hi all
i try to configure packetfence act as eduroam server.
i have problem, all my local user or realm can't connect from other
university.
after debugging i realize all radius request from other university access
point is rejected, i see this log in freeradius.
ERROR: rest:
{"control:PacketFence-Authorization-Status":"allow","Reply-Message":"Switch
is not managed by
PacketFence","control:PacketFence-Request-Time":1529567567}
after that i try to add some access point to packetfence switch
configuration, and then i can connect.
do i need add all access point in eduroam federation? or i miss
configuration in eduroam integration with packetfence.
attach my radius-eduroam log file.
thanks.
(513) Thu Jun 21 14:52:47 2018: Debug: Received Access-Request Id 168 from
203.100.23.60:42290 to 203.100.59.39:11812 length 196
(513) Thu Jun 21 14:52:47 2018: Debug: User-Name = "[email protected]"
(513) Thu Jun 21 14:52:47 2018: Debug: Calling-Station-Id =
"0C-98-38-62-CA-8F"
(513) Thu Jun 21 14:52:47 2018: Debug: Called-Station-Id =
"84:b8:02:04:63:a0:eduroam"
(513) Thu Jun 21 14:52:47 2018: Debug: NAS-IP-Address = 192.168.127.8
(513) Thu Jun 21 14:52:47 2018: Debug: NAS-Identifier = "WLC-RU-4"
(513) Thu Jun 21 14:52:47 2018: Debug: EAP-Message =
0x020900251900170303001a000000000000000321e7fa5b22f28787957574744ebb600e4320
(513) Thu Jun 21 14:52:47 2018: Debug: State =
0xf4599259f3508bde1444eca174e1fcad
(513) Thu Jun 21 14:52:47 2018: Debug: Message-Authenticator =
0xa75a12467b9e02ca40faab9c8152101e
(513) Thu Jun 21 14:52:47 2018: Debug: Operator-Name = "1ru.nl"
(513) Thu Jun 21 14:52:47 2018: Debug: Proxy-State = 0x3238
(513) Thu Jun 21 14:52:47 2018: Debug: Proxy-State = 0x3533
(513) Thu Jun 21 14:52:47 2018: Debug: session-state: No cached attributes
(513) Thu Jun 21 14:52:47 2018: Debug: # Executing section authorize from file
/usr/local/pf/raddb/sites-enabled/eduroam
(513) Thu Jun 21 14:52:47 2018: Debug: authorize {
(513) Thu Jun 21 14:52:47 2018: Debug: update {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND %{Packet-Src-IP-Address}
(513) Thu Jun 21 14:52:47 2018: Debug: --> 203.100.23.60
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND %l
(513) Thu Jun 21 14:52:47 2018: Debug: --> 1529567567
(513) Thu Jun 21 14:52:47 2018: Debug: } # update = noop
(513) Thu Jun 21 14:52:47 2018: Debug: policy rewrite_calling_station_id {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(513) Thu Jun 21 14:52:47 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
-> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(513) Thu Jun 21 14:52:47 2018: Debug: update request {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(513) Thu Jun 21 14:52:47 2018: Debug: --> 0c:98:38:62:ca:8f
(513) Thu Jun 21 14:52:47 2018: Debug: } # update request = noop
(513) Thu Jun 21 14:52:47 2018: Debug: [updated] = updated
(513) Thu Jun 21 14:52:47 2018: Debug: } # if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
= updated
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping else: Preceding "if"
was taken
(513) Thu Jun 21 14:52:47 2018: Debug: } # policy
rewrite_calling_station_id = updated
(513) Thu Jun 21 14:52:47 2018: Debug: policy rewrite_called_station_id {
(513) Thu Jun 21 14:52:47 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(513) Thu Jun 21 14:52:47 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(513) Thu Jun 21 14:52:47 2018: Debug: update request {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(513) Thu Jun 21 14:52:47 2018: Debug: --> 84:b8:02:04:63:a0
(513) Thu Jun 21 14:52:47 2018: Debug: } # update request = noop
(513) Thu Jun 21 14:52:47 2018: Debug: if ("%{8}") {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND %{8}
(513) Thu Jun 21 14:52:47 2018: Debug: --> eduroam
(513) Thu Jun 21 14:52:47 2018: Debug: if ("%{8}") -> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if ("%{8}") {
(513) Thu Jun 21 14:52:47 2018: Debug: update request {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND
%{Called-Station-Id}:%{8}
(513) Thu Jun 21 14:52:47 2018: Debug: -->
84:b8:02:04:63:a0:eduroam
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND %{8}
(513) Thu Jun 21 14:52:47 2018: Debug: --> eduroam
(513) Thu Jun 21 14:52:47 2018: Debug: } # update request = noop
(513) Thu Jun 21 14:52:47 2018: Debug: } # if ("%{8}") = noop
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(513) Thu Jun 21 14:52:47 2018: Debug: [updated] = updated
(513) Thu Jun 21 14:52:47 2018: Debug: } # if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
= updated
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping else: Preceding "if"
was taken
(513) Thu Jun 21 14:52:47 2018: Debug: } # policy rewrite_called_station_id
= updated
(513) Thu Jun 21 14:52:47 2018: Debug: policy filter_username {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name) -> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ / /) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ / /) -> FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /@[^@]*@/ )
-> FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /\.\./ ) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /\.\./ ) ->
FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) {
(513) Thu Jun 21 14:52:47 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /\.$/) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /\.$/) ->
FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /@\./) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /@\./) ->
FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: } # if (&User-Name) = updated
(513) Thu Jun 21 14:52:47 2018: Debug: } # policy filter_username = updated
(513) Thu Jun 21 14:52:47 2018: Debug: policy filter_password {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) -> FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: } # policy filter_password = updated
(513) Thu Jun 21 14:52:47 2018: Debug: [preprocess] = ok
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Checking for suffix after "@"
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Looking up realm
"myuniversity.edu" for User-Name = "[email protected]"
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Found realm "myuniversity.edu"
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Adding Stripped-User-Name =
"prama"
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Adding Realm = "myuniversity.edu"
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Authentication realm is LOCAL
(513) Thu Jun 21 14:52:47 2018: Debug: [suffix] = ok
(513) Thu Jun 21 14:52:47 2018: Debug: ntdomain: Request already has
destination realm set. Ignoring
(513) Thu Jun 21 14:52:47 2018: Debug: [ntdomain] = noop
(513) Thu Jun 21 14:52:47 2018: Debug: if (User-Name =~ /@/) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (User-Name =~ /@/) -> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if (User-Name =~ /@/) {
(513) Thu Jun 21 14:52:47 2018: Debug: if ( Realm == "myuniversity.edu" )
{
(513) Thu Jun 21 14:52:47 2018: Debug: if ( Realm == "myuniversity.edu" )
-> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if ( Realm == "myuniversity.edu" )
{
(513) Thu Jun 21 14:52:47 2018: Debug: update control {
(513) Thu Jun 21 14:52:47 2018: Debug: } # update control = noop
(513) Thu Jun 21 14:52:47 2018: Debug: } # if ( Realm ==
"myuniversity.edu" ) = noop
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping else: Preceding "if"
was taken
(513) Thu Jun 21 14:52:47 2018: Debug: } # if (User-Name =~ /@/) = noop
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping else: Preceding "if"
was taken
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Peer sent EAP Response (code 2) ID
9 length 37
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Continuing tunnel setup
(513) Thu Jun 21 14:52:47 2018: Debug: [eap] = ok
(513) Thu Jun 21 14:52:47 2018: Debug: } # authorize = ok
(513) Thu Jun 21 14:52:47 2018: WARNING: You set Proxy-To-Realm = default, but
it is a LOCAL realm! Cancelling proxy request.
(513) Thu Jun 21 14:52:47 2018: Debug: Found Auth-Type = eap
(513) Thu Jun 21 14:52:47 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/eduroam
(513) Thu Jun 21 14:52:47 2018: Debug: authenticate {
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Expiring EAP session with state
0xca7f480ecb765230
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Finished EAP session with state
0xf4599259f3508bde
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Previous EAP request found for
state 0xf4599259f3508bde, released from the list
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Peer sent packet with method EAP
PEAP (25)
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Calling submodule eap_peap to
process data
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Continuing EAP-TLS
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: [eaptls verify] = ok
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Done initial handshake
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: [eaptls process] = ok
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Session established. Decoding
tunneled attributes
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: PEAP state phase2
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: EAP method MSCHAPv2 (26)
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Got tunneled request
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: EAP-Message = 0x020900061a03
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Setting User-Name to
[email protected]
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Sending tunneled request to
packetfence-tunnel
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: EAP-Message = 0x020900061a03
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: FreeRADIUS-Proxied-To =
127.0.0.1
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: User-Name =
"[email protected]"
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: State =
0xca7f480ecb7652303a9e8566b6e8026d
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Calling-Station-Id :=
"0c:98:38:62:ca:8f"
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: NAS-IP-Address =
192.168.127.8
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: NAS-Identifier = "WLC-RU-4"
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Operator-Name = "1ru.nl"
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Called-Station-Id :=
"84:b8:02:04:63:a0:eduroam"
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Event-Timestamp = "Jun 21
2018 14:52:47 WIB"
(513) Thu Jun 21 14:52:47 2018: Debug: Virtual server packetfence-tunnel
received request
(513) Thu Jun 21 14:52:47 2018: Debug: EAP-Message = 0x020900061a03
(513) Thu Jun 21 14:52:47 2018: Debug: FreeRADIUS-Proxied-To = 127.0.0.1
(513) Thu Jun 21 14:52:47 2018: Debug: User-Name = "[email protected]"
(513) Thu Jun 21 14:52:47 2018: Debug: State =
0xca7f480ecb7652303a9e8566b6e8026d
(513) Thu Jun 21 14:52:47 2018: Debug: Calling-Station-Id :=
"0c:98:38:62:ca:8f"
(513) Thu Jun 21 14:52:47 2018: Debug: NAS-IP-Address = 192.168.127.8
(513) Thu Jun 21 14:52:47 2018: Debug: NAS-Identifier = "WLC-RU-4"
(513) Thu Jun 21 14:52:47 2018: Debug: Operator-Name = "1ru.nl"
(513) Thu Jun 21 14:52:47 2018: Debug: Called-Station-Id :=
"84:b8:02:04:63:a0:eduroam"
(513) Thu Jun 21 14:52:47 2018: Debug: Event-Timestamp = "Jun 21 2018
14:52:47 WIB"
(513) Thu Jun 21 14:52:47 2018: WARNING: Outer and inner identities are the
same. User privacy is compromised.
(513) Thu Jun 21 14:52:47 2018: Debug: server packetfence-tunnel {
(513) Thu Jun 21 14:52:47 2018: Debug: session-state: No cached attributes
(513) Thu Jun 21 14:52:47 2018: Debug: # Executing section authorize from
file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(513) Thu Jun 21 14:52:47 2018: Debug: authorize {
(513) Thu Jun 21 14:52:47 2018: Debug: if ( outer.EAP-Type == TTLS) {
(513) Thu Jun 21 14:52:47 2018: Debug: if ( outer.EAP-Type == TTLS) ->
FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: policy filter_username {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name) -> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ / /) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ / /) ->
FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /@[^@]*@/ )
-> FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /\.\./ ) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /\.\./ ) ->
FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) {
(513) Thu Jun 21 14:52:47 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /\.$/) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /\.$/) ->
FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /@\./) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name =~ /@\./) ->
FALSE
(513) Thu Jun 21 14:52:47 2018: Debug: } # if (&User-Name) = notfound
(513) Thu Jun 21 14:52:47 2018: Debug: } # policy filter_username =
notfound
(513) Thu Jun 21 14:52:47 2018: Debug: [mschap] = noop
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Checking for suffix after "@"
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Looking up realm
"myuniversity.edu" for User-Name = "[email protected]"
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Found realm "myuniversity.edu"
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Adding Stripped-User-Name =
"prama"
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Adding Realm = "myuniversity.edu"
(513) Thu Jun 21 14:52:47 2018: Debug: suffix: Authentication realm is LOCAL
(513) Thu Jun 21 14:52:47 2018: Debug: [suffix] = ok
(513) Thu Jun 21 14:52:47 2018: Debug: ntdomain: Request already has
destination realm set. Ignoring
(513) Thu Jun 21 14:52:47 2018: Debug: [ntdomain] = noop
(513) Thu Jun 21 14:52:47 2018: Debug: update control {
(513) Thu Jun 21 14:52:47 2018: Debug: } # update control = noop
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Peer sent EAP Response (code 2) ID
9 length 6
(513) Thu Jun 21 14:52:47 2018: Debug: eap: No EAP Start, assuming it's an
on-going EAP conversation
(513) Thu Jun 21 14:52:47 2018: Debug: [eap] = updated
(513) Thu Jun 21 14:52:47 2018: Debug: policy rewrite_called_station_id {
(513) Thu Jun 21 14:52:47 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(513) Thu Jun 21 14:52:47 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(513) Thu Jun 21 14:52:47 2018: Debug: update request {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(513) Thu Jun 21 14:52:47 2018: Debug: --> 84:b8:02:04:63:a0
(513) Thu Jun 21 14:52:47 2018: Debug: } # update request = noop
(513) Thu Jun 21 14:52:47 2018: Debug: if ("%{8}") {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND %{8}
(513) Thu Jun 21 14:52:47 2018: Debug: --> eduroam
(513) Thu Jun 21 14:52:47 2018: Debug: if ("%{8}") -> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if ("%{8}") {
(513) Thu Jun 21 14:52:47 2018: Debug: update request {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND
%{Called-Station-Id}:%{8}
(513) Thu Jun 21 14:52:47 2018: Debug: -->
84:b8:02:04:63:a0:eduroam
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND %{8}
(513) Thu Jun 21 14:52:47 2018: Debug: --> eduroam
(513) Thu Jun 21 14:52:47 2018: Debug: } # update request = noop
(513) Thu Jun 21 14:52:47 2018: Debug: } # if ("%{8}") = noop
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(513) Thu Jun 21 14:52:47 2018: Debug: [updated] = updated
(513) Thu Jun 21 14:52:47 2018: Debug: } # if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
= updated
(513) Thu Jun 21 14:52:47 2018: Debug: ... skipping else: Preceding
"if" was taken
(513) Thu Jun 21 14:52:47 2018: Debug: } # policy
rewrite_called_station_id = updated
(513) Thu Jun 21 14:52:47 2018: Debug: ldap: EXPAND
(&(uid=%{%{Stripped-User-Name}:-%{User-Name}})(!(universityStatus=Blocked))(universityProxyStatus=TRUE)(&(|(!(universityStatus=Alumni))(&(universityStatus=Alumni)(|(universityStatus=Dosen)(universityStatus=Karyawan)(universityStatus=Peneliti))))))
(513) Thu Jun 21 14:52:47 2018: Debug: ldap: -->
(&(uid=prama)(!(universityStatus=Blocked))(universityProxyStatus=TRUE)(&(|(!(universityStatus=Alumni))(&(universityStatus=Alumni)(|(universityStatus=Dosen)(universityStatus=Karyawan)(universityStatus=Peneliti))))))
(513) Thu Jun 21 14:52:47 2018: Debug: ldap: Performing search in
"ou=people,dc=university,dc=ac,dc=id" with filter
"(&(uid=prama)(!(universityStatus=Blocked))(universityProxyStatus=TRUE)(&(|(!(universityStatus=Alumni))(&(universityStatus=Alumni)(|(universityStatus=Dosen)(universityStatus=Karyawan)(universityStatus=Peneliti))))))",
scope "sub"
(513) Thu Jun 21 14:52:47 2018: Debug: ldap: Waiting for search result...
(513) Thu Jun 21 14:52:47 2018: Debug: ldap: User object found at DN
"uid=prama,ou=people,dc=university,dc=ac,dc=id"
(513) Thu Jun 21 14:52:47 2018: Debug: ldap: Processing user attributes
(513) Thu Jun 21 14:52:47 2018: Debug: [ldap] = updated
(513) Thu Jun 21 14:52:47 2018: Debug: if (updated) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (updated) -> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if (updated) {
(513) Thu Jun 21 14:52:47 2018: Debug: update control {
(513) Thu Jun 21 14:52:47 2018: Debug: } # update control = noop
(513) Thu Jun 21 14:52:47 2018: Debug: } # if (updated) = noop
(513) Thu Jun 21 14:52:47 2018: Debug: pap: Converted:
&control:Password-With-Header -> &control:SSHA1-Password
(513) Thu Jun 21 14:52:47 2018: Debug: pap: Removing
&control:Password-With-Header
(513) Thu Jun 21 14:52:47 2018: Debug: pap: No {...} in Password-With-Header,
re-writing to Cleartext-Password
(513) Thu Jun 21 14:52:47 2018: Debug: pap: Removing
&control:Password-With-Header
(513) Thu Jun 21 14:52:47 2018: Debug: pap: Normalizing SSHA1-Password from
base64 encoding, 32 bytes -> 24 bytes
(513) Thu Jun 21 14:52:47 2018: WARNING: pap: Auth-Type already set. Not
setting to PAP
(513) Thu Jun 21 14:52:47 2018: Debug: [pap] = noop
(513) Thu Jun 21 14:52:47 2018: Debug: } # authorize = updated
(513) Thu Jun 21 14:52:47 2018: WARNING: You set Proxy-To-Realm = local, but
it is a LOCAL realm! Cancelling proxy request.
(513) Thu Jun 21 14:52:47 2018: Debug: Found Auth-Type = eap
(513) Thu Jun 21 14:52:47 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(513) Thu Jun 21 14:52:47 2018: Debug: authenticate {
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Expiring EAP session with state
0xca7f480ecb765230
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Finished EAP session with state
0xca7f480ecb765230
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Previous EAP request found for
state 0xca7f480ecb765230, released from the list
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Peer sent packet with method EAP
MSCHAPv2 (26)
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Calling submodule eap_mschapv2 to
process data
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Sending EAP Success (code 3) ID 9
length 4
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Freeing handler
(513) Thu Jun 21 14:52:47 2018: Debug: [eap] = ok
(513) Thu Jun 21 14:52:47 2018: Debug: } # authenticate = ok
(513) Thu Jun 21 14:52:47 2018: Debug: # Executing section post-auth from
file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(513) Thu Jun 21 14:52:47 2018: Debug: post-auth {
(513) Thu Jun 21 14:52:47 2018: Debug: policy packetfence-set-tenant-id {
(513) Thu Jun 21 14:52:47 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(513) Thu Jun 21 14:52:47 2018: Debug: --> 0
(513) Thu Jun 21 14:52:47 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(513) Thu Jun 21 14:52:47 2018: Debug: update control {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND %{User-Name}
(513) Thu Jun 21 14:52:47 2018: Debug: --> [email protected]
(513) Thu Jun 21 14:52:47 2018: Debug: SQL-User-Name set to
'[email protected]'
(513) Thu Jun 21 14:52:47 2018: Debug: Executing select query:
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'203.100.23.60'), 0)
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'%{Packet-Src-IP-Address}'), 0)}
(513) Thu Jun 21 14:52:47 2018: Debug: --> 0
(513) Thu Jun 21 14:52:47 2018: Debug: } # update control = noop
(513) Thu Jun 21 14:52:47 2018: Debug: } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
(513) Thu Jun 21 14:52:47 2018: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(513) Thu Jun 21 14:52:47 2018: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(513) Thu Jun 21 14:52:47 2018: Debug: update control {
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND %{User-Name}
(513) Thu Jun 21 14:52:47 2018: Debug: --> [email protected]
(513) Thu Jun 21 14:52:47 2018: Debug: SQL-User-Name set to
'[email protected]'
(513) Thu Jun 21 14:52:47 2018: Debug: Executing select query:
SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <=
INET_ATON('203.100.23.60') and INET_ATON('203.100.23.60') <= end_ip order by
range_length limit 1), 1)
(513) Thu Jun 21 14:52:47 2018: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <=
INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}')
<= end_ip order by range_length limit 1), 1)}
(513) Thu Jun 21 14:52:47 2018: Debug: --> 1
(513) Thu Jun 21 14:52:47 2018: Debug: } # update control = noop
(513) Thu Jun 21 14:52:47 2018: Debug: } # if (
&control:PacketFence-Tenant-Id == 0 ) = noop
(513) Thu Jun 21 14:52:47 2018: Debug: } # policy
packetfence-set-tenant-id = noop
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Expanding URI components
(513) Thu Jun 21 14:52:47 2018: Debug: rest: EXPAND http://127.0.0.1:7070
(513) Thu Jun 21 14:52:47 2018: Debug: rest: --> http://127.0.0.1:7070
(513) Thu Jun 21 14:52:47 2018: Debug: rest: EXPAND //radius/rest/authorize
(513) Thu Jun 21 14:52:47 2018: Debug: rest: --> //radius/rest/authorize
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Sending HTTP POST to
"http://127.0.0.1:7070//radius/rest/authorize"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute "User-Name"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute "NAS-IP-Address"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute "State"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute
"Called-Station-Id"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute
"Calling-Station-Id"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute "NAS-Identifier"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute
"Event-Timestamp"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute "EAP-Message"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute "Operator-Name"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute
"FreeRADIUS-Proxied-To"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute "EAP-Type"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute
"Stripped-User-Name"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute "Realm"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute "SQL-User-Name"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Encoding attribute
"Called-Station-SSID"
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Processing response header
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Status : 401 (Unauthorized)
(513) Thu Jun 21 14:52:47 2018: Debug: rest: Type : json (application/json)
(513) Thu Jun 21 14:52:47 2018: ERROR: rest: Server returned:
(513) Thu Jun 21 14:52:47 2018: ERROR: rest: Server returned:
(513) Thu Jun 21 14:52:47 2018: ERROR: rest:
{"control:PacketFence-Authorization-Status":"allow","Reply-Message":"Switch is
not managed by PacketFence","control:PacketFence-Request-Time":1529567567}
(513) Thu Jun 21 14:52:47 2018: Debug: [rest] = invalid
(513) Thu Jun 21 14:52:47 2018: Debug: } # post-auth = invalid
(513) Thu Jun 21 14:52:47 2018: Debug: Using Post-Auth-Type Reject
(513) Thu Jun 21 14:52:47 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(513) Thu Jun 21 14:52:47 2018: Debug: Post-Auth-Type REJECT {
(513) Thu Jun 21 14:52:47 2018: Debug: update {
(513) Thu Jun 21 14:52:47 2018: Debug: } # update = noop
(513) Thu Jun 21 14:52:47 2018: Debug: policy
packetfence-audit-log-reject {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name != "dummy") {
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name != "dummy") ->
TRUE
(513) Thu Jun 21 14:52:47 2018: Debug: if (&User-Name != "dummy") {
(513) Thu Jun 21 14:52:47 2018: Debug: policy request-timing {
(513) Thu Jun 21 14:52:47 2018: Debug: if
(control:PacketFence-Request-Time != 0) {
(513) Thu Jun 21 14:52:47 2018: ERROR: Failed retrieving values
required to evaluate condition
(513) Thu Jun 21 14:52:47 2018: Debug: } # policy request-timing =
noop
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: EXPAND type.reject.query
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: --> type.reject.query
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: Using query template 'query'
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: EXPAND %{User-Name}
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: --> [email protected]
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: SQL-User-Name set to
'[email protected]'
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: EXPAND INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile, source,
auto_reg, is_phone, pf_domain, uuid, radius_request,
radius_reply, request_time, tenant_id) VALUES (
'%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
'%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
'%{request:Stripped-User-Name}', '%{request:Realm}',
'Radius-Access-Request',
'%{%{control:PacketFence-Switch-Id}:-N/A}',
'%{%{control:PacketFence-Switch-Mac}:-N/A}',
'%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
'%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
'%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}',
'%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
'%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
'%{%{control:PacketFence-Connection-Type}:-N/A}',
'%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Reject',
'%{request:Module-Failure-Message}', '%{control:Auth-Type}',
'%{request:EAP-Type}', '%{%{control:PacketFence-Role}:-N/A}',
'%{%{control:PacketFence-Status}:-N/A}',
'%{%{control:PacketFence-Profile}:-N/A}',
'%{%{control:PacketFence-Source}:-N/A}',
'%{%{control:PacketFence-AutoReg}:-0}', '%{%{control:PacketFence-IsPhone}:-0}',
'%{request:PacketFence-Domain}', '',
'%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
'%{%{control:PacketFence-Request-Time}:-N/A}',
'%{control:PacketFence-Tenant-Id}')
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: --> INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile, source,
auto_reg, is_phone, pf_domain, uuid, radius_request,
radius_reply, request_time, tenant_id) VALUES (
'0c:98:38:62:ca:8f', '', 'N/A', '[email protected]',
'prama', 'myuniversity.edu', 'Radius-Access-Request', 'N/A',
'N/A', 'N/A', '203.100.23.60', '84:b8:02:04:63:a0:eduroam',
'0c:98:38:62:ca:8f', '', 'eduroam', '', 'N/A',
'', 'N/A', '192.168.127.8', 'WLC-RU-4', 'Reject',
'rest: Server returned:', 'eap', 'MSCHAPv2', 'N/A', 'N/A',
'N/A', 'N/A', '0', '0', '', '', 'User-Name =3D
[email protected]=22=2C NAS-IP-Address =3D 192.168.127.8=2C State =3D
0xca7f480ecb7652303a9e8566b6e8026d=2C Called-Station-Id =3D
=2284:b8:02:04:63:a0:eduroam=22=2C Calling-Station-Id =3D
=220c:98:38:62:ca:8f=22=2C NAS-Identifier =3D =22WLC-RU-4=22=2C Event-Timestamp
=3D =22Jun 21 2018 14:52:47 WIB=22=2C EAP-Message =3D 0x020900061a03=2C
Operator-Name =3D =221ru.nl=22=2C FreeRADIUS-Proxied-To =3D 127.0.0.1=2C
EAP-Type =3D MSCHAPv2=2C Stripped-User-Name =3D =22prama=22=2C Realm =3D
=22myuniversity.edu=22=2C Called-Station-SSID =3D =22eduroam=22=2C
Module-Failure-Message =3D =22rest: Server returned:=22=2C
Module-Failure-Message =3D =22rest:
=7B=5C=22control:PacketFence-Authorization-Status=5C=22:=5C=22allow=5C=22=2C=5C=22Reply-Message=5C=22:=5C=22Switch
is not managed by
PacketFence=5C=22=2C=5C=22control:PacketFence-Request-Time=5C=22:1529567567=7D=22=2C
User-Password =3D =22=2A=2A=2A=2A=2A=2A=22=2C Module-Failure-Message =3D
=22Failed retrieving values required to evaluate condition=22=2C SQL-User-Name
=3D [email protected]=22','MS-MPPE-Encryption-Policy =3D
Encryption-Required=2C MS-MPPE-Encryption-Types =3D 4=2C MS-MPPE-Send-Key =3D
0x056c7c42a8d963e4777ec62dc6a0268d=2C MS-MPPE-Recv-Key =3D
0x91a0bfdbe32c0526a7ea7945617f8011=2C EAP-Message =3D 0x03090004=2C
Message-Authenticator =3D 0x00000000000000000000000000000000=2C
Stripped-User-Name =3D =22prama=22', 'N/A', '1')
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: Executing query: INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile, source,
auto_reg, is_phone, pf_domain, uuid, radius_request,
radius_reply, request_time, tenant_id) VALUES (
'0c:98:38:62:ca:8f', '', 'N/A', '[email protected]',
'prama', 'myuniversity.edu', 'Radius-Access-Request', 'N/A',
'N/A', 'N/A', '203.100.23.60', '84:b8:02:04:63:a0:eduroam',
'0c:98:38:62:ca:8f', '', 'eduroam', '', 'N/A',
'', 'N/A', '192.168.127.8', 'WLC-RU-4', 'Reject',
'rest: Server returned:', 'eap', 'MSCHAPv2', 'N/A', 'N/A',
'N/A', 'N/A', '0', '0', '', '', 'User-Name =3D
[email protected]=22=2C NAS-IP-Address =3D 192.168.127.8=2C State =3D
0xca7f480ecb7652303a9e8566b6e8026d=2C Called-Station-Id =3D
=2284:b8:02:04:63:a0:eduroam=22=2C Calling-Station-Id =3D
=220c:98:38:62:ca:8f=22=2C NAS-Identifier =3D =22WLC-RU-4=22=2C Event-Timestamp
=3D =22Jun 21 2018 14:52:47 WIB=22=2C EAP-Message =3D 0x020900061a03=2C
Operator-Name =3D =221ru.nl=22=2C FreeRADIUS-Proxied-To =3D 127.0.0.1=2C
EAP-Type =3D MSCHAPv2=2C Stripped-User-Name =3D =22prama=22=2C Realm =3D
=22myuniversity.edu=22=2C Called-Station-SSID =3D =22eduroam=22=2C
Module-Failure-Message =3D =22rest: Server returned:=22=2C
Module-Failure-Message =3D =22rest:
=7B=5C=22control:PacketFence-Authorization-Status=5C=22:=5C=22allow=5C=22=2C=5C=22Reply-Message=5C=22:=5C=22Switch
is not managed by
PacketFence=5C=22=2C=5C=22control:PacketFence-Request-Time=5C=22:1529567567=7D=22=2C
User-Password =3D =22=2A=2A=2A=2A=2A=2A=22=2C Module-Failure-Message =3D
=22Failed retrieving values required to evaluate condition=22=2C SQL-User-Name
=3D [email protected]=22','MS-MPPE-Encryption-Policy =3D
Encryption-Required=2C MS-MPPE-Encryption-Types =3D 4=2C MS-MPPE-Send-Key =3D
0x056c7c42a8d963e4777ec62dc6a0268d=2C MS-MPPE-Recv-Key =3D
0x91a0bfdbe32c0526a7ea7945617f8011=2C EAP-Message =3D 0x03090004=2C
Message-Authenticator =3D 0x00000000000000000000000000000000=2C
Stripped-User-Name =3D =22prama=22', 'N/A', '1')
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: SQL query returned: success
(513) Thu Jun 21 14:52:47 2018: Debug: sql_reject: 1 record(s) updated
(513) Thu Jun 21 14:52:47 2018: Debug: [sql_reject] = ok
(513) Thu Jun 21 14:52:47 2018: Debug: } # if (&User-Name != "dummy")
= ok
(513) Thu Jun 21 14:52:47 2018: Debug: } # policy
packetfence-audit-log-reject = ok
(513) Thu Jun 21 14:52:47 2018: Debug: attr_filter.access_reject: EXPAND
%{User-Name}
(513) Thu Jun 21 14:52:47 2018: Debug: attr_filter.access_reject: -->
[email protected]
(513) Thu Jun 21 14:52:47 2018: Debug: attr_filter.access_reject: Matched entry
DEFAULT at line 11
(513) Thu Jun 21 14:52:47 2018: Debug: [attr_filter.access_reject] =
updated
(513) Thu Jun 21 14:52:47 2018: Debug: update outer.session-state {
(513) Thu Jun 21 14:52:47 2018: Debug: } # update outer.session-state =
noop
(513) Thu Jun 21 14:52:47 2018: Debug: } # Post-Auth-Type REJECT = updated
(513) Thu Jun 21 14:52:47 2018: Debug: } # server packetfence-tunnel
(513) Thu Jun 21 14:52:47 2018: Debug: Virtual server sending reply
(513) Thu Jun 21 14:52:47 2018: Debug: EAP-Message = 0x03090004
(513) Thu Jun 21 14:52:47 2018: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Got tunneled reply code 3
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: EAP-Message = 0x03090004
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Message-Authenticator =
0x00000000000000000000000000000000
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: Tunneled authentication was
rejected
(513) Thu Jun 21 14:52:47 2018: Debug: eap_peap: FAILURE
(513) Thu Jun 21 14:52:47 2018: Debug: eap: Sending EAP Request (code 1) ID 10
length 46
(513) Thu Jun 21 14:52:47 2018: Debug: eap: EAP session adding &reply:State =
0xf4599259fc538bde
(513) Thu Jun 21 14:52:47 2018: Debug: [eap] = handled
(513) Thu Jun 21 14:52:47 2018: Debug: } # authenticate = handled
(513) Thu Jun 21 14:52:47 2018: Debug: Using Post-Auth-Type Challenge
(513) Thu Jun 21 14:52:47 2018: Debug: Post-Auth-Type sub-section not found.
Ignoring.
(513) Thu Jun 21 14:52:47 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/eduroam
(513) Thu Jun 21 14:52:47 2018: Debug: session-state: Saving cached attributes
(513) Thu Jun 21 14:52:47 2018: Debug: Module-Failure-Message := "rest:
Server returned:"
(513) Thu Jun 21 14:52:47 2018: Debug: Sent Access-Challenge Id 168 from
203.100.59.39:11812 to 203.100.23.60:42290 length 0
(513) Thu Jun 21 14:52:47 2018: Debug: EAP-Message =
0x010a002e19001703030023c222f6365e2a6d804d8867ac92c0b477d8f6faedcc15457dd2673e6691ab11f0d4cd32
(513) Thu Jun 21 14:52:47 2018: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(513) Thu Jun 21 14:52:47 2018: Debug: State =
0xf4599259fc538bde1444eca174e1fcad
(513) Thu Jun 21 14:52:47 2018: Debug: Proxy-State = 0x3238
(513) Thu Jun 21 14:52:47 2018: Debug: Proxy-State = 0x3533
(513) Thu Jun 21 14:52:47 2018: Debug: Finished request
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users