I now have some info from the Aruba IAP from wireshark captures. So it seems 
packetfence is sending an invalid reply digest to the Aruba VC. Any clues on 
what might be the cause?

Frame 267: 96 bytes on wire (768 bits), 96 bytes captured (768 bits) on 
interface 0
Ethernet II, Src: JuniperN_fd:9c:01 (54:e0:32:fd:9c:01), Dst: ArubaAHe_c4:ad:f8 
(24:de:c6:c4:ad:f8)
Internet Protocol Version 4, Src: 10.11.8.37, Dst: 172.28.5.250
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 82
    Identification: 0xb929 (47401)
    Flags: 0x4000, Don't fragment
    Time to live: 52
    Protocol: UDP (17)
    Header checksum: 0xc92b [validation disabled]
    [Header checksum status: Unverified]
    Source: 10.11.8.37
    Destination: 172.28.5.250
User Datagram Protocol, Src Port: 52676, Dst Port: 3799
    Source Port: 52676
    Destination Port: 3799
    Length: 62
    Checksum: 0x9e8c [unverified]
    [Checksum Status: Unverified]
    [Stream index: 19]
    [Timestamps]
RADIUS Protocol
    Code: Disconnect-Request (40)
    Packet identifier: 0x26 (38)
    Length: 54
    Authenticator: 25dc2d073b8c49b2a08a547919da693e
    Attribute Value Pairs
        AVP: t=Calling-Station-Id(31) l=14 val=30074d744c55
        AVP: t=NAS-IP-Address(4) l=6 val=172.28.5.250
        AVP: t=User-Name(1) l=14 val=30074d744c55


Frame 268: 191 bytes on wire (1528 bits), 191 bytes captured (1528 bits) on 
interface 0
Ethernet II, Src: ArubaAHe_c4:ad:f8 (24:de:c6:c4:ad:f8), Dst: JuniperN_fd:9c:01 
(54:e0:32:fd:9c:01)
Internet Protocol Version 4, Src: 172.28.5.4, Dst: 172.20.96.34
User Datagram Protocol, Src Port: 514, Dst Port: 514
Syslog message: LOCAL1.ERR: Aug 27 14:47:11 2019 172.28.5.4 stm[1660]: <121014> 
<ERRS> <172.28.5.4 24:DE:C6:C4:AD:F8> |aaa| Received invalid reply digest from 
RADIUS server
    1000 1... = Facility: LOCAL1 - reserved for local use (17)
    .... .011 = Level: ERR - error conditions (3)
    Message: Aug 27 14:47:11 2019 172.28.5.4 stm[1660]: <121014> <ERRS> 
<172.28.5.4 24:DE:C6:C4:AD:F8> |aaa| Received invalid reply digest from RADIUS 
server

Frame 269: 253 bytes on wire (2024 bits), 253 bytes captured (2024 bits) on 
interface 0
Ethernet II, Src: ArubaAHe_c4:ad:f8 (24:de:c6:c4:ad:f8), Dst: JuniperN_fd:9c:01 
(54:e0:32:fd:9c:01)
Internet Protocol Version 4, Src: 172.28.5.4, Dst: 172.20.96.34
User Datagram Protocol, Src Port: 514, Dst Port: 514
Syslog message: LOCAL1.ERR: Aug 27 14:47:11 2019 172.28.5.4 stm[1660]: <199802> 
<ERRS> <172.28.5.4 24:DE:C6:C4:AD:F8>  rc_rfc3576_instant.c, 
rc_process_rfc3576_request:99: disconnect packet dropped  10.11.8.37 found for 
disconnect msg
    1000 1... = Facility: LOCAL1 - reserved for local use (17)
    .... .011 = Level: ERR - error conditions (3)
    Message: Aug 27 14:47:11 2019 172.28.5.4 stm[1660]: <199802> <ERRS> 
<172.28.5.4 24:DE:C6:C4:AD:F8>  rc_rfc3576_instant.c, 
rc_process_rfc3576_request:99: disconnect packet dropped  10.11.8.37 found for 
disconnect msg


-----Original Message-----
From: Peter Reissenweber
Sent: Tuesday, 27 August 2019 8:02 AM
To: [email protected]
Cc: Nicolas Quiniou-Briand <[email protected]>
Subject: RE: [PacketFence-users] DesAssociating mac on switch

I have VC logs but there is no reference of any interest.

It is enabled on Aruba side via the "rfc3576" command. I think the " 
cppm-rfc3576-port 3799" command may not be required. I have logged a case with 
Aruba and hopefully get a response from them today.

wlan auth-server packetfence
 ip 10.11.8.37
 port 1812
 acctport 1813
 timeout 10
 retry-count 5
 key blablabla
 nas-ip 172.28.5.250
 rfc3576
 cppm-rfc3576-port 3799

The following stats show the RFC3576 requests on the Aruba VC and that no CoA 
requests have been received. So I will work with Aruba in the first instance 
because the requests are making it to the VC.

*********************************************************************************************************
 8/27/2019 8:00:21 AM    Target: L4-East    Command: show ap debug 
rfc3576-radius-statistics
*********************************************************************************************************

RADIUS RFC3576 Statistics
-------------------------
Statistics                   InternalServer  clearpass    packetfence
----------                   --------------  ---------    -----------
In Service: Management Auth  Not used        Not used     Not used
In Service: gbst-guest       Not used        Up 1097176s  Not used
In Service: test-guest       Not used        Not used     Up 410935s
In Service: Internal         Not used        Up 1097176s  Not used
In Service: External         Not used        Up 1097176s  Not used
In Service: gbst-test        Not used        Not used     Up 410935s
Disconnect Requests          0               0            0
Disconnect Accepts           0               5            0
Disconnect Rejects           0               0            0
No Secret                    0               0            0
No Session ID                0               0            0
Bad Authenticator            0               0            0
Invalid Request              0               0            0
Packets Dropped              0               0            0
Unknown service              0               0            0
CoA Requests                 0               0            0
CoA Accepts                  0               0            0
CoA Rejects                  0               0            0
No permission                0               0            0
SEQ first/last/free          0/0/0           0/0/0        0/0/0
Packets received from unknown clients ::0 Packets received with unknown request 
::0
Total RFC3576 packets Received        ::274

-----Original Message-----
From: Nicolas Quiniou-Briand via PacketFence-users 
<[email protected]>
Sent: Saturday, 24 August 2019 12:19 AM
To: [email protected]
Cc: Nicolas Quiniou-Briand <[email protected]>
Subject: Re: [PacketFence-users] DesAssociating mac on switch

Hello Peter,

1. Do you have some logs on your controller side ?
2. Are you sure CoA is enabled and allowed from PacketFence on Aruba side ?
--
Nicolas Quiniou-Briand
[email protected]  ::  +1.514.447.4918 *140  ::  
https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Finverse.ca&amp;data=02%7C01%7Cpeter.reissenweber%40gbst.com%7C90f07457d0854fa61e2708d727d519e1%7C1c2da354196b481891e4f760cbaac9e4%7C0%7C0%7C637021668549355021&amp;sdata=fWsj2yK9zumgpwclCkgeBuHwfyQuPLnaRNhq0Y7y%2F%2BY%3D&amp;reserved=0
Inverse inc. :: Leaders behind SOGo 
(https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsogo.nu&amp;data=02%7C01%7Cpeter.reissenweber%40gbst.com%7C90f07457d0854fa61e2708d727d519e1%7C1c2da354196b481891e4f760cbaac9e4%7C0%7C0%7C637021668549355021&amp;sdata=ANK1grFfswE8ZamVybrfHGi8i9V3%2B7ZF079d%2FVVjF74%3D&amp;reserved=0),
 PacketFence
(https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpacketfence.org&amp;data=02%7C01%7Cpeter.reissenweber%40gbst.com%7C90f07457d0854fa61e2708d727d519e1%7C1c2da354196b481891e4f760cbaac9e4%7C0%7C0%7C637021668549355021&amp;sdata=2HgYI5vPCZ9FZlqkn%2Br5CEFgVYmRUEnf4KDx1BPYI%2B4%3D&amp;reserved=0)
 and Fingerbank 
(https://aus01.safelinks.protection.outlook.com/?url=http%3A%2F%2Ffingerbank.org&amp;data=02%7C01%7Cpeter.reissenweber%40gbst.com%7C90f07457d0854fa61e2708d727d519e1%7C1c2da354196b481891e4f760cbaac9e4%7C0%7C0%7C637021668549355021&amp;sdata=8UVefjTTS0DCTaJDfVQUXDitdToQqZB8Ry%2BmjIjuy5I%3D&amp;reserved=0)


_______________________________________________
PacketFence-users mailing list
[email protected]
https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.sourceforge.net%2Flists%2Flistinfo%2Fpacketfence-users&amp;data=02%7C01%7Cpeter.reissenweber%40gbst.com%7C90f07457d0854fa61e2708d727d519e1%7C1c2da354196b481891e4f760cbaac9e4%7C0%7C0%7C637021668549355021&amp;sdata=1iJQ%2F978aWwz%2F20uAql0x1wuyEiUSHtJBn082wRM4fc%3D&amp;reserved=0
The information transmitted is intended only for the person or entity to which 
it is addressed and may contain confidential and / or privileged material that 
may be governed by confidential information provisions contained in the 
agreement between GBST and your company. Any disclosure, copying, distribution, 
or other use without the express consent of the sender is prohibited. If you 
received this in error, please contact the sender and delete the material from 
any computer. All rights in the information transmitted, including copyright, 
are reserved. Nothing in this message should be interpreted as a digital 
signature that can be used to authenticate a document. No warranty is given by 
the sender that any attachments to this email are free from viruses or other 
defects.


_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
  • [PacketFence-users] DesAssoci... Peter Reissenweber via PacketFence-users
    • Re: [PacketFence-users] ... Nicolas Quiniou-Briand via PacketFence-users
      • Re: [PacketFence-use... Peter Reissenweber via PacketFence-users
        • Re: [PacketFence... Peter Reissenweber via PacketFence-users
          • Re: [PacketF... Nicolas Quiniou-Briand via PacketFence-users
            • Re: [Pa... Peter Reissenweber via PacketFence-users
              • Re:... Nicolas Quiniou-Briand via PacketFence-users
                • ... Peter Reissenweber via PacketFence-users
                • ... Durand fabrice via PacketFence-users
                • ... Peter Reissenweber via PacketFence-users
                • ... Nicolas Quiniou-Briand via PacketFence-users
                • ... Peter Reissenweber via PacketFence-users
                • ... Nicolas Quiniou-Briand via PacketFence-users
                • ... Peter Reissenweber via PacketFence-users

Reply via email to