hi
Hi all in new version of pf 10.2.0 eap gtc sub module failed . While
in previous version it was working fine plz help
here is the result of raddebug -f /usr/local/pf/var/run/radiusd.sock
-t 3000'
i changed my personal details with
my_username
my_user_device_mac
my_switch_ip
my_server_ip
my_switch_mac
my_cluster_managment_ip
also highlight the error in logs .
(26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(26979) Mon Nov 2 15:39:12 2020: Debug: authenticate {
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Expiring EAP session
with state 0xddba5edfdca958cb
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Finished EAP session
with state 0xec639e88eb7087f4
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Previous EAP request
found for state 0xec639e88eb7087f4, released from the list
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent packet with
method EAP PEAP (25)
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Calling submodule
eap_peap to process data
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Continuing EAP-TLS
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: [eaptls verify] = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Done initial handshake
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: [eaptls process] = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Session
established. Decoding tunneled attributes
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: PEAP state phase2
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP method GTC (6)
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Got tunneled request
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message =
0x0213000f0642726561746853473240
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Setting User-Name
to my_username
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Sending tunneled
request to packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message =
0x0213000f0642726561746853473240
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
FreeRADIUS-Proxied-To = 127.0.0.1
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: User-Name =
"myusername"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: State =
0xddba5edfdca958cb96d4c517e9bc660c
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Service-Type =
Framed-User
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair =
"service-type=Framed"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair =
"audit-session-id=0A0115170000000D005BC4FA"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair =
"method=dot1x"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Framed-MTU = 1500
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Calling-Station-Id
:= "my_user_device_mac"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-IP-Address =
my_switch_ip
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port-Id =
"GigabitEthernet1/0/1"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port-Type =
Ethernet
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port = 50101
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
PacketFence-KeyBalanced := "99a990b22af7d7ca016a27643cd35a1e"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
PacketFence-Radius-Ip := "my_server_ip"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Called-Station-Id
:= "my_switch_mac"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Event-Timestamp =
"Nov 2 2020 15:39:12 IST"
(26979) Mon Nov 2 15:39:12 2020: Debug: Virtual server
packetfence-tunnel received request
(26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message =
0x0213000f0642726561746853473240
(26979) Mon Nov 2 15:39:12 2020: Debug: FreeRADIUS-Proxied-To = 127.0.0.1
(26979) Mon Nov 2 15:39:12 2020: Debug: User-Name = "myusername"
(26979) Mon Nov 2 15:39:12 2020: Debug: State =
0xddba5edfdca958cb96d4c517e9bc660c
(26979) Mon Nov 2 15:39:12 2020: Debug: Service-Type = Framed-User
(26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair =
"service-type=Framed"
(26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair =
"audit-session-id=0A0115170000000D005BC4FA"
(26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair = "method=dot1x"
(26979) Mon Nov 2 15:39:12 2020: Debug: Framed-MTU = 1500
(26979) Mon Nov 2 15:39:12 2020: Debug: Calling-Station-Id :=
"my_user_device_mac"
(26979) Mon Nov 2 15:39:12 2020: Debug: NAS-IP-Address = my_switch_ip
(26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port-Id =
"GigabitEthernet1/0/1"
(26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port-Type = Ethernet
(26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port = 50101
(26979) Mon Nov 2 15:39:12 2020: Debug: PacketFence-KeyBalanced :=
"99a990b22af7d7ca016a27643cd35a1e"
(26979) Mon Nov 2 15:39:12 2020: Debug: PacketFence-Radius-Ip :=
"my_server_ip"
(26979) Mon Nov 2 15:39:12 2020: Debug: Called-Station-Id :=
"my_switch_mac"
(26979) Mon Nov 2 15:39:12 2020: Debug: Event-Timestamp = "Nov 2
2020 15:39:12 IST"
(26979) Mon Nov 2 15:39:12 2020: Debug: server packetfence-tunnel {
(26979) Mon Nov 2 15:39:12 2020: Debug: session-state: No cached
attributes
(26979) Mon Nov 2 15:39:12 2020: Debug: # Executing section
authorize from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: authorize {
(26979) Mon Nov 2 15:39:12 2020: Debug: if ( outer.EAP-Type ==
TTLS) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if ( outer.EAP-Type ==
TTLS) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: policy
packetfence-set-realm-if-machine {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
packetfence-set-realm-if-machine = notfound
(26979) Mon Nov 2 15:39:12 2020: Debug: policy
packetfence-set-tenant-id {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address
|| NAS-IP-Address == "0.0.0.0"){
(26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address
|| NAS-IP-Address == "0.0.0.0") -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> 0
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(26979) Mon Nov 2 15:39:12 2020: Debug: update control {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{User-Name}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> my_username
(26979) Mon Nov 2 15:39:12 2020: Debug: SQL-User-Name set to 'myusername'
(26979) Mon Nov 2 15:39:12 2020: Debug: Executing select query:
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'my_switch_ip'), 0)
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'%{NAS-IP-Address}'), 0)}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> 1
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update control
= noop
(26979) Mon Nov 2 15:39:12 2020: Debug: } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
packetfence-set-tenant-id = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: policy filter_username {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) -> TRUE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ /
/) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ /
/) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/@[^@]*@/ ) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/@[^@]*@/ ) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/\.\./ ) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/\.\./ ) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if ((&User-Name =~
/@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if ((&User-Name =~
/@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/\.$/) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/\.$/) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/@\./) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/@\./) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: } # if (&User-Name)
= noop
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
filter_username = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: update {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND
%{outer.request:User-Name}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> anonymous
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: [mschap] = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: suffix: Checking for suffix
after "@"
(26979) Mon Nov 2 15:39:12 2020: Debug: suffix: No '@' in User-Name =
"myusername", skipping NULL due to config.
(26979) Mon Nov 2 15:39:12 2020: Debug: [suffix] = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Checking for prefix
before "\"
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: No '\' in User-Name
= "myusername", looking up realm NULL
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Found realm "null"
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Adding
Stripped-User-Name = "myusername"
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Adding Realm = "null"
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Authentication
realm is LOCAL
(26979) Mon Nov 2 15:39:12 2020: Debug: [ntdomain] = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: update control {
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update control = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent EAP Response
(code 2) ID 19 length 15
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: No EAP Start, assuming
it's an on-going EAP conversation
(26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = updated
(26979) Mon Nov 2 15:39:12 2020: Debug: policy
rewrite_called_station_id {
(26979) Mon Nov 2 15:39:12 2020: Debug: if
((&Called-Station-Id) && (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(26979) Mon Nov 2 15:39:12 2020: Debug: if
((&Called-Station-Id) && (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> TRUE
(26979) Mon Nov 2 15:39:12 2020: Debug: if
((&Called-Station-Id) && (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(26979) Mon Nov 2 15:39:12 2020: Debug: update request {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> my_switch_mac
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update request
= noop
(26979) Mon Nov 2 15:39:12 2020: Debug: if ("%{8}") {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{8}
(26979) Mon Nov 2 15:39:12 2020: Debug: -->
(26979) Mon Nov 2 15:39:12 2020: Debug: if ("%{8}") -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif (
(Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif (
(Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif
(Aruba-Essid-Name) {
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif
(Aruba-Essid-Name) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif (
(Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{Cisco-AVPair}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> service-type=Framed
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif (
(Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: [updated] = updated
(26979) Mon Nov 2 15:39:12 2020: Debug: } # if
((&Called-Station-Id) && (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
= updated
(26979) Mon Nov 2 15:39:12 2020: Debug: ... skipping else:
Preceding "if" was taken
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
rewrite_called_station_id = updated
(26979) Mon Nov 2 15:39:12 2020: Debug: [pap] = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: } # authorize = updated
(26979) Mon Nov 2 15:39:12 2020: WARNING: You set Proxy-To-Realm =
local, but it is a LOCAL realm! Cancelling proxy request.
(26979) Mon Nov 2 15:39:12 2020: Debug: Found Auth-Type = eap
(26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: authenticate {
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Expiring EAP session
with state 0xddba5edfdca958cb
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Finished EAP session
with state 0xddba5edfdca958cb
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Previous EAP request
found for state 0xddba5edfdca958cb, released from the list
_*(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent packet with
method EAP GTC (6)
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Calling submodule
eap_gtc to process data
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: # Executing group
from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: Auth-Type PAP {
(26979) Mon Nov 2 15:39:12 2020: Debug: pap: Login attempt with password
(26979) Mon Nov 2 15:39:12 2020: Debug: pap: No password configured
for the user. Cannot do authentication
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: [pap] = fail
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: } # Auth-Type PAP = fail
(26979) Mon Nov 2 15:39:12 2020: ERROR: eap: Failed continuing EAP
GTC (6) session. EAP sub-module failed
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Sending EAP Failure
(code 4) ID 19 length 4*_
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Failed in EAP select
(26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = invalid
(26979) Mon Nov 2 15:39:12 2020: Debug: } # authenticate = invalid
(26979) Mon Nov 2 15:39:12 2020: Debug: Failed to authenticate the user
(26979) Mon Nov 2 15:39:12 2020: Debug: Using Post-Auth-Type Reject
(26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: Post-Auth-Type REJECT {
(26979) Mon Nov 2 15:39:12 2020: Debug: policy
packetfence-set-tenant-id {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address
|| NAS-IP-Address == "0.0.0.0"){
(26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address
|| NAS-IP-Address == "0.0.0.0") -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> 1
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
packetfence-set-tenant-id = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: update {
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: policy
packetfence-audit-log-reject {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name &&
(&User-Name == "dummy")) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name &&
(&User-Name == "dummy")) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: else {
(26979) Mon Nov 2 15:39:12 2020: Debug: policy request-timing {
(26979) Mon Nov 2 15:39:12 2020: Debug: if
("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND
%{%{control:PacketFence-Request-Time}:-0}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> 0
(26979) Mon Nov 2 15:39:12 2020: Debug: if
("%{%{control:PacketFence-Request-Time}:-0}" != 0) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
request-timing = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND
type.reject.query
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: -->
type.reject.query
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: Using query
template 'query'
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND %{User-Name}
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: --> my_username
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: SQL-User-Name set
to 'myusername'
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND INSERT
INTO radius_audit_log ( mac, ip, computer_name,
user_name, stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type,
ssid, nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status,
reason, auth_type, eap_type, role, node_status,
profile, source, auto_reg, is_phone,
pf_domain, uuid, radius_request, radius_reply, request_time,
tenant_id, radius_ip) VALUES (
'%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
'%{%{control:PacketFence-Computer-Name}:-N/A}',
'%{request:User-Name}', '%{request:Stripped-User-Name}',
'%{request:Realm}', 'Radius-Access-Request',
'%{%{control:PacketFence-Switch-Id}:-N/A}',
'%{%{control:PacketFence-Switch-Mac}:-N/A}',
'%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
'%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
'%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}',
'%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
'%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
'%{%{control:PacketFence-Connection-Type}:-N/A}',
'%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Reject',
'%{request:Module-Failure-Message}', '%{control:Auth-Type}',
'%{request:EAP-Type}', '%{%{control:PacketFence-Role}:-N/A}',
'%{%{control:PacketFence-Status}:-N/A}',
'%{%{control:PacketFence-Profile}:-N/A}',
'%{%{control:PacketFence-Source}:-N/A}',
'%{%{control:PacketFence-AutoReg}:-0}',
'%{%{control:PacketFence-IsPhone}:-0}',
'%{request:PacketFence-Domain}', '',
'%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
'%{%{control:PacketFence-Request-Time}:-N/A}',
'%{control:PacketFence-Tenant-Id}', '%{request:PacketFence-Radius-Ip}')
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: --> INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id, switch_mac,
switch_ip_address, radius_source_ip_address, called_station_id,
calling_station_id, nas_port_type, ssid, nas_port_id,
ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason,
auth_type, eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain, uuid,
radius_request, radius_reply, request_time, tenant_id, radius_ip)
VALUES ( 'my_user_device_mac', '', 'N/A', 'myusername',
'myusername', 'null', 'Radius-Access-Request',
'N/A', 'N/A', 'N/A', 'my_cluster_managment_ip',
'my_switch_mac', 'my_user_device_mac', 'Ethernet', '',
'GigabitEthernet1/0/1', 'N/A', '50101', 'N/A',
'my_switch_ip', '', 'Reject', 'eap: Failed
continuing EAP GTC (6) session. EAP sub-module failed', 'eap', 'GTC',
'N/A', 'N/A', 'N/A', 'N/A', '0', '0',
'', '', 'EAP-Message =3D 0x0213000f0642726561746853473240,
FreeRADIUS-Proxied-To =3D 127.0.0.1, User-Name =3D =22myusername=22,
State =3D 0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D
Framed-User, Cisco-AVPair =3D =22service-type=3DFramed=22,
Cisco-AVPair =3D =22audit-session-id=3D0A0115170000000D005BC4FA=22,
Cisco-AVPair =3D =22method=3Ddot1x=22, Framed-MTU =3D 1500,
Calling-Station-Id =3D =22my_user_device_mac=22, NAS-IP-Address =3D
my_switch_ip, NAS-Port-Id =3D =22GigabitEthernet1/0/1=22,
NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101,
PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22,
PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D
=22Nov 2 2020 15:39:12 IST=22, PacketFence-Outer-User =3D
=22anonymous=22, Stripped-User-Name =3D =22myusername=22, Realm =3D
=22null=22, EAP-Type =3D GTC, Called-Station-Id =3D
=22my_switch_mac=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22,
Module-Failure-Message =3D =22eap: Failed continuing EAP GTC (6)
session. EAP sub-module failed=22, SQL-User-Name =3D
=22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator
=3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip')
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: Executing query:
INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id, switch_mac,
switch_ip_address, radius_source_ip_address, called_station_id,
calling_station_id, nas_port_type, ssid, nas_port_id,
ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason,
auth_type, eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain, uuid,
radius_request, radius_reply, request_time, tenant_id, radius_ip)
VALUES ( 'my_user_device_mac', '', 'N/A', 'myusername',
'myusername', 'null', 'Radius-Access-Request',
'N/A', 'N/A', 'N/A', 'my_cluster_managment_ip',
'my_switch_mac', 'my_user_device_mac', 'Ethernet', '',
'GigabitEthernet1/0/1', 'N/A', '50101', 'N/A',
'my_switch_ip', '', 'Reject', 'eap: Failed
continuing EAP GTC (6) session. EAP sub-module failed', 'eap', 'GTC',
'N/A', 'N/A', 'N/A', 'N/A', '0', '0',
'', '', 'EAP-Message =3D 0x0213000f0642726561746853473240,
FreeRADIUS-Proxied-To =3D 127.0.0.1, User-Name =3D =22myusername=22,
State =3D 0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D
Framed-User, Cisco-AVPair =3D =22service-type=3DFramed=22,
Cisco-AVPair =3D =22audit-session-id=3D0A0115170000000D005BC4FA=22,
Cisco-AVPair =3D =22method=3Ddot1x=22, Framed-MTU =3D 1500,
Calling-Station-Id =3D =22my_user_device_mac=22, NAS-IP-Address =3D
my_switch_ip, NAS-Port-Id =3D =22GigabitEthernet1/0/1=22,
NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101,
PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22,
PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D
=22Nov 2 2020 15:39:12 IST=22, PacketFence-Outer-User =3D
=22anonymous=22, Stripped-User-Name =3D =22myusername=22, Realm =3D
=22null=22, EAP-Type =3D GTC, Called-Station-Id =3D
=22my_switch_mac=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22,
Module-Failure-Message =3D =22eap: Failed continuing EAP GTC (6)
session. EAP sub-module failed=22, SQL-User-Name =3D
=22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator
=3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip')
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: SQL query
returned: success
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: 1 record(s) updated
(26979) Mon Nov 2 15:39:12 2020: Debug: [sql_reject] = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: } # else = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
packetfence-audit-log-reject = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: attr_filter.access_reject:
EXPAND %{User-Name}
(26979) Mon Nov 2 15:39:12 2020: Debug: attr_filter.access_reject:
--> my_username
(26979) Mon Nov 2 15:39:12 2020: Debug: attr_filter.access_reject:
Matched entry DEFAULT at line 11
(26979) Mon Nov 2 15:39:12 2020: Debug: [attr_filter.access_reject] =
updated
(26979) Mon Nov 2 15:39:12 2020: Debug: update
outer.session-state {
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update
outer.session-state = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: } # Post-Auth-Type REJECT
= updated
(26979) Mon Nov 2 15:39:12 2020: Debug: } # server packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: Virtual server sending reply
(26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message = 0x04130004
(26979) Mon Nov 2 15:39:12 2020: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Got tunneled reply
code 3
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message =
0x04130004
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
Message-Authenticator = 0x00000000000000000000000000000000
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Tunneled
authentication was rejected
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: FAILURE
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Sending EAP Request
(code 1) ID 20 length 46
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: EAP session adding
&reply:State = 0xec639e88e47787f4
(26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = handled
(26979) Mon Nov 2 15:39:12 2020: Debug: } # authenticate = handled
(26979) Mon Nov 2 15:39:12 2020: Debug: Using Post-Auth-Type Challenge
(26979) Mon Nov 2 15:39:12 2020: Debug: Post-Auth-Type sub-section
not found. Ignoring.
(26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(26979) Mon Nov 2 15:39:12 2020: Debug: session-state: Saving cached
attributes
(26979) Mon Nov 2 15:39:12 2020: Debug: TLS-Session-Cipher-Suite =
"ECDHE-RSA-AES256-GCM-SHA384"
(26979) Mon Nov 2 15:39:12 2020: Debug: TLS-Session-Version = "TLS 1.2"
(26979) Mon Nov 2 15:39:12 2020: Debug: Module-Failure-Message :=
"eap: Failed continuing EAP GTC (6) session. EAP sub-module failed"
(26979) Mon Nov 2 15:39:12 2020: Debug: Sent Access-Challenge Id 231
from my_server_ip:1812 to my_cluster_managment_ip:36588 length 0
(26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message =
0x0114002e190017030300233ccff76c8dee7ac196cf7561e1ebe6650116f48c3d155209928c145c148ad4ba578e7d
(26979) Mon Nov 2 15:39:12 2020: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(26979) Mon Nov 2 15:39:12 2020: Debug: State =
0xec639e88e47787f4b03ecf40bb262f03
(26979) Mon Nov 2 15:39:12 2020: Debug: Proxy-State = 0x313037
(26979) Mon Nov 2 15:39:12 2020: Debug: Finished request
On Fri, Oct 30, 2020 at 5:36 PM Fabrice Durand <fdur...@inverse.ca
<mailto:fdur...@inverse.ca>> wrote:
At least when you try to connect ...
Le 20-10-30 à 06 h 37, Sonali Gulia a écrit :
hi Durand fabrice
here is the result of raddebug -f
/usr/local/pf/var/run/radiusd.sock -t 3000
(10522) Fri Oct 30 21:32:00 2020: Debug: Received Status-Server
Id 97 from 127.0.0.1:51783 <http://127.0.0.1:51783> to
127.0.0.1:18121 <http://127.0.0.1:18121> length 50
(10522) Fri Oct 30 21:32:00 2020: Debug: Message-Authenticator =
0x595be7422b20bffc2fd6282691eb1b4e
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Statistics-Type = 15
(10522) Fri Oct 30 21:32:00 2020: Debug: # Executing group from
file /usr/local/pf/raddb/sites-enabled/status
(10522) Fri Oct 30 21:32:00 2020: Debug: Autz-Type Status-Server {
(10522) Fri Oct 30 21:32:00 2020: Debug: [ok] = ok
(10522) Fri Oct 30 21:32:00 2020: Debug: } # Autz-Type
Status-Server = ok
(10522) Fri Oct 30 21:32:00 2020: Debug: Sent Access-Accept Id 97
from 127.0.0.1:18121 <http://127.0.0.1:18121> to 127.0.0.1:51783
<http://127.0.0.1:51783> length 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Access-Requests = 10523
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Access-Accepts = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Access-Rejects = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Access-Challenges = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Responses = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(10522) Fri Oct 30 21:32:00 2020: Debug: Finished request
(10522) Fri Oct 30 21:32:05 2020: Debug: Cleaning up request
packet ID 97 with timestamp +157883
(10523) Fri Oct 30 21:32:15 2020: Debug: Received Status-Server
Id 71 from 127.0.0.1:43289 <http://127.0.0.1:43289> to
127.0.0.1:18121 <http://127.0.0.1:18121> length 50
(10523) Fri Oct 30 21:32:15 2020: Debug: Message-Authenticator =
0x2e1611a2cb839f02f01df0ab302f9062
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Statistics-Type = 15
(10523) Fri Oct 30 21:32:15 2020: Debug: # Executing group from
file /usr/local/pf/raddb/sites-enabled/status
(10523) Fri Oct 30 21:32:15 2020: Debug: Autz-Type Status-Server {
(10523) Fri Oct 30 21:32:15 2020: Debug: [ok] = ok
(10523) Fri Oct 30 21:32:15 2020: Debug: } # Autz-Type
Status-Server = ok
(10523) Fri Oct 30 21:32:15 2020: Debug: Sent Access-Accept Id 71
from 127.0.0.1:18121 <http://127.0.0.1:18121> to 127.0.0.1:43289
<http://127.0.0.1:43289> length 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Access-Requests = 10524
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Access-Accepts = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Access-Rejects = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Access-Challenges = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Responses = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(10523) Fri Oct 30 21:32:15 2020: Debug: Finished request
(10523) Fri Oct 30 21:32:20 2020: Debug: Cleaning up request
packet ID 71 with timestamp +157898
(10524) Fri Oct 30 21:32:30 2020: Debug: Received Status-Server
Id 111 from 127.0.0.1:38982 <http://127.0.0.1:38982> to
127.0.0.1:18121 <http://127.0.0.1:18121> length 50
(10524) Fri Oct 30 21:32:30 2020: Debug: Message-Authenticator =
0xbd1505f5fab60879f23b35b68b69b8a1
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Statistics-Type = 15
(10524) Fri Oct 30 21:32:30 2020: Debug: # Executing group from
file /usr/local/pf/raddb/sites-enabled/status
(10524) Fri Oct 30 21:32:30 2020: Debug: Autz-Type Status-Server {
(10524) Fri Oct 30 21:32:30 2020: Debug: [ok] = ok
(10524) Fri Oct 30 21:32:30 2020: Debug: } # Autz-Type
Status-Server = ok
(10524) Fri Oct 30 21:32:30 2020: Debug: Sent Access-Accept Id
111 from 127.0.0.1:18121 <http://127.0.0.1:18121> to
127.0.0.1:38982 <http://127.0.0.1:38982> length 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Access-Requests = 10525
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Access-Accepts = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Access-Rejects = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Access-Challenges = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Responses = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(10524) Fri Oct 30 21:32:30 2020: Debug: Finished request
(10524) Fri Oct 30 21:32:35 2020: Debug: Cleaning up request
packet ID 111 with timestamp +157913
On Fri, Oct 30, 2020 at 6:33 AM Durand fabrice via
PacketFence-users <packetfence-users@lists.sourceforge.net
<mailto:packetfence-users@lists.sourceforge.net>> wrote:
Hello Sonila,
can you provide a raddebug ?
raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000
Regards
Fabrice
Le 20-10-28 à 09 h 22, Sonali Gulia via PacketFence-users a
écrit :
Hi all in new version of pf 10.2.0 eap gtc sub module failed
. While in previous version it was working fine do any one
lnow any solution
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
<mailto:PacketFence-users@lists.sourceforge.net>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
<mailto:PacketFence-users@lists.sourceforge.net>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Fabrice Durand
fdur...@inverse.ca <mailto:fdur...@inverse.ca> :: +1.514.447.4918 (x135)
::www.inverse.ca <http://www.inverse.ca>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)