Hello,

So, I'm trying to configure a 10.2 Zen version of PF. Our user
authentication happens via RADIUS.  So I configured our RADIUS server under
the "Internal Sources" section, and everything is now "mostly" working.  My
devices authenticate, but the Authentication Rules don't seem to be taking
effect.

When I try using the debug command for RADIUS (raddebug -f
/usr/local/pf/var/run/radiusd.sock -t 3600), here's what I get.  There must
be a setting I'm missing somewhere.  The packetfence.log file is
effectively silent on the issue.

(327) Thu Apr 15 15:40:43 2021: Debug: rest: Processing response header
(327) Thu Apr 15 15:40:43 2021: Debug: rest:   Status : 200 (OK)
(327) Thu Apr 15 15:40:43 2021: Debug: rest:   Type   : json
(application/json)
(327) Thu Apr 15 15:40:43 2021: Debug: rest: Parsing attribute
"control:PacketFence-Authorization-Status"
(327) Thu Apr 15 15:40:43 2021: Debug: rest: EXPAND allow
(327) Thu Apr 15 15:40:43 2021: Debug: rest:    --> allow
(327) Thu Apr 15 15:40:43 2021: Debug: rest:
PacketFence-Authorization-Status := "allow"
(327) Thu Apr 15 15:40:43 2021: Debug:     [rest] = updated
(327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent EAP Response (code 2)
ID 56 length 46
(327) Thu Apr 15 15:40:43 2021: Debug: eap: Continuing tunnel setup
(327) Thu Apr 15 15:40:43 2021: Debug:     [eap] = ok
(327) Thu Apr 15 15:40:43 2021: Debug:   } # authorize = ok
(327) Thu Apr 15 15:40:43 2021: Debug: Found Auth-Type = eap
(327) Thu Apr 15 15:40:43 2021: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(327) Thu Apr 15 15:40:43 2021: Debug:   authenticate {
(327) Thu Apr 15 15:40:43 2021: Debug: eap: Expiring EAP session with state
0xce6b3ab6c75323c5
(327) Thu Apr 15 15:40:43 2021: Debug: eap: Finished EAP session with state
0xce6b3ab6c75323c5
(327) Thu Apr 15 15:40:43 2021: Debug: eap: Previous EAP request found for
state 0xce6b3ab6c75323c5, released from the list
(327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent packet with method
EAP PEAP (25)
(327) Thu Apr 15 15:40:43 2021: Debug: eap: Calling submodule eap_peap to
process data
(327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Continuing EAP-TLS
(327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls verify] = ok
(327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Done initial handshake
(327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls process] = ok
(327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Session established.
Decoding tunneled attributes
(327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: PEAP state send tlv success
(327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Received EAP-TLV response
(327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Success
(327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Using saved attributes
from the original Access-Accept
(327) Thu Apr 15 15:40:43 2021: Debug: eap_peap:   User-Name = "josh.nathan"
(327) Thu Apr 15 15:40:43 2021: Debug: eap: Sending EAP Success (code 3) ID
56 length 4
(327) Thu Apr 15 15:40:43 2021: Debug: eap: Freeing handler
(327) Thu Apr 15 15:40:43 2021: Debug:     [eap] = ok
(327) Thu Apr 15 15:40:43 2021: Debug:   } # authenticate = ok
(327) Thu Apr 15 15:40:43 2021: Debug: # Executing section post-auth from
file /usr/local/pf/raddb/sites-enabled/packetfence
(327) Thu Apr 15 15:40:43 2021: Debug:   post-auth {
(327) Thu Apr 15 15:40:43 2021: Debug:     update {
(327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND %{Packet-Src-IP-Address}
(327) Thu Apr 15 15:40:43 2021: Debug:          --> 172.20.50.76
(327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND %{Packet-Dst-IP-Address}
(327) Thu Apr 15 15:40:43 2021: Debug:          --> 172.20.104.31
(327) Thu Apr 15 15:40:43 2021: Debug:     } # update = noop
(327) Thu Apr 15 15:40:43 2021: Debug:     policy packetfence-set-tenant-id
{
(327) Thu Apr 15 15:40:43 2021: Debug:       if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(327) Thu Apr 15 15:40:43 2021: Debug:       if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(327) Thu Apr 15 15:40:43 2021: Debug:       if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(327) Thu Apr 15 15:40:43 2021: Debug:          --> 1
(327) Thu Apr 15 15:40:43 2021: Debug:       if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
(327) Thu Apr 15 15:40:43 2021: Debug:       if (
&control:PacketFence-Tenant-Id == 0 ) {
(327) Thu Apr 15 15:40:43 2021: Debug:       if (
&control:PacketFence-Tenant-Id == 0 )  -> FALSE
(327) Thu Apr 15 15:40:43 2021: Debug:     } # policy
packetfence-set-tenant-id = noop
(327) Thu Apr 15 15:40:43 2021: Debug:     if
("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
(327) Thu Apr 15 15:40:43 2021: Debug:     EXPAND
%{%{control:PacketFence-Proxied-From}:-False}
(327) Thu Apr 15 15:40:43 2021: Debug:        --> False
(327) Thu Apr 15 15:40:43 2021: Debug:     if
("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
(327) Thu Apr 15 15:40:43 2021: Debug:     if (! EAP-Type || (EAP-Type !=
TTLS  && EAP-Type != PEAP) ) {
(327) Thu Apr 15 15:40:43 2021: Debug:     if (! EAP-Type || (EAP-Type !=
TTLS  && EAP-Type != PEAP) )  -> FALSE
(327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:
EXPAND %{User-Name}
(327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:
 --> josh.nathan
(327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:
Matched entry DEFAULT at line 10
(327) Thu Apr 15 15:40:43 2021: Debug:
[attr_filter.packetfence_post_auth] = updated
(327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND
messages.%{%{reply:Packet-Type}:-default}
(327) Thu Apr 15 15:40:43 2021: Debug: linelog:    -->
messages.Access-Accept
(327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND
[mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned
VLAN %{reply:Tunnel-Private-Group-ID}
(327) Thu Apr 15 15:40:43 2021: Debug: linelog:    -->
[mac:58:cb:52:37:5d:ab] Accepted user: josh.nathan and returned VLAN
(327) Thu Apr 15 15:40:43 2021: Debug:     [linelog] = ok
(327) Thu Apr 15 15:40:43 2021: Debug:   } # post-auth = updated
(327) Thu Apr 15 15:40:43 2021: Debug: Sent Access-Accept Id 229 from
172.20.104.31:1812 to 172.20.50.76:40485 length 0
(327) Thu Apr 15 15:40:43 2021: Debug:   User-Name = "josh.nathan"
(327) Thu Apr 15 15:40:43 2021: Debug:   MS-MPPE-Recv-Key =
0x600da060c2faa9fdf49eb732f5110f438b5d71f66e661345f268bf24252e85c3
(327) Thu Apr 15 15:40:43 2021: Debug:   MS-MPPE-Send-Key =
0x8d6d99afd78af3ebade3b3869adc9ceef8f9782d323d553bce8cf5c1511d05d1
(327) Thu Apr 15 15:40:43 2021: Debug:   EAP-Message = 0x03380004
(327) Thu Apr 15 15:40:43 2021: Debug:   Message-Authenticator =
0x00000000000000000000000000000000
(327) Thu Apr 15 15:40:43 2021: Debug: Finished request
(317) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 219
with timestamp +4564
(318) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 220
with timestamp +4564
(319) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 221
with timestamp +4564
(328) Thu Apr 15 15:40:45 2021: Debug: Received Status-Server Id 161 from
127.0.0.1:45116 to 127.0.0.1:18121 length 50
(328) Thu Apr 15 15:40:45 2021: Debug:   Message-Authenticator =
0x0630aabb861db1ebd2a0892a5d55941e
(328) Thu Apr 15 15:40:45 2021: Debug:   FreeRADIUS-Statistics-Type = 15
(328) Thu Apr 15 15:40:45 2021: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/status
(328) Thu Apr 15 15:40:45 2021: Debug:   Autz-Type Status-Server {
(328) Thu Apr 15 15:40:45 2021: Debug:     [ok] = ok
(328) Thu Apr 15 15:40:45 2021: Debug:   } # Autz-Type Status-Server = ok
(328) Thu Apr 15 15:40:45 2021: Debug: Sent Access-Accept Id 161 from
127.0.0.1:18121 to 127.0.0.1:45116 length 0



Thank you for any guidance you can give!

Joshua Nathan
*IT Supervisor*
Black Forest Academy

p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
a:
w: Hammersteiner Straße 50, 79400 Kandern
bfacademy.de
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to