Are you referring to the section under Configuration > Default > EAP
Profiles?

I reset it to defaults, but get the same error.

I actually had this all working, the authentication portion at least, about
a month ago. After an extended break, it's doing this.

I'm tempted to start over with a fresh installation.

*Joshua Wise*
Systems Engineer, Celina ISD
469-742-9113
https://www.celinaisd.com



On Wed, Mar 31, 2021 at 7:22 AM Fabrice Durand via PacketFence-users <
[email protected]> wrote:

> Hello Joshua,
>
> sorry for the late reply.
>
> So it looks that you played with the radius eap configuration.
>
> Can you revert this section (put as default) and retry ?
>
> Thanks
>
> Regards
>
> Fabrice
>
>
> Le 2021-03-29 à 16 h 15, Joshua Wise via PacketFence-users a écrit :
>
> Pastebin of the response.
>
> https://pastebin.com/L70fKEB7
>
> *Joshua Wise*
> Systems Engineer, Celina ISD
> 469-742-9113
> https://www.celinaisd.com
>
>
> On Sat, Mar 27, 2021 at 8:13 AM Durand fabrice via PacketFence-users <
> [email protected]> wrote:
>
>> Then run the command without the filter and reconnect your device.
>>
>> raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3600
>>
>>
>> Le 21-03-27 à 08 h 29, Joshua Wise via PacketFence-users a écrit :
>>
>> Command appears to run endlessly, I grabbed a snippet that appears to be
>> what is repeated.
>>
>> (3440) Sat Mar 27 07:25:15 2021: Debug: Received Status-Server Id 51 from
>> 127.0.0.1:51452 to 127.0.0.1:18121 length 50
>> (3440) Sat Mar 27 07:25:15 2021: Debug:   Message-Authenticator =
>> 0x9257e8cab94913463172d8be5663c80b
>> (3440) Sat Mar 27 07:25:15 2021: Debug:   FreeRADIUS-Statistics-Type = 15
>> (3440) Sat Mar 27 07:25:15 2021: Debug: # Executing group from file
>> /usr/local/pf/raddb/sites-enabled/status
>> (3440) Sat Mar 27 07:25:15 2021: Debug:   Autz-Type Status-Server {
>> (3440) Sat Mar 27 07:25:15 2021: Debug:     [ok] = ok
>> (3440) Sat Mar 27 07:25:15 2021: Debug:   } # Autz-Type Status-Server = ok
>> (3440) Sat Mar 27 07:25:15 2021: Debug: Sent Access-Accept Id 51 from
>> 127.0.0.1:18121 to 127.0.0.1:51452 length 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Access-Requests = 3441
>> (3440) Sat Mar 27 07:25:15 2021: Debug:   FreeRADIUS-Total-Access-Accepts
>> = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:   FreeRADIUS-Total-Access-Rejects
>> = 2
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Access-Challenges = 16
>> (3440) Sat Mar 27 07:25:15 2021: Debug:   FreeRADIUS-Total-Auth-Responses
>> = 18
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Auth-Duplicate-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Auth-Malformed-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Auth-Invalid-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Auth-Dropped-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Auth-Unknown-Types = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Accounting-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Accounting-Responses = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Acct-Duplicate-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Acct-Malformed-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Acct-Invalid-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Acct-Dropped-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Acct-Unknown-Types = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Access-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Access-Accepts = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Access-Rejects = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Access-Challenges = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Responses = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Accounting-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Accounting-Responses = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug:
>> FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0
>> (3440) Sat Mar 27 07:25:15 2021: Debug: Finished request
>> (3440) Sat Mar 27 07:25:20 2021: Debug: Cleaning up request packet ID 51
>> with timestamp +51321
>>
>> *Joshua Wise*
>> Systems Engineer, Celina ISD
>> 469-742-9113
>> https://www.celinaisd.com
>>
>>
>> On Fri, Mar 26, 2021 at 9:00 PM Durand fabrice via PacketFence-users <
>> [email protected]> wrote:
>>
>>> Hello Joshua,
>>>
>>> let's run that:
>>>
>>> raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3600 -c '(
>>> Calling-Station-Id =~ /78[-:]?4f[-:]?43[-:]?97[-:]?f5[-:]?fe/i )'
>>>
>>>
>>> And paste the output.
>>>
>>> Regards
>>>
>>> Fabrice
>>>
>>>
>>> Le 21-03-26 à 18 h 22, Joshua Wise via PacketFence-users a écrit :
>>>
>>> RADIUS Reply is empty.
>>>
>>> I ran the specified patch, restarted services, same error.
>>>
>>> *Joshua Wise*
>>> Systems Engineer, Celina ISD
>>> 469-742-9113
>>> https://www.celinaisd.com
>>>
>>>
>>> On Fri, Mar 26, 2021 at 1:47 PM Ludovic Zammit <[email protected]>
>>> wrote:
>>>
>>>> I never seen that error message.
>>>>
>>>> It needs more investigation.
>>>>
>>>> What is the radius reply given by pf for that authentication ? Just
>>>> below the radius request.
>>>>
>>>> Did you patch your server with :
>>>>
>>>> /usr/local/pf/addons/pf-maint.pl
>>>>
>>>> Then restart all pf services:
>>>>
>>>> /usr/local/pf/bin/pfcmd service pf restart
>>>>
>>>> Thanks,
>>>>
>>>> Ludovic [email protected] ::  +1.514.447.4918 (x145) ::  
>>>> www.inverse.ca
>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>> (http://packetfence.org)
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> On Mar 26, 2021, at 2:24 PM, Joshua Wise <[email protected]>
>>>> wrote:
>>>>
>>>> RADIS Request Audit log:
>>>>
>>>> NAS-Port-Type = Wireless-802.11 PacketFence-Outer-User = "
>>>> [email protected]" PacketFence-Radius-Ip = "10.56.64.44"
>>>> Service-Type = Framed-User Called-Station-Id = "00-1A-1E-01-EC-98-cisd.1x"
>>>> State = 0x6f17c8406f1fd21550a9f72c8da28ab6 FreeRADIUS-Proxied-To =
>>>> 127.0.0.1 Realm = "default" NAS-IP-Address = 10.56.64.44
>>>> PacketFence-NTLMv2-Only = "" Calling-Station-Id = "78:4f:43:97:f5:fe"
>>>> Aruba-Essid-Name = "cisd.1x" PacketFence-KeyBalanced =
>>>> "e779e78c1ea9a92dab5dc5d6d30a8dc7" PacketFence-Domain = "celinaisd"
>>>> Aruba-AP-Group = "CS701" User-Name = "[email protected]"
>>>> Aruba-Location-Id = "ADMIN-MDF-AP16" NAS-Identifier = "10.56.64.222"
>>>> Event-Timestamp = "Mar 25 2021 08:33:08 CDT" EAP-Message =
>>>> 0x020800511a0208004c316ec62dd3023b6ff16890ed459e79818b0000000000000000175ed1760cce67ff48491f88d067ce8bc17ec36c65b75de60074657374776966694063656c696e616973642e636f6d
>>>> Stripped-User-Name = "testwifi" NAS-Port = 0 Framed-MTU = 1100 EAP-Type =
>>>> MSCHAPv2 PacketFence-UserNameAttribute = "[email protected]"
>>>> Module-Failure-Message = "celinaisd: Attribute \"User-Password\" is
>>>> required for authentication" User-Password = "******" SQL-User-Name = "
>>>> [email protected]"
>>>>
>>>> *Joshua Wise*
>>>> Systems Engineer, Celina ISD
>>>> 469-742-9113
>>>> https://www.celinaisd.com
>>>>
>>>>
>>>> On Fri, Mar 26, 2021 at 12:12 PM Ludovic Zammit <[email protected]>
>>>> wrote:
>>>>
>>>>> For that radius request, go check Auditing and show me the radius
>>>>> request.
>>>>> Thanks,
>>>>>
>>>>>
>>>>> Ludovic Zammit
>>>>> [email protected] ::  +1.514.447.4918 (x145) ::  www.inverse.ca
>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>>> (http://packetfence.org)
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> On Mar 26, 2021, at 8:43 AM, Joshua Wise <[email protected]>
>>>>> wrote:
>>>>>
>>>>> Here we go:
>>>>>
>>>>> Mar 26 07:40:11 packetfence auth[2770]: (10350)   Login incorrect
>>>>> (celinaisd: Attribute "User-Password" is required for authentication): [
>>>>> [email protected]] (from client 10.56.64.222/32 port 0 cli
>>>>> 78:4f:43:97:f5:fe via TLS tunnel)
>>>>> Mar 26 07:40:11 packetfence auth[2770]: [mac:78:4f:43:97:f5:fe]
>>>>> Rejected user: [email protected]
>>>>> Mar 26 07:40:11 packetfence auth[2770]: (10351) Login incorrect
>>>>> (eap_peap: The users session was previously rejected: returning reject
>>>>> (again.)): [[email protected]] (from client 10.56.64.222/32 port
>>>>> 0 cli 78:4f:43:97:f5:fe)
>>>>>
>>>>> *Joshua Wise*
>>>>> Systems Engineer, Celina ISD
>>>>> 469-742-9113
>>>>> https://www.celinaisd.com
>>>>>
>>>>>
>>>>> On Fri, Mar 26, 2021 at 7:00 AM Ludovic Zammit <[email protected]>
>>>>> wrote:
>>>>>
>>>>>> That’s not good, you should have something in the log related to that
>>>>>> Mac address. Try another computer or clear the cache info related to your
>>>>>> Mac in the wifi controller.
>>>>>>
>>>>>> Check:
>>>>>>
>>>>>> grep MAC_ADDRESS /usr/local/pf/logs/radius.log
>>>>>>
>>>>>> Use 00:11:22:33:44:55 for the Mac address format.
>>>>>>
>>>>>> Thanks,
>>>>>>
>>>>>>
>>>>>> Ludovic Zammit
>>>>>> [email protected] ::  +1.514.447.4918 (x145) ::  www.inverse.ca
>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>>>>>> (http://packetfence.org)
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> On Mar 25, 2021, at 2:20 PM, Joshua Wise <[email protected]>
>>>>>> wrote:
>>>>>>
>>>>>> I don't get a response when using that command. I can see the log
>>>>>> file exists, modifying with vi shows the following repeatedly.
>>>>>>
>>>>>> Mar 25 03:52:58 packetfence packetfence: pfperl-api(2202) INFO: Using
>>>>>> 300 resolution threshold (pf::pfcron::task::cluster_check::run)
>>>>>> Mar 25 03:52:58 packetfence packetfence: pfperl-api(2202) INFO: All
>>>>>> cluster members are running the same configuration version
>>>>>> (pf::pfcron::task::cluster_check::run)
>>>>>> Mar 25 03:52:58 packetfence packetfence: pfperl-api(2204) INFO:
>>>>>> processed 0 security_events during security_event maintenance
>>>>>> (1616662378.2789 1616662378.28441)
>>>>>> (pf::security_event::security_event_maintenance)
>>>>>> Mar 25 03:52:58 packetfence packetfence: pfperl-api(2204) INFO:
>>>>>> processed 0 security_events during security_event maintenance
>>>>>> (1616662378.2855 1616662378.2874)
>>>>>> (pf::security_event::security_event_maintenance)
>>>>>> Mar 25 03:53:58 packetfence packetfence: pfperl-api(2204) INFO: Using
>>>>>> 300 resolution threshold (pf::pfcron::task::cluster_check::run)
>>>>>>
>>>>>> *Joshua Wise*
>>>>>> Systems Engineer, Celina ISD
>>>>>> 469-742-9113
>>>>>> https://www.celinaisd.com
>>>>>>
>>>>>>
>>>>>> On Thu, Mar 25, 2021 at 10:08 AM Ludovic Zammit <[email protected]>
>>>>>> wrote:
>>>>>>
>>>>>>> Give me the output of:
>>>>>>>
>>>>>>> grep MAC_ADDRESS /usr/local/pf/logs/packetfence.log
>>>>>>>
>>>>>>> Thanks,
>>>>>>>
>>>>>>>
>>>>>>> Ludovic Zammit
>>>>>>> [email protected] ::  +1.514.447.4918 (x145) ::  www.inverse.ca
>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
>>>>>>> PacketFence (http://packetfence.org)
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On Mar 25, 2021, at 8:39 AM, Joshua Wise <[email protected]>
>>>>>>> wrote:
>>>>>>>
>>>>>>> SSID type is 802.1x with WPA2-Enterprise.
>>>>>>>
>>>>>>> *Joshua Wise*
>>>>>>> Systems Engineer, Celina ISD
>>>>>>> 469-742-9113
>>>>>>> https://www.celinaisd.com
>>>>>>>
>>>>>>>
>>>>>>> On Thu, Mar 25, 2021 at 7:08 AM Ludovic Zammit <[email protected]>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> Hello,
>>>>>>>>
>>>>>>>> What’s your SSID type ? Open SSID or 8021.x with WPA2 Entreprise?
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>>
>>>>>>>>
>>>>>>>> Ludovic Zammit
>>>>>>>> [email protected] ::  +1.514.447.4918 (x145) ::  www.inverse.ca
>>>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and 
>>>>>>>> PacketFence (http://packetfence.org)
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> On Mar 24, 2021, at 3:06 PM, Joshua Wise via PacketFence-users <
>>>>>>>> [email protected]> wrote:
>>>>>>>>
>>>>>>>> I'm in the process of testing Packefence with our Aruba Controller.
>>>>>>>> I've added our on-prem Active Directory to Packetfence, and can test
>>>>>>>> authentication fine with pftest, no issues.
>>>>>>>>
>>>>>>>> I've configured our Aruba Controller with an 802.1x SSID, RADIUS,
>>>>>>>> etc.
>>>>>>>>
>>>>>>>> When I attempt to connect with username/password, it fails. I can
>>>>>>>> see in the RADIUS log that I get an error "Attribute "User-Password" is
>>>>>>>> required for authentication."
>>>>>>>>
>>>>>>>> Within that log, I can go to the RADIUS section and see:
>>>>>>>> User-Password = "******"
>>>>>>>>
>>>>>>>> This makes me think the password is being passed from our
>>>>>>>> Controller to Packetfence just fine.
>>>>>>>>
>>>>>>>> Not sure what I'm missing, any ideas or suggestions?
>>>>>>>>
>>>>>>>> *Joshua Wise*
>>>>>>>> Systems Engineer, Celina ISD
>>>>>>>> 469-742-9113
>>>>>>>> https://www.celinaisd.com
>>>>>>>> _______________________________________________
>>>>>>>> PacketFence-users mailing list
>>>>>>>> [email protected]
>>>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>
>>>>>
>>>>
>>>
>>> _______________________________________________
>>> PacketFence-users mailing 
>>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>>
>>
>>
>> _______________________________________________
>> PacketFence-users mailing 
>> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>> _______________________________________________
>> PacketFence-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>
>
> _______________________________________________
> PacketFence-users mailing 
> [email protected]https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
> --
> Fabrice [email protected] ::  +1.514.447.4918 (x135) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
>
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to