Hello Adrian, most of the requests are from the radius probe from the switch. Probably that is configured on your switch:
automate-tester username dummy ignore-acct-port idle-time 3 So it looks to be normal. Regards Fabrice Le mar. 2 nov. 2021 à 04:08, Adrian Dessaigne <adrian.dessai...@novasys.coop> a écrit : > Hello Fabrice, > > Thanks for your answer. I did a packet sniffing with the command and here > is the result : > https://pastebin.com/d3VLaLvT > (Pastbin code in case the link is deleted : d3VLaLvT) > > I see two different packets : > One with the "CLI or VPN access not allowed from this switch". I don't get > that error message since I don't know when PF need to access the CLI and > the login parameters are good. > Another one with : "[truncated] Scoreboard: _KKK__KKKKK_WK_K" > > Thanks for your help. > > Adrian. > > > ------------------------------ > *De: *"Fabrice Durand" <oeufd...@gmail.com> > *À: *"packetfence-users" <packetfence-users@lists.sourceforge.net> > *Cc: *"ADE" <adrian.dessai...@novasys.coop> > *Envoyé: *Vendredi 29 Octobre 2021 14:39:43 > *Objet: *Re: [PacketFence-users] Question about "web log apache aaa bad > requests" > > Hello Adrian, > you can try that to see exactly what happen: > > tshark -i any -f "port 7070" -Y "http.request || http.response" -V > > > Regards > Fabrice > > Le mar. 26 oct. 2021 à 05:56, Adrian Dessaigne via PacketFence-users < > packetfence-users@lists.sourceforge.net> a écrit : > >> Hi again, >> >> I'm trying to know from where I get this message and I compared the logs >> files with our secondary backup server. >> In the file httpd.aaa.access I still get spammed with those : >> >> Oct 26 11:14:03 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:03 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 6300 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:03 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:03 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 4331 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:03 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:03 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 33865 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:03 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:03 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 3727 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:04 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:04 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 786 6798 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:05 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:05 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 5267 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:05 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:05 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 5643 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:06 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:06 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 3873 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:07 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:07 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 5117 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:07 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:07 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 3882 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:07 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:07 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 29848 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:07 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:07 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 31987 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:08 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:08 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 786 29763 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:09 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:09 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 6815 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:09 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:09 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 4121 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:10 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:10 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 4211 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:11 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:11 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 3960 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:11 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:11 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 3636 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:11 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:11 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 4949 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:11 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:11 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 3341 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:11 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:11 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 4892 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:12 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:12 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 786 5130 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:13 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:13 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 401 286 788 5497 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> Oct 26 11:14:13 httpd_aaa: 127.0.0.1 - - [26/Oct/2021:11:14:13 +0200] >> "POST //radius/rest/authorize HTTP/1.1" 200 881 1516 70853 "-" "FreeRADIUS >> 3.0.21" "127.0.0.1:7070" >> >> But on the other server, I don't have anything in this file. >> From what I could search, the port 7070 is related to the httpd service >> and radiusd is mostly using it. >> So I stoped the radiusd-auth service and the logs stopped (as well the >> error-notifications on the admin interface) >> After restarting the service, the logs started to be spammed again and >> the notification came back. >> >> I'll try to go search deeper but I feel I'm on the edge of my knowledge >> of the services. >> >> Any idea what cause this ? >> Thanks for your answers. >> >> ------------------------------ >> *De: *"packetfence-users" <packetfence-users@lists.sourceforge.net> >> *À: *"packetfence-users" <packetfence-users@lists.sourceforge.net> >> *Cc: *"ADE" <adrian.dessai...@novasys.coop> >> *Envoyé: *Lundi 25 Octobre 2021 10:38:42 >> *Objet: *Re: [PacketFence-users] Question about "web log apache aaa bad >> requests" >> >> Hi ! >> >> Bit of an update on my issue. >> After launching the pf-maint.pl script and doing a reboot, I still have >> the red warning popping up in the Status tab (only in this one) >> Before the reboot, the RAM and CPU usage were really high compared before >> the issue. >> >> What file or configuration should I check to fix this ? >> >> Thanks for your answers. >> ------------------------------ >> *De: *"packetfence-users" <packetfence-users@lists.sourceforge.net> >> *À: *"packetfence-users" <packetfence-users@lists.sourceforge.net> >> *Cc: *"ADE" <adrian.dessai...@novasys.coop> >> *Envoyé: *Jeudi 21 Octobre 2021 12:27:03 >> *Objet: *[PacketFence-users] Question about "web log apache aaa bad >> requests" >> >> Hello everyone ! >> >> I have a small question about a warning I get in PacketFence >> notifications. >> Those notifications appeared when I've set up the accounting >> counfiguration on our cisco switches : >> >> - aaa accounting dot1x default start-stop group radius >> >> I've put this so we can have the Online/Offline status of our nodes. But >> since I have those two notifications popping up : >> >> 100% SVPACKETFENCE web log apache aaa log - responses >> web_log_apache_aaa_log.response_statuses.1m_bad_requests >> >> 0% SVPACKETFENCE web log apache aaa log - responses >> web_log_apache_aaa_log.response_statuses.1m_successful >> >> So I went in the log files httpd.aaa.access and it's filled with those >> event : >> Oct 21 12:12:23 SVPACKETFENCE httpd_aaa: 127.0.0.1 - - >> [21/Oct/2021:12:12:23 +0200] "POST //radius/rest/authorize HTTP/1.1" 401 >> 286 788 5827 "-" "FreeRADIUS 3.0.21" "127.0.0.1:7070" >> Oct 21 12:12:26 SVPACKETFENCE httpd_aaa: 127.0.0.1 - - >> [21/Oct/2021:12:12:26 +0200] "POST //radius/rest/authorize HTTP/1.1" 401 >> 286 788 5918 "-" "FreeRADIUS 3.0.21" "127.0.0.1:7070" >> Oct 21 12:12:27 SVPACKETFENCE httpd_aaa: 127.0.0.1 - - >> [21/Oct/2021:12:12:27 +0200] "POST //radius/rest/authorize HTTP/1.1" 401 >> 286 788 5465 "-" "FreeRADIUS 3.0.21" "127.0.0.1:7070" >> Oct 21 12:12:27 SVPACKETFENCE httpd_aaa: 127.0.0.1 - - >> [21/Oct/2021:12:12:27 +0200] "POST //radius/rest/authorize HTTP/1.1" 401 >> 305 788 5572 "-" "FreeRADIUS 3.0.21" "127.0.0.1:7070" >> Oct 21 12:12:27 SVPACKETFENCE httpd_aaa: 127.0.0.1 - - >> [21/Oct/2021:12:12:27 +0200] "POST //radius/rest/authorize HTTP/1.1" 401 >> 286 786 5235 "-" "FreeRADIUS 3.0.21" "127.0.0.1:7070" >> Oct 21 12:12:27 SVPACKETFENCE httpd_aaa: 127.0.0.1 - - >> [21/Oct/2021:12:12:27 +0200] "POST //radius/rest/authorize HTTP/1.1" 401 >> 286 788 6013 "-" "FreeRADIUS 3.0.21" "127.0.0.1:7070" >> >> However, there is nothing in httpd.aaa.error. >> >> I have tryed by removing the command on the cisco switches but seems like >> it keep going. >> >> Do you have any idea what's going on ? >> >> Thanks a lot for your help ! >> >> Adrian. >> EnregistrerEnregistrer >> >> >> _______________________________________________ >> PacketFence-users mailing list >> PacketFence-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> >> >> _______________________________________________ >> PacketFence-users mailing list >> PacketFence-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> _______________________________________________ >> PacketFence-users mailing list >> PacketFence-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> > >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users