The simplest way to see what is not working is probably to compare the request that works and the one who not.

Because right now in the debug there is no call to ldap and or sql.

Regards

Fabrice


Le 20-11-03 à 08 h 58, Sonali Gulia a écrit :
Hi

We are using ldap module but i also try sql nothing works. Same config was working fine with previous version

On Tue, 3 Nov 2020 at 7:23 PM, Fabrice Durand <fdur...@inverse.ca <mailto:fdur...@inverse.ca>> wrote:

    Hello Sonali,

    your issue looks to be because there is no module before that set
    the "known good" password in the request.

    Where is stored the password ? (ldap/sql/...)

    Regards

    Fabrice


    Le 20-11-02 à 22 h 46, Sonali Gulia a écrit :


    hi

    Hi all in new version of pf 10.2.0 eap gtc sub module failed .
    While in previous version it was working fine plz help

    here is the result of raddebug -f
    /usr/local/pf/var/run/radiusd.sock -t 3000'

    i changed my  personal details with
    my_username
    my_user_device_mac
    my_switch_ip
    my_server_ip
    my_switch_mac
    my_cluster_managment_ip

    also highlight the error in logs .


    (26979) Mon Nov  2 15:39:12 2020: Debug: # Executing group from
    file /usr/local/pf/raddb/sites-enabled/packetfence
    (26979) Mon Nov  2 15:39:12 2020: Debug: authenticate {
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Expiring EAP
    session with state 0xddba5edfdca958cb
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Finished EAP
    session with state 0xec639e88eb7087f4
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Previous EAP
    request found for state 0xec639e88eb7087f4, released from the list
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent packet
    with method EAP PEAP (25)
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Calling submodule
    eap_peap to process data
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Continuing EAP-TLS
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: [eaptls
    verify] = ok
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Done initial
    handshake
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: [eaptls
    process] = ok
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Session
    established.  Decoding tunneled attributes
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: PEAP state phase2
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: EAP method GTC (6)
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Got tunneled
    request
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   EAP-Message
    = 0x0213000f0642726561746853473240
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Setting
    User-Name to my_username
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Sending
    tunneled request to packetfence-tunnel
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   EAP-Message
    = 0x0213000f0642726561746853473240
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:  
    FreeRADIUS-Proxied-To = 127.0.0.1
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   User-Name =
    "myusername"
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   State =
    0xddba5edfdca958cb96d4c517e9bc660c
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Service-Type
    = Framed-User
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Cisco-AVPair
    = "service-type=Framed"
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Cisco-AVPair
    = "audit-session-id=0A0115170000000D005BC4FA"
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Cisco-AVPair
    = "method=dot1x"
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   Framed-MTU =
    1500
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:  
    Calling-Station-Id := "my_user_device_mac"
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:  
    NAS-IP-Address = my_switch_ip
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   NAS-Port-Id
    = "GigabitEthernet1/0/1"
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:  
    NAS-Port-Type = Ethernet
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   NAS-Port = 50101
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:  
    PacketFence-KeyBalanced := "99a990b22af7d7ca016a27643cd35a1e"
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:  
    PacketFence-Radius-Ip := "my_server_ip"
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:  
    Called-Station-Id := "my_switch_mac"
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:  
    Event-Timestamp = "Nov  2 2020 15:39:12 IST"
    (26979) Mon Nov  2 15:39:12 2020: Debug: Virtual server
    packetfence-tunnel received request
    (26979) Mon Nov  2 15:39:12 2020: Debug: EAP-Message =
    0x0213000f0642726561746853473240
    (26979) Mon Nov  2 15:39:12 2020: Debug: FreeRADIUS-Proxied-To =
    127.0.0.1
    (26979) Mon Nov  2 15:39:12 2020: Debug: User-Name = "myusername"
    (26979) Mon Nov  2 15:39:12 2020: Debug:   State =
    0xddba5edfdca958cb96d4c517e9bc660c
    (26979) Mon Nov  2 15:39:12 2020: Debug: Service-Type = Framed-User
    (26979) Mon Nov  2 15:39:12 2020: Debug: Cisco-AVPair =
    "service-type=Framed"
    (26979) Mon Nov  2 15:39:12 2020: Debug: Cisco-AVPair =
    "audit-session-id=0A0115170000000D005BC4FA"
    (26979) Mon Nov  2 15:39:12 2020: Debug: Cisco-AVPair =
    "method=dot1x"
    (26979) Mon Nov  2 15:39:12 2020: Debug: Framed-MTU = 1500
    (26979) Mon Nov  2 15:39:12 2020: Debug: Calling-Station-Id :=
    "my_user_device_mac"
    (26979) Mon Nov  2 15:39:12 2020: Debug: NAS-IP-Address =
    my_switch_ip
    (26979) Mon Nov  2 15:39:12 2020: Debug: NAS-Port-Id =
    "GigabitEthernet1/0/1"
    (26979) Mon Nov  2 15:39:12 2020: Debug: NAS-Port-Type = Ethernet
    (26979) Mon Nov  2 15:39:12 2020: Debug: NAS-Port = 50101
    (26979) Mon Nov  2 15:39:12 2020: Debug: PacketFence-KeyBalanced
    := "99a990b22af7d7ca016a27643cd35a1e"
    (26979) Mon Nov  2 15:39:12 2020: Debug: PacketFence-Radius-Ip :=
    "my_server_ip"
    (26979) Mon Nov  2 15:39:12 2020: Debug: Called-Station-Id :=
    "my_switch_mac"
    (26979) Mon Nov  2 15:39:12 2020: Debug: Event-Timestamp = "Nov
     2 2020 15:39:12 IST"
    (26979) Mon Nov  2 15:39:12 2020: Debug: server packetfence-tunnel {
    (26979) Mon Nov  2 15:39:12 2020: Debug: session-state: No cached
    attributes
    (26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing section
    authorize from file
    /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
    (26979) Mon Nov  2 15:39:12 2020: Debug: authorize {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if ( outer.EAP-Type ==
    TTLS) {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if ( outer.EAP-Type ==
    TTLS)  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug: policy
    packetfence-set-realm-if-machine {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (User-Name =~
    /host\/([a-z0-9_-]*)[\.](.*)/i) {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (User-Name =~
    /host\/([a-z0-9_-]*)[\.](.*)/i)  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
    packetfence-set-realm-if-machine = notfound
    (26979) Mon Nov  2 15:39:12 2020: Debug: policy
    packetfence-set-tenant-id {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (!NAS-IP-Address ||
    NAS-IP-Address == "0.0.0.0"){
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (!NAS-IP-Address ||
    NAS-IP-Address == "0.0.0.0") -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (
    "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
    (26979) Mon Nov  2 15:39:12 2020: Debug: EXPAND
    %{%{control:PacketFence-Tenant-Id}:-0}
    (26979) Mon Nov  2 15:39:12 2020: Debug:    --> 0
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (
    "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (
    "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   update control {
    (26979) Mon Nov  2 15:39:12 2020: Debug:     EXPAND %{User-Name}
    (26979) Mon Nov  2 15:39:12 2020: Debug:        --> my_username
    (26979) Mon Nov  2 15:39:12 2020: Debug:     SQL-User-Name set to
    'myusername'
    (26979) Mon Nov  2 15:39:12 2020: Debug:     Executing select
    query:  SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE
    nasname = 'my_switch_ip'), 0)
    (26979) Mon Nov  2 15:39:12 2020: Debug:     EXPAND %{sql: SELECT
    IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
    '%{NAS-IP-Address}'), 0)}
    (26979) Mon Nov  2 15:39:12 2020: Debug:        --> 1
    (26979) Mon Nov  2 15:39:12 2020: Debug:   } # update control = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: } # if (
    "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (
    &control:PacketFence-Tenant-Id == 0 ) {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (
    &control:PacketFence-Tenant-Id == 0 )  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
    packetfence-set-tenant-id = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: policy filter_username {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (&User-Name) {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (&User-Name)  -> TRUE
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (&User-Name)  {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if (&User-Name =~ / /) {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if (&User-Name =~ / /)
     -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if (&User-Name =~
    /@[^@]*@/ ) {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if (&User-Name =~
    /@[^@]*@/ )  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if (&User-Name =~
    /\.\./ ) {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if (&User-Name =~
    /\.\./ )  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if ((&User-Name =~
    /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if ((&User-Name =~
    /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if (&User-Name =~
    /\.$/)  {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if (&User-Name =~
    /\.$/)   -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if (&User-Name =~
    /@\./)  {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if (&User-Name =~
    /@\./)   -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug: } # if (&User-Name)  = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
    filter_username = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: update {
    (26979) Mon Nov  2 15:39:12 2020: Debug: EXPAND
    %{outer.request:User-Name}
    (26979) Mon Nov  2 15:39:12 2020: Debug:    --> anonymous
    (26979) Mon Nov  2 15:39:12 2020: Debug:       } # update = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: [mschap] = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: suffix: Checking for
    suffix after "@"
    (26979) Mon Nov  2 15:39:12 2020: Debug: suffix: No '@' in
    User-Name = "myusername", skipping NULL due to config.
    (26979) Mon Nov  2 15:39:12 2020: Debug: [suffix] = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Checking for
    prefix before "\"
    (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: No '\' in
    User-Name = "myusername", looking up realm NULL
    (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Found realm "null"
    (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Adding
    Stripped-User-Name = "myusername"
    (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Adding Realm =
    "null"
    (26979) Mon Nov  2 15:39:12 2020: Debug: ntdomain: Authentication
    realm is LOCAL
    (26979) Mon Nov  2 15:39:12 2020: Debug: [ntdomain] = ok
    (26979) Mon Nov  2 15:39:12 2020: Debug: update control {
    (26979) Mon Nov  2 15:39:12 2020: Debug:       } # update control
    = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent EAP
    Response (code 2) ID 19 length 15
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: No EAP Start,
    assuming it's an on-going EAP conversation
    (26979) Mon Nov  2 15:39:12 2020: Debug: [eap] = updated
    (26979) Mon Nov  2 15:39:12 2020: Debug: policy
    rewrite_called_station_id {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if ((&Called-Station-Id)
    && (&Called-Station-Id =~
    
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
    {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if ((&Called-Station-Id)
    && (&Called-Station-Id =~
    
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
     -> TRUE
    (26979) Mon Nov  2 15:39:12 2020: Debug: if ((&Called-Station-Id)
    && (&Called-Station-Id =~
    
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
     {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   update request {
    (26979) Mon Nov  2 15:39:12 2020: Debug:     EXPAND
    %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
    (26979) Mon Nov  2 15:39:12 2020: Debug:        --> my_switch_mac
    (26979) Mon Nov  2 15:39:12 2020: Debug:   } # update request = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if ("%{8}") {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   EXPAND %{8}
    (26979) Mon Nov  2 15:39:12 2020: Debug:      -->
    (26979) Mon Nov  2 15:39:12 2020: Debug:   if ("%{8}")  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:   elsif (
    (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   elsif (
    (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i)  ->
    FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:   elsif (Aruba-Essid-Name) {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   elsif
    (Aruba-Essid-Name)  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:   elsif ( (Cisco-AVPair)
     && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   EXPAND %{Cisco-AVPair}
    (26979) Mon Nov  2 15:39:12 2020: Debug:      --> service-type=Framed
    (26979) Mon Nov  2 15:39:12 2020: Debug:   elsif ( (Cisco-AVPair)
     && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:   [updated] = updated
    (26979) Mon Nov  2 15:39:12 2020: Debug: } # if
    ((&Called-Station-Id) && (&Called-Station-Id =~
    
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
     = updated
    (26979) Mon Nov  2 15:39:12 2020: Debug: ... skipping else:
    Preceding "if" was taken
    (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
    rewrite_called_station_id = updated
    (26979) Mon Nov  2 15:39:12 2020: Debug: [pap] = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug:     } # authorize = updated
    (26979) Mon Nov  2 15:39:12 2020: WARNING:   You set
    Proxy-To-Realm = local, but it is a LOCAL realm!  Cancelling
    proxy request.
    (26979) Mon Nov  2 15:39:12 2020: Debug:   Found Auth-Type = eap
    (26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing group from
    file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
    (26979) Mon Nov  2 15:39:12 2020: Debug: authenticate {
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Expiring EAP
    session with state 0xddba5edfdca958cb
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Finished EAP
    session with state 0xddba5edfdca958cb
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Previous EAP
    request found for state 0xddba5edfdca958cb, released from the list
    _*(26979) Mon Nov  2 15:39:12 2020: Debug: eap: Peer sent packet
    with method EAP GTC (6)
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Calling submodule
    eap_gtc to process data
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc: # Executing
    group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc:   Auth-Type PAP {
    (26979) Mon Nov  2 15:39:12 2020: Debug: pap: Login attempt with
    password
    (26979) Mon Nov  2 15:39:12 2020: Debug: pap: No password
    configured for the user. Cannot do authentication
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc:     [pap] = fail
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_gtc:   } # Auth-Type
    PAP = fail
    (26979) Mon Nov  2 15:39:12 2020: ERROR: eap: Failed continuing
    EAP GTC (6) session.  EAP sub-module failed
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Sending EAP Failure
    (code 4) ID 19 length 4*_
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Failed in EAP select
    (26979) Mon Nov  2 15:39:12 2020: Debug: [eap] = invalid
    (26979) Mon Nov  2 15:39:12 2020: Debug:     } # authenticate =
    invalid
    (26979) Mon Nov  2 15:39:12 2020: Debug: Failed to authenticate
    the user
    (26979) Mon Nov  2 15:39:12 2020: Debug:   Using Post-Auth-Type
    Reject
    (26979) Mon Nov  2 15:39:12 2020: Debug:   # Executing group from
    file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
    (26979) Mon Nov  2 15:39:12 2020: Debug: Post-Auth-Type REJECT {
    (26979) Mon Nov  2 15:39:12 2020: Debug: policy
    packetfence-set-tenant-id {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (!NAS-IP-Address ||
    NAS-IP-Address == "0.0.0.0"){
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (!NAS-IP-Address ||
    NAS-IP-Address == "0.0.0.0") -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (
    "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
    (26979) Mon Nov  2 15:39:12 2020: Debug: EXPAND
    %{%{control:PacketFence-Tenant-Id}:-0}
    (26979) Mon Nov  2 15:39:12 2020: Debug:    --> 1
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (
    "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (
    &control:PacketFence-Tenant-Id == 0 ) {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (
    &control:PacketFence-Tenant-Id == 0 )  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
    packetfence-set-tenant-id = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: update {
    (26979) Mon Nov  2 15:39:12 2020: Debug:       } # update = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: policy
    packetfence-audit-log-reject {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (&User-Name &&
    (&User-Name == "dummy")) {
    (26979) Mon Nov  2 15:39:12 2020: Debug: if (&User-Name &&
    (&User-Name == "dummy"))  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug: else {
    (26979) Mon Nov  2 15:39:12 2020: Debug:   policy request-timing {
    (26979) Mon Nov  2 15:39:12 2020: Debug:     if
    ("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
    (26979) Mon Nov  2 15:39:12 2020: Debug:     EXPAND
    %{%{control:PacketFence-Request-Time}:-0}
    (26979) Mon Nov  2 15:39:12 2020: Debug:        --> 0
    (26979) Mon Nov  2 15:39:12 2020: Debug:     if
    ("%{%{control:PacketFence-Request-Time}:-0}" != 0)  -> FALSE
    (26979) Mon Nov  2 15:39:12 2020: Debug:   } # policy
    request-timing = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND
    type.reject.query
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:    -->
    type.reject.query
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: Using query
    template 'query'
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND
    %{User-Name}
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:    -->
    my_username
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:
    SQL-User-Name set to 'myusername'
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: EXPAND
    INSERT INTO radius_audit_log               ( mac, ip,
    computer_name, user_name,                stripped_user_name,
     realm, event_type,                switch_id, switch_mac,
    switch_ip_address,  radius_source_ip_address, called_station_id,
    calling_station_id,  nas_port_type, ssid, nas_port_id,  ifindex,
    nas_port, connection_type,    nas_ip_address, nas_identifier,
    auth_status,                reason, auth_type, eap_type,        
       role, node_status, profile,      source, auto_reg, is_phone,
     pf_domain, uuid, radius_request,  radius_reply, request_time,
    tenant_id, radius_ip)              VALUES               (
    '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
    '%{%{control:PacketFence-Computer-Name}:-N/A}',
    '%{request:User-Name}',  '%{request:Stripped-User-Name}',
    '%{request:Realm}', 'Radius-Access-Request',
     '%{%{control:PacketFence-Switch-Id}:-N/A}',
    '%{%{control:PacketFence-Switch-Mac}:-N/A}',
    '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',              
     '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
    '%{request:Calling-Station-Id}',  '%{request:NAS-Port-Type}',
    '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
     '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
    '%{%{control:PacketFence-Connection-Type}:-N/A}',              
     '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',
     'Reject',         '%{request:Module-Failure-Message}',
    '%{control:Auth-Type}', '%{request:EAP-Type}',
     '%{%{control:PacketFence-Role}:-N/A}',
    '%{%{control:PacketFence-Status}:-N/A}',
    '%{%{control:PacketFence-Profile}:-N/A}',
     '%{%{control:PacketFence-Source}:-N/A}',
    '%{%{control:PacketFence-AutoReg}:-0}',
    '%{%{control:PacketFence-IsPhone}:-0}',      
     '%{request:PacketFence-Domain}', '',
    '%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
    '%{%{control:PacketFence-Request-Time}:-N/A}',
    '%{control:PacketFence-Tenant-Id}',
    '%{request:PacketFence-Radius-Ip}')
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject:    -->
    INSERT INTO radius_audit_log               ( mac, ip,
    computer_name, user_name,  stripped_user_name,  realm,
    event_type,        switch_id, switch_mac, switch_ip_address,    
               radius_source_ip_address, called_station_id,
    calling_station_id,      nas_port_type, ssid, nas_port_id,    
     ifindex, nas_port, connection_type,        nas_ip_address,
    nas_identifier, auth_status,                reason, auth_type,
    eap_type,                role, node_status, profile,            
       source, auto_reg, is_phone,                pf_domain, uuid,
    radius_request,                radius_reply, request_time,
    tenant_id, radius_ip)  VALUES   ��           (
    'my_user_device_mac', '', 'N/A', 'myusername',  'myusername',
    'null', 'Radius-Access-Request',                'N/A', 'N/A',
    'N/A',    'my_cluster_managment_ip', 'my_switch_mac',
    'my_user_device_mac',                'Ethernet', '',
    'GigabitEthernet1/0/1',  'N/A', '50101', 'N/A',  'my_switch_ip',
    '',  'Reject', 'eap: Failed continuing EAP GTC (6) session. EAP
    sub-module failed', 'eap', 'GTC',      'N/A', 'N/A', 'N/A',      
             'N/A', '0', '0',                '', '', 'EAP-Message =3D
    0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D
    127.0.0.1, User-Name =3D =22myusername=22, State =3D
    0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User,
    Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D
    =22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair
    =3D =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id
    =3D =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip,
    NAS-Port-Id =3D =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D
    Ethernet, NAS-Port =3D 50101, PacketFence-KeyBalanced =3D
    =2299a990b22af7d7ca016a27643cd35a1e=22, PacketFence-Radius-Ip =3D
    =22my_server_ip=22, Event-Timestamp =3D =22Nov  2 2020 15:39:12
    IST=22, PacketFence-Outer-User =3D =22anonymous=22,
    Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22,
    EAP-Type =3D GTC, Called-Station-Id =3D =22my_switch_mac=22,
    User-Password =3D =22=2A=2A=2A=2A=2A=2A=22,
    Module-Failure-Message =3D =22eap: Failed continuing EAP GTC (6)
    session.  EAP sub-module failed=22, SQL-User-Name =3D
    =22myusername=22','EAP-Message =3D 0x04130004,
    Message-Authenticator =3D 0x00000000000000000000000000000000',
    'N/A', '1', 'my_server_ip')
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: Executing
    query: INSERT INTO radius_audit_log               ( mac, ip,
    computer_name, user_name,  stripped_user_name,  realm,
    event_type,        switch_id, switch_mac, switch_ip_address,    
               radius_source_ip_address, called_station_id,
    calling_station_id,      nas_port_type, ssid, nas_port_id,    
     ifindex, nas_port, connection_type,        nas_ip_address,
    nas_identifier, auth_status,                reason, auth_type,
    eap_type,                role, node_status, profile,            
       source, auto_reg, is_phone,                pf_domain, uuid,
    radius_request,                radius_reply, request_time,
    tenant_id, radius_ip)  VALUES               (
    'my_user_device_mac', '', 'N/A', 'myusername',  'myusername',
    'null', 'Radius-Access-Request',                'N/A', 'N/A',
    'N/A',    'my_cluster_managment_ip', 'my_switch_mac',
    'my_user_device_mac',                'Ethernet', '',
    'GigabitEthernet1/0/1',  'N/A', '50101', 'N/A',  'my_switch_ip',
    '',  'Reject', 'eap: Failed continuing EAP GTC (6) session. EAP
    sub-module failed', 'eap', 'GTC',      'N/A', 'N/A', 'N/A',      
             'N/A', '0', '0',                '', '', 'EAP-Message =3D
    0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D
    127.0.0.1, User-Name =3D =22myusername=22, State =3D
    0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User,
    Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D
    =22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair
    =3D =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id
    =3D =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip,
    NAS-Port-Id =3D =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D
    Ethernet, NAS-Port =3D 50101, PacketFence-KeyBalanced =3D
    =2299a990b22af7d7ca016a27643cd35a1e=22, PacketFence-Radius-Ip =3D
    =22my_server_ip=22, Event-Timestamp =3D =22Nov  2 2020 15:39:12
    IST=22, PacketFence-Outer-User =3D =22anonymous=22,
    Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22,
    EAP-Type =3D GTC, Called-Station-Id =3D =22my_switch_mac=22,
    User-Password =3D =22=2A=2A=2A=2A=2A=2A=22,
    Module-Failure-Message =3D =22eap: Failed continuing EAP GTC (6)
    session.  EAP sub-module failed=22, SQL-User-Name =3D
    =22myusername=22','EAP-Message =3D 0x04130004,
    Message-Authenticator =3D 0x00000000000000000000000000000000',
    'N/A', '1', 'my_server_ip')
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: SQL query
    returned: success
    (26979) Mon Nov  2 15:39:12 2020: Debug: sql_reject: 1 record(s)
    updated
    (26979) Mon Nov  2 15:39:12 2020: Debug:   [sql_reject] = ok
    (26979) Mon Nov  2 15:39:12 2020: Debug: } # else = ok
    (26979) Mon Nov  2 15:39:12 2020: Debug:       } # policy
    packetfence-audit-log-reject = ok
    (26979) Mon Nov  2 15:39:12 2020: Debug:
    attr_filter.access_reject: EXPAND %{User-Name}
    (26979) Mon Nov  2 15:39:12 2020: Debug:
    attr_filter.access_reject:    --> my_username
    (26979) Mon Nov  2 15:39:12 2020: Debug:
    attr_filter.access_reject: Matched entry DEFAULT at line 11
    (26979) Mon Nov  2 15:39:12 2020: Debug:
    [attr_filter.access_reject] = updated
    (26979) Mon Nov  2 15:39:12 2020: Debug: update outer.session-state {
    (26979) Mon Nov  2 15:39:12 2020: Debug:       } # update
    outer.session-state = noop
    (26979) Mon Nov  2 15:39:12 2020: Debug:     } # Post-Auth-Type
    REJECT = updated
    (26979) Mon Nov  2 15:39:12 2020: Debug: } # server
    packetfence-tunnel
    (26979) Mon Nov  2 15:39:12 2020: Debug: Virtual server sending reply
    (26979) Mon Nov  2 15:39:12 2020: Debug: EAP-Message = 0x04130004
    (26979) Mon Nov  2 15:39:12 2020: Debug: Message-Authenticator =
    0x00000000000000000000000000000000
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Got tunneled
    reply code 3
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:   EAP-Message
    = 0x04130004
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap:  
    Message-Authenticator = 0x00000000000000000000000000000000
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: Tunneled
    authentication was rejected
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap_peap: FAILURE
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: Sending EAP Request
    (code 1) ID 20 length 46
    (26979) Mon Nov  2 15:39:12 2020: Debug: eap: EAP session adding
    &reply:State = 0xec639e88e47787f4
    (26979) Mon Nov  2 15:39:12 2020: Debug: [eap] = handled
    (26979) Mon Nov  2 15:39:12 2020: Debug:   } # authenticate = handled
    (26979) Mon Nov  2 15:39:12 2020: Debug: Using Post-Auth-Type
    Challenge
    (26979) Mon Nov  2 15:39:12 2020: Debug: Post-Auth-Type
    sub-section not found.  Ignoring.
    (26979) Mon Nov  2 15:39:12 2020: Debug: # Executing group from
    file /usr/local/pf/raddb/sites-enabled/packetfence
    (26979) Mon Nov  2 15:39:12 2020: Debug: session-state: Saving
    cached attributes
    (26979) Mon Nov  2 15:39:12 2020: Debug: TLS-Session-Cipher-Suite
    = "ECDHE-RSA-AES256-GCM-SHA384"
    (26979) Mon Nov  2 15:39:12 2020: Debug: TLS-Session-Version =
    "TLS 1.2"
    (26979) Mon Nov  2 15:39:12 2020: Debug: Module-Failure-Message
    := "eap: Failed continuing EAP GTC (6) session.  EAP sub-module
    failed"
    (26979) Mon Nov  2 15:39:12 2020: Debug: Sent Access-Challenge Id
    231 from my_server_ip:1812 to my_cluster_managment_ip:36588 length 0
    (26979) Mon Nov  2 15:39:12 2020: Debug: EAP-Message =
    
0x0114002e190017030300233ccff76c8dee7ac196cf7561e1ebe6650116f48c3d155209928c145c148ad4ba578e7d
    (26979) Mon Nov  2 15:39:12 2020: Debug: Message-Authenticator =
    0x00000000000000000000000000000000
    (26979) Mon Nov  2 15:39:12 2020: Debug:   State =
    0xec639e88e47787f4b03ecf40bb262f03
    (26979) Mon Nov  2 15:39:12 2020: Debug: Proxy-State = 0x313037
    (26979) Mon Nov  2 15:39:12 2020: Debug: Finished request

    On Fri, Oct 30, 2020 at 5:36 PM Fabrice Durand
    <fdur...@inverse.ca <mailto:fdur...@inverse.ca>> wrote:

        At least when you try to connect ...


        Le 20-10-30 à 06 h 37, Sonali Gulia a écrit :
        hi Durand fabrice

        here is the result of raddebug -f
        /usr/local/pf/var/run/radiusd.sock -t 3000

        (10522) Fri Oct 30 21:32:00 2020: Debug: Received
        Status-Server Id 97 from 127.0.0.1:51783
        <http://127.0.0.1:51783> to 127.0.0.1:18121
        <http://127.0.0.1:18121> length 50
        (10522) Fri Oct 30 21:32:00 2020: Debug:  
        Message-Authenticator = 0x595be7422b20bffc2fd6282691eb1b4e
        (10522) Fri Oct 30 21:32:00 2020: Debug:  
        FreeRADIUS-Statistics-Type = 15
        (10522) Fri Oct 30 21:32:00 2020: Debug: # Executing group
        from file /usr/local/pf/raddb/sites-enabled/status
        (10522) Fri Oct 30 21:32:00 2020: Debug:   Autz-Type
        Status-Server {
        (10522) Fri Oct 30 21:32:00 2020: Debug:     [ok] = ok
        (10522) Fri Oct 30 21:32:00 2020: Debug:   } # Autz-Type
        Status-Server = ok
        (10522) Fri Oct 30 21:32:00 2020: Debug: Sent Access-Accept
        Id 97 from 127.0.0.1:18121 <http://127.0.0.1:18121> to
        127.0.0.1:51783 <http://127.0.0.1:51783> length 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Access-Requests = 10523
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Access-Accepts = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Access-Rejects = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Access-Challenges = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Auth-Responses = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Auth-Duplicate-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Auth-Malformed-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Auth-Invalid-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Auth-Dropped-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Auth-Unknown-Types = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Accounting-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Accounting-Responses = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Acct-Duplicate-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Acct-Malformed-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Acct-Invalid-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Acct-Dropped-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Acct-Unknown-Types = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Accepts = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Rejects = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Challenges = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Responses = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Accounting-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Accounting-Responses = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
        (10522) Fri Oct 30 21:32:00 2020: Debug: Finished request
        (10522) Fri Oct 30 21:32:05 2020: Debug: Cleaning up request
        packet ID 97 with timestamp +157883
        (10523) Fri Oct 30 21:32:15 2020: Debug: Received
        Status-Server Id 71 from 127.0.0.1:43289
        <http://127.0.0.1:43289> to 127.0.0.1:18121
        <http://127.0.0.1:18121> length 50
        (10523) Fri Oct 30 21:32:15 2020: Debug:  
        Message-Authenticator = 0x2e1611a2cb839f02f01df0ab302f9062
        (10523) Fri Oct 30 21:32:15 2020: Debug:  
        FreeRADIUS-Statistics-Type = 15
        (10523) Fri Oct 30 21:32:15 2020: Debug: # Executing group
        from file /usr/local/pf/raddb/sites-enabled/status
        (10523) Fri Oct 30 21:32:15 2020: Debug:   Autz-Type
        Status-Server {
        (10523) Fri Oct 30 21:32:15 2020: Debug:     [ok] = ok
        (10523) Fri Oct 30 21:32:15 2020: Debug:   } # Autz-Type
        Status-Server = ok
        (10523) Fri Oct 30 21:32:15 2020: Debug: Sent Access-Accept
        Id 71 from 127.0.0.1:18121 <http://127.0.0.1:18121> to
        127.0.0.1:43289 <http://127.0.0.1:43289> length 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Access-Requests = 10524
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Access-Accepts = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Access-Rejects = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Access-Challenges = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Auth-Responses = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Auth-Duplicate-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Auth-Malformed-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Auth-Invalid-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Auth-Dropped-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Auth-Unknown-Types = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Accounting-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Accounting-Responses = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Acct-Duplicate-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Acct-Malformed-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Acct-Invalid-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Acct-Dropped-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Acct-Unknown-Types = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Accepts = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Rejects = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Challenges = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Responses = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Accounting-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Accounting-Responses = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
        (10523) Fri Oct 30 21:32:15 2020: Debug: Finished request
        (10523) Fri Oct 30 21:32:20 2020: Debug: Cleaning up request
        packet ID 71 with timestamp +157898
        (10524) Fri Oct 30 21:32:30 2020: Debug: Received
        Status-Server Id 111 from 127.0.0.1:38982
        <http://127.0.0.1:38982> to 127.0.0.1:18121
        <http://127.0.0.1:18121> length 50
        (10524) Fri Oct 30 21:32:30 2020: Debug:  
        Message-Authenticator = 0xbd1505f5fab60879f23b35b68b69b8a1
        (10524) Fri Oct 30 21:32:30 2020: Debug:  
        FreeRADIUS-Statistics-Type = 15
        (10524) Fri Oct 30 21:32:30 2020: Debug: # Executing group
        from file /usr/local/pf/raddb/sites-enabled/status
        (10524) Fri Oct 30 21:32:30 2020: Debug:   Autz-Type
        Status-Server {
        (10524) Fri Oct 30 21:32:30 2020: Debug:     [ok] = ok
        (10524) Fri Oct 30 21:32:30 2020: Debug:   } # Autz-Type
        Status-Server = ok
        (10524) Fri Oct 30 21:32:30 2020: Debug: Sent Access-Accept
        Id 111 from 127.0.0.1:18121 <http://127.0.0.1:18121> to
        127.0.0.1:38982 <http://127.0.0.1:38982> length 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Access-Requests = 10525
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Access-Accepts = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Access-Rejects = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Access-Challenges = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Auth-Responses = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Auth-Duplicate-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Auth-Malformed-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Auth-Invalid-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Auth-Dropped-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Auth-Unknown-Types = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Accounting-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Accounting-Responses = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Acct-Duplicate-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Acct-Malformed-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Acct-Invalid-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Acct-Dropped-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Acct-Unknown-Types = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Accepts = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Rejects = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Access-Challenges = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Responses = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Accounting-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Accounting-Responses = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug:
        FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
        (10524) Fri Oct 30 21:32:30 2020: Debug: Finished request
        (10524) Fri Oct 30 21:32:35 2020: Debug: Cleaning up request
        packet ID 111 with timestamp +157913



        On Fri, Oct 30, 2020 at 6:33 AM Durand fabrice via
        PacketFence-users <packetfence-users@lists.sourceforge.net
        <mailto:packetfence-users@lists.sourceforge.net>> wrote:

            Hello Sonila,

            can you provide a raddebug ?

            raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000

            Regards

            Fabrice


            Le 20-10-28 à 09 h 22, Sonali Gulia via
            PacketFence-users a écrit :
            Hi all in new version of pf 10.2.0 eap gtc sub module
            failed . While in previous version it was working fine
            do any one lnow any solution


            _______________________________________________
            PacketFence-users mailing list
            PacketFence-users@lists.sourceforge.net  
<mailto:PacketFence-users@lists.sourceforge.net>
            https://lists.sourceforge.net/lists/listinfo/packetfence-users
            _______________________________________________
            PacketFence-users mailing list
            PacketFence-users@lists.sourceforge.net
            <mailto:PacketFence-users@lists.sourceforge.net>
            https://lists.sourceforge.net/lists/listinfo/packetfence-users

-- Fabrice Durand
        fdur...@inverse.ca  <mailto:fdur...@inverse.ca>  ::  +1.514.447.4918 (x135) 
::www.inverse.ca  <http://www.inverse.ca>
        Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
PacketFence (http://packetfence.org)

-- Fabrice Durand
    fdur...@inverse.ca  <mailto:fdur...@inverse.ca>  ::  +1.514.447.4918 (x135) 
::www.inverse.ca  <http://www.inverse.ca>
    Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)

--
Fabrice Durand
fdur...@inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
(http://packetfence.org)

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to