Hello Ludovic,

OK, here's from this morning:

[root@gatekeeper ~]# grep 58:cb:52:37:5d:ab
/usr/local/pf/logs/packetfence.log
Apr 16 09:13:51 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request
(pf::api::handle_accounting_metadata)


And here's from yesterday during that 15:40 timeframe if that helps:

Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2161) INFO: Using 300
resolution threshold (pf::pfcron::task::cluster_check::run)
Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2161) INFO: All cluster
members are running the same configuration version
(pf::pfcron::task::cluster_check::run)
Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2162) INFO: getting
security_events triggers for accounting cleanup
(pf::accounting::acct_maintenance)
Apr 15 15:40:42 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
Keeping the first one 'null' (pf::radius::_parseRequest)
Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
[mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request
(pf::api::handle_accounting_metadata)
Apr 15 15:41:04 gatekeeper pfqueue: pfqueue(17589) WARN:
[mac:00:25:90:87:e9:50] Unable to pull accounting history for device
00:25:90:87:e9:50. The history set doesn't exist yet.
(pf::accounting_events_history::latest_mac_history)


Joshua Nathan
*IT Supervisor*
Black Forest Academy

p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
a:
w: Hammersteiner Straße 50, 79400 Kandern
bfacademy.de




On Thu, Apr 15, 2021 at 3:52 PM Ludovic Zammit <lzam...@inverse.ca> wrote:

> Hello Nathan,
>
> Show me the output of:
>
> grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log
>
> Thanks,
>
>
> Ludovic Zammit
> lzam...@inverse.ca ::  +1.514.447.4918 (x145) ::  www.inverse.ca
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
> (http://packetfence.org)
>
>
>
>
>
>
>
>
> On Apr 15, 2021, at 9:48 AM, Nathan, Josh via PacketFence-users <
> packetfence-users@lists.sourceforge.net> wrote:
>
> Hello,
>
> So, I'm trying to configure a 10.2 Zen version of PF. Our user
> authentication happens via RADIUS.  So I configured our RADIUS server under
> the "Internal Sources" section, and everything is now "mostly" working.  My
> devices authenticate, but the Authentication Rules don't seem to be taking
> effect.
>
> When I try using the debug command for RADIUS (raddebug -f
> /usr/local/pf/var/run/radiusd.sock -t 3600), here's what I get.  There must
> be a setting I'm missing somewhere.  The packetfence.log file is
> effectively silent on the issue.
>
> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Processing response header
> (327) Thu Apr 15 15:40:43 2021: Debug: rest:   Status : 200 (OK)
> (327) Thu Apr 15 15:40:43 2021: Debug: rest:   Type   : json
> (application/json)
> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Parsing attribute
> "control:PacketFence-Authorization-Status"
> (327) Thu Apr 15 15:40:43 2021: Debug: rest: EXPAND allow
> (327) Thu Apr 15 15:40:43 2021: Debug: rest:    --> allow
> (327) Thu Apr 15 15:40:43 2021: Debug: rest:
> PacketFence-Authorization-Status := "allow"
> (327) Thu Apr 15 15:40:43 2021: Debug:     [rest] = updated
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent EAP Response (code
> 2) ID 56 length 46
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Continuing tunnel setup
> (327) Thu Apr 15 15:40:43 2021: Debug:     [eap] = ok
> (327) Thu Apr 15 15:40:43 2021: Debug:   } # authorize = ok
> (327) Thu Apr 15 15:40:43 2021: Debug: Found Auth-Type = eap
> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/packetfence
> (327) Thu Apr 15 15:40:43 2021: Debug:   authenticate {
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Expiring EAP session with
> state 0xce6b3ab6c75323c5
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Finished EAP session with
> state 0xce6b3ab6c75323c5
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Previous EAP request found for
> state 0xce6b3ab6c75323c5, released from the list
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent packet with method
> EAP PEAP (25)
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Calling submodule eap_peap to
> process data
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Continuing EAP-TLS
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls verify] = ok
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Done initial handshake
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls process] = ok
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Session established.
> Decoding tunneled attributes
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: PEAP state send tlv
> success
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Received EAP-TLV response
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Success
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Using saved attributes
> from the original Access-Accept
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap:   User-Name =
> "josh.nathan"
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Sending EAP Success (code 3)
> ID 56 length 4
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Freeing handler
> (327) Thu Apr 15 15:40:43 2021: Debug:     [eap] = ok
> (327) Thu Apr 15 15:40:43 2021: Debug:   } # authenticate = ok
> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing section post-auth from
> file /usr/local/pf/raddb/sites-enabled/packetfence
> (327) Thu Apr 15 15:40:43 2021: Debug:   post-auth {
> (327) Thu Apr 15 15:40:43 2021: Debug:     update {
> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND
> %{Packet-Src-IP-Address}
> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 172.20.50.76
> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND
> %{Packet-Dst-IP-Address}
> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 172.20.104.31
> (327) Thu Apr 15 15:40:43 2021: Debug:     } # update = noop
> (327) Thu Apr 15 15:40:43 2021: Debug:     policy
> packetfence-set-tenant-id {
> (327) Thu Apr 15 15:40:43 2021: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0"){
> (327) Thu Apr 15 15:40:43 2021: Debug:       if (!NAS-IP-Address ||
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (327) Thu Apr 15 15:40:43 2021: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 1
> (327) Thu Apr 15 15:40:43 2021: Debug:       if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
> (327) Thu Apr 15 15:40:43 2021: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 ) {
> (327) Thu Apr 15 15:40:43 2021: Debug:       if (
> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
> (327) Thu Apr 15 15:40:43 2021: Debug:     } # policy
> packetfence-set-tenant-id = noop
> (327) Thu Apr 15 15:40:43 2021: Debug:     if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
> (327) Thu Apr 15 15:40:43 2021: Debug:     EXPAND
> %{%{control:PacketFence-Proxied-From}:-False}
> (327) Thu Apr 15 15:40:43 2021: Debug:        --> False
> (327) Thu Apr 15 15:40:43 2021: Debug:     if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
> (327) Thu Apr 15 15:40:43 2021: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) ) {
> (327) Thu Apr 15 15:40:43 2021: Debug:     if (! EAP-Type || (EAP-Type !=
> TTLS  && EAP-Type != PEAP) )  -> FALSE
> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:
> EXPAND %{User-Name}
> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:
>    --> josh.nathan
> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:
> Matched entry DEFAULT at line 10
> (327) Thu Apr 15 15:40:43 2021: Debug:
> [attr_filter.packetfence_post_auth] = updated
> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND
> messages.%{%{reply:Packet-Type}:-default}
> (327) Thu Apr 15 15:40:43 2021: Debug: linelog:    -->
> messages.Access-Accept
> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND
> [mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned
> VLAN %{reply:Tunnel-Private-Group-ID}
> (327) Thu Apr 15 15:40:43 2021: Debug: linelog:    -->
> [mac:58:cb:52:37:5d:ab] Accepted user: josh.nathan and returned VLAN
> (327) Thu Apr 15 15:40:43 2021: Debug:     [linelog] = ok
> (327) Thu Apr 15 15:40:43 2021: Debug:   } # post-auth = updated
> (327) Thu Apr 15 15:40:43 2021: Debug: Sent Access-Accept Id 229 from
> 172.20.104.31:1812 to 172.20.50.76:40485 length 0
> (327) Thu Apr 15 15:40:43 2021: Debug:   User-Name = "josh.nathan"
> (327) Thu Apr 15 15:40:43 2021: Debug:   MS-MPPE-Recv-Key =
> 0x600da060c2faa9fdf49eb732f5110f438b5d71f66e661345f268bf24252e85c3
> (327) Thu Apr 15 15:40:43 2021: Debug:   MS-MPPE-Send-Key =
> 0x8d6d99afd78af3ebade3b3869adc9ceef8f9782d323d553bce8cf5c1511d05d1
> (327) Thu Apr 15 15:40:43 2021: Debug:   EAP-Message = 0x03380004
> (327) Thu Apr 15 15:40:43 2021: Debug:   Message-Authenticator =
> 0x00000000000000000000000000000000
> (327) Thu Apr 15 15:40:43 2021: Debug: Finished request
> (317) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 219
> with timestamp +4564
> (318) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 220
> with timestamp +4564
> (319) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 221
> with timestamp +4564
> (328) Thu Apr 15 15:40:45 2021: Debug: Received Status-Server Id 161 from
> 127.0.0.1:45116 to 127.0.0.1:18121 length 50
> (328) Thu Apr 15 15:40:45 2021: Debug:   Message-Authenticator =
> 0x0630aabb861db1ebd2a0892a5d55941e
> (328) Thu Apr 15 15:40:45 2021: Debug:   FreeRADIUS-Statistics-Type = 15
> (328) Thu Apr 15 15:40:45 2021: Debug: # Executing group from file
> /usr/local/pf/raddb/sites-enabled/status
> (328) Thu Apr 15 15:40:45 2021: Debug:   Autz-Type Status-Server {
> (328) Thu Apr 15 15:40:45 2021: Debug:     [ok] = ok
> (328) Thu Apr 15 15:40:45 2021: Debug:   } # Autz-Type Status-Server = ok
> (328) Thu Apr 15 15:40:45 2021: Debug: Sent Access-Accept Id 161 from
> 127.0.0.1:18121 to 127.0.0.1:45116 length 0
>
>
>
> Thank you for any guidance you can give!
>
> Joshua Nathan
> *IT Supervisor*
> Black Forest Academy
>
> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
> a:
> w: Hammersteiner Straße 50, 79400 Kandern
> bfacademy.de
>
>
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to