Hello Anthony,

it failled on : Thu Mar 24 12:22:58 2016 : Debug: +++[packetfence] = fail

do you have something in packetfence.log ?

Regards
Fabrice


Le 2016-03-24 12:45, Blackman Anthony a écrit :
I am bring up a packetfence server using guest sms and email signup with local user authentication. I have a Cisco 3560G the Cisco send the accept packet to the radius. The radius rejects the packet. I run raddebug and see the packet get accepted and then rejected by the tunnel.

attached is the raddebug output.
[root@pfptnyc ~]# raddebug -t 300 -f /usr/local/pf/var/run/radiusd.sock
Thu Mar 24 12:22:58 2016 : Debug: Received Access-Request packet from host 10.10.10.10 port 1645, id=32, length=207
Thu Mar 24 12:22:58 2016 : Debug:       User-Name = "18a905cf0442"
Thu Mar 24 12:22:58 2016 : Debug:       User-Password = "18a905cf0442"
Thu Mar 24 12:22:58 2016 : Debug:       Service-Type = Call-Check
Thu Mar 24 12:22:58 2016 : Debug:       Framed-MTU = 1500
Thu Mar 24 12:22:58 2016 : Debug: Called-Station-Id = "64-A0-E7-D3-14-03" Thu Mar 24 12:22:58 2016 : Debug: Calling-Station-Id = "18-A9-05-CF-04-42" Thu Mar 24 12:22:58 2016 : Debug: Message-Authenticator = 0x53491cf6cd0427923e2511af2f4546ce Thu Mar 24 12:22:58 2016 : Debug: Cisco-AVPair = "audit-session-id=0A0A0A0A0000001B087ED2BB"
Thu Mar 24 12:22:58 2016 : Debug:       NAS-Port-Type = Ethernet
Thu Mar 24 12:22:58 2016 : Debug:       NAS-Port = 50003
Thu Mar 24 12:22:58 2016 : Debug:       NAS-Port-Id = "GigabitEthernet0/3"
Thu Mar 24 12:22:58 2016 : Debug:       NAS-IP-Address = 10.10.10.10
Thu Mar 24 12:22:58 2016 : Debug: server packetfence {
Thu Mar 24 12:22:58 2016 : Debug: # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence
Thu Mar 24 12:22:58 2016 : Debug: +group authorize {
Thu Mar 24 12:22:58 2016 : Debug: ++policy rewrite.calling_station_id {
Thu Mar 24 12:22:58 2016 : Debug: +++? if ((Calling-Station-Id) && "%{Calling-Station-Id}" =~ /^%{config:policy.mac-addr}$/i) Thu Mar 24 12:22:58 2016 : Debug: ?? Evaluating (Calling-Station-Id) -> TRUE Thu Mar 24 12:22:58 2016 : Debug: expand: %{Calling-Station-Id} -> 18-A9-05-CF-04-42 Thu Mar 24 12:22:58 2016 : Debug: expand: policy.mac-addr -> policy.mac-addr Thu Mar 24 12:22:58 2016 : Debug: expand: ^%{config:policy.mac-addr}$ -> ^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$ Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating ("%{Calling-Station-Id}" =~ /^%{config:policy.mac-addr}$/i) -> TRUE Thu Mar 24 12:22:58 2016 : Debug: +++? if ((Calling-Station-Id) && "%{Calling-Station-Id}" =~ /^%{config:policy.mac-addr}$/i) -> TRUE Thu Mar 24 12:22:58 2016 : Debug: +++if ((Calling-Station-Id) && "%{Calling-Station-Id}" =~ /^%{config:policy.mac-addr}$/i) {
Thu Mar 24 12:22:58 2016 : Debug: ++++update request {
Thu Mar 24 12:22:58 2016 : Debug: expand: %{1}:%{2}:%{3}:%{4}:%{5}:%{6} -> 18:A9:05:CF:04:42 Thu Mar 24 12:22:58 2016 : Debug: expand: %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}} -> 18:a9:05:cf:04:42
Thu Mar 24 12:22:58 2016 : Debug: ++++} # update request = noop
Thu Mar 24 12:22:58 2016 : Debug: ++++[updated] = updated
Thu Mar 24 12:22:58 2016 : Debug: +++} # if ((Calling-Station-Id) && "%{Calling-Station-Id}" =~ /^%{config:policy.mac-addr}$/i) = updated Thu Mar 24 12:22:58 2016 : Debug: +++ ... skipping else for request 0: Preceding "if" was taken Thu Mar 24 12:22:58 2016 : Debug: ++} # policy rewrite.calling_station_id = updated
Thu Mar 24 12:22:58 2016 : Debug: ++policy set.called_station_ssid {
Thu Mar 24 12:22:58 2016 : Debug: +++? if ((Called-Station-Id) && "%{Called-Station-Id}" =~ /^%{config:policy.mac-addr}(:(.+))?$/i) Thu Mar 24 12:22:58 2016 : Debug: ?? Evaluating (Called-Station-Id) -> TRUE Thu Mar 24 12:22:58 2016 : Debug: expand: %{Called-Station-Id} -> 64-A0-E7-D3-14-03 Thu Mar 24 12:22:58 2016 : Debug: expand: policy.mac-addr -> policy.mac-addr Thu Mar 24 12:22:58 2016 : Debug: expand: ^%{config:policy.mac-addr}(:(.+))?$ -> ^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$ Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating ("%{Called-Station-Id}" =~ /^%{config:policy.mac-addr}(:(.+))?$/i) -> TRUE Thu Mar 24 12:22:58 2016 : Debug: +++? if ((Called-Station-Id) && "%{Called-Station-Id}" =~ /^%{config:policy.mac-addr}(:(.+))?$/i) -> TRUE Thu Mar 24 12:22:58 2016 : Debug: +++if ((Called-Station-Id) && "%{Called-Station-Id}" =~ /^%{config:policy.mac-addr}(:(.+))?$/i) {
Thu Mar 24 12:22:58 2016 : Debug: ++++update request {
Thu Mar 24 12:22:58 2016 : Debug: expand: %{1}:%{2}:%{3}:%{4}:%{5}:%{6} -> 64:A0:E7:D3:14:03 Thu Mar 24 12:22:58 2016 : Debug: expand: %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}} -> 64:a0:e7:d3:14:03
Thu Mar 24 12:22:58 2016 : Debug: ++++} # update request = noop
Thu Mar 24 12:22:58 2016 : Debug: ++++? if ("%{8}")
Thu Mar 24 12:22:58 2016 : Debug:       expand: %{8} ->
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating ("%{8}") -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? if ("%{8}") -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif ((Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i)
Thu Mar 24 12:22:58 2016 : Debug: ?? Evaluating (Colubris-AVPair) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ? Skipping ("%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif ((Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif (Aruba-Essid-Name)
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating (Aruba-Essid-Name) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif (Aruba-Essid-Name) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif ((Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i)
Thu Mar 24 12:22:58 2016 : Debug: ?? Evaluating (Cisco-AVPair) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: expand: %{Cisco-AVPair} -> audit-session-id=0A0A0A0A0000001B087ED2BB Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating ("%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE Thu Mar 24 12:22:58 2016 : Debug: ++++? elsif ((Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
Thu Mar 24 12:22:58 2016 : Debug: ++++[updated] = updated
Thu Mar 24 12:22:58 2016 : Debug: +++} # if ((Called-Station-Id) && "%{Called-Station-Id}" =~ /^%{config:policy.mac-addr}(:(.+))?$/i) = updated Thu Mar 24 12:22:58 2016 : Debug: +++ ... skipping else for request 0: Preceding "if" was taken Thu Mar 24 12:22:58 2016 : Debug: ++} # policy set.called_station_ssid = updated Thu Mar 24 12:22:58 2016 : Debug: [suffix] No '@' in User-Name = "18a905cf0442", skipping NULL due to config.
Thu Mar 24 12:22:58 2016 : Debug: ++[suffix] = noop
Thu Mar 24 12:22:58 2016 : Debug: [ntdomain] No '\' in User-Name = "18a905cf0442", looking up realm NULL
Thu Mar 24 12:22:58 2016 : Debug: [ntdomain] No such realm "NULL"
Thu Mar 24 12:22:58 2016 : Debug: ++[ntdomain] = noop
Thu Mar 24 12:22:58 2016 : Debug: ++[preprocess] = ok
Thu Mar 24 12:22:58 2016 : Debug: [eap] No EAP-Message, not doing EAP
Thu Mar 24 12:22:58 2016 : Debug: ++[eap] = noop
Thu Mar 24 12:22:58 2016 : Debug: [files] users: Matched entry DEFAULT at line 2
Thu Mar 24 12:22:58 2016 : Debug: ++[files] = ok
Thu Mar 24 12:22:58 2016 : Debug: ++[expiration] = noop
Thu Mar 24 12:22:58 2016 : Debug: ++[logintime] = noop
Thu Mar 24 12:22:58 2016 : Debug: ++update request {
Thu Mar 24 12:22:58 2016 : Debug: expand: %{Packet-Src-IP-Address} -> 10.10.10.10
Thu Mar 24 12:22:58 2016 : Debug: ++} # update request = noop
Thu Mar 24 12:22:58 2016 : Debug: ++update control {
Thu Mar 24 12:22:58 2016 : Debug: ++} # update control = noop
Thu Mar 24 12:22:58 2016 : Debug: ++[packetfence] = noop
Thu Mar 24 12:22:58 2016 : Debug: +} # group authorize = updated
Thu Mar 24 12:22:58 2016 : Debug: Found Auth-Type = Accept
Thu Mar 24 12:22:58 2016 : Debug: Auth-Type = Accept, accepting the user
Thu Mar 24 12:22:58 2016 : Debug: } # server packetfence
Thu Mar 24 12:22:58 2016 : Debug: # Executing section post-auth from file /usr/local/pf/raddb//sites-enabled/packetfence
Thu Mar 24 12:22:58 2016 : Debug: +group post-auth {
Thu Mar 24 12:22:58 2016 : Debug: ++[exec] = noop
Thu Mar 24 12:22:58 2016 : Debug: ++? if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP))
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating !(EAP-Type ) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: ?? Skipping (EAP-Type != EAP-TTLS  )
Thu Mar 24 12:22:58 2016 : Debug: ?? Skipping (EAP-Type != PEAP)
Thu Mar 24 12:22:58 2016 : Debug: ++? if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) -> TRUE Thu Mar 24 12:22:58 2016 : Debug: ++if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) {
Thu Mar 24 12:22:58 2016 : Debug: +++update control {
Thu Mar 24 12:22:58 2016 : Debug: +++} # update control = noop
Thu Mar 24 12:22:58 2016 : Debug: +++[packetfence] = fail
Thu Mar 24 12:22:58 2016 : Debug: ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) = fail
Thu Mar 24 12:22:58 2016 : Debug: +} # group post-auth = fail
Thu Mar 24 12:22:58 2016 : Debug: Using Post-Auth-Type Reject
Thu Mar 24 12:22:58 2016 : Debug: # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence
Thu Mar 24 12:22:58 2016 : Debug: +group REJECT {
Thu Mar 24 12:22:58 2016 : Debug: ++? if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP))
Thu Mar 24 12:22:58 2016 : Debug: ? Evaluating !(EAP-Type ) -> TRUE
Thu Mar 24 12:22:58 2016 : Debug: ?? Skipping (EAP-Type != EAP-TTLS  )
Thu Mar 24 12:22:58 2016 : Debug: ?? Skipping (EAP-Type != PEAP)
Thu Mar 24 12:22:58 2016 : Debug: ++? if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) -> TRUE Thu Mar 24 12:22:58 2016 : Debug: ++if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) { Thu Mar 24 12:22:58 2016 : Debug: [sql] expand: %{User-Name} -> 18a905cf0442 Thu Mar 24 12:22:58 2016 : Debug: [sql] sql_set_user escaped user --> '18a905cf0442' Thu Mar 24 12:22:58 2016 : Debug: [sql] expand: %{check:Post-Auth-Type} -> Reject Thu Mar 24 12:22:58 2016 : Debug: [sql] expand: INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name, stripped_user_name, realm, event_type, switch_id, switch_mac, switch_ip_address, radius_source_ip_address, called_station_id, calling_station_id, nas_port_type, ssid, nas_port_id, ifindex, nas_port, connection_type, nas_ip_address, nas_identifier, auth_status, reason, auth_type, eap_type, role, node_status, profile, source, auto_reg, is_phone, pf_domain, uuid, radius_request, radius_reply) VALUES ( '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}', '%{control:PacketFence-Computer-Name}', '%{request:User-Name}', '%{request:Stripped-User-Name}', '%{request:Realm}', 'Radius-Access-Request', '%{control:PacketFence-Switch-Id}', '%{control:PacketFence-Switch-Mac}', '%{control:PacketFence-Switch-Ip-Address}', '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}', '%{req
À\Thu Mar 24 12:22:58 2016 : Debug: +++[sql] = ok
Thu Mar 24 12:22:58 2016 : Debug: ++} # if (!EAP-Type || (EAP-Type != EAP-TTLS && EAP-Type != PEAP)) = ok Thu Mar 24 12:22:58 2016 : Debug: [attr_filter.access_reject] expand: %{User-Name} -> 18a905cf0442
Thu Mar 24 12:22:58 2016 : Debug: ++[attr_filter.access_reject] = updated
Thu Mar 24 12:22:58 2016 : Debug: +} # group REJECT = updated
Thu Mar 24 12:22:58 2016 : Debug: Delaying reject of request 0 for 1 seconds
Thu Mar 24 12:22:59 2016 : Debug: Sending delayed reject for request 0
Thu Mar 24 12:22:59 2016 : Debug: Sending Access-Reject packet to host 10.10.10.10 port 1645, id=32, length=0 Thu Mar 24 12:23:04 2016 : Debug: Cleaning up request 0 ID 32 with timestamp +145
[root@pfptnyc ~]#

Any help to be offerred will be appreciated.

Anthony



------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://pubads.g.doubleclick.net/gampad/clk?id=278785351&iu=/4140


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://pubads.g.doubleclick.net/gampad/clk?id=278785351&iu=/4140
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to