Mon Mar 16 15:07:23 2020: Debug: suffix: No '@' in User-Name = "evren",
skipping NULL due to config.

You have your realms setup correctly? Can you post your realms
configuration and auth configuration.

On Tue, Mar 17, 2020, 7:06 AM evren korkmaz via PacketFence-users <
[email protected]> wrote:

> Hi,
> I am trying to use packetfence for mikrotik device cli access. I want to
> access with my MS Active Directory users.
> Mikrotik devices use mschap for cli connections.
> In my Packetfence->Radius Configuration, mschapv2 feature is enabled but i
> have some problems when i access to devices.
> First i will use default radius config for cli access, packetfence try to
> bind to active directory server.
> I tested my Active Directory connection with other devices(without
> mschap). In normally these connections it work but when i try mikrotik
> devices,it give this issue on packetfence.log:
>
> *Mar 16 14:52:23 debian packetfence_httpd.aaa: httpd.aaa(3306) WARN:
> [mac:30:23:03:8e:50:c2] [AD-source] User
> CN=evren,CN=Users,DC=evrenkorkmaz,DC=xyz cannot bind from
> CN=Users,DC=evrenkorkmaz,DC=xyz on 192.168.56.102:389
> <http://192.168.56.102:389>
> (pf::Authentication::Source::LDAPSource::authenticate)Mar 16 14:52:23
> debian packetfence_httpd.aaa: httpd.aaa(3306) INFO: [mac:30:23:03:8e:50:c2]
> User evren tried to login in 192.168.30.6 but authentication failed
> (pf::radius::switch_access)*
>
> When i analyze the raddebug outputs, user is rejected in the rest module:
>
>
>
>
>
>
>
>
>
>
>
>
> *(22) Mon Mar 16 14:53:21 2020: Debug: rest: Encoding attribute
> "FreeRADIUS-Client-IP-Address"(22) Mon Mar 16 14:53:21 2020: Debug: rest:
> Encoding attribute "PacketFence-KeyBalanced"(22) Mon Mar 16 14:53:21 2020:
> Debug: rest: Encoding attribute "PacketFence-Radius-Ip"(22) Mon Mar 16
> 14:53:21 2020: Debug: rest: Processing response header(22) Mon Mar 16
> 14:53:21 2020: Debug: rest:   Status : 401 (Unauthorized)(22) Mon Mar 16
> 14:53:21 2020: Debug: rest:   Type   : json (application/json)(22) Mon Mar
> 16 14:53:21 2020: ERROR: rest: Server returned:(22) Mon Mar 16 14:53:21
> 2020: ERROR: rest: {"Reply-Message":"Authentication failed on
> PacketFence","control:PacketFence-Authorization-Status":"allow"}(22) Mon
> Mar 16 14:53:21 2020: Debug:       [rest] = invalid(22) Mon Mar 16 14:53:21
> 2020: Debug:     } # if (! EAP-Type || (EAP-Type != TTLS  && EAP-Type !=
> PEAP) )  = invalid(22) Mon Mar 16 14:53:21 2020: Debug:   } # post-auth =
> invalid(22) Mon Mar 16 14:53:21 2020: Debug: Using Post-Auth-Type Reject*
>
> As i understand, packetfence must to use packetfence-tunnel for mschap
> authentication. So i enabled
> *this feature on "Packetfence->System Config.->Radius Config" but nothing
> change. *
> *Lastly, i enabled packetfence auhorize feature on "Packetfence->System
> Config.->Radius Config" . Now packetfence give "Mac is empty" error and i
> cant resolve this problem.*
> *radius.log:*
>
>
>
>
>
>
>
> *Mar 16 15:05:59 debian auth[25164]: Need 7 more connections to reach 10
> sparesMar 16 15:05:59 debian auth[25164]: rlm_sql (sql): Opening additional
> connection (5), 1 of 61 pending slots usedMar 16 15:05:59 debian
> auth[25164]: Need 1 more connections to reach min connections (3)Mar 16
> 15:05:59 debian auth[25164]: rlm_rest (rest): Opening additional connection
> (2), 1 of 62 pending slots usedMar 16 15:05:59 debian auth[25164]: (13)
> Invalid user: [evren] (from client 192.168.30.6/32 <http://192.168.30.6/32>
> port 0 cli 192.168.30.1)Mar 16 15:05:59 debian auth[25164]:
> [mac:192.168.30.1] Rejected user: evrenMar 16 15:05:59 debian auth[25164]:
> (13) Login incorrect: [evren] (from client 192.168.30.6/32
> <http://192.168.30.6/32> port 0 cli 192.168.30.1)*
>
> *packetfence.log is empty.*
>
>
> *raddebug: *
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> *(24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "MS-CHAP2-Response"(24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding
> attribute "SQL-User-Name"(24) Mon Mar 16 15:07:23 2020: Debug: rest:
> Encoding attribute "FreeRADIUS-Client-IP-Address"(24) Mon Mar 16 15:07:23
> 2020: Debug: rest: Encoding attribute "PacketFence-KeyBalanced"(24) Mon Mar
> 16 15:07:23 2020: Debug: rest: Processing response header(24) Mon Mar 16
> 15:07:23 2020: Debug: rest:   Status : 401 (Unauthorized)(24) Mon Mar 16
> 15:07:23 2020: Debug: rest:   Type   : json (application/json)(24) Mon Mar
> 16 15:07:23 2020: Debug: rest: Parsing attribute
> "control:PacketFence-Authorization-Status"(24) Mon Mar 16 15:07:23 2020:
> Debug: rest: EXPAND allow(24) Mon Mar 16 15:07:23 2020: Debug: rest:    -->
> allow(24) Mon Mar 16 15:07:23 2020: Debug: rest:
> PacketFence-Authorization-Status := "allow"(24) Mon Mar 16 15:07:23 2020:
> Debug: rest: Parsing attribute "Reply-Message"(24) Mon Mar 16 15:07:23
> 2020: Debug: rest: EXPAND Mac is empty(24) Mon Mar 16 15:07:23 2020: Debug:
> rest:    --> Mac is empty(24) Mon Mar 16 15:07:23 2020: Debug: rest:
> Reply-Message := "Mac is empty"(24) Mon Mar 16 15:07:23 2020: Debug:
> [rest] = reject(24) Mon Mar 16 15:07:23 2020: Debug:     } # if (
> !EAP-Message )  = reject(24) Mon Mar 16 15:07:23 2020: Debug:   } #
> authorize = reject(24) Mon Mar 16 15:07:23 2020: Debug: Using
> Post-Auth-Type Reject*
>
> Later i realized that issue. User is rejected before the password section.
> I couldn't solve these problems. Please help me.
>
> All logs:
>
>
> (24) Mon Mar 16 15:07:23 2020: Debug: Received Access-Request Id 94 from
> 192.168.30.6:35889 to 192.168.30.2:1812 length 145
> (24) Mon Mar 16 15:07:23 2020: Debug:   Service-Type = Login-User
> (24) Mon Mar 16 15:07:23 2020: Debug:   User-Name = "evren"
> (24) Mon Mar 16 15:07:23 2020: Debug:   MS-CHAP-Challenge =
> 0x018b60198941ed5dc6de1774ba21b1c2
> (24) Mon Mar 16 15:07:23 2020: Debug:   MS-CHAP2-Response =
> 0x0000cd84cd595ad3e76cbb6e412f5914905a00000000000000000bb6f34220fbf40b8ad8874a1d5bf508728465ebaf6de37e
> (24) Mon Mar 16 15:07:23 2020: Debug:   Calling-Station-Id = "192.168.30.1"
> (24) Mon Mar 16 15:07:23 2020: Debug:   NAS-Identifier = "MikroTik"
> (24) Mon Mar 16 15:07:23 2020: Debug:   NAS-IP-Address = 192.168.30.6
> (24) Mon Mar 16 15:07:23 2020: Debug: # Executing section authorize from
> file /usr/local/pf/raddb/sites-enabled/packetfence
> (24) Mon Mar 16 15:07:23 2020: Debug:   authorize {
> (24) Mon Mar 16 15:07:23 2020: Debug:     update {
> (24) Mon Mar 16 15:07:23 2020: Debug:       EXPAND %{Packet-Src-IP-Address}
> (24) Mon Mar 16 15:07:23 2020: Debug:          --> 192.168.30.6
> (24) Mon Mar 16 15:07:23 2020: Debug:       EXPAND %l
> (24) Mon Mar 16 15:07:23 2020: Debug:          --> 1584360443
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # update = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     policy
> packetfence-set-realm-if-machine {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i) {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i)  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # policy
> packetfence-set-realm-if-machine = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     policy
> packetfence-balanced-key-policy {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&PacketFence-KeyBalanced
> && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&PacketFence-KeyBalanced
> && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i))  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:       else {
> (24) Mon Mar 16 15:07:23 2020: Debug:         update {
> (24) Mon Mar 16 15:07:23 2020: Debug:           EXPAND
> %{md5:%{Calling-Station-Id}%{User-Name}}
> (24) Mon Mar 16 15:07:23 2020: Debug:              -->
> 85bde241d7f98ac7a0bab114b852c753
> (24) Mon Mar 16 15:07:23 2020: Debug:           EXPAND
> %{md5:%{Calling-Station-Id}%{User-Name}}
> (24) Mon Mar 16 15:07:23 2020: Debug:              -->
> 85bde241d7f98ac7a0bab114b852c753
> (24) Mon Mar 16 15:07:23 2020: Debug:         } # update = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:       } # else = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # policy
> packetfence-balanced-key-policy = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     policy packetfence-set-tenant-id
> {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0"){
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (24) Mon Mar 16 15:07:23 2020: Debug:       EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> (24) Mon Mar 16 15:07:23 2020: Debug:          --> 0
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
> (24) Mon Mar 16 15:07:23 2020: Debug:         update control {
> (24) Mon Mar 16 15:07:23 2020: Debug:           EXPAND %{User-Name}
> (24) Mon Mar 16 15:07:23 2020: Debug:              --> evren
> (24) Mon Mar 16 15:07:23 2020: Debug:           SQL-User-Name set to
> 'evren'
> (24) Mon Mar 16 15:07:23 2020: Debug:           Executing select query:
>  SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
> '192.168.30.6'), 0)
> (24) Mon Mar 16 15:07:23 2020: Debug:           EXPAND %{sql: SELECT
> IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
> '%{NAS-IP-Address}'), 0)}
> (24) Mon Mar 16 15:07:23 2020: Debug:              --> 1
> (24) Mon Mar 16 15:07:23 2020: Debug:         } # update control = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:       } # if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 ) {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # policy
> packetfence-set-tenant-id = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     policy
> rewrite_calling_station_id {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&Calling-Station-Id &&
> (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&Calling-Station-Id &&
> (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:       else {
> (24) Mon Mar 16 15:07:23 2020: Debug:         [noop] = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:       } # else = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # policy
> rewrite_calling_station_id = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     policy rewrite_called_station_id
> {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if ((&Called-Station-Id) &&
> (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
> {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if ((&Called-Station-Id) &&
> (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:       else {
> (24) Mon Mar 16 15:07:23 2020: Debug:         [noop] = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:       } # else = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # policy
> rewrite_called_station_id = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     policy filter_username {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&User-Name) {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&User-Name)  -> TRUE
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&User-Name)  {
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name =~ / /) {
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name =~ / /)  ->
> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name =~ /@[^@]*@/
> ) {
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name =~ /@[^@]*@/
> )  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name =~ /\.\./ ) {
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name =~ /\.\./ )
>  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:         if ((&User-Name =~ /@/) &&
> (&User-Name !~ /@(.+)\.(.+)$/))  {
> (24) Mon Mar 16 15:07:23 2020: Debug:         if ((&User-Name =~ /@/) &&
> (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name =~ /\.$/)  {
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name =~ /\.$/)
> -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name =~ /@\./)  {
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name =~ /@\./)
> -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:       } # if (&User-Name)  = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # policy filter_username = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     policy filter_password {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&User-Password &&
> (&User-Password != "%{string:User-Password}")) {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&User-Password &&
> (&User-Password != "%{string:User-Password}"))  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # policy filter_password = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     [preprocess] = ok
> (24) Mon Mar 16 15:07:23 2020: Debug: suffix: Checking for suffix after "@"
> (24) Mon Mar 16 15:07:23 2020: Debug: suffix: No '@' in User-Name =
> "evren", skipping NULL due to config.
> (24) Mon Mar 16 15:07:23 2020: Debug:     [suffix] = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     if ( !EAP-Message ) {
> (24) Mon Mar 16 15:07:23 2020: Debug:     if ( !EAP-Message )  -> TRUE
> (24) Mon Mar 16 15:07:23 2020: Debug:     if ( !EAP-Message )  {
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Expanding URI components
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: EXPAND http://127.0.0.1:7070
> (24) Mon Mar 16 15:07:23 2020: Debug: rest:    --> http://127.0.0.1:7070
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: EXPAND //radius/rest/filter
> (24) Mon Mar 16 15:07:23 2020: Debug: rest:    --> //radius/rest/filter
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Sending HTTP POST to "
> http://127.0.0.1:7070//radius/rest/filter";
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute "User-Name"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "NAS-IP-Address"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "Service-Type"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "Calling-Station-Id"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "NAS-Identifier"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "Event-Timestamp"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "MS-CHAP-Challenge"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "MS-CHAP2-Response"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "SQL-User-Name"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "FreeRADIUS-Client-IP-Address"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Encoding attribute
> "PacketFence-KeyBalanced"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Processing response header
> (24) Mon Mar 16 15:07:23 2020: Debug: rest:   Status : 401 (Unauthorized)
> (24) Mon Mar 16 15:07:23 2020: Debug: rest:   Type   : json
> (application/json)
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Parsing attribute
> "control:PacketFence-Authorization-Status"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: EXPAND allow
> (24) Mon Mar 16 15:07:23 2020: Debug: rest:    --> allow
> (24) Mon Mar 16 15:07:23 2020: Debug: rest:
> PacketFence-Authorization-Status := "allow"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Parsing attribute
> "Reply-Message"
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: EXPAND Mac is empty
> (24) Mon Mar 16 15:07:23 2020: Debug: rest:    --> Mac is empty
> (24) Mon Mar 16 15:07:23 2020: Debug: rest: Reply-Message := "Mac is empty"
> (24) Mon Mar 16 15:07:23 2020: Debug:       [rest] = reject
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # if ( !EAP-Message )  = reject
> (24) Mon Mar 16 15:07:23 2020: Debug:   } # authorize = reject
> (24) Mon Mar 16 15:07:23 2020: Debug: Using Post-Auth-Type Reject
> (24) Mon Mar 16 15:07:23 2020: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/packetfence
> (24) Mon Mar 16 15:07:23 2020: Debug:   Post-Auth-Type REJECT {
> (24) Mon Mar 16 15:07:23 2020: Debug:     policy packetfence-set-tenant-id
> {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0"){
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (24) Mon Mar 16 15:07:23 2020: Debug:       EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> (24) Mon Mar 16 15:07:23 2020: Debug:          --> 1
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 ) {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # policy
> packetfence-set-tenant-id = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     update {
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # update = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) ) {
> (24) Mon Mar 16 15:07:23 2020: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) )  -> TRUE
> (24) Mon Mar 16 15:07:23 2020: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) )  {
> (24) Mon Mar 16 15:07:23 2020: Debug:       policy
> packetfence-audit-log-reject {
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name &&
> (&User-Name == "dummy")) {
> (24) Mon Mar 16 15:07:23 2020: Debug:         if (&User-Name &&
> (&User-Name == "dummy"))  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:         else {
> (24) Mon Mar 16 15:07:23 2020: Debug:           policy request-timing {
> (24) Mon Mar 16 15:07:23 2020: Debug:             if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
> (24) Mon Mar 16 15:07:23 2020: Debug:             EXPAND
> %{%{control:PacketFence-Request-Time}:-0}
> (24) Mon Mar 16 15:07:23 2020: Debug:                --> 0
> (24) Mon Mar 16 15:07:23 2020: Debug:             if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0)  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:           } # policy request-timing
> = noop
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject: EXPAND type.reject.query
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject:    --> type.reject.query
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject: Using query template
> 'query'
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject: EXPAND %{User-Name}
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject:    --> evren
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject: SQL-User-Name set to
> 'evren'
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject: EXPAND INSERT INTO
> radius_audit_log               ( mac, ip, computer_name, user_name,
>        stripped_user_name,  realm, event_type,                switch_id,
> switch_mac, switch_ip_address,                radius_source_ip_address,
> called_station_id, calling_station_id,                nas_port_type, ssid,
> nas_port_id,                ifindex, nas_port, connection_type,
>    nas_ip_address, nas_identifier, auth_status,                reason,
> auth_type, eap_type,                role, node_status, profile,
>    source, auto_reg, is_phone,                pf_domain, uuid,
> radius_request,                radius_reply, request_time, tenant_id,
> radius_ip)              VALUES               (
> '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
> '%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
>            '%{request:Stripped-User-Name}', '%{request:Realm}',
> 'Radius-Access-Request',
>  '%{%{control:PacketFence-Switch-Id}:-N/A}',
> '%{%{control:PacketFence-Switch-Mac}:-N/A}',
> '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
>  '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
> '%{request:Calling-Station-Id}',                '%{request:NAS-Port-Type}',
> '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
>  '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
> '%{%{control:PacketFence-Connection-Type}:-N/A}',
>  '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',  'Reject',
>           '%{request:Module-Failure-Message}', '%{control:Auth-Type}',
> '%{request:EAP-Type}',
>  '%{%{control:PacketFence-Role}:-N/A}',
> '%{%{control:PacketFence-Status}:-N/A}',
> '%{%{control:PacketFence-Profile}:-N/A}',
>  '%{%{control:PacketFence-Source}:-N/A}',
> '%{%{control:PacketFence-AutoReg}:-0}',
> '%{%{control:PacketFence-IsPhone}:-0}',
>  '%{request:PacketFence-Domain}', '',
> '%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
> '%{%{control:PacketFence-Request-Time}:-N/A}',
> '%{control:PacketFence-Tenant-Id}', '%{request:PacketFence-Radius-Ip}')
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject:    --> INSERT INTO
> radius_audit_log               ( mac, ip, computer_name, user_name,
>        stripped_user_name,  realm, event_type,                switch_id,
> switch_mac, switch_ip_address,                radius_source_ip_address,
> called_station_id, calling_station_id,                nas_port_type, ssid,
> nas_port_id,                ifindex, nas_port, connection_type,
>    nas_ip_address, nas_identifier, auth_status,                reason,
> auth_type, eap_type,                role, node_status, profile,
>    source, auto_reg, is_phone,                pf_domain, uuid,
> radius_request,                radius_reply, request_time, tenant_id,
> radius_ip)              VALUES               ( '192.168.30.1', '', 'N/A',
> 'evren',                '', '', 'Radius-Access-Request',
>  'N/A', 'N/A', 'N/A',                '192.168.30.6', '', '192.168.30.1',
>              '', '', '',                'N/A', '', 'N/A',
>  '192.168.30.6', 'MikroTik',  'Reject',                 '', '', '',
>        'N/A', 'N/A', 'N/A',                'N/A', '0', '0',
>  '', '', 'User-Name =3D =22evren=22=2C NAS-IP-Address =3D 192.168.30.6=2C
> Service-Type =3D Login-User=2C Calling-Station-Id =3D =22192.168.30.1=22=2C
> NAS-Identifier =3D =22MikroTik=22=2C Event-Timestamp =3D =22Mar 16 2020
> 15:07:23 =2B03=22=2C MS-CHAP-Challenge =3D
> 0x018b60198941ed5dc6de1774ba21b1c2=2C MS-CHAP2-Response =3D
> 0x0000cd84cd595ad3e76cbb6e412f5914905a00000000000000000bb6f34220fbf40b8ad8874a1d5bf508728465ebaf6de37e=2C
> FreeRADIUS-Client-IP-Address =3D 192.168.30.6=2C PacketFence-KeyBalanced
> =3D =2285bde241d7f98ac7a0bab114b852c753=22=2C User-Password =3D
> =22=2A=2A=2A=2A=2A=2A=22=2C SQL-User-Name =3D =22evren=22','Reply-Message
> =3D =22Mac is empty=22', '0', '1', '')
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject: Executing query: INSERT
> INTO radius_audit_log               ( mac, ip, computer_name, user_name,
>              stripped_user_name,  realm, event_type,
>  switch_id, switch_mac, switch_ip_address,
>  radius_source_ip_address, called_station_id, calling_station_id,
>      nas_port_type, ssid, nas_port_id,                ifindex, nas_port,
> connection_type,                nas_ip_address, nas_identifier,
> auth_status,                reason, auth_type, eap_type,
>  role, node_status, profile,                source, auto_reg, is_phone,
>            pf_domain, uuid, radius_request,                radius_reply,
> request_time, tenant_id, radius_ip)              VALUES               (
> '192.168.30.1', '', 'N/A', 'evren',                '', '',
> 'Radius-Access-Request',                'N/A', 'N/A', 'N/A',
>  '192.168.30.6', '', '192.168.30.1',                '', '', '',
>    'N/A', '', 'N/A',                '192.168.30.6', 'MikroTik',  'Reject',
>                 '', '', '',                'N/A', 'N/A', 'N/A',
>    'N/A', '0', '0',                '', '', 'User-Name =3D =22evren=22=2C
> NAS-IP-Address =3D 192.168.30.6=2C Service-Type =3D Login-User=2C
> Calling-Station-Id =3D =22192.168.30.1=22=2C NAS-Identifier =3D
> =22MikroTik=22=2C Event-Timestamp =3D =22Mar 16 2020 15:07:23 =2B03=22=2C
> MS-CHAP-Challenge =3D 0x018b60198941ed5dc6de1774ba21b1c2=2C
> MS-CHAP2-Response =3D
> 0x0000cd84cd595ad3e76cbb6e412f5914905a00000000000000000bb6f34220fbf40b8ad8874a1d5bf508728465ebaf6de37e=2C
> FreeRADIUS-Client-IP-Address =3D 192.168.30.6=2C PacketFence-KeyBalanced
> =3D =2285bde241d7f98ac7a0bab114b852c753=22=2C User-Password =3D
> =22=2A=2A=2A=2A=2A=2A=22=2C SQL-User-Name =3D =22evren=22','Reply-Message
> =3D =22Mac is empty=22', '0', '1', '')
> (23) Mon Mar 16 15:07:23 2020: Debug: Cleaning up request packet ID 210
> with timestamp +251
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject: SQL query returned:
> success
> (24) Mon Mar 16 15:07:23 2020: Debug: sql_reject: 1 record(s) updated
> (24) Mon Mar 16 15:07:23 2020: Debug:           [sql_reject] = ok
> (24) Mon Mar 16 15:07:23 2020: Debug:         } # else = ok
> (24) Mon Mar 16 15:07:23 2020: Debug:       } # policy
> packetfence-audit-log-reject = ok
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # if (! EAP-Type || (EAP-Type
> != TTLS  && EAP-Type != PEAP) )  = ok
> (24) Mon Mar 16 15:07:23 2020: Debug:     if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
> (24) Mon Mar 16 15:07:23 2020: Debug:     EXPAND
> %{%{control:PacketFence-Proxied-From}:-False}
> (24) Mon Mar 16 15:07:23 2020: Debug:        --> False
> (24) Mon Mar 16 15:07:23 2020: Debug:     if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug: attr_filter.access_reject: EXPAND
> %{User-Name}
> (24) Mon Mar 16 15:07:23 2020: Debug: attr_filter.access_reject:    -->
> evren
> (24) Mon Mar 16 15:07:23 2020: Debug: attr_filter.access_reject: Matched
> entry DEFAULT at line 11
> (24) Mon Mar 16 15:07:23 2020: Debug:     [attr_filter.access_reject] =
> updated
> (24) Mon Mar 16 15:07:23 2020: Debug: attr_filter.packetfence_post_auth:
> EXPAND %{User-Name}
> (24) Mon Mar 16 15:07:23 2020: Debug: attr_filter.packetfence_post_auth:
>  --> evren
> (24) Mon Mar 16 15:07:23 2020: Debug: attr_filter.packetfence_post_auth:
> Matched entry DEFAULT at line 10
> (24) Mon Mar 16 15:07:23 2020: Debug:
> [attr_filter.packetfence_post_auth] = updated
> (24) Mon Mar 16 15:07:23 2020: Debug:     [eap] = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     policy
> remove_reply_message_if_eap {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&reply:EAP-Message &&
> &reply:Reply-Message) {
> (24) Mon Mar 16 15:07:23 2020: Debug:       if (&reply:EAP-Message &&
> &reply:Reply-Message)  -> FALSE
> (24) Mon Mar 16 15:07:23 2020: Debug:       else {
> (24) Mon Mar 16 15:07:23 2020: Debug:         [noop] = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:       } # else = noop
> (24) Mon Mar 16 15:07:23 2020: Debug:     } # policy
> remove_reply_message_if_eap = noop
> (24) Mon Mar 16 15:07:23 2020: Debug: linelog: EXPAND
> messages.%{%{reply:Packet-Type}:-default}
> (24) Mon Mar 16 15:07:23 2020: Debug: linelog:    -->
> messages.Access-Reject
> (24) Mon Mar 16 15:07:23 2020: Debug: linelog: EXPAND
> [mac:%{Calling-Station-Id}] Rejected user: %{User-Name}
> (24) Mon Mar 16 15:07:23 2020: Debug: linelog:    --> [mac:192.168.30.1]
> Rejected user: evren
> (24) Mon Mar 16 15:07:23 2020: Debug:     [linelog] = ok
> (24) Mon Mar 16 15:07:23 2020: Debug:   } # Post-Auth-Type REJECT = updated
> (24) Mon Mar 16 15:07:23 2020: Debug: Delaying response for 1.000000
> seconds
> (24) Mon Mar 16 15:07:23 2020: Debug: (24) Discarding duplicate request
> from client 192.168.30.6/32 port 35889 - ID: 94 due to delayed response
> (24) Mon Mar 16 15:07:24 2020: Debug: (24) Discarding duplicate request
> from client 192.168.30.6/32 port 35889 - ID: 94 due to delayed response
> (24) Mon Mar 16 15:07:24 2020: Debug: Sending delayed response
> (24) Mon Mar 16 15:07:24 2020: Debug: Sent Access-Reject Id 94 from
> 192.168.30.2:1812 to 192.168.30.6:35889 length 34
> (24) Mon Mar 16 15:07:24 2020: Debug:   Reply-Message = "Mac is empty"
> (25) Mon Mar 16 15:07:27 2020: Debug: Received Access-Request Id 95 from
> 192.168.30.6:35675 to 192.168.30.2:1812 length 145
> (25) Mon Mar 16 15:07:27 2020: Debug:   Service-Type = Login-User
> (25) Mon Mar 16 15:07:27 2020: Debug:   User-Name = "evren"
> (25) Mon Mar 16 15:07:27 2020: Debug:   MS-CHAP-Challenge =
> 0xa0f07329316086f83e9d6cf9be1dbb8b
> (25) Mon Mar 16 15:07:27 2020: Debug:   MS-CHAP2-Response =
> 0x0000a188e5fb5bcc68173aa94693bed6ed5e0000000000000000a2dc302e211a880cc3c117ca130ec341de241f0888f480ef
> (25) Mon Mar 16 15:07:27 2020: Debug:   Calling-Station-Id = "192.168.30.1"
> (25) Mon Mar 16 15:07:27 2020: Debug:   NAS-Identifier = "MikroTik"
> (25) Mon Mar 16 15:07:27 2020: Debug:   NAS-IP-Address = 192.168.30.6
> (25) Mon Mar 16 15:07:27 2020: Debug: # Executing section authorize from
> file /usr/local/pf/raddb/sites-enabled/packetfence
> (25) Mon Mar 16 15:07:27 2020: Debug:   authorize {
> (25) Mon Mar 16 15:07:27 2020: Debug:     update {
> (25) Mon Mar 16 15:07:27 2020: Debug:       EXPAND %{Packet-Src-IP-Address}
> (25) Mon Mar 16 15:07:27 2020: Debug:          --> 192.168.30.6
> (25) Mon Mar 16 15:07:27 2020: Debug:       EXPAND %l
> (25) Mon Mar 16 15:07:27 2020: Debug:          --> 1584360447
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # update = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     policy
> packetfence-set-realm-if-machine {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i) {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i)  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # policy
> packetfence-set-realm-if-machine = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     policy
> packetfence-balanced-key-policy {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&PacketFence-KeyBalanced
> && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&PacketFence-KeyBalanced
> && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i))  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:       else {
> (25) Mon Mar 16 15:07:27 2020: Debug:         update {
> (25) Mon Mar 16 15:07:27 2020: Debug:           EXPAND
> %{md5:%{Calling-Station-Id}%{User-Name}}
> (25) Mon Mar 16 15:07:27 2020: Debug:              -->
> 85bde241d7f98ac7a0bab114b852c753
> (25) Mon Mar 16 15:07:27 2020: Debug:           EXPAND
> %{md5:%{Calling-Station-Id}%{User-Name}}
> (25) Mon Mar 16 15:07:27 2020: Debug:              -->
> 85bde241d7f98ac7a0bab114b852c753
> (25) Mon Mar 16 15:07:27 2020: Debug:         } # update = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:       } # else = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # policy
> packetfence-balanced-key-policy = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     policy packetfence-set-tenant-id
> {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0"){
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (25) Mon Mar 16 15:07:27 2020: Debug:       EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> (25) Mon Mar 16 15:07:27 2020: Debug:          --> 0
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
> (25) Mon Mar 16 15:07:27 2020: Debug:         update control {
> (25) Mon Mar 16 15:07:27 2020: Debug:           EXPAND %{User-Name}
> (25) Mon Mar 16 15:07:27 2020: Debug:              --> evren
> (25) Mon Mar 16 15:07:27 2020: Debug:           SQL-User-Name set to
> 'evren'
> (25) Mon Mar 16 15:07:27 2020: Debug:           Executing select query:
>  SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
> '192.168.30.6'), 0)
> (25) Mon Mar 16 15:07:27 2020: Debug:           EXPAND %{sql: SELECT
> IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
> '%{NAS-IP-Address}'), 0)}
> (25) Mon Mar 16 15:07:27 2020: Debug:              --> 1
> (25) Mon Mar 16 15:07:27 2020: Debug:         } # update control = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:       } # if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 ) {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # policy
> packetfence-set-tenant-id = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     policy
> rewrite_calling_station_id {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&Calling-Station-Id &&
> (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&Calling-Station-Id &&
> (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:       else {
> (25) Mon Mar 16 15:07:27 2020: Debug:         [noop] = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:       } # else = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # policy
> rewrite_calling_station_id = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     policy rewrite_called_station_id
> {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if ((&Called-Station-Id) &&
> (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
> {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if ((&Called-Station-Id) &&
> (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:       else {
> (25) Mon Mar 16 15:07:27 2020: Debug:         [noop] = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:       } # else = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # policy
> rewrite_called_station_id = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     policy filter_username {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&User-Name) {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&User-Name)  -> TRUE
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&User-Name)  {
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name =~ / /) {
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name =~ / /)  ->
> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name =~ /@[^@]*@/
> ) {
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name =~ /@[^@]*@/
> )  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name =~ /\.\./ ) {
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name =~ /\.\./ )
>  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:         if ((&User-Name =~ /@/) &&
> (&User-Name !~ /@(.+)\.(.+)$/))  {
> (25) Mon Mar 16 15:07:27 2020: Debug:         if ((&User-Name =~ /@/) &&
> (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name =~ /\.$/)  {
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name =~ /\.$/)
> -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name =~ /@\./)  {
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name =~ /@\./)
> -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:       } # if (&User-Name)  = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # policy filter_username = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     policy filter_password {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&User-Password &&
> (&User-Password != "%{string:User-Password}")) {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&User-Password &&
> (&User-Password != "%{string:User-Password}"))  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # policy filter_password = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     [preprocess] = ok
> (25) Mon Mar 16 15:07:27 2020: Debug: suffix: Checking for suffix after "@"
> (25) Mon Mar 16 15:07:27 2020: Debug: suffix: No '@' in User-Name =
> "evren", skipping NULL due to config.
> (25) Mon Mar 16 15:07:27 2020: Debug:     [suffix] = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     if ( !EAP-Message ) {
> (25) Mon Mar 16 15:07:27 2020: Debug:     if ( !EAP-Message )  -> TRUE
> (25) Mon Mar 16 15:07:27 2020: Debug:     if ( !EAP-Message )  {
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Expanding URI components
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: EXPAND http://127.0.0.1:7070
> (25) Mon Mar 16 15:07:27 2020: Debug: rest:    --> http://127.0.0.1:7070
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: EXPAND //radius/rest/filter
> (25) Mon Mar 16 15:07:27 2020: Debug: rest:    --> //radius/rest/filter
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Sending HTTP POST to "
> http://127.0.0.1:7070//radius/rest/filter";
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute "User-Name"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute
> "NAS-IP-Address"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute
> "Service-Type"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute
> "Calling-Station-Id"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute
> "NAS-Identifier"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute
> "Event-Timestamp"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute
> "MS-CHAP-Challenge"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute
> "MS-CHAP2-Response"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute
> "SQL-User-Name"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute
> "FreeRADIUS-Client-IP-Address"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Encoding attribute
> "PacketFence-KeyBalanced"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Processing response header
> (25) Mon Mar 16 15:07:27 2020: Debug: rest:   Status : 401 (Unauthorized)
> (25) Mon Mar 16 15:07:27 2020: Debug: rest:   Type   : json
> (application/json)
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Parsing attribute
> "Reply-Message"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: EXPAND Mac is empty
> (25) Mon Mar 16 15:07:27 2020: Debug: rest:    --> Mac is empty
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Reply-Message := "Mac is empty"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: Parsing attribute
> "control:PacketFence-Authorization-Status"
> (25) Mon Mar 16 15:07:27 2020: Debug: rest: EXPAND allow
> (25) Mon Mar 16 15:07:27 2020: Debug: rest:    --> allow
> (25) Mon Mar 16 15:07:27 2020: Debug: rest:
> PacketFence-Authorization-Status := "allow"
> (25) Mon Mar 16 15:07:27 2020: Debug:       [rest] = reject
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # if ( !EAP-Message )  = reject
> (25) Mon Mar 16 15:07:27 2020: Debug:   } # authorize = reject
> (25) Mon Mar 16 15:07:27 2020: Debug: Using Post-Auth-Type Reject
> (25) Mon Mar 16 15:07:27 2020: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/packetfence
> (25) Mon Mar 16 15:07:27 2020: Debug:   Post-Auth-Type REJECT {
> (25) Mon Mar 16 15:07:27 2020: Debug:     policy packetfence-set-tenant-id
> {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0"){
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (25) Mon Mar 16 15:07:27 2020: Debug:       EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> (25) Mon Mar 16 15:07:27 2020: Debug:          --> 1
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 ) {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # policy
> packetfence-set-tenant-id = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     update {
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # update = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) ) {
> (25) Mon Mar 16 15:07:27 2020: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) )  -> TRUE
> (25) Mon Mar 16 15:07:27 2020: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) )  {
> (25) Mon Mar 16 15:07:27 2020: Debug:       policy
> packetfence-audit-log-reject {
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name &&
> (&User-Name == "dummy")) {
> (25) Mon Mar 16 15:07:27 2020: Debug:         if (&User-Name &&
> (&User-Name == "dummy"))  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:         else {
> (25) Mon Mar 16 15:07:27 2020: Debug:           policy request-timing {
> (25) Mon Mar 16 15:07:27 2020: Debug:             if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
> (25) Mon Mar 16 15:07:27 2020: Debug:             EXPAND
> %{%{control:PacketFence-Request-Time}:-0}
> (25) Mon Mar 16 15:07:27 2020: Debug:                --> 0
> (25) Mon Mar 16 15:07:27 2020: Debug:             if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0)  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:           } # policy request-timing
> = noop
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject: EXPAND type.reject.query
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject:    --> type.reject.query
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject: Using query template
> 'query'
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject: EXPAND %{User-Name}
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject:    --> evren
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject: SQL-User-Name set to
> 'evren'
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject: EXPAND INSERT INTO
> radius_audit_log               ( mac, ip, computer_name, user_name,
>        stripped_user_name,  realm, event_type,                switch_id,
> switch_mac, switch_ip_address,                radius_source_ip_address,
> called_station_id, calling_station_id,                nas_port_type, ssid,
> nas_port_id,                ifindex, nas_port, connection_type,
>    nas_ip_address, nas_identifier, auth_status,                reason,
> auth_type, eap_type,                role, node_status, profile,
>    source, auto_reg, is_phone,                pf_domain, uuid,
> radius_request,                radius_reply, request_time, tenant_id,
> radius_ip)              VALUES               (
> '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
> '%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
>            '%{request:Stripped-User-Name}', '%{request:Realm}',
> 'Radius-Access-Request',
>  '%{%{control:PacketFence-Switch-Id}:-N/A}',
> '%{%{control:PacketFence-Switch-Mac}:-N/A}',
> '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
>  '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
> '%{request:Calling-Station-Id}',                '%{request:NAS-Port-Type}',
> '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
>  '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
> '%{%{control:PacketFence-Connection-Type}:-N/A}',
>  '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',  'Reject',
>           '%{request:Module-Failure-Message}', '%{control:Auth-Type}',
> '%{request:EAP-Type}',
>  '%{%{control:PacketFence-Role}:-N/A}',
> '%{%{control:PacketFence-Status}:-N/A}',
> '%{%{control:PacketFence-Profile}:-N/A}',
>  '%{%{control:PacketFence-Source}:-N/A}',
> '%{%{control:PacketFence-AutoReg}:-0}',
> '%{%{control:PacketFence-IsPhone}:-0}',
>  '%{request:PacketFence-Domain}', '',
> '%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
> '%{%{control:PacketFence-Request-Time}:-N/A}',
> '%{control:PacketFence-Tenant-Id}', '%{request:PacketFence-Radius-Ip}')
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject:    --> INSERT INTO
> radius_audit_log               ( mac, ip, computer_name, user_name,
>        stripped_user_name,  realm, event_type,                switch_id,
> switch_mac, switch_ip_address,                radius_source_ip_address,
> called_station_id, calling_station_id,                nas_port_type, ssid,
> nas_port_id,                ifindex, nas_port, connection_type,
>    nas_ip_address, nas_identifier, auth_status,                reason,
> auth_type, eap_type,                role, node_status, profile,
>    source, auto_reg, is_phone,                pf_domain, uuid,
> radius_request,                radius_reply, request_time, tenant_id,
> radius_ip)              VALUES               ( '192.168.30.1', '', 'N/A',
> 'evren',                '', '', 'Radius-Access-Request',
>  'N/A', 'N/A', 'N/A',                '192.168.30.6', '', '192.168.30.1',
>              '', '', '',                'N/A', '', 'N/A',
>  '192.168.30.6', 'MikroTik',  'Reject',                 '', '', '',
>        'N/A', 'N/A', 'N/A',                'N/A', '0', '0',
>  '', '', 'User-Name =3D =22evren=22=2C NAS-IP-Address =3D 192.168.30.6=2C
> Service-Type =3D Login-User=2C Calling-Station-Id =3D =22192.168.30.1=22=2C
> NAS-Identifier =3D =22MikroTik=22=2C Event-Timestamp =3D =22Mar 16 2020
> 15:07:27 =2B03=22=2C MS-CHAP-Challenge =3D
> 0xa0f07329316086f83e9d6cf9be1dbb8b=2C MS-CHAP2-Response =3D
> 0x0000a188e5fb5bcc68173aa94693bed6ed5e0000000000000000a2dc302e211a880cc3c117ca130ec341de241f0888f480ef=2C
> FreeRADIUS-Client-IP-Address =3D 192.168.30.6=2C PacketFence-KeyBalanced
> =3D =2285bde241d7f98ac7a0bab114b852c753=22=2C User-Password =3D
> =22=2A=2A=2A=2A=2A=2A=22=2C SQL-User-Name =3D =22evren=22','Reply-Message
> =3D =22Mac is empty=22', '0', '1', '')
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject: Executing query: INSERT
> INTO radius_audit_log               ( mac, ip, computer_name, user_name,
>              stripped_user_name,  realm, event_type,
>  switch_id, switch_mac, switch_ip_address,
>  radius_source_ip_address, called_station_id, calling_station_id,
>      nas_port_type, ssid, nas_port_id,                ifindex, nas_port,
> connection_type,                nas_ip_address, nas_identifier,
> auth_status,                reason, auth_type, eap_type,
>  role, node_status, profile,                source, auto_reg, is_phone,
>            pf_domain, uuid, radius_request,                radius_reply,
> request_time, tenant_id, radius_ip)              VALUES               (
> '192.168.30.1', '', 'N/A', 'evren',                '', '',
> 'Radius-Access-Request',                'N/A', 'N/A', 'N/A',
>  '192.168.30.6', '', '192.168.30.1',                '', '', '',
>    'N/A', '', 'N/A',                '192.168.30.6', 'MikroTik',  'Reject',
>                 '', '', '',                'N/A', 'N/A', 'N/A',
>    'N/A', '0', '0',                '', '', 'User-Name =3D =22evren=22=2C
> NAS-IP-Address =3D 192.168.30.6=2C Service-Type =3D Login-User=2C
> Calling-Station-Id =3D =22192.168.30.1=22=2C NAS-Identifier =3D
> =22MikroTik=22=2C Event-Timestamp =3D =22Mar 16 2020 15:07:27 =2B03=22=2C
> MS-CHAP-Challenge =3D 0xa0f07329316086f83e9d6cf9be1dbb8b=2C
> MS-CHAP2-Response =3D
> 0x0000a188e5fb5bcc68173aa94693bed6ed5e0000000000000000a2dc302e211a880cc3c117ca130ec341de241f0888f480ef=2C
> FreeRADIUS-Client-IP-Address =3D 192.168.30.6=2C PacketFence-KeyBalanced
> =3D =2285bde241d7f98ac7a0bab114b852c753=22=2C User-Password =3D
> =22=2A=2A=2A=2A=2A=2A=22=2C SQL-User-Name =3D =22evren=22','Reply-Message
> =3D =22Mac is empty=22', '0', '1', '')
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject: SQL query returned:
> success
> (25) Mon Mar 16 15:07:27 2020: Debug: sql_reject: 1 record(s) updated
> (25) Mon Mar 16 15:07:27 2020: Debug:           [sql_reject] = ok
> (25) Mon Mar 16 15:07:27 2020: Debug:         } # else = ok
> (25) Mon Mar 16 15:07:27 2020: Debug:       } # policy
> packetfence-audit-log-reject = ok
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # if (! EAP-Type || (EAP-Type
> != TTLS  && EAP-Type != PEAP) )  = ok
> (25) Mon Mar 16 15:07:27 2020: Debug:     if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
> (25) Mon Mar 16 15:07:27 2020: Debug:     EXPAND
> %{%{control:PacketFence-Proxied-From}:-False}
> (25) Mon Mar 16 15:07:27 2020: Debug:        --> False
> (25) Mon Mar 16 15:07:27 2020: Debug:     if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug: attr_filter.access_reject: EXPAND
> %{User-Name}
> (25) Mon Mar 16 15:07:27 2020: Debug: attr_filter.access_reject:    -->
> evren
> (25) Mon Mar 16 15:07:27 2020: Debug: attr_filter.access_reject: Matched
> entry DEFAULT at line 11
> (25) Mon Mar 16 15:07:27 2020: Debug:     [attr_filter.access_reject] =
> updated
> (25) Mon Mar 16 15:07:27 2020: Debug: attr_filter.packetfence_post_auth:
> EXPAND %{User-Name}
> (25) Mon Mar 16 15:07:27 2020: Debug: attr_filter.packetfence_post_auth:
>  --> evren
> (25) Mon Mar 16 15:07:27 2020: Debug: attr_filter.packetfence_post_auth:
> Matched entry DEFAULT at line 10
> (25) Mon Mar 16 15:07:27 2020: Debug:
> [attr_filter.packetfence_post_auth] = updated
> (25) Mon Mar 16 15:07:27 2020: Debug:     [eap] = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     policy
> remove_reply_message_if_eap {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&reply:EAP-Message &&
> &reply:Reply-Message) {
> (25) Mon Mar 16 15:07:27 2020: Debug:       if (&reply:EAP-Message &&
> &reply:Reply-Message)  -> FALSE
> (25) Mon Mar 16 15:07:27 2020: Debug:       else {
> (25) Mon Mar 16 15:07:27 2020: Debug:         [noop] = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:       } # else = noop
> (25) Mon Mar 16 15:07:27 2020: Debug:     } # policy
> remove_reply_message_if_eap = noop
> (25) Mon Mar 16 15:07:27 2020: Debug: linelog: EXPAND
> messages.%{%{reply:Packet-Type}:-default}
> (25) Mon Mar 16 15:07:27 2020: Debug: linelog:    -->
> messages.Access-Reject
> (25) Mon Mar 16 15:07:27 2020: Debug: linelog: EXPAND
> [mac:%{Calling-Station-Id}] Rejected user: %{User-Name}
> (25) Mon Mar 16 15:07:27 2020: Debug: linelog:    --> [mac:192.168.30.1]
> Rejected user: evren
> (25) Mon Mar 16 15:07:27 2020: Debug:     [linelog] = ok
> (25) Mon Mar 16 15:07:27 2020: Debug:   } # Post-Auth-Type REJECT = updated
> (25) Mon Mar 16 15:07:27 2020: Debug: Delaying response for 1.000000
> seconds
> (25) Mon Mar 16 15:07:27 2020: Debug: (25) Discarding duplicate request
> from client 192.168.30.6/32 port 35675 - ID: 95 due to delayed response
> (25) Mon Mar 16 15:07:28 2020: Debug: (25) Discarding duplicate request
> from client 192.168.30.6/32 port 35675 - ID: 95 due to delayed response
> (25) Mon Mar 16 15:07:28 2020: Debug: Sending delayed response
> (25) Mon Mar 16 15:07:28 2020: Debug: Sent Access-Reject Id 95 from
> 192.168.30.2:1812 to 192.168.30.6:35675 length 34
> (25) Mon Mar 16 15:07:28 2020: Debug:   Reply-Message = "Mac is empty"
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to