Hello all, I'm trying to get a Cumulus Linux switch to CLI authenticate to PacketFence, and unable to figure out the root cause of the username auth failure.
I've got switches defined in PacketFence, and they successfully work for 802.1x RADIUS authentication. I've defined them as Cisco 2960s, though I've tried other switch types just to test. I've made sure to toggle the flag `CLI Access Enabled`. I'm using a local database of users only. This is a simple lab test. I've got a user `test-radius` defined, with Access Level to ALL. I'm using plaintext passwords. Supported EAP Authentication Methods are MD5, MSCHAPv2 and PEAP. I've searched through archives, and not been able to figure out what's the key line in the debugging info below that I should focus on. Any suggestions would be very helpful! Config and debugging info below: Config of RADIUS on the Cumulus switch done as per docs: https://docs.cumulusnetworks.com/cumulus-linux-41/System-Configuration/Authentication-Authorization-and-Accounting/RADIUS-AAA/ There's little config on the cumulus side: /etc/pam_radius_auth.conf mapped_priv_user radius_priv_user # server[:port] shared_secret timeout (secs) src_ip 192.168.200.252 cumulus # when mgmt vrf is in use vrf-name mgmt Tcpdump from switch showing outgoing RADIUS auth request: 15:28:15.340201 IP (tos 0x0, ttl 64, id 14880, offset 0, flags [DF], proto UDP (17), length 124) closet04.57381 > packetfence.radius: [udp sum ok] RADIUS, length: 96 Access-Request (1), id: 0x61, Authenticator: f226ecd0bb0321d52e139756c9ba1366 User-Name Attribute (1), length: 13, Value: test-radius 0x0000: 7465 7374 2d72 6164 6975 73 User-Password Attribute (2), length: 18, Value: 0x0000: 5bf5 b7a5 18e1 89f5 362c cf53 3205 92a1 NAS-IP-Address Attribute (4), length: 6, Value: closet04 0x0000: 7f00 0101 NAS-Identifier Attribute (32), length: 6, Value: sshd 0x0000: 7373 6864 NAS-Port Attribute (5), length: 6, Value: 10130 0x0000: 0000 2792 NAS-Port-Type Attribute (61), length: 6, Value: Virtual 0x0000: 0000 0005 Service-Type Attribute (6), length: 6, Value: Authenticate Only 0x0000: 0000 0008 Calling-Station-Id Attribute (31), length: 15, Value: 192.168.200.1 0x0000: 3139 322e 3136 382e 3230 302e 31 15:28:16.472830 IP (tos 0x0, ttl 64, id 146, offset 0, flags [none], proto UDP (17), length 48) packetfence.radius > closet04.57381: [udp sum ok] RADIUS, length: 20 Access-Reject (3), id: 0x61, Authenticator: 53558faff1296f5f2531b72e4be237bd PacketFence RADIUS Debugging Info: root@packetfence:/usr/local/pf# raddebug -f var/run/radiusd.sock -t 300 (4) Mon Apr 20 15:28:15 2020: Debug: Received Status-Server Id 166 from 127.0.0.1:60738 to 127.0.0.1:18121 length 50 (4) Mon Apr 20 15:28:15 2020: Debug: Message-Authenticator = 0xd61e4bf3e9ef1fe37b8bd6833281f4ff (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Statistics-Type = 15 (4) Mon Apr 20 15:28:15 2020: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/status (4) Mon Apr 20 15:28:15 2020: Debug: Autz-Type Status-Server { (4) Mon Apr 20 15:28:15 2020: Debug: [ok] = ok (4) Mon Apr 20 15:28:15 2020: Debug: } # Autz-Type Status-Server = ok (4) Mon Apr 20 15:28:15 2020: Debug: Sent Access-Accept Id 166 from 127.0.0.1:18121 to 127.0.0.1:60738 length 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Access-Requests = 5 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Access-Accepts = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Access-Rejects = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Access-Challenges = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Auth-Responses = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Auth-Duplicate-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Auth-Malformed-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Auth-Invalid-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Auth-Dropped-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Auth-Unknown-Types = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Accounting-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Accounting-Responses = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Acct-Duplicate-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Acct-Malformed-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Acct-Invalid-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Acct-Dropped-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Acct-Unknown-Types = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Access-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Access-Accepts = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Access-Rejects = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Access-Challenges = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Auth-Responses = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Accounting-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Accounting-Responses = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 (4) Mon Apr 20 15:28:15 2020: Debug: FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 (4) Mon Apr 20 15:28:15 2020: Debug: Finished request (5) Mon Apr 20 15:28:15 2020: Debug: Received Access-Request Id 97 from 192.168.200.34:57381 to 192.168.200.252:1812 length 96 (5) Mon Apr 20 15:28:15 2020: Debug: User-Name = "test-radius" (5) Mon Apr 20 15:28:15 2020: Debug: User-Password = "cumulus" (5) Mon Apr 20 15:28:15 2020: Debug: NAS-IP-Address = 127.0.1.1 (5) Mon Apr 20 15:28:15 2020: Debug: NAS-Identifier = "sshd" (5) Mon Apr 20 15:28:15 2020: Debug: NAS-Port = 10130 (5) Mon Apr 20 15:28:15 2020: Debug: NAS-Port-Type = Virtual (5) Mon Apr 20 15:28:15 2020: Debug: Service-Type = Authenticate-Only (5) Mon Apr 20 15:28:15 2020: Debug: Calling-Station-Id = "192.168.200.1" (5) Mon Apr 20 15:28:15 2020: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence (5) Mon Apr 20 15:28:15 2020: Debug: authorize { (5) Mon Apr 20 15:28:15 2020: Debug: update { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{Packet-Src-IP-Address} (5) Mon Apr 20 15:28:15 2020: Debug: --> 192.168.200.34 (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{Packet-Dst-IP-Address} (5) Mon Apr 20 15:28:15 2020: Debug: --> 192.168.200.252 (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %l (5) Mon Apr 20 15:28:15 2020: Debug: --> 1587396495 (5) Mon Apr 20 15:28:15 2020: Debug: } # update = noop (5) Mon Apr 20 15:28:15 2020: Debug: policy packetfence-set-realm-if-machine { (5) Mon Apr 20 15:28:15 2020: Debug: if (User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i) { (5) Mon Apr 20 15:28:15 2020: Debug: if (User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: } # policy packetfence-set-realm-if-machine = noop (5) Mon Apr 20 15:28:15 2020: Debug: policy packetfence-balanced-key-policy { (5) Mon Apr 20 15:28:15 2020: Debug: if (&PacketFence-KeyBalanced && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&PacketFence-KeyBalanced && (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: else { (5) Mon Apr 20 15:28:15 2020: Debug: update { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{md5:%{Calling-Station-Id}%{User-Name}} (5) Mon Apr 20 15:28:15 2020: Debug: --> fb4172cb9cf644e1d3d9f75872bdf56d (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{md5:%{Calling-Station-Id}%{User-Name}} (5) Mon Apr 20 15:28:15 2020: Debug: --> fb4172cb9cf644e1d3d9f75872bdf56d (5) Mon Apr 20 15:28:15 2020: Debug: } # update = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # else = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # policy packetfence-balanced-key-policy = noop (5) Mon Apr 20 15:28:15 2020: Debug: policy packetfence-set-tenant-id { (5) Mon Apr 20 15:28:15 2020: Debug: if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){ (5) Mon Apr 20 15:28:15 2020: Debug: if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0} (5) Mon Apr 20 15:28:15 2020: Debug: --> 0 (5) Mon Apr 20 15:28:15 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE (5) Mon Apr 20 15:28:15 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { (5) Mon Apr 20 15:28:15 2020: Debug: update control { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{User-Name} (5) Mon Apr 20 15:28:15 2020: Debug: --> test-radius (5) Mon Apr 20 15:28:15 2020: Debug: SQL-User-Name set to 'test-radius' (5) Mon Apr 20 15:28:15 2020: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '127.0.1.1'), 0) (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{NAS-IP-Address}'), 0)} (5) Mon Apr 20 15:28:15 2020: Debug: --> 0 (5) Mon Apr 20 15:28:15 2020: Debug: } # update control = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop (5) Mon Apr 20 15:28:15 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) { (5) Mon Apr 20 15:28:15 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE (5) Mon Apr 20 15:28:15 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) { (5) Mon Apr 20 15:28:15 2020: Debug: update control { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{User-Name} (5) Mon Apr 20 15:28:15 2020: Debug: --> test-radius (5) Mon Apr 20 15:28:15 2020: Debug: SQL-User-Name set to 'test-radius' (5) Mon Apr 20 15:28:15 2020: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('127.0.1.1') and INET_ATON('127.0.1.1') <= end_ip order by range_length limit 1), 1) (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{NAS-IP-Address}') and INET_ATON('%{NAS-IP-Address}') <= end_ip order by range_length limit 1), 1)} (5) Mon Apr 20 15:28:15 2020: Debug: --> 1 (5) Mon Apr 20 15:28:15 2020: Debug: } # update control = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # policy packetfence-set-tenant-id = noop (5) Mon Apr 20 15:28:15 2020: Debug: policy rewrite_calling_station_id { (5) Mon Apr 20 15:28:15 2020: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: else { (5) Mon Apr 20 15:28:15 2020: Debug: [noop] = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # else = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # policy rewrite_calling_station_id = noop (5) Mon Apr 20 15:28:15 2020: Debug: policy rewrite_called_station_id { (5) Mon Apr 20 15:28:15 2020: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) { (5) Mon Apr 20 15:28:15 2020: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: else { (5) Mon Apr 20 15:28:15 2020: Debug: [noop] = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # else = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # policy rewrite_called_station_id = noop (5) Mon Apr 20 15:28:15 2020: Debug: policy filter_username { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name) -> TRUE (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name =~ / /) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name =~ / /) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name =~ /@[^@]*@/ ) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name =~ /\.\./ ) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name =~ /\.\./ ) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (5) Mon Apr 20 15:28:15 2020: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name =~ /\.$/) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name =~ /\.$/) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name =~ /@\./) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name =~ /@\./) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: } # if (&User-Name) = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # policy filter_username = noop (5) Mon Apr 20 15:28:15 2020: Debug: policy filter_password { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{string:User-Password} (5) Mon Apr 20 15:28:15 2020: Debug: --> cumulus (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: } # policy filter_password = noop (5) Mon Apr 20 15:28:15 2020: Debug: [preprocess] = ok (5) Mon Apr 20 15:28:15 2020: Debug: suffix: Checking for suffix after "@" (5) Mon Apr 20 15:28:15 2020: Debug: suffix: No '@' in User-Name = "test-radius", skipping NULL due to config. (5) Mon Apr 20 15:28:15 2020: Debug: [suffix] = noop (5) Mon Apr 20 15:28:15 2020: Debug: ntdomain: Checking for prefix before "\" (5) Mon Apr 20 15:28:15 2020: Debug: ntdomain: No '\' in User-Name = "test-radius", looking up realm NULL (5) Mon Apr 20 15:28:15 2020: Debug: ntdomain: Found realm "null" (5) Mon Apr 20 15:28:15 2020: Debug: ntdomain: Adding Stripped-User-Name = "test-radius" (5) Mon Apr 20 15:28:15 2020: Debug: ntdomain: Adding Realm = "null" (5) Mon Apr 20 15:28:15 2020: Debug: ntdomain: Authentication realm is LOCAL (5) Mon Apr 20 15:28:15 2020: Debug: [ntdomain] = ok (5) Mon Apr 20 15:28:15 2020: Debug: eap: No EAP-Message, not doing EAP (5) Mon Apr 20 15:28:15 2020: Debug: [eap] = noop (5) Mon Apr 20 15:28:15 2020: Debug: if ( !EAP-Message ) { (5) Mon Apr 20 15:28:15 2020: Debug: if ( !EAP-Message ) -> TRUE (5) Mon Apr 20 15:28:15 2020: Debug: if ( !EAP-Message ) { (5) Mon Apr 20 15:28:15 2020: Debug: update { (5) Mon Apr 20 15:28:15 2020: Debug: } # update = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # if ( !EAP-Message ) = noop (5) Mon Apr 20 15:28:15 2020: Debug: policy packetfence-eap-mac-policy { (5) Mon Apr 20 15:28:15 2020: Debug: if ( &EAP-Type ) { (5) Mon Apr 20 15:28:15 2020: Debug: if ( &EAP-Type ) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: [noop] = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # policy packetfence-eap-mac-policy = noop (5) Mon Apr 20 15:28:15 2020: WARNING: pap: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! (5) Mon Apr 20 15:28:15 2020: WARNING: pap: !!! Ignoring control:User-Password. Update your !!! (5) Mon Apr 20 15:28:15 2020: WARNING: pap: !!! configuration so that the "known good" clear text !!! (5) Mon Apr 20 15:28:15 2020: WARNING: pap: !!! password is in Cleartext-Password and NOT in !!! (5) Mon Apr 20 15:28:15 2020: WARNING: pap: !!! User-Password. !!! (5) Mon Apr 20 15:28:15 2020: WARNING: pap: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! (5) Mon Apr 20 15:28:15 2020: WARNING: pap: Auth-Type already set. Not setting to PAP (5) Mon Apr 20 15:28:15 2020: Debug: [pap] = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # authorize = ok (5) Mon Apr 20 15:28:15 2020: Debug: Found Auth-Type = Accept (5) Mon Apr 20 15:28:15 2020: Debug: Auth-Type = Accept, accepting the user (5) Mon Apr 20 15:28:15 2020: Debug: # Executing section post-auth from file /usr/local/pf/raddb/sites-enabled/packetfence (5) Mon Apr 20 15:28:15 2020: Debug: post-auth { (5) Mon Apr 20 15:28:15 2020: Debug: update { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{Packet-Src-IP-Address} (5) Mon Apr 20 15:28:15 2020: Debug: --> 192.168.200.34 (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{Packet-Dst-IP-Address} (5) Mon Apr 20 15:28:15 2020: Debug: --> 192.168.200.252 (5) Mon Apr 20 15:28:15 2020: Debug: } # update = noop (5) Mon Apr 20 15:28:15 2020: Debug: policy packetfence-set-tenant-id { (5) Mon Apr 20 15:28:15 2020: Debug: if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){ (5) Mon Apr 20 15:28:15 2020: Debug: if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0} (5) Mon Apr 20 15:28:15 2020: Debug: --> 1 (5) Mon Apr 20 15:28:15 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) { (5) Mon Apr 20 15:28:15 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: } # policy packetfence-set-tenant-id = noop (5) Mon Apr 20 15:28:15 2020: Debug: if ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{%{control:PacketFence-Proxied-From}:-False} (5) Mon Apr 20 15:28:15 2020: Debug: --> False (5) Mon Apr 20 15:28:15 2020: Debug: if ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) { (5) Mon Apr 20 15:28:15 2020: Debug: if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) -> TRUE (5) Mon Apr 20 15:28:15 2020: Debug: if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) { (5) Mon Apr 20 15:28:15 2020: Debug: rest: Expanding URI components (5) Mon Apr 20 15:28:15 2020: Debug: rest: EXPAND http://127.0.0.1:7070 (5) Mon Apr 20 15:28:15 2020: Debug: rest: --> http://127.0.0.1:7070 (5) Mon Apr 20 15:28:15 2020: Debug: rest: EXPAND //radius/rest/authorize (5) Mon Apr 20 15:28:15 2020: Debug: rest: --> //radius/rest/authorize (5) Mon Apr 20 15:28:15 2020: Debug: rest: Sending HTTP POST to "http://127.0.0.1:7070//radius/rest/authorize"; (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "User-Name" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "User-Password" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "NAS-IP-Address" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "NAS-Port" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "Service-Type" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "Calling-Station-Id" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "NAS-Identifier" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "NAS-Port-Type" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "Event-Timestamp" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "Stripped-User-Name" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "Realm" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "SQL-User-Name" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "FreeRADIUS-Client-IP-Address" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "PacketFence-KeyBalanced" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Encoding attribute "PacketFence-Radius-Ip" (5) Mon Apr 20 15:28:15 2020: Debug: rest: Processing response header (5) Mon Apr 20 15:28:15 2020: Debug: rest: Status : 401 (Unauthorized) (5) Mon Apr 20 15:28:15 2020: Debug: rest: Type : json (application/json) (5) Mon Apr 20 15:28:15 2020: ERROR: rest: Server returned: (5) Mon Apr 20 15:28:15 2020: ERROR: rest: {"control:PacketFence-Authorization-Status":"allow"} (5) Mon Apr 20 15:28:15 2020: Debug: [rest] = invalid (5) Mon Apr 20 15:28:15 2020: Debug: } # if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) = invalid (5) Mon Apr 20 15:28:15 2020: Debug: } # post-auth = invalid (5) Mon Apr 20 15:28:15 2020: Debug: Using Post-Auth-Type Reject (5) Mon Apr 20 15:28:15 2020: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence (5) Mon Apr 20 15:28:15 2020: Debug: Post-Auth-Type REJECT { (5) Mon Apr 20 15:28:15 2020: Debug: policy packetfence-set-tenant-id { (5) Mon Apr 20 15:28:15 2020: Debug: if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){ (5) Mon Apr 20 15:28:15 2020: Debug: if (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0} (5) Mon Apr 20 15:28:15 2020: Debug: --> 1 (5) Mon Apr 20 15:28:15 2020: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) { (5) Mon Apr 20 15:28:15 2020: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: } # policy packetfence-set-tenant-id = noop (5) Mon Apr 20 15:28:15 2020: Debug: update { (5) Mon Apr 20 15:28:15 2020: Debug: } # update = noop (5) Mon Apr 20 15:28:15 2020: Debug: if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) { (5) Mon Apr 20 15:28:15 2020: Debug: if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) -> TRUE (5) Mon Apr 20 15:28:15 2020: Debug: if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) { (5) Mon Apr 20 15:28:15 2020: Debug: policy packetfence-audit-log-reject { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name && (&User-Name == "dummy")) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&User-Name && (&User-Name == "dummy")) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: else { (5) Mon Apr 20 15:28:15 2020: Debug: policy request-timing { (5) Mon Apr 20 15:28:15 2020: Debug: if ("%{%{control:PacketFence-Request-Time}:-0}" != 0) { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{%{control:PacketFence-Request-Time}:-0} (5) Mon Apr 20 15:28:15 2020: Debug: --> 0 (5) Mon Apr 20 15:28:15 2020: Debug: if ("%{%{control:PacketFence-Request-Time}:-0}" != 0) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: } # policy request-timing = noop (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: EXPAND type.reject.query (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: --> type.reject.query (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: Using query template 'query' (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: EXPAND %{User-Name} (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: --> test-radius (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: SQL-User-Name set to 'test-radius' (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: EXPAND INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name, stripped_user_name, realm, event_type, switch_id, switch_mac, switch_ip_address, radius_source_ip_address, called_station_id, calling_station_id, nas_port_type, ssid, nas_port_id, ifindex, nas_port, connection_type, nas_ip_address, nas_identifier, auth_status, reason, auth_type, eap_type, role, node_status, profile, source, auto_reg, is_phone, pf_domain, uuid, radius_request, radius_reply, request_time, tenant_id, radius_ip) VALUES ( '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}', '%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}', '%{request:Stripped-User-Name}', '%{request:Realm}', 'Radius-Access-Request', '%{%{control:PacketFence-Switch-Id}:-N/A}', '%{%{control:PacketFence-Switch-Mac}:-N/A}', '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}', '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}', '%{request:Calling-Sta tion-Id}', '%{request:NAS-Port-Type}', '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}', '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}', '%{%{control:PacketFence-Connection-Type}:-N/A}', '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Reject', '%{request:Module-Failure-Message}', '%{control:Auth-Type}', '%{request:EAP-Type}', '%{%{control:PacketFence-Role}:-N/A}', '%{%{control:PacketFence-Status}:-N/A}', '%{%{control:PacketFence-Profile}:-N/A}', '%{%{control:PacketFence-Source}:-N/A}', '%{%{control:PacketFence-AutoReg}:-0}', '%{%{control:PacketFence-IsPhone}:-0}', '%{request:PacketFence-Domain}', '', '%{pairs:&request:[*]}','%{pairs:&reply:[*]}', '%{%{control:PacketFence-Request-Time}:-N/A}', '%{control:PacketFence-Tenant-Id}', '%{request:PacketFence-Radius-Ip}') (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: --> INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name, stripped_user_name, realm, event_type, switch_id, switch_mac, switch_ip_address, radius_source_ip_address, called_station_id, calling_station_id, nas_port_type, ssid, nas_port_id, ifindex, nas_port, connection_type, nas_ip_address, nas_identifier, auth_status, reason, auth_type, eap_type, role, node_status, profile, source, auto_reg, is_phone, pf_domain, uuid, radius_request, radius_reply, request_time, tenant_id, radius_ip) VALUES ( '192.168.200.1', '', 'N/A', 'test-radius', 'test-radius', 'null', 'Radius-Access-Request', 'N/A', 'N/A', 'N/A', '192.168.200.34', '', '192.168.200.1', 'Virtual', '', '', 'N/A', '10130', 'N/A', '127.0.1.1', 'sshd', 'Reject', 'rest: Server returned:', 'Accept', '', 'N/A', 'N/A', 'N/A', 'N/A', '0', '0', '', '', 'User-Name =3D =22test-radius=22=2C User-Password =3D =22=2A=2A=2A=2A=2A=2A=22=2C NAS-IP-Address =3D 127.0.1.1=2C NAS-Port =3D 1013 0=2C Service-Type =3D Authenticate-Only=2C Calling-Station-Id =3D =22192.168.200.1=22=2C NAS-Identifier =3D =22sshd=22=2C NAS-Port-Type =3D Virtual=2C Event-Timestamp =3D =22Apr 20 2020 15:28:15 UTC=22=2C Stripped-User-Name =3D =22test-radius=22=2C Realm =3D =22null=22=2C FreeRADIUS-Client-IP-Address =3D 192.168.200.34=2C PacketFence-KeyBalanced =3D =22fb4172cb9cf644e1d3d9f75872bdf56d=22=2C PacketFence-Radius-Ip =3D =22192.168.200.252=22=2C Module-Failure-Message =3D =22rest: Server returned:=22=2C Module-Failure-Message =3D =22rest: =7B=5C=22control:PacketFence-Authorization-Status=5C=22:=5C=22allow=5C=22=7D=22=2C SQL-User-Name =3D =22test-radius=22','', '0', '1', '192.168.200.252') (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: Executing query: INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name, stripped_user_name, realm, event_type, switch_id, switch_mac, switch_ip_address, radius_source_ip_address, called_station_id, calling_station_id, nas_port_type, ssid, nas_port_id, ifindex, nas_port, connection_type, nas_ip_address, nas_identifier, auth_status, reason, auth_type, eap_type, role, node_status, profile, source, auto_reg, is_phone, pf_domain, uuid, radius_request, radius_reply, request_time, tenant_id, radius_ip) VALUES ( '192.168.200.1', '', 'N/A', 'test-radius', 'test-radius', 'null', 'Radius-Access-Request', 'N/A', 'N/A', 'N/A', '192.168.200.34', '', '192.168.200.1', 'Virtual', '', '', 'N/A', '10130', 'N/A', '127.0.1.1', 'sshd', 'Reject', 'rest: Server returned:', 'Accept', '', 'N/A', 'N/A', 'N/A', 'N/A', '0', '0', '', '', 'User-Name =3D =22test-radius=22=2C User-Password =3D =22=2A=2A=2A=2A=2A=2A=22=2C NAS-IP-Address =3D 127.0.1.1=2C NAS- Port =3D 10130=2C Service-Type =3D Authenticate-Only=2C Calling-Station-Id =3D =22192.168.200.1=22=2C NAS-Identifier =3D =22sshd=22=2C NAS-Port-Type =3D Virtual=2C Event-Timestamp =3D =22Apr 20 2020 15:28:15 UTC=22=2C Stripped-User-Name =3D =22test-radius=22=2C Realm =3D =22null=22=2C FreeRADIUS-Client-IP-Address =3D 192.168.200.34=2C PacketFence-KeyBalanced =3D =22fb4172cb9cf644e1d3d9f75872bdf56d=22=2C PacketFence-Radius-Ip =3D =22192.168.200.252=22=2C Module-Failure-Message =3D =22rest: Server returned:=22=2C Module-Failure-Message =3D =22rest: =7B=5C=22control:PacketFence-Authorization-Status=5C=22:=5C=22allow=5C=22=7D=22=2C SQL-User-Name =3D =22test-radius=22','', '0', '1', '192.168.200.252') (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: SQL query returned: success (5) Mon Apr 20 15:28:15 2020: Debug: sql_reject: 1 record(s) updated (5) Mon Apr 20 15:28:15 2020: Debug: [sql_reject] = ok (5) Mon Apr 20 15:28:15 2020: Debug: } # else = ok (5) Mon Apr 20 15:28:15 2020: Debug: } # policy packetfence-audit-log-reject = ok (5) Mon Apr 20 15:28:15 2020: Debug: } # if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) = ok (5) Mon Apr 20 15:28:15 2020: Debug: if ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") { (5) Mon Apr 20 15:28:15 2020: Debug: EXPAND %{%{control:PacketFence-Proxied-From}:-False} (5) Mon Apr 20 15:28:15 2020: Debug: --> False (5) Mon Apr 20 15:28:15 2020: Debug: if ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: attr_filter.access_reject: EXPAND %{User-Name} (5) Mon Apr 20 15:28:15 2020: Debug: attr_filter.access_reject: --> test-radius (5) Mon Apr 20 15:28:15 2020: Debug: attr_filter.access_reject: Matched entry DEFAULT at line 11 (5) Mon Apr 20 15:28:15 2020: Debug: [attr_filter.access_reject] = updated (5) Mon Apr 20 15:28:15 2020: Debug: attr_filter.packetfence_post_auth: EXPAND %{User-Name} (5) Mon Apr 20 15:28:15 2020: Debug: attr_filter.packetfence_post_auth: --> test-radius (5) Mon Apr 20 15:28:15 2020: Debug: attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10 (5) Mon Apr 20 15:28:15 2020: Debug: [attr_filter.packetfence_post_auth] = updated (5) Mon Apr 20 15:28:15 2020: Debug: [eap] = noop (5) Mon Apr 20 15:28:15 2020: Debug: policy remove_reply_message_if_eap { (5) Mon Apr 20 15:28:15 2020: Debug: if (&reply:EAP-Message && &reply:Reply-Message) { (5) Mon Apr 20 15:28:15 2020: Debug: if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE (5) Mon Apr 20 15:28:15 2020: Debug: else { (5) Mon Apr 20 15:28:15 2020: Debug: [noop] = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # else = noop (5) Mon Apr 20 15:28:15 2020: Debug: } # policy remove_reply_message_if_eap = noop (5) Mon Apr 20 15:28:15 2020: Debug: linelog: EXPAND messages.%{%{reply:Packet-Type}:-default} (5) Mon Apr 20 15:28:15 2020: Debug: linelog: --> messages.Access-Reject (5) Mon Apr 20 15:28:15 2020: Debug: linelog: EXPAND [mac:%{Calling-Station-Id}] Rejected user: %{User-Name} (5) Mon Apr 20 15:28:15 2020: Debug: linelog: --> [mac:192.168.200.1] Rejected user: test-radius (5) Mon Apr 20 15:28:15 2020: Debug: [linelog] = ok (5) Mon Apr 20 15:28:15 2020: Debug: } # Post-Auth-Type REJECT = updated (5) Mon Apr 20 15:28:15 2020: Debug: Delaying response for 1.000000 seconds (5) Mon Apr 20 15:28:16 2020: Debug: Sending delayed response (5) Mon Apr 20 15:28:16 2020: Debug: Sent Access-Reject Id 97 from 192.168.200.252:1812 to 192.168.200.34:57381 length 20 (4) Mon Apr 20 15:28:20 2020: Debug: Cleaning up request packet ID 166 with timestamp +52 (5) Mon Apr 20 15:28:20 2020: Debug: Cleaning up request packet ID 97 with timestamp +52 (6) Mon Apr 20 15:28:30 2020: Debug: Received Status-Server Id 70 from 127.0.0.1:35436 to 127.0.0.1:18121 length 50 (6) Mon Apr 20 15:28:30 2020: Debug: Message-Authenticator = 0x394df86ebc609547b45a800d00ec2a89 (6) Mon Apr 20 15:28:30 2020: Debug: FreeRADIUS-Statistics-Type = 15 (6) Mon Apr 20 15:28:30 2020: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/status (6) Mon Apr 20 15:28:30 2020: Debug: Autz-Type Status-Server { (6) Mon Apr 20 15:28:30 2020: Debug: [ok] = ok (6) Mon Apr 20 15:28:30 2020: Debug: } # Autz-Type Status-Server = ok
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users