Hello Pierrick,

can you enable OMAPI (configuration -> OMAPI) and retry ?

Regards
Fabrice


Le 2016-05-25 07:08, PROST pierrick a écrit :

Hi everyone,

I’m continu to testing captive portal (inline configuration), we have problem with iphone 4S (ios 9.3.2), there is log file . Someone as an idea ?

Regards

May 25 13:01:03 httpd.portal(1542) INFO: [mac:38:59:f9:14:62:37] Instantiate a new iptables modification method. pf::ipset (pf::inline::get_technique)

May 25 13:01:03 httpd.portal(1539) ERROR: [mac:unknown] Can't bind : IO::Socket::INET: connect: Connexion refusée

(pf::iplog::_get_lease_from_omapi)

May 25 13:01:03 httpd.portal(1539) WARN: [mac:unknown] Unable to match MAC address to IP '192.168.12.10' (pf::iplog::ip2mac)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:unknown] Instantiate profile default (pf::Portal::ProfileFactory::_from_profile)

May 25 13:01:03 httpd.portal(1539) ERROR: [mac:unknown] Can't bind : IO::Socket::INET: connect: Connexion refusée

(pf::iplog::_get_lease_from_omapi)

May 25 13:01:03 httpd.portal(1539) WARN: [mac:unknown] Unable to match MAC address to IP '192.168.12.10' (pf::iplog::ip2mac)

May 25 13:01:03 httpd.portal(1771) INFO: [mac:[undef]] Dealing with a endpoint / browser with captive-portal detection capabilities while having a self-signed SSL certificate. Using HTTP instead of HTTPS (pf::web::dispatcher::handler)

May 25 13:01:03 httpd.portal(1771) INFO: [mac:[undef]] Instantiate a new iptables modification method. pf::ipset (pf::inline::get_technique)

May 25 13:01:03 httpd.portal(1539) ERROR: [mac:0] Can't bind : IO::Socket::INET: connect: Connexion refusée

(pf::iplog::_get_lease_from_omapi)

May 25 13:01:03 httpd.portal(1539) WARN: [mac:0] Unable to match MAC address to IP '192.168.12.10' (pf::iplog::ip2mac)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] Instantiate profile default (pf::Portal::ProfileFactory::_from_profile)

May 25 13:01:03 httpd.portal(1539) ERROR: [mac:0] Can't bind : IO::Socket::INET: connect: Connexion refusée

(pf::iplog::_get_lease_from_omapi)

May 25 13:01:03 httpd.portal(1539) WARN: [mac:0] Unable to match MAC address to IP '192.168.12.10' (pf::iplog::ip2mac)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] Instantiate profile default (pf::Portal::ProfileFactory::_from_profile)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] Updating node user_agent with useragent: 'Mozilla/5.0 (iPhone; CPU iPhone OS 9_2_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13D15' (captiveportal::PacketFence::DynamicRouting::Application::process_user_agent)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] database query failed with: Duplicate entry '0' for key 'PRIMARY' (errno: 1062) (pf::db::db_query_execute)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] Static User-Agent lookup data initialized (pf::useragent::_init)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] violation not added, MAC 0 is invalid! trigger useragent::603 (pf::violation::violation_trigger)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] violation not added, MAC 0 is invalid! trigger useragent::111 (pf::violation::violation_trigger)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] violation not added, MAC 0 is invalid! trigger useragent::300 (pf::violation::violation_trigger)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] violation not added, MAC 0 is invalid! trigger useragent::5 (pf::violation::violation_trigger)

May 25 13:01:03 httpd.portal(1539) INFO: [mac:0] violation not added, MAC 0 is invalid! trigger useragent::100 (pf::violation::violation_trigger)

May 25 13:01:03 httpd.portal(1544) INFO: [mac:0] Dealing with a endpoint / browser with captive-portal detection capabilities while having a self-signed SSL certificate. Using HTTP instead of HTTPS (pf::web::dispatcher::handler)

May 25 13:01:03 httpd.portal(1544) INFO: [mac:0] Instantiate a new iptables modification method. pf::ipset (pf::inline::get_technique)



------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j


_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

--
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)

------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to