Good news I tried with a other user and It works I got an IP address for the
registration vlan and I have the web captive portal but I cant connect when I
use the username and the password of the user but this is is my radius debug
Hope it will help
User-Name = "Anisha.kindo"(9) Service-Type = Framed-User(9) Framed-MTU =
1500(9) Called-Station-Id = "EC-44-76-87-F0-83"(9) Calling-Station-Id =
"00-40-D0-67-D0-B1"(9) EAP-Message =
0x020b002b1900170301002022c5d7f1d12476323a8432e284680d4acba3e8506518d4b0fd054ca8589a7631(9)
Message-Authenticator = 0x72daab2cdbfc369a37bc5b0e9cd1a5ca(9) Cisco-AVPair
= "audit-session-id=C0A80105000000190041662F"(9) NAS-Port-Type = Ethernet(9)
NAS-Port = 50003(9) NAS-Port-Id = "FastEthernet0/3"(9) State =
0x2fafff6627a4e6d797c40734df780052(9) NAS-IP-Address = 192.168.1.5(9)
session-state: No cached attributes(9) # Executing section authorize from file
/usr/local/pf/raddb//sites-enabled/packetfence(9) authorize {(9) update
{(9) EXPAND %{Packet-Src-IP-Address}(9) --> 192.168.1.5(9)
&request:FreeRADIUS-Client-IP-Address := 192.168.1.5(9)
&control:PacketFence-RPC-Server = 127.0.0.1(9)
&control:PacketFence-RPC-Port = 7070(9) &control:PacketFence-RPC-User =
(9) &control:PacketFence-RPC-Pass = (9)
&control:PacketFence-RPC-Proto = http(9) EXPAND %l(9) -->
1462998161(9) &control:Tmp-Integer-0 := 1462998161(9)
&control:PacketFence-Request-Time := 0(9) } # update = noop(9) policy
rewrite_calling_station_id {(9) if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{(9) if (&Calling-Station-Id && (&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
-> TRUE(9) if (&Calling-Station-Id && (&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{(9) update request {(9) EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}(9) -->
00:40:d0:67:d0:b1(9) &Calling-Station-Id := 00:40:d0:67:d0:b1(9)
} # update request = noop(9) [updated] = updated(9) } # if
(&Calling-Station-Id && (&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
= updated(9) ... skipping else for request 9: Preceding "if" was
taken(9) } # policy rewrite_calling_station_id = updated(9) policy
rewrite_called_station_id {(9) if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{(9) if ((&Called-Station-Id) && (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> TRUE(9) if ((&Called-Station-Id) && (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{(9) update request {(9) &Called-Station-Id !* ANY(9)
EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}(9) -->
ec:44:76:87:f0:83(9) &Called-Station-Id := ec:44:76:87:f0:83(9)
} # update request = noop(9) if ("%{8}") {(9) EXPAND %{8}(9)
--> (9) if ("%{8}") -> FALSE(9) elsif (
(Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {(9) elsif
( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE(9)
elsif (Aruba-Essid-Name) {(9) elsif (Aruba-Essid-Name) -> FALSE(9)
elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {(9)
EXPAND %{Cisco-AVPair}(9) -->
audit-session-id=C0A80105000000190041662F(9) elsif ( (Cisco-AVPair) &&
"%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE(9) [updated] =
updated(9) } # if ((&Called-Station-Id) && (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
= updated(9) ... skipping else for request 9: Preceding "if" was
taken(9) } # policy rewrite_called_station_id = updated(9) policy
filter_username {(9) if (&User-Name) {(9) if (&User-Name) ->
TRUE(9) if (&User-Name) {(9) if (&User-Name =~ / /) {(9)
if (&User-Name =~ / /) -> FALSE(9) if (&User-Name =~ /@[^@]*@/ ) {(9)
if (&User-Name =~ /@[^@]*@/ ) -> FALSE(9) if (&User-Name =~
/\.\./ ) {(9) if (&User-Name =~ /\.\./ ) -> FALSE(9) if
((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {(9) if
((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE(9)
if (&User-Name =~ /\.$/) {(9) if (&User-Name =~ /\.$/) -> FALSE(9)
if (&User-Name =~ /@\./) {(9) if (&User-Name =~ /@\./) ->
FALSE(9) } # if (&User-Name) = updated(9) } # policy filter_username
= updated(9) policy filter_password {(9) if (&User-Password &&
(&User-Password != "%{string:User-Password}")) {(9) if (&User-Password &&
(&User-Password != "%{string:User-Password}")) -> FALSE(9) } # policy
filter_password = updated(9) [preprocess] = ok(9) suffix: Checking for
suffix after "@"(9) suffix: No '@' in User-Name = "Anisha.kindo", skipping NULL
due to config.(9) [suffix] = noop(9) ntdomain: Checking for prefix before
"\"(9) ntdomain: No '\' in User-Name = "Anisha.kindo", looking up realm NULL(9)
ntdomain: No such realm "NULL"(9) [ntdomain] = noop(9) eap: Peer sent EAP
Response (code 2) ID 11 length 43(9) eap: Continuing tunnel setup(9) [eap]
= ok(9) } # authorize = ok(9) Found Auth-Type = eap(9) # Executing group from
file /usr/local/pf/raddb//sites-enabled/packetfence(9) authenticate {(9) eap:
Expiring EAP session with state 0x2fafff6627a4e6d7(9) eap: Finished EAP session
with state 0x2fafff6627a4e6d7(9) eap: Previous EAP request found for state
0x2fafff6627a4e6d7, released from the list(9) eap: Peer sent packet with method
EAP PEAP (25)(9) eap: Calling submodule eap_peap to process data(9) eap_peap:
Continuing EAP-TLS(9) eap_peap: [eaptls verify] = ok(9) eap_peap: Done initial
handshake(9) eap_peap: [eaptls process] = ok(9) eap_peap: Session established.
Decoding tunneled attributes(9) eap_peap: PEAP state send tlv success(9)
eap_peap: Received EAP-TLV response(9) eap_peap: Success(9) eap_peap: Using
saved attributes from the original Access-Accept(9) eap_peap: User-Name =
"Anisha.kindo"(9) eap_peap: Tunnel-Type = VLAN(9) eap_peap:
Tunnel-Private-Group-Id = "100"(9) eap_peap: Filter-Id = "registration.in"(9)
eap_peap: Tunnel-Medium-Type = IEEE-802(9) eap: Sending EAP Success (code 3)
ID 11 length 4(9) eap: Freeing handler(9) [eap] = ok(9) } # authenticate
= ok(9) # Executing section post-auth from file
/usr/local/pf/raddb//sites-enabled/packetfence(9) post-auth {(9) update
{(9) EXPAND %{Packet-Src-IP-Address}(9) --> 192.168.1.5(9)
&request:FreeRADIUS-Client-IP-Address := 192.168.1.5(9)
&control:PacketFence-RPC-Server = 127.0.0.1(9)
&control:PacketFence-RPC-Port = 7070(9) &control:PacketFence-RPC-User =
(9) &control:PacketFence-RPC-Pass = (9)
&control:PacketFence-RPC-Proto = http(9) } # update = noop(9) if (!
EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) {(9) if (! EAP-Type
|| (EAP-Type != TTLS && EAP-Type != PEAP) ) -> FALSE(9)
attr_filter.packetfence_post_auth: EXPAND %{User-Name}(9)
attr_filter.packetfence_post_auth: --> Anisha.kindo(9)
attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10(9)
[attr_filter.packetfence_post_auth] = updated(9) linelog: EXPAND
messages.%{%{reply:Packet-Type}:-default}(9) linelog: -->
messages.Access-Accept(9) linelog: EXPAND %t : [mac:%{Calling-Station-Id}]
Accepted user: %{reply:User-Name} and returned VLAN
%{reply:Tunnel-Private-Group-ID}(9) linelog: --> Wed May 11 22:22:41 2016 :
[mac:00:40:d0:67:d0:b1] Accepted user: Anisha.kindo and returned VLAN 100(9)
linelog: EXPAND /usr/local/pf/logs/radius.log(9) linelog: -->
/usr/local/pf/logs/radius.log(9) [linelog] = ok(9) } # post-auth =
updated(9) Login OK: [Anisha.kindo] (from client 192.168.1.5 port 50003 cli
00:40:d0:67:d0:b1)(9) Sent Access-Accept Id 137 from 192.168.10.1:1812 to
192.168.1.5:1645 length 0(9) User-Name = "Anisha.kindo"(9) Tunnel-Type =
VLAN(9) Tunnel-Private-Group-Id = "100"(9) Filter-Id = "registration.in"(9)
Tunnel-Medium-Type = IEEE-802(9) MS-MPPE-Recv-Key =
0xcce61f8772c744cdfd538ca370986b88625a29194a7d85e953482a38c240dde1(9)
MS-MPPE-Send-Key =
0x7867072beffe2d9a69af3f6026b26041875a722cdab05e9e154d558ecb7fd64a(9)
EAP-Message = 0x030b0004(9) Message-Authenticator =
0x00000000000000000000000000000000(9) Finished requestWaking up in 4.6
seconds.(0) Cleaning up request packet ID 128 with timestamp +4(1) Cleaning up
request packet ID 129 with timestamp +4(2) Cleaning up request packet ID 130
with timestamp +4(3) Cleaning up request packet ID 131 with timestamp +4(4)
Cleaning up request packet ID 132 with timestamp +4(5) Cleaning up request
packet ID 133 with timestamp +4(6) Cleaning up request packet ID 134 with
timestamp +4(7) Cleaning up request packet ID 135 with timestamp +4Waking up in
0.1 seconds.(8) Cleaning up request packet ID 136 with timestamp +4(9) Cleaning
up request packet ID 137 with timestamp +5Ready to process requests
Le Mercredi 11 mai 2016 20h54, Louis Munro <[email protected]> a écrit :
On May 11, 2016, at 15:45 , TOURE Amidou Florian <[email protected]>
wrote:
I got a logon failure and this is the output [root@localhost toure]# ntlm_auth
--request-nt-key --username=Administrateur --challenge=c330d9e5a3d1ecdf
--nt-response=fa1cb5436a574339be984a38670c37bd8554f4e5afe4a141 Logon failure
(0xc000006d)
Then your username or password is incorrect.
--
Louis Munro
[email protected] :: www.inverse.ca
+1.514.447.4918 x125 :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)
------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users