Ok so you need to add support of 802.1x in the switch module.

In this file, https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Netgear/MSeries.pm#L19 add that:

sub supportsWiredDot1x { return $TRUE; }

Then restart packetfence.

Paste me the packetfence.log after that.
Regards
Fabrice

Le 2017-11-01 à 18:04, James Garcellano via PacketFence-users a écrit :
Hello Fabrice,

Here is the last few entries from the /usr/local/pf/logs/packetfence.log file:

Nov  1 22:03:06 packetfence-zen packetfence_httpd.aaa: httpd.aaa(2852) INFO: [mac:00:21:70:d8:ac:45] 
handling radius autz request: from switch_ip => (192.168.1.12), connection_type => 
Ethernet-EAP,switch_mac => (b0:b9:8a:46:3d:0e), mac => [00:21:70:d8:ac:45], port => 1, username 
=> "PFDOMAIN\testme" (pf::radius::authorize)
Nov  1 22:03:06 packetfence-zen packetfence_httpd.aaa: httpd.aaa(2852) ERROR: 
[mac:00:21:70:d8:ac:45] Wired 802.1X is not supported on switch type 
pf::Switch::Netgear::MSeries. Please let us know what hardware you are using. 
(pf::Switch::supportsWiredDot1x)
Nov  1 22:03:06 packetfence-zen packetfence_httpd.aaa: httpd.aaa(2852) WARN: 
[mac:00:21:70:d8:ac:45] (192.168.1.12) Sending REJECT since switch is 
unsupported (pf::radius::_switchUnsupportedReply)
Nov  1 22:03:07 packetfence-zen packetfence_httpd.aaa: httpd.aaa(3730) INFO: 
[mac:00:21:70:d8:ac:45] Updating locationlog from accounting request 
(pf::api::handle_accounting_metadata)


Ok it's better now.

Now can you check on the packetfence.log, you are suppose to see
different messages now.


Le 2017-11-01 à 17:27, James Garcellano via PacketFence-users a écrit :
It looks like the other test still showed the NAS IP as 192.168.1.5.

I rebooted the switch and did another test.

Here is the raddebug from that...

(38) Wed Nov  1 21:13:13 2017: Debug: Received Access-Request Id 201 from 
192.168.1.12:42371 to 192.168.1.5:1812 length 158
(38) Wed Nov  1 21:13:13 2017: Debug:   User-Name = "PFDOMAIN\\testme"
(38) Wed Nov  1 21:13:13 2017: Debug:   Called-Station-Id = "b0-b9-8a-46-3d-0e"
(38) Wed Nov  1 21:13:13 2017: Debug:   Calling-Station-Id = "00:21:70:d8:ac:45"
(38) Wed Nov  1 21:13:13 2017: Debug:   NAS-Identifier = "b0-b9-8a-46-3d-0c"
(38) Wed Nov  1 21:13:13 2017: Debug:   NAS-IP-Address = 192.168.1.12
(38) Wed Nov  1 21:13:13 2017: Debug:   NAS-Port = 1
(38) Wed Nov  1 21:13:13 2017: Debug:   Framed-MTU = 1500
(38) Wed Nov  1 21:13:13 2017: Debug:   NAS-Port-Type = Ethernet
(38) Wed Nov  1 21:13:13 2017: Debug:   EAP-Message = 
0x02000014015046444f4d41494e5c746573746d65
(38) Wed Nov  1 21:13:13 2017: Debug:   Message-Authenticator = 
0x935d535299b823f31e7748c9271d6225
(38) Wed Nov  1 21:13:13 2017: Debug: # Executing section authorize from file 
/usr/local/pf/raddb/sites-enabled/packetfence
(38) Wed Nov  1 21:13:13 2017: Debug:   authorize {
(38) Wed Nov  1 21:13:13 2017: Debug:     update {
(38) Wed Nov  1 21:13:13 2017: Debug:       EXPAND %{Packet-Src-IP-Address}
(38) Wed Nov  1 21:13:13 2017: Debug:          --> 192.168.1.12
(38) Wed Nov  1 21:13:13 2017: Debug:       EXPAND %l
(38) Wed Nov  1 21:13:13 2017: Debug:          --> 1509570793
(38) Wed Nov  1 21:13:13 2017: Debug:     } # update = noop
(38) Wed Nov  1 21:13:13 2017: Debug:     policy rewrite_calling_station_id {
(38) Wed Nov  1 21:13:13 2017: Debug:       if (&Calling-Station-Id && 
(&Calling-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
 {
(38) Wed Nov  1 21:13:13 2017: Debug:       if (&Calling-Station-Id && 
(&Calling-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
  -> TRUE
(38) Wed Nov  1 21:13:13 2017: Debug:       if (&Calling-Station-Id && 
(&Calling-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
  {
(38) Wed Nov  1 21:13:13 2017: Debug:         update request {
(38) Wed Nov  1 21:13:13 2017: Debug:           EXPAND 
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(38) Wed Nov  1 21:13:13 2017: Debug:              --> 00:21:70:d8:ac:45
(38) Wed Nov  1 21:13:13 2017: Debug:         } # update request = noop
(38) Wed Nov  1 21:13:13 2017: Debug:         [updated] = updated
(38) Wed Nov  1 21:13:13 2017: Debug:       } # if (&Calling-Station-Id && 
(&Calling-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
  = updated
(38) Wed Nov  1 21:13:13 2017: Debug:       ... skipping else: Preceding "if" 
was taken
(38) Wed Nov  1 21:13:13 2017: Debug:     } # policy rewrite_calling_station_id 
= updated
(38) Wed Nov  1 21:13:13 2017: Debug:     policy rewrite_called_station_id {
(38) Wed Nov  1 21:13:13 2017: Debug:       if ((&Called-Station-Id) && 
(&Called-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
 {
(38) Wed Nov  1 21:13:13 2017: Debug:       if ((&Called-Station-Id) && 
(&Called-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
  -> TRUE
(38) Wed Nov  1 21:13:13 2017: Debug:       if ((&Called-Station-Id) && 
(&Called-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
  {
(38) Wed Nov  1 21:13:13 2017: Debug:         update request {
(38) Wed Nov  1 21:13:13 2017: Debug:           EXPAND 
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(38) Wed Nov  1 21:13:13 2017: Debug:              --> b0:b9:8a:46:3d:0e
(38) Wed Nov  1 21:13:13 2017: Debug:         } # update request = noop
(38) Wed Nov  1 21:13:13 2017: Debug:         if ("%{8}") {
(38) Wed Nov  1 21:13:13 2017: Debug:         EXPAND %{8}
(38) Wed Nov  1 21:13:13 2017: Debug:            -->
(38) Wed Nov  1 21:13:13 2017: Debug:         if ("%{8}")  -> FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:         elsif ( (Colubris-AVPair) && 
"%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
(38) Wed Nov  1 21:13:13 2017: Debug:         elsif ( (Colubris-AVPair) && 
"%{Colubris-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:         elsif (Aruba-Essid-Name) {
(38) Wed Nov  1 21:13:13 2017: Debug:         elsif (Aruba-Essid-Name)  -> FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:         elsif ( (Cisco-AVPair)  && 
"%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
(38) Wed Nov  1 21:13:13 2017: Debug:         elsif ( (Cisco-AVPair)  && 
"%{Cisco-AVPair}" =~ /^ssid=(.*)$/i)  -> FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:         [updated] = updated
(38) Wed Nov  1 21:13:13 2017: Debug:       } # if ((&Called-Station-Id) && 
(&Called-Station-Id =~ 
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
  = updated
(38) Wed Nov  1 21:13:13 2017: Debug:       ... skipping else: Preceding "if" 
was taken
(38) Wed Nov  1 21:13:13 2017: Debug:     } # policy rewrite_called_station_id 
= updated
(38) Wed Nov  1 21:13:13 2017: Debug:     policy filter_username {
(38) Wed Nov  1 21:13:13 2017: Debug:       if (&User-Name) {
(38) Wed Nov  1 21:13:13 2017: Debug:       if (&User-Name)  -> TRUE
(38) Wed Nov  1 21:13:13 2017: Debug:       if (&User-Name)  {
(38) Wed Nov  1 21:13:13 2017: Debug:         if (&User-Name =~ / /) {
(38) Wed Nov  1 21:13:13 2017: Debug:         if (&User-Name =~ / /)  -> FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:         if (&User-Name =~ /@[^@]*@/ ) {
(38) Wed Nov  1 21:13:13 2017: Debug:         if (&User-Name =~ /@[^@]*@/ )  -> 
FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:         if (&User-Name =~ /\.\./ ) {
(38) Wed Nov  1 21:13:13 2017: Debug:         if (&User-Name =~ /\.\./ )  -> 
FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:         if ((&User-Name =~ /@/) && 
(&User-Name !~ /@(.+)\.(.+)$/))  {
(38) Wed Nov  1 21:13:13 2017: Debug:         if ((&User-Name =~ /@/) && 
(&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:         if (&User-Name =~ /\.$/)  {
(38) Wed Nov  1 21:13:13 2017: Debug:         if (&User-Name =~ /\.$/)   -> 
FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:         if (&User-Name =~ /@\./)  {
(38) Wed Nov  1 21:13:13 2017: Debug:         if (&User-Name =~ /@\./)   -> 
FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:       } # if (&User-Name)  = updated
(38) Wed Nov  1 21:13:13 2017: Debug:     } # policy filter_username = updated
(38) Wed Nov  1 21:13:13 2017: Debug:     policy filter_password {
(38) Wed Nov  1 21:13:13 2017: Debug:       if (&User-Password &&          
(&User-Password != "%{string:User-Password}")) {
(38) Wed Nov  1 21:13:13 2017: Debug:       if (&User-Password &&          (&User-Password 
!= "%{string:User-Password}"))  -> FALSE
(38) Wed Nov  1 21:13:13 2017: Debug:     } # policy filter_password = updated
(38) Wed Nov  1 21:13:13 2017: Debug:     [preprocess] = ok
(38) Wed Nov  1 21:13:13 2017: Debug: suffix: Checking for suffix after "@"
(38) Wed Nov  1 21:13:13 2017: Debug: suffix: No '@' in User-Name = 
"PFDOMAIN\testme", skipping NULL due to config.
(38) Wed Nov  1 21:13:13 2017: Debug:     [suffix] = noop
(38) Wed Nov  1 21:13:13 2017: Debug: ntdomain: Checking for prefix before "\"
(38) Wed Nov  1 21:13:13 2017: Debug: ntdomain: Looking up realm "PFDOMAIN" for User-Name 
= "PFDOMAIN\testme"
(38) Wed Nov  1 21:13:13 2017: Debug: ntdomain: Found realm "pfdomain"
(38) Wed Nov  1 21:13:13 2017: Debug: ntdomain: Adding Stripped-User-Name = 
"testme"
(38) Wed Nov  1 21:13:13 2017: Debug: ntdomain: Adding Realm = "pfdomain"
(38) Wed Nov  1 21:13:13 2017: Debug: ntdomain: Authentication realm is LOCAL
(38) Wed Nov  1 21:13:13 2017: Debug:     [ntdomain] = ok
(38) Wed Nov  1 21:13:13 2017: Debug: eap: Peer sent EAP Response (code 2) ID 0 
length 20
(38) Wed Nov  1 21:13:13 2017: Debug: eap: EAP-Identity reply, returning 'ok' 
so we can short-circuit the rest of authorize
(38) Wed Nov  1 21:13:13 2017: Debug:     [eap] = ok
(38) Wed Nov  1 21:13:13 2017: Debug:   } # authorize = ok
(38) Wed Nov  1 21:13:13 2017: Debug: Found Auth-Type = eap
(38) Wed Nov  1 21:13:13 2017: Debug: # Executing group from file 
/usr/local/pf/raddb/sites-enabled/packetfence
(38) Wed Nov  1 21:13:13 2017: Debug:   authenticate {
(38) Wed Nov  1 21:13:13 2017: Debug: eap: Peer sent packet with method EAP 
Identity (1)
(38) Wed Nov  1 21:13:13 2017: Debug: eap: Calling submodule eap_peap to 
process data
(38) Wed Nov  1 21:13:13 2017: Debug: eap_peap: Initiating new EAP-TLS session
(38) Wed Nov  1 21:13:13 2017: Debug: eap_peap: [eaptls start] = request
(38) Wed Nov  1 21:13:13 2017: Debug: eap: Sending EAP Request (code 1) ID 1 
length 6
(38) Wed Nov  1 21:13:13 2017: Debug: eap: EAP session adding &reply:State = 
0x3e2077383e216e13
(38) Wed Nov  1 21:13:13 2017: Debug:     [eap] = handled
(38) Wed Nov  1 21:13:13 2017: Debug:   } # authenticate = handled
(38) Wed Nov  1 21:13:13 2017: Debug: Using Post-Auth-Type Challenge
(38) Wed Nov  1 21:13:13 2017: Debug: Post-Auth-Type sub-section not found.  
Ignoring.
(38) Wed Nov  1 21:13:13 2017: Debug: # Executing group from file 
/usr/local/pf/raddb/sites-enabled/packetfence
(38) Wed Nov  1 21:13:13 2017: Debug: Sent Access-Challenge Id 201 from 
192.168.1.5:1812 to 192.168.1.12:42371 length 0
(38) Wed Nov  1 21:13:13 2017: Debug:   EAP-Message = 0x010100061920
(38) Wed Nov  1 21:13:13 2017: Debug:   Message-Authenticator = 
0x00000000000000000000000000000000
(38) Wed Nov  1 21:13:13 2017: Debug:   State = 
0x3e2077383e216e134e967a956fd013fe
(38) Wed Nov  1 21:13:13 2017: Debug: Finished request

James Garcellano


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
PacketFence-users@...
James Garcellano




------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to