Is there any way to get PacketFence to do any other debug logs?  Without
anything showing in either packetfence.log or the audit logs via the
console, I feel like I'm up a creek without a paddle.  What are my options?

With my 9.0 install, everything works fine except for Pixel devices (and I
don't want to mess with my production server too much to try and modify it).

Now with 10.2, my Pixel device connects, but I don't get any real logging
or VLAN assignments (the whole reason I want to use PF).

Joshua Nathan
*IT Supervisor*
Black Forest Academy

p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
a:
w: Hammersteiner Straße 50, 79400 Kandern
bfacademy.de




On Fri, Apr 30, 2021 at 1:56 PM Nathan, Josh <josh.nat...@bfacademy.de>
wrote:

> I don't know if it helps, but I'm doing PEAP authentication with
> MSCHAPv2.  I tried using the Provisioner, but that doesn't work from my
> Pixel 3a.  So I'm just manually putting in the connection information.  I
> do have a legit certificate.  And of course, the phone is authenticating...
> it's just that the post-auth (post-proxy?) isn't assigning the VLAN.
>
> I did have this working in PF 9.0, except that now my Pixel 3a phone won't
> connect to that, even when it has a legit certificate.
>
> Joshua Nathan
> *IT Supervisor*
> Black Forest Academy
>
> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
> a:
> w: Hammersteiner Straße 50, 79400 Kandern
> bfacademy.de
>
>
>
>
> On Mon, Apr 26, 2021 at 3:51 PM Nathan, Josh <josh.nat...@bfacademy.de>
> wrote:
>
>> Hello Ludovic,
>>
>> OK, I made those changes, then did a "pfcmd service pf restart".
>>
>> No dice.  Exact same results.  Here's the end of the raddebug again in
>> case that helps.  Still nothing in packetfence.log.
>>
>> (17) Mon Apr 26 15:46:04 2021: Debug: Received Access-Request Id 93 from
>> 172.20.50.76:43555 to 172.20.104.31:1812 length 277
>> (17) Mon Apr 26 15:46:04 2021: Debug:   User-Name = "josh.nathan"
>> (17) Mon Apr 26 15:46:04 2021: Debug:   NAS-Identifier = "66d9e7f8b8a4"
>> (17) Mon Apr 26 15:46:04 2021: Debug:   Called-Station-Id =
>> "66-D9-E7-F8-B8-A4:BFA-EAP-Test"
>> (17) Mon Apr 26 15:46:04 2021: Debug:   NAS-Port-Type = Wireless-802.11
>> (17) Mon Apr 26 15:46:04 2021: Debug:   Service-Type = Framed-User
>> (17) Mon Apr 26 15:46:04 2021: Debug:   Calling-Station-Id =
>> "58-CB-52-37-5D-AB"
>> (17) Mon Apr 26 15:46:04 2021: Debug:   Connect-Info = "CONNECT 0Mbps
>> 802.11b"
>> (17) Mon Apr 26 15:46:04 2021: Debug:   Acct-Session-Id =
>> "52DAD7D4BB763411"
>> (17) Mon Apr 26 15:46:04 2021: Debug:   Acct-Multi-Session-Id =
>> "DBEED5366DD430AE"
>> (17) Mon Apr 26 15:46:04 2021: Debug:   WLAN-Pairwise-Cipher = 1027076
>> (17) Mon Apr 26 15:46:04 2021: Debug:   WLAN-Group-Cipher = 1027076
>> (17) Mon Apr 26 15:46:04 2021: Debug:   WLAN-AKM-Suite = 1027073
>> (17) Mon Apr 26 15:46:04 2021: Debug:   Framed-MTU = 1400
>> (17) Mon Apr 26 15:46:04 2021: Debug:   EAP-Message =
>> 0x02e4002e1900170303002300000000000000057749b9bde9be1ec64f7c9567e2867e5dc1d76f261821842d90f500
>> (17) Mon Apr 26 15:46:04 2021: Debug:   State =
>> 0xacaf705da54b69970120abcaacda4228
>> (17) Mon Apr 26 15:46:04 2021: Debug:   Message-Authenticator =
>> 0x0bed628cf8ff12e2250c3de6e9c1cc45
>> (17) Mon Apr 26 15:46:04 2021: Debug: Restoring &session-state
>> (17) Mon Apr 26 15:46:04 2021: Debug:
>> &session-state:TLS-Session-Cipher-Suite = "ECDHE-RSA-AES128-GCM-SHA256"
>> (17) Mon Apr 26 15:46:04 2021: Debug:
>> &session-state:TLS-Session-Version = "TLS 1.2"
>> (17) Mon Apr 26 15:46:04 2021: Debug: # Executing section authorize from
>> file /usr/local/pf/raddb/sites-enabled/packetfence
>> (17) Mon Apr 26 15:46:04 2021: Debug:   authorize {
>> (17) Mon Apr 26 15:46:04 2021: Debug:     policy
>> packetfence-nas-ip-address {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (!NAS-IP-Address ||
>> NAS-IP-Address == "0.0.0.0"){
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (!NAS-IP-Address ||
>> NAS-IP-Address == "0.0.0.0") -> TRUE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (!NAS-IP-Address ||
>> NAS-IP-Address == "0.0.0.0") {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         update request {
>> (17) Mon Apr 26 15:46:04 2021: Debug:           EXPAND
>> %{Packet-Src-IP-Address}
>> (17) Mon Apr 26 15:46:04 2021: Debug:              --> 172.20.50.76
>> (17) Mon Apr 26 15:46:04 2021: Debug:         } # update request = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:       } # if (!NAS-IP-Address ||
>> NAS-IP-Address == "0.0.0.0") = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # policy
>> packetfence-nas-ip-address = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:     update {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       EXPAND
>> %{Packet-Src-IP-Address}
>> (17) Mon Apr 26 15:46:04 2021: Debug:          --> 172.20.50.76
>> (17) Mon Apr 26 15:46:04 2021: Debug:       EXPAND
>> %{Packet-Dst-IP-Address}
>> (17) Mon Apr 26 15:46:04 2021: Debug:          --> 172.20.104.31
>> (17) Mon Apr 26 15:46:04 2021: Debug:       EXPAND %l
>> (17) Mon Apr 26 15:46:04 2021: Debug:          --> 1619444764
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # update = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:     policy
>> packetfence-set-realm-if-machine {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (User-Name =~
>> /host\/([a-z0-9_-]*)[\.](.*)/i) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (User-Name =~
>> /host\/([a-z0-9_-]*)[\.](.*)/i)  -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # policy
>> packetfence-set-realm-if-machine = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:     policy
>> packetfence-balanced-key-policy {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (&PacketFence-KeyBalanced
>> && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (&PacketFence-KeyBalanced
>> && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i))  -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       else {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         update {
>> (17) Mon Apr 26 15:46:04 2021: Debug:           EXPAND
>> %{md5:%{Calling-Station-Id}%{User-Name}}
>> (17) Mon Apr 26 15:46:04 2021: Debug:              -->
>> 50bc5046614b032967fc88f562a08c92
>> (17) Mon Apr 26 15:46:04 2021: Debug:           EXPAND
>> %{md5:%{Calling-Station-Id}%{User-Name}}
>> (17) Mon Apr 26 15:46:04 2021: Debug:              -->
>> 50bc5046614b032967fc88f562a08c92
>> (17) Mon Apr 26 15:46:04 2021: Debug:         } # update = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:       } # else = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # policy
>> packetfence-balanced-key-policy = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:     policy
>> packetfence-set-tenant-id {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (!NAS-IP-Address ||
>> NAS-IP-Address == "0.0.0.0"){
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (!NAS-IP-Address ||
>> NAS-IP-Address == "0.0.0.0") -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (
>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       EXPAND
>> %{%{control:PacketFence-Tenant-Id}:-0}
>> (17) Mon Apr 26 15:46:04 2021: Debug:          --> 0
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (
>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> TRUE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (
>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         update control {
>> (17) Mon Apr 26 15:46:04 2021: Debug:           EXPAND %{User-Name}
>> (17) Mon Apr 26 15:46:04 2021: Debug:              --> josh.nathan
>> (17) Mon Apr 26 15:46:04 2021: Debug:           SQL-User-Name set to
>> 'josh.nathan'
>> (17) Mon Apr 26 15:46:04 2021: Debug:           Executing select query:
>>  SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
>> '172.20.50.76'), 0)
>> (17) Mon Apr 26 15:46:04 2021: Debug:           EXPAND %{sql: SELECT
>> IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
>> '%{NAS-IP-Address}'), 0)}
>> (17) Mon Apr 26 15:46:04 2021: Debug:              --> 0
>> (17) Mon Apr 26 15:46:04 2021: Debug:         } # update control = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:       } # if (
>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (
>> &control:PacketFence-Tenant-Id == 0 ) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (
>> &control:PacketFence-Tenant-Id == 0 )  -> TRUE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (
>> &control:PacketFence-Tenant-Id == 0 )  {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         update control {
>> (17) Mon Apr 26 15:46:04 2021: Debug:           EXPAND %{User-Name}
>> (17) Mon Apr 26 15:46:04 2021: Debug:              --> josh.nathan
>> (17) Mon Apr 26 15:46:04 2021: Debug:           SQL-User-Name set to
>> 'josh.nathan'
>> (17) Mon Apr 26 15:46:04 2021: Debug:           Executing select query:
>>  SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <=
>> INET_ATON('172.20.50.76') and INET_ATON('172.20.50.76') <= end_ip order by
>> range_length limit 1), 1)
>> (17) Mon Apr 26 15:46:04 2021: Debug:           EXPAND %{sql: SELECT
>> IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <=
>> INET_ATON('%{NAS-IP-Address}') and INET_ATON('%{NAS-IP-Address}') <= end_ip
>> order by range_length limit 1), 1)}
>> (17) Mon Apr 26 15:46:04 2021: Debug:              --> 1
>> (17) Mon Apr 26 15:46:04 2021: Debug:         } # update control = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:       } # if (
>> &control:PacketFence-Tenant-Id == 0 )  = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # policy
>> packetfence-set-tenant-id = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:     policy
>> rewrite_calling_station_id {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (&Calling-Station-Id &&
>> (&Calling-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>> {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (&Calling-Station-Id &&
>> (&Calling-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>>  -> TRUE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (&Calling-Station-Id &&
>> (&Calling-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>>  {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         update request {
>> (17) Mon Apr 26 15:46:04 2021: Debug:           EXPAND
>> %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
>> (17) Mon Apr 26 15:46:04 2021: Debug:              --> 58:cb:52:37:5d:ab
>> (17) Mon Apr 26 15:46:04 2021: Debug:         } # update request = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:         [updated] = updated
>> (17) Mon Apr 26 15:46:04 2021: Debug:       } # if (&Calling-Station-Id
>> && (&Calling-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>>  = updated
>> (17) Mon Apr 26 15:46:04 2021: Debug:       ... skipping else: Preceding
>> "if" was taken
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # policy
>> rewrite_calling_station_id = updated
>> (17) Mon Apr 26 15:46:04 2021: Debug:     policy
>> rewrite_called_station_id {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if ((&Called-Station-Id) &&
>> (&Called-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>> {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if ((&Called-Station-Id) &&
>> (&Called-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>>  -> TRUE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if ((&Called-Station-Id) &&
>> (&Called-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>>  {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         update request {
>> (17) Mon Apr 26 15:46:04 2021: Debug:           EXPAND
>> %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
>> (17) Mon Apr 26 15:46:04 2021: Debug:              --> 66:d9:e7:f8:b8:a4
>> (17) Mon Apr 26 15:46:04 2021: Debug:         } # update request = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if ("%{8}") {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         EXPAND %{8}
>> (17) Mon Apr 26 15:46:04 2021: Debug:            --> BFA-EAP-Test
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if ("%{8}")  -> TRUE
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if ("%{8}")  {
>> (17) Mon Apr 26 15:46:04 2021: Debug:           update request {
>> (17) Mon Apr 26 15:46:04 2021: Debug:             EXPAND
>> %{Called-Station-Id}:%{8}
>> (17) Mon Apr 26 15:46:04 2021: Debug:                -->
>> 66:d9:e7:f8:b8:a4:BFA-EAP-Test
>> (17) Mon Apr 26 15:46:04 2021: Debug:             EXPAND %{8}
>> (17) Mon Apr 26 15:46:04 2021: Debug:                --> BFA-EAP-Test
>> (17) Mon Apr 26 15:46:04 2021: Debug:           } # update request = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:         } # if ("%{8}")  = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:         ... skipping elsif:
>> Preceding "if" was taken
>> (17) Mon Apr 26 15:46:04 2021: Debug:         ... skipping elsif:
>> Preceding "if" was taken
>> (17) Mon Apr 26 15:46:04 2021: Debug:         ... skipping elsif:
>> Preceding "if" was taken
>> (17) Mon Apr 26 15:46:04 2021: Debug:         [updated] = updated
>> (17) Mon Apr 26 15:46:04 2021: Debug:       } # if ((&Called-Station-Id)
>> && (&Called-Station-Id =~
>> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>>  = updated
>> (17) Mon Apr 26 15:46:04 2021: Debug:       ... skipping else: Preceding
>> "if" was taken
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # policy
>> rewrite_called_station_id = updated
>> (17) Mon Apr 26 15:46:04 2021: Debug:     if ( "%{client:shortname}" =~
>> /eduroam_tlrs/ ) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:     EXPAND %{client:shortname}
>> (17) Mon Apr 26 15:46:04 2021: Debug:        --> 172.20.50.76/32
>> (17) Mon Apr 26 15:46:04 2021: Debug:     if ( "%{client:shortname}" =~
>> /eduroam_tlrs/ )  -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:     policy filter_username {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (&User-Name) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (&User-Name)  -> TRUE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (&User-Name)  {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if (&User-Name =~ / /) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if (&User-Name =~ / /)  ->
>> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if (&User-Name =~ /@[^@]*@/
>> ) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if (&User-Name =~ /@[^@]*@/
>> )  -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if (&User-Name =~ /\.\./ ) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if (&User-Name =~ /\.\./ )
>>  -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if ((&User-Name =~ /@/) &&
>> (&User-Name !~ /@(.+)\.(.+)$/))  {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if ((&User-Name =~ /@/) &&
>> (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if (&User-Name =~ /\.$/)  {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if (&User-Name =~ /\.$/)
>> -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if (&User-Name =~ /@\./)  {
>> (17) Mon Apr 26 15:46:04 2021: Debug:         if (&User-Name =~ /@\./)
>> -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       } # if (&User-Name)  = updated
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # policy filter_username =
>> updated
>> (17) Mon Apr 26 15:46:04 2021: Debug:     policy filter_password {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (&User-Password &&
>>  (&User-Password != "%{string:User-Password}")) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (&User-Password &&
>>  (&User-Password != "%{string:User-Password}"))  -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # policy filter_password =
>> updated
>> (17) Mon Apr 26 15:46:04 2021: Debug:     [preprocess] = ok
>> (17) Mon Apr 26 15:46:04 2021: Debug:     [mschap] = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug: suffix: Checking for suffix after
>> "@"
>> (17) Mon Apr 26 15:46:04 2021: Debug: suffix: No '@' in User-Name =
>> "josh.nathan", skipping NULL due to config.
>> (17) Mon Apr 26 15:46:04 2021: Debug:     [suffix] = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug: ntdomain: Checking for prefix
>> before "\"
>> (17) Mon Apr 26 15:46:04 2021: Debug: ntdomain: No '\' in User-Name =
>> "josh.nathan", looking up realm NULL
>> (17) Mon Apr 26 15:46:04 2021: Debug: ntdomain: Found realm "null"
>> (17) Mon Apr 26 15:46:04 2021: Debug: ntdomain: Adding Stripped-User-Name
>> = "josh.nathan"
>> (17) Mon Apr 26 15:46:04 2021: Debug: ntdomain: Adding Realm = "null"
>> (17) Mon Apr 26 15:46:04 2021: Debug: ntdomain: Authentication realm is
>> LOCAL
>> (17) Mon Apr 26 15:46:04 2021: Debug:     [ntdomain] = ok
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Expanding URI components
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: EXPAND http://127.0.0.1:7070
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest:    --> http://127.0.0.1:7070
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: EXPAND //radius/rest/filter
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest:    --> //radius/rest/filter
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Sending HTTP POST to "
>> http://127.0.0.1:7070//radius/rest/filter";
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute "User-Name"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "NAS-IP-Address"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Service-Type"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Framed-MTU"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute "State"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Called-Station-Id"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Calling-Station-Id"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "NAS-Identifier"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "NAS-Port-Type"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Acct-Session-Id"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Acct-Multi-Session-Id"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Event-Timestamp"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Connect-Info"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "EAP-Message"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Message-Authenticator"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "WLAN-Pairwise-Cipher"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "WLAN-Group-Cipher"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "WLAN-AKM-Suite"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Stripped-User-Name"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute "Realm"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "SQL-User-Name"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "FreeRADIUS-Client-IP-Address"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "Called-Station-SSID"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "PacketFence-KeyBalanced"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Encoding attribute
>> "PacketFence-Radius-Ip"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Processing response header
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest:   Status : 100 (Continue)
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Continuing...
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Processing response header
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest:   Status : 200 (OK)
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest:   Type   : json
>> (application/json)
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: Parsing attribute
>> "control:PacketFence-Authorization-Status"
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest: EXPAND allow
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest:    --> allow
>> (17) Mon Apr 26 15:46:04 2021: Debug: rest:
>> PacketFence-Authorization-Status := "allow"
>> (17) Mon Apr 26 15:46:04 2021: Debug:     [rest] = updated
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap: Peer sent EAP Response (code
>> 2) ID 228 length 46
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap: Continuing tunnel setup
>> (17) Mon Apr 26 15:46:04 2021: Debug:     [eap] = ok
>> (17) Mon Apr 26 15:46:04 2021: Debug:   } # authorize = ok
>> (17) Mon Apr 26 15:46:04 2021: Debug: Found Auth-Type = eap
>> (17) Mon Apr 26 15:46:04 2021: Debug: # Executing group from file
>> /usr/local/pf/raddb/sites-enabled/packetfence
>> (17) Mon Apr 26 15:46:04 2021: Debug:   authenticate {
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap: Expiring EAP session with
>> state 0xacaf705da54b6997
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap: Finished EAP session with
>> state 0xacaf705da54b6997
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap: Previous EAP request found for
>> state 0xacaf705da54b6997, released from the list
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap: Peer sent packet with method
>> EAP PEAP (25)
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap: Calling submodule eap_peap to
>> process data
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap_peap: Continuing EAP-TLS
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap_peap: [eaptls verify] = ok
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap_peap: Done initial handshake
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap_peap: [eaptls process] = ok
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap_peap: Session established.
>> Decoding tunneled attributes
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap_peap: PEAP state send tlv
>> success
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap_peap: Received EAP-TLV response
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap_peap: Success
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap_peap: Using saved attributes
>> from the original Access-Accept
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap_peap:   User-Name =
>> "josh.nathan"
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap: Sending EAP Success (code 3)
>> ID 228 length 4
>> (17) Mon Apr 26 15:46:04 2021: Debug: eap: Freeing handler
>> (17) Mon Apr 26 15:46:04 2021: Debug:     [eap] = ok
>> (17) Mon Apr 26 15:46:04 2021: Debug:   } # authenticate = ok
>> (17) Mon Apr 26 15:46:04 2021: Debug: # Executing section post-auth from
>> file /usr/local/pf/raddb/sites-enabled/packetfence
>> (17) Mon Apr 26 15:46:04 2021: Debug:   post-auth {
>> (17) Mon Apr 26 15:46:04 2021: Debug:     update {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       EXPAND
>> %{Packet-Src-IP-Address}
>> (17) Mon Apr 26 15:46:04 2021: Debug:          --> 172.20.50.76
>> (17) Mon Apr 26 15:46:04 2021: Debug:       EXPAND
>> %{Packet-Dst-IP-Address}
>> (17) Mon Apr 26 15:46:04 2021: Debug:          --> 172.20.104.31
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # update = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:     policy
>> packetfence-set-tenant-id {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (!NAS-IP-Address ||
>> NAS-IP-Address == "0.0.0.0"){
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (!NAS-IP-Address ||
>> NAS-IP-Address == "0.0.0.0") -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (
>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       EXPAND
>> %{%{control:PacketFence-Tenant-Id}:-0}
>> (17) Mon Apr 26 15:46:04 2021: Debug:          --> 1
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (
>> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (
>> &control:PacketFence-Tenant-Id == 0 ) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:       if (
>> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:     } # policy
>> packetfence-set-tenant-id = noop
>> (17) Mon Apr 26 15:46:04 2021: Debug:     if
>> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
>> (17) Mon Apr 26 15:46:04 2021: Debug:     EXPAND
>> %{%{control:PacketFence-Proxied-From}:-False}
>> (17) Mon Apr 26 15:46:04 2021: Debug:        --> False
>> (17) Mon Apr 26 15:46:04 2021: Debug:     if
>> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug:     if (! EAP-Type || (EAP-Type !=
>> TTLS  && EAP-Type != PEAP) ) {
>> (17) Mon Apr 26 15:46:04 2021: Debug:     if (! EAP-Type || (EAP-Type !=
>> TTLS  && EAP-Type != PEAP) )  -> FALSE
>> (17) Mon Apr 26 15:46:04 2021: Debug: attr_filter.packetfence_post_auth:
>> EXPAND %{User-Name}
>> (17) Mon Apr 26 15:46:04 2021: Debug: attr_filter.packetfence_post_auth:
>>    --> josh.nathan
>> (17) Mon Apr 26 15:46:04 2021: Debug: attr_filter.packetfence_post_auth:
>> Matched entry DEFAULT at line 10
>> (17) Mon Apr 26 15:46:04 2021: Debug:
>> [attr_filter.packetfence_post_auth] = updated
>> (17) Mon Apr 26 15:46:04 2021: Debug: linelog: EXPAND
>> messages.%{%{reply:Packet-Type}:-default}
>> (17) Mon Apr 26 15:46:04 2021: Debug: linelog:    -->
>> messages.Access-Accept
>> (17) Mon Apr 26 15:46:04 2021: Debug: linelog: EXPAND
>> [mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned
>> VLAN %{reply:Tunnel-Private-Group-ID}
>> (17) Mon Apr 26 15:46:04 2021: Debug: linelog:    -->
>> [mac:58:cb:52:37:5d:ab] Accepted user: josh.nathan and returned VLAN
>> (17) Mon Apr 26 15:46:04 2021: Debug:     [linelog] = ok
>> (17) Mon Apr 26 15:46:04 2021: Debug:   } # post-auth = updated
>> (17) Mon Apr 26 15:46:04 2021: Debug: Sent Access-Accept Id 93 from
>> 172.20.104.31:1812 to 172.20.50.76:43555 length 0
>> (17) Mon Apr 26 15:46:04 2021: Debug:   User-Name = "josh.nathan"
>> (17) Mon Apr 26 15:46:04 2021: Debug:   MS-MPPE-Recv-Key =
>> 0x7c0a1d6d086882905490447f73c59438006b8fb7a497cd446582272729ff160a
>> (17) Mon Apr 26 15:46:04 2021: Debug:   MS-MPPE-Send-Key =
>> 0xaf527d253335b877cd2073364c49c1e79a15da97037db30b95de703b20fe0aa3
>> (17) Mon Apr 26 15:46:04 2021: Debug:   EAP-Message = 0x03e40004
>> (17) Mon Apr 26 15:46:04 2021: Debug:   Message-Authenticator =
>> 0x00000000000000000000000000000000
>> (17) Mon Apr 26 15:46:04 2021: Debug: Finished request
>> (6) Mon Apr 26 15:46:05 2021: Debug: Cleaning up request packet ID 14
>> with timestamp +93
>>
>>
>> Joshua Nathan
>> *IT Supervisor*
>> Black Forest Academy
>>
>> p: +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
>> a:
>> w: Hammersteiner Straße 50, 79400 Kandern
>> bfacademy.de
>>
>>
>>
>>
>> On Mon, Apr 26, 2021 at 3:31 PM Zammit, Ludovic <luza...@akamai.com>
>> wrote:
>>
>>> Hello Josh,
>>>
>>> In authentication.conf remove all realm configuration related to all
>>> sources, leave the automatic selection to happen.
>>>
>>> I’m assuming your are using that connection profile "BFA-WiFi”. Add the
>>> "JumpCloud-RADIUS” source.
>>>
>>> Try again and let me know.
>>>
>>> Thanks,
>>>
>>> *Ludovic Zammit*
>>> *Product Support Engineer Principal*
>>> *Cell:* +1.613.670.8432
>>> Akamai Technologies - Inverse
>>> 145 Broadway
>>> Cambridge, MA 02142
>>> Connect with Us: <https://community.akamai.com>
>>> <http://blogs.akamai.com> <https://twitter.com/akamai>
>>> <http://www.facebook.com/AkamaiTechnologies>
>>> <http://www.linkedin.com/company/akamai-technologies>
>>> <http://www.youtube.com/user/akamaitechnologies?feature=results_main>
>>>
>>>
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to