a:28:a7:a3] Node 
38:0f:4a:28:a7:a3 registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:01:09 pfqueue(13608) INFO: [mac:38:0f:4a:28:a7:a3] Node 
38:0f:4a:28:a7:a3 registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:01:22 pfqueue(13604) INFO: [mac:cc:3a:61:dd:6f:f5] Node 
cc:3a:61:dd:6f:f5 registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:01:22 pfqueue(13606) INFO: [mac:cc:3a:61:dd:6f:f5] Node 
cc:3a:61:dd:6f:f5 registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:02:02 pfqueue(13606) INFO: [mac:d0:a6:37:eb:45:ed] Node 
d0:a6:37:eb:45:ed registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:02:02 pfqueue(13604) INFO: [mac:d0:a6:37:eb:45:ed] Node 
d0:a6:37:eb:45:ed registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:02:03 pfqueue(13611) INFO: [mac:d0:a6:37:eb:45:ed] Node 
d0:a6:37:eb:45:ed registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:02:03 pfqueue(13609) INFO: [mac:d0:a6:37:eb:45:ed] Node 
d0:a6:37:eb:45:ed registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:02:27 pfqueue(13609) INFO: [mac:d0:a6:37:eb:45:ed] Node 
d0:a6:37:eb:45:ed registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:02:27 pfqueue(13611) INFO: [mac:d0:a6:37:eb:45:ed] Node 
d0:a6:37:eb:45:ed registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:02:29 pfqueue(13609) INFO: [mac:d0:a6:37:eb:45:ed] Node 
d0:a6:37:eb:45:ed registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:02:29 pfqueue(13604) INFO: [mac:d0:a6:37:eb:45:ed] Node 
d0:a6:37:eb:45:ed registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:02:41 pfqueue(13611) ERROR: [mac:d0:a6:37:eb:45:ed] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:02:41 pfqueue(13611) ERROR: [mac:d0:a6:37:eb:45:ed] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:02:41 pfqueue(13611) ERROR: [mac:00:1c:c5:75:e0:80] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:02:58 pfqueue(13607) ERROR: [mac:00:1c:c5:75:e0:80] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:02:58 pfqueue(13607) ERROR: [mac:00:1c:c5:75:e0:80] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:02:58 pfqueue(13607) ERROR: [mac:00:1c:c5:74:db:c0] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:03:20 pfqueue(13605) ERROR: [mac:00:1c:c5:74:db:c0] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:03:20 pfqueue(13605) ERROR: [mac:00:1c:c5:74:db:c0] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:03:20 pfqueue(13605) ERROR: [mac:00:1c:c5:75:e0:80] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:03:29 pfqueue(13606) ERROR: [mac:34:4d:f7:7f:f5:a6] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:03:33 pfqueue(13607) ERROR: [mac:34:4d:f7:7f:f5:a6] Can't bind : 
IO::Socket::INET: connect: Connection refused
Dec 09 17:03:37 pfqueue(13598) INFO: [mac:[undef]] stopping pfqueue (main::END)
<--snip-->
Dec 09 17:29:17 pfqueue(4346) INFO: [mac:54:40:ad:be:91:f3] Node 
54:40:ad:be:91:f3 registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:29:17 pfqueue(4351) INFO: [mac:54:40:ad:be:91:f3] Node 
54:40:ad:be:91:f3 registered and allowed to pass the Firewall 
(pf::firewallsso::FortiGate::action)
Dec 09 17:29:36 pfqueue(4350) WARN: [mac:00:19:77:73:72:40] Unable to perform a 
Fingerbank lookup for device with MAC address '00:19:77:73:72:40' 
(pf::fingerbank::process)
Dec 09 17:29:37 pfqueue(4353) WARN: [mac:00:19:77:73:72:40] Unable to perform a 
Fingerbank lookup for device with MAC address '00:19:77:73:72:40' 
(pf::fingerbank::process)
Dec 09 17:29:37 pfqueue(4348) WARN: [mac:00:19:77:73:72:40] Unable to perform a 
Fingerbank lookup for device with MAC address '00:19:77:73:72:40' 
(pf::fingerbank::process)
Dec 09 17:29:37 pfqueue(4352) WARN: [mac:00:19:77:73:72:40] Unable to perform a 
Fingerbank lookup for device with MAC address '00:19:77:73:72:40' 
(pf::fingerbank::process)
Dec 09 17:33:28 pfqueue(4351) WARN: [mac:d8:54:a2:35:e1:80] Unable to perform a 
Fingerbank lookup for device with MAC address 'd8:54:a2:35:e1:80' 
(pf::fingerbank::process)
Dec 09 17:33:28 pfqueue(4346) WARN: [mac:d8:54:a2:35:e1:80] Unable to perform a 
Fingerbank lookup for device with MAC address 'd8:54:a2:35:e1:80' 
(pf::fingerbank::process)
Dec 09 17:33:28 pfqueue(4347) WARN: [mac:d8:54:a2:35:e1:80] Unable to perform a 
Fingerbank lookup for device with MAC address 'd8:54:a2:35:e1:80' 
(pf::fingerbank::process)
Dec 09 17:33:28 pfqueue(4350) WARN: [mac:d8:54:a2:35:e1:80] Unable to perform a 
Fingerbank lookup for device with MAC address 'd8:54:a2:35:e1:80' 
(pf::fingerbank::process)
Dec 09 17:35:46 pfqueue(4347) WARN: [mac:d8:54:a2:35:e1:80] Unable to match MAC 
address to IP '172.31.18.2' (pf::iplog::ip2mac)
Dec 09 17:35:46 pfqueue(4350) WARN: [mac:34:4d:f7:7f:f5:a6] Unable to match MAC 
address to IP '172.31.18.2' (pf::iplog::ip2mac)
Dec 09 17:35:46 pfqueue(4347) ERROR: [mac:00:1c:c5:75:e0:80] Use of 
uninitialized value in string eq at /usr/local/pf/lib/pf/dhcp/processor.pm line 
528.
 (pf::dhcp::processor::update_iplog)
Dec 09 17:35:46 pfqueue(4350) ERROR: [mac:00:1c:c5:75:e0:80] Use of 
uninitialized value in string eq at /usr/local/pf/lib/pf/dhcp/processor.pm line 
528.
 (pf::dhcp::processor::update_iplog)
Dec 09 17:35:46 pfqueue(4350) INFO: [mac:00:1c:c5:75:e0:80] oldip 
(172.31.19.134) and newip (172.31.18.2) are different for 00:1c:c5:75:e0:80 - 
closing iplog entry (pf::api::update_iplog)
Dec 09 17:35:46 pfqueue(4347) INFO: [mac:00:1c:c5:75:e0:80] oldip 
(172.31.19.134) and newip (172.31.18.2) are different for 00:1c:c5:75:e0:80 - 
closing iplog entry (pf::api::update_iplog)
Dec 09 17:36:24 pfqueue(4353) WARN: [mac:34:4d:f7:7f:f5:a6] Unable to match MAC 
address to IP '172.31.19.134' (pf::iplog::ip2mac)
Dec 09 17:36:24 pfqueue(4352) WARN: [mac:34:4d:f7:7f:f5:a6] Unable to match MAC 
address to IP '172.31.19.134' (pf::iplog::ip2mac)
Dec 09 17:36:24 pfqueue(4353) ERROR: [mac:00:1c:c5:75:e0:80] Use of 
uninitialized value in string eq at /usr/local/pf/lib/pf/dhcp/processor.pm line 
528.
 (pf::dhcp::processor::update_iplog)
Dec 09 17:36:24 pfqueue(4352) ERROR: [mac:00:1c:c5:75:e0:80] Use of 
uninitialized value in string eq at /usr/local/pf/lib/pf/dhcp/processor.pm line 
528.
 (pf::dhcp::processor::update_iplog)
Dec 09 17:36:24 pfqueue(4353) INFO: [mac:00:1c:c5:75:e0:80] oldip (172.31.18.2) 
and newip (172.31.19.134) are different for 00:1c:c5:75:e0:80 - closing iplog 
entry (pf::api::update_iplog)
Dec 09 17:36:24 pfqueue(4352) INFO: [mac:00:1c:c5:75:e0:80] oldip (172.31.18.2) 
and newip (172.31.19.134) are different for 00:1c:c5:75:e0:80 - closing iplog 
entry (pf::api::update_iplog)
Dec 09 17:38:23 pfqueue(4349) WARN: [mac:34:4d:f7:7f:f5:a6] Unable to match MAC 
address to IP '192.168.2.14' (pf::iplog::ip2mac)
Dec 09 17:38:23 pfqueue(4347) WARN: [mac:00:1c:c5:75:e0:80] Unable to match MAC 
address to IP '192.168.2.14' (pf::iplog::ip2mac)
Dec 09 17:38:23 pfqueue(4348) WARN: [mac:34:4d:f7:7f:f5:a6] Unable to match MAC 
address to IP '192.168.2.14' (pf::iplog::ip2mac)
Dec 09 17:38:23 pfqueue(4353) ERROR: [mac:9c:c1:72:bf:6e:f7] Can't bind : 
IO::Socket::INET: connect: Interrupted system call
 (pf::iplog::_get_lease_from_omapi)

> 2. Look at  /usr/local/fingerbank/logs/fingerbank.log. Are there any errors?
There are no ERROR: messages. Here is a very short section from log.

Dec 14 08:51:26 httpd.portal(25897) WARN: [mac:08:11:96:4e:37:28] Cannot find 
any combination ID in any schemas 
(fingerbank::Source::LocalDB::_getCombinationID)
Dec 14 08:51:26 httpd.portal(25897) INFO: [mac:08:11:96:4e:37:28] Upstream is 
configured and unable to fullfil an exact match locally. Will ignore result 
from local databas
Dec 14 08:51:26 httpd.portal(25897) INFO: [mac:08:11:96:4e:37:28] Found device 
: 1 through p0f. (fingerbank::Source::TCPFingerprinting::match)
Dec 14 08:51:26 httpd.portal(25624) WARN: [mac:08:11:96:4e:37:28] Cannot find 
any combination ID in any schemas 
(fingerbank::Source::LocalDB::_getCombinationID)
Dec 14 08:51:26 httpd.portal(25624) INFO: [mac:08:11:96:4e:37:28] Upstream is 
configured and unable to fullfil an exact match locally. Will ignore result 
from local databas
Dec 14 08:51:26 httpd.portal(25624) INFO: [mac:08:11:96:4e:37:28] Found device 
: 1 through p0f. (fingerbank::Source::TCPFingerprinting::match)
Dec 14 08:51:30 httpd.portal(25588) WARN: [mac:d0:59:e4:78:b7:93] Cannot find 
any combination ID in any schemas 
(fingerbank::Source::LocalDB::_getCombinationID)
Dec 14 08:51:30 httpd.portal(25588) INFO: [mac:d0:59:e4:78:b7:93] Upstream is 
configured and unable to fullfil an exact match locally. Will ignore result 
from local databas
Dec 14 08:51:30 httpd.portal(25588) INFO: [mac:d0:59:e4:78:b7:93] Found device 
: 5 through p0f. (fingerbank::Source::TCPFingerprinting::match)
 
> 3. Please report the output to these :

# rpm -qa fingerbank
fingerbank-2.1.0-5.1.noarch

# cat conf/pfqueue.conf
[consumer]
redis_server=127.0.0.1:6380
redis_reconnect=1
redis_every=100

[queue general]
workers=4
has_delayed_queue=enabled
delayed_queue_batch=100
delayed_queue_sleep=100
delayed_queue_workers=1

[queue pfdhcplistener]
workers=8

# cat conf/chi.conf
[storage DEFAULT]
storage=redis

[storage ldap_auth]
expires_in=10m

[storage httpd.admin]
expires_in=1d

[storage httpd.portal]
expires_in=6h

[storage redis]
driver = Redis
redis_class = Redis::Fast
server = 127.0.0.1:6379
prefix = pf
expires_on_backend = 1
reconnect=60

#[storage file]
#driver=File
#root_dir=/usr/local/pf/var/cache

# cat /usr/local/fingerbank/conf/fingerbank.conf
[upstream]
api_key=8829e1c497e6070c9089c0c19fa5289e22******

# redis-cli -p 6380 llen Queue:general
(integer) 0

# redis-cli -p 6380 llen Queue:pfdhcplistener
(integer) 486642

I have stopped the pfqueue service, which returned the CPUload and log growth 
to more normal values.
Not sure about the consequences, but for now everything runs fine.

> 4. Please post your conf/pf.conf (suitably trimmed of passwords).
[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=piusx-college.nl
#
# general.hostname
#
# Hostname of PacketFence system.  This is concatenated with the domain in 
Apache rewriting rules and therefore must be resolvable by clients.
hostname=pf
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers.  Passthroughs are created to allow DHCP 
transactions from even "trapped" nodes.
dhcpservers=172.31.8.13,172.31.8.14
#
# general.locale1
#
# Locale used for message translation
# more than 1 can be specified
#locale=nl_NL
#
# general.timezone
#
# System's timezone in string format. Supported list:
# http://www.php.net/manual/en/timezones.php
timezone=Europe/Amsterdam

[network]
#
# network.rogue_dhcp_detection
#
# Tries to identify Rogue DHCP Servers and triggers the 1100010 violation if 
one is found.
# This feature is only available if the dhcpdetector is activated.
rogue_dhcp_detection=disabled
#
# network.rogueinterval
#
# When rogue DHCP server detection is enabled, this parameter defines how often 
to email administrators.  With its default 
# setting of 10, it will email administrators the details of the previous 10 
DHCP offers.
rogueinterval=100

[trapping]
#
# trapping.redirtimer
#
# How long to display the progress bar during trap release. Default value is 
# based on VLAN enforcement techniques. Inline enforcement only users could
# lower the value.
redirtimer=30s
#
# trapping.redirecturl
#
# Default URL to redirect to on registration/mitigation release. 
# moved to profiles.conf in 4.0.6
#redirecturl=http://www.piusx-college.nl/
#
# trapping.detection_engine
#
# Let you choose from our supported IDS: snort or suricata
#
detection_engine=suricata
#
# trapping.passthrough
#
# When enabled, pfdns will resolve the real IP addresses of passthroughs and 
add them in the ipset session to give access
# to trapped devices. Don“t forget to enable ip_forward on your server.
passthrough=enabled
#
# trapping.passthroughs
#
# Comma-delimited list of domains to be used as HTTP and HTTPS passthroughs to 
web sites.
#
passthroughs=http://crl.geotrust.com/,http://ocsp.geotrust.com/

#
# guests_self_registration.mandatory_fields
#
# Fields required to be filled in the self-registration form. Valid values are:
# firstname, lastname, organization, phone, mobileprovider, email, 
# sponsor_email. Basic validation of minimally required values per guest mode 
# is provided by default.
# Moved to profiles.conf in 4.2.0
#mandatory_fields=firstname,lastname,email
[guests_admin_registration]
#
# guests_admin_registration.access_duration_choices
#
# These are all the choices offered in the guest management interface as 
# possible access duration values for a given registration.
access_duration_choices=12h, 1D, 1W, 1Y, 2Y
#
# guests_admin_registration.default_access_duration
#
# This is the default access duration value selected in the dropdown on the 
# guest management interface.
default_access_duration=1Y

[alerting]
#
# alerting.emailaddr
#
# Email address to which notifications of rogue DHCP servers, violations with 
an action of "email", or any other 
# PacketFence-related message goes to.
emailaddr=******@piusx-college.nl, ******@piusx-college.nl
#
# alerting.fromaddr
#
# Source email address for email notifications. Empty means 
root@<server-domain-name>.
fromaddr=******@piusx-college.nl
#
# alerting.smtpserver
#
# Server through which to send messages to the above emailaddr.  The default is 
localhost - be sure you're running an SMTP 
# host locally if you don't change it!
smtpserver=******

[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=******

[expire]
#
# expire.node
#
# Time before a node is removed due to inactivity.
# A value of 0D disables expiration.
# example:
# node=90D
node=100D
#
# expire.iplog
#
# Time which you would like to keep logs on IP/MAC information.
# A value of 0D disables expiration.
# example:
# iplog=180D
iplog=1M
#
# expire.traplog
#
# Time which you would like to keep logs on trap information.
# A value of 0D disables expiration.
# example:
# traplog=180D
traplog=2M
#
# expire.locationlog
#
# Time which you would like to keep logs on location information
# Please note that this table should not become too big since it 
# could degrade pfsetvlan performance.
# A value of 0D disables expiration.
# example:
# locationlog=180D
locationlog=1M

[services]
#
# services.pfsetvlan
#
# Should pfsetvlan be managed by PacketFence?
pfsetvlan=enabled
#
# services.snmptrapd
#
# Should snmptrapd be managed by PacketFence?
snmptrapd=enabled
#
# services.pfqueue
#
# Should pfqueue be managed by PacketFence?
pfqueue=disabled

[vlan]
#
#
# vlan.nbtraphandlerthreads
#
# Number of trap handler threads pfsetvlan should start
nbtraphandlerthreads=10
#
# vlan.trap_limit_action
#
# Action that PacketFence will take if the vlan.trap_limit_threshold is reached.
# Defaults to none. email will send an email every hour if the limit's still 
reached.
# shut will shut the port on the switch and will also send an email even if 
email is not
# specified.
trap_limit_action=email

[captive_portal]
#
# captive_portal.secure_redirect
#
# If secure_redirect is enabled, the captive portal uses HTTPS when redirecting
# captured clients. This is the default behavior.
secure_redirect=disabled
#
# captive_portal.wispr_redirection
#
# Enable or disable WISPr redirection capabilities on the captive-portal
wispr_redirection=disabled
# captive_portal.httpd_mod_qos
#
# Enable mod_qos for the captive-portal
httpd_mod_qos=enabled

[webservices]
#
# webservices.user
#
# username to use to connect to the webAPI
user=suricata
#
# webservices.pass
#
# password of the username
pass=******

[maintenance]
#
# maintenance.iplog_cleanup_batch
#
# iplog cleanup batch
iplog_cleanup_batch=500
#
# maintenance.iplog_cleanup_timeout
#
# iplog cleanup timeout
iplog_cleanup_timeout=25s
#
# maintenance.locationlog_cleanup_batch
#
# locationlog cleanup batch
locationlog_cleanup_batch=500
#
# maintenance.locationlog_cleanup_timeout
#
# locationlog cleanup timeout
locationlog_cleanup_timeout=25s
#
# maintenance.violation_maintenance_timeout
#
# violation maintenance timeout
violation_maintenance_timeout=25s

[interface eth0]
ip=172.31.26.3
type=management,portal
mask=255.255.255.0
vip=172.31.26.9

[interface eth1]
enforcement=vlan
ip=172.31.52.9
type=internal
mask=255.255.255.0

[interface eth2]
enforcement=vlan
ip=172.31.54.9
type=internal
mask=255.255.254.0

[interface eth3]
type=high-availability
------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to