Hello Sonali,

your issue looks to be because there is no module before that set the "known good" password in the request.

Where is stored the password ? (ldap/sql/...)

Regards

Fabrice


Le 20-11-02 à 22 h 46, Sonali Gulia a écrit :


hi

Hi all in new version of pf 10.2.0 eap gtc sub module failed . While in previous version it was working fine plz help

here is the result of raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000'

i changed my  personal details with
my_username
my_user_device_mac
my_switch_ip
my_server_ip
my_switch_mac
my_cluster_managment_ip

also highlight the error in logs .


(26979) Mon Nov  2 15:39:12 2020: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
(26979) Mon Nov  2 15:39:12 2020: Debug:   authenticate {
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Expiring EAP session with state 0xddba5edfdca958cb (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Finished EAP session with state 0xec639e88eb7087f4 (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Previous EAP request found for state 0xec639e88eb7087f4, released from the list (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent packet with method EAP PEAP (25) (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Calling submodule eap_peap to process data
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Continuing EAP-TLS
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: [eaptls verify] = ok
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Done initial handshake
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: [eaptls process] = ok
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Session established.  Decoding tunneled attributes
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: PEAP state phase2
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: EAP method GTC (6)
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Got tunneled request
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: EAP-Message = 0x0213000f0642726561746853473240 (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Setting User-Name to my_username (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Sending tunneled request to packetfence-tunnel (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: EAP-Message = 0x0213000f0642726561746853473240 (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1 (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: User-Name = "myusername" (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   State = 0xddba5edfdca958cb96d4c517e9bc660c (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Service-Type = Framed-User (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair = "service-type=Framed" (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair = "audit-session-id=0A0115170000000D005BC4FA" (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair = "method=dot1x"
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Framed-MTU = 1500
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Calling-Station-Id := "my_user_device_mac" (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: NAS-IP-Address = my_switch_ip (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: NAS-Port-Id = "GigabitEthernet1/0/1" (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: NAS-Port-Type = Ethernet
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: NAS-Port = 50101
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: PacketFence-KeyBalanced := "99a990b22af7d7ca016a27643cd35a1e" (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: PacketFence-Radius-Ip := "my_server_ip" (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Called-Station-Id := "my_switch_mac" (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Event-Timestamp = "Nov  2 2020 15:39:12 IST" (26979) Mon Nov  2 15:39:12 2020: Debug: Virtual server packetfence-tunnel received request (26979) Mon Nov  2 15:39:12 2020: Debug:   EAP-Message = 0x0213000f0642726561746853473240
(26979) Mon Nov  2 15:39:12 2020: Debug: FreeRADIUS-Proxied-To = 127.0.0.1
(26979) Mon Nov  2 15:39:12 2020: Debug:   User-Name = "myusername"
(26979) Mon Nov  2 15:39:12 2020: Debug:   State = 0xddba5edfdca958cb96d4c517e9bc660c
(26979) Mon Nov  2 15:39:12 2020: Debug:   Service-Type = Framed-User
(26979) Mon Nov  2 15:39:12 2020: Debug:   Cisco-AVPair = "service-type=Framed" (26979) Mon Nov  2 15:39:12 2020: Debug:   Cisco-AVPair = "audit-session-id=0A0115170000000D005BC4FA"
(26979) Mon Nov  2 15:39:12 2020: Debug:   Cisco-AVPair = "method=dot1x"
(26979) Mon Nov  2 15:39:12 2020: Debug:   Framed-MTU = 1500
(26979) Mon Nov  2 15:39:12 2020: Debug: Calling-Station-Id := "my_user_device_mac"
(26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-IP-Address = my_switch_ip
(26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-Port-Id = "GigabitEthernet1/0/1"
(26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-Port-Type = Ethernet
(26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-Port = 50101
(26979) Mon Nov  2 15:39:12 2020: Debug: PacketFence-KeyBalanced := "99a990b22af7d7ca016a27643cd35a1e" (26979) Mon Nov  2 15:39:12 2020: Debug: PacketFence-Radius-Ip := "my_server_ip" (26979) Mon Nov  2 15:39:12 2020: Debug: Called-Station-Id := "my_switch_mac" (26979) Mon Nov  2 15:39:12 2020: Debug:   Event-Timestamp = "Nov  2 2020 15:39:12 IST"
(26979) Mon Nov  2 15:39:12 2020: Debug: server packetfence-tunnel {
(26979) Mon Nov  2 15:39:12 2020: Debug:   session-state: No cached attributes (26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov  2 15:39:12 2020: Debug:     authorize {
(26979) Mon Nov  2 15:39:12 2020: Debug:       if ( outer.EAP-Type == TTLS) { (26979) Mon Nov  2 15:39:12 2020: Debug:       if ( outer.EAP-Type == TTLS)  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:       policy packetfence-set-realm-if-machine { (26979) Mon Nov  2 15:39:12 2020: Debug:         if (User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i) { (26979) Mon Nov  2 15:39:12 2020: Debug:         if (User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i)  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy packetfence-set-realm-if-machine = notfound (26979) Mon Nov  2 15:39:12 2020: Debug:       policy packetfence-set-tenant-id { (26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){ (26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:         if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { (26979) Mon Nov  2 15:39:12 2020: Debug:         EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
(26979) Mon Nov  2 15:39:12 2020: Debug:            --> 0
(26979) Mon Nov  2 15:39:12 2020: Debug:         if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE (26979) Mon Nov  2 15:39:12 2020: Debug:         if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
(26979) Mon Nov  2 15:39:12 2020: Debug:           update control {
(26979) Mon Nov  2 15:39:12 2020: Debug: EXPAND %{User-Name}
(26979) Mon Nov  2 15:39:12 2020: Debug:  --> my_username
(26979) Mon Nov  2 15:39:12 2020: Debug: SQL-User-Name set to 'myusername'
(26979) Mon Nov  2 15:39:12 2020: Debug: Executing select query:  SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = 'my_switch_ip'), 0) (26979) Mon Nov  2 15:39:12 2020: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{NAS-IP-Address}'), 0)}
(26979) Mon Nov  2 15:39:12 2020: Debug:  --> 1
(26979) Mon Nov  2 15:39:12 2020: Debug:           } # update control = noop (26979) Mon Nov  2 15:39:12 2020: Debug:         } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop (26979) Mon Nov  2 15:39:12 2020: Debug:         if ( &control:PacketFence-Tenant-Id == 0 ) { (26979) Mon Nov  2 15:39:12 2020: Debug:         if ( &control:PacketFence-Tenant-Id == 0 )  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy packetfence-set-tenant-id = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       policy filter_username {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name) {
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name)  -> TRUE
(26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name)  {
(26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ / /) { (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ / /)  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /@[^@]*@/ ) { (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /@[^@]*@/ )  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /\.\./ ) { (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /\.\./ )  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:           if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  { (26979) Mon Nov  2 15:39:12 2020: Debug:           if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /\.$/)  { (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /\.$/)   -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /@\./)  { (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ /@\./)   -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:         } # if (&User-Name)  = noop (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy filter_username = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       update {
(26979) Mon Nov  2 15:39:12 2020: Debug:         EXPAND %{outer.request:User-Name}
(26979) Mon Nov  2 15:39:12 2020: Debug:            --> anonymous
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # update = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       [mschap] = noop
(26979) Mon Nov  2 15:39:12 2020: Debug: suffix: Checking for suffix after "@" (26979) Mon Nov  2 15:39:12 2020: Debug: suffix: No '@' in User-Name = "myusername", skipping NULL due to config.
(26979) Mon Nov  2 15:39:12 2020: Debug:       [suffix] = noop
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Checking for prefix before "\" (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: No '\' in User-Name = "myusername", looking up realm NULL
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Found realm "null"
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Adding Stripped-User-Name = "myusername"
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Adding Realm = "null"
(26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Authentication realm is LOCAL
(26979) Mon Nov  2 15:39:12 2020: Debug:       [ntdomain] = ok
(26979) Mon Nov  2 15:39:12 2020: Debug:       update control {
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # update control = noop
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent EAP Response (code 2) ID 19 length 15 (26979) Mon Nov  2 15:39:12 2020: Debug: eap: No EAP Start, assuming it's an on-going EAP conversation
(26979) Mon Nov  2 15:39:12 2020: Debug:       [eap] = updated
(26979) Mon Nov  2 15:39:12 2020: Debug:       policy rewrite_called_station_id { (26979) Mon Nov  2 15:39:12 2020: Debug:         if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) { (26979) Mon Nov  2 15:39:12 2020: Debug:         if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))  -> TRUE (26979) Mon Nov  2 15:39:12 2020: Debug:         if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))  {
(26979) Mon Nov  2 15:39:12 2020: Debug:           update request {
(26979) Mon Nov  2 15:39:12 2020: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(26979) Mon Nov  2 15:39:12 2020: Debug:  --> my_switch_mac
(26979) Mon Nov  2 15:39:12 2020: Debug:           } # update request = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:           if ("%{8}") {
(26979) Mon Nov  2 15:39:12 2020: Debug:           EXPAND %{8}
(26979) Mon Nov  2 15:39:12 2020: Debug:  -->
(26979) Mon Nov  2 15:39:12 2020: Debug:           if ("%{8}")  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:           elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) { (26979) Mon Nov  2 15:39:12 2020: Debug:           elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:           elsif (Aruba-Essid-Name) { (26979) Mon Nov  2 15:39:12 2020: Debug:           elsif (Aruba-Essid-Name)  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:           elsif ( (Cisco-AVPair)  && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
(26979) Mon Nov  2 15:39:12 2020: Debug:           EXPAND %{Cisco-AVPair}
(26979) Mon Nov  2 15:39:12 2020: Debug:  --> service-type=Framed
(26979) Mon Nov  2 15:39:12 2020: Debug:           elsif ( (Cisco-AVPair)  && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug: [updated] = updated
(26979) Mon Nov  2 15:39:12 2020: Debug:         } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))  = updated (26979) Mon Nov  2 15:39:12 2020: Debug:         ... skipping else: Preceding "if" was taken (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy rewrite_called_station_id = updated
(26979) Mon Nov  2 15:39:12 2020: Debug:       [pap] = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:     } # authorize = updated
(26979) Mon Nov  2 15:39:12 2020: WARNING:   You set Proxy-To-Realm = local, but it is a LOCAL realm! Cancelling proxy request.
(26979) Mon Nov  2 15:39:12 2020: Debug:   Found Auth-Type = eap
(26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov  2 15:39:12 2020: Debug:     authenticate {
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Expiring EAP session with state 0xddba5edfdca958cb (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Finished EAP session with state 0xddba5edfdca958cb (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Previous EAP request found for state 0xddba5edfdca958cb, released from the list _*(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent packet with method EAP GTC (6) (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Calling submodule eap_gtc to process data (26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc: Auth-Type PAP {
(26979) Mon Nov  2 15:39:12 2020: Debug: pap: Login attempt with password
(26979) Mon Nov  2 15:39:12 2020: Debug: pap: No password configured for the user.  Cannot do authentication
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc:   [pap] = fail
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc: } # Auth-Type PAP = fail
(26979) Mon Nov  2 15:39:12 2020: ERROR: eap: Failed continuing EAP GTC (6) session.  EAP sub-module failed (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Sending EAP Failure (code 4) ID 19 length 4*_
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Failed in EAP select
(26979) Mon Nov  2 15:39:12 2020: Debug:       [eap] = invalid
(26979) Mon Nov  2 15:39:12 2020: Debug:     } # authenticate = invalid
(26979) Mon Nov  2 15:39:12 2020: Debug:   Failed to authenticate the user
(26979) Mon Nov  2 15:39:12 2020: Debug:   Using Post-Auth-Type Reject
(26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov  2 15:39:12 2020: Debug: Post-Auth-Type REJECT {
(26979) Mon Nov  2 15:39:12 2020: Debug:       policy packetfence-set-tenant-id { (26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){ (26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:         if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { (26979) Mon Nov  2 15:39:12 2020: Debug:         EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
(26979) Mon Nov  2 15:39:12 2020: Debug:            --> 1
(26979) Mon Nov  2 15:39:12 2020: Debug:         if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:         if ( &control:PacketFence-Tenant-Id == 0 ) { (26979) Mon Nov  2 15:39:12 2020: Debug:         if ( &control:PacketFence-Tenant-Id == 0 )  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy packetfence-set-tenant-id = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       update {
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # update = noop
(26979) Mon Nov  2 15:39:12 2020: Debug:       policy packetfence-audit-log-reject { (26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name && (&User-Name == "dummy")) { (26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name && (&User-Name == "dummy"))  -> FALSE
(26979) Mon Nov  2 15:39:12 2020: Debug:         else {
(26979) Mon Nov  2 15:39:12 2020: Debug:           policy request-timing {
(26979) Mon Nov  2 15:39:12 2020: Debug:             if ("%{%{control:PacketFence-Request-Time}:-0}" != 0) { (26979) Mon Nov  2 15:39:12 2020: Debug: EXPAND %{%{control:PacketFence-Request-Time}:-0}
(26979) Mon Nov  2 15:39:12 2020: Debug:  --> 0
(26979) Mon Nov  2 15:39:12 2020: Debug:             if ("%{%{control:PacketFence-Request-Time}:-0}" != 0)  -> FALSE (26979) Mon Nov  2 15:39:12 2020: Debug:           } # policy request-timing = noop (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND type.reject.query (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:  --> type.reject.query (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: Using query template 'query'
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND %{User-Name}
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:  --> my_username
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: SQL-User-Name set to 'myusername' (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND INSERT INTO radius_audit_log               ( mac, ip, computer_name, user_name,  stripped_user_name,  realm, event_type,  switch_id, switch_mac, switch_ip_address,  radius_source_ip_address, called_station_id, calling_station_id,                nas_port_type, ssid, nas_port_id,                ifindex, nas_port, connection_type,                nas_ip_address, nas_identifier, auth_status,                reason, auth_type, eap_type,                role, node_status, profile,                source, auto_reg, is_phone,          pf_domain, uuid, radius_request,  radius_reply, request_time, tenant_id, radius_ip)      VALUES               ( '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}', '%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',  '%{request:Stripped-User-Name}', '%{request:Realm}', 'Radius-Access-Request',  '%{%{control:PacketFence-Switch-Id}:-N/A}', '%{%{control:PacketFence-Switch-Mac}:-N/A}', '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',          '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}', '%{request:Calling-Station-Id}',  '%{request:NAS-Port-Type}', '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',  '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}', '%{%{control:PacketFence-Connection-Type}:-N/A}',        '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',  'Reject', '%{request:Module-Failure-Message}', '%{control:Auth-Type}', '%{request:EAP-Type}',    '%{%{control:PacketFence-Role}:-N/A}', '%{%{control:PacketFence-Status}:-N/A}', '%{%{control:PacketFence-Profile}:-N/A}',  '%{%{control:PacketFence-Source}:-N/A}', '%{%{control:PacketFence-AutoReg}:-0}', '%{%{control:PacketFence-IsPhone}:-0}',  '%{request:PacketFence-Domain}', '', '%{pairs:&request:[*]}','%{pairs:&reply:[*]}', '%{%{control:PacketFence-Request-Time}:-N/A}', '%{control:PacketFence-Tenant-Id}', '%{request:PacketFence-Radius-Ip}') (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:  --> INSERT INTO radius_audit_log               ( mac, ip, computer_name, user_name,  stripped_user_name,  realm, event_type,  switch_id, switch_mac, switch_ip_address,  radius_source_ip_address, called_station_id, calling_station_id,                nas_port_type, ssid, nas_port_id,                ifindex, nas_port, connection_type,                nas_ip_address, nas_identifier, auth_status,                reason, auth_type, eap_type,                role, node_status, profile,                source, auto_reg, is_phone,          pf_domain, uuid, radius_request,  radius_reply, request_time, tenant_id, radius_ip)      VALUES               ( 'my_user_device_mac', '', 'N/A', 'myusername',                'myusername', 'null', 'Radius-Access-Request',                'N/A', 'N/A', 'N/A',                'my_cluster_managment_ip', 'my_switch_mac', 'my_user_device_mac',  'Ethernet', '', 'GigabitEthernet1/0/1',  'N/A', '50101', 'N/A',                'my_switch_ip', '',  'Reject',                 'eap: Failed continuing EAP GTC (6) session.  EAP sub-module failed', 'eap', 'GTC',          'N/A', 'N/A', 'N/A',                'N/A', '0', '0',                '', '', 'EAP-Message =3D 0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D 127.0.0.1, User-Name =3D =22myusername=22, State =3D 0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User, Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D =22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair =3D =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id =3D =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip, NAS-Port-Id =3D =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101, PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22, PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D =22Nov  2 2020 15:39:12 IST=22, PacketFence-Outer-User =3D =22anonymous=22, Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22, EAP-Type =3D GTC, Called-Station-Id =3D =22my_switch_mac=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22, Module-Failure-Message =3D =22eap: Failed continuing EAP GTC (6) session.  EAP sub-module failed=22, SQL-User-Name =3D =22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator =3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip') (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: Executing query: INSERT INTO radius_audit_log   ( mac, ip, computer_name, user_name,  stripped_user_name,  realm, event_type,  switch_id, switch_mac, switch_ip_address,  radius_source_ip_address, called_station_id, calling_station_id,                nas_port_type, ssid, nas_port_id,                ifindex, nas_port, connection_type,                nas_ip_address, nas_identifier, auth_status,                reason, auth_type, eap_type,                role, node_status, profile,                source, auto_reg, is_phone,          pf_domain, uuid, radius_request,  radius_reply, request_time, tenant_id, radius_ip)      VALUES               ( 'my_user_device_mac', '', 'N/A', 'myusername',                'myusername', 'null', 'Radius-Access-Request',                'N/A', 'N/A', 'N/A',                'my_cluster_managment_ip', 'my_switch_mac', 'my_user_device_mac',  'Ethernet', '', 'GigabitEthernet1/0/1',  'N/A', '50101', 'N/A',                'my_switch_ip', '',  'Reject',                 'eap: Failed continuing EAP GTC (6) session.  EAP sub-module failed', 'eap', 'GTC',          'N/A', 'N/A', 'N/A',                'N/A', '0', '0',                '', '', 'EAP-Message =3D 0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D 127.0.0.1, User-Name =3D =22myusername=22, State =3D 0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User, Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D =22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair =3D =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id =3D =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip, NAS-Port-Id =3D =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101, PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22, PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D =22Nov  2 2020 15:39:12 IST=22, PacketFence-Outer-User =3D =22anonymous=22, Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22, EAP-Type =3D GTC, Called-Station-Id =3D =22my_switch_mac=22, User-Password =3D =22=2A=2A=2A=2A=2A=2A=22, Module-Failure-Message =3D =22eap: Failed continuing EAP GTC (6) session.  EAP sub-module failed=22, SQL-User-Name =3D =22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator =3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip') (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: SQL query returned: success
(26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: 1 record(s) updated
(26979) Mon Nov  2 15:39:12 2020: Debug: [sql_reject] = ok
(26979) Mon Nov  2 15:39:12 2020: Debug:         } # else = ok
(26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy packetfence-audit-log-reject = ok (26979) Mon Nov  2 15:39:12 2020: Debug: attr_filter.access_reject: EXPAND %{User-Name} (26979) Mon Nov  2 15:39:12 2020: Debug: attr_filter.access_reject:    --> my_username (26979) Mon Nov  2 15:39:12 2020: Debug: attr_filter.access_reject: Matched entry DEFAULT at line 11 (26979) Mon Nov  2 15:39:12 2020: Debug: [attr_filter.access_reject] = updated (26979) Mon Nov  2 15:39:12 2020: Debug:       update outer.session-state { (26979) Mon Nov  2 15:39:12 2020: Debug:       } # update outer.session-state = noop (26979) Mon Nov  2 15:39:12 2020: Debug:     } # Post-Auth-Type REJECT = updated
(26979) Mon Nov  2 15:39:12 2020: Debug: } # server packetfence-tunnel
(26979) Mon Nov  2 15:39:12 2020: Debug: Virtual server sending reply
(26979) Mon Nov  2 15:39:12 2020: Debug:   EAP-Message = 0x04130004
(26979) Mon Nov  2 15:39:12 2020: Debug: Message-Authenticator = 0x00000000000000000000000000000000 (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Got tunneled reply code 3 (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: EAP-Message = 0x04130004 (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Tunneled authentication was rejected
(26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: FAILURE
(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Sending EAP Request (code 1) ID 20 length 46 (26979) Mon Nov  2 15:39:12 2020: Debug: eap: EAP session adding &reply:State = 0xec639e88e47787f4
(26979) Mon Nov  2 15:39:12 2020: Debug:     [eap] = handled
(26979) Mon Nov  2 15:39:12 2020: Debug:   } # authenticate = handled
(26979) Mon Nov  2 15:39:12 2020: Debug: Using Post-Auth-Type Challenge
(26979) Mon Nov  2 15:39:12 2020: Debug: Post-Auth-Type sub-section not found.  Ignoring. (26979) Mon Nov  2 15:39:12 2020: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence (26979) Mon Nov  2 15:39:12 2020: Debug: session-state: Saving cached attributes (26979) Mon Nov  2 15:39:12 2020: Debug: TLS-Session-Cipher-Suite = "ECDHE-RSA-AES256-GCM-SHA384"
(26979) Mon Nov  2 15:39:12 2020: Debug: TLS-Session-Version = "TLS 1.2"
(26979) Mon Nov  2 15:39:12 2020: Debug: Module-Failure-Message := "eap: Failed continuing EAP GTC (6) session.  EAP sub-module failed" (26979) Mon Nov  2 15:39:12 2020: Debug: Sent Access-Challenge Id 231 from my_server_ip:1812 to my_cluster_managment_ip:36588 length 0 (26979) Mon Nov  2 15:39:12 2020: Debug:   EAP-Message = 0x0114002e190017030300233ccff76c8dee7ac196cf7561e1ebe6650116f48c3d155209928c145c148ad4ba578e7d (26979) Mon Nov  2 15:39:12 2020: Debug: Message-Authenticator = 0x00000000000000000000000000000000 (26979) Mon Nov  2 15:39:12 2020: Debug:   State = 0xec639e88e47787f4b03ecf40bb262f03
(26979) Mon Nov  2 15:39:12 2020: Debug:   Proxy-State = 0x313037
(26979) Mon Nov  2 15:39:12 2020: Debug: Finished request

On Fri, Oct 30, 2020 at 5:36 PM Fabrice Durand <fdur...@inverse.ca <mailto:fdur...@inverse.ca>> wrote:

    At least when you try to connect ...


    Le 20-10-30 à 06 h 37, Sonali Gulia a écrit :
    hi Durand fabrice

    here is the result of raddebug -f
    /usr/local/pf/var/run/radiusd.sock -t 3000

    (10522) Fri Oct 30 21:32:00 2020: Debug: Received Status-Server
    Id 97 from 127.0.0.1:51783 <http://127.0.0.1:51783> to
    127.0.0.1:18121 <http://127.0.0.1:18121> length 50
    (10522) Fri Oct 30 21:32:00 2020: Debug: Message-Authenticator =
    0x595be7422b20bffc2fd6282691eb1b4e
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Statistics-Type = 15
    (10522) Fri Oct 30 21:32:00 2020: Debug: # Executing group from
    file /usr/local/pf/raddb/sites-enabled/status
    (10522) Fri Oct 30 21:32:00 2020: Debug: Autz-Type Status-Server {
    (10522) Fri Oct 30 21:32:00 2020: Debug: [ok] = ok
    (10522) Fri Oct 30 21:32:00 2020: Debug:   } # Autz-Type
    Status-Server = ok
    (10522) Fri Oct 30 21:32:00 2020: Debug: Sent Access-Accept Id 97
    from 127.0.0.1:18121 <http://127.0.0.1:18121> to 127.0.0.1:51783
    <http://127.0.0.1:51783> length 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Access-Requests = 10523
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Access-Accepts = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Access-Rejects = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Access-Challenges = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Auth-Responses = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Auth-Duplicate-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Auth-Malformed-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Auth-Invalid-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Auth-Dropped-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Auth-Unknown-Types = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Accounting-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Accounting-Responses = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Acct-Duplicate-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Acct-Malformed-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Acct-Invalid-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Acct-Dropped-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Acct-Unknown-Types = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Accepts = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Rejects = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Challenges = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Responses = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Accounting-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Accounting-Responses = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
    (10522) Fri Oct 30 21:32:00 2020: Debug: Finished request
    (10522) Fri Oct 30 21:32:05 2020: Debug: Cleaning up request
    packet ID 97 with timestamp +157883
    (10523) Fri Oct 30 21:32:15 2020: Debug: Received Status-Server
    Id 71 from 127.0.0.1:43289 <http://127.0.0.1:43289> to
    127.0.0.1:18121 <http://127.0.0.1:18121> length 50
    (10523) Fri Oct 30 21:32:15 2020: Debug: Message-Authenticator =
    0x2e1611a2cb839f02f01df0ab302f9062
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Statistics-Type = 15
    (10523) Fri Oct 30 21:32:15 2020: Debug: # Executing group from
    file /usr/local/pf/raddb/sites-enabled/status
    (10523) Fri Oct 30 21:32:15 2020: Debug: Autz-Type Status-Server {
    (10523) Fri Oct 30 21:32:15 2020: Debug: [ok] = ok
    (10523) Fri Oct 30 21:32:15 2020: Debug:   } # Autz-Type
    Status-Server = ok
    (10523) Fri Oct 30 21:32:15 2020: Debug: Sent Access-Accept Id 71
    from 127.0.0.1:18121 <http://127.0.0.1:18121> to 127.0.0.1:43289
    <http://127.0.0.1:43289> length 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Access-Requests = 10524
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Access-Accepts = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Access-Rejects = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Access-Challenges = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Auth-Responses = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Auth-Duplicate-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Auth-Malformed-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Auth-Invalid-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Auth-Dropped-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Auth-Unknown-Types = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Accounting-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Accounting-Responses = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Acct-Duplicate-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Acct-Malformed-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Acct-Invalid-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Acct-Dropped-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Acct-Unknown-Types = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Accepts = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Rejects = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Challenges = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Responses = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Accounting-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Accounting-Responses = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
    (10523) Fri Oct 30 21:32:15 2020: Debug: Finished request
    (10523) Fri Oct 30 21:32:20 2020: Debug: Cleaning up request
    packet ID 71 with timestamp +157898
    (10524) Fri Oct 30 21:32:30 2020: Debug: Received Status-Server
    Id 111 from 127.0.0.1:38982 <http://127.0.0.1:38982> to
    127.0.0.1:18121 <http://127.0.0.1:18121> length 50
    (10524) Fri Oct 30 21:32:30 2020: Debug: Message-Authenticator =
    0xbd1505f5fab60879f23b35b68b69b8a1
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Statistics-Type = 15
    (10524) Fri Oct 30 21:32:30 2020: Debug: # Executing group from
    file /usr/local/pf/raddb/sites-enabled/status
    (10524) Fri Oct 30 21:32:30 2020: Debug: Autz-Type Status-Server {
    (10524) Fri Oct 30 21:32:30 2020: Debug: [ok] = ok
    (10524) Fri Oct 30 21:32:30 2020: Debug:   } # Autz-Type
    Status-Server = ok
    (10524) Fri Oct 30 21:32:30 2020: Debug: Sent Access-Accept Id
    111 from 127.0.0.1:18121 <http://127.0.0.1:18121> to
    127.0.0.1:38982 <http://127.0.0.1:38982> length 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Access-Requests = 10525
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Access-Accepts = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Access-Rejects = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Access-Challenges = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Auth-Responses = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Auth-Duplicate-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Auth-Malformed-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Auth-Invalid-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Auth-Dropped-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Auth-Unknown-Types = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Accounting-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Accounting-Responses = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Acct-Duplicate-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Acct-Malformed-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Acct-Invalid-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Acct-Dropped-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Acct-Unknown-Types = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Accepts = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Rejects = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Access-Challenges = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Responses = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Accounting-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Accounting-Responses = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug:
    FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
    (10524) Fri Oct 30 21:32:30 2020: Debug: Finished request
    (10524) Fri Oct 30 21:32:35 2020: Debug: Cleaning up request
    packet ID 111 with timestamp +157913



    On Fri, Oct 30, 2020 at 6:33 AM Durand fabrice via
    PacketFence-users <packetfence-users@lists.sourceforge.net
    <mailto:packetfence-users@lists.sourceforge.net>> wrote:

        Hello Sonila,

        can you provide a raddebug ?

        raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000

        Regards

        Fabrice


        Le 20-10-28 à 09 h 22, Sonali Gulia via PacketFence-users a
        écrit :
        Hi all in new version of pf 10.2.0 eap gtc sub module failed
        . While in previous version it was working fine do any one
        lnow any solution


        _______________________________________________
        PacketFence-users mailing list
        PacketFence-users@lists.sourceforge.net  
<mailto:PacketFence-users@lists.sourceforge.net>
        https://lists.sourceforge.net/lists/listinfo/packetfence-users
        _______________________________________________
        PacketFence-users mailing list
        PacketFence-users@lists.sourceforge.net
        <mailto:PacketFence-users@lists.sourceforge.net>
        https://lists.sourceforge.net/lists/listinfo/packetfence-users

-- Fabrice Durand
    fdur...@inverse.ca  <mailto:fdur...@inverse.ca>  ::  +1.514.447.4918 (x135) 
::www.inverse.ca  <http://www.inverse.ca>
    Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)

--
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to