Hello Carlos,
when you do the request, can you capture the traffic on lo on the port
7070, like that:
tshark -i lo -f "port 7070" -w /tmp/rest.pcap
And if you can send me the file.
Regards
Fabrice
Le 19-02-15 à 02 h 48, Carlos Wetli via PacketFence-users a écrit :
Hello Fabrice,
Many thanks for your reply. I changed the radius filter accordingly
but it doesn't seems to be sent to the switch yet.
The reason to send back Framed-MTU to the switch is because we can see
the following messages on the PacketFence Server:
in PacketFence.log:
- Feb 15 08:30:12 srv2064 auth[27852]: Need 1 more connections to
reach min connections (3)
Feb 15 08:30:12 srv2064 auth[27852]: rlm_sql (sql): Opening additional
connection (13), 1 of 62 pending slots used
Feb 15 08:30:12 srv2064 auth[27852]: (42) rest: ERROR: Server returned:
Feb 15 08:30:12 srv2064 auth[27852]: (42) rest: ERROR:
{"error":{"detail":"malformed JSON string, neither tag, array, object,
number, string or atom, at character offset 704 (before \"(end of
string)\") at /usr/local/pf/lib/pf/WebAPI/REST.pm line
43.\n","message":"Cannot parse request"}}
Feb 15 08:30:12 srv2064 auth[27852]: Need 1 more connections to reach
min connections (3)
Feb 15 08:30:12 srv2064 auth[27852]: rlm_rest (rest): Opening
additional connection (12), 1 of 62 pending slots used
Feb 15 08:30:12 srv2064 auth[27852]: (42) Invalid user (rest: AVP
exceeds buffer length or chunk): [host/M-18-155.ad.cwe.local] (from
client 172.29.180.68 port 50101 cli 80:ce:62:a1:2e:75)
Feb 15 08:30:12 srv2064 auth[27852]: [mac:80:ce:62:a1:2e:75] Rejected
user: host/M-18-155.ad.cwe.local
Feb 15 08:30:12 srv2064 auth[27852]: (42) Login incorrect (rest: AVP
exceeds buffer length or chunk): [host/M-18-155.ad.cwe.local] (from
client 172.29.180.68 port 50101 cli 80:ce:62:a1:2e:75)
in tcpdump:
EAP-Message Attribute (79), length: 229 (bogus, goes past end of
packet)
We had the issue on our first test server and as we couldn't fix it,
we decided to install a brand new PF 8.3.0 on RHEL. We joined the
newly configured server to the domain and did basic configuration. At
that stage I could authenticate a PC based on the machine certificate.
I was then trying to authenticate the machine against the AD, which
was not working successfully. As the authentication based on the
machine certificate was working fine but not the AD Authentication, we
decided to restart within the WEB admin GUI, all the services. After
the restart of the services, the machine authentication was not
working any longer and we could see the same message in tcpdump and
packetfence.log on the new PF server.
Have you aware about this kind of issue ? Is this a known issue ?
Many thanks in advance for your support.
Regards,
carlos
Am Do., 14. Feb. 2019 um 03:18 Uhr schrieb Durand fabrice via
PacketFence-users <[email protected]
<mailto:[email protected]>>:
Hello Carlos,
sorry for the late reply.
So yes you can add Framed-MTU in the radius reply.
Use the radius filter for that , something like that should work:
[eap]
filter = connection_type
operator = is
value = Ethernet-EAP
[1:eap]
scope = returnRadiusAccessAccept
merge_answer = yes
answer1 = Framed-MTU => 1500
Regards
Fabrice
Le 19-02-10 à 04 h 26, Carlos Wetli via PacketFence-users a écrit :
Hello,
We are currently configuring dot1x on our older cisco devices
which migt be replaced this year or early next year. We are
running PacketFence 8,3 as authentication server and windows 10
clients. A PKI is available and the certificates have been
deployed on the clients and servers.
We have the issue that the Cisco 2960 is fragmenting the EAP
Packet correctly but not adding them correctly within the Radius
packets, which means that a large Radius Packet (1750 Bytes) is
then fragmented when put on the wire and therefore put an EAP
fragment on two different UDP Frames.This means that only a part
of the 255 bytes EAP fragment is on the first UDP frame while the
rest of the EAP fragment is then sent by the next fragmented UDP
frame. My understanding is that this should not occur as a EAP
fragment should not further been fragmented on two different
Radius packets.
I can also see that the Switch is sending Framed-MTU 1500, while
PacketFence have a EAP fragement-size of 1024 configured but not
sending out Framed-MTU. Would it help to send a Framed-MTU
smaller that 1500 from PacketFence ? How/where can that be done ?
As alternative is there a possibility to configure the Windows
Client to send smaller EAP packets `?
Thanks in advance,
Regards,
Carlos
_______________________________________________
PacketFence-users mailing list
[email protected]
<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
<mailto:[email protected]>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users