hi
Hi all in new version of pf 10.2.0 eap gtc sub module failed .
While in previous version it was working fine plz help
here is the result of raddebug -f
/usr/local/pf/var/run/radiusd.sock -t 3000'
i changed my personal details with
my_username
my_user_device_mac
my_switch_ip
my_server_ip
my_switch_mac
my_cluster_managment_ip
also highlight the error in logs .
(26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from
file /usr/local/pf/raddb/sites-enabled/packetfence
(26979) Mon Nov 2 15:39:12 2020: Debug: authenticate {
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Expiring EAP
session with state 0xddba5edfdca958cb
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Finished EAP
session with state 0xec639e88eb7087f4
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Previous EAP
request found for state 0xec639e88eb7087f4, released from the list
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent packet
with method EAP PEAP (25)
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Calling submodule
eap_peap to process data
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Continuing EAP-TLS
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: [eaptls
verify] = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Done initial
handshake
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: [eaptls
process] = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Session
established. Decoding tunneled attributes
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: PEAP state phase2
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP method GTC (6)
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Got tunneled
request
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message
= 0x0213000f0642726561746853473240
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Setting
User-Name to my_username
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Sending
tunneled request to packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message
= 0x0213000f0642726561746853473240
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
FreeRADIUS-Proxied-To = 127.0.0.1
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: User-Name =
"myusername"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: State =
0xddba5edfdca958cb96d4c517e9bc660c
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Service-Type
= Framed-User
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair
= "service-type=Framed"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair
= "audit-session-id=0A0115170000000D005BC4FA"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Cisco-AVPair
= "method=dot1x"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Framed-MTU =
1500
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
Calling-Station-Id := "my_user_device_mac"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
NAS-IP-Address = my_switch_ip
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port-Id
= "GigabitEthernet1/0/1"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
NAS-Port-Type = Ethernet
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: NAS-Port = 50101
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
PacketFence-KeyBalanced := "99a990b22af7d7ca016a27643cd35a1e"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
PacketFence-Radius-Ip := "my_server_ip"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
Called-Station-Id := "my_switch_mac"
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
Event-Timestamp = "Nov 2 2020 15:39:12 IST"
(26979) Mon Nov 2 15:39:12 2020: Debug: Virtual server
packetfence-tunnel received request
(26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message =
0x0213000f0642726561746853473240
(26979) Mon Nov 2 15:39:12 2020: Debug: FreeRADIUS-Proxied-To =
127.0.0.1
(26979) Mon Nov 2 15:39:12 2020: Debug: User-Name = "myusername"
(26979) Mon Nov 2 15:39:12 2020: Debug: State =
0xddba5edfdca958cb96d4c517e9bc660c
(26979) Mon Nov 2 15:39:12 2020: Debug: Service-Type = Framed-User
(26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair =
"service-type=Framed"
(26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair =
"audit-session-id=0A0115170000000D005BC4FA"
(26979) Mon Nov 2 15:39:12 2020: Debug: Cisco-AVPair =
"method=dot1x"
(26979) Mon Nov 2 15:39:12 2020: Debug: Framed-MTU = 1500
(26979) Mon Nov 2 15:39:12 2020: Debug: Calling-Station-Id :=
"my_user_device_mac"
(26979) Mon Nov 2 15:39:12 2020: Debug: NAS-IP-Address =
my_switch_ip
(26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port-Id =
"GigabitEthernet1/0/1"
(26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port-Type = Ethernet
(26979) Mon Nov 2 15:39:12 2020: Debug: NAS-Port = 50101
(26979) Mon Nov 2 15:39:12 2020: Debug: PacketFence-KeyBalanced
:= "99a990b22af7d7ca016a27643cd35a1e"
(26979) Mon Nov 2 15:39:12 2020: Debug: PacketFence-Radius-Ip :=
"my_server_ip"
(26979) Mon Nov 2 15:39:12 2020: Debug: Called-Station-Id :=
"my_switch_mac"
(26979) Mon Nov 2 15:39:12 2020: Debug: Event-Timestamp = "Nov
2 2020 15:39:12 IST"
(26979) Mon Nov 2 15:39:12 2020: Debug: server packetfence-tunnel {
(26979) Mon Nov 2 15:39:12 2020: Debug: session-state: No cached
attributes
(26979) Mon Nov 2 15:39:12 2020: Debug: # Executing section
authorize from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: authorize {
(26979) Mon Nov 2 15:39:12 2020: Debug: if ( outer.EAP-Type ==
TTLS) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if ( outer.EAP-Type ==
TTLS) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: policy
packetfence-set-realm-if-machine {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
packetfence-set-realm-if-machine = notfound
(26979) Mon Nov 2 15:39:12 2020: Debug: policy
packetfence-set-tenant-id {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> 0
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(26979) Mon Nov 2 15:39:12 2020: Debug: update control {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{User-Name}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> my_username
(26979) Mon Nov 2 15:39:12 2020: Debug: SQL-User-Name set to
'myusername'
(26979) Mon Nov 2 15:39:12 2020: Debug: Executing select
query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE
nasname = 'my_switch_ip'), 0)
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'%{NAS-IP-Address}'), 0)}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> 1
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update control = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
packetfence-set-tenant-id = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: policy filter_username {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) -> TRUE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ / /) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~ / /)
-> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/@[^@]*@/ ) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/@[^@]*@/ ) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/\.\./ ) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/\.\./ ) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if ((&User-Name =~
/@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if ((&User-Name =~
/@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/\.$/) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/\.$/) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/@\./) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name =~
/@\./) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: } # if (&User-Name) = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
filter_username = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: update {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND
%{outer.request:User-Name}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> anonymous
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: [mschap] = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: suffix: Checking for
suffix after "@"
(26979) Mon Nov 2 15:39:12 2020: Debug: suffix: No '@' in
User-Name = "myusername", skipping NULL due to config.
(26979) Mon Nov 2 15:39:12 2020: Debug: [suffix] = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Checking for
prefix before "\"
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: No '\' in
User-Name = "myusername", looking up realm NULL
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Found realm "null"
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Adding
Stripped-User-Name = "myusername"
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Adding Realm =
"null"
(26979) Mon Nov 2 15:39:12 2020: Debug: ntdomain: Authentication
realm is LOCAL
(26979) Mon Nov 2 15:39:12 2020: Debug: [ntdomain] = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: update control {
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update control
= noop
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent EAP
Response (code 2) ID 19 length 15
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: No EAP Start,
assuming it's an on-going EAP conversation
(26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = updated
(26979) Mon Nov 2 15:39:12 2020: Debug: policy
rewrite_called_station_id {
(26979) Mon Nov 2 15:39:12 2020: Debug: if ((&Called-Station-Id)
&& (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(26979) Mon Nov 2 15:39:12 2020: Debug: if ((&Called-Station-Id)
&& (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> TRUE
(26979) Mon Nov 2 15:39:12 2020: Debug: if ((&Called-Station-Id)
&& (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(26979) Mon Nov 2 15:39:12 2020: Debug: update request {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> my_switch_mac
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update request = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: if ("%{8}") {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{8}
(26979) Mon Nov 2 15:39:12 2020: Debug: -->
(26979) Mon Nov 2 15:39:12 2020: Debug: if ("%{8}") -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif (
(Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif (
(Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) ->
FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif (Aruba-Essid-Name) {
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif
(Aruba-Essid-Name) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif ( (Cisco-AVPair)
&& "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND %{Cisco-AVPair}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> service-type=Framed
(26979) Mon Nov 2 15:39:12 2020: Debug: elsif ( (Cisco-AVPair)
&& "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: [updated] = updated
(26979) Mon Nov 2 15:39:12 2020: Debug: } # if
((&Called-Station-Id) && (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
= updated
(26979) Mon Nov 2 15:39:12 2020: Debug: ... skipping else:
Preceding "if" was taken
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
rewrite_called_station_id = updated
(26979) Mon Nov 2 15:39:12 2020: Debug: [pap] = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: } # authorize = updated
(26979) Mon Nov 2 15:39:12 2020: WARNING: You set
Proxy-To-Realm = local, but it is a LOCAL realm! Cancelling
proxy request.
(26979) Mon Nov 2 15:39:12 2020: Debug: Found Auth-Type = eap
(26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from
file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: authenticate {
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Expiring EAP
session with state 0xddba5edfdca958cb
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Finished EAP
session with state 0xddba5edfdca958cb
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Previous EAP
request found for state 0xddba5edfdca958cb, released from the list
_*(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Peer sent packet
with method EAP GTC (6)
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Calling submodule
eap_gtc to process data
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: # Executing
group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: Auth-Type PAP {
(26979) Mon Nov 2 15:39:12 2020: Debug: pap: Login attempt with
password
(26979) Mon Nov 2 15:39:12 2020: Debug: pap: No password
configured for the user. Cannot do authentication
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: [pap] = fail
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_gtc: } # Auth-Type
PAP = fail
(26979) Mon Nov 2 15:39:12 2020: ERROR: eap: Failed continuing
EAP GTC (6) session. EAP sub-module failed
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Sending EAP Failure
(code 4) ID 19 length 4*_
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Failed in EAP select
(26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = invalid
(26979) Mon Nov 2 15:39:12 2020: Debug: } # authenticate =
invalid
(26979) Mon Nov 2 15:39:12 2020: Debug: Failed to authenticate
the user
(26979) Mon Nov 2 15:39:12 2020: Debug: Using Post-Auth-Type
Reject
(26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from
file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: Post-Auth-Type REJECT {
(26979) Mon Nov 2 15:39:12 2020: Debug: policy
packetfence-set-tenant-id {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(26979) Mon Nov 2 15:39:12 2020: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> 1
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
packetfence-set-tenant-id = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: update {
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: policy
packetfence-audit-log-reject {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name &&
(&User-Name == "dummy")) {
(26979) Mon Nov 2 15:39:12 2020: Debug: if (&User-Name &&
(&User-Name == "dummy")) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: else {
(26979) Mon Nov 2 15:39:12 2020: Debug: policy request-timing {
(26979) Mon Nov 2 15:39:12 2020: Debug: if
("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
(26979) Mon Nov 2 15:39:12 2020: Debug: EXPAND
%{%{control:PacketFence-Request-Time}:-0}
(26979) Mon Nov 2 15:39:12 2020: Debug: --> 0
(26979) Mon Nov 2 15:39:12 2020: Debug: if
("%{%{control:PacketFence-Request-Time}:-0}" != 0) -> FALSE
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
request-timing = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND
type.reject.query
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: -->
type.reject.query
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: Using query
template 'query'
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND
%{User-Name}
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: -->
my_username
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject:
SQL-User-Name set to 'myusername'
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: EXPAND
INSERT INTO radius_audit_log ( mac, ip,
computer_name, user_name, stripped_user_name,
realm, event_type, switch_id, switch_mac,
switch_ip_address, radius_source_ip_address, called_station_id,
calling_station_id, nas_port_type, ssid, nas_port_id, ifindex,
nas_port, connection_type, nas_ip_address, nas_identifier,
auth_status, reason, auth_type, eap_type,
role, node_status, profile, source, auto_reg, is_phone,
pf_domain, uuid, radius_request, radius_reply, request_time,
tenant_id, radius_ip) VALUES (
'%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
'%{%{control:PacketFence-Computer-Name}:-N/A}',
'%{request:User-Name}', '%{request:Stripped-User-Name}',
'%{request:Realm}', 'Radius-Access-Request',
'%{%{control:PacketFence-Switch-Id}:-N/A}',
'%{%{control:PacketFence-Switch-Mac}:-N/A}',
'%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
'%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
'%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}',
'%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
'%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
'%{%{control:PacketFence-Connection-Type}:-N/A}',
'%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',
'Reject', '%{request:Module-Failure-Message}',
'%{control:Auth-Type}', '%{request:EAP-Type}',
'%{%{control:PacketFence-Role}:-N/A}',
'%{%{control:PacketFence-Status}:-N/A}',
'%{%{control:PacketFence-Profile}:-N/A}',
'%{%{control:PacketFence-Source}:-N/A}',
'%{%{control:PacketFence-AutoReg}:-0}',
'%{%{control:PacketFence-IsPhone}:-0}',
'%{request:PacketFence-Domain}', '',
'%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
'%{%{control:PacketFence-Request-Time}:-N/A}',
'%{control:PacketFence-Tenant-Id}',
'%{request:PacketFence-Radius-Ip}')
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: -->
INSERT INTO radius_audit_log ( mac, ip,
computer_name, user_name, stripped_user_name, realm,
event_type, switch_id, switch_mac, switch_ip_address,
radius_source_ip_address, called_station_id,
calling_station_id, nas_port_type, ssid, nas_port_id,
ifindex, nas_port, connection_type, nas_ip_address,
nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain, uuid,
radius_request, radius_reply, request_time,
tenant_id, radius_ip) VALUES �� (
'my_user_device_mac', '', 'N/A', 'myusername', 'myusername',
'null', 'Radius-Access-Request', 'N/A', 'N/A',
'N/A', 'my_cluster_managment_ip', 'my_switch_mac',
'my_user_device_mac', 'Ethernet', '',
'GigabitEthernet1/0/1', 'N/A', '50101', 'N/A', 'my_switch_ip',
'', 'Reject', 'eap: Failed continuing EAP GTC (6) session. EAP
sub-module failed', 'eap', 'GTC', 'N/A', 'N/A', 'N/A',
'N/A', '0', '0', '', '', 'EAP-Message =3D
0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D
127.0.0.1, User-Name =3D =22myusername=22, State =3D
0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User,
Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D
=22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair
=3D =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id
=3D =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip,
NAS-Port-Id =3D =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D
Ethernet, NAS-Port =3D 50101, PacketFence-KeyBalanced =3D
=2299a990b22af7d7ca016a27643cd35a1e=22, PacketFence-Radius-Ip =3D
=22my_server_ip=22, Event-Timestamp =3D =22Nov 2 2020 15:39:12
IST=22, PacketFence-Outer-User =3D =22anonymous=22,
Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22,
EAP-Type =3D GTC, Called-Station-Id =3D =22my_switch_mac=22,
User-Password =3D =22=2A=2A=2A=2A=2A=2A=22,
Module-Failure-Message =3D =22eap: Failed continuing EAP GTC (6)
session. EAP sub-module failed=22, SQL-User-Name =3D
=22myusername=22','EAP-Message =3D 0x04130004,
Message-Authenticator =3D 0x00000000000000000000000000000000',
'N/A', '1', 'my_server_ip')
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: Executing
query: INSERT INTO radius_audit_log ( mac, ip,
computer_name, user_name, stripped_user_name, realm,
event_type, switch_id, switch_mac, switch_ip_address,
radius_source_ip_address, called_station_id,
calling_station_id, nas_port_type, ssid, nas_port_id,
ifindex, nas_port, connection_type, nas_ip_address,
nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain, uuid,
radius_request, radius_reply, request_time,
tenant_id, radius_ip) VALUES (
'my_user_device_mac', '', 'N/A', 'myusername', 'myusername',
'null', 'Radius-Access-Request', 'N/A', 'N/A',
'N/A', 'my_cluster_managment_ip', 'my_switch_mac',
'my_user_device_mac', 'Ethernet', '',
'GigabitEthernet1/0/1', 'N/A', '50101', 'N/A', 'my_switch_ip',
'', 'Reject', 'eap: Failed continuing EAP GTC (6) session. EAP
sub-module failed', 'eap', 'GTC', 'N/A', 'N/A', 'N/A',
'N/A', '0', '0', '', '', 'EAP-Message =3D
0x0213000f0642726561746853473240, FreeRADIUS-Proxied-To =3D
127.0.0.1, User-Name =3D =22myusername=22, State =3D
0xddba5edfdca958cb96d4c517e9bc660c, Service-Type =3D Framed-User,
Cisco-AVPair =3D =22service-type=3DFramed=22, Cisco-AVPair =3D
=22audit-session-id=3D0A0115170000000D005BC4FA=22, Cisco-AVPair
=3D =22method=3Ddot1x=22, Framed-MTU =3D 1500, Calling-Station-Id
=3D =22my_user_device_mac=22, NAS-IP-Address =3D my_switch_ip,
NAS-Port-Id =3D =22GigabitEthernet1/0/1=22, NAS-Port-Type =3D
Ethernet, NAS-Port =3D 50101, PacketFence-KeyBalanced =3D
=2299a990b22af7d7ca016a27643cd35a1e=22, PacketFence-Radius-Ip =3D
=22my_server_ip=22, Event-Timestamp =3D =22Nov 2 2020 15:39:12
IST=22, PacketFence-Outer-User =3D =22anonymous=22,
Stripped-User-Name =3D =22myusername=22, Realm =3D =22null=22,
EAP-Type =3D GTC, Called-Station-Id =3D =22my_switch_mac=22,
User-Password =3D =22=2A=2A=2A=2A=2A=2A=22,
Module-Failure-Message =3D =22eap: Failed continuing EAP GTC (6)
session. EAP sub-module failed=22, SQL-User-Name =3D
=22myusername=22','EAP-Message =3D 0x04130004,
Message-Authenticator =3D 0x00000000000000000000000000000000',
'N/A', '1', 'my_server_ip')
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: SQL query
returned: success
(26979) Mon Nov 2 15:39:12 2020: Debug: sql_reject: 1 record(s)
updated
(26979) Mon Nov 2 15:39:12 2020: Debug: [sql_reject] = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: } # else = ok
(26979) Mon Nov 2 15:39:12 2020: Debug: } # policy
packetfence-audit-log-reject = ok
(26979) Mon Nov 2 15:39:12 2020: Debug:
attr_filter.access_reject: EXPAND %{User-Name}
(26979) Mon Nov 2 15:39:12 2020: Debug:
attr_filter.access_reject: --> my_username
(26979) Mon Nov 2 15:39:12 2020: Debug:
attr_filter.access_reject: Matched entry DEFAULT at line 11
(26979) Mon Nov 2 15:39:12 2020: Debug:
[attr_filter.access_reject] = updated
(26979) Mon Nov 2 15:39:12 2020: Debug: update outer.session-state {
(26979) Mon Nov 2 15:39:12 2020: Debug: } # update
outer.session-state = noop
(26979) Mon Nov 2 15:39:12 2020: Debug: } # Post-Auth-Type
REJECT = updated
(26979) Mon Nov 2 15:39:12 2020: Debug: } # server
packetfence-tunnel
(26979) Mon Nov 2 15:39:12 2020: Debug: Virtual server sending reply
(26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message = 0x04130004
(26979) Mon Nov 2 15:39:12 2020: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Got tunneled
reply code 3
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: EAP-Message
= 0x04130004
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap:
Message-Authenticator = 0x00000000000000000000000000000000
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: Tunneled
authentication was rejected
(26979) Mon Nov 2 15:39:12 2020: Debug: eap_peap: FAILURE
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: Sending EAP Request
(code 1) ID 20 length 46
(26979) Mon Nov 2 15:39:12 2020: Debug: eap: EAP session adding
&reply:State = 0xec639e88e47787f4
(26979) Mon Nov 2 15:39:12 2020: Debug: [eap] = handled
(26979) Mon Nov 2 15:39:12 2020: Debug: } # authenticate = handled
(26979) Mon Nov 2 15:39:12 2020: Debug: Using Post-Auth-Type
Challenge
(26979) Mon Nov 2 15:39:12 2020: Debug: Post-Auth-Type
sub-section not found. Ignoring.
(26979) Mon Nov 2 15:39:12 2020: Debug: # Executing group from
file /usr/local/pf/raddb/sites-enabled/packetfence
(26979) Mon Nov 2 15:39:12 2020: Debug: session-state: Saving
cached attributes
(26979) Mon Nov 2 15:39:12 2020: Debug: TLS-Session-Cipher-Suite
= "ECDHE-RSA-AES256-GCM-SHA384"
(26979) Mon Nov 2 15:39:12 2020: Debug: TLS-Session-Version =
"TLS 1.2"
(26979) Mon Nov 2 15:39:12 2020: Debug: Module-Failure-Message
:= "eap: Failed continuing EAP GTC (6) session. EAP sub-module
failed"
(26979) Mon Nov 2 15:39:12 2020: Debug: Sent Access-Challenge Id
231 from my_server_ip:1812 to my_cluster_managment_ip:36588 length 0
(26979) Mon Nov 2 15:39:12 2020: Debug: EAP-Message =
0x0114002e190017030300233ccff76c8dee7ac196cf7561e1ebe6650116f48c3d155209928c145c148ad4ba578e7d
(26979) Mon Nov 2 15:39:12 2020: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(26979) Mon Nov 2 15:39:12 2020: Debug: State =
0xec639e88e47787f4b03ecf40bb262f03
(26979) Mon Nov 2 15:39:12 2020: Debug: Proxy-State = 0x313037
(26979) Mon Nov 2 15:39:12 2020: Debug: Finished request
On Fri, Oct 30, 2020 at 5:36 PM Fabrice Durand
<fdur...@inverse.ca <mailto:fdur...@inverse.ca>> wrote:
At least when you try to connect ...
Le 20-10-30 à 06 h 37, Sonali Gulia a écrit :
hi Durand fabrice
here is the result of raddebug -f
/usr/local/pf/var/run/radiusd.sock -t 3000
(10522) Fri Oct 30 21:32:00 2020: Debug: Received
Status-Server Id 97 from 127.0.0.1:51783
<http://127.0.0.1:51783> to 127.0.0.1:18121
<http://127.0.0.1:18121> length 50
(10522) Fri Oct 30 21:32:00 2020: Debug:
Message-Authenticator = 0x595be7422b20bffc2fd6282691eb1b4e
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Statistics-Type = 15
(10522) Fri Oct 30 21:32:00 2020: Debug: # Executing group
from file /usr/local/pf/raddb/sites-enabled/status
(10522) Fri Oct 30 21:32:00 2020: Debug: Autz-Type
Status-Server {
(10522) Fri Oct 30 21:32:00 2020: Debug: [ok] = ok
(10522) Fri Oct 30 21:32:00 2020: Debug: } # Autz-Type
Status-Server = ok
(10522) Fri Oct 30 21:32:00 2020: Debug: Sent Access-Accept
Id 97 from 127.0.0.1:18121 <http://127.0.0.1:18121> to
127.0.0.1:51783 <http://127.0.0.1:51783> length 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Access-Requests = 10523
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Access-Accepts = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Access-Rejects = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Access-Challenges = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Responses = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(10522) Fri Oct 30 21:32:00 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(10522) Fri Oct 30 21:32:00 2020: Debug: Finished request
(10522) Fri Oct 30 21:32:05 2020: Debug: Cleaning up request
packet ID 97 with timestamp +157883
(10523) Fri Oct 30 21:32:15 2020: Debug: Received
Status-Server Id 71 from 127.0.0.1:43289
<http://127.0.0.1:43289> to 127.0.0.1:18121
<http://127.0.0.1:18121> length 50
(10523) Fri Oct 30 21:32:15 2020: Debug:
Message-Authenticator = 0x2e1611a2cb839f02f01df0ab302f9062
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Statistics-Type = 15
(10523) Fri Oct 30 21:32:15 2020: Debug: # Executing group
from file /usr/local/pf/raddb/sites-enabled/status
(10523) Fri Oct 30 21:32:15 2020: Debug: Autz-Type
Status-Server {
(10523) Fri Oct 30 21:32:15 2020: Debug: [ok] = ok
(10523) Fri Oct 30 21:32:15 2020: Debug: } # Autz-Type
Status-Server = ok
(10523) Fri Oct 30 21:32:15 2020: Debug: Sent Access-Accept
Id 71 from 127.0.0.1:18121 <http://127.0.0.1:18121> to
127.0.0.1:43289 <http://127.0.0.1:43289> length 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Access-Requests = 10524
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Access-Accepts = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Access-Rejects = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Access-Challenges = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Responses = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(10523) Fri Oct 30 21:32:15 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(10523) Fri Oct 30 21:32:15 2020: Debug: Finished request
(10523) Fri Oct 30 21:32:20 2020: Debug: Cleaning up request
packet ID 71 with timestamp +157898
(10524) Fri Oct 30 21:32:30 2020: Debug: Received
Status-Server Id 111 from 127.0.0.1:38982
<http://127.0.0.1:38982> to 127.0.0.1:18121
<http://127.0.0.1:18121> length 50
(10524) Fri Oct 30 21:32:30 2020: Debug:
Message-Authenticator = 0xbd1505f5fab60879f23b35b68b69b8a1
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Statistics-Type = 15
(10524) Fri Oct 30 21:32:30 2020: Debug: # Executing group
from file /usr/local/pf/raddb/sites-enabled/status
(10524) Fri Oct 30 21:32:30 2020: Debug: Autz-Type
Status-Server {
(10524) Fri Oct 30 21:32:30 2020: Debug: [ok] = ok
(10524) Fri Oct 30 21:32:30 2020: Debug: } # Autz-Type
Status-Server = ok
(10524) Fri Oct 30 21:32:30 2020: Debug: Sent Access-Accept
Id 111 from 127.0.0.1:18121 <http://127.0.0.1:18121> to
127.0.0.1:38982 <http://127.0.0.1:38982> length 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Access-Requests = 10525
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Access-Accepts = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Access-Rejects = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Access-Challenges = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Responses = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Duplicate-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Malformed-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Invalid-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Dropped-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Auth-Unknown-Types = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Accounting-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Accounting-Responses = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Acct-Duplicate-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Acct-Malformed-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Acct-Invalid-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Acct-Dropped-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Acct-Unknown-Types = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Accepts = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Rejects = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Access-Challenges = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Responses = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Accounting-Responses = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
(10524) Fri Oct 30 21:32:30 2020: Debug:
FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
(10524) Fri Oct 30 21:32:30 2020: Debug: Finished request
(10524) Fri Oct 30 21:32:35 2020: Debug: Cleaning up request
packet ID 111 with timestamp +157913
On Fri, Oct 30, 2020 at 6:33 AM Durand fabrice via
PacketFence-users <packetfence-users@lists.sourceforge.net
<mailto:packetfence-users@lists.sourceforge.net>> wrote:
Hello Sonila,
can you provide a raddebug ?
raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000
Regards
Fabrice
Le 20-10-28 à 09 h 22, Sonali Gulia via
PacketFence-users a écrit :
Hi all in new version of pf 10.2.0 eap gtc sub module
failed . While in previous version it was working fine
do any one lnow any solution
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
<mailto:PacketFence-users@lists.sourceforge.net>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
<mailto:PacketFence-users@lists.sourceforge.net>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Fabrice Durand
fdur...@inverse.ca <mailto:fdur...@inverse.ca> :: +1.514.447.4918 (x135)
::www.inverse.ca <http://www.inverse.ca>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
PacketFence (http://packetfence.org)