Hello Pierrick,
can you enable OMAPI (configuration -> OMAPI) and retry ?
Regards
Fabrice
Le 2016-05-25 07:08, PROST pierrick a écrit :
Hi everyone,
I’m continu to testing captive portal (inline configuration), we have
problem with iphone 4S (ios 9.3.2), there is log file . Someone as an
idea ?
Regards
May 25 13:01:03 httpd.portal(1542) INFO: [mac:38:59:f9:14:62:37]
Instantiate a new iptables modification method. pf::ipset
(pf::inline::get_technique)
May 25 13:01:03 httpd.portal(1539) ERROR: [mac:unknown] Can't bind :
IO::Socket::INET: connect: Connexion refusée
(pf::iplog::_get_lease_from_omapi)
May 25 13:01:03 httpd.portal(1539) WARN: [mac:unknown] Unable to match
MAC address to IP '192.168.12.10' (pf::iplog::ip2mac)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:unknown] Instantiate
profile default (pf::Portal::ProfileFactory::_from_profile)
May 25 13:01:03 httpd.portal(1539) ERROR: [mac:unknown] Can't bind :
IO::Socket::INET: connect: Connexion refusée
(pf::iplog::_get_lease_from_omapi)
May 25 13:01:03 httpd.portal(1539) WARN: [mac:unknown] Unable to match
MAC address to IP '192.168.12.10' (pf::iplog::ip2mac)
May 25 13:01:03 httpd.portal(1771) INFO: [mac:[undef]] Dealing with a
endpoint / browser with captive-portal detection capabilities while
having a self-signed SSL certificate. Using HTTP instead of HTTPS
(pf::web::dispatcher::handler)
May 25 13:01:03 httpd.portal(1771) INFO: [mac:[undef]] Instantiate a
new iptables modification method. pf::ipset (pf::inline::get_technique)
May 25 13:01:03 httpd.portal(1539) ERROR: [mac:0] Can't bind :
IO::Socket::INET: connect: Connexion refusée
(pf::iplog::_get_lease_from_omapi)
May 25 13:01:03 httpd.portal(1539) WARN: [mac:0] Unable to match MAC
address to IP '192.168.12.10' (pf::iplog::ip2mac)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] Instantiate profile
default (pf::Portal::ProfileFactory::_from_profile)
May 25 13:01:03 httpd.portal(1539) ERROR: [mac:0] Can't bind :
IO::Socket::INET: connect: Connexion refusée
(pf::iplog::_get_lease_from_omapi)
May 25 13:01:03 httpd.portal(1539) WARN: [mac:0] Unable to match MAC
address to IP '192.168.12.10' (pf::iplog::ip2mac)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] Instantiate profile
default (pf::Portal::ProfileFactory::_from_profile)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] Updating node
user_agent with useragent: 'Mozilla/5.0 (iPhone; CPU iPhone OS 9_2_1
like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13D15'
(captiveportal::PacketFence::DynamicRouting::Application::process_user_agent)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] database query failed
with: Duplicate entry '0' for key 'PRIMARY' (errno: 1062)
(pf::db::db_query_execute)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] Static User-Agent
lookup data initialized (pf::useragent::_init)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] violation not added,
MAC 0 is invalid! trigger useragent::603
(pf::violation::violation_trigger)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] violation not added,
MAC 0 is invalid! trigger useragent::111
(pf::violation::violation_trigger)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] violation not added,
MAC 0 is invalid! trigger useragent::300
(pf::violation::violation_trigger)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] violation not added,
MAC 0 is invalid! trigger useragent::5 (pf::violation::violation_trigger)
May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] violation not added,
MAC 0 is invalid! trigger useragent::100
(pf::violation::violation_trigger)
May 25 13:01:03 httpd.portal(1544) INFO: [mac:0] Dealing with a
endpoint / browser with captive-portal detection capabilities while
having a self-signed SSL certificate. Using HTTP instead of HTTPS
(pf::web::dispatcher::handler)
May 25 13:01:03 httpd.portal(1544) INFO: [mac:0] Instantiate a new
iptables modification method. pf::ipset (pf::inline::get_technique)
------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Fabrice Durand
fdur...@inverse.ca :: +1.514.447.4918 (x135) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)
------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users