I am bring up a packetfence server using guest sms and email signup with local
user authentication. I have a Cisco 3560G the Cisco send the accept packet to
the radius. The radius rejects the packet. I run raddebug and see the packet
get accepted and then rejected by the tunnel.
attached is the raddebug output.[root@pfptnyc ~]# raddebug -t 300 -f
/usr/local/pf/var/run/radiusd.sock
Thu Mar 24 12:22:58 2016 : Debug: Received Access-Request packet from host
10.10.10.10 port 1645, id=32, length=207
Thu Mar 24 12:22:58 2016 : Debug: User-Name = "18a905cf0442"
Thu Mar 24 12:22:58 2016 : Debug: User-Password = "18a905cf0442"
Thu Mar 24 12:22:58 2016 : Debug: Service-Type = Call-Check
Thu Mar 24 12:22:58 2016 : Debug: Framed-MTU = 1500
Thu Mar 24 12:22:58 2016 : Debug: Called-Station-Id = "64-A0-E7-D3-14-03"
Thu Mar 24 12:22:58 2016 : Debug: Calling-Station-Id = "18-A9-05-CF-04-42"
Thu Mar 24 12:22:58 2016 : Debug: Message-Authenticator =
0x53491cf6cd0427923e2511af2f4546ce
Thu Mar 24 12:22:58 2016 : Debug: Cisco-AVPair =
"audit-session-id=0A0A0A0A0000001B087ED2BB"
Thu Mar 24 12:22:58 2016 : Debug: NAS-Port-Type = Ethernet
Thu Mar 24 12:22:58 2016 : Debug: NAS-Port = 50003
Thu Mar 24 12:22:58 2016 : Debug: NAS-Port-Id = "GigabitEthernet0/3"
Thu Mar 24 12:22:58 2016 : Debug: NAS-IP-Address = 10.10.10.10
Thu Mar 24 12:22:58 2016 : Debug: server packetfence {
Thu Mar 24 12:22:58 2016 : Debug: # Executing section authorize from file
/usr/local/pf/raddb//sites-enabled/packetfence
Thu Mar 24 12:22:58 2016 : Debug: +group authorize {
Thu Mar 24 12:22:58 2016 : Debug: ++policy rewrite.calling_station_id {
Thu Mar 24 12:22:58 2016 : Debug: +++? if ((Calling-Station-Id) &&
"%{Calling-Station-Id}" =~ /^%{config:policy.mac-addr}$/i)
Thu Mar 24 12:22:58 2016 : Debug: ?? Evaluating (Calling-Station-Id) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: expand: %{Calling-Station-Id} ->
18-A9-05-CF-04-42
Thu Mar 24 12:22:58 2016 : Debug: expand: policy.mac-addr ->
policy.mac-addr
Thu Mar 24 12:22:58 2016 : Debug: expand: ^%{config:policy.mac-addr}$ ->
^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating ("%{Calling-Station-Id}" =~
/^%{config:policy.mac-addr}$/i) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: +++? if ((Calling-Station-Id) &&
"%{Calling-Station-Id}" =~ /^%{config:policy.mac-addr}$/i) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: +++if ((Calling-Station-Id) &&
"%{Calling-Station-Id}" =~ /^%{config:policy.mac-addr}$/i) {
Thu Mar 24 12:22:58 2016 : Debug: ++++update request {
Thu Mar 24 12:22:58 2016 : Debug: expand: %{1}:%{2}:%{3}:%{4}:%{5}:%{6}
-> 18:A9:05:CF:04:42
Thu Mar 24 12:22:58 2016 : Debug: expand:
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}} -> 18:a9:05:cf:04:42
Thu Mar 24 12:22:58 2016 : Debug: ++++} # update request = noop
Thu Mar 24 12:22:58 2016 : Debug: ++++[updated] = updated
Thu Mar 24 12:22:58 2016 : Debug: +++} # if ((Calling-Station-Id) &&
"%{Calling-Station-Id}" =~ /^%{config:policy.mac-addr}$/i) = updated
Thu Mar 24 12:22:58 2016 : Debug: +++ ... skipping else for request 0:
Preceding "if" was taken
Thu Mar 24 12:22:58 2016 : Debug: ++} # policy rewrite.calling_station_id =
updated
Thu Mar 24 12:22:58 2016 : Debug: ++policy set.called_station_ssid {
Thu Mar 24 12:22:58 2016 : Debug: +++? if ((Called-Station-Id) &&
"%{Called-Station-Id}" =~ /^%{config:policy.mac-addr}(:(.+))?$/i)
Thu Mar 24 12:22:58 2016 : Debug: ?? Evaluating (Called-Station-Id) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: expand: %{Called-Station-Id} ->
64-A0-E7-D3-14-03
Thu Mar 24 12:22:58 2016 : Debug: expand: policy.mac-addr ->
policy.mac-addr
Thu Mar 24 12:22:58 2016 : Debug: expand:
^%{config:policy.mac-addr}(:(.+))?$ ->
^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating ("%{Called-Station-Id}" =~
/^%{config:policy.mac-addr}(:(.+))?$/i) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: +++? if ((Called-Station-Id) &&
"%{Called-Station-Id}" =~ /^%{config:policy.mac-addr}(:(.+))?$/i) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: +++if ((Called-Station-Id) &&
"%{Called-Station-Id}" =~ /^%{config:policy.mac-addr}(:(.+))?$/i) {
Thu Mar 24 12:22:58 2016 : Debug: ++++update request {
Thu Mar 24 12:22:58 2016 : Debug: expand: %{1}:%{2}:%{3}:%{4}:%{5}:%{6}
-> 64:A0:E7:D3:14:03
Thu Mar 24 12:22:58 2016 : Debug: expand:
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}} -> 64:a0:e7:d3:14:03
Thu Mar 24 12:22:58 2016 : Debug: ++++} # update request = noop
Thu Mar 24 12:22:58 2016 : Debug: ++++? if ("%{8}")
Thu Mar 24 12:22:58 2016 : Debug: expand: %{8} ->
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating ("%{8}") -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? if ("%{8}") -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif ((Colubris-AVPair) &&
"%{Colubris-AVPair}" =~ /^ssid=(.*)$/i)
Thu Mar 24 12:22:58 2016 : Debug: ?? Evaluating (Colubris-AVPair) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ? Skipping ("%{Colubris-AVPair}" =~
/^ssid=(.*)$/i)
Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif ((Colubris-AVPair) &&
"%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif (Aruba-Essid-Name)
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating (Aruba-Essid-Name) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif (Aruba-Essid-Name) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif ((Cisco-AVPair) &&
"%{Cisco-AVPair}" =~ /^ssid=(.*)$/i)
Thu Mar 24 12:22:58 2016 : Debug: ?? Evaluating (Cisco-AVPair) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: expand: %{Cisco-AVPair} ->
audit-session-id=0A0A0A0A0000001B087ED2BB
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating ("%{Cisco-AVPair}" =~
/^ssid=(.*)$/i) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif ((Cisco-AVPair) &&
"%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++[updated] = updated
Thu Mar 24 12:22:58 2016 : Debug: +++} # if ((Called-Station-Id) &&
"%{Called-Station-Id}" =~ /^%{config:policy.mac-addr}(:(.+))?$/i) = updated
Thu Mar 24 12:22:58 2016 : Debug: +++ ... skipping else for request 0:
Preceding "if" was taken
Thu Mar 24 12:22:58 2016 : Debug: ++} # policy set.called_station_ssid = updated
Thu Mar 24 12:22:58 2016 : Debug: [suffix] No '@' in User-Name =
"18a905cf0442", skipping NULL due to config.
Thu Mar 24 12:22:58 2016 : Debug: ++[suffix] = noop
Thu Mar 24 12:22:58 2016 : Debug: [ntdomain] No '\' in User-Name =
"18a905cf0442", looking up realm NULL
Thu Mar 24 12:22:58 2016 : Debug: [ntdomain] No such realm "NULL"
Thu Mar 24 12:22:58 2016 : Debug: ++[ntdomain] = noop
Thu Mar 24 12:22:58 2016 : Debug: ++[preprocess] = ok
Thu Mar 24 12:22:58 2016 : Debug: [eap] No EAP-Message, not doing EAP
Thu Mar 24 12:22:58 2016 : Debug: ++[eap] = noop
Thu Mar 24 12:22:58 2016 : Debug: [files] users: Matched entry DEFAULT at line 2
Thu Mar 24 12:22:58 2016 : Debug: ++[files] = ok
Thu Mar 24 12:22:58 2016 : Debug: ++[expiration] = noop
Thu Mar 24 12:22:58 2016 : Debug: ++[logintime] = noop
Thu Mar 24 12:22:58 2016 : Debug: ++update request {
Thu Mar 24 12:22:58 2016 : Debug: expand: %{Packet-Src-IP-Address} ->
10.10.10.10
Thu Mar 24 12:22:58 2016 : Debug: ++} # update request = noop
Thu Mar 24 12:22:58 2016 : Debug: ++update control {
Thu Mar 24 12:22:58 2016 : Debug: ++} # update control = noop
Thu Mar 24 12:22:58 2016 : Debug: ++[packetfence] = noop
Thu Mar 24 12:22:58 2016 : Debug: +} # group authorize = updated
Thu Mar 24 12:22:58 2016 : Debug: Found Auth-Type = Accept
Thu Mar 24 12:22:58 2016 : Debug: Auth-Type = Accept, accepting the user
Thu Mar 24 12:22:58 2016 : Debug: } # server packetfence
Thu Mar 24 12:22:58 2016 : Debug: # Executing section post-auth from file
/usr/local/pf/raddb//sites-enabled/packetfence
Thu Mar 24 12:22:58 2016 : Debug: +group post-auth {
Thu Mar 24 12:22:58 2016 : Debug: ++[exec] = noop
Thu Mar 24 12:22:58 2016 : Debug: ++? if (!EAP-Type || (EAP-Type != EAP-TTLS
&& EAP-Type != PEAP))
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating !(EAP-Type ) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: ?? Skipping (EAP-Type != EAP-TTLS )
Thu Mar 24 12:22:58 2016 : Debug: ?? Skipping (EAP-Type != PEAP)
Thu Mar 24 12:22:58 2016 : Debug: ++? if (!EAP-Type || (EAP-Type != EAP-TTLS
&& EAP-Type != PEAP)) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: ++if (!EAP-Type || (EAP-Type != EAP-TTLS &&
EAP-Type != PEAP)) {
Thu Mar 24 12:22:58 2016 : Debug: +++update control {
Thu Mar 24 12:22:58 2016 : Debug: +++} # update control = noop
Thu Mar 24 12:22:58 2016 : Debug: +++[packetfence] = fail
Thu Mar 24 12:22:58 2016 : Debug: ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS
&& EAP-Type != PEAP)) = fail
Thu Mar 24 12:22:58 2016 : Debug: +} # group post-auth = fail
Thu Mar 24 12:22:58 2016 : Debug: Using Post-Auth-Type Reject
Thu Mar 24 12:22:58 2016 : Debug: # Executing group from file
/usr/local/pf/raddb//sites-enabled/packetfence
Thu Mar 24 12:22:58 2016 : Debug: +group REJECT {
Thu Mar 24 12:22:58 2016 : Debug: ++? if (!EAP-Type || (EAP-Type != EAP-TTLS
&& EAP-Type != PEAP))
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating !(EAP-Type ) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: ?? Skipping (EAP-Type != EAP-TTLS )
Thu Mar 24 12:22:58 2016 : Debug: ?? Skipping (EAP-Type != PEAP)
Thu Mar 24 12:22:58 2016 : Debug: ++? if (!EAP-Type || (EAP-Type != EAP-TTLS
&& EAP-Type != PEAP)) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: ++if (!EAP-Type || (EAP-Type != EAP-TTLS &&
EAP-Type != PEAP)) {
Thu Mar 24 12:22:58 2016 : Debug: [sql] expand: %{User-Name} ->
18a905cf0442
Thu Mar 24 12:22:58 2016 : Debug: [sql] sql_set_user escaped user -->
'18a905cf0442'
Thu Mar 24 12:22:58 2016 : Debug: [sql] expand: %{check:Post-Auth-Type}
-> Reject
Thu Mar 24 12:22:58 2016 : Debug: [sql] expand: INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id, switch_mac,
switch_ip_address, radius_source_ip_address, called_station_id,
calling_station_id, nas_port_type, ssid, nas_port_id, ifindex,
nas_port, connection_type, nas_ip_address, nas_identifier, auth_status,
reason, auth_type, eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain, uuid, radius_request,
radius_reply) VALUES ( '%{request:Calling-Station-Id}',
'%{request:Framed-IP-Address}', '%{control:PacketFence-Computer-Name}',
'%{request:User-Name}', '%{request:Stripped-User-Name}',
'%{request:Realm}', 'Radius-Access-Request',
'%{control:PacketFence-Switch-Id}', '%{control:PacketFence-Switch-Mac}',
'%{control:PacketFence-Switch-Ip-Address}', '%{Packet-Src-IP-Address}',
'%{request:Called-Station-Id}', '%{req
À\Thu Mar 24 12:22:58 2016 : Debug: +++[sql] = ok
Thu Mar 24 12:22:58 2016 : Debug: ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS
&& EAP-Type != PEAP)) = ok
Thu Mar 24 12:22:58 2016 : Debug: [attr_filter.access_reject] expand:
%{User-Name} -> 18a905cf0442
Thu Mar 24 12:22:58 2016 : Debug: ++[attr_filter.access_reject] = updated
Thu Mar 24 12:22:58 2016 : Debug: +} # group REJECT = updated
Thu Mar 24 12:22:58 2016 : Debug: Delaying reject of request 0 for 1 seconds
Thu Mar 24 12:22:59 2016 : Debug: Sending delayed reject for request 0
Thu Mar 24 12:22:59 2016 : Debug: Sending Access-Reject packet to host
10.10.10.10 port 1645, id=32, length=0
Thu Mar 24 12:23:04 2016 : Debug: Cleaning up request 0 ID 32 with timestamp
+145
[root@pfptnyc ~]#
Any help to be offerred will be appreciated.
Anthony
------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://pubads.g.doubleclick.net/gampad/clk?id=278785351&iu=/4140
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users