hi here is the result of raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000'
i changed my personal details with my_username my_user_device_mac my_switch_ip my_server_ip my_switch_mac my_cluster_managment_ip also highlight the error in logs . (26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence (26979) Mon Nov 2 15:39:12 2020: Debug: authenticate { (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Expiring EAP session with state 0xddba5edfdca958cb (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Finished EAP session with state 0xec639e88eb7087f4 (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Previous EAP request found for state 0xec639e88eb7087f4, released from the list (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent packet with method EAP PEAP (25) (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Calling submodule eap_peap to process data (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Continuing EAP-TLS (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: [eaptls verify] = ok (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Done initial handshake (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: [eaptls process] = ok (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Session established. Decoding tunneled attributes (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: PEAP state phase2 (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP method GTC (6) (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Got tunneled request (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message = 0x0213000f0642726561746853473240 (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Setting User-Name to my_username (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Sending tunneled request to packetfence-tunnel (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message = 0x0213000f0642726561746853473240 (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1 (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: User-Name = "myusername" (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: State = 0xddba5edfdca958cb96d4c517e9bc660c (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Service-Type = Framed-User (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair = "service-type=Framed" (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair = "audit-session-id=0A0115170000000D005BC4FA" (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair = "method=dot1x" (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Framed-MTU = 1500 (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Calling-Station-Id := "my_user_device_mac" (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-IP-Address = my_switch_ip (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port-Id = "GigabitEthernet1/0/1" (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port-Type = Ethernet (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port = 50101 (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: PacketFence-KeyBalanced := "99a990b22af7d7ca016a27643cd35a1e" (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: PacketFence-Radius-Ip := "my_server_ip" (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Called-Station-Id := "my_switch_mac" (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Event-Timestamp = "Nov 2 2020 15:39:12 IST" (26979) Mon Nov 2 15:39:12 2020: Debug: Virtual server packetfence-tunnel received request (26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message = 0x0213000f0642726561746853473240 (26979) Mon Nov 2 15:39:12 2020: Debug: FreeRADIUS-Proxied-To = 127.0.0.1 (26979) Mon Nov 2 15:39:12 2020: Debug: User-Name = "myusername" (26979) Mon Nov 2 15:39:12 2020: Debug: State = 0xddba5edfdca958cb96d4c517e9bc660c (26979) Mon Nov 2 15:39:12 2020: Debug: Service-Type = Framed-User (26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair = "service-type=Framed" (26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair = "audit-session-id=0A0115170000000D005BC4FA" (26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair = "method=dot1x" (26979) Mon Nov 2 15:39:12 2020: Debug: Framed-MTU = 1500 (26979) Mon Nov 2 15:39:12 2020: Debug: Calling-Station-Id := "my_user_device_mac" (26979) Mon Nov 2 15:39:12 2020: Debug: NAS-IP-Address = my_switch_ip (26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port-Id = "GigabitEthernet1/0/1" (26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port-Type = Ethernet (26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port = 50101 (26979) Mon Nov 2 15:39:12 2020: Debug: PacketFence-KeyBalanced := "99a990b22af7d7ca016a27643cd35a1e" (26979) Mon Nov 2 15:39:12 2020: Debug: PacketFence-Radius-Ip := "my_server_ip" (26979) Mon Nov 2 15:39:12 2020: Debug: Called-Station-Id := "my_switch_mac" (26979) Mon Nov 2 15:39:12 2020: Debug: Event-Timestamp = "Nov 2 2020 15:39:12 IST" (26979) Mon Nov 2 15:39:12 2020: Debug: server packetfence-tunnel { (26979) Mon Nov 2 15:39:12 2020: Debug: session-state: No cached attributes (26979) Mon Nov 2 15:39:12 2020: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel (26979) Mon Nov 2 15:39:12 2020: Debug: authorize { (26979) Mon Nov 2 15:39:12 2020: Debug: if ( outer.EAP-Type == TTLS) { (26979) Mon Nov 2 15:39:12 2020: Debug: if ( outer.EAP-Type == TTLS) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: policy packetfence-set-realm-if-machine { (26979) Mon Nov 2 15:39:12 2020: Debug: if (User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i) { (26979) Mon Nov 2 15:39:12 2020: Debug: if (User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy packetfence-set-realm-if-machine = notfound (26979) Mon Nov 2 15:39:12 2020: Debug: policy packetfence-set-tenant-id { (26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){ (26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0} (26979) Mon Nov 2 15:39:12 2020: Debug: --> 0 (26979) Mon Nov 2 15:39:12 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE (26979) Mon Nov 2 15:39:12 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { (26979) Mon Nov 2 15:39:12 2020: Debug: update control { (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{User-Name} (26979) Mon Nov 2 15:39:12 2020: Debug: --> my_username (26979) Mon Nov 2 15:39:12 2020: Debug: SQL-User-Name set to 'myusername' (26979) Mon Nov 2 15:39:12 2020: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = 'my_switch_ip'), 0) (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{NAS-IP-Address}'), 0)} (26979) Mon Nov 2 15:39:12 2020: Debug: --> 1 (26979) Mon Nov 2 15:39:12 2020: Debug: } # update control = noop (26979) Mon Nov 2 15:39:12 2020: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop (26979) Mon Nov 2 15:39:12 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) { (26979) Mon Nov 2 15:39:12 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy packetfence-set-tenant-id = noop (26979) Mon Nov 2 15:39:12 2020: Debug: policy filter_username { (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) { (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) -> TRUE (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) { (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ / /) { (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ / /) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ /@[^@]*@/ ) { (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ /\.\./ ) { (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ /\.\./ ) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (26979) Mon Nov 2 15:39:12 2020: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ /\.$/) { (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ /\.$/) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ /@\./) { (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ /@\./) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: } # if (&User-Name) = noop (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy filter_username = noop (26979) Mon Nov 2 15:39:12 2020: Debug: update { (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{outer.request:User-Name} (26979) Mon Nov 2 15:39:12 2020: Debug: --> anonymous (26979) Mon Nov 2 15:39:12 2020: Debug: } # update = noop (26979) Mon Nov 2 15:39:12 2020: Debug: [mschap] = noop (26979) Mon Nov 2 15:39:12 2020: Debug: suffix: Checking for suffix after "@" (26979) Mon Nov 2 15:39:12 2020: Debug: suffix: No '@' in User-Name = "myusername", skipping NULL due to config. (26979) Mon Nov 2 15:39:12 2020: Debug: [suffix] = noop (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Checking for prefix before "\" (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: No '\' in User-Name = "myusername", looking up realm NULL (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Found realm "null" (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Adding Stripped-User-Name = "myusername" (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Adding Realm = "null" (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Authentication realm is LOCAL (26979) Mon Nov 2 15:39:12 2020: Debug: [ntdomain] = ok (26979) Mon Nov 2 15:39:12 2020: Debug: update control { (26979) Mon Nov 2 15:39:12 2020: Debug: } # update control = noop (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent EAP Response (code 2) ID 19 length 15 (26979) Mon Nov 2 15:39:12 2020: Debug: eap: No EAP Start, assuming it's an on-going EAP conversation (26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = updated (26979) Mon Nov 2 15:39:12 2020: Debug: policy rewrite_called_station_id { (26979) Mon Nov 2 15:39:12 2020: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) { (26979) Mon Nov 2 15:39:12 2020: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE (26979) Mon Nov 2 15:39:12 2020: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) { (26979) Mon Nov 2 15:39:12 2020: Debug: update request { (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}} (26979) Mon Nov 2 15:39:12 2020: Debug: --> my_switch_mac (26979) Mon Nov 2 15:39:12 2020: Debug: } # update request = noop (26979) Mon Nov 2 15:39:12 2020: Debug: if ("%{8}") { (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{8} (26979) Mon Nov 2 15:39:12 2020: Debug: --> (26979) Mon Nov 2 15:39:12 2020: Debug: if ("%{8}") -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) { (26979) Mon Nov 2 15:39:12 2020: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: elsif (Aruba-Essid-Name) { (26979) Mon Nov 2 15:39:12 2020: Debug: elsif (Aruba-Essid-Name) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) { (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{Cisco-AVPair} (26979) Mon Nov 2 15:39:12 2020: Debug: --> service-type=Framed (26979) Mon Nov 2 15:39:12 2020: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: [updated] = updated (26979) Mon Nov 2 15:39:12 2020: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated (26979) Mon Nov 2 15:39:12 2020: Debug: ... skipping else: Preceding "if" was taken (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy rewrite_called_station_id = updated (26979) Mon Nov 2 15:39:12 2020: Debug: [pap] = noop (26979) Mon Nov 2 15:39:12 2020: Debug: } # authorize = updated (26979) Mon Nov 2 15:39:12 2020: WARNING: You set Proxy-To-Realm = local, but it is a LOCAL realm! Cancelling proxy request. (26979) Mon Nov 2 15:39:12 2020: Debug: Found Auth-Type = eap (26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel (26979) Mon Nov 2 15:39:12 2020: Debug: authenticate { (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Expiring EAP session with state 0xddba5edfdca958cb (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Finished EAP session with state 0xddba5edfdca958cb (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Previous EAP request found for state 0xddba5edfdca958cb, released from the list *(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent packet with method EAP GTC (6)(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Calling submodule eap_gtc to process data(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: Auth-Type PAP {(26979) Mon Nov 2 15:39:12 2020: Debug: pap: Login attempt with password(26979) Mon Nov 2 15:39:12 2020: Debug: pap: No password configured for the user. Cannot do authentication(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: [pap] = fail(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: } # Auth-Type PAP = fail(26979) Mon Nov 2 15:39:12 2020: ERROR: eap: Failed continuing EAP GTC (6) session. EAP sub-module failed(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Sending EAP Failure (code 4) ID 19 length 4* (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Failed in EAP select (26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = invalid (26979) Mon Nov 2 15:39:12 2020: Debug: } # authenticate = invalid (26979) Mon Nov 2 15:39:12 2020: Debug: Failed to authenticate the user (26979) Mon Nov 2 15:39:12 2020: Debug: Using Post-Auth-Type Reject (26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel (26979) Mon Nov 2 15:39:12 2020: Debug: Post-Auth-Type REJECT { (26979) Mon Nov 2 15:39:12 2020: Debug: policy packetfence-set-tenant-id { (26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){ (26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0} (26979) Mon Nov 2 15:39:12 2020: Debug: --> 1 (26979) Mon Nov 2 15:39:12 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) { (26979) Mon Nov 2 15:39:12 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy packetfence-set-tenant-id = noop (26979) Mon Nov 2 15:39:12 2020: Debug: update { (26979) Mon Nov 2 15:39:12 2020: Debug: } # update = noop (26979) Mon Nov 2 15:39:12 2020: Debug: policy packetfence-audit-log-reject { (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name && (&User-Name == "dummy")) { (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name && (&User-Name == "dummy")) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: else { (26979) Mon Nov 2 15:39:12 2020: Debug: policy request-timing { (26979) Mon Nov 2 15:39:12 2020: Debug: if ("%{%{control:PacketFence-Request-Time}:-0}" != 0) { (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{%{control:PacketFence-Request-Time}:-0} (26979) Mon Nov 2 15:39:12 2020: Debug: --> 0 (26979) Mon Nov 2 15:39:12 2020: Debug: if ("%{%{control:PacketFence-Request-Time}:-0}" != 0) -> FALSE (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy request-timing = noop (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND type.reject.query (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: --> type.reject.query (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: Using query template 'query' (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND %{User-Name} (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: --> my_username (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: SQL-User-Name set to 'myusername' (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name, stripped_user_name, realm, event_type, switch_id, switch_mac, switch_ip_address, radius_source_ip_address, called_station_id, calling_station_id, nas_port_type, ssid, nas_port_id, ifindex, nas_port, connection_type, nas_ip_address, nas_identifier, auth_status, reason, auth_type, eap_type, role, node_status, profile, source, auto_reg, is_phone, pf_domain, uuid, radius_request, radius_reply, request_time, tenant_id, radius_ip) VALUES ( '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}', '%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}', '%{request:Stripped-User-Name}', '%{request:Realm}', 'Radius-Access-Request', '%{%{control:PacketFence-Switch-Id}:-N/A}', '%{%{control:PacketFence-Switch-Mac}:-N/A}', '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}', '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}', '%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}', '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}', '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}', '%{%{control:PacketFence-Connection-Type}:-N/A}', '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Reject', '%{request:Module-Failure-Message}', '%{control:Auth-Type}', '%{request:EAP-Type}', '%{%{control:PacketFence-Role}:-N/A}', '%{%{control:PacketFence-Status}:-N/A}', '%{%{control:PacketFence-Profile}:-N/A}', '%{%{control:PacketFence-Source}:-N/A}', '%{%{control:PacketFence-AutoReg}:-0}', '%{%{control:PacketFence-IsPhone}:-0}', '%{request:PacketFence-Domain}', '', '%{pairs:&request:[*]}','%{pairs:&reply:[*]}', '%{%{control:PacketFence-Request-Time}:-N/A}', '%{control:PacketFence-Tenant-Id}', '%{request:PacketFence-Radius-Ip}') (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: --> INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name, stripped_user_name, realm, event_type, switch_id, switch_mac, switch_ip_address, radius_source_ip_address, called_station_id, calling_station_id, nas_port_type, ssid, nas_port_id, ifindex, nas_port, connection_type, nas_ip_address, nas_identifier, auth_status, reason, auth_type, eap_type, role, node_status, profile, source, auto_reg, is_phone, pf_domain, uuid, radius_request, radius_reply, request_time, tenant_id, radius_ip) VALUES ( 'my_user_device_mac', '', 'N/A', 'myusername', 'myusername', 'null', 'Radius-Access-Request', 'N/A', 'N/A', 'N/A', 'my_cluster_managment_ip', 'my_switch_mac', 'my_user_device_mac', 'Ethernet', '', 'GigabitEthernet1/0/1', 'N/A', '50101', 'N/A', 'my_switch_ip', '', 'Reject', 'eap: Failed continuing EAP GTC (6) session. EAP sub-module failed', 'eap', 'GTC', 'N/A', 'N/A', 'N/A', 'N/A', '0', '0', '', '', 'EAP-Message =3D 0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D 127.0.0.1, User-Name =3D =22myusername=22, State =3D 0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User, Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D =22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair =3D =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id =3D =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip, NAS-Port-Id =3D =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101, PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22, PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D =22Nov 2 2020 15:39:12 IST=22, PacketFence-Outer-User =3D =22anonymous=22, Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22, EAP-Type =3D GTC, Called-Station-Id =3D =22my_switch_mac=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22, Module-Failure-Message =3D =22eap: Failed continuing EAP GTC (6) session. EAP sub-module failed=22, SQL-User-Name =3D =22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator =3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip') (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: Executing query: INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name, stripped_user_name, realm, event_type, switch_id, switch_mac, switch_ip_address, radius_source_ip_address, called_station_id, calling_station_id, nas_port_type, ssid, nas_port_id, ifindex, nas_port, connection_type, nas_ip_address, nas_identifier, auth_status, reason, auth_type, eap_type, role, node_status, profile, source, auto_reg, is_phone, pf_domain, uuid, radius_request, radius_reply, request_time, tenant_id, radius_ip) VALUES ( 'my_user_device_mac', '', 'N/A', 'myusername', 'myusername', 'null', 'Radius-Access-Request', 'N/A', 'N/A', 'N/A', 'my_cluster_managment_ip', 'my_switch_mac', 'my_user_device_mac', 'Ethernet', '', 'GigabitEthernet1/0/1', 'N/A', '50101', 'N/A', 'my_switch_ip', '', 'Reject', 'eap: Failed continuing EAP GTC (6) session. EAP sub-module failed', 'eap', 'GTC', 'N/A', 'N/A', 'N/A', 'N/A', '0', '0', '', '', 'EAP-Message =3D 0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D 127.0.0.1, User-Name =3D =22myusername=22, State =3D 0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User, Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D =22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair =3D =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id =3D =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip, NAS-Port-Id =3D =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101, PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22, PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D =22Nov 2 2020 15:39:12 IST=22, PacketFence-Outer-User =3D =22anonymous=22, Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22, EAP-Type =3D GTC, Called-Station-Id =3D =22my_switch_mac=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22, Module-Failure-Message =3D =22eap: Failed continuing EAP GTC (6) session. EAP sub-module failed=22, SQL-User-Name =3D =22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator =3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip') (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: SQL query returned: success (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: 1 record(s) updated (26979) Mon Nov 2 15:39:12 2020: Debug: [sql_reject] = ok (26979) Mon Nov 2 15:39:12 2020: Debug: } # else = ok (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy packetfence-audit-log-reject = ok (26979) Mon Nov 2 15:39:12 2020: Debug: attr_filter.access_reject: EXPAND %{User-Name} (26979) Mon Nov 2 15:39:12 2020: Debug: attr_filter.access_reject: --> my_username (26979) Mon Nov 2 15:39:12 2020: Debug: attr_filter.access_reject: Matched entry DEFAULT at line 11 (26979) Mon Nov 2 15:39:12 2020: Debug: [attr_filter.access_reject] = updated (26979) Mon Nov 2 15:39:12 2020: Debug: update outer.session-state { (26979) Mon Nov 2 15:39:12 2020: Debug: } # update outer.session-state = noop (26979) Mon Nov 2 15:39:12 2020: Debug: } # Post-Auth-Type REJECT = updated (26979) Mon Nov 2 15:39:12 2020: Debug: } # server packetfence-tunnel (26979) Mon Nov 2 15:39:12 2020: Debug: Virtual server sending reply (26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message = 0x04130004 (26979) Mon Nov 2 15:39:12 2020: Debug: Message-Authenticator = 0x00000000000000000000000000000000 (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Got tunneled reply code 3 (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message = 0x04130004 (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Tunneled authentication was rejected (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: FAILURE (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Sending EAP Request (code 1) ID 20 length 46 (26979) Mon Nov 2 15:39:12 2020: Debug: eap: EAP session adding &reply:State = 0xec639e88e47787f4 (26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = handled (26979) Mon Nov 2 15:39:12 2020: Debug: } # authenticate = handled (26979) Mon Nov 2 15:39:12 2020: Debug: Using Post-Auth-Type Challenge (26979) Mon Nov 2 15:39:12 2020: Debug: Post-Auth-Type sub-section not found. Ignoring. (26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence (26979) Mon Nov 2 15:39:12 2020: Debug: session-state: Saving cached attributes (26979) Mon Nov 2 15:39:12 2020: Debug: TLS-Session-Cipher-Suite = "ECDHE-RSA-AES256-GCM-SHA384" (26979) Mon Nov 2 15:39:12 2020: Debug: TLS-Session-Version = "TLS 1.2" (26979) Mon Nov 2 15:39:12 2020: Debug: Module-Failure-Message := "eap: Failed continuing EAP GTC (6) session. EAP sub-module failed" (26979) Mon Nov 2 15:39:12 2020: Debug: Sent Access-Challenge Id 231 from my_server_ip:1812 to my_cluster_managment_ip:36588 length 0 (26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message = 0x0114002e190017030300233ccff76c8dee7ac196cf7561e1ebe6650116f48c3d155209928c145c148ad4ba578e7d (26979) Mon Nov 2 15:39:12 2020: Debug: Message-Authenticator = 0x00000000000000000000000000000000 (26979) Mon Nov 2 15:39:12 2020: Debug: State = 0xec639e88e47787f4b03ecf40bb262f03 (26979) Mon Nov 2 15:39:12 2020: Debug: Proxy-State = 0x313037 (26979) Mon Nov 2 15:39:12 2020: Debug: Finished request On Fri, Oct 30, 2020 at 5:36 PM Fabrice Durand <fdur...@inverse.ca> wrote: > At least when you try to connect ... > > > Le 20-10-30 à 06 h 37, Sonali Gulia a écrit : > > hi Durand fabrice > > here is the result of raddebug -f /usr/local/pf/var/run/radiusd.sock -t > 3000 > > (10522) Fri Oct 30 21:32:00 2020: Debug: Received Status-Server Id 97 from > 127.0.0.1:51783 to 127.0.0.1:18121 length 50 > (10522) Fri Oct 30 21:32:00 2020: Debug: Message-Authenticator = > 0x595be7422b20bffc2fd6282691eb1b4e > (10522) Fri Oct 30 21:32:00 2020: Debug: FreeRADIUS-Statistics-Type = 15 > (10522) Fri Oct 30 21:32:00 2020: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/status > (10522) Fri Oct 30 21:32:00 2020: Debug: Autz-Type Status-Server { > (10522) Fri Oct 30 21:32:00 2020: Debug: [ok] = ok > (10522) Fri Oct 30 21:32:00 2020: Debug: } # Autz-Type Status-Server = ok > (10522) Fri Oct 30 21:32:00 2020: Debug: Sent Access-Accept Id 97 from > 127.0.0.1:18121 to 127.0.0.1:51783 length 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Access-Requests = 10523 > (10522) Fri Oct 30 21:32:00 2020: Debug: FreeRADIUS-Total-Access-Accepts > = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: FreeRADIUS-Total-Access-Rejects > = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Access-Challenges = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: FreeRADIUS-Total-Auth-Responses > = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Auth-Duplicate-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Auth-Malformed-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Auth-Invalid-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Auth-Dropped-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Auth-Unknown-Types = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Accounting-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Accounting-Responses = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Acct-Duplicate-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Acct-Malformed-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Acct-Invalid-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Acct-Dropped-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Acct-Unknown-Types = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Accepts = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Rejects = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Challenges = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Responses = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Accounting-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Accounting-Responses = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 > (10522) Fri Oct 30 21:32:00 2020: Debug: Finished request > (10522) Fri Oct 30 21:32:05 2020: Debug: Cleaning up request packet ID 97 > with timestamp +157883 > (10523) Fri Oct 30 21:32:15 2020: Debug: Received Status-Server Id 71 from > 127.0.0.1:43289 to 127.0.0.1:18121 length 50 > (10523) Fri Oct 30 21:32:15 2020: Debug: Message-Authenticator = > 0x2e1611a2cb839f02f01df0ab302f9062 > (10523) Fri Oct 30 21:32:15 2020: Debug: FreeRADIUS-Statistics-Type = 15 > (10523) Fri Oct 30 21:32:15 2020: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/status > (10523) Fri Oct 30 21:32:15 2020: Debug: Autz-Type Status-Server { > (10523) Fri Oct 30 21:32:15 2020: Debug: [ok] = ok > (10523) Fri Oct 30 21:32:15 2020: Debug: } # Autz-Type Status-Server = ok > (10523) Fri Oct 30 21:32:15 2020: Debug: Sent Access-Accept Id 71 from > 127.0.0.1:18121 to 127.0.0.1:43289 length 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Access-Requests = 10524 > (10523) Fri Oct 30 21:32:15 2020: Debug: FreeRADIUS-Total-Access-Accepts > = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: FreeRADIUS-Total-Access-Rejects > = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Access-Challenges = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: FreeRADIUS-Total-Auth-Responses > = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Auth-Duplicate-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Auth-Malformed-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Auth-Invalid-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Auth-Dropped-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Auth-Unknown-Types = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Accounting-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Accounting-Responses = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Acct-Duplicate-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Acct-Malformed-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Acct-Invalid-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Acct-Dropped-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Acct-Unknown-Types = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Accepts = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Rejects = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Challenges = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Responses = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Accounting-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Accounting-Responses = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 > (10523) Fri Oct 30 21:32:15 2020: Debug: Finished request > (10523) Fri Oct 30 21:32:20 2020: Debug: Cleaning up request packet ID 71 > with timestamp +157898 > (10524) Fri Oct 30 21:32:30 2020: Debug: Received Status-Server Id 111 > from 127.0.0.1:38982 to 127.0.0.1:18121 length 50 > (10524) Fri Oct 30 21:32:30 2020: Debug: Message-Authenticator = > 0xbd1505f5fab60879f23b35b68b69b8a1 > (10524) Fri Oct 30 21:32:30 2020: Debug: FreeRADIUS-Statistics-Type = 15 > (10524) Fri Oct 30 21:32:30 2020: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/status > (10524) Fri Oct 30 21:32:30 2020: Debug: Autz-Type Status-Server { > (10524) Fri Oct 30 21:32:30 2020: Debug: [ok] = ok > (10524) Fri Oct 30 21:32:30 2020: Debug: } # Autz-Type Status-Server = ok > (10524) Fri Oct 30 21:32:30 2020: Debug: Sent Access-Accept Id 111 from > 127.0.0.1:18121 to 127.0.0.1:38982 length 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Access-Requests = 10525 > (10524) Fri Oct 30 21:32:30 2020: Debug: FreeRADIUS-Total-Access-Accepts > = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: FreeRADIUS-Total-Access-Rejects > = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Access-Challenges = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: FreeRADIUS-Total-Auth-Responses > = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Auth-Duplicate-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Auth-Malformed-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Auth-Invalid-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Auth-Dropped-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Auth-Unknown-Types = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Accounting-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Accounting-Responses = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Acct-Duplicate-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Acct-Malformed-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Acct-Invalid-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Acct-Dropped-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Acct-Unknown-Types = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Accepts = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Rejects = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Challenges = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Responses = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Accounting-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Accounting-Responses = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 > (10524) Fri Oct 30 21:32:30 2020: Debug: Finished request > (10524) Fri Oct 30 21:32:35 2020: Debug: Cleaning up request packet ID 111 > with timestamp +157913 > > > > On Fri, Oct 30, 2020 at 6:33 AM Durand fabrice via PacketFence-users < > packetfence-users@lists.sourceforge.net> wrote: > >> Hello Sonila, >> >> can you provide a raddebug ? >> >> raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000 >> >> Regards >> >> Fabrice >> >> >> Le 20-10-28 à 09 h 22, Sonali Gulia via PacketFence-users a écrit : >> >> Hi all in new version of pf 10.2.0 eap gtc sub module failed . While in >> previous version it was working fine do any one lnow any solution >> >> _______________________________________________ >> PacketFence-users mailing >> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users >> >> _______________________________________________ >> PacketFence-users mailing list >> PacketFence-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> > -- > Fabrice durandfdur...@inverse.ca :: +1.514.447.4918 (x135) :: www.inverse.ca > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence > (http://packetfence.org) > >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users