Hello Josh, In authentication.conf remove all realm configuration related to all sources, leave the automatic selection to happen.
I’m assuming your are using that connection profile "BFA-WiFi”. Add the "JumpCloud-RADIUS” source. Try again and let me know. Thanks, Ludovic Zammit Product Support Engineer Principal Cell: +1.613.670.8432 Akamai Technologies - Inverse 145 Broadway Cambridge, MA 02142 Connect with Us: <https://community.akamai.com/> <http://blogs.akamai.com/> <https://twitter.com/akamai> <http://www.facebook.com/AkamaiTechnologies> <http://www.linkedin.com/company/akamai-technologies> <http://www.youtube.com/user/akamaitechnologies?feature=results_main> > On Apr 26, 2021, at 6:21 AM, Nathan, Josh <josh.nat...@bfacademy.de> wrote: > > Hello Ludovic, > > OK, here are those files. I'll mention as a "side"... while I do have a > "bfacademy.de > <https://urldefense.com/v3/__http://bfacademy.de__;!!GjvTz_vk!FFrO2sQq7J-ovBxfefGYXcVb0QArlA7MBayGiccYOlCIPtqLIYd601ooN94O_w$>" > realm configured, that one doesn't seem to work. I'm thinking that's > because our authentication provider doesn't use the domain name with the > username. Whenever I include the domain name in my authentication process, I > get invalid username/password. But if I authenticate without the domain > name, it works. Anyway, just including that info as an FYI. In our 9.0 > instance that's been quite happily working, we've not been using the domain > name either. Anyway... > > realms.conf: > [1 DEFAULT] > permit_custom_attributes=disabled > radius_auth_proxy_type=keyed-balance > radius_auth_compute_in_pf=enabled > eduroam_radius_auth= > eduroam_radius_auth_proxy_type=keyed-balance > eduroam_radius_acct= > radius_acct_proxy_type=load-balance > radius_auth=JumpCloud-RADIUS > eduroam_radius_auth_compute_in_pf=enabled > eduroam_radius_acct_proxy_type=load-balance > radius_acct= > > [1 LOCAL] > permit_custom_attributes=disabled > radius_auth_proxy_type=keyed-balance > radius_auth_compute_in_pf=enabled > eduroam_radius_auth= > eduroam_radius_auth_proxy_type=keyed-balance > eduroam_radius_acct= > radius_acct_proxy_type=load-balance > radius_auth=JumpCloud-RADIUS > eduroam_radius_auth_compute_in_pf=enabled > eduroam_radius_acct_proxy_type=load-balance > radius_acct= > > [1 bfacademy.de > <https://urldefense.com/v3/__http://bfacademy.de__;!!GjvTz_vk!FFrO2sQq7J-ovBxfefGYXcVb0QArlA7MBayGiccYOlCIPtqLIYd601ooN94O_w$>] > permit_custom_attributes=disabled > radius_auth_proxy_type=keyed-balance > radius_auth_compute_in_pf=disabled > admin_strip_username=enabled > eduroam_radius_auth= > radius_strip_username=enabled > eduroam_radius_auth_proxy_type=keyed-balance > eduroam_radius_acct= > portal_strip_username=enabled > eap=default > radius_acct_proxy_type=load-balance > radius_auth=JumpCloud-RADIUS > eduroam_radius_auth_compute_in_pf=disabled > eduroam_radius_acct_proxy_type=load-balance > regex=bfacademy.de > <https://urldefense.com/v3/__http://bfacademy.de__;!!GjvTz_vk!FFrO2sQq7J-ovBxfefGYXcVb0QArlA7MBayGiccYOlCIPtqLIYd601ooN94O_w$> > radius_acct= > > > profiles.conf: > [default] > reuse_dot1x_credentials=disabled > sources=JumpCloud-RADIUS > provisioners=android-TLS-test,windows-tls,ios,accept > > [BFA-WiFi] > locale= > advanced_filter= > provisioners= > filter=ssid:BFA-EAP-Test > autoregister=enabled > > authentication.conf: > [JumpCloud-RADIUS] > realms=bfacademy.de > <https://urldefense.com/v3/__http://bfacademy.de__;!!GjvTz_vk!FFrO2sQq7J-ovBxfefGYXcVb0QArlA7MBayGiccYOlCIPtqLIYd601ooN94O_w$>,local,default,null > options=type = auth > monitor=1 > secret=[redacted] > port=1812 > description=RADIUS source for authentication against JumpCloud > host=18.194.159.20 > timeout=5 > type=RADIUS > set_access_durations_action= > > [JumpCloud-RADIUS rule IsStaffDevice] > action0=set_role=staff > condition0=username,matches regexp,^[a-zA-Z]+\.[a-zA-Z0-9]+ > status=enabled > match=any > class=authentication > action1=set_access_duration=2W > description=Check if the login belongs to a staff member > > > > Joshua Nathan > IT Supervisor > Black Forest Academy > > p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056 > a: > w: Hammersteiner Straße 50, 79400 Kandern > bfacademy.de > <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!FFrO2sQq7J-ovBxfefGYXcVb0QArlA7MBayGiccYOlCIPtqLIYd601oRe_E-Bw$> > > > > > On Fri, Apr 23, 2021 at 5:30 PM Zammit, Ludovic <luza...@akamai.com > <mailto:luza...@akamai.com>> wrote: > Hello Nathan, > > Show me the content of your: > > - conf/realms.conf > - conf/profiles.conf > - conf/authentication.conf (JumpCloud-RADIUS section if that’s the source you > try to match) > >>> RADIUS request contains more than one realm. Keeping the first one 'null’ > > It’s defiantly the source of the issue I think. > > Thanks, > > Ludovic Zammit > Product Support Engineer Principal > > Cell: +1.613.670.8432 > Akamai Technologies - Inverse > 145 Broadway > Cambridge, MA 02142 > Connect with Us: <https://community.akamai.com/> > <http://blogs.akamai.com/> > <https://urldefense.com/v3/__https://twitter.com/akamai__;!!GjvTz_vk!FFrO2sQq7J-ovBxfefGYXcVb0QArlA7MBayGiccYOlCIPtqLIYd601qJzqd6Eg$> > > <https://urldefense.com/v3/__http://www.facebook.com/AkamaiTechnologies__;!!GjvTz_vk!FFrO2sQq7J-ovBxfefGYXcVb0QArlA7MBayGiccYOlCIPtqLIYd601qItZ5yxg$> > > <https://urldefense.com/v3/__http://www.linkedin.com/company/akamai-technologies__;!!GjvTz_vk!FFrO2sQq7J-ovBxfefGYXcVb0QArlA7MBayGiccYOlCIPtqLIYd601rvJCG70Q$> > > <https://urldefense.com/v3/__http://www.youtube.com/user/akamaitechnologies?feature=results_main__;!!GjvTz_vk!FFrO2sQq7J-ovBxfefGYXcVb0QArlA7MBayGiccYOlCIPtqLIYd601qO3_COQw$> > >> On Apr 23, 2021, at 9:05 AM, Nathan, Josh <josh.nat...@bfacademy.de >> <mailto:josh.nat...@bfacademy.de>> wrote: >> >> Well that was interesting... I made some quick tweaks as I saw the results >> of the command you had me run. Apparently neither "StrippedUser Name" nor >> "radius_request.User-Name" register. When I finally switched it to just >> "username", the pftest authentication command finally registered the rule. >> That being said, I'm still getting the same result, so I'm still including >> the information you asked for. Just to be thorough, I'm also including a >> fresh set of logs from packetfence.log and attaching the full raddebug from >> a connection test. As before, my phone does connect, but it's not being >> assigned the VLAN as it should. And from what I can see, the issue doesn't >> seem to be related to my configuration of the Ubiquiti equipment since it >> doesn't look like RADIUS is registering a target VLAN and PF isn't even >> including it in the RADIUS audit logs... >> >> /usr/local/pf/bin/pftest authentication josh.nathan "[password redacted]" >> Testing authentication for "josh.nathan" >> >> Authenticating against 'local' in context 'admin' >> Authentication FAILED against local (Invalid login or password) >> Did not match against local for 'authentication' rules >> Did not match against local for 'administration' rules >> >> Authenticating against 'local' in context 'portal' >> Authentication FAILED against local (Invalid login or password) >> Did not match against local for 'authentication' rules >> Did not match against local for 'administration' rules >> >> Authenticating against 'file1' in context 'admin' >> Authentication FAILED against file1 (Invalid login or password) >> Did not match against file1 for 'authentication' rules >> Did not match against file1 for 'administration' rules >> >> Authenticating against 'file1' in context 'portal' >> Authentication FAILED against file1 (Invalid login or password) >> Did not match against file1 for 'authentication' rules >> Did not match against file1 for 'administration' rules >> >> Authenticating against 'sms' in context 'admin' >> Authentication FAILED against sms (Invalid login or password) >> Matched against sms for 'authentication' rule catchall >> set_role : guest >> set_access_duration : 1D >> Did not match against sms for 'administration' rules >> >> Authenticating against 'sms' in context 'portal' >> Authentication FAILED against sms (Invalid login or password) >> Matched against sms for 'authentication' rule catchall >> set_role : guest >> set_access_duration : 1D >> Did not match against sms for 'administration' rules >> >> Authenticating against 'email' in context 'admin' >> Authentication SUCCEEDED against email () >> Matched against email for 'authentication' rule catchall >> set_role : guest >> set_access_duration : 1D >> Did not match against email for 'administration' rules >> >> Authenticating against 'email' in context 'portal' >> Authentication SUCCEEDED against email () >> Matched against email for 'authentication' rule catchall >> set_role : guest >> set_access_duration : 1D >> Did not match against email for 'administration' rules >> >> Authenticating against 'sponsor' in context 'admin' >> Authentication SUCCEEDED against sponsor () >> Matched against sponsor for 'authentication' rule catchall >> set_role : guest >> set_access_duration : 1D >> Did not match against sponsor for 'administration' rules >> >> Authenticating against 'sponsor' in context 'portal' >> Authentication SUCCEEDED against sponsor () >> Matched against sponsor for 'authentication' rule catchall >> set_role : guest >> set_access_duration : 1D >> Did not match against sponsor for 'administration' rules >> >> Authenticating against 'null' in context 'admin' >> Authentication SUCCEEDED against null () >> Matched against null for 'authentication' rule catchall >> set_role : guest >> set_access_duration : 1D >> Did not match against null for 'administration' rules >> >> Authenticating against 'null' in context 'portal' >> Authentication SUCCEEDED against null () >> Matched against null for 'authentication' rule catchall >> set_role : guest >> set_access_duration : 1D >> Did not match against null for 'administration' rules >> >> Authenticating against 'JumpCloud-RADIUS' in context 'admin' >> Authentication SUCCEEDED against JumpCloud-RADIUS (Authentication >> successful.) >> Matched against JumpCloud-RADIUS for 'authentication' rule IsStaffDevice >> set_role : staff >> set_access_duration : 2W >> Did not match against JumpCloud-RADIUS for 'administration' rules >> >> Authenticating against 'JumpCloud-RADIUS' in context 'portal' >> Authentication SUCCEEDED against JumpCloud-RADIUS (Authentication >> successful.) >> Matched against JumpCloud-RADIUS for 'authentication' rule IsStaffDevice >> set_role : staff >> set_access_duration : 2W >> Did not match against JumpCloud-RADIUS for 'administration' rules >> >> >> Fresh packetfence.log query: >> >> # grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log >> Apr 23 14:49:58 gatekeeper packetfence_httpd.aaa: httpd.aaa(10390) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping >> the first one 'null' (pf::radius::_parseRequest) >> Apr 23 14:49:58 gatekeeper packetfence_httpd.aaa: httpd.aaa(10390) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping >> the first one 'null' (pf::radius::_parseRequest) >> Apr 23 14:49:58 gatekeeper packetfence_httpd.aaa: httpd.aaa(10390) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping >> the first one 'null' (pf::radius::_parseRequest) >> Apr 23 14:49:58 gatekeeper packetfence_httpd.aaa: httpd.aaa(10390) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping >> the first one 'null' (pf::radius::_parseRequest) >> Apr 23 14:49:58 gatekeeper packetfence_httpd.aaa: httpd.aaa(10390) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping >> the first one 'null' (pf::radius::_parseRequest) >> Apr 23 14:49:58 gatekeeper packetfence_httpd.aaa: httpd.aaa(10390) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping >> the first one 'null' (pf::radius::_parseRequest) >> Apr 23 14:49:59 gatekeeper packetfence_httpd.aaa: httpd.aaa(10390) INFO: >> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. Keeping >> the first one 'null' (pf::radius::_parseRequest) >> Apr 23 14:49:59 gatekeeper pfqueue: pfqueue(10475) INFO: >> [mac:58:cb:52:37:5d:ab] Removing parking actions for 1a:03:00:cd:70:36 >> (pf::parking::remove_parking_actions) >> Apr 23 14:50:00 gatekeeper pfqueue: pfqueue(10475) WARN: >> [mac:58:cb:52:37:5d:ab] Unable to pull accounting history for device >> 58:cb:52:37:5d:ab. The history set doesn't exist yet. >> (pf::accounting_events_history::latest_mac_history) >> Apr 23 14:50:00 gatekeeper pfqueue: pfqueue(10475) WARN: >> [mac:58:cb:52:37:5d:ab] Unable to pull accounting history for device >> 58:cb:52:37:5d:ab. The history set doesn't exist yet. >> (pf::accounting_events_history::latest_mac_history) >> Apr 23 14:50:00 gatekeeper pfqueue: pfqueue(10492) WARN: >> [mac:58:cb:52:37:5d:ab] Unable to match MAC address to IP '172.20.104.21' >> (pf::ip4log::ip2mac) >> Apr 23 14:50:00 gatekeeper pfqueue: pfqueue(10492) INFO: >> [mac:58:cb:52:37:5d:ab] oldip (172.20.104.32) and newip (172.20.104.21) are >> different for 58:cb:52:37:5d:ab - closing ip4log entry >> (pf::api::update_ip4log) >> Apr 23 14:50:01 gatekeeper packetfence_httpd.aaa: httpd.aaa(10390) INFO: >> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request >> (pf::api::handle_accounting_metadata) >> >> Thank you! >> >> >> Joshua Nathan >> IT Supervisor >> Black Forest Academy >> >> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056 >> a: >> w: Hammersteiner Straße 50, 79400 Kandern >> bfacademy.de >> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!G6xjCEDcR2WraV6R1ARgoSb2HNjnRLG2hY-EoIq4mkHJN_mEm7HiHP86FZUtOQ$> >> >> >> >> >> On Thu, Apr 22, 2021 at 3:37 PM Zammit, Ludovic <luza...@akamai.com >> <mailto:luza...@akamai.com>> wrote: >> Can you show me the output of: >> >> /usr/local/pf/bin/pftest authentication josh.nathan “" >> >> Thanks, >> >> Ludovic Zammit >> Product Support Engineer Principal >> >> Cell: +1.613.670.8432 >> Akamai Technologies - Inverse >> 145 Broadway >> Cambridge, MA 02142 >> Connect with Us: <https://community.akamai.com/> >> <http://blogs.akamai.com/> >> <https://urldefense.com/v3/__https://twitter.com/akamai__;!!GjvTz_vk!G6xjCEDcR2WraV6R1ARgoSb2HNjnRLG2hY-EoIq4mkHJN_mEm7HiHP9548CQ1A$> >> >> <https://urldefense.com/v3/__http://www.facebook.com/AkamaiTechnologies__;!!GjvTz_vk!G6xjCEDcR2WraV6R1ARgoSb2HNjnRLG2hY-EoIq4mkHJN_mEm7HiHP-cF2_Gzg$> >> >> <https://urldefense.com/v3/__http://www.linkedin.com/company/akamai-technologies__;!!GjvTz_vk!G6xjCEDcR2WraV6R1ARgoSb2HNjnRLG2hY-EoIq4mkHJN_mEm7HiHP-LrVSryA$> >> >> <https://urldefense.com/v3/__http://www.youtube.com/user/akamaitechnologies?feature=results_main__;!!GjvTz_vk!G6xjCEDcR2WraV6R1ARgoSb2HNjnRLG2hY-EoIq4mkHJN_mEm7HiHP_SfeOIoQ$> >> >>> On Apr 22, 2021, at 9:29 AM, Nathan, Josh <josh.nat...@bfacademy.de >>> <mailto:josh.nat...@bfacademy.de>> wrote: >>> >>> I did. That last email is seriously all that's there. >>> >>> [root@gatekeeper ~]# grep 58:cb:52:37:5d:ab >>> /usr/local/pf/logs/packetfence.log >>> Apr 16 09:13:51 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>> Keeping the first one 'null' (pf::radius::_parseRequest) >>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>> Keeping the first one 'null' (pf::radius::_parseRequest) >>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>> Keeping the first one 'null' (pf::radius::_parseRequest) >>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>> Keeping the first one 'null' (pf::radius::_parseRequest) >>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>> Keeping the first one 'null' (pf::radius::_parseRequest) >>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>> Keeping the first one 'null' (pf::radius::_parseRequest) >>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>> Keeping the first one 'null' (pf::radius::_parseRequest) >>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>> Keeping the first one 'null' (pf::radius::_parseRequest) >>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request >>> (pf::api::handle_accounting_metadata) >>> >>> That second entry from Apr 15 15:40:15 to Apr 15 15:41:04 is completely >>> unfiltered. Absolutely everything logged between those times is there, and >>> in that time frame I got a fairly sizable radius debug log (the end of >>> which I included in my first email). >>> >>> I'm gathering from your email, though, that somehow my installation is >>> broken? >>> >>> >>> Joshua Nathan >>> IT Supervisor >>> Black Forest Academy >>> >>> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056 >>> a: >>> w: Hammersteiner Straße 50, 79400 Kandern >>> bfacademy.de >>> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!B7qezokXY0TqZivbu8796GT9wHac_nTZpP5E0VzzSWfmQwPEWrds3Q5ok_bHfw$> >>> >>> >>> >>> >>> On Thu, Apr 22, 2021 at 3:17 PM Zammit, Ludovic <luza...@akamai.com >>> <mailto:luza...@akamai.com>> wrote: >>> Hello Nathan, >>> >>> Show me the output of: >>> >>> grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log >>> >>> Thanks, >>> >>> Ludovic Zammit >>> Product Support Engineer Principal >>> >>> Cell: +1.613.670.8432 >>> Akamai Technologies - Inverse >>> 145 Broadway >>> Cambridge, MA 02142 >>> Connect with Us: <https://community.akamai.com/> >>> <http://blogs.akamai.com/> >>> <https://urldefense.com/v3/__https://twitter.com/akamai__;!!GjvTz_vk!B7qezokXY0TqZivbu8796GT9wHac_nTZpP5E0VzzSWfmQwPEWrds3Q430QvTww$> >>> >>> <https://urldefense.com/v3/__http://www.facebook.com/AkamaiTechnologies__;!!GjvTz_vk!B7qezokXY0TqZivbu8796GT9wHac_nTZpP5E0VzzSWfmQwPEWrds3Q4x4PfWoQ$> >>> >>> <https://urldefense.com/v3/__http://www.linkedin.com/company/akamai-technologies__;!!GjvTz_vk!B7qezokXY0TqZivbu8796GT9wHac_nTZpP5E0VzzSWfmQwPEWrds3Q5dlvv3hQ$> >>> >>> <https://urldefense.com/v3/__http://www.youtube.com/user/akamaitechnologies?feature=results_main__;!!GjvTz_vk!B7qezokXY0TqZivbu8796GT9wHac_nTZpP5E0VzzSWfmQwPEWrds3Q5u1tKdpQ$> >>> >>>> On Apr 22, 2021, at 2:35 AM, Nathan, Josh <josh.nat...@bfacademy.de >>>> <mailto:josh.nat...@bfacademy.de>> wrote: >>>> >>>> Any further insights regarding what I could try or where I should look? >>>> I've not had any luck this week at figuring anything out, either. :-/ >>>> >>>> >>>> Joshua Nathan >>>> IT Supervisor >>>> Black Forest Academy >>>> >>>> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056 >>>> a: >>>> w: Hammersteiner Straße 50, 79400 Kandern >>>> bfacademy.de >>>> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmISt3FAmr$> >>>> >>>> >>>> >>>> >>>> On Fri, Apr 16, 2021 at 9:39 AM Nathan, Josh <josh.nat...@bfacademy.de >>>> <mailto:josh.nat...@bfacademy.de>> wrote: >>>> Hello Ludovic, >>>> >>>> OK, here's from this morning: >>>> >>>> [root@gatekeeper ~]# grep 58:cb:52:37:5d:ab >>>> /usr/local/pf/logs/packetfence.log >>>> Apr 16 09:13:51 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 16 09:13:52 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request >>>> (pf::api::handle_accounting_metadata) >>>> >>>> And here's from yesterday during that 15:40 timeframe if that helps: >>>> >>>> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2161) INFO: Using 300 >>>> resolution threshold (pf::pfcron::task::cluster_check::run) >>>> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2161) INFO: All cluster >>>> members are running the same configuration version >>>> (pf::pfcron::task::cluster_check::run) >>>> Apr 15 15:40:15 gatekeeper packetfence: pfperl-api(2162) INFO: getting >>>> security_events triggers for accounting cleanup >>>> (pf::accounting::acct_maintenance) >>>> Apr 15 15:40:42 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] RADIUS request contains more than one realm. >>>> Keeping the first one 'null' (pf::radius::_parseRequest) >>>> Apr 15 15:40:43 gatekeeper packetfence_httpd.aaa: httpd.aaa(2054) INFO: >>>> [mac:58:cb:52:37:5d:ab] Updating locationlog from accounting request >>>> (pf::api::handle_accounting_metadata) >>>> Apr 15 15:41:04 gatekeeper pfqueue: pfqueue(17589) WARN: >>>> [mac:00:25:90:87:e9:50] Unable to pull accounting history for device >>>> 00:25:90:87:e9:50. The history set doesn't exist yet. >>>> (pf::accounting_events_history::latest_mac_history) >>>> >>>> >>>> Joshua Nathan >>>> IT Supervisor >>>> Black Forest Academy >>>> >>>> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056 >>>> a: >>>> w: Hammersteiner Straße 50, 79400 Kandern >>>> bfacademy.de >>>> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmISt3FAmr$> >>>> >>>> >>>> >>>> >>>> On Thu, Apr 15, 2021 at 3:52 PM Ludovic Zammit <lzam...@inverse.ca >>>> <mailto:lzam...@inverse.ca>> wrote: >>>> Hello Nathan, >>>> >>>> Show me the output of: >>>> >>>> grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log >>>> >>>> Thanks, >>>> >>>> Ludovic Zammit >>>> lzam...@inverse.ca <mailto:lzam...@inverse.ca> :: +1.514.447.4918 (x145) >>>> :: www.inverse.ca <https://www.inverse.ca/> >>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu >>>> <https://urldefense.com/v3/__http://www.sogo.nu/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIdmZL8FU$>) >>>> and PacketFence (http://packetfence.org <http://packetfence.org/>) >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>>> On Apr 15, 2021, at 9:48 AM, Nathan, Josh via PacketFence-users >>>>> <packetfence-users@lists.sourceforge.net >>>>> <mailto:packetfence-users@lists.sourceforge.net>> wrote: >>>>> >>>>> Hello, >>>>> >>>>> So, I'm trying to configure a 10.2 Zen version of PF. Our user >>>>> authentication happens via RADIUS. So I configured our RADIUS server >>>>> under the "Internal Sources" section, and everything is now "mostly" >>>>> working. My devices authenticate, but the Authentication Rules don't >>>>> seem to be taking effect. >>>>> >>>>> When I try using the debug command for RADIUS (raddebug -f >>>>> /usr/local/pf/var/run/radiusd.sock -t 3600), here's what I get. There >>>>> must be a setting I'm missing somewhere. The packetfence.log file is >>>>> effectively silent on the issue. >>>>> >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Processing response header >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Status : 200 (OK) >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Type : json >>>>> (application/json) >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Parsing attribute >>>>> "control:PacketFence-Authorization-Status" >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: EXPAND allow >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: --> allow >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: rest: >>>>> PacketFence-Authorization-Status := "allow" >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: [rest] = updated >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent EAP Response (code >>>>> 2) ID 56 length 46 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Continuing tunnel setup >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: [eap] = ok >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: } # authorize = ok >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: Found Auth-Type = eap >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing group from file >>>>> /usr/local/pf/raddb/sites-enabled/packetfence >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: authenticate { >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Expiring EAP session with >>>>> state 0xce6b3ab6c75323c5 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Finished EAP session with >>>>> state 0xce6b3ab6c75323c5 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Previous EAP request found >>>>> for state 0xce6b3ab6c75323c5, released from the list >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent packet with method >>>>> EAP PEAP (25) >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Calling submodule eap_peap to >>>>> process data >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Continuing EAP-TLS >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls verify] = ok >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Done initial handshake >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls process] = ok >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Session established. >>>>> Decoding tunneled attributes >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: PEAP state send tlv >>>>> success >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Received EAP-TLV response >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Success >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Using saved attributes >>>>> from the original Access-Accept >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: User-Name = >>>>> "josh.nathan" >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Sending EAP Success (code 3) >>>>> ID 56 length 4 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Freeing handler >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: [eap] = ok >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: } # authenticate = ok >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing section post-auth from >>>>> file /usr/local/pf/raddb/sites-enabled/packetfence >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: post-auth { >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: update { >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: EXPAND >>>>> %{Packet-Src-IP-Address} >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: --> 172.20.50.76 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: EXPAND >>>>> %{Packet-Dst-IP-Address} >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: --> 172.20.104.31 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: } # update = noop >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: policy >>>>> packetfence-set-tenant-id { >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: if (!NAS-IP-Address || >>>>> NAS-IP-Address == "0.0.0.0"){ >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: if (!NAS-IP-Address || >>>>> NAS-IP-Address == "0.0.0.0") -> FALSE >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: if ( >>>>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: EXPAND >>>>> %{%{control:PacketFence-Tenant-Id}:-0} >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: --> 1 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: if ( >>>>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: if ( >>>>> &control:PacketFence-Tenant-Id == 0 ) { >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: if ( >>>>> &control:PacketFence-Tenant-Id == 0 ) -> FALSE >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: } # policy >>>>> packetfence-set-tenant-id = noop >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: if >>>>> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") { >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: EXPAND >>>>> %{%{control:PacketFence-Proxied-From}:-False} >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: --> False >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: if >>>>> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") -> FALSE >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: if (! EAP-Type || (EAP-Type != >>>>> TTLS && EAP-Type != PEAP) ) { >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: if (! EAP-Type || (EAP-Type != >>>>> TTLS && EAP-Type != PEAP) ) -> FALSE >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth: >>>>> EXPAND %{User-Name} >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth: >>>>> --> josh.nathan >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth: >>>>> Matched entry DEFAULT at line 10 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: >>>>> [attr_filter.packetfence_post_auth] = updated >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND >>>>> messages.%{%{reply:Packet-Type}:-default} >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: --> >>>>> messages.Access-Accept >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND >>>>> [mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and >>>>> returned VLAN %{reply:Tunnel-Private-Group-ID} >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: --> >>>>> [mac:58:cb:52:37:5d:ab] Accepted user: josh.nathan and returned VLAN >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: [linelog] = ok >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: } # post-auth = updated >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: Sent Access-Accept Id 229 from >>>>> 172.20.104.31:1812 >>>>> <https://urldefense.com/v3/__http://172.20.104.31:1812/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIQCj3ZD8$> >>>>> to 172.20.50.76:40485 >>>>> <https://urldefense.com/v3/__http://172.20.50.76:40485/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIavZqZFs$> >>>>> length 0 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: User-Name = "josh.nathan" >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: MS-MPPE-Recv-Key = >>>>> 0x600da060c2faa9fdf49eb732f5110f438b5d71f66e661345f268bf24252e85c3 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: MS-MPPE-Send-Key = >>>>> 0x8d6d99afd78af3ebade3b3869adc9ceef8f9782d323d553bce8cf5c1511d05d1 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: EAP-Message = 0x03380004 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: Message-Authenticator = >>>>> 0x00000000000000000000000000000000 >>>>> (327) Thu Apr 15 15:40:43 2021: Debug: Finished request >>>>> (317) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 219 >>>>> with timestamp +4564 >>>>> (318) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 220 >>>>> with timestamp +4564 >>>>> (319) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 221 >>>>> with timestamp +4564 >>>>> (328) Thu Apr 15 15:40:45 2021: Debug: Received Status-Server Id 161 from >>>>> 127.0.0.1:45116 >>>>> <https://urldefense.com/v3/__http://127.0.0.1:45116/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIf5Jx0mf$> >>>>> to 127.0.0.1:18121 >>>>> <https://urldefense.com/v3/__http://127.0.0.1:18121/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIecH5d9e$> >>>>> length 50 >>>>> (328) Thu Apr 15 15:40:45 2021: Debug: Message-Authenticator = >>>>> 0x0630aabb861db1ebd2a0892a5d55941e >>>>> (328) Thu Apr 15 15:40:45 2021: Debug: FreeRADIUS-Statistics-Type = 15 >>>>> (328) Thu Apr 15 15:40:45 2021: Debug: # Executing group from file >>>>> /usr/local/pf/raddb/sites-enabled/status >>>>> (328) Thu Apr 15 15:40:45 2021: Debug: Autz-Type Status-Server { >>>>> (328) Thu Apr 15 15:40:45 2021: Debug: [ok] = ok >>>>> (328) Thu Apr 15 15:40:45 2021: Debug: } # Autz-Type Status-Server = ok >>>>> (328) Thu Apr 15 15:40:45 2021: Debug: Sent Access-Accept Id 161 from >>>>> 127.0.0.1:18121 >>>>> <https://urldefense.com/v3/__http://127.0.0.1:18121/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIecH5d9e$> >>>>> to 127.0.0.1:45116 >>>>> <https://urldefense.com/v3/__http://127.0.0.1:45116/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIf5Jx0mf$> >>>>> length 0 >>>>> >>>>> >>>>> Thank you for any guidance you can give! >>>>> >>>>> >>>>> Joshua Nathan >>>>> IT Supervisor >>>>> Black Forest Academy >>>>> >>>>> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056 >>>>> a: >>>>> w: Hammersteiner Straße 50, 79400 Kandern >>>>> bfacademy.de >>>>> <https://urldefense.com/v3/__http://bfacademy.de/__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmISt3FAmr$> >>>>> >>>>> >>>>> _______________________________________________ >>>>> PacketFence-users mailing list >>>>> PacketFence-users@lists.sourceforge.net >>>>> <mailto:PacketFence-users@lists.sourceforge.net> >>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>> <https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!Gh7_gb4ulBDLBsfliq32776EAGf4dgeMb6C4VmGLDzKUEgQ50QhydedmIW82ehl3$> >>>> >>> >> >> <radiusdebug.log><RadiusAuditLogs.png> >
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users