Any further insights regarding what I could try or where I should look?
I've not had any luck this week at figuring anything out, either. :-/

Joshua Nathan
*IT Supervisor*
Black Forest Academy

p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
a:
w: Hammersteiner Straße 50, 79400 Kandern
bfacademy.de




On Fri, Apr 16, 2021 at 9:39 AM Nathan, Josh <josh.nat...@bfacademy.de>
wrote:

> Hello Ludovic,
>
> OK, here's from this morning:
>
> [root@gatekeeper ~]# grep 58:cb:52:37:5d:ab
> /usr/local/pf/logs/packetfence.log
> Apr 16 09:13:51 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request
> (pf::api::handle_accounting_metadata)
>
>
> And here's from yesterday during that 15:40 timeframe if that helps:
>
> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2161) INFO: Using 300
> resolution threshold (pf::pfcron::task::cluster_check::run)
> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2161) INFO: All cluster
> members are running the same configuration version
> (pf::pfcron::task::cluster_check::run)
> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2162) INFO: getting
> security_events triggers for accounting cleanup
> (pf::accounting::acct_maintenance)
> Apr 15 15:40:42 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm.
> Keeping the first one 'null' (pf::radius::_parseRequest)
> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO:
> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request
> (pf::api::handle_accounting_metadata)
> Apr 15 15:41:04 gatekeeper pfqueue: pfqueue(17589) WARN:
> [mac:00:25:90:87:e9:50] Unable to pull accounting history for device
> 00:25:90:87:e9:50. The history set doesn't exist yet.
> (pf::accounting_events_history::latest_mac_history)
>
>
> Joshua Nathan
> *IT Supervisor*
> Black Forest Academy
>
> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
> a:
> w: Hammersteiner Straße 50, 79400 Kandern
> bfacademy.de
>
>
>
>
> On Thu, Apr 15, 2021 at 3:52 PM Ludovic Zammit <lzam...@inverse.ca> wrote:
>
>> Hello Nathan,
>>
>> Show me the output of:
>>
>> grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log
>>
>> Thanks,
>>
>>
>> Ludovic Zammit
>> lzam...@inverse.ca ::  +1.514.447.4918 (x145) ::  www.inverse.ca
>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence 
>> (http://packetfence.org)
>>
>>
>>
>>
>>
>>
>>
>>
>> On Apr 15, 2021, at 9:48 AM, Nathan, Josh via PacketFence-users <
>> packetfence-users@lists.sourceforge.net> wrote:
>>
>> Hello,
>>
>> So, I'm trying to configure a 10.2 Zen version of PF. Our user
>> authentication happens via RADIUS.  So I configured our RADIUS server under
>> the "Internal Sources" section, and everything is now "mostly" working.  My
>> devices authenticate, but the Authentication Rules don't seem to be taking
>> effect.
>>
>> When I try using the debug command for RADIUS (raddebug -f
>> /usr/local/pf/var/run/radiusd.sock -t 3600), here's what I get.  There must
>> be a setting I'm missing somewhere.  The packetfence.log file is
>> effectively silent on the issue.
>>
>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Processing response header
>> (327) Thu Apr 15 15:40:43 2021: Debug: rest:   Status : 200 (OK)
>> (327) Thu Apr 15 15:40:43 2021: Debug: rest:   Type   : json
>> (application/json)
>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Parsing attribute
>> "control:PacketFence-Authorization-Status"
>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: EXPAND allow
>> (327) Thu Apr 15 15:40:43 2021: Debug: rest:    --> allow
>> (327) Thu Apr 15 15:40:43 2021: Debug: rest:
>> PacketFence-Authorization-Status := "allow"
>> (327) Thu Apr 15 15:40:43 2021: Debug:     [rest] = updated
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent EAP Response (code
>> 2) ID 56 length 46
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Continuing tunnel setup
>> (327) Thu Apr 15 15:40:43 2021: Debug:     [eap] = ok
>> (327) Thu Apr 15 15:40:43 2021: Debug:   } # authorize = ok
>> (327) Thu Apr 15 15:40:43 2021: Debug: Found Auth-Type = eap
>> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing group from file
>> /usr/local/pf/raddb/sites-enabled/packetfence
>> (327) Thu Apr 15 15:40:43 2021: Debug:   authenticate {
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Expiring EAP session with
>> state 0xce6b3ab6c75323c5
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Finished EAP session with
>> state 0xce6b3ab6c75323c5
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Previous EAP request found
>> for state 0xce6b3ab6c75323c5, released from the list
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent packet with method
>> EAP PEAP (25)
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Calling submodule eap_peap to
>> process data
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Continuing EAP-TLS
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls verify] = ok
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Done initial handshake
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls process] = ok
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Session established.
>> Decoding tunneled attributes
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: PEAP state send tlv
>> success
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Received EAP-TLV response
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Success
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Using saved attributes
>> from the original Access-Accept
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap:   User-Name =
>> "josh.nathan"
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Sending EAP Success (code 3)
>> ID 56 length 4
>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Freeing handler
>> (327) Thu Apr 15 15:40:43 2021: Debug:     [eap] = ok
>> (327) Thu Apr 15 15:40:43 2021: Debug:   } # authenticate = ok
>> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing section post-auth from
>> file /usr/local/pf/raddb/sites-enabled/packetfence
>> (327) Thu Apr 15 15:40:43 2021: Debug:   post-auth {
>> (327) Thu Apr 15 15:40:43 2021: Debug:     update {
>> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND
>> %{Packet-Src-IP-Address}
>> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 172.20.50.76
>> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND
>> %{Packet-Dst-IP-Address}
>> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 172.20.104.31
>> (327) Thu Apr 15 15:40:43 2021: Debug:     } # update = noop
>> (327) Thu Apr 15 15:40:43 2021: Debug:     policy
>> packetfence-set-tenant-id {
>> (327) Thu Apr 15 15:40:43 2021: Debug:       if (!NAS-IP-Address ||
>> NAS-IP-Address == "0.0.0.0"){
>> (327) Thu Apr 15 15:40:43 2021: Debug:       if (!NAS-IP-Address ||
>> NAS-IP-Address == "0.0.0.0") -> FALSE
>> (327) Thu Apr 15 15:40:43 2021: Debug:       if (
>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
>> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND
>> %{%{control:PacketFence-Tenant-Id}:-0}
>> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 1
>> (327) Thu Apr 15 15:40:43 2021: Debug:       if (
>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
>> (327) Thu Apr 15 15:40:43 2021: Debug:       if (
>> &control:PacketFence-Tenant-Id == 0 ) {
>> (327) Thu Apr 15 15:40:43 2021: Debug:       if (
>> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
>> (327) Thu Apr 15 15:40:43 2021: Debug:     } # policy
>> packetfence-set-tenant-id = noop
>> (327) Thu Apr 15 15:40:43 2021: Debug:     if
>> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
>> (327) Thu Apr 15 15:40:43 2021: Debug:     EXPAND
>> %{%{control:PacketFence-Proxied-From}:-False}
>> (327) Thu Apr 15 15:40:43 2021: Debug:        --> False
>> (327) Thu Apr 15 15:40:43 2021: Debug:     if
>> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
>> (327) Thu Apr 15 15:40:43 2021: Debug:     if (! EAP-Type || (EAP-Type !=
>> TTLS  && EAP-Type != PEAP) ) {
>> (327) Thu Apr 15 15:40:43 2021: Debug:     if (! EAP-Type || (EAP-Type !=
>> TTLS  && EAP-Type != PEAP) )  -> FALSE
>> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:
>> EXPAND %{User-Name}
>> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:
>>    --> josh.nathan
>> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:
>> Matched entry DEFAULT at line 10
>> (327) Thu Apr 15 15:40:43 2021: Debug:
>> [attr_filter.packetfence_post_auth] = updated
>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND
>> messages.%{%{reply:Packet-Type}:-default}
>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog:    -->
>> messages.Access-Accept
>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND
>> [mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned
>> VLAN %{reply:Tunnel-Private-Group-ID}
>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog:    -->
>> [mac:58:cb:52:37:5d:ab] Accepted user: josh.nathan and returned VLAN
>> (327) Thu Apr 15 15:40:43 2021: Debug:     [linelog] = ok
>> (327) Thu Apr 15 15:40:43 2021: Debug:   } # post-auth = updated
>> (327) Thu Apr 15 15:40:43 2021: Debug: Sent Access-Accept Id 229 from
>> 172.20.104.31:1812 to 172.20.50.76:40485 length 0
>> (327) Thu Apr 15 15:40:43 2021: Debug:   User-Name = "josh.nathan"
>> (327) Thu Apr 15 15:40:43 2021: Debug:   MS-MPPE-Recv-Key =
>> 0x600da060c2faa9fdf49eb732f5110f438b5d71f66e661345f268bf24252e85c3
>> (327) Thu Apr 15 15:40:43 2021: Debug:   MS-MPPE-Send-Key =
>> 0x8d6d99afd78af3ebade3b3869adc9ceef8f9782d323d553bce8cf5c1511d05d1
>> (327) Thu Apr 15 15:40:43 2021: Debug:   EAP-Message = 0x03380004
>> (327) Thu Apr 15 15:40:43 2021: Debug:   Message-Authenticator =
>> 0x00000000000000000000000000000000
>> (327) Thu Apr 15 15:40:43 2021: Debug: Finished request
>> (317) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 219
>> with timestamp +4564
>> (318) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 220
>> with timestamp +4564
>> (319) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 221
>> with timestamp +4564
>> (328) Thu Apr 15 15:40:45 2021: Debug: Received Status-Server Id 161 from
>> 127.0.0.1:45116 to 127.0.0.1:18121 length 50
>> (328) Thu Apr 15 15:40:45 2021: Debug:   Message-Authenticator =
>> 0x0630aabb861db1ebd2a0892a5d55941e
>> (328) Thu Apr 15 15:40:45 2021: Debug:   FreeRADIUS-Statistics-Type = 15
>> (328) Thu Apr 15 15:40:45 2021: Debug: # Executing group from file
>> /usr/local/pf/raddb/sites-enabled/status
>> (328) Thu Apr 15 15:40:45 2021: Debug:   Autz-Type Status-Server {
>> (328) Thu Apr 15 15:40:45 2021: Debug:     [ok] = ok
>> (328) Thu Apr 15 15:40:45 2021: Debug:   } # Autz-Type Status-Server = ok
>> (328) Thu Apr 15 15:40:45 2021: Debug: Sent Access-Accept Id 161 from
>> 127.0.0.1:18121 to 127.0.0.1:45116 length 0
>>
>>
>>
>> Thank you for any guidance you can give!
>>
>> Joshua Nathan
>> *IT Supervisor*
>> Black Forest Academy
>>
>> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
>> a:
>> w: Hammersteiner Straße 50, 79400 Kandern
>> bfacademy.de
>>
>>
>> _______________________________________________
>> PacketFence-users mailing list
>> PacketFence-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>>
>>
>>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to