Hello Ian, Do you happen to have the https://www.packetfence.org/doc/PacketFence_Installation_Guide.html#_dhcp_remote_sensor <https://www.packetfence.org/doc/PacketFence_Installation_Guide.html#_dhcp_remote_sensor> installed on your DHCP server?
On a side note, what is the DHCP max lease time in your registration network ? Thanks, Ludovic Zammit Product Support Engineer Principal Lead Cell: +1.613.670.8432 Akamai Technologies - Inverse 145 Broadway Cambridge, MA 02142 Connect with Us: <https://community.akamai.com/> <http://blogs.akamai.com/> <https://twitter.com/akamai> <http://www.facebook.com/AkamaiTechnologies> <http://www.linkedin.com/company/akamai-technologies> <http://www.youtube.com/user/akamaitechnologies?feature=results_main> > On Jan 19, 2023, at 12:37 AM, Ian MacDonald via PacketFence-users > <packetfence-users@lists.sourceforge.net> wrote: > > Well, > > I guess we are stuck without more insight on how to get the iPhone to update > it's IP after the WiFi disconnect/reconnect to the Default VLAN. > > The only scenario I can think of, is that the iPhone believes it is on the > same network, and behaves like it is moving between different ESSIDs on a > mesh network which would not initiate a DHCP request; which isn't the case > here. > > I wonder if we plugged the iPhone into a USB dongle and tried the same thing > on a wired connection, if it would behave the same way.I'm not going to test > this as it doesn't solve anything. > > Ideas > > - shorten registration DHCP to inside the captive portal delay seems like a > good option to try > - I am wondering if there is any way I can get our DHCP server to respond to > the request we saw from the iPhone on the old registration VLAN .. that may > have actually been due to the lease expiring; at 30s as you suggested it may > be configured. Hopefully expiring at 10s before the disconnect creates a > DISCOVER rather than request for refresh on old registration VLAN subnet to a > DHCP server that is unreachable > - I am wondering if there is any signal PF can send after registration via > captive portal URL to help - like tell it to behave like an old device > - I am thinking maybe including a forced redirect URL in the connection > profile might help the trigger - I don't quite understand how it is passed, > but must be from the portal server URL to exist after the VLAN switch > - double check there are no authoritative setting for DHCP on my Default > network that would allow it to signal to the iPhone when it sees any DHCP > traffic, like the frame you saw requesting a URL. > - is there a wifi feature we can turn off at a lower layer that would ensure > all wifi disconnects are treated like an interface up/down - like disabling > roaming features on the AP > > Maybe the PF team are aware of this scenario; it would be nice to know we are > near the end of the road. > > Any help appreciated > > Cheers, > Ian > > > On Wed., Jan. 18, 2023, 10:57 p.m. Diego Garcia del Rio, <garc...@gmail.com > <mailto:garc...@gmail.com>> wrote: > Hi Ian > > thanks for the extremely thorough troubleshooting. > > Its very weird that the client is not requesting dhcp after re-connecting. On > the AP side, it seems like its disconnecting the client, so im surprised its > not doing a new DHCP request, > > An option you might have is to change the dhcp lease time of the registration > server. By default, its setup for 30 seconds, but it _might_ be editable.. I > would try setting it for maybe 10 seconds? > > the client is requesting the dhcp option 114 (you can see the mention to > "URL" in the dhcp capture below) > Parameter-Request Option 55, length 9: > Subnet-Mask, Classless-Static-Route, Default-Gateway, Domain-Name-Server > Domain-Name, Option 108, URL, Option 119 > Option 252 > > > And your reply is correct... (with the urn saying no portal/unrestricted) > > also, regarding iphone 7..it can go up to IOS15, and the captive portal url > via dhcp was added in IOS14, so the fact it matches newer iphones is not as > strange... > > Unfortunately, I dont think PF can issue dhcp disconnects (and most clients > ignore it). (It would actually be a "FORCERENEW" message from the server, but > it would still be a race condition against the radius disconnect) > > > > > > > > On Thu, Jan 19, 2023 at 3:27 AM Ian MacDonald via PacketFence-users > <packetfence-users@lists.sourceforge.net > <mailto:packetfence-users@lists.sourceforge.net>> wrote: > Hello PF, > > I have started a new thread after posting to "Newer Model iPhones and Android > Devices showing MAC:0 in Captive Portal" as the problem we are having seems > to be different then we initially described, and we have modified our > configuration to resolve some related potential issues along the way. Thanks > Diego for some insights that helped us narrow our problem scope and eliminate > a few potential other causes. > > Our narrowed down problem scope seems to be that some devices (iPhone 7, > iPhone 12 Pro) are not are not properly requesting a new DHCP lease on the > Default network after they have been WiFi disconnected from the Registration > VLAN and reconnected to the Default VLAN. Details follow as well as some > logs from a recent capture of an iPhone 12 Pro. We see identical behaviour > on iPhone 7. This issue does not seem to impact the iPhone 5s and Samsung > Galaxy S10. > > We are wondering if there is more PF can do on the Registration VLAN, like a > DHCP Release to help clients be ready when they arrive on the Default VLAN. > > Our PF setup in the lab where we are having issues is described in the > diagram below > <image.png> > [fencing] > wait_for_redirect = 25 > [captive_portal] > network_redirect_delay=35s > [interface eth0] > type=management,portal > mask=255.255.255.0 > ip=10.2.1.2 > [interface eth1] > type=internal > mask=255.255.255.0 > ip=10.2.2.2 > enforcement=vlan > [interface eth2] > enforcement=vlan > ip=10.2.3.2 > mask=255.255.255.0 > type=internal > > The process starts with an Unregistered node, and no remembered local wifi > networks on the iPhone 12 Pro. The events happen as follows: > > First we connect the PF4_Office:TestOne_WiFi SSID where the device connects > to VLAN 81 and is presented the Registration portal page with AUP and a > prompt for email based authentication. > On the NAS/AP we see the established connection: > > Wed Jan 18 14:54:55 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 RADIUS: VLAN ID 81 > Wed Jan 18 14:54:55 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 IEEE 802.11: authenticated > Wed Jan 18 14:54:55 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 IEEE 802.11: associated (aid 2) > Wed Jan 18 14:54:55 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED > f2:ef:bb:22:8c:62 > Wed Jan 18 14:54:55 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 RADIUS: starting accounting session > 2DB2C59D34BD1998 > > And on our management network the matching authorized RADIUS messages between > the NAS/AP and PF server on our management network > 14:54:55.204084 IP 10.2.1.11.49421 > 10.2.1.2.1812: RADIUS, Access-Request > (1), id: 0x1c length: 164 > 14:54:55.251883 IP 10.2.1.2.1812 > 10.2.1.11.49421: RADIUS, Access-Accept > (2), id: 0x1c length: 36 > 14:54:55.261410 IP 10.2.1.11.48577 > 10.2.1.2.1813: RADIUS, > Accounting-Request (4), id: 0x1d length: 182 > 14:54:55.263588 IP 10.2.1.2.1813 > 10.2.1.11.48577: RADIUS, > Accounting-Response (5), id: 0x1d length: 35 > > In our packetfence logs we see the client connect to to the registration vlan > 81 and match our connection profile by ssid TestOne_WiFi > Jan 18 14:54:55 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] handling radius autz request: from switch_ip => > (10.2.1.11), connection_type => Wireless-802.11-NoEAP,switch_mac => > (ec:08:6b:6a:63:5a), mac => [f2:ef:bb:22:8c:62], port => 0, username => > "f2efbb228c62", ssid => TestOne_WiFi (pf::radius::authorize) > Jan 18 14:54:55 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:54:55 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] is of status unreg; belongs into registration VLAN > (pf::role::getRegistrationRole) > Jan 18 14:54:55 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] (10.2.1.11) Added VLAN 81 to the returned RADIUS > Access-Accept (pf::Switch::returnRadiusAccessAccept) > Jan 18 14:54:55 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Updating locationlog from accounting request > (pf::api::handle_accounting_metadata) > Jan 18 14:54:59 pf4 pfqueue[64840]: pfqueue(64840) INFO: > [mac:f2:ef:bb:22:8c:62] Sending a firewall SSO 'Update' request for MAC > 'f2:ef:bb:22:8c:62' and IP '10.2.2.178' (pf::firewallsso::do_sso) > Jan 18 14:54:59 pf4 pfqueue[64840]: pfqueue(64840) WARN: > [mac:f2:ef:bb:22:8c:62] Unable to match MAC address to IP '10.2.2.178' > (pf::ip4log::ip2mac) > Jan 18 14:54:59 pf4 pfqueue[65681]: pfqueue(65681) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:54:59 pf4 pfqueue[64476]: pfqueue(64476) WARN: > [mac:f2:ef:bb:22:8c:62] Unable to pull accounting history for device > f2:ef:bb:22:8c:62. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > Jan 18 14:54:59 pf4 pfqueue[64476]: pfqueue(64476) WARN: > [mac:f2:ef:bb:22:8c:62] Unable to pull accounting history for device > f2:ef:bb:22:8c:62. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > Jan 18 14:55:01 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(94) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:55:02 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:55:02 pf4 pfqueue[64520]: pfqueue(64520) WARN: > [mac:f2:ef:bb:22:8c:62] Unable to pull accounting history for device > f2:ef:bb:22:8c:62. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > Jan 18 14:55:02 pf4 pfqueue[64469]: pfqueue(64469) WARN: > [mac:f2:ef:bb:22:8c:62] Unable to pull accounting history for device > f2:ef:bb:22:8c:62. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > Jan 18 14:55:09 pf4 pfperl-api-docker-wrapper[1130]: pfperl-api(17) INFO: > [mac:[undef]] Using 300 resolution threshold > (pf::pfcron::task::cluster_check::run) > Jan 18 14:55:09 pf4 pfperl-api-docker-wrapper[1130]: pfperl-api(17) INFO: > [mac:[undef]] All cluster members are running the same configuration version > (pf::pfcron::task::cluster_check::run) > Jan 18 14:55:10 pf4 pfperl-api-docker-wrapper[1130]: pfperl-api(17) INFO: > [mac:[undef]] processed 0 security_events during security_event maintenance > (1674071710.15351 1674071710.16509) > (pf::security_event::security_event_maintenance) > Jan 18 14:55:10 pf4 pfperl-api-docker-wrapper[1130]: pfperl-api(17) INFO: > [mac:[undef]] getting security_events triggers for accounting cleanup > (pf::accounting::acct_maintenance) > Jan 18 14:55:12 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:55:12 pf4 pfqueue[64520]: pfqueue(64520) WARN: > [mac:f2:ef:bb:22:8c:62] Unable to pull accounting history for device > f2:ef:bb:22:8c:62. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > > We can see the Registration VLAN portal interactions for the client on > 10.2.2.178 > Jan 18 14:55:00 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:54627 > <https://urldefense.com/v3/__http://10.2.2.178:54627__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gGQik2ThQ$> > [18/Jan/2023:14:55:00.140] portal-http-10.2.1.2 proxy/proxy 0/0/0/452/452 > 200 644 - - ---- 2/1/0/0/0 0/0 {captive.apple.com > <https://urldefense.com/v3/__http://captive.apple.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHRHamHbA$>} > "GET /hotspot-detect.html HTTP/1.0" > Jan 18 14:55:01 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62360 > <https://urldefense.com/v3/__http://10.2.2.178:62360__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gGz9sN7cg$> > [18/Jan/2023:14:55:01.513] portal-http-10.2.1.2 proxy/proxy 0/0/1/5/6 200 > 644 - - ---- 2/1/0/0/0 0/0 {captive.apple.com > <https://urldefense.com/v3/__http://captive.apple.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHRHamHbA$>} > "GET /hotspot-detect.html HTTP/1.1" > Jan 18 14:55:01 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:54632 > <https://urldefense.com/v3/__http://10.2.2.178:54632__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gE3JIlG9g$> > [18/Jan/2023:14:55:01.538] portal-http-10.2.1.2 proxy/proxy 0/0/0/4/4 200 > 644 - - ---- 3/2/0/0/0 0/0 {captive.apple.com > <https://urldefense.com/v3/__http://captive.apple.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHRHamHbA$>} > "GET /hotspot-detect.html HTTP/1.0" > Jan 18 14:55:01 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62361 > <https://urldefense.com/v3/__http://10.2.2.178:62361__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gFD5Fmauw$> > [18/Jan/2023:14:55:01.762] portal-https-10.2.1.2~ > 10.2.1.2-backend/containers-gateway.internal:8080 0/0/1/138/139 200 6858 - - > ---- 3/1/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET > /captive-portal?destination_url=http://captive.apple.com/hotspot-detect.html > <https://urldefense.com/v3/__http://captive.apple.com/hotspot-detect.html__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gE5Gbm3cA$> > HTTP/1.1" > Jan 18 14:55:01 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62361 > <https://urldefense.com/v3/__http://10.2.2.178:62361__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gFD5Fmauw$> > [18/Jan/2023:14:55:01.930] portal-https-10.2.1.2~ static/static 0/0/0/1/1 > 200 42006 - - ---- 4/1/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/styles.css HTTP/1.1" > Jan 18 14:55:02 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62364 > <https://urldefense.com/v3/__http://10.2.2.178:62364__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gGesjoB7g$> > [18/Jan/2023:14:55:02.003] portal-https-10.2.1.2~ static/static 0/0/0/1/2 > 200 20248 - - ---- 8/5/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/qrcode.min.js HTTP/1.1" > Jan 18 14:55:02 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62365 > <https://urldefense.com/v3/__http://10.2.2.178:62365__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHmYPBwLg$> > [18/Jan/2023:14:55:02.016] portal-https-10.2.1.2~ static/static 0/0/1/1/2 > 200 1506 - - ---- 8/5/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/jquery-shim.js HTTP/1.1" > Jan 18 14:55:02 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62362 > <https://urldefense.com/v3/__http://10.2.2.178:62362__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gH3lpCqUg$> > [18/Jan/2023:14:55:02.019] portal-https-10.2.1.2~ static/static 0/0/0/1/1 > 200 6157 - - ---- 8/5/1/1/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/pf.js HTTP/1.1" > Jan 18 14:55:02 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62363 > <https://urldefense.com/v3/__http://10.2.2.178:62363__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gGuhAhkdg$> > [18/Jan/2023:14:55:02.019] portal-https-10.2.1.2~ static/static 0/0/0/2/2 > 200 8239 - - ---- 8/5/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /content/captiveportal.js HTTP/1.1" > Jan 18 14:55:02 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62361 > <https://urldefense.com/v3/__http://10.2.2.178:62361__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gFD5Fmauw$> > [18/Jan/2023:14:55:02.027] portal-https-10.2.1.2~ static/static 0/0/0/1/1 > 200 4480 - - ---- 8/5/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/packetfence-cp.png HTTP/1.1" > Jan 18 14:55:02 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62365 > <https://urldefense.com/v3/__http://10.2.2.178:62365__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHmYPBwLg$> > [18/Jan/2023:14:55:02.033] portal-https-10.2.1.2~ static/static 0/0/0/2/2 > 200 39912 - - ---- 8/5/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/img/sprite.svg HTTP/1.1" > Jan 18 14:55:02 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62364 > <https://urldefense.com/v3/__http://10.2.2.178:62364__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gGesjoB7g$> > [18/Jan/2023:14:55:02.032] portal-https-10.2.1.2~ > 10.2.1.2-backend/containers-gateway.internal:8080 0/0/0/58/58 200 852 - - > ---- 8/5/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "POST /record_destination_url HTTP/1.1" > Jan 18 14:55:04 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:54633 > <https://urldefense.com/v3/__http://10.2.2.178:54633__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gGxd_zGdg$> > [18/Jan/2023:14:55:01.930] portal-http-10.2.1.2 proxy/proxy 0/0/0/2671/2671 > 200 644 - - ---- 8/2/0/0/0 0/0 {captive.apple.com > <https://urldefense.com/v3/__http://captive.apple.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHRHamHbA$>} > "GET /hotspot-detect.html HTTP/1.0" > > In our packetfence.log, the client sends the email address from the > Registration Portal page that appears on the iPhone and the VLAN reevaluation > is started > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) INFO: > [mac:f2:ef:bb:22:8c:62] User endu...@gmail.com <mailto:endu...@gmail.com> has > authenticated on the portal. > (captiveportal::PacketFence::DynamicRouting::Module::_username_set) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) INFO: > [mac:f2:ef:bb:22:8c:62] new activation code successfully generated > (pf::activation::create) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) WARN: > [mac:f2:ef:bb:22:8c:62] Calling match with empty/invalid rule class. > Defaulting to 'authentication' (pf::authentication::match) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) INFO: > [mac:f2:ef:bb:22:8c:62] Using sources email for matching > (pf::authentication::match) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) INFO: > [mac:f2:ef:bb:22:8c:62] Matched rule (catchall) in source email, returning > actions. (pf::Authentication::Source::match_rule) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) INFO: > [mac:f2:ef:bb:22:8c:62] Matched rule (catchall) in source email, returning > actions. (pf::Authentication::Source::match) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) INFO: > [mac:f2:ef:bb:22:8c:62] Using sources email for matching > (pf::authentication::match) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) INFO: > [mac:f2:ef:bb:22:8c:62] security_event 1300003 force-closed for > f2:ef:bb:22:8c:62 (pf::security_event::security_event_force_close) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(96) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(95) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(95) WARN: > [mac:f2:ef:bb:22:8c:62] locale from the URL is not supported > (captiveportal::PacketFence::Controller::Root::getLanguages) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(95) INFO: > [mac:f2:ef:bb:22:8c:62] Releasing device > (captiveportal::PacketFence::DynamicRouting::Module::Root::release) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(95) INFO: > [mac:f2:ef:bb:22:8c:62] re-evaluating access (manage_register called) > (pf::enforcement::reevaluate_access) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(95) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(95) INFO: > [mac:f2:ef:bb:22:8c:62] VLAN reassignment is forced. > (pf::enforcement::_should_we_reassign_vlan) > Jan 18 14:55:13 pf4 httpd.portal-docker-wrapper[4460]: httpd.portal(95) INFO: > [mac:f2:ef:bb:22:8c:62] switch port is (10.2.1.11) ifIndex 0connection type: > WiFi MAC Auth (pf::enforcement::_vlan_reevaluation) > Jan 18 14:55:13 pf4 pfqueue[64911]: pfqueue(64911) WARN: > [mac:f2:ef:bb:22:8c:62] Unable to pull accounting history for device > f2:ef:bb:22:8c:62. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > Jan 18 14:55:14 pf4 pfqueue[64476]: pfqueue(64476) INFO: > [mac:f2:ef:bb:22:8c:62] Sending a firewall SSO 'Update' request for MAC > 'f2:ef:bb:22:8c:62' and IP '10.2.2.178' (pf::firewallsso::do_sso) > Jan 18 14:55:14 pf4 pfqueue[65697]: pfqueue(65697) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:55:14 pf4 pfqueue[64469]: pfqueue(64469) WARN: > [mac:f2:ef:bb:22:8c:62] Unable to pull accounting history for device > f2:ef:bb:22:8c:62. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > > In the haproxy_portal.log we see some final activity on the Registration > portal waiting for the fencing delay to send the Radius Disconnect. > > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62361 > <https://urldefense.com/v3/__http://10.2.2.178:62361__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gFD5Fmauw$> > [18/Jan/2023:14:55:12.224] portal-https-10.2.1.2~ > 10.2.1.2-backend/containers-gateway.internal:8080 0/0/0/1214/1214 302 1090 - > - ---- 7/5/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "POST /signup HTTP/1.1" > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62366 > <https://urldefense.com/v3/__http://10.2.2.178:62366__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHhaMHzuA$> > [18/Jan/2023:14:55:13.498] portal-http-10.2.1.2 > 10.2.1.2-backend/containers-gateway.internal:8080 0/0/0/139/139 200 7800 - - > ---- 8/2/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /access?lang= HTTP/1.1" > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62366 > <https://urldefense.com/v3/__http://10.2.2.178:62366__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHhaMHzuA$> > [18/Jan/2023:14:55:13.668] portal-http-10.2.1.2 static/static 0/0/0/1/2 200 > 42006 - - ---- 9/3/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/styles.css HTTP/1.1" > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62367 > <https://urldefense.com/v3/__http://10.2.2.178:62367__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEOhKeA9g$> > [18/Jan/2023:14:55:13.677] portal-http-10.2.1.2 static/static 0/0/0/3/3 200 > 6157 - - ---- 13/7/3/3/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/pf.js HTTP/1.1" > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62369 > <https://urldefense.com/v3/__http://10.2.2.178:62369__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEb8G44tQ$> > [18/Jan/2023:14:55:13.677] portal-http-10.2.1.2 static/static 0/0/0/2/2 200 > 20248 - - ---- 13/7/2/2/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/qrcode.min.js HTTP/1.1" > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62370 > <https://urldefense.com/v3/__http://10.2.2.178:62370__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gFhtYnOUQ$> > [18/Jan/2023:14:55:13.677] portal-http-10.2.1.2 static/static 0/0/0/3/3 200 > 1506 - - ---- 13/7/1/1/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/jquery-shim.js HTTP/1.1" > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62368 > <https://urldefense.com/v3/__http://10.2.2.178:62368__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gG6YLN3yw$> > [18/Jan/2023:14:55:13.677] portal-http-10.2.1.2 static/static 0/0/0/3/3 200 > 8239 - - ---- 13/7/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /content/captiveportal.js HTTP/1.1" > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62366 > <https://urldefense.com/v3/__http://10.2.2.178:62366__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHhaMHzuA$> > [18/Jan/2023:14:55:13.681] portal-http-10.2.1.2 static/static 0/0/0/5/5 200 > 837 - - ---- 14/8/1/1/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /content/timerbar.js HTTP/1.1" > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62371 > <https://urldefense.com/v3/__http://10.2.2.178:62371__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHIGDDhPA$> > [18/Jan/2023:14:55:13.681] portal-http-10.2.1.2 static/static 0/0/0/5/5 200 > 1640 - - ---- 14/8/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /content/release.js HTTP/1.1" > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62366 > <https://urldefense.com/v3/__http://10.2.2.178:62366__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHhaMHzuA$> > [18/Jan/2023:14:55:13.692] portal-http-10.2.1.2 static/static 0/0/0/1/1 200 > 4480 - - ---- 14/8/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/packetfence-cp.png HTTP/1.1" > Jan 18 14:55:13 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:62367 > <https://urldefense.com/v3/__http://10.2.2.178:62367__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEOhKeA9g$> > [18/Jan/2023:14:55:13.697] portal-http-10.2.1.2 static/static 0/0/0/1/1 200 > 39912 - - ---- 14/8/0/0/0 0/0 {pf4.test.com > <https://urldefense.com/v3/__http://pf4.test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEpp14xvA$>} > "GET /common/img/sprite.svg HTTP/1.1" > Jan 18 14:55:16 pf4 haproxy-portal-docker-wrapper[1141]: 10.2.2.178:54634 > <https://urldefense.com/v3/__http://10.2.2.178:54634__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gE6NrMnLg$> > [18/Jan/2023:14:55:13.663] portal-http-10.2.1.2 proxy/proxy 0/0/1/2974/2975 > 200 644 - - ---- 14/8/0/0/0 0/0 {captive.apple.com > <https://urldefense.com/v3/__http://captive.apple.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHRHamHbA$>} > "GET /hotspot-detect.html HTTP/1.0" > > In the packetfence.log after the fencing delay we see the disconnect request > > Jan 18 14:55:28 pf4 pfqueue[65695]: pfqueue(65695) INFO: > [mac:f2:ef:bb:22:8c:62] [f2:ef:bb:22:8c:62] DesAssociating mac on switch > (10.2.1.11) (pf::api::desAssociate) > Jan 18 14:55:28 pf4 pfqueue[65695]: pfqueue(65695) INFO: > [mac:f2:ef:bb:22:8c:62] deauthenticating f2:ef:bb:22:8c:62 > (pf::Switch::Hostapd::radiusDisconnect) > Jan 18 14:55:28 pf4 pfqueue[65695]: pfqueue(65695) INFO: > [mac:f2:ef:bb:22:8c:62] Will be using connnector local_connector to perform > the deauth (pf::Switch::radius_deauth_connection_info) > Jan 18 14:55:28 pf4 pfqueue[65695]: pfqueue(65695) WARN: > [mac:f2:ef:bb:22:8c:62] Warning: 1366: Incorrect string value: > '\xE3\xD1`=\x04\xC7...' for column `pf`.`radius_audit_log`.`radius_reply` at > row 1 (pf::dal::db_execute) > Jan 18 14:55:28 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] handling radius autz request: from switch_ip => > (10.2.1.11), connection_type => Wireless-802.11-NoEAP,switch_mac => > (ec:08:6b:6a:63:5a), mac => [f2:ef:bb:22:8c:62], port => 0, username => > "f2efbb228c62", ssid => TestOne_WiFi (pf::radius::authorize) > Jan 18 14:55:28 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:55:28 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Found authentication source(s) : '' for realm 'null' > (pf::config::util::filter_authentication_sources) > Jan 18 14:55:28 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Connection type is MAC-AUTH. Getting role from > node_info (pf::role::getRegisteredRole) > Jan 18 14:55:28 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Username was defined "f2efbb228c62" - returning role > 'guest' (pf::role::getRegisteredRole) > Jan 18 14:55:28 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] PID: "endu...@gmail.com <mailto:endu...@gmail.com>", > Status: reg Returned VLAN: (undefined), Role: guest > (pf::role::fetchRoleForNode) > Jan 18 14:55:28 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] (10.2.1.11) Added VLAN 83 to the returned RADIUS > Access-Accept (pf::Switch::returnRadiusAccessAccept) > Jan 18 14:55:29 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Updating locationlog from accounting request > (pf::api::handle_accounting_metadata) > Jan 18 14:55:29 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) WARN: > [mac:f2:ef:bb:22:8c:62] Cannot find any combination ID in any schemas > (fingerbank::Source::LocalDB::_getCombinationID) > Jan 18 14:55:29 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Upstream is configured and unable to fullfil an exact > match locally. Will ignore result from local database > (fingerbank::Source::LocalDB::match) > Jan 18 14:55:29 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Successfully interrogate upstream Fingerbank project > for matching. Got device : 264 (fingerbank::Source::Collector::match) > Jan 18 14:55:29 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) WARN: > [mac:f2:ef:bb:22:8c:62] Unable to pull accounting history for device > f2:ef:bb:22:8c:62. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > Jan 18 14:55:29 pf4 pfqueue[64775]: pfqueue(64775) INFO: > [mac:f2:ef:bb:22:8c:62] Sending a firewall SSO 'Update' request for MAC > 'f2:ef:bb:22:8c:62' and IP '10.2.2.178' (pf::firewallsso::do_sso) > Jan 18 14:55:29 pf4 pfqueue[65705]: pfqueue(65705) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > > > We see the VLAN change initiated from PF applied in the NAS/AP logs and the > client connection onto the Default VLAN 83 > > Wed Jan 18 14:55:28 2023 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED > f2:ef:bb:22:8c:62 > Wed Jan 18 14:55:28 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 RADIUS: stopped accounting session > 2DB2C59D34BD1998 > Wed Jan 18 14:55:28 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 RADIUS: VLAN ID 83 > Wed Jan 18 14:55:29 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 IEEE 802.11: authenticated > Wed Jan 18 14:55:29 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 IEEE 802.11: associated (aid 2) > Wed Jan 18 14:55:29 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED > f2:ef:bb:22:8c:62 > Wed Jan 18 14:55:29 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 RADIUS: starting accounting session > 2DB2C59D34BD1998 > > With matching tcpdump capture showing the Disconnect and ACK from the NAS/AP > > 14:55:28.794094 IP 10.2.1.2.44286 > 10.2.1.11.3799: RADIUS, > Disconnect-Request (40), id: 0x7d length: 39 > 14:55:28.795785 IP 10.2.1.11.48577 > 10.2.1.2.1813: RADIUS, > Accounting-Request (4), id: 0x1e length: 224 > 14:55:28.796071 IP 10.2.1.11.3799 > 10.2.1.2.44286: RADIUS, Disconnect-ACK > (41), id: 0x7d length: 44 > 14:55:28.796386 IP 10.2.1.2.1813 > 10.2.1.11.48577: RADIUS, > Accounting-Response (5), id: 0x1e length: 35 > 14:55:28.885006 IP 10.2.1.11.49421 > 10.2.1.2.1812: RADIUS, Access-Request > (1), id: 0x1f length: 164 > 14:55:28.920956 IP 10.2.1.2.1812 > 10.2.1.11.49421: RADIUS, Access-Accept > (2), id: 0x1f length: 36 > 14:55:29.075666 IP 10.2.1.11.48577 > 10.2.1.2.1813: RADIUS, > Accounting-Request (4), id: 0x20 length: 182 > 14:55:29.076067 IP 10.2.1.2.1813 > 10.2.1.11.48577: RADIUS, > Accounting-Response (5), id: 0x20 length: 35 > > At this point the client is now on the Default VLAN 83 as of 14:55:29 > > On our Default Network, we immediately start to see traffic from the client. > The issue seems to be that the client is still using the IP from the > Registration network (10.2.2.178); Almost like it did not detect the wifi > disconnect and reconnect. > It should be on a 10.2.4.0/24 > <https://urldefense.com/v3/__http://10.2.4.0/24__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gGtiUcqww$> > IP address > > tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size 262144 > bytes > 14:55:29.071416 f2:ef:bb:22:8c:62 (oui Unknown) > Broadcast Null Unnumbered, > xid, Flags [Response], length 42: 01 00 > 14:55:29.725195 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP > (6), length 64) > 10.2.2.178.62377 > web.inverse.ca.80: Flags [S], cksum 0x1fc6 (correct), > seq 1176141384, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val > 2334978519 ecr 0,sackOK,eol], length 0 > 14:55:29.725195 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP > (6), length 64) > 10.2.2.178.62374 > web.inverse.ca.80: Flags [S], cksum 0x231d (correct), > seq 1612822294, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val > 1377096902 ecr 0,sackOK,eol], length 0 > 14:55:29.726606 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP > (6), length 64) > 10.2.2.178.62372 > web.inverse.ca.80: Flags [S], cksum 0x8e90 (correct), > seq 2169278132, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val > 1248622644 ecr 0,sackOK,eol], length 0 > 14:55:29.728233 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP > (6), length 64) > .... > > The client gets to the end of the captive portal connection progress bar, and > gets an obvious error, because it has not requested a new IP, as seen in the > tcpdump, with the half-open connection attempts to web.inverse.ca > <http://web.inverse.ca/> > This continues for 20 seconds during this period and we see this frame in > tcpdump below, still from a Registration VLAN IP but on the Default VLAN83 > > 14:55:43.749310 IP (tos 0x0, ttl 64, id 50181, offset 0, flags [none], proto > UDP (17), length 328) > 10.2.2.178.68 > 10.2.2.2.67: [udp sum ok] BOOTP/DHCP, Request from > f2:ef:bb:22:8c:62 (oui Unknown), length 300, xid 0xc683af32, Flags [none] > (0x0000) > Client-IP 10.2.2.178 > Client-Ethernet-Address f2:ef:bb:22:8c:62 (oui Unknown) > Vendor-rfc1048 Extensions > Magic Cookie 0x63825363 > DHCP-Message Option 53, length 1: Request > Parameter-Request Option 55, length 9: > Subnet-Mask, Classless-Static-Route, Default-Gateway, Domain-Name-Server > Domain-Name, Option 108, URL, Option 119 > Option 252 > MSZ Option 57, length 2: 1500 > Client-ID Option 61, length 7: ether f2:ef:bb:22:8c:62 > Lease-Time Option 51, length 4: 7776000 > END Option 255, length 0 > PAD Option 0, length 0, occurs 26 > > The half open connections from the client continue on the Default VLAN > ... > 14:55:45.742728 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP > (6), length 64) > 10.2.2.178.62376 > web.inverse.ca.80: Flags [S], cksum 0xcf45 (correct), > seq 3811680306, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val > 4007600036 ecr 0,sackOK,eol], length 0 > > At this point we turn off and on the wifi on the client, and it just > reconnects and is fine on the Default network as shown in the tcpdump on > VLAN83 below. > > 14:56:06.692580 f2:ef:bb:22:8c:62 (oui Unknown) > Broadcast Null Unnumbered, > xid, Flags [Response], length 42: 01 00 > 14:56:07.090206 IP (tos 0x0, ttl 255, id 10306, offset 0, flags [none], proto > UDP (17), length 328) > 0.0.0.0.68 > 255.255.255.255.67: [udp sum ok] BOOTP/DHCP, Request from > f2:ef:bb:22:8c:62 (oui Unknown), length 300, xid 0xc683af33, Flags [none] > (0x0000) > Client-Ethernet-Address f2:ef:bb:22:8c:62 (oui Unknown) > Vendor-rfc1048 Extensions > Magic Cookie 0x63825363 > DHCP-Message Option 53, length 1: Discover > Parameter-Request Option 55, length 9: > Subnet-Mask, Classless-Static-Route, Default-Gateway, Domain-Name-Server > Domain-Name, Option 108, URL, Option 119 > Option 252 > MSZ Option 57, length 2: 1500 > Client-ID Option 61, length 7: ether f2:ef:bb:22:8c:62 > Lease-Time Option 51, length 4: 7776000 > END Option 255, length 0 > PAD Option 0, length 0, occurs 26 > 14:56:07.090596 IP (tos 0xc0, ttl 64, id 61257, offset 0, flags [none], proto > UDP (17), length 368) > pf4-user.lan.67 > 10.2.4.186.68: [bad udp cksum 0x1e2c -> 0x42ca!] > BOOTP/DHCP, Reply, length 340, xid 0xc683af33, Flags [none] (0x0000) > Your-IP 10.2.4.186 > Server-IP pf4-user.lan > Client-Ethernet-Address f2:ef:bb:22:8c:62 (oui Unknown) > Vendor-rfc1048 Extensions > Magic Cookie 0x63825363 > DHCP-Message Option 53, length 1: Offer > Server-ID Option 54, length 4: pf4-user.lan > Lease-Time Option 51, length 4: 43200 > RN Option 58, length 4: 21600 > RB Option 59, length 4: 37800 > Subnet-Mask Option 1, length 4: 255.255.255.0 > BR Option 28, length 4: 10.2.4.255 > Default-Gateway Option 3, length 4: pf4-user.lan > Domain-Name-Server Option 6, length 4: pf4-user.lan > URL Option 114, length 36: "urn:ietf:params:capport:unrestricted" > Domain-Name Option 15, length 8: "test.com > <https://urldefense.com/v3/__http://test.com__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gHbNFsyQg$>" > END Option 255, length 0 > > We See the matching activity of our manually disconnection and reassociation, > both still on VLAN 83, our Default network as seen in the NAS/AP logs: > Wed Jan 18 14:56:05 2023 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED > f2:ef:bb:22:8c:62 > Wed Jan 18 14:56:05 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 IEEE 802.11: disassociated > Wed Jan 18 14:56:05 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 RADIUS: stopped accounting session > 2DB2C59D34BD1998 > Wed Jan 18 14:56:06 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 RADIUS: VLAN ID 83 > Wed Jan 18 14:56:06 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 IEEE 802.11: authenticated > Wed Jan 18 14:56:06 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 IEEE 802.11: associated (aid 2) > Wed Jan 18 14:56:06 2023 daemon.notice hostapd: wlan0: AP-STA-CONNECTED > f2:ef:bb:22:8c:62 > Wed Jan 18 14:56:06 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 RADIUS: starting accounting session > 2DB2C59D34BD1998 > Wed Jan 18 14:56:07 2023 daemon.warn dnsmasq-dhcp[2691]: DHCP packet received > on br-vlan83 which has no address > Wed Jan 18 14:56:07 2023 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED > f2:ef:bb:22:8c:62 > Wed Jan 18 14:56:07 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 IEEE 802.11: disassociated > Wed Jan 18 14:56:07 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 RADIUS: stopped accounting session > 2DB2C59D34BD1998 > Wed Jan 18 14:56:08 2023 daemon.info > <https://urldefense.com/v3/__http://daemon.info__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gEoIfX2ig$> > hostapd: wlan0: STA f2:ef:bb:22:8c:62 IEEE 802.11: deauthenticated due to > inactivity (timer DEAUTH/REMOVE) > > And in our packetfence log, the manual change is accounted for, but this is > just like a device returning, that has previously been authorized. > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] handling radius autz request: from switch_ip => > (10.2.1.11), connection_type => Wireless-802.11-NoEAP,switch_mac => > (ec:08:6b:6a:63:5a), mac => [f2:ef:bb:22:8c:62], port => 0, username => > "f2efbb228c62", ssid => TestOne_WiFi (pf::radius::authorize) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Instantiate profile Test_WiFi > (pf::Connection::ProfileFactory::_from_profile) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Found authentication source(s) : '' for realm 'null' > (pf::config::util::filter_authentication_sources) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Connection type is MAC-AUTH. Getting role from > node_info (pf::role::getRegisteredRole) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Username was defined "f2efbb228c62" - returning role > 'guest' (pf::role::getRegisteredRole) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] PID: "endu...@gmail.com <mailto:endu...@gmail.com>", > Status: reg Returned VLAN: (undefined), Role: guest > (pf::role::fetchRoleForNode) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] (10.2.1.11) Added VLAN 83 to the returned RADIUS > Access-Accept (pf::Switch::returnRadiusAccessAccept) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Updating locationlog from accounting request > (pf::api::handle_accounting_metadata) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) WARN: > [mac:f2:ef:bb:22:8c:62] Cannot find any combination ID in any schemas > (fingerbank::Source::LocalDB::_getCombinationID) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Upstream is configured and unable to fullfilan exact > match locally. Will ignore result from local database > (fingerbank::Source::LocalDB::match) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) INFO: > [mac:f2:ef:bb:22:8c:62] Successfully interrogate upstream Fingerbank project > for matching. Got device : 264 (fingerbank::Source::Collector::match) > Jan 18 14:56:06 pf4 httpd.aaa-docker-wrapper[2299]: httpd.aaa(7) WARN: > [mac:f2:ef:bb:22:8c:62] Unable to pull accounting history for device > f2:ef:bb:22:8c:62. The history set doesn't exist yet. > (pf::accounting_events_history::latest_mac_history) > Jan 18 14:56:10 pf4 pfperl-api-docker-wrapper[1130]: pfperl-api(14) INFO: > [mac:[undef]] Using 300 resolution threshold > (pf::pfcron::task::cluster_check::run) > Jan 18 14:56:10 pf4 pfperl-api-docker-wrapper[1130]: pfperl-api(14) INFO: > [mac:[undef]] All cluster members are running the same configuration version > (pf::pfcron::task::cluster_check::run) > Jan 18 14:56:10 pf4 pfperl-api-docker-wrapper[1130]: pfperl-api(14) INFO: > [mac:[undef]] processed 0 security_events during security_event maintenance > (1674071770.27209 1674071770.28315) > (pf::security_event::security_event_maintenance) > Jan 18 14:56:10 pf4 pfperl-api-docker-wrapper[1130]: pfperl-api(14) INFO: > [mac:[undef]] getting security_events triggers for accounting cleanup > (pf::accounting::acct_maintenance) > > In summary, our problem appears to be that some clients are not requesting a > new lease when reconnecting, and are trying to continue with their > Registration VLAN configuration when put onto the Default VLAN after and > AP-Disconnect, which we would assume requires a new lease update. Is it > possible to have the PF server send a DHCP Disconnect, prior to the RADIUS > Disconnect to help the client refresh. > > It is also worth noting we do have Option 114 defined in our DHCP response on > the Default Network as shown above. So having overcome some timing issues > between RADIUS Disconnects and our APs, and adding Option 114 to our Default > network, we still seem to be stuck on this issue where some clients are not > updating their network lease when being disconnected and reconnected on the > Default Network VLAN > > URL Option 114, length 36: "urn:ietf:params:capport:unrestricted" > > Any help appreciated > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > <mailto:PacketFence-users@lists.sourceforge.net> > https://lists.sourceforge.net/lists/listinfo/packetfence-users > <https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gH7G8u1hA$> > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gH7G8u1hA$ > > <https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!RPQlYqvAU8mZUpbCXLbAj9YIOxCD_K1Zxif9CTrlZB_-I5ZvHB3oxdOTBu3zVk8av2aniBme9MHIOC7X6Y4n_iIAW63i9gH7G8u1hA$>
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users