Can you show me the output of:

/usr/local/pf/bin/pftest authentication josh.nathan “"

Thanks,

Ludovic Zammit
Product Support Engineer Principal

Cell: +1.613.670.8432
Akamai Technologies - Inverse
145 Broadway
Cambridge, MA 02142
Connect with Us:         <https://community.akamai.com/>  
<http://blogs.akamai.com/>  <https://twitter.com/akamai>  
<http://www.facebook.com/AkamaiTechnologies>  
<http://www.linkedin.com/company/akamai-technologies>  
<http://www.youtube.com/user/akamaitechnologies?feature=results_main>

> On Apr 22, 2021, at 9:29 AM, Nathan, Josh <josh.nat...@bfacademy.de> wrote:
> 
> I did.  That last email is seriously all that's there.
> 
> [root@gatekeeper ~]# grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log
> Apr 16 09:13:51 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
> the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
> the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
> the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
> the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
> the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
> the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
> the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
> the first one 'null' (pf::radius::_parseRequest)
> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request 
> (pf::api::handle_accounting_metadata)
> 
> That second entry from Apr 15 15:40:15 to Apr 15 15:41:04 is completely 
> unfiltered.  Absolutely everything logged between those times is there, and 
> in that time frame I got a fairly sizable radius debug log (the end of which 
> I included in my first email).
> 
> I'm gathering from your email, though, that somehow my installation is broken?
> 
>       
> Joshua Nathan
> IT Supervisor
> Black Forest Academy
> 
> p:    +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
> a:
> w:    Hammersteiner Straße 50, 79400 Kandern
> bfacademy.de 
> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!B7qezokXY0TqZivbu8796GT9wHac_nTZpP5E0VzzSWfmQwPEWrds3Q5ok_bHfw$>
> 
> 
> 
> 
> On Thu, Apr 22, 2021 at 3:17 PM Zammit, Ludovic <luza...@akamai.com 
> <mailto:luza...@akamai.com>> wrote:
> Hello Nathan,
> 
> Show me the output of:
> 
> grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log
> 
> Thanks,
> 
> Ludovic Zammit
> Product Support Engineer Principal
> 
> Cell: +1.613.670.8432
> Akamai Technologies - Inverse
> 145 Broadway
> Cambridge, MA 02142
> Connect with Us:       <https://community.akamai.com/>  
> <http://blogs.akamai.com/>  
> <https://urldefense.com/v3/__https://twitter.com/akamai__;!!GjvTz_vk!B7qezokXY0TqZivbu8796GT9wHac_nTZpP5E0VzzSWfmQwPEWrds3Q430QvTww$>
>   
> <https://urldefense.com/v3/__http://www.facebook.com/AkamaiTechnologies__;!!GjvTz_vk!B7qezokXY0TqZivbu8796GT9wHac_nTZpP5E0VzzSWfmQwPEWrds3Q4x4PfWoQ$>
>   
> <https://urldefense.com/v3/__http://www.linkedin.com/company/akamai-technologies__;!!GjvTz_vk!B7qezokXY0TqZivbu8796GT9wHac_nTZpP5E0VzzSWfmQwPEWrds3Q5dlvv3hQ$>
>   
> <https://urldefense.com/v3/__http://www.youtube.com/user/akamaitechnologies?feature=results_main__;!!GjvTz_vk!B7qezokXY0TqZivbu8796GT9wHac_nTZpP5E0VzzSWfmQwPEWrds3Q5u1tKdpQ$>
> 
>> On Apr 22, 2021, at 2:35 AM, Nathan, Josh <josh.nat...@bfacademy.de 
>> <mailto:josh.nat...@bfacademy.de>> wrote:
>> 
>> Any further insights regarding what I could try or where I should look?  
>> I've not had any luck this week at figuring anything out, either. :-/
>> 
>>      
>> Joshua Nathan
>> IT Supervisor
>> Black Forest Academy
>> 
>> p:   +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
>> a:
>> w:   Hammersteiner Straße 50, 79400 Kandern
>> bfacademy.de 
>> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmISt3FAmr$>
>> 
>> 
>> 
>> 
>> On Fri, Apr 16, 2021 at 9:39 AM Nathan, Josh <josh.nat...@bfacademy.de 
>> <mailto:josh.nat...@bfacademy.de>> wrote:
>> Hello Ludovic,
>> 
>> OK, here's from this morning:
>> 
>> [root@gatekeeper ~]# grep 58:cb:52:37:5d:ab 
>> /usr/local/pf/logs/packetfence.log
>> Apr 16 09:13:51 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request 
>> (pf::api::handle_accounting_metadata)
>> 
>> And here's from yesterday during that 15:40 timeframe if that helps:
>> 
>> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2161) INFO: Using 300 
>> resolution threshold (pf::pfcron::task::cluster_check::run)
>> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2161) INFO: All cluster 
>> members are running the same configuration version 
>> (pf::pfcron::task::cluster_check::run)
>> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2162) INFO: getting 
>> security_events triggers for accounting cleanup 
>> (pf::accounting::acct_maintenance)
>> Apr 15 15:40:42 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping 
>> the first one 'null' (pf::radius::_parseRequest)
>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: 
>> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request 
>> (pf::api::handle_accounting_metadata)
>> Apr 15 15:41:04 gatekeeper pfqueue: pfqueue(17589) WARN: 
>> [mac:00:25:90:87:e9:50] Unable to pull accounting history for device 
>> 00:25:90:87:e9:50. The history set doesn't exist yet. 
>> (pf::accounting_events_history::latest_mac_history)
>> 
>>      
>> Joshua Nathan
>> IT Supervisor
>> Black Forest Academy
>> 
>> p:   +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
>> a:
>> w:   Hammersteiner Straße 50, 79400 Kandern
>> bfacademy.de 
>> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmISt3FAmr$>
>> 
>> 
>> 
>> 
>> On Thu, Apr 15, 2021 at 3:52 PM Ludovic Zammit <lzam...@inverse.ca 
>> <mailto:lzam...@inverse.ca>> wrote:
>> Hello Nathan,
>> 
>> Show me the output of:
>> 
>> grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log
>> 
>> Thanks,
>> 
>> Ludovic Zammit
>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) :: 
>>  www.inverse.ca <https://www.inverse.ca/>
>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu 
>> <https://urldefense.com/v3/__http://www.sogo.nu/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIdmZL8FU$>)
>>  and PacketFence (http://packetfence.org <http://packetfence.org/>)
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>>> On Apr 15, 2021, at 9:48 AM, Nathan, Josh via PacketFence-users 
>>> <packetfence-users@lists.sourceforge.net 
>>> <mailto:packetfence-users@lists.sourceforge.net>> wrote:
>>> 
>>> Hello,
>>> 
>>> So, I'm trying to configure a 10.2 Zen version of PF. Our user 
>>> authentication happens via RADIUS.  So I configured our RADIUS server under 
>>> the "Internal Sources" section, and everything is now "mostly" working.  My 
>>> devices authenticate, but the Authentication Rules don't seem to be taking 
>>> effect.
>>> 
>>> When I try using the debug command for RADIUS (raddebug -f 
>>> /usr/local/pf/var/run/radiusd.sock -t 3600), here's what I get.  There must 
>>> be a setting I'm missing somewhere.  The packetfence.log file is 
>>> effectively silent on the issue.
>>> 
>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Processing response header
>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest:   Status : 200 (OK)
>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest:   Type   : json 
>>> (application/json)
>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Parsing attribute 
>>> "control:PacketFence-Authorization-Status"
>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: EXPAND allow
>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest:    --> allow
>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: 
>>> PacketFence-Authorization-Status := "allow"
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     [rest] = updated
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent EAP Response (code 2) 
>>> ID 56 length 46
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Continuing tunnel setup
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     [eap] = ok
>>> (327) Thu Apr 15 15:40:43 2021: Debug:   } # authorize = ok
>>> (327) Thu Apr 15 15:40:43 2021: Debug: Found Auth-Type = eap
>>> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing group from file 
>>> /usr/local/pf/raddb/sites-enabled/packetfence
>>> (327) Thu Apr 15 15:40:43 2021: Debug:   authenticate {
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Expiring EAP session with state 
>>> 0xce6b3ab6c75323c5
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Finished EAP session with state 
>>> 0xce6b3ab6c75323c5
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Previous EAP request found for 
>>> state 0xce6b3ab6c75323c5, released from the list
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent packet with method 
>>> EAP PEAP (25)
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Calling submodule eap_peap to 
>>> process data
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Continuing EAP-TLS
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls verify] = ok
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Done initial handshake
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls process] = ok
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Session established.  
>>> Decoding tunneled attributes
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: PEAP state send tlv success
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Received EAP-TLV response
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Success
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Using saved attributes 
>>> from the original Access-Accept
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap:   User-Name = "josh.nathan"
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Sending EAP Success (code 3) ID 
>>> 56 length 4
>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Freeing handler
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     [eap] = ok
>>> (327) Thu Apr 15 15:40:43 2021: Debug:   } # authenticate = ok
>>> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing section post-auth from 
>>> file /usr/local/pf/raddb/sites-enabled/packetfence
>>> (327) Thu Apr 15 15:40:43 2021: Debug:   post-auth {
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     update {
>>> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND %{Packet-Src-IP-Address}
>>> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 172.20.50.76
>>> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND %{Packet-Dst-IP-Address}
>>> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 172.20.104.31
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     } # update = noop
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     policy packetfence-set-tenant-id 
>>> {
>>> (327) Thu Apr 15 15:40:43 2021: Debug:       if (!NAS-IP-Address || 
>>> NAS-IP-Address == "0.0.0.0"){
>>> (327) Thu Apr 15 15:40:43 2021: Debug:       if (!NAS-IP-Address || 
>>> NAS-IP-Address == "0.0.0.0") -> FALSE
>>> (327) Thu Apr 15 15:40:43 2021: Debug:       if ( 
>>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
>>> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND 
>>> %{%{control:PacketFence-Tenant-Id}:-0}
>>> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 1
>>> (327) Thu Apr 15 15:40:43 2021: Debug:       if ( 
>>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
>>> (327) Thu Apr 15 15:40:43 2021: Debug:       if ( 
>>> &control:PacketFence-Tenant-Id == 0 ) {
>>> (327) Thu Apr 15 15:40:43 2021: Debug:       if ( 
>>> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     } # policy 
>>> packetfence-set-tenant-id = noop
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     if 
>>> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     EXPAND 
>>> %{%{control:PacketFence-Proxied-From}:-False}
>>> (327) Thu Apr 15 15:40:43 2021: Debug:        --> False
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     if 
>>> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     if (! EAP-Type || (EAP-Type != 
>>> TTLS  && EAP-Type != PEAP) ) {
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     if (! EAP-Type || (EAP-Type != 
>>> TTLS  && EAP-Type != PEAP) )  -> FALSE
>>> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth: 
>>> EXPAND %{User-Name}
>>> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:   
>>>  --> josh.nathan
>>> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth: 
>>> Matched entry DEFAULT at line 10
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     
>>> [attr_filter.packetfence_post_auth] = updated
>>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND 
>>> messages.%{%{reply:Packet-Type}:-default}
>>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog:    --> 
>>> messages.Access-Accept
>>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND 
>>> [mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned 
>>> VLAN %{reply:Tunnel-Private-Group-ID}
>>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog:    --> 
>>> [mac:58:cb:52:37:5d:ab] Accepted user: josh.nathan and returned VLAN
>>> (327) Thu Apr 15 15:40:43 2021: Debug:     [linelog] = ok
>>> (327) Thu Apr 15 15:40:43 2021: Debug:   } # post-auth = updated
>>> (327) Thu Apr 15 15:40:43 2021: Debug: Sent Access-Accept Id 229 from 
>>> 172.20.104.31:1812 
>>> <https://urldefense.com/v3/__http://172.20.104.31:1812/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIQCj3ZD8$>
>>>  to 172.20.50.76:40485 
>>> <https://urldefense.com/v3/__http://172.20.50.76:40485/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIavZqZFs$>
>>>  length 0
>>> (327) Thu Apr 15 15:40:43 2021: Debug:   User-Name = "josh.nathan"
>>> (327) Thu Apr 15 15:40:43 2021: Debug:   MS-MPPE-Recv-Key = 
>>> 0x600da060c2faa9fdf49eb732f5110f438b5d71f66e661345f268bf24252e85c3
>>> (327) Thu Apr 15 15:40:43 2021: Debug:   MS-MPPE-Send-Key = 
>>> 0x8d6d99afd78af3ebade3b3869adc9ceef8f9782d323d553bce8cf5c1511d05d1
>>> (327) Thu Apr 15 15:40:43 2021: Debug:   EAP-Message = 0x03380004
>>> (327) Thu Apr 15 15:40:43 2021: Debug:   Message-Authenticator = 
>>> 0x00000000000000000000000000000000
>>> (327) Thu Apr 15 15:40:43 2021: Debug: Finished request
>>> (317) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 219 
>>> with timestamp +4564
>>> (318) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 220 
>>> with timestamp +4564
>>> (319) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 221 
>>> with timestamp +4564
>>> (328) Thu Apr 15 15:40:45 2021: Debug: Received Status-Server Id 161 from 
>>> 127.0.0.1:45116 
>>> <https://urldefense.com/v3/__http://127.0.0.1:45116/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIf5Jx0mf$>
>>>  to 127.0.0.1:18121 
>>> <https://urldefense.com/v3/__http://127.0.0.1:18121/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIecH5d9e$>
>>>  length 50
>>> (328) Thu Apr 15 15:40:45 2021: Debug:   Message-Authenticator = 
>>> 0x0630aabb861db1ebd2a0892a5d55941e
>>> (328) Thu Apr 15 15:40:45 2021: Debug:   FreeRADIUS-Statistics-Type = 15
>>> (328) Thu Apr 15 15:40:45 2021: Debug: # Executing group from file 
>>> /usr/local/pf/raddb/sites-enabled/status
>>> (328) Thu Apr 15 15:40:45 2021: Debug:   Autz-Type Status-Server {
>>> (328) Thu Apr 15 15:40:45 2021: Debug:     [ok] = ok
>>> (328) Thu Apr 15 15:40:45 2021: Debug:   } # Autz-Type Status-Server = ok
>>> (328) Thu Apr 15 15:40:45 2021: Debug: Sent Access-Accept Id 161 from 
>>> 127.0.0.1:18121 
>>> <https://urldefense.com/v3/__http://127.0.0.1:18121/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIecH5d9e$>
>>>  to 127.0.0.1:45116 
>>> <https://urldefense.com/v3/__http://127.0.0.1:45116/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIf5Jx0mf$>
>>>  length 0
>>> 
>>> 
>>> Thank you for any guidance you can give!
>>> 
>>>     
>>> Joshua Nathan
>>> IT Supervisor
>>> Black Forest Academy
>>> 
>>> p:  +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
>>> a:
>>> w:  Hammersteiner Straße 50, 79400 Kandern
>>> bfacademy.de 
>>> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmISt3FAmr$>
>>> 
>>> 
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> PacketFence-users@lists.sourceforge.net 
>>> <mailto:PacketFence-users@lists.sourceforge.net>
>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users 
>>> <https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIW82ehl3$>
>> 
> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to