hi

Hi all in new version of pf 10.2.0 eap gtc sub module failed . While in
previous version it was working fine plz help

here is the result of raddebug -f /usr/local/pf/var/run/radiusd.sock -t
3000'

i changed my  personal details with
my_username
my_user_device_mac
my_switch_ip
my_server_ip
my_switch_mac
my_cluster_managment_ip

also highlight the error in logs .


(26979) Mon Nov  2 15:39:12 2020: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(26979) Mon Nov  2 15:39:12 2020: Debug:   authenticate {
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Expiring EAP session with
state 0xddba5edfdca958cb
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Finished EAP session with
state 0xec639e88eb7087f4
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Previous EAP request found
for state 0xec639e88eb7087f4, released from the list
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent packet with method
EAP PEAP (25)
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Calling submodule eap_peap to
process data
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Continuing EAP-TLS
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: [eaptls verify] = ok
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Done initial handshake
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: [eaptls process] = ok
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Session established.
Decoding tunneled attributes
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: PEAP state phase2
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: EAP method GTC (6)
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Got tunneled request
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   EAP-Message =
0x0213000f0642726561746853473240
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Setting User-Name to
my_username
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Sending tunneled request
to packetfence-tunnel
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   EAP-Message =
0x0213000f0642726561746853473240
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   FreeRADIUS-Proxied-To
= 127.0.0.1
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   User-Name =
"myusername"
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   State =
0xddba5edfdca958cb96d4c517e9bc660c
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Service-Type =
Framed-User
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Cisco-AVPair =
"service-type=Framed"
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Cisco-AVPair =
"audit-session-id=0A0115170000000D005BC4FA"
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Cisco-AVPair =
"method=dot1x"
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Framed-MTU = 1500
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Calling-Station-Id :=
"my_user_device_mac"
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   NAS-IP-Address =
my_switch_ip
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   NAS-Port-Id =
"GigabitEthernet1/0/1"
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   NAS-Port-Type =
Ethernet
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   NAS-Port = 50101
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:
PacketFence-KeyBalanced := "99a990b22af7d7ca016a27643cd35a1e"
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   PacketFence-Radius-Ip
:= "my_server_ip"
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Called-Station-Id :=
"my_switch_mac"
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Event-Timestamp = "Nov
 2 2020 15:39:12 IST"
(26979) Mon Nov  2 15:39:12 2020: Debug: Virtual server packetfence-tunnel
received request
(26979) Mon Nov  2 15:39:12 2020: Debug:   EAP-Message =
0x0213000f0642726561746853473240
(26979) Mon Nov  2 15:39:12 2020: Debug:   FreeRADIUS-Proxied-To = 127.0.0.1
(26979) Mon Nov  2 15:39:12 2020: Debug:   User-Name = "myusername"
(26979) Mon Nov  2 15:39:12 2020: Debug:   State =
0xddba5edfdca958cb96d4c517e9bc660c
(26979) Mon Nov  2 15:39:12 2020: Debug:   Service-Type = Framed-User
(26979) Mon Nov  2 15:39:12 2020: Debug:   Cisco-AVPair =
"service-type=Framed"
(26979) Mon Nov  2 15:39:12 2020: Debug:   Cisco-AVPair =
"audit-session-id=0A0115170000000D005BC4FA"
(26979) Mon Nov  2 15:39:12 2020: Debug:   Cisco-AVPair = "method=dot1x"
(26979) Mon Nov  2 15:39:12 2020: Debug:   Framed-MTU = 1500
(26979) Mon Nov  2 15:39:12 2020: Debug:   Calling-Station-Id :=
"my_user_device_mac"
(26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-IP-Address = my_switch_ip
(26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-Port-Id =
"GigabitEthernet1/0/1"
(26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-Port-Type = Ethernet
(26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-Port = 50101
(26979) Mon Nov  2 15:39:12 2020: Debug:   PacketFence-KeyBalanced :=
"99a990b22af7d7ca016a27643cd35a1e"
(26979) Mon Nov  2 15:39:12 2020: Debug:   PacketFence-Radius-Ip :=
"my_server_ip"
(26979) Mon Nov  2 15:39:12 2020: Debug:   Called-Station-Id :=
"my_switch_mac"
(26979) Mon Nov  2 15:39:12 2020: Debug:   Event-Timestamp = "Nov  2 2020
15:39:12 IST"
(26979) Mon Nov  2 15:39:12 2020: Debug: server packetfence-tunnel {
(26979) Mon Nov  2 15:39:12 2020: Debug:   session-state: No cached
attributes
(26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing section authorize
from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov  2 15:39:12 2020: Debug:     authorize {
(26979) Mon Nov  2 15:39:12 2020: Debug:       if ( outer.EAP-Type == TTLS)
{
(26979) Mon Nov  2 15:39:12 2020: Debug:       if ( outer.EAP-Type == TTLS)
 -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:       policy
packetfence-set-realm-if-machine {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i)  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
packetfence-set-realm-if-machine = notfound
(26979) Mon Nov  2 15:39:12 2020: Debug:       policy
packetfence-set-tenant-id {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(26979) Mon Nov  2 15:39:12 2020: Debug:         EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(26979) Mon Nov  2 15:39:12 2020: Debug:            --> 0
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
(26979) Mon Nov  2 15:39:12 2020: Debug:           update control {
(26979) Mon Nov  2 15:39:12 2020: Debug:             EXPAND %{User-Name}
(26979) Mon Nov  2 15:39:12 2020: Debug:                --> my_username
(26979) Mon Nov  2 15:39:12 2020: Debug:             SQL-User-Name set to
'myusername'
(26979) Mon Nov  2 15:39:12 2020: Debug:             Executing select
query:  SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'my_switch_ip'), 0)
(26979) Mon Nov  2 15:39:12 2020: Debug:             EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'%{NAS-IP-Address}'), 0)}
(26979) Mon Nov  2 15:39:12 2020: Debug:                --> 1
(26979) Mon Nov  2 15:39:12 2020: Debug:           } # update control = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:         } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (
&control:PacketFence-Tenant-Id == 0 ) {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (
&control:PacketFence-Tenant-Id == 0 )  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
packetfence-set-tenant-id = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       policy filter_username {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name) {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name)  -> TRUE
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name)  {
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ / /) {
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ / /)
 -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~
/@[^@]*@/ ) {
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~
/@[^@]*@/ )  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /\.\./
) {
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /\.\./
)  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           if ((&User-Name =~ /@/)
&& (&User-Name !~ /@(.+)\.(.+)$/))  {
(26979) Mon Nov  2 15:39:12 2020: Debug:           if ((&User-Name =~ /@/)
&& (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /\.$/)
 {
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /\.$/)
  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /@\./)
 {
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /@\./)
  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:         } # if (&User-Name)  = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy filter_username =
noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       update {
(26979) Mon Nov  2 15:39:12 2020: Debug:         EXPAND
%{outer.request:User-Name}
(26979) Mon Nov  2 15:39:12 2020: Debug:            --> anonymous
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # update = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       [mschap] = noop
(26979) Mon Nov  2 15:39:12 2020: Debug: suffix: Checking for suffix after
"@"
(26979) Mon Nov  2 15:39:12 2020: Debug: suffix: No '@' in User-Name =
"myusername", skipping NULL due to config.
(26979) Mon Nov  2 15:39:12 2020: Debug:       [suffix] = noop
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Checking for prefix
before "\"
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: No '\' in User-Name =
"myusername", looking up realm NULL
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Found realm "null"
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Adding
Stripped-User-Name = "myusername"
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Adding Realm = "null"
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Authentication realm is
LOCAL
(26979) Mon Nov  2 15:39:12 2020: Debug:       [ntdomain] = ok
(26979) Mon Nov  2 15:39:12 2020: Debug:       update control {
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # update control = noop
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent EAP Response (code
2) ID 19 length 15
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: No EAP Start, assuming it's
an on-going EAP conversation
(26979) Mon Nov  2 15:39:12 2020: Debug:       [eap] = updated
(26979) Mon Nov  2 15:39:12 2020: Debug:       policy
rewrite_called_station_id {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if ((&Called-Station-Id)
&& (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(26979) Mon Nov  2 15:39:12 2020: Debug:         if ((&Called-Station-Id)
&& (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
 -> TRUE
(26979) Mon Nov  2 15:39:12 2020: Debug:         if ((&Called-Station-Id)
&& (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
 {
(26979) Mon Nov  2 15:39:12 2020: Debug:           update request {
(26979) Mon Nov  2 15:39:12 2020: Debug:             EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(26979) Mon Nov  2 15:39:12 2020: Debug:                --> my_switch_mac
(26979) Mon Nov  2 15:39:12 2020: Debug:           } # update request = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:           if ("%{8}") {
(26979) Mon Nov  2 15:39:12 2020: Debug:           EXPAND %{8}
(26979) Mon Nov  2 15:39:12 2020: Debug:              -->
(26979) Mon Nov  2 15:39:12 2020: Debug:           if ("%{8}")  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           elsif (
(Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
(26979) Mon Nov  2 15:39:12 2020: Debug:           elsif (
(Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           elsif (Aruba-Essid-Name)
{
(26979) Mon Nov  2 15:39:12 2020: Debug:           elsif (Aruba-Essid-Name)
 -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           elsif ( (Cisco-AVPair)
 && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
(26979) Mon Nov  2 15:39:12 2020: Debug:           EXPAND %{Cisco-AVPair}
(26979) Mon Nov  2 15:39:12 2020: Debug:              -->
service-type=Framed
(26979) Mon Nov  2 15:39:12 2020: Debug:           elsif ( (Cisco-AVPair)
 && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           [updated] = updated
(26979) Mon Nov  2 15:39:12 2020: Debug:         } # if
((&Called-Station-Id) && (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
 = updated
(26979) Mon Nov  2 15:39:12 2020: Debug:         ... skipping else:
Preceding "if" was taken
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
rewrite_called_station_id = updated
(26979) Mon Nov  2 15:39:12 2020: Debug:       [pap] = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:     } # authorize = updated
(26979) Mon Nov  2 15:39:12 2020: WARNING:   You set Proxy-To-Realm =
local, but it is a LOCAL realm!  Cancelling proxy request.
(26979) Mon Nov  2 15:39:12 2020: Debug:   Found Auth-Type = eap
(26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov  2 15:39:12 2020: Debug:     authenticate {
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Expiring EAP session with
state 0xddba5edfdca958cb
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Finished EAP session with
state 0xddba5edfdca958cb
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Previous EAP request found
for state 0xddba5edfdca958cb, released from the list









*(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent packet with method
EAP GTC (6)(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Calling submodule
eap_gtc to process data(26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc: #
Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel(26979) Mon Nov  2
15:39:12 2020: Debug: eap_gtc:   Auth-Type PAP {(26979) Mon Nov  2 15:39:12
2020: Debug: pap: Login attempt with password(26979) Mon Nov  2 15:39:12
2020: Debug: pap: No password configured for the user.  Cannot do
authentication(26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc:     [pap] =
fail(26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc:   } # Auth-Type PAP =
fail(26979) Mon Nov  2 15:39:12 2020: ERROR: eap: Failed continuing EAP GTC
(6) session.  EAP sub-module failed(26979) Mon Nov  2 15:39:12 2020: Debug:
eap: Sending EAP Failure (code 4) ID 19 length 4*
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Failed in EAP select
(26979) Mon Nov  2 15:39:12 2020: Debug:       [eap] = invalid
(26979) Mon Nov  2 15:39:12 2020: Debug:     } # authenticate = invalid
(26979) Mon Nov  2 15:39:12 2020: Debug:   Failed to authenticate the user
(26979) Mon Nov  2 15:39:12 2020: Debug:   Using Post-Auth-Type Reject
(26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov  2 15:39:12 2020: Debug:     Post-Auth-Type REJECT {
(26979) Mon Nov  2 15:39:12 2020: Debug:       policy
packetfence-set-tenant-id {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(26979) Mon Nov  2 15:39:12 2020: Debug:         EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(26979) Mon Nov  2 15:39:12 2020: Debug:            --> 1
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (
&control:PacketFence-Tenant-Id == 0 ) {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (
&control:PacketFence-Tenant-Id == 0 )  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
packetfence-set-tenant-id = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       update {
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # update = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       policy
packetfence-audit-log-reject {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name &&
(&User-Name == "dummy")) {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name &&
(&User-Name == "dummy"))  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:         else {
(26979) Mon Nov  2 15:39:12 2020: Debug:           policy request-timing {
(26979) Mon Nov  2 15:39:12 2020: Debug:             if
("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
(26979) Mon Nov  2 15:39:12 2020: Debug:             EXPAND
%{%{control:PacketFence-Request-Time}:-0}
(26979) Mon Nov  2 15:39:12 2020: Debug:                --> 0
(26979) Mon Nov  2 15:39:12 2020: Debug:             if
("%{%{control:PacketFence-Request-Time}:-0}" != 0)  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           } # policy
request-timing = noop
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND
type.reject.query
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:    -->
type.reject.query
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: Using query template
'query'
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND %{User-Name}
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:    --> my_username
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: SQL-User-Name set to
'myusername'
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND INSERT INTO
radius_audit_log               ( mac, ip, computer_name, user_name,
       stripped_user_name,  realm, event_type,                switch_id,
switch_mac, switch_ip_address,                radius_source_ip_address,
called_station_id, calling_station_id,                nas_port_type, ssid,
nas_port_id,                ifindex, nas_port, connection_type,
   nas_ip_address, nas_identifier, auth_status,                reason,
auth_type, eap_type,                role, node_status, profile,
   source, auto_reg, is_phone,                pf_domain, uuid,
radius_request,                radius_reply, request_time, tenant_id,
radius_ip)              VALUES               (
'%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
'%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
           '%{request:Stripped-User-Name}', '%{request:Realm}',
'Radius-Access-Request',
 '%{%{control:PacketFence-Switch-Id}:-N/A}',
'%{%{control:PacketFence-Switch-Mac}:-N/A}',
'%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
 '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
'%{request:Calling-Station-Id}',                '%{request:NAS-Port-Type}',
'%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
 '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
'%{%{control:PacketFence-Connection-Type}:-N/A}',
 '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',  'Reject',
          '%{request:Module-Failure-Message}', '%{control:Auth-Type}',
'%{request:EAP-Type}',
 '%{%{control:PacketFence-Role}:-N/A}',
'%{%{control:PacketFence-Status}:-N/A}',
'%{%{control:PacketFence-Profile}:-N/A}',
 '%{%{control:PacketFence-Source}:-N/A}',
'%{%{control:PacketFence-AutoReg}:-0}',
'%{%{control:PacketFence-IsPhone}:-0}',
 '%{request:PacketFence-Domain}', '',
'%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
'%{%{control:PacketFence-Request-Time}:-N/A}',
'%{control:PacketFence-Tenant-Id}', '%{request:PacketFence-Radius-Ip}')
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:    --> INSERT INTO
radius_audit_log               ( mac, ip, computer_name, user_name,
       stripped_user_name,  realm, event_type,                switch_id,
switch_mac, switch_ip_address,                radius_source_ip_address,
called_station_id, calling_station_id,                nas_port_type, ssid,
nas_port_id,                ifindex, nas_port, connection_type,
   nas_ip_address, nas_identifier, auth_status,                reason,
auth_type, eap_type,                role, node_status, profile,
   source, auto_reg, is_phone,                pf_domain, uuid,
radius_request,                radius_reply, request_time, tenant_id,
radius_ip)              VALUES               ( 'my_user_device_mac', '',
'N/A', 'myusername',                'myusername', 'null',
'Radius-Access-Request',                'N/A', 'N/A', 'N/A',
 'my_cluster_managment_ip', 'my_switch_mac', 'my_user_device_mac',
       'Ethernet', '', 'GigabitEthernet1/0/1',                'N/A',
'50101', 'N/A',                'my_switch_ip', '',  'Reject',
  'eap: Failed continuing EAP GTC (6) session.  EAP sub-module failed',
'eap', 'GTC',                'N/A', 'N/A', 'N/A',                'N/A',
'0', '0',                '', '', 'EAP-Message =3D
0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D 127.0.0.1,
User-Name =3D =22myusername=22, State =3D
0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User,
Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D
=22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair =3D
=22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id =3D
=22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip, NAS-Port-Id =3D
=22GigabitEthernet1/0/1=22, NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101,
PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22,
PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D =22Nov  2
2020 15:39:12 IST=22, PacketFence-Outer-User =3D =22anonymous=22,
Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22, EAP-Type =3D
GTC, Called-Station-Id =3D =22my_switch_mac=22, User-Password =3D
=22=2A=2A=2A=2A=2A=2A=22, Module-Failure-Message =3D =22eap: Failed
continuing EAP GTC (6) session.  EAP sub-module failed=22, SQL-User-Name
=3D =22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator
=3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip')
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: Executing query:
INSERT INTO radius_audit_log               ( mac, ip, computer_name,
user_name,                stripped_user_name,  realm, event_type,
     switch_id, switch_mac, switch_ip_address,
 radius_source_ip_address, called_station_id, calling_station_id,
     nas_port_type, ssid, nas_port_id,                ifindex, nas_port,
connection_type,                nas_ip_address, nas_identifier,
auth_status,                reason, auth_type, eap_type,
 role, node_status, profile,                source, auto_reg, is_phone,
           pf_domain, uuid, radius_request,                radius_reply,
request_time, tenant_id, radius_ip)              VALUES               (
'my_user_device_mac', '', 'N/A', 'myusername',                'myusername',
'null', 'Radius-Access-Request',                'N/A', 'N/A', 'N/A',
         'my_cluster_managment_ip', 'my_switch_mac', 'my_user_device_mac',
               'Ethernet', '', 'GigabitEthernet1/0/1',
 'N/A', '50101', 'N/A',                'my_switch_ip', '',  'Reject',
          'eap: Failed continuing EAP GTC (6) session.  EAP sub-module
failed', 'eap', 'GTC',                'N/A', 'N/A', 'N/A',
 'N/A', '0', '0',                '', '', 'EAP-Message =3D
0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D 127.0.0.1,
User-Name =3D =22myusername=22, State =3D
0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User,
Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D
=22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair =3D
=22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id =3D
=22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip, NAS-Port-Id =3D
=22GigabitEthernet1/0/1=22, NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101,
PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22,
PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D =22Nov  2
2020 15:39:12 IST=22, PacketFence-Outer-User =3D =22anonymous=22,
Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22, EAP-Type =3D
GTC, Called-Station-Id =3D =22my_switch_mac=22, User-Password =3D
=22=2A=2A=2A=2A=2A=2A=22, Module-Failure-Message =3D =22eap: Failed
continuing EAP GTC (6) session.  EAP sub-module failed=22, SQL-User-Name
=3D =22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator
=3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip')
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: SQL query returned:
success
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: 1 record(s) updated
(26979) Mon Nov  2 15:39:12 2020: Debug:           [sql_reject] = ok
(26979) Mon Nov  2 15:39:12 2020: Debug:         } # else = ok
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
packetfence-audit-log-reject = ok
(26979) Mon Nov  2 15:39:12 2020: Debug: attr_filter.access_reject: EXPAND
%{User-Name}
(26979) Mon Nov  2 15:39:12 2020: Debug: attr_filter.access_reject:    -->
my_username
(26979) Mon Nov  2 15:39:12 2020: Debug: attr_filter.access_reject: Matched
entry DEFAULT at line 11
(26979) Mon Nov  2 15:39:12 2020: Debug:       [attr_filter.access_reject]
= updated
(26979) Mon Nov  2 15:39:12 2020: Debug:       update outer.session-state {
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # update
outer.session-state = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:     } # Post-Auth-Type REJECT =
updated
(26979) Mon Nov  2 15:39:12 2020: Debug: } # server packetfence-tunnel
(26979) Mon Nov  2 15:39:12 2020: Debug: Virtual server sending reply
(26979) Mon Nov  2 15:39:12 2020: Debug:   EAP-Message = 0x04130004
(26979) Mon Nov  2 15:39:12 2020: Debug:   Message-Authenticator =
0x00000000000000000000000000000000
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Got tunneled reply code 3
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   EAP-Message =
0x04130004
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Message-Authenticator
= 0x00000000000000000000000000000000
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Tunneled authentication
was rejected
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: FAILURE
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Sending EAP Request (code 1)
ID 20 length 46
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: EAP session adding
&reply:State = 0xec639e88e47787f4
(26979) Mon Nov  2 15:39:12 2020: Debug:     [eap] = handled
(26979) Mon Nov  2 15:39:12 2020: Debug:   } # authenticate = handled
(26979) Mon Nov  2 15:39:12 2020: Debug: Using Post-Auth-Type Challenge
(26979) Mon Nov  2 15:39:12 2020: Debug: Post-Auth-Type sub-section not
found.  Ignoring.
(26979) Mon Nov  2 15:39:12 2020: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(26979) Mon Nov  2 15:39:12 2020: Debug: session-state: Saving cached
attributes
(26979) Mon Nov  2 15:39:12 2020: Debug:   TLS-Session-Cipher-Suite =
"ECDHE-RSA-AES256-GCM-SHA384"
(26979) Mon Nov  2 15:39:12 2020: Debug:   TLS-Session-Version = "TLS 1.2"
(26979) Mon Nov  2 15:39:12 2020: Debug:   Module-Failure-Message := "eap:
Failed continuing EAP GTC (6) session.  EAP sub-module failed"
(26979) Mon Nov  2 15:39:12 2020: Debug: Sent Access-Challenge Id 231 from
my_server_ip:1812 to my_cluster_managment_ip:36588 length 0
(26979) Mon Nov  2 15:39:12 2020: Debug:   EAP-Message =
0x0114002e190017030300233ccff76c8dee7ac196cf7561e1ebe6650116f48c3d155209928c145c148ad4ba578e7d
(26979) Mon Nov  2 15:39:12 2020: Debug:   Message-Authenticator =
0x00000000000000000000000000000000
(26979) Mon Nov  2 15:39:12 2020: Debug:   State =
0xec639e88e47787f4b03ecf40bb262f03
(26979) Mon Nov  2 15:39:12 2020: Debug:   Proxy-State = 0x313037
(26979) Mon Nov  2 15:39:12 2020: Debug: Finished request

On Fri, Oct 30, 2020 at 5:36 PM Fabrice Durand <fdur...@inverse.ca> wrote:

> At least when you try to connect ...
>
>
> Le 20-10-30 à 06 h 37, Sonali Gulia a écrit :
>
> hi Durand fabrice
>
> here is the result of raddebug -f /usr/local/pf/var/run/radiusd.sock -t
> 3000
>
> (10522) Fri Oct 30 21:32:00 2020: Debug: Received Status-Server Id 97 from
> 127.0.0.1:51783 to 127.0.0.1:18121 length 50
> (10522) Fri Oct 30 21:32:00 2020: Debug:   Message-Authenticator =
> 0x595be7422b20bffc2fd6282691eb1b4e
> (10522) Fri Oct 30 21:32:00 2020: Debug:   FreeRADIUS-Statistics-Type = 15
> (10522) Fri Oct 30 21:32:00 2020: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/status
> (10522) Fri Oct 30 21:32:00 2020: Debug:   Autz-Type Status-Server {
> (10522) Fri Oct 30 21:32:00 2020: Debug:     [ok] = ok
> (10522) Fri Oct 30 21:32:00 2020: Debug:   } # Autz-Type Status-Server = ok
> (10522) Fri Oct 30 21:32:00 2020: Debug: Sent Access-Accept Id 97 from
> 127.0.0.1:18121 to 127.0.0.1:51783 length 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Access-Requests = 10523
> (10522) Fri Oct 30 21:32:00 2020: Debug:   FreeRADIUS-Total-Access-Accepts
> = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:   FreeRADIUS-Total-Access-Rejects
> = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Access-Challenges = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:   FreeRADIUS-Total-Auth-Responses
> = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Auth-Duplicate-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Auth-Malformed-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Auth-Invalid-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Auth-Dropped-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Auth-Unknown-Types = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Accounting-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Accounting-Responses = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Acct-Duplicate-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Acct-Malformed-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Acct-Invalid-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Acct-Dropped-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Acct-Unknown-Types = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Accepts = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Rejects = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Challenges = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Responses = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Responses = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
> (10522) Fri Oct 30 21:32:00 2020: Debug: Finished request
> (10522) Fri Oct 30 21:32:05 2020: Debug: Cleaning up request packet ID 97
> with timestamp +157883
> (10523) Fri Oct 30 21:32:15 2020: Debug: Received Status-Server Id 71 from
> 127.0.0.1:43289 to 127.0.0.1:18121 length 50
> (10523) Fri Oct 30 21:32:15 2020: Debug:   Message-Authenticator =
> 0x2e1611a2cb839f02f01df0ab302f9062
> (10523) Fri Oct 30 21:32:15 2020: Debug:   FreeRADIUS-Statistics-Type = 15
> (10523) Fri Oct 30 21:32:15 2020: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/status
> (10523) Fri Oct 30 21:32:15 2020: Debug:   Autz-Type Status-Server {
> (10523) Fri Oct 30 21:32:15 2020: Debug:     [ok] = ok
> (10523) Fri Oct 30 21:32:15 2020: Debug:   } # Autz-Type Status-Server = ok
> (10523) Fri Oct 30 21:32:15 2020: Debug: Sent Access-Accept Id 71 from
> 127.0.0.1:18121 to 127.0.0.1:43289 length 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Access-Requests = 10524
> (10523) Fri Oct 30 21:32:15 2020: Debug:   FreeRADIUS-Total-Access-Accepts
> = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:   FreeRADIUS-Total-Access-Rejects
> = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Access-Challenges = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:   FreeRADIUS-Total-Auth-Responses
> = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Auth-Duplicate-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Auth-Malformed-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Auth-Invalid-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Auth-Dropped-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Auth-Unknown-Types = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Accounting-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Accounting-Responses = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Acct-Duplicate-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Acct-Malformed-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Acct-Invalid-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Acct-Dropped-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Acct-Unknown-Types = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Accepts = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Rejects = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Challenges = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Responses = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Responses = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
> (10523) Fri Oct 30 21:32:15 2020: Debug: Finished request
> (10523) Fri Oct 30 21:32:20 2020: Debug: Cleaning up request packet ID 71
> with timestamp +157898
> (10524) Fri Oct 30 21:32:30 2020: Debug: Received Status-Server Id 111
> from 127.0.0.1:38982 to 127.0.0.1:18121 length 50
> (10524) Fri Oct 30 21:32:30 2020: Debug:   Message-Authenticator =
> 0xbd1505f5fab60879f23b35b68b69b8a1
> (10524) Fri Oct 30 21:32:30 2020: Debug:   FreeRADIUS-Statistics-Type = 15
> (10524) Fri Oct 30 21:32:30 2020: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/status
> (10524) Fri Oct 30 21:32:30 2020: Debug:   Autz-Type Status-Server {
> (10524) Fri Oct 30 21:32:30 2020: Debug:     [ok] = ok
> (10524) Fri Oct 30 21:32:30 2020: Debug:   } # Autz-Type Status-Server = ok
> (10524) Fri Oct 30 21:32:30 2020: Debug: Sent Access-Accept Id 111 from
> 127.0.0.1:18121 to 127.0.0.1:38982 length 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Access-Requests = 10525
> (10524) Fri Oct 30 21:32:30 2020: Debug:   FreeRADIUS-Total-Access-Accepts
> = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:   FreeRADIUS-Total-Access-Rejects
> = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Access-Challenges = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:   FreeRADIUS-Total-Auth-Responses
> = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Auth-Duplicate-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Auth-Malformed-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Auth-Invalid-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Auth-Dropped-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Auth-Unknown-Types = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Accounting-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Accounting-Responses = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Acct-Duplicate-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Acct-Malformed-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Acct-Invalid-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Acct-Dropped-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Acct-Unknown-Types = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Accepts = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Rejects = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Access-Challenges = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Responses = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Accounting-Responses = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug:
> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
> (10524) Fri Oct 30 21:32:30 2020: Debug: Finished request
> (10524) Fri Oct 30 21:32:35 2020: Debug: Cleaning up request packet ID 111
> with timestamp +157913
>
>
>
> On Fri, Oct 30, 2020 at 6:33 AM Durand fabrice via PacketFence-users <
> packetfence-users@lists.sourceforge.net> wrote:
>
>> Hello Sonila,
>>
>> can you provide a raddebug ?
>>
>> raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000
>>
>> Regards
>>
>> Fabrice
>>
>>
>> Le 20-10-28 à 09 h 22, Sonali Gulia via PacketFence-users a écrit :
>>
>> Hi all in new version of pf 10.2.0 eap gtc sub module failed . While in
>> previous version it was working fine do any one lnow any solution
>>
>> _______________________________________________
>> PacketFence-users mailing 
>> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>> _______________________________________________
>> PacketFence-users mailing list
>> PacketFence-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
> --
> Fabrice durandfdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
>
>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to