Hi

We are using ldap module but i also try sql nothing works. Same config was
working fine with previous version

On Tue, 3 Nov 2020 at 7:23 PM, Fabrice Durand <fdur...@inverse.ca> wrote:

> Hello Sonali,
>
> your issue looks to be because there is no module before that set the
> "known good" password in the request.
>
> Where is stored the password ? (ldap/sql/...)
>
> Regards
>
> Fabrice
>
>
> Le 20-11-02 à 22 h 46, Sonali Gulia a écrit :
>
>
>
> hi
>
> Hi all in new version of pf 10.2.0 eap gtc sub module failed . While in
> previous version it was working fine plz help
>
> here is the result of raddebug -f /usr/local/pf/var/run/radiusd.sock -t
> 3000'
>
> i changed my  personal details with
> my_username
> my_user_device_mac
> my_switch_ip
> my_server_ip
> my_switch_mac
> my_cluster_managment_ip
>
> also highlight the error in logs .
>
>
> (26979) Mon Nov  2 15:39:12 2020: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/packetfence
> (26979) Mon Nov  2 15:39:12 2020: Debug:   authenticate {
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Expiring EAP session with
> state 0xddba5edfdca958cb
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Finished EAP session with
> state 0xec639e88eb7087f4
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Previous EAP request found
> for state 0xec639e88eb7087f4, released from the list
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent packet with method
> EAP PEAP (25)
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Calling submodule eap_peap
> to process data
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Continuing EAP-TLS
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: [eaptls verify] = ok
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Done initial handshake
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: [eaptls process] = ok
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Session established.
> Decoding tunneled attributes
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: PEAP state phase2
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: EAP method GTC (6)
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Got tunneled request
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   EAP-Message =
> 0x0213000f0642726561746853473240
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Setting User-Name to
> my_username
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Sending tunneled
> request to packetfence-tunnel
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   EAP-Message =
> 0x0213000f0642726561746853473240
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   FreeRADIUS-Proxied-To
> = 127.0.0.1
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   User-Name =
> "myusername"
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   State =
> 0xddba5edfdca958cb96d4c517e9bc660c
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Service-Type =
> Framed-User
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Cisco-AVPair =
> "service-type=Framed"
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Cisco-AVPair =
> "audit-session-id=0A0115170000000D005BC4FA"
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Cisco-AVPair =
> "method=dot1x"
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Framed-MTU = 1500
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Calling-Station-Id :=
> "my_user_device_mac"
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   NAS-IP-Address =
> my_switch_ip
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   NAS-Port-Id =
> "GigabitEthernet1/0/1"
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   NAS-Port-Type =
> Ethernet
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   NAS-Port = 50101
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:
> PacketFence-KeyBalanced := "99a990b22af7d7ca016a27643cd35a1e"
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   PacketFence-Radius-Ip
> := "my_server_ip"
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Called-Station-Id :=
> "my_switch_mac"
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Event-Timestamp =
> "Nov  2 2020 15:39:12 IST"
> (26979) Mon Nov  2 15:39:12 2020: Debug: Virtual server packetfence-tunnel
> received request
> (26979) Mon Nov  2 15:39:12 2020: Debug:   EAP-Message =
> 0x0213000f0642726561746853473240
> (26979) Mon Nov  2 15:39:12 2020: Debug:   FreeRADIUS-Proxied-To =
> 127.0.0.1
> (26979) Mon Nov  2 15:39:12 2020: Debug:   User-Name = "myusername"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   State =
> 0xddba5edfdca958cb96d4c517e9bc660c
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Service-Type = Framed-User
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Cisco-AVPair =
> "service-type=Framed"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Cisco-AVPair =
> "audit-session-id=0A0115170000000D005BC4FA"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Cisco-AVPair = "method=dot1x"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Framed-MTU = 1500
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Calling-Station-Id :=
> "my_user_device_mac"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-IP-Address = my_switch_ip
> (26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-Port-Id =
> "GigabitEthernet1/0/1"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-Port-Type = Ethernet
> (26979) Mon Nov  2 15:39:12 2020: Debug:   NAS-Port = 50101
> (26979) Mon Nov  2 15:39:12 2020: Debug:   PacketFence-KeyBalanced :=
> "99a990b22af7d7ca016a27643cd35a1e"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   PacketFence-Radius-Ip :=
> "my_server_ip"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Called-Station-Id :=
> "my_switch_mac"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Event-Timestamp = "Nov  2 2020
> 15:39:12 IST"
> (26979) Mon Nov  2 15:39:12 2020: Debug: server packetfence-tunnel {
> (26979) Mon Nov  2 15:39:12 2020: Debug:   session-state: No cached
> attributes
> (26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing section authorize
> from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
> (26979) Mon Nov  2 15:39:12 2020: Debug:     authorize {
> (26979) Mon Nov  2 15:39:12 2020: Debug:       if ( outer.EAP-Type ==
> TTLS) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:       if ( outer.EAP-Type ==
> TTLS)  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:       policy
> packetfence-set-realm-if-machine {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i)  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
> packetfence-set-realm-if-machine = notfound
> (26979) Mon Nov  2 15:39:12 2020: Debug:       policy
> packetfence-set-tenant-id {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0"){
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> (26979) Mon Nov  2 15:39:12 2020: Debug:            --> 0
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           update control {
> (26979) Mon Nov  2 15:39:12 2020: Debug:             EXPAND %{User-Name}
> (26979) Mon Nov  2 15:39:12 2020: Debug:                --> my_username
> (26979) Mon Nov  2 15:39:12 2020: Debug:             SQL-User-Name set to
> 'myusername'
> (26979) Mon Nov  2 15:39:12 2020: Debug:             Executing select
> query:  SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
> 'my_switch_ip'), 0)
> (26979) Mon Nov  2 15:39:12 2020: Debug:             EXPAND %{sql: SELECT
> IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
> '%{NAS-IP-Address}'), 0)}
> (26979) Mon Nov  2 15:39:12 2020: Debug:                --> 1
> (26979) Mon Nov  2 15:39:12 2020: Debug:           } # update control =
> noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:         } # if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (
> &control:PacketFence-Tenant-Id == 0 ) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (
> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
> packetfence-set-tenant-id = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:       policy filter_username {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name)  -> TRUE
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name)  {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ / /) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~ / /)
>  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~
> /@[^@]*@/ ) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~
> /@[^@]*@/ )  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~
> /\.\./ ) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~
> /\.\./ )  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if ((&User-Name =~ /@/)
> && (&User-Name !~ /@(.+)\.(.+)$/))  {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if ((&User-Name =~ /@/)
> && (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~
> /\.$/)  {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~
> /\.$/)   -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~
> /@\./)  {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if (&User-Name =~
> /@\./)   -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:         } # if (&User-Name)  =
> noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy filter_username
> = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:       update {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         EXPAND
> %{outer.request:User-Name}
> (26979) Mon Nov  2 15:39:12 2020: Debug:            --> anonymous
> (26979) Mon Nov  2 15:39:12 2020: Debug:       } # update = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:       [mschap] = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug: suffix: Checking for suffix after
> "@"
> (26979) Mon Nov  2 15:39:12 2020: Debug: suffix: No '@' in User-Name =
> "myusername", skipping NULL due to config.
> (26979) Mon Nov  2 15:39:12 2020: Debug:       [suffix] = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Checking for prefix
> before "\"
> (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: No '\' in User-Name =
> "myusername", looking up realm NULL
> (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Found realm "null"
> (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Adding
> Stripped-User-Name = "myusername"
> (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Adding Realm = "null"
> (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Authentication realm is
> LOCAL
> (26979) Mon Nov  2 15:39:12 2020: Debug:       [ntdomain] = ok
> (26979) Mon Nov  2 15:39:12 2020: Debug:       update control {
> (26979) Mon Nov  2 15:39:12 2020: Debug:       } # update control = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent EAP Response (code
> 2) ID 19 length 15
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: No EAP Start, assuming it's
> an on-going EAP conversation
> (26979) Mon Nov  2 15:39:12 2020: Debug:       [eap] = updated
> (26979) Mon Nov  2 15:39:12 2020: Debug:       policy
> rewrite_called_station_id {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if ((&Called-Station-Id)
> && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
> {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if ((&Called-Station-Id)
> && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>  -> TRUE
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if ((&Called-Station-Id)
> && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>  {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           update request {
> (26979) Mon Nov  2 15:39:12 2020: Debug:             EXPAND
> %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
> (26979) Mon Nov  2 15:39:12 2020: Debug:                --> my_switch_mac
> (26979) Mon Nov  2 15:39:12 2020: Debug:           } # update request =
> noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if ("%{8}") {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           EXPAND %{8}
> (26979) Mon Nov  2 15:39:12 2020: Debug:              -->
> (26979) Mon Nov  2 15:39:12 2020: Debug:           if ("%{8}")  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:           elsif (
> (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           elsif (
> (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:           elsif
> (Aruba-Essid-Name) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           elsif
> (Aruba-Essid-Name)  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:           elsif ( (Cisco-AVPair)
>  && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           EXPAND %{Cisco-AVPair}
> (26979) Mon Nov  2 15:39:12 2020: Debug:              -->
> service-type=Framed
> (26979) Mon Nov  2 15:39:12 2020: Debug:           elsif ( (Cisco-AVPair)
>  && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:           [updated] = updated
> (26979) Mon Nov  2 15:39:12 2020: Debug:         } # if
> ((&Called-Station-Id) && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>  = updated
> (26979) Mon Nov  2 15:39:12 2020: Debug:         ... skipping else:
> Preceding "if" was taken
> (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
> rewrite_called_station_id = updated
> (26979) Mon Nov  2 15:39:12 2020: Debug:       [pap] = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:     } # authorize = updated
> (26979) Mon Nov  2 15:39:12 2020: WARNING:   You set Proxy-To-Realm =
> local, but it is a LOCAL realm!  Cancelling proxy request.
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Found Auth-Type = eap
> (26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing group from file
> /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
> (26979) Mon Nov  2 15:39:12 2020: Debug:     authenticate {
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Expiring EAP session with
> state 0xddba5edfdca958cb
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Finished EAP session with
> state 0xddba5edfdca958cb
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Previous EAP request found
> for state 0xddba5edfdca958cb, released from the list
>
>
>
>
>
>
>
>
>
> *(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent packet with
> method EAP GTC (6) (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Calling
> submodule eap_gtc to process data (26979) Mon Nov  2 15:39:12 2020: Debug:
> eap_gtc: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/packetfence-tunnel (26979) Mon Nov  2
> 15:39:12 2020: Debug: eap_gtc:   Auth-Type PAP { (26979) Mon Nov  2
> 15:39:12 2020: Debug: pap: Login attempt with password (26979) Mon Nov  2
> 15:39:12 2020: Debug: pap: No password configured for the user.  Cannot do
> authentication (26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc:     [pap]
> = fail (26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc:   } # Auth-Type
> PAP = fail (26979) Mon Nov  2 15:39:12 2020: ERROR: eap: Failed continuing
> EAP GTC (6) session.  EAP sub-module failed (26979) Mon Nov  2 15:39:12
> 2020: Debug: eap: Sending EAP Failure (code 4) ID 19 length 4*
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Failed in EAP select
> (26979) Mon Nov  2 15:39:12 2020: Debug:       [eap] = invalid
> (26979) Mon Nov  2 15:39:12 2020: Debug:     } # authenticate = invalid
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Failed to authenticate the user
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Using Post-Auth-Type Reject
> (26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing group from file
> /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
> (26979) Mon Nov  2 15:39:12 2020: Debug:     Post-Auth-Type REJECT {
> (26979) Mon Nov  2 15:39:12 2020: Debug:       policy
> packetfence-set-tenant-id {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0"){
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> (26979) Mon Nov  2 15:39:12 2020: Debug:            --> 1
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (
> &control:PacketFence-Tenant-Id == 0 ) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (
> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
> packetfence-set-tenant-id = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:       update {
> (26979) Mon Nov  2 15:39:12 2020: Debug:       } # update = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:       policy
> packetfence-audit-log-reject {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name &&
> (&User-Name == "dummy")) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:         if (&User-Name &&
> (&User-Name == "dummy"))  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:         else {
> (26979) Mon Nov  2 15:39:12 2020: Debug:           policy request-timing {
> (26979) Mon Nov  2 15:39:12 2020: Debug:             if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
> (26979) Mon Nov  2 15:39:12 2020: Debug:             EXPAND
> %{%{control:PacketFence-Request-Time}:-0}
> (26979) Mon Nov  2 15:39:12 2020: Debug:                --> 0
> (26979) Mon Nov  2 15:39:12 2020: Debug:             if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0)  -> FALSE
> (26979) Mon Nov  2 15:39:12 2020: Debug:           } # policy
> request-timing = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND
> type.reject.query
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:    -->
> type.reject.query
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: Using query template
> 'query'
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND %{User-Name}
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:    --> my_username
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: SQL-User-Name set to
> 'myusername'
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND INSERT INTO
> radius_audit_log               ( mac, ip, computer_name, user_name,
>        stripped_user_name,  realm, event_type,                switch_id,
> switch_mac, switch_ip_address,                radius_source_ip_address,
> called_station_id, calling_station_id,                nas_port_type, ssid,
> nas_port_id,                ifindex, nas_port, connection_type,
>    nas_ip_address, nas_identifier, auth_status,                reason,
> auth_type, eap_type,                role, node_status, profile,
>    source, auto_reg, is_phone,                pf_domain, uuid,
> radius_request,                radius_reply, request_time, tenant_id,
> radius_ip)              VALUES               (
> '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
> '%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
>            '%{request:Stripped-User-Name}', '%{request:Realm}',
> 'Radius-Access-Request',
>  '%{%{control:PacketFence-Switch-Id}:-N/A}',
> '%{%{control:PacketFence-Switch-Mac}:-N/A}',
> '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
>  '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
> '%{request:Calling-Station-Id}',                '%{request:NAS-Port-Type}',
> '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
>  '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
> '%{%{control:PacketFence-Connection-Type}:-N/A}',
>  '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',  'Reject',
>           '%{request:Module-Failure-Message}', '%{control:Auth-Type}',
> '%{request:EAP-Type}',
>  '%{%{control:PacketFence-Role}:-N/A}',
> '%{%{control:PacketFence-Status}:-N/A}',
> '%{%{control:PacketFence-Profile}:-N/A}',
>  '%{%{control:PacketFence-Source}:-N/A}',
> '%{%{control:PacketFence-AutoReg}:-0}',
> '%{%{control:PacketFence-IsPhone}:-0}',
>  '%{request:PacketFence-Domain}', '',
> '%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
> '%{%{control:PacketFence-Request-Time}:-N/A}',
> '%{control:PacketFence-Tenant-Id}', '%{request:PacketFence-Radius-Ip}')
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:    --> INSERT INTO
> radius_audit_log               ( mac, ip, computer_name, user_name,
>        stripped_user_name,  realm, event_type,                switch_id,
> switch_mac, switch_ip_address,                radius_source_ip_address,
> called_station_id, calling_station_id,                nas_port_type, ssid,
> nas_port_id,                ifindex, nas_port, connection_type,
>    nas_ip_address, nas_identifier, auth_status,                reason,
> auth_type, eap_type,                role, node_status, profile,
>    source, auto_reg, is_phone,                pf_domain, uuid,
> radius_request,                radius_reply, request_time, tenant_id,
> radius_ip)              VALUES               ( 'my_user_device_mac', '',
> 'N/A', 'myusername',                'myusername', 'null',
> 'Radius-Access-Request',                'N/A', 'N/A', 'N/A',
>  'my_cluster_managment_ip', 'my_switch_mac', 'my_user_device_mac',
>        'Ethernet', '', 'GigabitEthernet1/0/1',                'N/A',
> '50101', 'N/A',                'my_switch_ip', '',  'Reject',
>   'eap: Failed continuing EAP GTC (6) session.  EAP sub-module failed',
> 'eap', 'GTC',                'N/A', 'N/A', 'N/A',                'N/A',
> '0', '0',                '', '', 'EAP-Message =3D
> 0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D 127.0.0.1,
> User-Name =3D =22myusername=22, State =3D
> 0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User,
> Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D
> =22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair =3D
> =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id =3D
> =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip, NAS-Port-Id =3D
> =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101,
> PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22,
> PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D =22Nov  2
> 2020 15:39:12 IST=22, PacketFence-Outer-User =3D =22anonymous=22,
> Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22, EAP-Type =3D
> GTC, Called-Station-Id =3D =22my_switch_mac=22, User-Password =3D
> =22=2A=2A=2A=2A=2A=2A=22, Module-Failure-Message =3D =22eap: Failed
> continuing EAP GTC (6) session.  EAP sub-module failed=22, SQL-User-Name
> =3D =22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator
> =3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip')
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: Executing query:
> INSERT INTO radius_audit_log               ( mac, ip, computer_name,
> user_name,                stripped_user_name,  realm, event_type,
>      switch_id, switch_mac, switch_ip_address,
>  radius_source_ip_address, called_station_id, calling_station_id,
>      nas_port_type, ssid, nas_port_id,                ifindex, nas_port,
> connection_type,                nas_ip_address, nas_identifier,
> auth_status,                reason, auth_type, eap_type,
>  role, node_status, profile,                source, auto_reg, is_phone,
>            pf_domain, uuid, radius_request,                radius_reply,
> request_time, tenant_id, radius_ip)              VALUES               (
> 'my_user_device_mac', '', 'N/A', 'myusername',                'myusername',
> 'null', 'Radius-Access-Request',                'N/A', 'N/A', 'N/A',
>          'my_cluster_managment_ip', 'my_switch_mac', 'my_user_device_mac',
>                'Ethernet', '', 'GigabitEthernet1/0/1',
>  'N/A', '50101', 'N/A',                'my_switch_ip', '',  'Reject',
>           'eap: Failed continuing EAP GTC (6) session.  EAP sub-module
> failed', 'eap', 'GTC',                'N/A', 'N/A', 'N/A',
>  'N/A', '0', '0',                '', '', 'EAP-Message =3D
> 0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D 127.0.0.1,
> User-Name =3D =22myusername=22, State =3D
> 0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User,
> Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D
> =22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair =3D
> =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id =3D
> =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip, NAS-Port-Id =3D
> =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101,
> PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22,
> PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D =22Nov  2
> 2020 15:39:12 IST=22, PacketFence-Outer-User =3D =22anonymous=22,
> Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22, EAP-Type =3D
> GTC, Called-Station-Id =3D =22my_switch_mac=22, User-Password =3D
> =22=2A=2A=2A=2A=2A=2A=22, Module-Failure-Message =3D =22eap: Failed
> continuing EAP GTC (6) session.  EAP sub-module failed=22, SQL-User-Name
> =3D =22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator
> =3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip')
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: SQL query returned:
> success
> (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: 1 record(s) updated
> (26979) Mon Nov  2 15:39:12 2020: Debug:           [sql_reject] = ok
> (26979) Mon Nov  2 15:39:12 2020: Debug:         } # else = ok
> (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
> packetfence-audit-log-reject = ok
> (26979) Mon Nov  2 15:39:12 2020: Debug: attr_filter.access_reject: EXPAND
> %{User-Name}
> (26979) Mon Nov  2 15:39:12 2020: Debug: attr_filter.access_reject:    -->
> my_username
> (26979) Mon Nov  2 15:39:12 2020: Debug: attr_filter.access_reject:
> Matched entry DEFAULT at line 11
> (26979) Mon Nov  2 15:39:12 2020: Debug:       [attr_filter.access_reject]
> = updated
> (26979) Mon Nov  2 15:39:12 2020: Debug:       update outer.session-state {
> (26979) Mon Nov  2 15:39:12 2020: Debug:       } # update
> outer.session-state = noop
> (26979) Mon Nov  2 15:39:12 2020: Debug:     } # Post-Auth-Type REJECT =
> updated
> (26979) Mon Nov  2 15:39:12 2020: Debug: } # server packetfence-tunnel
> (26979) Mon Nov  2 15:39:12 2020: Debug: Virtual server sending reply
> (26979) Mon Nov  2 15:39:12 2020: Debug:   EAP-Message = 0x04130004
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Message-Authenticator =
> 0x00000000000000000000000000000000
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Got tunneled reply code
> 3
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   EAP-Message =
> 0x04130004
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Message-Authenticator
> = 0x00000000000000000000000000000000
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Tunneled authentication
> was rejected
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: FAILURE
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Sending EAP Request (code 1)
> ID 20 length 46
> (26979) Mon Nov  2 15:39:12 2020: Debug: eap: EAP session adding
> &reply:State = 0xec639e88e47787f4
> (26979) Mon Nov  2 15:39:12 2020: Debug:     [eap] = handled
> (26979) Mon Nov  2 15:39:12 2020: Debug:   } # authenticate = handled
> (26979) Mon Nov  2 15:39:12 2020: Debug: Using Post-Auth-Type Challenge
> (26979) Mon Nov  2 15:39:12 2020: Debug: Post-Auth-Type sub-section not
> found.  Ignoring.
> (26979) Mon Nov  2 15:39:12 2020: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/packetfence
> (26979) Mon Nov  2 15:39:12 2020: Debug: session-state: Saving cached
> attributes
> (26979) Mon Nov  2 15:39:12 2020: Debug:   TLS-Session-Cipher-Suite =
> "ECDHE-RSA-AES256-GCM-SHA384"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   TLS-Session-Version = "TLS 1.2"
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Module-Failure-Message := "eap:
> Failed continuing EAP GTC (6) session.  EAP sub-module failed"
> (26979) Mon Nov  2 15:39:12 2020: Debug: Sent Access-Challenge Id 231 from
> my_server_ip:1812 to my_cluster_managment_ip:36588 length 0
> (26979) Mon Nov  2 15:39:12 2020: Debug:   EAP-Message =
> 0x0114002e190017030300233ccff76c8dee7ac196cf7561e1ebe6650116f48c3d155209928c145c148ad4ba578e7d
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Message-Authenticator =
> 0x00000000000000000000000000000000
> (26979) Mon Nov  2 15:39:12 2020: Debug:   State =
> 0xec639e88e47787f4b03ecf40bb262f03
> (26979) Mon Nov  2 15:39:12 2020: Debug:   Proxy-State = 0x313037
> (26979) Mon Nov  2 15:39:12 2020: Debug: Finished request
>
> On Fri, Oct 30, 2020 at 5:36 PM Fabrice Durand <fdur...@inverse.ca> wrote:
>
>> At least when you try to connect ...
>>
>>
>> Le 20-10-30 à 06 h 37, Sonali Gulia a écrit :
>>
>> hi Durand fabrice
>>
>> here is the result of raddebug -f /usr/local/pf/var/run/radiusd.sock -t
>> 3000
>>
>> (10522) Fri Oct 30 21:32:00 2020: Debug: Received Status-Server Id 97
>> from 127.0.0.1:51783 to 127.0.0.1:18121 length 50
>> (10522) Fri Oct 30 21:32:00 2020: Debug:   Message-Authenticator =
>> 0x595be7422b20bffc2fd6282691eb1b4e
>> (10522) Fri Oct 30 21:32:00 2020: Debug:   FreeRADIUS-Statistics-Type = 15
>> (10522) Fri Oct 30 21:32:00 2020: Debug: # Executing group from file
>> /usr/local/pf/raddb/sites-enabled/status
>> (10522) Fri Oct 30 21:32:00 2020: Debug:   Autz-Type Status-Server {
>> (10522) Fri Oct 30 21:32:00 2020: Debug:     [ok] = ok
>> (10522) Fri Oct 30 21:32:00 2020: Debug:   } # Autz-Type Status-Server =
>> ok
>> (10522) Fri Oct 30 21:32:00 2020: Debug: Sent Access-Accept Id 97 from
>> 127.0.0.1:18121 to 127.0.0.1:51783 length 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Access-Requests = 10523
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Access-Accepts = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Access-Rejects = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Access-Challenges = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Auth-Responses = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Auth-Duplicate-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Auth-Malformed-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Auth-Invalid-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Auth-Dropped-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Auth-Unknown-Types = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Accounting-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Accounting-Responses = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Acct-Duplicate-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Acct-Malformed-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Acct-Invalid-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Acct-Dropped-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Acct-Unknown-Types = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Accepts = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Rejects = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Challenges = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Responses = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Accounting-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Accounting-Responses = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
>> (10522) Fri Oct 30 21:32:00 2020: Debug: Finished request
>> (10522) Fri Oct 30 21:32:05 2020: Debug: Cleaning up request packet ID 97
>> with timestamp +157883
>> (10523) Fri Oct 30 21:32:15 2020: Debug: Received Status-Server Id 71
>> from 127.0.0.1:43289 to 127.0.0.1:18121 length 50
>> (10523) Fri Oct 30 21:32:15 2020: Debug:   Message-Authenticator =
>> 0x2e1611a2cb839f02f01df0ab302f9062
>> (10523) Fri Oct 30 21:32:15 2020: Debug:   FreeRADIUS-Statistics-Type = 15
>> (10523) Fri Oct 30 21:32:15 2020: Debug: # Executing group from file
>> /usr/local/pf/raddb/sites-enabled/status
>> (10523) Fri Oct 30 21:32:15 2020: Debug:   Autz-Type Status-Server {
>> (10523) Fri Oct 30 21:32:15 2020: Debug:     [ok] = ok
>> (10523) Fri Oct 30 21:32:15 2020: Debug:   } # Autz-Type Status-Server =
>> ok
>> (10523) Fri Oct 30 21:32:15 2020: Debug: Sent Access-Accept Id 71 from
>> 127.0.0.1:18121 to 127.0.0.1:43289 length 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Access-Requests = 10524
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Access-Accepts = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Access-Rejects = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Access-Challenges = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Auth-Responses = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Auth-Duplicate-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Auth-Malformed-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Auth-Invalid-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Auth-Dropped-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Auth-Unknown-Types = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Accounting-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Accounting-Responses = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Acct-Duplicate-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Acct-Malformed-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Acct-Invalid-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Acct-Dropped-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Acct-Unknown-Types = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Accepts = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Rejects = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Challenges = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Responses = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Accounting-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Accounting-Responses = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
>> (10523) Fri Oct 30 21:32:15 2020: Debug: Finished request
>> (10523) Fri Oct 30 21:32:20 2020: Debug: Cleaning up request packet ID 71
>> with timestamp +157898
>> (10524) Fri Oct 30 21:32:30 2020: Debug: Received Status-Server Id 111
>> from 127.0.0.1:38982 to 127.0.0.1:18121 length 50
>> (10524) Fri Oct 30 21:32:30 2020: Debug:   Message-Authenticator =
>> 0xbd1505f5fab60879f23b35b68b69b8a1
>> (10524) Fri Oct 30 21:32:30 2020: Debug:   FreeRADIUS-Statistics-Type = 15
>> (10524) Fri Oct 30 21:32:30 2020: Debug: # Executing group from file
>> /usr/local/pf/raddb/sites-enabled/status
>> (10524) Fri Oct 30 21:32:30 2020: Debug:   Autz-Type Status-Server {
>> (10524) Fri Oct 30 21:32:30 2020: Debug:     [ok] = ok
>> (10524) Fri Oct 30 21:32:30 2020: Debug:   } # Autz-Type Status-Server =
>> ok
>> (10524) Fri Oct 30 21:32:30 2020: Debug: Sent Access-Accept Id 111 from
>> 127.0.0.1:18121 to 127.0.0.1:38982 length 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Access-Requests = 10525
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Access-Accepts = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Access-Rejects = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Access-Challenges = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Auth-Responses = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Auth-Duplicate-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Auth-Malformed-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Auth-Invalid-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Auth-Dropped-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Auth-Unknown-Types = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Accounting-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Accounting-Responses = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Acct-Duplicate-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Acct-Malformed-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Acct-Invalid-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Acct-Dropped-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Acct-Unknown-Types = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Accepts = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Rejects = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Access-Challenges = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Responses = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Accounting-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Accounting-Responses = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
>> (10524) Fri Oct 30 21:32:30 2020: Debug: Finished request
>> (10524) Fri Oct 30 21:32:35 2020: Debug: Cleaning up request packet ID
>> 111 with timestamp +157913
>>
>>
>>
>> On Fri, Oct 30, 2020 at 6:33 AM Durand fabrice via PacketFence-users <
>> packetfence-users@lists.sourceforge.net> wrote:
>>
>>> Hello Sonila,
>>>
>>> can you provide a raddebug ?
>>>
>>> raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000
>>>
>>> Regards
>>>
>>> Fabrice
>>>
>>>
>>> Le 20-10-28 à 09 h 22, Sonali Gulia via PacketFence-users a écrit :
>>>
>>> Hi all in new version of pf 10.2.0 eap gtc sub module failed . While in
>>> previous version it was working fine do any one lnow any solution
>>>
>>> _______________________________________________
>>> PacketFence-users mailing 
>>> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> PacketFence-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>> --
>> Fabrice durandfdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  
>> www.inverse.ca
>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>> (http://packetfence.org)
>>
>> --
> Fabrice durandfdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
>
>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to