Hi We are using ldap module but i also try sql nothing works. Same config was working fine with previous version
On Tue, 3 Nov 2020 at 7:23 PM, Fabrice Durand <fdur...@inverse.ca> wrote: > Hello Sonali, > > your issue looks to be because there is no module before that set the > "known good" password in the request. > > Where is stored the password ? (ldap/sql/...) > > Regards > > Fabrice > > > Le 20-11-02 à 22 h 46, Sonali Gulia a écrit : > > > > hi > > Hi all in new version of pf 10.2.0 eap gtc sub module failed . While in > previous version it was working fine plz help > > here is the result of raddebug -f /usr/local/pf/var/run/radiusd.sock -t > 3000' > > i changed my personal details with > my_username > my_user_device_mac > my_switch_ip > my_server_ip > my_switch_mac > my_cluster_managment_ip > > also highlight the error in logs . > > > (26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/packetfence > (26979) Mon Nov 2 15:39:12 2020: Debug: authenticate { > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Expiring EAP session with > state 0xddba5edfdca958cb > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Finished EAP session with > state 0xec639e88eb7087f4 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Previous EAP request found > for state 0xec639e88eb7087f4, released from the list > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent packet with method > EAP PEAP (25) > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Calling submodule eap_peap > to process data > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Continuing EAP-TLS > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: [eaptls verify] = ok > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Done initial handshake > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: [eaptls process] = ok > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Session established. > Decoding tunneled attributes > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: PEAP state phase2 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP method GTC (6) > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Got tunneled request > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message = > 0x0213000f0642726561746853473240 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Setting User-Name to > my_username > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Sending tunneled > request to packetfence-tunnel > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message = > 0x0213000f0642726561746853473240 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: FreeRADIUS-Proxied-To > = 127.0.0.1 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: User-Name = > "myusername" > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: State = > 0xddba5edfdca958cb96d4c517e9bc660c > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Service-Type = > Framed-User > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair = > "service-type=Framed" > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair = > "audit-session-id=0A0115170000000D005BC4FA" > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair = > "method=dot1x" > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Framed-MTU = 1500 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Calling-Station-Id := > "my_user_device_mac" > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-IP-Address = > my_switch_ip > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port-Id = > "GigabitEthernet1/0/1" > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port-Type = > Ethernet > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port = 50101 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: > PacketFence-KeyBalanced := "99a990b22af7d7ca016a27643cd35a1e" > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: PacketFence-Radius-Ip > := "my_server_ip" > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Called-Station-Id := > "my_switch_mac" > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Event-Timestamp = > "Nov 2 2020 15:39:12 IST" > (26979) Mon Nov 2 15:39:12 2020: Debug: Virtual server packetfence-tunnel > received request > (26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message = > 0x0213000f0642726561746853473240 > (26979) Mon Nov 2 15:39:12 2020: Debug: FreeRADIUS-Proxied-To = > 127.0.0.1 > (26979) Mon Nov 2 15:39:12 2020: Debug: User-Name = "myusername" > (26979) Mon Nov 2 15:39:12 2020: Debug: State = > 0xddba5edfdca958cb96d4c517e9bc660c > (26979) Mon Nov 2 15:39:12 2020: Debug: Service-Type = Framed-User > (26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair = > "service-type=Framed" > (26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair = > "audit-session-id=0A0115170000000D005BC4FA" > (26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair = "method=dot1x" > (26979) Mon Nov 2 15:39:12 2020: Debug: Framed-MTU = 1500 > (26979) Mon Nov 2 15:39:12 2020: Debug: Calling-Station-Id := > "my_user_device_mac" > (26979) Mon Nov 2 15:39:12 2020: Debug: NAS-IP-Address = my_switch_ip > (26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port-Id = > "GigabitEthernet1/0/1" > (26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port-Type = Ethernet > (26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port = 50101 > (26979) Mon Nov 2 15:39:12 2020: Debug: PacketFence-KeyBalanced := > "99a990b22af7d7ca016a27643cd35a1e" > (26979) Mon Nov 2 15:39:12 2020: Debug: PacketFence-Radius-Ip := > "my_server_ip" > (26979) Mon Nov 2 15:39:12 2020: Debug: Called-Station-Id := > "my_switch_mac" > (26979) Mon Nov 2 15:39:12 2020: Debug: Event-Timestamp = "Nov 2 2020 > 15:39:12 IST" > (26979) Mon Nov 2 15:39:12 2020: Debug: server packetfence-tunnel { > (26979) Mon Nov 2 15:39:12 2020: Debug: session-state: No cached > attributes > (26979) Mon Nov 2 15:39:12 2020: Debug: # Executing section authorize > from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel > (26979) Mon Nov 2 15:39:12 2020: Debug: authorize { > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( outer.EAP-Type == > TTLS) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( outer.EAP-Type == > TTLS) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: policy > packetfence-set-realm-if-machine { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (User-Name =~ > /host\/([a-z0-9_-]*)[\.](.*)/i) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (User-Name =~ > /host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy > packetfence-set-realm-if-machine = notfound > (26979) Mon Nov 2 15:39:12 2020: Debug: policy > packetfence-set-tenant-id { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0"){ > (26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0") -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { > (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND > %{%{control:PacketFence-Tenant-Id}:-0} > (26979) Mon Nov 2 15:39:12 2020: Debug: --> 0 > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { > (26979) Mon Nov 2 15:39:12 2020: Debug: update control { > (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{User-Name} > (26979) Mon Nov 2 15:39:12 2020: Debug: --> my_username > (26979) Mon Nov 2 15:39:12 2020: Debug: SQL-User-Name set to > 'myusername' > (26979) Mon Nov 2 15:39:12 2020: Debug: Executing select > query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = > 'my_switch_ip'), 0) > (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{sql: SELECT > IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = > '%{NAS-IP-Address}'), 0)} > (26979) Mon Nov 2 15:39:12 2020: Debug: --> 1 > (26979) Mon Nov 2 15:39:12 2020: Debug: } # update control = > noop > (26979) Mon Nov 2 15:39:12 2020: Debug: } # if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy > packetfence-set-tenant-id = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: policy filter_username { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) -> TRUE > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ / /) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ / /) > -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ > /@[^@]*@/ ) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ > /@[^@]*@/ ) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ > /\.\./ ) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ > /\.\./ ) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: if ((&User-Name =~ /@/) > && (&User-Name !~ /@(.+)\.(.+)$/)) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if ((&User-Name =~ /@/) > && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ > /\.$/) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ > /\.$/) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ > /@\./) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ > /@\./) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: } # if (&User-Name) = > noop > (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy filter_username > = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: update { > (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND > %{outer.request:User-Name} > (26979) Mon Nov 2 15:39:12 2020: Debug: --> anonymous > (26979) Mon Nov 2 15:39:12 2020: Debug: } # update = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: [mschap] = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: suffix: Checking for suffix after > "@" > (26979) Mon Nov 2 15:39:12 2020: Debug: suffix: No '@' in User-Name = > "myusername", skipping NULL due to config. > (26979) Mon Nov 2 15:39:12 2020: Debug: [suffix] = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Checking for prefix > before "\" > (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: No '\' in User-Name = > "myusername", looking up realm NULL > (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Found realm "null" > (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Adding > Stripped-User-Name = "myusername" > (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Adding Realm = "null" > (26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Authentication realm is > LOCAL > (26979) Mon Nov 2 15:39:12 2020: Debug: [ntdomain] = ok > (26979) Mon Nov 2 15:39:12 2020: Debug: update control { > (26979) Mon Nov 2 15:39:12 2020: Debug: } # update control = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent EAP Response (code > 2) ID 19 length 15 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: No EAP Start, assuming it's > an on-going EAP conversation > (26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = updated > (26979) Mon Nov 2 15:39:12 2020: Debug: policy > rewrite_called_station_id { > (26979) Mon Nov 2 15:39:12 2020: Debug: if ((&Called-Station-Id) > && (&Called-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) > { > (26979) Mon Nov 2 15:39:12 2020: Debug: if ((&Called-Station-Id) > && (&Called-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) > -> TRUE > (26979) Mon Nov 2 15:39:12 2020: Debug: if ((&Called-Station-Id) > && (&Called-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) > { > (26979) Mon Nov 2 15:39:12 2020: Debug: update request { > (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND > %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}} > (26979) Mon Nov 2 15:39:12 2020: Debug: --> my_switch_mac > (26979) Mon Nov 2 15:39:12 2020: Debug: } # update request = > noop > (26979) Mon Nov 2 15:39:12 2020: Debug: if ("%{8}") { > (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{8} > (26979) Mon Nov 2 15:39:12 2020: Debug: --> > (26979) Mon Nov 2 15:39:12 2020: Debug: if ("%{8}") -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: elsif ( > (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) { > (26979) Mon Nov 2 15:39:12 2020: Debug: elsif ( > (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: elsif > (Aruba-Essid-Name) { > (26979) Mon Nov 2 15:39:12 2020: Debug: elsif > (Aruba-Essid-Name) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: elsif ( (Cisco-AVPair) > && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) { > (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{Cisco-AVPair} > (26979) Mon Nov 2 15:39:12 2020: Debug: --> > service-type=Framed > (26979) Mon Nov 2 15:39:12 2020: Debug: elsif ( (Cisco-AVPair) > && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: [updated] = updated > (26979) Mon Nov 2 15:39:12 2020: Debug: } # if > ((&Called-Station-Id) && (&Called-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) > = updated > (26979) Mon Nov 2 15:39:12 2020: Debug: ... skipping else: > Preceding "if" was taken > (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy > rewrite_called_station_id = updated > (26979) Mon Nov 2 15:39:12 2020: Debug: [pap] = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: } # authorize = updated > (26979) Mon Nov 2 15:39:12 2020: WARNING: You set Proxy-To-Realm = > local, but it is a LOCAL realm! Cancelling proxy request. > (26979) Mon Nov 2 15:39:12 2020: Debug: Found Auth-Type = eap > (26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/packetfence-tunnel > (26979) Mon Nov 2 15:39:12 2020: Debug: authenticate { > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Expiring EAP session with > state 0xddba5edfdca958cb > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Finished EAP session with > state 0xddba5edfdca958cb > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Previous EAP request found > for state 0xddba5edfdca958cb, released from the list > > > > > > > > > > *(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent packet with > method EAP GTC (6) (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Calling > submodule eap_gtc to process data (26979) Mon Nov 2 15:39:12 2020: Debug: > eap_gtc: # Executing group from file > /usr/local/pf/raddb/sites-enabled/packetfence-tunnel (26979) Mon Nov 2 > 15:39:12 2020: Debug: eap_gtc: Auth-Type PAP { (26979) Mon Nov 2 > 15:39:12 2020: Debug: pap: Login attempt with password (26979) Mon Nov 2 > 15:39:12 2020: Debug: pap: No password configured for the user. Cannot do > authentication (26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: [pap] > = fail (26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: } # Auth-Type > PAP = fail (26979) Mon Nov 2 15:39:12 2020: ERROR: eap: Failed continuing > EAP GTC (6) session. EAP sub-module failed (26979) Mon Nov 2 15:39:12 > 2020: Debug: eap: Sending EAP Failure (code 4) ID 19 length 4* > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Failed in EAP select > (26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = invalid > (26979) Mon Nov 2 15:39:12 2020: Debug: } # authenticate = invalid > (26979) Mon Nov 2 15:39:12 2020: Debug: Failed to authenticate the user > (26979) Mon Nov 2 15:39:12 2020: Debug: Using Post-Auth-Type Reject > (26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/packetfence-tunnel > (26979) Mon Nov 2 15:39:12 2020: Debug: Post-Auth-Type REJECT { > (26979) Mon Nov 2 15:39:12 2020: Debug: policy > packetfence-set-tenant-id { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0"){ > (26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0") -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { > (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND > %{%{control:PacketFence-Tenant-Id}:-0} > (26979) Mon Nov 2 15:39:12 2020: Debug: --> 1 > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy > packetfence-set-tenant-id = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: update { > (26979) Mon Nov 2 15:39:12 2020: Debug: } # update = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: policy > packetfence-audit-log-reject { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name && > (&User-Name == "dummy")) { > (26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name && > (&User-Name == "dummy")) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: else { > (26979) Mon Nov 2 15:39:12 2020: Debug: policy request-timing { > (26979) Mon Nov 2 15:39:12 2020: Debug: if > ("%{%{control:PacketFence-Request-Time}:-0}" != 0) { > (26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND > %{%{control:PacketFence-Request-Time}:-0} > (26979) Mon Nov 2 15:39:12 2020: Debug: --> 0 > (26979) Mon Nov 2 15:39:12 2020: Debug: if > ("%{%{control:PacketFence-Request-Time}:-0}" != 0) -> FALSE > (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy > request-timing = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND > type.reject.query > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: --> > type.reject.query > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: Using query template > 'query' > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND %{User-Name} > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: --> my_username > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: SQL-User-Name set to > 'myusername' > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND INSERT INTO > radius_audit_log ( mac, ip, computer_name, user_name, > stripped_user_name, realm, event_type, switch_id, > switch_mac, switch_ip_address, radius_source_ip_address, > called_station_id, calling_station_id, nas_port_type, ssid, > nas_port_id, ifindex, nas_port, connection_type, > nas_ip_address, nas_identifier, auth_status, reason, > auth_type, eap_type, role, node_status, profile, > source, auto_reg, is_phone, pf_domain, uuid, > radius_request, radius_reply, request_time, tenant_id, > radius_ip) VALUES ( > '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}', > '%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}', > '%{request:Stripped-User-Name}', '%{request:Realm}', > 'Radius-Access-Request', > '%{%{control:PacketFence-Switch-Id}:-N/A}', > '%{%{control:PacketFence-Switch-Mac}:-N/A}', > '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}', > '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}', > '%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}', > '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}', > '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}', > '%{%{control:PacketFence-Connection-Type}:-N/A}', > '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Reject', > '%{request:Module-Failure-Message}', '%{control:Auth-Type}', > '%{request:EAP-Type}', > '%{%{control:PacketFence-Role}:-N/A}', > '%{%{control:PacketFence-Status}:-N/A}', > '%{%{control:PacketFence-Profile}:-N/A}', > '%{%{control:PacketFence-Source}:-N/A}', > '%{%{control:PacketFence-AutoReg}:-0}', > '%{%{control:PacketFence-IsPhone}:-0}', > '%{request:PacketFence-Domain}', '', > '%{pairs:&request:[*]}','%{pairs:&reply:[*]}', > '%{%{control:PacketFence-Request-Time}:-N/A}', > '%{control:PacketFence-Tenant-Id}', '%{request:PacketFence-Radius-Ip}') > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: --> INSERT INTO > radius_audit_log ( mac, ip, computer_name, user_name, > stripped_user_name, realm, event_type, switch_id, > switch_mac, switch_ip_address, radius_source_ip_address, > called_station_id, calling_station_id, nas_port_type, ssid, > nas_port_id, ifindex, nas_port, connection_type, > nas_ip_address, nas_identifier, auth_status, reason, > auth_type, eap_type, role, node_status, profile, > source, auto_reg, is_phone, pf_domain, uuid, > radius_request, radius_reply, request_time, tenant_id, > radius_ip) VALUES ( 'my_user_device_mac', '', > 'N/A', 'myusername', 'myusername', 'null', > 'Radius-Access-Request', 'N/A', 'N/A', 'N/A', > 'my_cluster_managment_ip', 'my_switch_mac', 'my_user_device_mac', > 'Ethernet', '', 'GigabitEthernet1/0/1', 'N/A', > '50101', 'N/A', 'my_switch_ip', '', 'Reject', > 'eap: Failed continuing EAP GTC (6) session. EAP sub-module failed', > 'eap', 'GTC', 'N/A', 'N/A', 'N/A', 'N/A', > '0', '0', '', '', 'EAP-Message =3D > 0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D 127.0.0.1, > User-Name =3D =22myusername=22, State =3D > 0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User, > Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D > =22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair =3D > =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id =3D > =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip, NAS-Port-Id =3D > =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101, > PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22, > PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D =22Nov 2 > 2020 15:39:12 IST=22, PacketFence-Outer-User =3D =22anonymous=22, > Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22, EAP-Type =3D > GTC, Called-Station-Id =3D =22my_switch_mac=22, User-Password =3D > =22=2A=2A=2A=2A=2A=2A=22, Module-Failure-Message =3D =22eap: Failed > continuing EAP GTC (6) session. EAP sub-module failed=22, SQL-User-Name > =3D =22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator > =3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip') > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: Executing query: > INSERT INTO radius_audit_log ( mac, ip, computer_name, > user_name, stripped_user_name, realm, event_type, > switch_id, switch_mac, switch_ip_address, > radius_source_ip_address, called_station_id, calling_station_id, > nas_port_type, ssid, nas_port_id, ifindex, nas_port, > connection_type, nas_ip_address, nas_identifier, > auth_status, reason, auth_type, eap_type, > role, node_status, profile, source, auto_reg, is_phone, > pf_domain, uuid, radius_request, radius_reply, > request_time, tenant_id, radius_ip) VALUES ( > 'my_user_device_mac', '', 'N/A', 'myusername', 'myusername', > 'null', 'Radius-Access-Request', 'N/A', 'N/A', 'N/A', > 'my_cluster_managment_ip', 'my_switch_mac', 'my_user_device_mac', > 'Ethernet', '', 'GigabitEthernet1/0/1', > 'N/A', '50101', 'N/A', 'my_switch_ip', '', 'Reject', > 'eap: Failed continuing EAP GTC (6) session. EAP sub-module > failed', 'eap', 'GTC', 'N/A', 'N/A', 'N/A', > 'N/A', '0', '0', '', '', 'EAP-Message =3D > 0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D 127.0.0.1, > User-Name =3D =22myusername=22, State =3D > 0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User, > Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D > =22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair =3D > =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id =3D > =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip, NAS-Port-Id =3D > =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D Ethernet, NAS-Port =3D 50101, > PacketFence-KeyBalanced =3D =2299a990b22af7d7ca016a27643cd35a1e=22, > PacketFence-Radius-Ip =3D =22my_server_ip=22, Event-Timestamp =3D =22Nov 2 > 2020 15:39:12 IST=22, PacketFence-Outer-User =3D =22anonymous=22, > Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22, EAP-Type =3D > GTC, Called-Station-Id =3D =22my_switch_mac=22, User-Password =3D > =22=2A=2A=2A=2A=2A=2A=22, Module-Failure-Message =3D =22eap: Failed > continuing EAP GTC (6) session. EAP sub-module failed=22, SQL-User-Name > =3D =22myusername=22','EAP-Message =3D 0x04130004, Message-Authenticator > =3D 0x00000000000000000000000000000000', 'N/A', '1', 'my_server_ip') > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: SQL query returned: > success > (26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: 1 record(s) updated > (26979) Mon Nov 2 15:39:12 2020: Debug: [sql_reject] = ok > (26979) Mon Nov 2 15:39:12 2020: Debug: } # else = ok > (26979) Mon Nov 2 15:39:12 2020: Debug: } # policy > packetfence-audit-log-reject = ok > (26979) Mon Nov 2 15:39:12 2020: Debug: attr_filter.access_reject: EXPAND > %{User-Name} > (26979) Mon Nov 2 15:39:12 2020: Debug: attr_filter.access_reject: --> > my_username > (26979) Mon Nov 2 15:39:12 2020: Debug: attr_filter.access_reject: > Matched entry DEFAULT at line 11 > (26979) Mon Nov 2 15:39:12 2020: Debug: [attr_filter.access_reject] > = updated > (26979) Mon Nov 2 15:39:12 2020: Debug: update outer.session-state { > (26979) Mon Nov 2 15:39:12 2020: Debug: } # update > outer.session-state = noop > (26979) Mon Nov 2 15:39:12 2020: Debug: } # Post-Auth-Type REJECT = > updated > (26979) Mon Nov 2 15:39:12 2020: Debug: } # server packetfence-tunnel > (26979) Mon Nov 2 15:39:12 2020: Debug: Virtual server sending reply > (26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message = 0x04130004 > (26979) Mon Nov 2 15:39:12 2020: Debug: Message-Authenticator = > 0x00000000000000000000000000000000 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Got tunneled reply code > 3 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message = > 0x04130004 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Message-Authenticator > = 0x00000000000000000000000000000000 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Tunneled authentication > was rejected > (26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: FAILURE > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: Sending EAP Request (code 1) > ID 20 length 46 > (26979) Mon Nov 2 15:39:12 2020: Debug: eap: EAP session adding > &reply:State = 0xec639e88e47787f4 > (26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = handled > (26979) Mon Nov 2 15:39:12 2020: Debug: } # authenticate = handled > (26979) Mon Nov 2 15:39:12 2020: Debug: Using Post-Auth-Type Challenge > (26979) Mon Nov 2 15:39:12 2020: Debug: Post-Auth-Type sub-section not > found. Ignoring. > (26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/packetfence > (26979) Mon Nov 2 15:39:12 2020: Debug: session-state: Saving cached > attributes > (26979) Mon Nov 2 15:39:12 2020: Debug: TLS-Session-Cipher-Suite = > "ECDHE-RSA-AES256-GCM-SHA384" > (26979) Mon Nov 2 15:39:12 2020: Debug: TLS-Session-Version = "TLS 1.2" > (26979) Mon Nov 2 15:39:12 2020: Debug: Module-Failure-Message := "eap: > Failed continuing EAP GTC (6) session. EAP sub-module failed" > (26979) Mon Nov 2 15:39:12 2020: Debug: Sent Access-Challenge Id 231 from > my_server_ip:1812 to my_cluster_managment_ip:36588 length 0 > (26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message = > 0x0114002e190017030300233ccff76c8dee7ac196cf7561e1ebe6650116f48c3d155209928c145c148ad4ba578e7d > (26979) Mon Nov 2 15:39:12 2020: Debug: Message-Authenticator = > 0x00000000000000000000000000000000 > (26979) Mon Nov 2 15:39:12 2020: Debug: State = > 0xec639e88e47787f4b03ecf40bb262f03 > (26979) Mon Nov 2 15:39:12 2020: Debug: Proxy-State = 0x313037 > (26979) Mon Nov 2 15:39:12 2020: Debug: Finished request > > On Fri, Oct 30, 2020 at 5:36 PM Fabrice Durand <fdur...@inverse.ca> wrote: > >> At least when you try to connect ... >> >> >> Le 20-10-30 à 06 h 37, Sonali Gulia a écrit : >> >> hi Durand fabrice >> >> here is the result of raddebug -f /usr/local/pf/var/run/radiusd.sock -t >> 3000 >> >> (10522) Fri Oct 30 21:32:00 2020: Debug: Received Status-Server Id 97 >> from 127.0.0.1:51783 to 127.0.0.1:18121 length 50 >> (10522) Fri Oct 30 21:32:00 2020: Debug: Message-Authenticator = >> 0x595be7422b20bffc2fd6282691eb1b4e >> (10522) Fri Oct 30 21:32:00 2020: Debug: FreeRADIUS-Statistics-Type = 15 >> (10522) Fri Oct 30 21:32:00 2020: Debug: # Executing group from file >> /usr/local/pf/raddb/sites-enabled/status >> (10522) Fri Oct 30 21:32:00 2020: Debug: Autz-Type Status-Server { >> (10522) Fri Oct 30 21:32:00 2020: Debug: [ok] = ok >> (10522) Fri Oct 30 21:32:00 2020: Debug: } # Autz-Type Status-Server = >> ok >> (10522) Fri Oct 30 21:32:00 2020: Debug: Sent Access-Accept Id 97 from >> 127.0.0.1:18121 to 127.0.0.1:51783 length 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Access-Requests = 10523 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Access-Accepts = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Access-Rejects = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Access-Challenges = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Auth-Responses = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Auth-Duplicate-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Auth-Malformed-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Auth-Invalid-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Auth-Dropped-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Auth-Unknown-Types = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Accounting-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Accounting-Responses = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Acct-Duplicate-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Acct-Malformed-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Acct-Invalid-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Acct-Dropped-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Acct-Unknown-Types = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Accepts = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Rejects = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Challenges = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Responses = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Accounting-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Accounting-Responses = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 >> (10522) Fri Oct 30 21:32:00 2020: Debug: Finished request >> (10522) Fri Oct 30 21:32:05 2020: Debug: Cleaning up request packet ID 97 >> with timestamp +157883 >> (10523) Fri Oct 30 21:32:15 2020: Debug: Received Status-Server Id 71 >> from 127.0.0.1:43289 to 127.0.0.1:18121 length 50 >> (10523) Fri Oct 30 21:32:15 2020: Debug: Message-Authenticator = >> 0x2e1611a2cb839f02f01df0ab302f9062 >> (10523) Fri Oct 30 21:32:15 2020: Debug: FreeRADIUS-Statistics-Type = 15 >> (10523) Fri Oct 30 21:32:15 2020: Debug: # Executing group from file >> /usr/local/pf/raddb/sites-enabled/status >> (10523) Fri Oct 30 21:32:15 2020: Debug: Autz-Type Status-Server { >> (10523) Fri Oct 30 21:32:15 2020: Debug: [ok] = ok >> (10523) Fri Oct 30 21:32:15 2020: Debug: } # Autz-Type Status-Server = >> ok >> (10523) Fri Oct 30 21:32:15 2020: Debug: Sent Access-Accept Id 71 from >> 127.0.0.1:18121 to 127.0.0.1:43289 length 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Access-Requests = 10524 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Access-Accepts = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Access-Rejects = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Access-Challenges = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Auth-Responses = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Auth-Duplicate-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Auth-Malformed-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Auth-Invalid-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Auth-Dropped-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Auth-Unknown-Types = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Accounting-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Accounting-Responses = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Acct-Duplicate-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Acct-Malformed-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Acct-Invalid-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Acct-Dropped-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Acct-Unknown-Types = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Accepts = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Rejects = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Challenges = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Responses = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Accounting-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Accounting-Responses = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 >> (10523) Fri Oct 30 21:32:15 2020: Debug: Finished request >> (10523) Fri Oct 30 21:32:20 2020: Debug: Cleaning up request packet ID 71 >> with timestamp +157898 >> (10524) Fri Oct 30 21:32:30 2020: Debug: Received Status-Server Id 111 >> from 127.0.0.1:38982 to 127.0.0.1:18121 length 50 >> (10524) Fri Oct 30 21:32:30 2020: Debug: Message-Authenticator = >> 0xbd1505f5fab60879f23b35b68b69b8a1 >> (10524) Fri Oct 30 21:32:30 2020: Debug: FreeRADIUS-Statistics-Type = 15 >> (10524) Fri Oct 30 21:32:30 2020: Debug: # Executing group from file >> /usr/local/pf/raddb/sites-enabled/status >> (10524) Fri Oct 30 21:32:30 2020: Debug: Autz-Type Status-Server { >> (10524) Fri Oct 30 21:32:30 2020: Debug: [ok] = ok >> (10524) Fri Oct 30 21:32:30 2020: Debug: } # Autz-Type Status-Server = >> ok >> (10524) Fri Oct 30 21:32:30 2020: Debug: Sent Access-Accept Id 111 from >> 127.0.0.1:18121 to 127.0.0.1:38982 length 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Access-Requests = 10525 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Access-Accepts = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Access-Rejects = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Access-Challenges = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Auth-Responses = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Auth-Duplicate-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Auth-Malformed-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Auth-Invalid-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Auth-Dropped-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Auth-Unknown-Types = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Accounting-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Accounting-Responses = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Acct-Duplicate-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Acct-Malformed-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Acct-Invalid-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Acct-Dropped-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Acct-Unknown-Types = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Accepts = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Rejects = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Access-Challenges = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Responses = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Accounting-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Accounting-Responses = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: >> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 >> (10524) Fri Oct 30 21:32:30 2020: Debug: Finished request >> (10524) Fri Oct 30 21:32:35 2020: Debug: Cleaning up request packet ID >> 111 with timestamp +157913 >> >> >> >> On Fri, Oct 30, 2020 at 6:33 AM Durand fabrice via PacketFence-users < >> packetfence-users@lists.sourceforge.net> wrote: >> >>> Hello Sonila, >>> >>> can you provide a raddebug ? >>> >>> raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000 >>> >>> Regards >>> >>> Fabrice >>> >>> >>> Le 20-10-28 à 09 h 22, Sonali Gulia via PacketFence-users a écrit : >>> >>> Hi all in new version of pf 10.2.0 eap gtc sub module failed . While in >>> previous version it was working fine do any one lnow any solution >>> >>> _______________________________________________ >>> PacketFence-users mailing >>> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users >>> >>> _______________________________________________ >>> PacketFence-users mailing list >>> PacketFence-users@lists.sourceforge.net >>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>> >> -- >> Fabrice durandfdur...@inverse.ca :: +1.514.447.4918 (x135) :: >> www.inverse.ca >> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >> (http://packetfence.org) >> >> -- > Fabrice durandfdur...@inverse.ca :: +1.514.447.4918 (x135) :: www.inverse.ca > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence > (http://packetfence.org) > >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users