It looks to be a bug in the switch template.

Right now there is no method to extract the ssid in other attributes than colling-station-id.

We will make a patch to update the default method to extract the ssid from Called-Station-SSID.

Le 20-10-07 à 14 h 19, Louis Scaringella a écrit :
Here is the request:

RADIUS Request
User-Name = "00-24-d6-5b-30-bc"
User-Password = "******"
NAS-IP-Address = 198.18.255.64
NAS-Port = 0
Service-Type = Call-Check
Called-Station-Id = "20:4c:03:58:99:8a"
Calling-Station-Id = "00:24:d6:5b:30:bc"
NAS-Port-Type = Wireless-802.11
Event-Timestamp = "Oct  7 2020 13:14:28 CDT"
Message-Authenticator = 0x0ba983427b333601e7704e6fbfc6739d
Aruba-Essid-Name = "Lab-Open-Guest"
Aruba-Location-Id = "Lab AP-A0:E4"
Aruba-AP-Group = "default"
Stripped-User-Name = "00-24-d6-5b-30-bc"
Realm = "null"
FreeRADIUS-Client-IP-Address = 198.18.255.64
Called-Station-SSID = "Lab-Open-Guest"
PacketFence-KeyBalanced = "8a61332855442ed4efb3a8b31b7b9e13"
PacketFence-Radius-Ip = "198.18.255.132"
SQL-User-Name = "00-24-d6-5b-30-bc”

It seems to show under the Called-Station-SSID as well as Aruba-ESSID-NAME.

Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

On Oct 7, 2020, at 1:17 PM, Fabrice Durand <fdur...@inverse.ca> wrote:

Check in the radius audit log for the radius request and check if one of the 
attribute contain the SSID.

If the SSID is defined in one of the attribute then we will be able to fix it , 
if no then check on the aruba side if there a way to push it. (it's by default)

Le 20-10-07 à 14 h 12, Louis Scaringella a écrit :
Here it is. It appears it isn’t able to extract the SSID from the Aruba 
Controller. This is ArubaOS 8.6 running on the controller.

Any ideas to workaround this? It even says to let you all know so you can add 
support for it. I appreciate all you do to keep this product awesome!

Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Unable to extract SSID of Called-Station-Id: 
20:4c:03:58:99:8a (pf::Switch::extractSsid)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) WARN: 
[mac:00:24:d6:5b:30:bc] Unable to extract SSID for module pf::Switch::Template. 
SSID-based VLAN assignments won't work. Please let us know so we can add 
support for it. (pf::Switch::extractSsid)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: [mac:00:24:d6:5b:30:bc] handling 
radius autz request: from switch_ip => (198.18.255.64), connection_type => 
Wireless-802.11-NoEAP,switch_mac => (20:4c:03:58:99:8a), mac => [00:24:d6:5b:30:bc], port => 0, 
username => "00-24-d6-5b-30-bc" (pf::radius::authorize)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Match rule MAC-Auth (pf::access_filter::test)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] vlan filter match ; belongs into REJECT VLAN 
(pf::role::getRegistrationRole)
Oct  7 13:08:35 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] According to rules in fetchRoleForNode this node must 
be kicked out. Returning USERLOCK (pf::Switch::Template::handleRadiusDeny)
Oct  7 13:08:44 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:51 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:52 localhost packetfence_httpd.portal: httpd.portal(2657) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:57 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:57 localhost packetfence_httpd.portal: httpd.portal(2657) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:08:59 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] Calling match with empty/invalid rule class. Defaulting 
to 'authentication' (pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Using sources OpenWifi for matching 
(pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Matched rule (catchall) in source OpenWifi, returning 
actions. (pf::Authentication::Source::match_rule)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Matched rule (catchall) in source OpenWifi, returning 
actions. (pf::Authentication::Source::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] Calling match with empty/invalid rule class. Defaulting 
to 'authentication' (pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Using sources OpenWifi for matching 
(pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] Calling match with empty/invalid rule class. Defaulting 
to 'authentication' (pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Using sources OpenWifi for matching 
(pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Matched rule (catchall) in source OpenWifi, returning 
actions. (pf::Authentication::Source::match_rule)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Matched rule (catchall) in source OpenWifi, returning 
actions. (pf::Authentication::Source::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] Calling match with empty/invalid rule class. Defaulting 
to 'authentication' (pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Using sources OpenWifi for matching 
(pf::authentication::match)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2657) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] No provisioner found for 00:24:d6:5b:30:bc. Continuing. 
(captiveportal::PacketFence::DynamicRouting::Module::Provisioning::execute_child)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] security_event 1300003 force-closed for 
00:24:d6:5b:30:bc (pf::security_event::security_event_force_close)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2655) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:unknown] locale from the URL  is not supported 
(pf::Portal::Session::getLanguages)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] locale from the URL  is not supported 
(pf::Portal::Session::getLanguages)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] locale from the URL  is not supported 
(captiveportal::PacketFence::Controller::Root::getLanguages)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Releasing device 
(captiveportal::PacketFence::DynamicRouting::Module::Root::release)
Oct  7 13:09:00 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] User default has authenticated on the portal. 
(Class::MOP::Class:::after)
Oct  7 13:09:01 localhost packetfence_httpd.portal: httpd.portal(2656) WARN: 
[mac:00:24:d6:5b:30:bc] locale from the URL  is not supported 
(pf::Portal::Session::getLanguages)
Oct  7 13:09:01 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] re-evaluating access (manage_register called) 
(pf::enforcement::reevaluate_access)
Oct  7 13:09:01 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:01 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] VLAN reassignment is forced. 
(pf::enforcement::_should_we_reassign_vlan)
Oct  7 13:09:01 localhost packetfence_httpd.portal: httpd.portal(2656) INFO: 
[mac:00:24:d6:5b:30:bc] switch port is (198.18.255.64) ifIndex 0connection 
type: WiFi MAC Auth (pf::enforcement::_vlan_reevaluation)
Oct  7 13:09:02 localhost pfqueue: pfqueue(4604) INFO: [mac:00:24:d6:5b:30:bc] 
[00:24:d6:5b:30:bc] DesAssociating mac on switch (198.18.255.64) 
(pf::api::desAssociate)
Oct  7 13:09:02 localhost pfqueue: pfqueue(4604) INFO: [mac:00:24:d6:5b:30:bc] 
deauthenticating (pf::Switch::Template::radiusDisconnect)
Oct  7 13:09:02 localhost pfqueue: pfqueue(4604) INFO: [mac:00:24:d6:5b:30:bc] 
controllerIp is set, we will use controller 198.18.255.64 to perform deauth 
(pf::Switch::Template::disconnectAddress)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Unable to extract SSID of Called-Station-Id: 
20:4c:03:58:99:8a (pf::Switch::extractSsid)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) WARN: 
[mac:00:24:d6:5b:30:bc] Unable to extract SSID for module pf::Switch::Template. 
SSID-based VLAN assignments won't work. Please let us know so we can add 
support for it. (pf::Switch::extractSsid)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: [mac:00:24:d6:5b:30:bc] handling 
radius autz request: from switch_ip => (198.18.255.64), connection_type => 
Wireless-802.11-NoEAP,switch_mac => (20:4c:03:58:99:8a), mac => [00:24:d6:5b:30:bc], port => 0, 
username => "00-24-d6-5b-30-bc" (pf::radius::authorize)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Found authentication source(s) : 
'local,file1,LabDC,LabDC-TestSponsor' for realm 'null' 
(pf::config::util::filter_authentication_sources)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Connection type is MAC-AUTH. Getting role from 
node_info (pf::role::getRegisteredRole)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Username was defined "00-24-d6-5b-30-bc" - returning 
role 'guest' (pf::role::getRegisteredRole)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] PID: "default", Status: reg Returned VLAN: (undefined), 
Role: guest (pf::role::fetchRoleForNode)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) WARN: 
[mac:00:24:d6:5b:30:bc] No parameter guestVlan found in conf/switches.conf for 
the switch 198.18.255.64 (pf::Switch::getVlanByName)
Oct  7 13:09:02 localhost packetfence_httpd.aaa: httpd.aaa(2063) INFO: 
[mac:00:24:d6:5b:30:bc] Updating locationlog from accounting request 
(pf::api::handle_accounting_metadata)
Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

On Oct 7, 2020, at 11:41 AM, Fabrice Durand <fdur...@inverse.ca> wrote:

What i am looking for is the line in packetfence.log that start with "handling 
radius autz request"

Le 20-10-07 à 12 h 02, Louis Scaringella a écrit :
Hello,

When I add the SSID filter to the connection profile, this is the log I see:

Oct 7 10:59:54 localhost packetfence_httpd.portal: httpd.portal(2613) INFO: 
[mac:00:24:d6:5b:30:bc] Instantiate profile default 
(pf::Connection::ProfileFactory::_from_profile)

If the SSID filter is removed, it matches the connection profile I want which is the 
one with the customized portal logo and different guest authentication types. That 
is the "Lab-Aruba-OpenGuest-copy” profile in this case.

Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

On Oct 7, 2020, at 8:17 AM, Fabrice Durand via PacketFence-users 
<packetfence-users@lists.sourceforge.net> wrote:

Hello Louis,

can you provide the packetfence.log when you authenticate and hit the portal ?

Regards

Fabrice


Le 20-10-06 à 17 h 30, Louis Scaringella via PacketFence-users a écrit :
Still no luck with this. Can someone verify that my profile config looks 
alright? It seems very straightforward with the SSID filter in place.

I really appreciate any help that you can provide.

Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

On Oct 6, 2020, at 8:58 AM, Louis Scaringella via PacketFence-users 
<packetfence-users@lists.sourceforge.net> wrote:

To add to this, I tried add an advanced filter with what showed up for the SSID 
name in the Radius request in the audit logs but still didn’t match this. 
Things like called-station-ID and ArubaESSID but none of those worked either.

The wireless vendor is Aruba and there is a controller used.

Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

On Oct 5, 2020, at 7:13 PM, Louis Scaringella via PacketFence-users 
<packetfence-users@lists.sourceforge.net> wrote:

Any ideas on this?

Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

On Oct 5, 2020, at 8:50 AM, Louis Scaringella 
<lscaringe...@yellowdognetworks.com> wrote:

When I remove the SSID filter, the NoEap connection type matches perfectly and 
it uses that profile and presents that customized page for the captive portal. 
Whenever I use the SSID filter in addition to the connection type, it seems to 
match the default and presents the default captive portal screen.

Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

On Oct 5, 2020, at 6:52 AM, Ludovic Zammit <lzam...@inverse.ca> wrote:

Hello Louis,

Could you show me your conf/profile.conf please.

Thanks,

Ludovic Zammit

lzam...@inverse.ca ::  +1.514.447.4918 (x145) ::  www.inverse.ca

Inverse inc. :: Leaders behind SOGo (
http://www.sogo.nu) and PacketFence (http://packetfence.org)




On Oct 3, 2020, at 5:00 AM, Louis Scaringella via PacketFence-users 
<packetfence-users@lists.sourceforge.net> wrote:

Ultimately what I am trying to accomplish is to have multiple connection 
profiles chosen by SSID so that I can present different captive portal pages 
and authentication types. The only way I see to do that is through the 
connection profile.

Am I missing something with the SSID filter not working with non-EAP connection 
types?

Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

On Oct 3, 2020, at 2:16 AM, Louis Scaringella 
<lscaringe...@yellowdognetworks.com> wrote:

I am running 10.1, I forgot to mention.

Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

On Oct 3, 2020, at 1:40 AM, Louis Scaringella 
<lscaringe...@yellowdognetworks.com> wrote:

Hello,

When I configure a custom connection profile for my open guest captive portal 
connection with AUP, I am able to have the connection profile get triggered and 
used when I use the Connection Type filter with “Wireless-802.11-NoEAP”.

However, if I add the condition of all and add the SSID filter, it doesn’t 
match that connection profile and just uses the default even though the SSID is 
correct. I have to manually type the SSID in and the SSID doesn’t show anywhere 
in the nodes section which from past messages, I understand that this is where 
that comes from.

I found a bug that describes this issue close enough. Could this be that 
problem?

Louis Scaringella
Security Systems Engineer
Yellow Dog Networks, Inc
785-342-7903

The information transmitted, including any attachments, is intended only for 
the person or entity to which it is addressed and may contain confidential 
and/or privileged material. Any review, retransmission, dissemination or other 
use of, or taking of any action in reliance upon, this information by persons 
or entities other than the intended recipient is prohibited, and all liability 
arising therefrom is disclaimed. If you received this in error, please contact 
the sender and delete the material from any computer.

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
The information transmitted, including any attachments, is intended only for 
the person or entity to which it is addressed and may contain confidential 
and/or privileged material. Any review, retransmission, dissemination or other 
use of, or taking of any action in reliance upon, this information by persons 
or entities other than the intended recipient is prohibited, and all liability 
arising therefrom is disclaimed. If you received this in error, please contact 
the sender and delete the material from any computer.

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
The information transmitted, including any attachments, is intended only for 
the person or entity to which it is addressed and may contain confidential 
and/or privileged material. Any review, retransmission, dissemination or other 
use of, or taking of any action in reliance upon, this information by persons 
or entities other than the intended recipient is prohibited, and all liability 
arising therefrom is disclaimed. If you received this in error, please contact 
the sender and delete the material from any computer.

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
The information transmitted, including any attachments, is intended only for 
the person or entity to which it is addressed and may contain confidential 
and/or privileged material. Any review, retransmission, dissemination or other 
use of, or taking of any action in reliance upon, this information by persons 
or entities other than the intended recipient is prohibited, and all liability 
arising therefrom is disclaimed. If you received this in error, please contact 
the sender and delete the material from any computer.

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
The information transmitted, including any attachments, is intended only for 
the person or entity to which it is addressed and may contain confidential 
and/or privileged material. Any review, retransmission, dissemination or other 
use of, or taking of any action in reliance upon, this information by persons 
or entities other than the intended recipient is prohibited, and all liability 
arising therefrom is disclaimed. If you received this in error, please contact 
the sender and delete the material from any computer.
--
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)
The information transmitted, including any attachments, is intended only for 
the person or entity to which it is addressed and may contain confidential 
and/or privileged material. Any review, retransmission, dissemination or other 
use of, or taking of any action in reliance upon, this information by persons 
or entities other than the intended recipient is prohibited, and all liability 
arising therefrom is disclaimed. If you received this in error, please contact 
the sender and delete the material from any computer.
--
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)

The information transmitted, including any attachments, is intended only for 
the person or entity to which it is addressed and may contain confidential 
and/or privileged material. Any review, retransmission, dissemination or other 
use of, or taking of any action in reliance upon, this information by persons 
or entities other than the intended recipient is prohibited, and all liability 
arising therefrom is disclaimed. If you received this in error, please contact 
the sender and delete the material from any computer.

--
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to