Hi Fabrice,

I wanted to follow up to see if you were able to determine if there is any 
issue here?

Thank you,

Benjamin Brenek
BAYADA Home Health Care | Senior Associate, Sys. Analyst (NES)
4300 Haddonfield Road | Pennsuaken, NJ 08109
O: 856-380-3008 | Ext: 0527-13 | bayada.com<http://www.bayada.com/>

From: Brenek, Benjamin via PacketFence-users 
<[email protected]>
Sent: Tuesday, July 23, 2019 4:40 PM
To: [email protected]
Cc: Brenek, Benjamin <[email protected]>
Subject: Re: [PacketFence-users] PacketFence (9.0.1) EAP-TLS Authentication 
Source

CAUTION: This email originated from outside of BAYADA. Beware of links and 
attachments.

Hi Fabrice,

Please see log output below:

(947) Tue Jul 23 16:33:39 2019: Debug: Received Access-Request Id 104 from 
192.168.237.50:41017 to 192.168.237.11:1812 length 263
(947) Tue Jul 23 16:33:39 2019: Debug:   User-Name = "host/d4:be:d9:84:b0:8a"
(947) Tue Jul 23 16:33:39 2019: Debug:   Service-Type = Framed-User
(947) Tue Jul 23 16:33:39 2019: Debug:   Cisco-AVPair = "service-type=Framed"
(947) Tue Jul 23 16:33:39 2019: Debug:   Framed-MTU = 1500
(947) Tue Jul 23 16:33:39 2019: Debug:   Called-Station-Id = "58-0A-20-DD-42-0F"
(947) Tue Jul 23 16:33:39 2019: Debug:   Calling-Station-Id = 
"D4-BE-D9-84-B0-8A"
(947) Tue Jul 23 16:33:39 2019: Debug:   EAP-Message = 
0x0201001b01686f73742f64343a62653a64393a38343a62303a3861
(947) Tue Jul 23 16:33:39 2019: Debug:   Message-Authenticator = 
0xa1fe8ed271005b90db8615e720925b00
(947) Tue Jul 23 16:33:39 2019: Debug:   Cisco-AVPair = 
"audit-session-id=C0A82376000010E55ACA4F6B"
(947) Tue Jul 23 16:33:39 2019: Debug:   NAS-Port-Type = Ethernet
(947) Tue Jul 23 16:33:39 2019: Debug:   NAS-Port = 50115
(947) Tue Jul 23 16:33:39 2019: Debug:   NAS-Port-Id = "GigabitEthernet1/0/15"
(947) Tue Jul 23 16:33:39 2019: Debug:   NAS-IP-Address = 192.168.222.50
(947) Tue Jul 23 16:33:39 2019: Debug:   Proxy-State = 0x313231
(947) Tue Jul 23 16:33:39 2019: Debug: # Executing section authorize from file 
/usr/local/pf/raddb/sites-enabled/packetfence
(947) Tue Jul 23 16:33:39 2019: Debug:   authorize {
(947) Tue Jul 23 16:33:39 2019: Debug:     update {
(947) Tue Jul 23 16:33:39 2019: Debug:       EXPAND %{Packet-Src-IP-Address}
(947) Tue Jul 23 16:33:39 2019: Debug:          --> 192.168.237.50
(947) Tue Jul 23 16:33:39 2019: Debug:       EXPAND %l
(947) Tue Jul 23 16:33:39 2019: Debug:          --> 1563914019
(947) Tue Jul 23 16:33:39 2019: Debug:     } # update = noop
(947) Tue Jul 23 16:33:39 2019: Debug:     policy packetfence-set-tenant-id {
(947) Tue Jul 23 16:33:39 2019: Debug:       if (!NAS-IP-Address || 
NAS-IP-Address == "0.0.0.0"){
(947) Tue Jul 23 16:33:39 2019: Debug:       if (!NAS-IP-Address || 
NAS-IP-Address == "0.0.0.0") -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:       if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(947) Tue Jul 23 16:33:39 2019: Debug:       EXPAND 
%{%{control:PacketFence-Tenant-Id}:-0}
(947) Tue Jul 23 16:33:39 2019: Debug:          --> 0
(947) Tue Jul 23 16:33:39 2019: Debug:       if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
(947) Tue Jul 23 16:33:39 2019: Debug:       if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
(947) Tue Jul 23 16:33:39 2019: Debug:         update control {
(947) Tue Jul 23 16:33:39 2019: Debug:           EXPAND %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug:              --> host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:           SQL-User-Name set to 
'host/d4:be:d9:84:b0:8a'
(947) Tue Jul 23 16:33:39 2019: Debug:           Executing select query:  
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = 
'192.168.222.50'), 0)
(947) Tue Jul 23 16:33:39 2019: Debug:           EXPAND %{sql: SELECT 
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{NAS-IP-Address}'), 
0)}
(947) Tue Jul 23 16:33:39 2019: Debug:              --> 1
(947) Tue Jul 23 16:33:39 2019: Debug:         } # update control = noop
(947) Tue Jul 23 16:33:39 2019: Debug:       } # if ( 
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
(947) Tue Jul 23 16:33:39 2019: Debug:       if ( 
&control:PacketFence-Tenant-Id == 0 ) {
(947) Tue Jul 23 16:33:39 2019: Debug:       if ( 
&control:PacketFence-Tenant-Id == 0 )  -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:     } # policy packetfence-set-tenant-id 
= noop
(947) Tue Jul 23 16:33:39 2019: Debug:     policy rewrite_calling_station_id {
(947) Tue Jul 23 16:33:39 2019: Debug:       if (&Calling-Station-Id && 
(&Calling-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
 {
(947) Tue Jul 23 16:33:39 2019: Debug:       if (&Calling-Station-Id && 
(&Calling-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
  -> TRUE
(947) Tue Jul 23 16:33:39 2019: Debug:       if (&Calling-Station-Id && 
(&Calling-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
  {
(947) Tue Jul 23 16:33:39 2019: Debug:         update request {
(947) Tue Jul 23 16:33:39 2019: Debug:           EXPAND 
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(947) Tue Jul 23 16:33:39 2019: Debug:              --> d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:         } # update request = noop
(947) Tue Jul 23 16:33:39 2019: Debug:         [updated] = updated
(947) Tue Jul 23 16:33:39 2019: Debug:       } # if (&Calling-Station-Id && 
(&Calling-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
  = updated
(947) Tue Jul 23 16:33:39 2019: Debug:       ... skipping else: Preceding "if" 
was taken
(947) Tue Jul 23 16:33:39 2019: Debug:     } # policy 
rewrite_calling_station_id = updated
(947) Tue Jul 23 16:33:39 2019: Debug:     policy rewrite_called_station_id {
(947) Tue Jul 23 16:33:39 2019: Debug:       if ((&Called-Station-Id) && 
(&Called-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
 {
(947) Tue Jul 23 16:33:39 2019: Debug:       if ((&Called-Station-Id) && 
(&Called-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
  -> TRUE
(947) Tue Jul 23 16:33:39 2019: Debug:       if ((&Called-Station-Id) && 
(&Called-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
  {
(947) Tue Jul 23 16:33:39 2019: Debug:         update request {
(947) Tue Jul 23 16:33:39 2019: Debug:           EXPAND 
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(947) Tue Jul 23 16:33:39 2019: Debug:              --> 58:0a:20:dd:42:0f
(947) Tue Jul 23 16:33:39 2019: Debug:         } # update request = noop
(947) Tue Jul 23 16:33:39 2019: Debug:         if ("%{8}") {
(947) Tue Jul 23 16:33:39 2019: Debug:         EXPAND %{8}
(947) Tue Jul 23 16:33:39 2019: Debug:            -->
(947) Tue Jul 23 16:33:39 2019: Debug:         if ("%{8}")  -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:         elsif ( (Colubris-AVPair) && 
"%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
(947) Tue Jul 23 16:33:39 2019: Debug:         elsif ( (Colubris-AVPair) && 
"%{Colubris-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:         elsif (Aruba-Essid-Name) {
(947) Tue Jul 23 16:33:39 2019: Debug:         elsif (Aruba-Essid-Name)  -> 
FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:         elsif ( (Cisco-AVPair)  && 
"%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
(947) Tue Jul 23 16:33:39 2019: Debug:         EXPAND %{Cisco-AVPair}
(947) Tue Jul 23 16:33:39 2019: Debug:            --> service-type=Framed
(947) Tue Jul 23 16:33:39 2019: Debug:         elsif ( (Cisco-AVPair)  && 
"%{Cisco-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:         [updated] = updated
(947) Tue Jul 23 16:33:39 2019: Debug:       } # if ((&Called-Station-Id) && 
(&Called-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
  = updated
(947) Tue Jul 23 16:33:39 2019: Debug:       ... skipping else: Preceding "if" 
was taken
(947) Tue Jul 23 16:33:39 2019: Debug:     } # policy rewrite_called_station_id 
= updated
(947) Tue Jul 23 16:33:39 2019: Debug:     policy filter_username {
(947) Tue Jul 23 16:33:39 2019: Debug:       if (&User-Name) {
(947) Tue Jul 23 16:33:39 2019: Debug:       if (&User-Name)  -> TRUE
(947) Tue Jul 23 16:33:39 2019: Debug:       if (&User-Name)  {
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name =~ / /) {
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name =~ / /)  -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name =~ /@[^@]*@/ ) {
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name =~ /@[^@]*@/ )  
-> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name =~ /\.\./ ) {
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name =~ /\.\./ )  -> 
FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:         if ((&User-Name =~ /@/) && 
(&User-Name !~ /@(.+)\.(.+)$/)<mailto:/@(.+)\.(.+)$/)>)  {
(947) Tue Jul 23 16:33:39 2019: Debug:         if ((&User-Name =~ /@/) && 
(&User-Name !~ /@(.+)\.(.+)$/)<mailto:/@(.+)\.(.+)$/)>)   -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name =~ /\.$/)  {
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name =~ /\.$/)   -> 
FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name =~ 
/@\./<mailto:/@\./>)  {
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name =~ 
/@\./<mailto:/@\./>)   -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:       } # if (&User-Name)  = updated
(947) Tue Jul 23 16:33:39 2019: Debug:     } # policy filter_username = updated
(947) Tue Jul 23 16:33:39 2019: Debug:     if ("%{User-Name}"=~ 
/^host\/.*.heroes.bayada.com$/) {
(947) Tue Jul 23 16:33:39 2019: Debug:     EXPAND %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug:        --> host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:     if ("%{User-Name}"=~ 
/^host\/.*.heroes.bayada.com$/)  -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:     if (! "%{User-Name}"=~ 
/^[Bb][Aa][Dd][Gg][Ee]_[Rr][Ee][Aa][Dd][Ee][Rr].*$/ && ! "%{User-Name}"=~ 
/^[Bb][Aa][Yy][Gg][Uu}[Ee][Ss][Tt].*$/ && ! "%{User-Name}"=~ 
/.*[Hh][Ee][Rr][Oo][Ee][Ss].*$/ && ! "%{User-Name}"=~ 
/^[Ss]\d\d\d\d[Zz][Oo][Oo][Mm]$/ && ! "%{User-Name}"=~ /^zoomrooms$/ && ! 
"%{User-Name}"=~ /^bayguest$/ && ! "%{User-Name}"=~ 
/^[ABCDEFabcdef0123456789]{12}$|^([ABCDEFabcdef0123456789]{2}[:]){5}[ABCDEFabcdef0123456789]{2}$|^([ABCDEFabcdef0123456789]{2}[-]){5}[ABCDEFabcdef0123456789]{2}$|^([ABCDEFabcdef0123456789]{4}[.]){2}[ABCDEFabcdef0123456789]{4}$/)
 {
(947) Tue Jul 23 16:33:39 2019: Debug:     EXPAND %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug:        --> host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:     EXPAND %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug:        --> host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:     EXPAND %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug:        --> host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:     EXPAND %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug:        --> host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:     EXPAND %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug:        --> host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:     EXPAND %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug:        --> host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:     EXPAND %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug:        --> host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:     if (! "%{User-Name}"=~ 
/^[Bb][Aa][Dd][Gg][Ee]_[Rr][Ee][Aa][Dd][Ee][Rr].*$/ && ! "%{User-Name}"=~ 
/^[Bb][Aa][Yy][Gg][Uu}[Ee][Ss][Tt].*$/ && ! "%{User-Name}"=~ 
/.*[Hh][Ee][Rr][Oo][Ee][Ss].*$/ && ! "%{User-Name}"=~ 
/^[Ss]\d\d\d\d[Zz][Oo][Oo][Mm]$/ && ! "%{User-Name}"=~ /^zoomrooms$/ && ! 
"%{User-Name}"=~ /^bayguest$/ && ! "%{User-Name}"=~ 
/^[ABCDEFabcdef0123456789]{12}$|^([ABCDEFabcdef0123456789]{2}[:]){5}[ABCDEFabcdef0123456789]{2}$|^([ABCDEFabcdef0123456789]{2}[-]){5}[ABCDEFabcdef0123456789]{2}$|^([ABCDEFabcdef0123456789]{4}[.]){2}[ABCDEFabcdef0123456789]{4}$/)
  -> TRUE
(947) Tue Jul 23 16:33:39 2019: Debug:     if (! "%{User-Name}"=~ 
/^[Bb][Aa][Dd][Gg][Ee]_[Rr][Ee][Aa][Dd][Ee][Rr].*$/ && ! "%{User-Name}"=~ 
/^[Bb][Aa][Yy][Gg][Uu}[Ee][Ss][Tt].*$/ && ! "%{User-Name}"=~ 
/.*[Hh][Ee][Rr][Oo][Ee][Ss].*$/ && ! "%{User-Name}"=~ 
/^[Ss]\d\d\d\d[Zz][Oo][Oo][Mm]$/ && ! "%{User-Name}"=~ /^zoomrooms$/ && ! 
"%{User-Name}"=~ /^bayguest$/ && ! "%{User-Name}"=~ 
/^[ABCDEFabcdef0123456789]{12}$|^([ABCDEFabcdef0123456789]{2}[:]){5}[ABCDEFabcdef0123456789]{2}$|^([ABCDEFabcdef0123456789]{2}[-]){5}[ABCDEFabcdef0123456789]{2}$|^([ABCDEFabcdef0123456789]{4}[.]){2}[ABCDEFabcdef0123456789]{4}$/)
  {
(947) Tue Jul 23 16:33:39 2019: Debug:       update control {
(947) Tue Jul 23 16:33:39 2019: Debug:       } # update control = noop
(947) Tue Jul 23 16:33:39 2019: Debug:     } # if (! "%{User-Name}"=~ 
/^[Bb][Aa][Dd][Gg][Ee]_[Rr][Ee][Aa][Dd][Ee][Rr].*$/ && ! "%{User-Name}"=~ 
/^[Bb][Aa][Yy][Gg][Uu}[Ee][Ss][Tt].*$/ && ! "%{User-Name}"=~ 
/.*[Hh][Ee][Rr][Oo][Ee][Ss].*$/ && ! "%{User-Name}"=~ 
/^[Ss]\d\d\d\d[Zz][Oo][Oo][Mm]$/ && ! "%{User-Name}"=~ /^zoomrooms$/ && ! 
"%{User-Name}"=~ /^bayguest$/ && ! "%{User-Name}"=~ 
/^[ABCDEFabcdef0123456789]{12}$|^([ABCDEFabcdef0123456789]{2}[:]){5}[ABCDEFabcdef0123456789]{2}$|^([ABCDEFabcdef0123456789]{2}[-]){5}[ABCDEFabcdef0123456789]{2}$|^([ABCDEFabcdef0123456789]{4}[.]){2}[ABCDEFabcdef0123456789]{4}$/)
  = noop
(947) Tue Jul 23 16:33:39 2019: Debug:     policy filter_password {
(947) Tue Jul 23 16:33:39 2019: Debug:       if (&User-Password &&         
(&User-Password != "%{string:User-Password}")) {
(947) Tue Jul 23 16:33:39 2019: Debug:       if (&User-Password &&         
(&User-Password != "%{string:User-Password}"))  -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:     } # policy filter_password = updated
(947) Tue Jul 23 16:33:39 2019: Debug:     [preprocess] = ok
(947) Tue Jul 23 16:33:39 2019: Debug: suffix: Checking for suffix after "@"
(947) Tue Jul 23 16:33:39 2019: Debug: suffix: No '@' in User-Name = 
"host/d4:be:d9:84:b0:8a", skipping NULL due to config.
(947) Tue Jul 23 16:33:39 2019: Debug:     [suffix] = noop
(947) Tue Jul 23 16:33:39 2019: Debug: ntdomain: Checking for prefix before "\"
(947) Tue Jul 23 16:33:39 2019: Debug: ntdomain: No '\' in User-Name = 
"host/d4:be:d9:84:b0:8a", looking up realm NULL
(947) Tue Jul 23 16:33:39 2019: Debug: ntdomain: Found realm "null"
(947) Tue Jul 23 16:33:39 2019: Debug: ntdomain: Adding Stripped-User-Name = 
"host/d4:be:d9:84:b0:8a"
(947) Tue Jul 23 16:33:39 2019: Debug: ntdomain: Adding Realm = "null"
(947) Tue Jul 23 16:33:39 2019: Debug: ntdomain: Authentication realm is LOCAL
(947) Tue Jul 23 16:33:39 2019: Debug:     [ntdomain] = ok
(947) Tue Jul 23 16:33:39 2019: Debug: eap: Request is supposed to be proxied 
to Realm HEROES. Not doing EAP.
(947) Tue Jul 23 16:33:39 2019: Debug:     [eap] = noop
(947) Tue Jul 23 16:33:39 2019: Debug:     [files] = noop
(947) Tue Jul 23 16:33:39 2019: Debug:     if ( !EAP-Message ) {
(947) Tue Jul 23 16:33:39 2019: Debug:     if ( !EAP-Message )  -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:     policy packetfence-eap-mac-policy {
(947) Tue Jul 23 16:33:39 2019: Debug:       if ( &EAP-Type ) {
(947) Tue Jul 23 16:33:39 2019: Debug:       if ( &EAP-Type )  -> TRUE
(947) Tue Jul 23 16:33:39 2019: Debug:       if ( &EAP-Type )  {
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name && (&User-Name =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
 {
(947) Tue Jul 23 16:33:39 2019: Debug:         if (&User-Name && (&User-Name =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
  -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:       } # if ( &EAP-Type )  = updated
(947) Tue Jul 23 16:33:39 2019: Debug:       [noop] = noop
(947) Tue Jul 23 16:33:39 2019: Debug:     } # policy 
packetfence-eap-mac-policy = updated
(947) Tue Jul 23 16:33:39 2019: WARNING: pap: 
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(947) Tue Jul 23 16:33:39 2019: WARNING: pap: !!! Ignoring 
control:User-Password.  Update your        !!!
(947) Tue Jul 23 16:33:39 2019: WARNING: pap: !!! configuration so that the 
"known good" clear text !!!
(947) Tue Jul 23 16:33:39 2019: WARNING: pap: !!! password is in 
Cleartext-Password and NOT in        !!!
(947) Tue Jul 23 16:33:39 2019: WARNING: pap: !!! User-Password.                
                      !!!
(947) Tue Jul 23 16:33:39 2019: WARNING: pap: 
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
(947) Tue Jul 23 16:33:39 2019: Debug:     [pap] = noop
(947) Tue Jul 23 16:33:39 2019: Debug:   } # authorize = updated
(947) Tue Jul 23 16:33:39 2019: Debug: Starting proxy to home server 
192.168.11.157 port 1812
(947) Tue Jul 23 16:33:39 2019: Debug: Sent Access-Request Id 228 from 
0.0.0.0:59801 to 192.168.11.157:1812 length 274
(947) Tue Jul 23 16:33:39 2019: Debug:   User-Name = "host/d4:be:d9:84:b0:8a"
(947) Tue Jul 23 16:33:39 2019: Debug:   Service-Type = Framed-User
(947) Tue Jul 23 16:33:39 2019: Debug:   Cisco-AVPair = "service-type=Framed"
(947) Tue Jul 23 16:33:39 2019: Debug:   Framed-MTU = 1500
(947) Tue Jul 23 16:33:39 2019: Debug:   Calling-Station-Id := 
"d4:be:d9:84:b0:8a"
(947) Tue Jul 23 16:33:39 2019: Debug:   EAP-Message = 
0x0201001b01686f73742f64343a62653a64393a38343a62303a3861
(947) Tue Jul 23 16:33:39 2019: Debug:   Message-Authenticator = 
0xa1fe8ed271005b90db8615e720925b00
(947) Tue Jul 23 16:33:39 2019: Debug:   Cisco-AVPair = 
"audit-session-id=C0A82376000010E55ACA4F6B"
(947) Tue Jul 23 16:33:39 2019: Debug:   NAS-Port-Type = Ethernet
(947) Tue Jul 23 16:33:39 2019: Debug:   NAS-Port = 50115
(947) Tue Jul 23 16:33:39 2019: Debug:   NAS-Port-Id = "GigabitEthernet1/0/15"
(947) Tue Jul 23 16:33:39 2019: Debug:   NAS-IP-Address = 192.168.222.50
(947) Tue Jul 23 16:33:39 2019: Debug:   Proxy-State = 0x313231
(947) Tue Jul 23 16:33:39 2019: Debug:   Called-Station-Id := 
"58:0a:20:dd:42:0f"
(947) Tue Jul 23 16:33:39 2019: Debug:   Event-Timestamp = "Jul 23 2019 
16:33:39 EDT"
(947) Tue Jul 23 16:33:39 2019: Debug:   Proxy-State = 0x313034
(947) Tue Jul 23 16:33:39 2019: Debug: Clearing existing &reply: attributes
(947) Tue Jul 23 16:33:39 2019: Debug: Received Access-Reject Id 228 from 
192.168.11.157:1812 to 192.168.237.11:59801 length 54
(947) Tue Jul 23 16:33:39 2019: Debug:   Proxy-State = 0x313231
(947) Tue Jul 23 16:33:39 2019: Debug:   Proxy-State = 0x313034
(947) Tue Jul 23 16:33:39 2019: Debug:   EAP-Message = 0x04010004
(947) Tue Jul 23 16:33:39 2019: Debug:   Message-Authenticator = 
0xc173e9b4af829981bdb8527c21214211
(947) Tue Jul 23 16:33:39 2019: Debug: # Executing section post-proxy from file 
/usr/local/pf/raddb/sites-enabled/packetfence
(947) Tue Jul 23 16:33:39 2019: Debug:   post-proxy {
(947) Tue Jul 23 16:33:39 2019: Debug: eap: No pre-existing handler found
(947) Tue Jul 23 16:33:39 2019: Debug:     [eap] = noop
(947) Tue Jul 23 16:33:39 2019: Debug:   } # post-proxy = noop
(947) Tue Jul 23 16:33:39 2019: Debug: Using Post-Auth-Type Reject
(947) Tue Jul 23 16:33:39 2019: Debug: # Executing group from file 
/usr/local/pf/raddb/sites-enabled/packetfence
(947) Tue Jul 23 16:33:39 2019: Debug:   Post-Auth-Type REJECT {
(947) Tue Jul 23 16:33:39 2019: Debug:     update {
(947) Tue Jul 23 16:33:39 2019: Debug:     } # update = noop
(947) Tue Jul 23 16:33:39 2019: Debug:     if (! EAP-Type || 
&reply:Framed-Protocol == "PPP" || (EAP-Type != TTLS && EAP-Type != PEAP) ) {
(947) Tue Jul 23 16:33:39 2019: ERROR:     Failed retrieving values required to 
evaluate condition
(947) Tue Jul 23 16:33:39 2019: Debug: attr_filter.access_reject: EXPAND 
%{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug: attr_filter.access_reject:    --> 
host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug: attr_filter.access_reject: Matched entry 
DEFAULT at line 11
(947) Tue Jul 23 16:33:39 2019: Debug:     [attr_filter.access_reject] = updated
(947) Tue Jul 23 16:33:39 2019: Debug: attr_filter.packetfence_post_auth: 
EXPAND %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug: attr_filter.packetfence_post_auth:    
--> host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug: attr_filter.packetfence_post_auth: 
Matched entry DEFAULT at line 10
(947) Tue Jul 23 16:33:39 2019: Debug:     [attr_filter.packetfence_post_auth] 
= updated
(947) Tue Jul 23 16:33:39 2019: Debug:     [eap] = noop
(947) Tue Jul 23 16:33:39 2019: Debug:     policy remove_reply_message_if_eap {
(947) Tue Jul 23 16:33:39 2019: Debug:       if (&reply:EAP-Message && 
&reply:Reply-Message) {
(947) Tue Jul 23 16:33:39 2019: Debug:       if (&reply:EAP-Message && 
&reply:Reply-Message)  -> FALSE
(947) Tue Jul 23 16:33:39 2019: Debug:       else {
(947) Tue Jul 23 16:33:39 2019: Debug:         [noop] = noop
(947) Tue Jul 23 16:33:39 2019: Debug:       } # else = noop
(947) Tue Jul 23 16:33:39 2019: Debug:     } # policy 
remove_reply_message_if_eap = noop
(947) Tue Jul 23 16:33:39 2019: Debug: linelog: EXPAND 
messages.%{%{reply:Packet-Type}:-default}
(947) Tue Jul 23 16:33:39 2019: Debug: linelog:    --> messages.Access-Reject
(947) Tue Jul 23 16:33:39 2019: Debug: linelog: EXPAND 
[mac:%{Calling-Station-Id}] Rejected user: %{User-Name}
(947) Tue Jul 23 16:33:39 2019: Debug: linelog:    --> [mac:d4:be:d9:84:b0:8a] 
Rejected user: host/d4:be:d9:84:b0:8a
(947) Tue Jul 23 16:33:39 2019: Debug:     [linelog] = ok
(947) Tue Jul 23 16:33:39 2019: Debug:   } # Post-Auth-Type REJECT = updated
(947) Tue Jul 23 16:33:39 2019: Debug: Delaying response for 1.000000 seconds
(947) Tue Jul 23 16:33:40 2019: Debug: Sending delayed response
(947) Tue Jul 23 16:33:40 2019: Debug: Sent Access-Reject Id 104 from 
192.168.237.11:1812 to 192.168.237.50:41017 length 49
(947) Tue Jul 23 16:33:40 2019: Debug:   EAP-Message = 0x04010004
(947) Tue Jul 23 16:33:40 2019: Debug:   Message-Authenticator = 
0xc173e9b4af829981bdb8527c21214211
(947) Tue Jul 23 16:33:40 2019: Debug:   Proxy-State = 0x313231
(947) Tue Jul 23 16:33:44 2019: Debug: Cleaning up request packet ID 104 with 
timestamp +14202

Thank you,

Ben

From: Fabrice Durand via PacketFence-users 
<[email protected]<mailto:[email protected]>>
Sent: Tuesday, July 23, 2019 3:45 PM
To: 
[email protected]<mailto:[email protected]>
Cc: Fabrice Durand <[email protected]<mailto:[email protected]>>
Subject: Re: [PacketFence-users] PacketFence (9.0.1) EAP-TLS Authentication 
Source

CAUTION: This email originated from outside of BAYADA. Beware of links and 
attachments.


Hello Benjamin,

can you run this command and try to reconnect ?

raddebug -f /usr/local/pf/var/run/radiusd.sock -t 300

Then paste the result.

Regards

Fabrice


Le 19-07-23 à 10 h 29, Brenek, Benjamin via PacketFence-users a écrit :
Hello All,

I have been stuck on the issue of getting EAP-TLS authentication to work for a 
few days now and have not really been able to get anywhere. Any help would be 
greatly appreciated in getting this setup.

I am testing with a Ethernet connected Windows 10 Laptop. The laptop has a 
trusted root CA, along with a client cert signed by the root CA. I have tested 
setting the laptop to EAP-TTLS on the network interface.
Both the trusted Root CA and Client CA were issued by a server named PFPKI-Dev.

Every time the device connects the following error is thrown:
(Note: This error for some reason does not show up in the Auditing log, and I 
need to look at journalctl directly in order to see it.)

(229) Login incorrect (Home Server says so): [host/d4:be:d9:84:b0:8a] (from 
client pf port 50115 cli d4:be:d9:84:b0:8a)
[mac:d4:be:d9:84:b0:8a] Rejected user: host/d4:be:d9:84:b0:8a
(229) Login incorrect (Failed retrieving values required to evaluate 
condition): [host/d4:be:d9:84:b0:8a] (from client pf port 50115 cli 
d4:be:d9:84:b0:8a)


The authentication source is configured as follows:

[EAP-TLS_Test rule Test_Rule]
action0=set_role=employee
condition0=TLS-Cert-Issuer,contains,PFPKI-Dev
condition1=TLS-Client-Cert-Issuer,contains,PFPKI-Dev
match=any
class=authentication
action1=set_access_duration=1D
description=Test Rule

The connection profile is configured as follows:

[Wired]
unreg_on_acct_stop=enabled
locale=
filter=switch_group:Cisco2960
description=Wired authentication
autoregister=enabled
dot1x_unset_on_unmatch=enabled
sources=PFPKI-Dev

The switch that the laptop is connected to is a Cisco 2960S with the following 
port configuration:
(vlan 4 Is the mac detection vlan)

interface GigabitEthernet1/0/15
description User/Phone Port
switchport access vlan 4
switchport mode access
switchport voice vlan 48
srr-queue bandwidth share 1 30 35 5
priority-queue out
authentication event fail action next-method
authentication order dot1x
authentication priority dot1x
authentication port-control auto
authentication periodic
authentication timer restart 10800
authentication timer reauthenticate 10800
snmp trap mac-notification change added
snmp trap mac-notification change removed
no snmp trap link-status
mls qos trust device cisco-phone
mls qos trust cos
dot1x pae authenticator
dot1x timeout quiet-period 2
dot1x timeout tx-period 3
spanning-tree portfast
service-policy input AUTOQOS-SRND4-CISCOPHONE-POLICY
end

Thank you,

Ben


Our employees' reviews made us a Best Place to 
Work<https://www.glassdoor.com/survey/start_input.htm?showSurvey=REVIEWS&employerId=153924&contentOriginHook=PAGE_SRCH_COMPANIES>
 in 2018 &2019!
Spread the word and earn a bonus by referring a 
friend.<http://hs.bayada.com/talent-scout-ilwid?utm_source=email%20signature&utm_medium=email&utm_campaign=Glassdoor%20Award>
[Image removed by sender. Compassion, Excellence, 
Reliability]<http://bhhc.co/BAYemail_site>

[Image removed by sender. Facebook]<http://bhhc.co/BAYemail_fb> [Image removed 
by sender. Twitter] <http://bhhc.co/BAYemail_tw>  [Image removed by sender. 
LinkedIn] <http://bhhc.co/BAYemail_LI>  [Image removed by sender. YouTube] 
<http://bhhc.co/BAYemail_yt>  [Image removed by sender. Bayada] 
<http://bhhc.co/BAYemail_site>

CONFIDENTIALITY NOTICE: This email may contain information belonging to BAYADA 
and is protected by law. Do not forward, copy, or otherwise disclose to anyone 
unless permitted by BAYADA or required by law. If you are not the intended 
recipient, please notify the sender immediately.



_______________________________________________

PacketFence-users mailing list

[email protected]<mailto:[email protected]>

https://lists.sourceforge.net/lists/listinfo/packetfence-users

--

Fabrice Durand

[email protected]<mailto:[email protected]> ::  +1.514.447.4918 (x135) ::  
www.inverse.ca<http://www.inverse.ca>

Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to