Hello Christian,

what you can do is to run radius in debug mode:

raddebug -r /usr/local/pf/var/run/radiusd.sock > /root/radius.debug


Then try the bogus AP and try with another one and check the debug and search for the line where freeradius call ntlm_auth and see if the output is the same. (chrooted_mschap: Executing: /usr/bin/sudo /usr/sbin/chroot /chroots/...)

Regards

Fabrice


Le 19-02-19 à 11 h 46, Christian McDonald via PacketFence-users a écrit :
Greetings,

I have one access point that keeps rejecting clients with:

chrooted_mschap: Program returned code (1) and output 'The attempted logon is invalid. This is either due to a bad username or authentication information. (0xc000006d)'

However, the same client on a different AP with the same credentials works fine.

All APs are members of the same "switch" group and have identical configuration both in PacketFence and my controller (UniFi)

--
*R. Christian McDonald *
M: (616) 856-9291
E: [email protected] <mailto:[email protected]>


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to