im using packetfence 8.0.1
my user from other university complain can't connect to eduroam with local
REALM my university.
from raddebug output i see error message like this.
(79) Wed Jun 6 10:17:11 2018: ERROR: rest: Server returned:
(79) Wed Jun 6 10:17:11 2018: ERROR: rest: {"Reply-Message":"Network
device does not support this mode of
operation","control:PacketFence-Eap-Type":26,"control:PacketFence-Authorization-Status":"allow","control:PacketFence-Mac":"64:cc:2e:4f:39:3b","control:PacketFence-Switch-Ip-Address":"10.43.1.2","control:PacketFence-Request-Time":1528255031,"control:PacketFence-UserName":"
ae...@xyz.edu
","control:PacketFence-Connection-Type":"Ethernet-EAP","control:PacketFence-Switch-Mac":"38:ff:36:c2:33:69","control:PacketFence-Switch-Id":"10.43.1.2"}
packetfence log:
Jun 6 10:16:48 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2986)
INFO: [mac:64:cc:2e:4f:39:3b] handling radius autz request: from switch_ip
=> (10.43.1.2), connection_type => Ethernet-EAP,switch_mac =>
(38:ff:36:c2:33:69), mac => [64:cc:2e:4f:39:3b], port => , username => "
ae...@xyz.edu" (pf::radius::authorize)
Jun 6 10:16:48 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2986)
ERROR: [mac:64:cc:2e:4f:39:3b] Wired 802.1X is not supported on switch type
pf::Switch::Ruckus. Please let us know what hardware you are using.
(pf::Switch::supportsWiredDot1x)
Jun 6 10:16:48 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2986)
WARN: [mac:64:cc:2e:4f:39:3b] (10.43.1.2) Sending REJECT since switch is
unsupported (pf::radius::_switchUnsupportedReply)
Jun 6 10:17:11 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2986)
WARN: [mac:64:cc:2e:4f:39:3b] Use of uninitialized value $nas_port in
concatenation (.) or string at /usr/local/pf/lib/pf/Switch.pm line 2545.
(pf::Switch::NasPortToIfIndex)
Jun 6 10:17:11 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2986)
WARN: [mac:64:cc:2e:4f:39:3b] Use of uninitialized value $port in
concatenation (.) or string at /usr/local/pf/lib/pf/radius.pm line 179.
(pf::radius::authorize)
Jun 6 10:17:11 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2986)
INFO: [mac:64:cc:2e:4f:39:3b] handling radius autz request: from switch_ip
=> (10.43.1.2), connection_type => Ethernet-EAP,switch_mac =>
(38:ff:36:c2:33:69), mac => [64:cc:2e:4f:39:3b], port => , username => "
ae...@xyz.edu" (pf::radius::authorize)
Jun 6 10:17:11 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2986)
ERROR: [mac:64:cc:2e:4f:39:3b] Wired 802.1X is not supported on switch type
pf::Switch::Ruckus. Please let us know what hardware you are using.
(pf::Switch::supportsWiredDot1x)
Jun 6 10:17:11 PacketFence-ZEN packetfence_httpd.aaa: httpd.aaa(2986)
WARN: [mac:64:cc:2e:4f:39:3b] (10.43.1.2) Sending REJECT since switch is
unsupported (pf::radius::_switchUnsupportedReply)
please give me some advice.
thanks.
(79) Wed Jun 6 10:17:11 2018: Debug: User-Name = "ae...@xyz.edu"
(79) Wed Jun 6 10:17:11 2018: Debug: Calling-Station-Id = "64-CC-2E-4F-39-3B"
(79) Wed Jun 6 10:17:11 2018: Debug: NAS-IP-Address = 10.43.1.2
(79) Wed Jun 6 10:17:11 2018: Debug: Called-Station-Id =
"38-FF-36-C2-33-69:eduroam"
(79) Wed Jun 6 10:17:11 2018: Debug: NAS-Identifier = "38-FF-36-C2-33-69"
(79) Wed Jun 6 10:17:11 2018: Debug: EAP-Message =
0x0208002b190017030100207800450c2f957824b9747d285f35b4bfb1a1714f27697c43619591d46a9f04b5
(79) Wed Jun 6 10:17:11 2018: Debug: State =
0x70b0dfa877b8c6efcac40832d6116756
(79) Wed Jun 6 10:17:11 2018: Debug: Message-Authenticator =
0x6b35bdb3c5284feb0f9c21eff24ae78b
(79) Wed Jun 6 10:17:11 2018: Debug: Proxy-State = 0x3831
(79) Wed Jun 6 10:17:11 2018: Debug: Proxy-State = 0x3534
(79) Wed Jun 6 10:17:11 2018: Debug: session-state: No cached attributes
(79) Wed Jun 6 10:17:11 2018: Debug: # Executing section authorize from file
/usr/local/pf/raddb/sites-enabled/eduroam
(79) Wed Jun 6 10:17:11 2018: Debug: authorize {
(79) Wed Jun 6 10:17:11 2018: Debug: update {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{Packet-Src-IP-Address}
(79) Wed Jun 6 10:17:11 2018: Debug: --> 103.220.23.60
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND %l
(79) Wed Jun 6 10:17:11 2018: Debug: --> 1528255031
(79) Wed Jun 6 10:17:11 2018: Debug: } # update = noop
(79) Wed Jun 6 10:17:11 2018: Debug: policy rewrite_calling_station_id {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(79) Wed Jun 6 10:17:11 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
-> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(79) Wed Jun 6 10:17:11 2018: Debug: update request {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(79) Wed Jun 6 10:17:11 2018: Debug: --> 64:cc:2e:4f:39:3b
(79) Wed Jun 6 10:17:11 2018: Debug: } # update request = noop
(79) Wed Jun 6 10:17:11 2018: Debug: [updated] = updated
(79) Wed Jun 6 10:17:11 2018: Debug: } # if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
= updated
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping else: Preceding "if"
was taken
(79) Wed Jun 6 10:17:11 2018: Debug: } # policy rewrite_calling_station_id
= updated
(79) Wed Jun 6 10:17:11 2018: Debug: policy rewrite_called_station_id {
(79) Wed Jun 6 10:17:11 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(79) Wed Jun 6 10:17:11 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(79) Wed Jun 6 10:17:11 2018: Debug: update request {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(79) Wed Jun 6 10:17:11 2018: Debug: --> 38:ff:36:c2:33:69
(79) Wed Jun 6 10:17:11 2018: Debug: } # update request = noop
(79) Wed Jun 6 10:17:11 2018: Debug: if ("%{8}") {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{8}
(79) Wed Jun 6 10:17:11 2018: Debug: --> eduroam
(79) Wed Jun 6 10:17:11 2018: Debug: if ("%{8}") -> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if ("%{8}") {
(79) Wed Jun 6 10:17:11 2018: Debug: update request {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND
%{Called-Station-Id}:%{8}
(79) Wed Jun 6 10:17:11 2018: Debug: -->
38:ff:36:c2:33:69:eduroam
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{8}
(79) Wed Jun 6 10:17:11 2018: Debug: --> eduroam
(79) Wed Jun 6 10:17:11 2018: Debug: } # update request = noop
(79) Wed Jun 6 10:17:11 2018: Debug: } # if ("%{8}") = noop
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(79) Wed Jun 6 10:17:11 2018: Debug: [updated] = updated
(79) Wed Jun 6 10:17:11 2018: Debug: } # if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
= updated
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping else: Preceding "if"
was taken
(79) Wed Jun 6 10:17:11 2018: Debug: } # policy rewrite_called_station_id
= updated
(79) Wed Jun 6 10:17:11 2018: Debug: policy filter_username {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name) -> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ / /) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ / /) -> FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) ->
FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.\./ ) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.\./ ) ->
FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) {
(79) Wed Jun 6 10:17:11 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.$/) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.$/) ->
FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@\./) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@\./) ->
FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: } # if (&User-Name) = updated
(79) Wed Jun 6 10:17:11 2018: Debug: } # policy filter_username = updated
(79) Wed Jun 6 10:17:11 2018: Debug: policy filter_password {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) -> FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: } # policy filter_password = updated
(79) Wed Jun 6 10:17:11 2018: Debug: [preprocess] = ok
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Checking for suffix after "@"
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Looking up realm "xyz.edu" for
User-Name = "ae...@xyz.edu"
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Found realm "xyz.edu"
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Adding Stripped-User-Name =
"aegis"
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Adding Realm = "xyz.edu"
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Authentication realm is LOCAL
(79) Wed Jun 6 10:17:11 2018: Debug: [suffix] = ok
(79) Wed Jun 6 10:17:11 2018: Debug: ntdomain: Request already has destination
realm set. Ignoring
(79) Wed Jun 6 10:17:11 2018: Debug: [ntdomain] = noop
(79) Wed Jun 6 10:17:11 2018: Debug: if (User-Name =~ /@/) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (User-Name =~ /@/) -> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if (User-Name =~ /@/) {
(79) Wed Jun 6 10:17:11 2018: Debug: if ( Realm == "xyz.edu" ) {
(79) Wed Jun 6 10:17:11 2018: Debug: if ( Realm == "xyz.edu" ) -> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if ( Realm == "xyz.edu" ) {
(79) Wed Jun 6 10:17:11 2018: Debug: update control {
(79) Wed Jun 6 10:17:11 2018: Debug: } # update control = noop
(79) Wed Jun 6 10:17:11 2018: Debug: } # if ( Realm == "xyz.edu" ) =
noop
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping else: Preceding "if"
was taken
(79) Wed Jun 6 10:17:11 2018: Debug: } # if (User-Name =~ /@/) = noop
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping else: Preceding "if" was
taken
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Peer sent EAP Response (code 2) ID 8
length 43
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Continuing tunnel setup
(79) Wed Jun 6 10:17:11 2018: Debug: [eap] = ok
(79) Wed Jun 6 10:17:11 2018: Debug: } # authorize = ok
(79) Wed Jun 6 10:17:11 2018: WARNING: You set Proxy-To-Realm = default, but
it is a LOCAL realm! Cancelling proxy request.
(79) Wed Jun 6 10:17:11 2018: Debug: Found Auth-Type = eap
(79) Wed Jun 6 10:17:11 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/eduroam
(79) Wed Jun 6 10:17:11 2018: Debug: authenticate {
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Expiring EAP session with state
0xaddf81e0acd79b2f
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Finished EAP session with state
0x70b0dfa877b8c6ef
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Previous EAP request found for state
0x70b0dfa877b8c6ef, released from the list
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Peer sent packet with method EAP
PEAP (25)
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Calling submodule eap_peap to
process data
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Continuing EAP-TLS
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: [eaptls verify] = ok
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Done initial handshake
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: [eaptls process] = ok
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Session established. Decoding
tunneled attributes
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: PEAP state phase2
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: EAP method MSCHAPv2 (26)
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Got tunneled request
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: EAP-Message = 0x020800061a03
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Setting User-Name to
ae...@xyz.edu
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Sending tunneled request to
packetfence-tunnel
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: EAP-Message = 0x020800061a03
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: FreeRADIUS-Proxied-To =
127.0.0.1
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: User-Name = "ae...@xyz.edu"
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: State =
0xaddf81e0acd79b2f2f0623373d293571
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Calling-Station-Id :=
"64:cc:2e:4f:39:3b"
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: NAS-IP-Address = 10.43.1.2
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: NAS-Identifier =
"38-FF-36-C2-33-69"
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Called-Station-Id :=
"38:ff:36:c2:33:69:eduroam"
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Event-Timestamp = "Jun 6
2018 10:17:11 WIB"
(79) Wed Jun 6 10:17:11 2018: Debug: Virtual server packetfence-tunnel
received request
(79) Wed Jun 6 10:17:11 2018: Debug: EAP-Message = 0x020800061a03
(79) Wed Jun 6 10:17:11 2018: Debug: FreeRADIUS-Proxied-To = 127.0.0.1
(79) Wed Jun 6 10:17:11 2018: Debug: User-Name = "ae...@xyz.edu"
(79) Wed Jun 6 10:17:11 2018: Debug: State =
0xaddf81e0acd79b2f2f0623373d293571
(79) Wed Jun 6 10:17:11 2018: Debug: Calling-Station-Id :=
"64:cc:2e:4f:39:3b"
(79) Wed Jun 6 10:17:11 2018: Debug: NAS-IP-Address = 10.43.1.2
(79) Wed Jun 6 10:17:11 2018: Debug: NAS-Identifier = "38-FF-36-C2-33-69"
(79) Wed Jun 6 10:17:11 2018: Debug: Called-Station-Id :=
"38:ff:36:c2:33:69:eduroam"
(79) Wed Jun 6 10:17:11 2018: Debug: Event-Timestamp = "Jun 6 2018 10:17:11
WIB"
(79) Wed Jun 6 10:17:11 2018: WARNING: Outer and inner identities are the
same. User privacy is compromised.
(79) Wed Jun 6 10:17:11 2018: Debug: server packetfence-tunnel {
(79) Wed Jun 6 10:17:11 2018: Debug: session-state: No cached attributes
(79) Wed Jun 6 10:17:11 2018: Debug: # Executing section authorize from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(79) Wed Jun 6 10:17:11 2018: Debug: authorize {
(79) Wed Jun 6 10:17:11 2018: Debug: policy filter_username {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name) -> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ / /) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ / /) -> FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@[^@]*@/ )
-> FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.\./ ) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.\./ ) ->
FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) {
(79) Wed Jun 6 10:17:11 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.$/) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.$/) ->
FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@\./) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@\./) ->
FALSE
(79) Wed Jun 6 10:17:11 2018: Debug: } # if (&User-Name) = notfound
(79) Wed Jun 6 10:17:11 2018: Debug: } # policy filter_username =
notfound
(79) Wed Jun 6 10:17:11 2018: Debug: [mschap] = noop
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Checking for suffix after "@"
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Looking up realm "xyz.edu" for
User-Name = "ae...@xyz.edu"
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Found realm "xyz.edu"
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Adding Stripped-User-Name =
"aegis"
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Adding Realm = "xyz.edu"
(79) Wed Jun 6 10:17:11 2018: Debug: suffix: Authentication realm is LOCAL
(79) Wed Jun 6 10:17:11 2018: Debug: [suffix] = ok
(79) Wed Jun 6 10:17:11 2018: Debug: ntdomain: Request already has destination
realm set. Ignoring
(79) Wed Jun 6 10:17:11 2018: Debug: [ntdomain] = noop
(79) Wed Jun 6 10:17:11 2018: Debug: update control {
(79) Wed Jun 6 10:17:11 2018: Debug: } # update control = noop
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Peer sent EAP Response (code 2) ID 8
length 6
(79) Wed Jun 6 10:17:11 2018: Debug: eap: No EAP Start, assuming it's an
on-going EAP conversation
(79) Wed Jun 6 10:17:11 2018: Debug: [eap] = updated
(79) Wed Jun 6 10:17:11 2018: Debug: policy rewrite_called_station_id {
(79) Wed Jun 6 10:17:11 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(79) Wed Jun 6 10:17:11 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(79) Wed Jun 6 10:17:11 2018: Debug: update request {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(79) Wed Jun 6 10:17:11 2018: Debug: --> 38:ff:36:c2:33:69
(79) Wed Jun 6 10:17:11 2018: Debug: } # update request = noop
(79) Wed Jun 6 10:17:11 2018: Debug: if ("%{8}") {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{8}
(79) Wed Jun 6 10:17:11 2018: Debug: --> eduroam
(79) Wed Jun 6 10:17:11 2018: Debug: if ("%{8}") -> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if ("%{8}") {
(79) Wed Jun 6 10:17:11 2018: Debug: update request {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND
%{Called-Station-Id}:%{8}
(79) Wed Jun 6 10:17:11 2018: Debug: -->
38:ff:36:c2:33:69:eduroam
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{8}
(79) Wed Jun 6 10:17:11 2018: Debug: --> eduroam
(79) Wed Jun 6 10:17:11 2018: Debug: } # update request = noop
(79) Wed Jun 6 10:17:11 2018: Debug: } # if ("%{8}") = noop
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(79) Wed Jun 6 10:17:11 2018: Debug: [updated] = updated
(79) Wed Jun 6 10:17:11 2018: Debug: } # if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
= updated
(79) Wed Jun 6 10:17:11 2018: Debug: ... skipping else: Preceding "if"
was taken
(79) Wed Jun 6 10:17:11 2018: Debug: } # policy
rewrite_called_station_id = updated
(79) Wed Jun 6 10:17:11 2018: Debug: ldap: EXPAND
(&(uid=%{%{Stripped-User-Name}:-%{User-Name}})(!(itbStatus=Blocked))(itbProxyStatus=TRUE)(&(|(!(itbStatus=Alumni))(&(itbStatus=Alumni)(|(itbStatus=Dosen)(itbStatus=Karyawan)(itbStatus=Peneliti))))))
(79) Wed Jun 6 10:17:11 2018: Debug: ldap: -->
(&(uid=aegis)(!(itbStatus=Blocked))(itbProxyStatus=TRUE)(&(|(!(itbStatus=Alumni))(&(itbStatus=Alumni)(|(itbStatus=Dosen)(itbStatus=Karyawan)(itbStatus=Peneliti))))))
(79) Wed Jun 6 10:17:11 2018: Debug: ldap: Performing search in
"ou=people,dc=itb,dc=ac,dc=id" with filter
"(&(uid=aegis)(!(itbStatus=Blocked))(itbProxyStatus=TRUE)(&(|(!(itbStatus=Alumni))(&(itbStatus=Alumni)(|(itbStatus=Dosen)(itbStatus=Karyawan)(itbStatus=Peneliti))))))",
scope "sub"
(79) Wed Jun 6 10:17:11 2018: Debug: ldap: Waiting for search result...
(79) Wed Jun 6 10:17:11 2018: Debug: ldap: User object found at DN
"uid=aegis,ou=people,dc=itb,dc=ac,dc=id"
(79) Wed Jun 6 10:17:11 2018: Debug: ldap: Processing user attributes
(79) Wed Jun 6 10:17:11 2018: Debug: [ldap] = updated
(79) Wed Jun 6 10:17:11 2018: Debug: if (updated) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (updated) -> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if (updated) {
(79) Wed Jun 6 10:17:11 2018: Debug: update control {
(79) Wed Jun 6 10:17:11 2018: Debug: } # update control = noop
(79) Wed Jun 6 10:17:11 2018: Debug: } # if (updated) = noop
(79) Wed Jun 6 10:17:11 2018: Debug: pap: Converted:
&control:Password-With-Header -> &control:SSHA1-Password
(79) Wed Jun 6 10:17:11 2018: Debug: pap: Removing
&control:Password-With-Header
(79) Wed Jun 6 10:17:11 2018: Debug: pap: No {...} in Password-With-Header,
re-writing to Cleartext-Password
(79) Wed Jun 6 10:17:11 2018: Debug: pap: Removing
&control:Password-With-Header
(79) Wed Jun 6 10:17:11 2018: Debug: pap: Normalizing SSHA1-Password from
base64 encoding, 32 bytes -> 24 bytes
(79) Wed Jun 6 10:17:11 2018: WARNING: pap: Auth-Type already set. Not
setting to PAP
(79) Wed Jun 6 10:17:11 2018: Debug: [pap] = noop
(79) Wed Jun 6 10:17:11 2018: Debug: } # authorize = updated
(79) Wed Jun 6 10:17:11 2018: WARNING: You set Proxy-To-Realm = local, but
it is a LOCAL realm! Cancelling proxy request.
(79) Wed Jun 6 10:17:11 2018: Debug: Found Auth-Type = eap
(79) Wed Jun 6 10:17:11 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(79) Wed Jun 6 10:17:11 2018: Debug: authenticate {
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Expiring EAP session with state
0xaddf81e0acd79b2f
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Finished EAP session with state
0xaddf81e0acd79b2f
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Previous EAP request found for state
0xaddf81e0acd79b2f, released from the list
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Peer sent packet with method EAP
MSCHAPv2 (26)
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Calling submodule eap_mschapv2 to
process data
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Sending EAP Success (code 3) ID 8
length 4
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Freeing handler
(79) Wed Jun 6 10:17:11 2018: Debug: [eap] = ok
(79) Wed Jun 6 10:17:11 2018: Debug: } # authenticate = ok
(79) Wed Jun 6 10:17:11 2018: Debug: # Executing section post-auth from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(79) Wed Jun 6 10:17:11 2018: Debug: post-auth {
(79) Wed Jun 6 10:17:11 2018: Debug: policy packetfence-set-tenant-id {
(79) Wed Jun 6 10:17:11 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(79) Wed Jun 6 10:17:11 2018: Debug: --> 0
(79) Wed Jun 6 10:17:11 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(79) Wed Jun 6 10:17:11 2018: Debug: update control {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{User-Name}
(79) Wed Jun 6 10:17:11 2018: Debug: --> ae...@xyz.edu
(79) Wed Jun 6 10:17:11 2018: Debug: SQL-User-Name set to
'ae...@xyz.edu'
(79) Wed Jun 6 10:17:11 2018: Debug: Executing select query:
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'103.220.23.60'), 0)
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'%{Packet-Src-IP-Address}'), 0)}
(79) Wed Jun 6 10:17:11 2018: Debug: --> 0
(79) Wed Jun 6 10:17:11 2018: Debug: } # update control = noop
(79) Wed Jun 6 10:17:11 2018: Debug: } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
(79) Wed Jun 6 10:17:11 2018: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(79) Wed Jun 6 10:17:11 2018: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(79) Wed Jun 6 10:17:11 2018: Debug: update control {
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{User-Name}
(79) Wed Jun 6 10:17:11 2018: Debug: --> ae...@xyz.edu
(79) Wed Jun 6 10:17:11 2018: Debug: SQL-User-Name set to
'ae...@xyz.edu'
(79) Wed Jun 6 10:17:11 2018: Debug: Executing select query:
SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <=
INET_ATON('103.220.23.60') and INET_ATON('103.220.23.60') <= end_ip order by
range_length limit 1), 1)
(79) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <=
INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}')
<= end_ip order by range_length limit 1), 1)}
(79) Wed Jun 6 10:17:11 2018: Debug: --> 1
(79) Wed Jun 6 10:17:11 2018: Debug: } # update control = noop
(79) Wed Jun 6 10:17:11 2018: Debug: } # if (
&control:PacketFence-Tenant-Id == 0 ) = noop
(79) Wed Jun 6 10:17:11 2018: Debug: } # policy
packetfence-set-tenant-id = noop
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Expanding URI components
(79) Wed Jun 6 10:17:11 2018: Debug: rest: EXPAND http://127.0.0.1:7070
(79) Wed Jun 6 10:17:11 2018: Debug: rest: --> http://127.0.0.1:7070
(79) Wed Jun 6 10:17:11 2018: Debug: rest: EXPAND //radius/rest/authorize
(79) Wed Jun 6 10:17:11 2018: Debug: rest: --> //radius/rest/authorize
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Sending HTTP POST to
"http://127.0.0.1:7070//radius/rest/authorize"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute "User-Name"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute "NAS-IP-Address"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute "State"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute
"Called-Station-Id"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute
"Calling-Station-Id"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute "NAS-Identifier"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute "Event-Timestamp"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute "EAP-Message"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute
"FreeRADIUS-Proxied-To"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute "EAP-Type"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute
"Stripped-User-Name"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute "Realm"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute "SQL-User-Name"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Encoding attribute
"Called-Station-SSID"
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Processing response header
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Status : 401 (Unauthorized)
(79) Wed Jun 6 10:17:11 2018: Debug: rest: Type : json (application/json)
(79) Wed Jun 6 10:17:11 2018: ERROR: rest: Server returned:
(79) Wed Jun 6 10:17:11 2018: ERROR: rest: {"Reply-Message":"Network device
does not support this mode of
operation","control:PacketFence-Eap-Type":26,"control:PacketFence-Authorization-Status":"allow","control:PacketFence-Mac":"64:cc:2e:4f:39:3b","control:PacketFence-Switch-Ip-Address":"10.43.1.2","control:PacketFence-Request-Time":1528255031,"control:PacketFence-UserName":"ae...@xyz.edu","control:PacketFence-Connection-Type":"Ethernet-EAP","control:PacketFence-Switch-Mac":"38:ff:36:c2:33:69","control:PacketFence-Switch-Id":"10.43.1.2"}
(79) Wed Jun 6 10:17:11 2018: Debug: [rest] = invalid
(79) Wed Jun 6 10:17:11 2018: Debug: } # post-auth = invalid
(79) Wed Jun 6 10:17:11 2018: Debug: Using Post-Auth-Type Reject
(79) Wed Jun 6 10:17:11 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(79) Wed Jun 6 10:17:11 2018: Debug: Post-Auth-Type REJECT {
(79) Wed Jun 6 10:17:11 2018: Debug: update {
(79) Wed Jun 6 10:17:11 2018: Debug: } # update = noop
(79) Wed Jun 6 10:17:11 2018: Debug: policy packetfence-audit-log-reject
{
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name != "dummy") {
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name != "dummy") ->
TRUE
(79) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name != "dummy") {
(79) Wed Jun 6 10:17:11 2018: Debug: policy request-timing {
(79) Wed Jun 6 10:17:11 2018: Debug: if
(control:PacketFence-Request-Time != 0) {
(79) Wed Jun 6 10:17:11 2018: ERROR: Failed retrieving values
required to evaluate condition
(79) Wed Jun 6 10:17:11 2018: Debug: } # policy request-timing = noop
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: EXPAND type.reject.query
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: --> type.reject.query
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: Using query template 'query'
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: EXPAND %{User-Name}
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: --> ae...@xyz.edu
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: SQL-User-Name set to
'ae...@xyz.edu'
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: EXPAND INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile, source,
auto_reg, is_phone, pf_domain, uuid, radius_request,
radius_reply, request_time, tenant_id) VALUES (
'%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
'%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
'%{request:Stripped-User-Name}', '%{request:Realm}',
'Radius-Access-Request',
'%{%{control:PacketFence-Switch-Id}:-N/A}',
'%{%{control:PacketFence-Switch-Mac}:-N/A}',
'%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
'%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
'%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}',
'%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
'%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
'%{%{control:PacketFence-Connection-Type}:-N/A}',
'%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Reject',
'%{request:Module-Failure-Message}', '%{control:Auth-Type}',
'%{request:EAP-Type}', '%{%{control:PacketFence-Role}:-N/A}',
'%{%{control:PacketFence-Status}:-N/A}',
'%{%{control:PacketFence-Profile}:-N/A}',
'%{%{control:PacketFence-Source}:-N/A}',
'%{%{control:PacketFence-AutoReg}:-0}', '%{%{control:PacketFence-IsPhone}:-0}',
'%{request:PacketFence-Domain}', '',
'%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
'%{%{control:PacketFence-Request-Time}:-N/A}',
'%{control:PacketFence-Tenant-Id}')
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: --> INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile, source,
auto_reg, is_phone, pf_domain, uuid, radius_request,
radius_reply, request_time, tenant_id) VALUES (
'64:cc:2e:4f:39:3b', '', 'N/A', 'ae...@xyz.edu', 'aegis',
'xyz.edu', 'Radius-Access-Request', 'N/A', 'N/A', 'N/A',
'103.220.23.60', '38:ff:36:c2:33:69:eduroam', '64:cc:2e:4f:39:3b',
'', 'eduroam', '', 'N/A', '', 'N/A',
'10.43.1.2', '38-FF-36-C2-33-69', 'Reject', 'rest: Server
returned:', 'eap', 'MSCHAPv2', 'N/A', 'N/A', 'N/A',
'N/A', '0', '0', '', '', 'User-Name =3D =22ae...@xyz.edu=22=2C
NAS-IP-Address =3D 10.43.1.2=2C State =3D 0xaddf81e0acd79b2f2f0623373d293571=2C
Called-Station-Id =3D =2238:ff:36:c2:33:69:eduroam=22=2C Calling-Station-Id =3D
=2264:cc:2e:4f:39:3b=22=2C NAS-Identifier =3D =2238-FF-36-C2-33-69=22=2C
Event-Timestamp =3D =22Jun 6 2018 10:17:11 WIB=22=2C EAP-Message =3D
0x020800061a03=2C FreeRADIUS-Proxied-To =3D 127.0.0.1=2C EAP-Type =3D
MSCHAPv2=2C Stripped-User-Name =3D =22aegis=22=2C Realm =3D =22xyz.edu=22=2C
Called-Station-SSID =3D =22eduroam=22=2C Module-Failure-Message =3D =22rest:
Server returned:=22=2C Module-Failure-Message =3D =22rest:
=7B=5C=22Reply-Message=5C=22:=5C=22Network device does not support this mode of
operation=5C=22=2C=5C=22control:PacketFence-Eap-Type=5C=22:26=2C=5C=22control:PacketFence-Authorization-Status=5C=22:=5C=22allow=5C=22=2C=5C=22control:PacketFence-Mac=5C=22:=5C=2264:cc:2e:4f:39:3b=5C=22=2C=5C=22control:PacketFence-Switch-Ip-Address=5C=22:=5C=2210.43.1.2=5C=22=2C=5C=22control:PacketFence-Request-Time=5C=22:1528255031=2C=5C=22control:PacketFence-UserName=5C=22:=5C=22ae...@xyz.edu=5C=22=2C=5C=22control:PacketFence-Connection-Type=5C=22:=5C=22Ethernet-EAP=5C=22=2C=5C=22control:PacketFence-Switch-Mac=5C=22:=5C=2238:ff:36:c2:33:69=5C=22=2C=5C=22control:PacketFence-Switch-Id=5C=22:=5C=2210.43.1.2=5C=22=7D=22=2C
User-Password =3D =22=2A=2A=2A=2A=2A=2A=22=2C Module-Failure-Message =3D
=22Failed retrieving values required to evaluate condition=22=2C SQL-User-Name
=3D =22ae...@xyz.edu=22','MS-MPPE-Encryption-Policy =3D Encryption-Required=2C
MS-MPPE-Encryption-Types =3D 4=2C MS-MPPE-Send-Key =3D
0x46b2ca0b028ce59004fa83778d364c8c=2C MS-MPPE-Recv-Key =3D
0x45b6c0a1d769065ddd22b46c84982d80=2C EAP-Message =3D 0x03080004=2C
Message-Authenticator =3D 0x00000000000000000000000000000000=2C
Stripped-User-Name =3D =22aegis=22', 'N/A', '1')
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: Executing query: INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile, source,
auto_reg, is_phone, pf_domain, uuid, radius_request,
radius_reply, request_time, tenant_id) VALUES (
'64:cc:2e:4f:39:3b', '', 'N/A', 'ae...@xyz.edu', 'aegis',
'xyz.edu', 'Radius-Access-Request', 'N/A', 'N/A', 'N/A',
'103.220.23.60', '38:ff:36:c2:33:69:eduroam', '64:cc:2e:4f:39:3b',
'', 'eduroam', '', 'N/A', '', 'N/A',
'10.43.1.2', '38-FF-36-C2-33-69', 'Reject', 'rest: Server
returned:', 'eap', 'MSCHAPv2', 'N/A', 'N/A', 'N/A',
'N/A', '0', '0', '', '', 'User-Name =3D =22ae...@xyz.edu=22=2C
NAS-IP-Address =3D 10.43.1.2=2C State =3D 0xaddf81e0acd79b2f2f0623373d293571=2C
Called-Station-Id =3D =2238:ff:36:c2:33:69:eduroam=22=2C Calling-Station-Id =3D
=2264:cc:2e:4f:39:3b=22=2C NAS-Identifier =3D =2238-FF-36-C2-33-69=22=2C
Event-Timestamp =3D =22Jun 6 2018 10:17:11 WIB=22=2C EAP-Message =3D
0x020800061a03=2C FreeRADIUS-Proxied-To =3D 127.0.0.1=2C EAP-Type =3D
MSCHAPv2=2C Stripped-User-Name =3D =22aegis=22=2C Realm =3D =22xyz.edu=22=2C
Called-Station-SSID =3D =22eduroam=22=2C Module-Failure-Message =3D =22rest:
Server returned:=22=2C Module-Failure-Message =3D =22rest:
=7B=5C=22Reply-Message=5C=22:=5C=22Network device does not support this mode of
operation=5C=22=2C=5C=22control:PacketFence-Eap-Type=5C=22:26=2C=5C=22control:PacketFence-Authorization-Status=5C=22:=5C=22allow=5C=22=2C=5C=22control:PacketFence-Mac=5C=22:=5C=2264:cc:2e:4f:39:3b=5C=22=2C=5C=22control:PacketFence-Switch-Ip-Address=5C=22:=5C=2210.43.1.2=5C=22=2C=5C=22control:PacketFence-Request-Time=5C=22:1528255031=2C=5C=22control:PacketFence-UserName=5C=22:=5C=22ae...@xyz.edu=5C=22=2C=5C=22control:PacketFence-Connection-Type=5C=22:=5C=22Ethernet-EAP=5C=22=2C=5C=22control:PacketFence-Switch-Mac=5C=22:=5C=2238:ff:36:c2:33:69=5C=22=2C=5C=22control:PacketFence-Switch-Id=5C=22:=5C=2210.43.1.2=5C=22=7D=22=2C
User-Password =3D =22=2A=2A=2A=2A=2A=2A=22=2C Module-Failure-Message =3D
=22Failed retrieving values required to evaluate condition=22=2C SQL-User-Name
=3D =22ae...@xyz.edu=22','MS-MPPE-Encryption-Policy =3D Encryption-Required=2C
MS-MPPE-Encryption-Types =3D 4=2C MS-MPPE-Send-Key =3D
0x46b2ca0b028ce59004fa83778d364c8c=2C MS-MPPE-Recv-Key =3D
0x45b6c0a1d769065ddd22b46c84982d80=2C EAP-Message =3D 0x03080004=2C
Message-Authenticator =3D 0x00000000000000000000000000000000=2C
Stripped-User-Name =3D =22aegis=22', 'N/A', '1')
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: SQL query returned: success
(79) Wed Jun 6 10:17:11 2018: Debug: sql_reject: 1 record(s) updated
(79) Wed Jun 6 10:17:11 2018: Debug: [sql_reject] = ok
(79) Wed Jun 6 10:17:11 2018: Debug: } # if (&User-Name != "dummy") =
ok
(79) Wed Jun 6 10:17:11 2018: Debug: } # policy
packetfence-audit-log-reject = ok
(79) Wed Jun 6 10:17:11 2018: Debug: attr_filter.access_reject: EXPAND
%{User-Name}
(79) Wed Jun 6 10:17:11 2018: Debug: attr_filter.access_reject: -->
ae...@xyz.edu
(79) Wed Jun 6 10:17:11 2018: Debug: attr_filter.access_reject: Matched entry
DEFAULT at line 11
(79) Wed Jun 6 10:17:11 2018: Debug: [attr_filter.access_reject] =
updated
(79) Wed Jun 6 10:17:11 2018: Debug: update outer.session-state {
(79) Wed Jun 6 10:17:11 2018: Debug: } # update outer.session-state =
noop
(79) Wed Jun 6 10:17:11 2018: Debug: } # Post-Auth-Type REJECT = updated
(79) Wed Jun 6 10:17:11 2018: Debug: } # server packetfence-tunnel
(79) Wed Jun 6 10:17:11 2018: Debug: Virtual server sending reply
(79) Wed Jun 6 10:17:11 2018: Debug: EAP-Message = 0x03080004
(79) Wed Jun 6 10:17:11 2018: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Got tunneled reply code 3
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: EAP-Message = 0x03080004
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Message-Authenticator =
0x00000000000000000000000000000000
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Tunneled authentication was
rejected
(79) Wed Jun 6 10:17:11 2018: Debug: eap_peap: FAILURE
(79) Wed Jun 6 10:17:11 2018: Debug: eap: Sending EAP Request (code 1) ID 9
length 43
(79) Wed Jun 6 10:17:11 2018: Debug: eap: EAP session adding &reply:State =
0x70b0dfa878b9c6ef
(79) Wed Jun 6 10:17:11 2018: Debug: [eap] = handled
(79) Wed Jun 6 10:17:11 2018: Debug: } # authenticate = handled
(79) Wed Jun 6 10:17:11 2018: Debug: Using Post-Auth-Type Challenge
(79) Wed Jun 6 10:17:11 2018: Debug: Post-Auth-Type sub-section not found.
Ignoring.
(79) Wed Jun 6 10:17:11 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/eduroam
(79) Wed Jun 6 10:17:11 2018: Debug: session-state: Saving cached attributes
(79) Wed Jun 6 10:17:11 2018: Debug: Module-Failure-Message := "rest: Server
returned:"
(79) Wed Jun 6 10:17:11 2018: Debug: Sent Access-Challenge Id 232 from
10.10.59.25:11812 to 103.220.23.60:38600 length 0
(79) Wed Jun 6 10:17:11 2018: Debug: EAP-Message =
0x0109002b19001703010020ce6c6b26ad457bece93e8747d643d7bc259a65b7b1b848525552004db07dbb1d
(79) Wed Jun 6 10:17:11 2018: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(79) Wed Jun 6 10:17:11 2018: Debug: State =
0x70b0dfa878b9c6efcac40832d6116756
(79) Wed Jun 6 10:17:11 2018: Debug: Proxy-State = 0x3831
(79) Wed Jun 6 10:17:11 2018: Debug: Proxy-State = 0x3534
(79) Wed Jun 6 10:17:11 2018: Debug: Finished request
(80) Wed Jun 6 10:17:11 2018: Debug: Received Access-Request Id 215 from
103.220.23.60:38600 to 10.10.59.25:11812 length 197
(80) Wed Jun 6 10:17:11 2018: Debug: User-Name = "ae...@xyz.edu"
(80) Wed Jun 6 10:17:11 2018: Debug: Calling-Station-Id = "64-CC-2E-4F-39-3B"
(80) Wed Jun 6 10:17:11 2018: Debug: NAS-IP-Address = 10.43.1.2
(80) Wed Jun 6 10:17:11 2018: Debug: Called-Station-Id =
"38-FF-36-C2-33-69:eduroam"
(80) Wed Jun 6 10:17:11 2018: Debug: NAS-Identifier = "38-FF-36-C2-33-69"
(80) Wed Jun 6 10:17:11 2018: Debug: EAP-Message =
0x0209002b19001703010020772b440950bfd172fd554e5e3d16cc2c56f42405f1f347ea683bac0f62065b7b
(80) Wed Jun 6 10:17:11 2018: Debug: State =
0x70b0dfa878b9c6efcac40832d6116756
(80) Wed Jun 6 10:17:11 2018: Debug: Message-Authenticator =
0xf2e3aa7e8c541d12bf4268a60792ecdc
(80) Wed Jun 6 10:17:11 2018: Debug: Proxy-State = 0x3832
(80) Wed Jun 6 10:17:11 2018: Debug: Proxy-State = 0x3939
(80) Wed Jun 6 10:17:11 2018: Debug: Restoring &session-state
(80) Wed Jun 6 10:17:11 2018: Debug: &session-state:Module-Failure-Message
:= "rest: Server returned:"
(80) Wed Jun 6 10:17:11 2018: Debug: # Executing section authorize from file
/usr/local/pf/raddb/sites-enabled/eduroam
(80) Wed Jun 6 10:17:11 2018: Debug: authorize {
(80) Wed Jun 6 10:17:11 2018: Debug: update {
(80) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{Packet-Src-IP-Address}
(80) Wed Jun 6 10:17:11 2018: Debug: --> 103.220.23.60
(80) Wed Jun 6 10:17:11 2018: Debug: EXPAND %l
(80) Wed Jun 6 10:17:11 2018: Debug: --> 1528255031
(80) Wed Jun 6 10:17:11 2018: Debug: } # update = noop
(80) Wed Jun 6 10:17:11 2018: Debug: policy rewrite_calling_station_id {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(80) Wed Jun 6 10:17:11 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
-> TRUE
(80) Wed Jun 6 10:17:11 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(80) Wed Jun 6 10:17:11 2018: Debug: update request {
(80) Wed Jun 6 10:17:11 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(80) Wed Jun 6 10:17:11 2018: Debug: --> 64:cc:2e:4f:39:3b
(80) Wed Jun 6 10:17:11 2018: Debug: } # update request = noop
(80) Wed Jun 6 10:17:11 2018: Debug: [updated] = updated
(80) Wed Jun 6 10:17:11 2018: Debug: } # if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
= updated
(80) Wed Jun 6 10:17:11 2018: Debug: ... skipping else: Preceding "if"
was taken
(80) Wed Jun 6 10:17:11 2018: Debug: } # policy rewrite_calling_station_id
= updated
(80) Wed Jun 6 10:17:11 2018: Debug: policy rewrite_called_station_id {
(80) Wed Jun 6 10:17:11 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(80) Wed Jun 6 10:17:11 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> TRUE
(80) Wed Jun 6 10:17:11 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(80) Wed Jun 6 10:17:11 2018: Debug: update request {
(80) Wed Jun 6 10:17:11 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(80) Wed Jun 6 10:17:11 2018: Debug: --> 38:ff:36:c2:33:69
(80) Wed Jun 6 10:17:11 2018: Debug: } # update request = noop
(80) Wed Jun 6 10:17:11 2018: Debug: if ("%{8}") {
(80) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{8}
(80) Wed Jun 6 10:17:11 2018: Debug: --> eduroam
(80) Wed Jun 6 10:17:11 2018: Debug: if ("%{8}") -> TRUE
(80) Wed Jun 6 10:17:11 2018: Debug: if ("%{8}") {
(80) Wed Jun 6 10:17:11 2018: Debug: update request {
(80) Wed Jun 6 10:17:11 2018: Debug: EXPAND
%{Called-Station-Id}:%{8}
(80) Wed Jun 6 10:17:11 2018: Debug: -->
38:ff:36:c2:33:69:eduroam
(80) Wed Jun 6 10:17:11 2018: Debug: EXPAND %{8}
(80) Wed Jun 6 10:17:11 2018: Debug: --> eduroam
(80) Wed Jun 6 10:17:11 2018: Debug: } # update request = noop
(80) Wed Jun 6 10:17:11 2018: Debug: } # if ("%{8}") = noop
(80) Wed Jun 6 10:17:11 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(80) Wed Jun 6 10:17:11 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(80) Wed Jun 6 10:17:11 2018: Debug: ... skipping elsif: Preceding
"if" was taken
(80) Wed Jun 6 10:17:11 2018: Debug: [updated] = updated
(80) Wed Jun 6 10:17:11 2018: Debug: } # if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
= updated
(80) Wed Jun 6 10:17:11 2018: Debug: ... skipping else: Preceding "if"
was taken
(80) Wed Jun 6 10:17:11 2018: Debug: } # policy rewrite_called_station_id
= updated
(80) Wed Jun 6 10:17:11 2018: Debug: policy filter_username {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name) {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name) -> TRUE
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name) {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ / /) {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ / /) -> FALSE
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) ->
FALSE
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.\./ ) {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.\./ ) ->
FALSE
(80) Wed Jun 6 10:17:11 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) {
(80) Wed Jun 6 10:17:11 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.$/) {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /\.$/) ->
FALSE
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@\./) {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Name =~ /@\./) ->
FALSE
(80) Wed Jun 6 10:17:11 2018: Debug: } # if (&User-Name) = updated
(80) Wed Jun 6 10:17:11 2018: Debug: } # policy filter_username = updated
(80) Wed Jun 6 10:17:11 2018: Debug: policy filter_password {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) -> FALSE
(80) Wed Jun 6 10:17:11 2018: Debug: } # policy filter_password = updated
(80) Wed Jun 6 10:17:11 2018: Debug: [preprocess] = ok
(80) Wed Jun 6 10:17:11 2018: Debug: suffix: Checking for suffix after "@"
(80) Wed Jun 6 10:17:11 2018: Debug: suffix: Looking up realm "xyz.edu" for
User-Name = "ae...@xyz.edu"
(80) Wed Jun 6 10:17:11 2018: Debug: suffix: Found realm "xyz.edu"
(80) Wed Jun 6 10:17:11 2018: Debug: suffix: Adding Stripped-User-Name =
"aegis"
(80) Wed Jun 6 10:17:11 2018: Debug: suffix: Adding Realm = "xyz.edu"
(80) Wed Jun 6 10:17:11 2018: Debug: suffix: Authentication realm is LOCAL
(80) Wed Jun 6 10:17:11 2018: Debug: [suffix] = ok
(80) Wed Jun 6 10:17:11 2018: Debug: ntdomain: Request already has destination
realm set. Ignoring
(80) Wed Jun 6 10:17:11 2018: Debug: [ntdomain] = noop
(80) Wed Jun 6 10:17:11 2018: Debug: if (User-Name =~ /@/) {
(80) Wed Jun 6 10:17:11 2018: Debug: if (User-Name =~ /@/) -> TRUE
(80) Wed Jun 6 10:17:11 2018: Debug: if (User-Name =~ /@/) {
(80) Wed Jun 6 10:17:11 2018: Debug: if ( Realm == "xyz.edu" ) {
(80) Wed Jun 6 10:17:11 2018: Debug: if ( Realm == "xyz.edu" ) -> TRUE
(80) Wed Jun 6 10:17:11 2018: Debug: if ( Realm == "xyz.edu" ) {
(80) Wed Jun 6 10:17:11 2018: Debug: update control {
(80) Wed Jun 6 10:17:11 2018: Debug: } # update control = noop
(80) Wed Jun 6 10:17:11 2018: Debug: } # if ( Realm == "xyz.edu" ) =
noop
(80) Wed Jun 6 10:17:11 2018: Debug: ... skipping else: Preceding "if"
was taken
(80) Wed Jun 6 10:17:11 2018: Debug: } # if (User-Name =~ /@/) = noop
(80) Wed Jun 6 10:17:11 2018: Debug: ... skipping else: Preceding "if" was
taken
(80) Wed Jun 6 10:17:11 2018: Debug: eap: Peer sent EAP Response (code 2) ID 9
length 43
(80) Wed Jun 6 10:17:11 2018: Debug: eap: Continuing tunnel setup
(80) Wed Jun 6 10:17:11 2018: Debug: [eap] = ok
(80) Wed Jun 6 10:17:11 2018: Debug: } # authorize = ok
(80) Wed Jun 6 10:17:11 2018: WARNING: You set Proxy-To-Realm = default, but
it is a LOCAL realm! Cancelling proxy request.
(80) Wed Jun 6 10:17:11 2018: Debug: Found Auth-Type = eap
(80) Wed Jun 6 10:17:11 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/eduroam
(80) Wed Jun 6 10:17:11 2018: Debug: authenticate {
(80) Wed Jun 6 10:17:11 2018: Debug: eap: Expiring EAP session with state
0x70b0dfa878b9c6ef
(80) Wed Jun 6 10:17:11 2018: Debug: eap: Finished EAP session with state
0x70b0dfa878b9c6ef
(80) Wed Jun 6 10:17:11 2018: Debug: eap: Previous EAP request found for state
0x70b0dfa878b9c6ef, released from the list
(80) Wed Jun 6 10:17:11 2018: Debug: eap: Peer sent packet with method EAP
PEAP (25)
(80) Wed Jun 6 10:17:11 2018: Debug: eap: Calling submodule eap_peap to
process data
(80) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Continuing EAP-TLS
(80) Wed Jun 6 10:17:11 2018: Debug: eap_peap: [eaptls verify] = ok
(80) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Done initial handshake
(80) Wed Jun 6 10:17:11 2018: Debug: eap_peap: [eaptls process] = ok
(80) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Session established. Decoding
tunneled attributes
(80) Wed Jun 6 10:17:11 2018: Debug: eap_peap: PEAP state send tlv failure
(80) Wed Jun 6 10:17:11 2018: Debug: eap_peap: Received EAP-TLV response
(80) Wed Jun 6 10:17:11 2018: ERROR: eap_peap: The users session was
previously rejected: returning reject (again.)
(80) Wed Jun 6 10:17:11 2018: ERROR: eap: Failed continuing EAP PEAP (25)
session. EAP sub-module failed
(80) Wed Jun 6 10:17:11 2018: Debug: eap: Sending EAP Failure (code 4) ID 9
length 4
(80) Wed Jun 6 10:17:11 2018: Debug: eap: Failed in EAP select
(80) Wed Jun 6 10:17:11 2018: Debug: [eap] = invalid
(80) Wed Jun 6 10:17:11 2018: Debug: } # authenticate = invalid
(80) Wed Jun 6 10:17:11 2018: Debug: Failed to authenticate the user
(80) Wed Jun 6 10:17:11 2018: Debug: Using Post-Auth-Type Reject
(80) Wed Jun 6 10:17:11 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/eduroam
(80) Wed Jun 6 10:17:11 2018: Debug: Post-Auth-Type REJECT {
(80) Wed Jun 6 10:17:11 2018: Debug: policy request-timing {
(80) Wed Jun 6 10:17:11 2018: Debug: if
(control:PacketFence-Request-Time != 0) {
(80) Wed Jun 6 10:17:11 2018: Debug: if
(control:PacketFence-Request-Time != 0) -> FALSE
(80) Wed Jun 6 10:17:11 2018: Debug: } # policy request-timing = noop
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: EXPAND type.reject.query
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: --> type.reject.query
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: Using query template 'query'
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: EXPAND %{User-Name}
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: --> ae...@xyz.edu
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: SQL-User-Name set to
'ae...@xyz.edu'
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: EXPAND INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile, source,
auto_reg, is_phone, pf_domain, uuid, radius_request,
radius_reply, request_time, tenant_id) VALUES (
'%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
'%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
'%{request:Stripped-User-Name}', '%{request:Realm}',
'Radius-Access-Request',
'%{%{control:PacketFence-Switch-Id}:-N/A}',
'%{%{control:PacketFence-Switch-Mac}:-N/A}',
'%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
'%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
'%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}',
'%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
'%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
'%{%{control:PacketFence-Connection-Type}:-N/A}',
'%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Reject',
'%{request:Module-Failure-Message}', '%{control:Auth-Type}',
'%{request:EAP-Type}', '%{%{control:PacketFence-Role}:-N/A}',
'%{%{control:PacketFence-Status}:-N/A}',
'%{%{control:PacketFence-Profile}:-N/A}',
'%{%{control:PacketFence-Source}:-N/A}',
'%{%{control:PacketFence-AutoReg}:-0}', '%{%{control:PacketFence-IsPhone}:-0}',
'%{request:PacketFence-Domain}', '',
'%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
'%{%{control:PacketFence-Request-Time}:-N/A}',
'%{control:PacketFence-Tenant-Id}')
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: --> INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile, source,
auto_reg, is_phone, pf_domain, uuid, radius_request,
radius_reply, request_time, tenant_id) VALUES (
'64:cc:2e:4f:39:3b', '', 'N/A', 'ae...@xyz.edu', 'aegis',
'xyz.edu', 'Radius-Access-Request', 'N/A', 'N/A', 'N/A',
'103.220.23.60', '38:ff:36:c2:33:69:eduroam', '64:cc:2e:4f:39:3b',
'', 'eduroam', '', 'N/A', '', 'N/A',
'10.43.1.2', '38-FF-36-C2-33-69', 'Reject', 'eap_peap: The
users session was previously rejected: returning reject =28again.=29', 'eap',
'PEAP', 'N/A', 'N/A', 'N/A', 'N/A', '0', '0',
'', '', 'User-Name =3D =22ae...@xyz.edu=22=2C Calling-Station-Id =3D
=2264:cc:2e:4f:39:3b=22=2C NAS-IP-Address =3D 10.43.1.2=2C NAS-Identifier =3D
=2238-FF-36-C2-33-69=22=2C EAP-Message =3D
0x0209002b19001703010020772b440950bfd172fd554e5e3d16cc2c56f42405f1f347ea683bac0f62065b7b=2C
State =3D 0x70b0dfa878b9c6efcac40832d6116756=2C Message-Authenticator =3D
0xf2e3aa7e8c541d12bf4268a60792ecdc=2C Proxy-State =3D 0x3832=2C Proxy-State =3D
0x3939=2C FreeRADIUS-Client-IP-Address =3D 103.220.23.60=2C Called-Station-Id
=3D =2238:ff:36:c2:33:69:eduroam=22=2C Called-Station-SSID =3D =22eduroam=22=2C
Event-Timestamp =3D =22Jun 6 2018 10:17:11 WIB=22=2C Stripped-User-Name =3D
=22aegis=22=2C Realm =3D =22xyz.edu=22=2C EAP-Type =3D PEAP=2C
Module-Failure-Message =3D =22eap_peap: The users session was previously
rejected: returning reject =28again.=29=22=2C Module-Failure-Message =3D
=22eap: Failed continuing EAP PEAP =2825=29 session. EAP sub-module
failed=22=2C SQL-User-Name =3D =22ae...@xyz.edu=22','EAP-Message =3D
0x04090004=2C Message-Authenticator =3D 0x00000000000000000000000000000000=2C
Proxy-State =3D 0x3832=2C Proxy-State =3D 0x3939', '0', '')
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: Executing query: INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile, source,
auto_reg, is_phone, pf_domain, uuid, radius_request,
radius_reply, request_time, tenant_id) VALUES (
'64:cc:2e:4f:39:3b', '', 'N/A', 'ae...@xyz.edu', 'aegis',
'xyz.edu', 'Radius-Access-Request', 'N/A', 'N/A', 'N/A',
'103.220.23.60', '38:ff:36:c2:33:69:eduroam', '64:cc:2e:4f:39:3b',
'', 'eduroam', '', 'N/A', '', 'N/A',
'10.43.1.2', '38-FF-36-C2-33-69', 'Reject', 'eap_peap: The
users session was previously rejected: returning reject =28again.=29', 'eap',
'PEAP', 'N/A', 'N/A', 'N/A', 'N/A', '0', '0',
'', '', 'User-Name =3D =22ae...@xyz.edu=22=2C Calling-Station-Id =3D
=2264:cc:2e:4f:39:3b=22=2C NAS-IP-Address =3D 10.43.1.2=2C NAS-Identifier =3D
=2238-FF-36-C2-33-69=22=2C EAP-Message =3D
0x0209002b19001703010020772b440950bfd172fd554e5e3d16cc2c56f42405f1f347ea683bac0f62065b7b=2C
State =3D 0x70b0dfa878b9c6efcac40832d6116756=2C Message-Authenticator =3D
0xf2e3aa7e8c541d12bf4268a60792ecdc=2C Proxy-State =3D 0x3832=2C Proxy-State =3D
0x3939=2C FreeRADIUS-Client-IP-Address =3D 103.220.23.60=2C Called-Station-Id
=3D =2238:ff:36:c2:33:69:eduroam=22=2C Called-Station-SSID =3D =22eduroam=22=2C
Event-Timestamp =3D =22Jun 6 2018 10:17:11 WIB=22=2C Stripped-User-Name =3D
=22aegis=22=2C Realm =3D =22xyz.edu=22=2C EAP-Type =3D PEAP=2C
Module-Failure-Message =3D =22eap_peap: The users session was previously
rejected: returning reject =28again.=29=22=2C Module-Failure-Message =3D
=22eap: Failed continuing EAP PEAP =2825=29 session. EAP sub-module
failed=22=2C SQL-User-Name =3D =22ae...@xyz.edu=22','EAP-Message =3D
0x04090004=2C Message-Authenticator =3D 0x00000000000000000000000000000000=2C
Proxy-State =3D 0x3832=2C Proxy-State =3D 0x3939', '0', '')
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: SQL query returned: success
(80) Wed Jun 6 10:17:11 2018: Debug: sql_reject: 1 record(s) updated
(80) Wed Jun 6 10:17:11 2018: Debug: [sql_reject] = ok
(80) Wed Jun 6 10:17:11 2018: Debug: attr_filter.access_reject: EXPAND
%{User-Name}
(80) Wed Jun 6 10:17:11 2018: Debug: attr_filter.access_reject: -->
ae...@xyz.edu
(80) Wed Jun 6 10:17:11 2018: Debug: attr_filter.access_reject: Matched entry
DEFAULT at line 11
(80) Wed Jun 6 10:17:11 2018: Debug: [attr_filter.access_reject] = updated
(80) Wed Jun 6 10:17:11 2018: Debug: attr_filter.packetfence_post_auth: EXPAND
%{User-Name}
(80) Wed Jun 6 10:17:11 2018: Debug: attr_filter.packetfence_post_auth: -->
ae...@xyz.edu
(80) Wed Jun 6 10:17:11 2018: Debug: attr_filter.packetfence_post_auth:
Matched entry DEFAULT at line 10
(80) Wed Jun 6 10:17:11 2018: Debug: [attr_filter.packetfence_post_auth] =
updated
(80) Wed Jun 6 10:17:11 2018: Debug: [eap] = noop
(80) Wed Jun 6 10:17:11 2018: Debug: policy remove_reply_message_if_eap {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&reply:EAP-Message &&
&reply:Reply-Message) {
(80) Wed Jun 6 10:17:11 2018: Debug: if (&reply:EAP-Message &&
&reply:Reply-Message) -> FALSE
(80) Wed Jun 6 10:17:11 2018: Debug: else {
(80) Wed Jun 6 10:17:11 2018: Debug: [noop] = noop
(80) Wed Jun 6 10:17:11 2018: Debug: } # else = noop
(80) Wed Jun 6 10:17:11 2018: Debug: } # policy
remove_reply_message_if_eap = noop
(80) Wed Jun 6 10:17:11 2018: Debug: linelog: EXPAND
messages.%{%{reply:Packet-Type}:-default}
(80) Wed Jun 6 10:17:11 2018: Debug: linelog: --> messages.Access-Reject
(80) Wed Jun 6 10:17:11 2018: Debug: linelog: EXPAND
[mac:%{Calling-Station-Id}] Rejected user: %{User-Name}
(80) Wed Jun 6 10:17:11 2018: Debug: linelog: --> [mac:64:cc:2e:4f:39:3b]
Rejected user: ae...@xyz.edu
(80) Wed Jun 6 10:17:11 2018: Debug: [linelog] = ok
(80) Wed Jun 6 10:17:11 2018: Debug: } # Post-Auth-Type REJECT = updated
(80) Wed Jun 6 10:17:11 2018: Debug: Delaying response for 1.000000 seconds
(80) Wed Jun 6 10:17:12 2018: Debug: Sending delayed response
(80) Wed Jun 6 10:17:12 2018: Debug: Sent Access-Reject Id 215 from
10.10.59.25:11812 to 103.220.23.60:38600 length 52
(80) Wed Jun 6 10:17:12 2018: Debug: EAP-Message = 0x04090004
(80) Wed Jun 6 10:17:12 2018: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(80) Wed Jun 6 10:17:12 2018: Debug: Proxy-State = 0x3832
(80) Wed Jun 6 10:17:12 2018: Debug: Proxy-State = 0x3939
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users