What are you trying to achieve there ? Give a bit of context.
Thanks, Ludovic Zammit [email protected] <mailto:[email protected]> :: +1.514.447.4918 (x145) :: www.inverse.ca <http://www.inverse.ca/> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) and PacketFence (http://packetfence.org <http://packetfence.org/>) > On Oct 16, 2020, at 1:54 PM, rahim damji <[email protected]> wrote: > > Thank U here u go > > root@packetfence ~]# raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000 > (703) Thu Oct 15 10:35:30 2020: Debug: Received Status-Server Id 172 from > 127.0.0.1:56048 to 127.0.0.1:18121 length 50 > (703) Thu Oct 15 10:35:30 2020: Debug: Message-Authenticator = > 0x29f77e107025d985d90537b9c9854276 > (703) Thu Oct 15 10:35:30 2020: Debug: FreeRADIUS-Statistics-Type = 15 > (703) Thu Oct 15 10:35:30 2020: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/status > (703) Thu Oct 15 10:35:30 2020: Debug: Autz-Type Status-Server { > (703) Thu Oct 15 10:35:30 2020: Debug: [ok] = ok > (703) Thu Oct 15 10:35:30 2020: Debug: } # Autz-Type Status-Server = ok > (703) Thu Oct 15 10:35:30 2020: Debug: Sent Access-Accept Id 172 from > 127.0.0.1:18121 to 127.0.0.1:56048 length 0 > (703) Thu Oct 15 10:35:30 2020: Debug: FreeRADIUS-Total-Access-Requests = > 707 > (703) Thu Oct 15 10:35:30 2020: Debug: FreeRADIUS-Total-Access-Accepts = 15 > (703) Thu Oct 15 10:35:30 2020: Debug: FreeRADIUS-Total-Access-Rejects = 4 > (703) Thu Oct 15 10:35:30 2020: Debug: FreeRADIUS-Total-Access-Challenges = > 112 > (703) Thu Oct 15 10:35:30 2020: Debug: FreeRADIUS-Total-Auth-Responses = 131 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Auth-Duplicate-Requests = 3 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Auth-Malformed-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Auth-Invalid-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Auth-Dropped-Requests = 3 > (703) Thu Oct 15 10:35:30 2020: Debug: FreeRADIUS-Total-Auth-Unknown-Types > = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: FreeRADIUS-Total-Accounting-Requests > = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Accounting-Responses = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Acct-Duplicate-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Acct-Malformed-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Acct-Invalid-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Acct-Dropped-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: FreeRADIUS-Total-Acct-Unknown-Types > = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Accepts = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Rejects = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Access-Challenges = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Responses = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Accounting-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Accounting-Responses = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: > FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 > (703) Thu Oct 15 10:35:30 2020: Debug: Finished request > (704) Thu Oct 15 10:35:31 2020: Debug: Received Access-Request Id 3 from > 10.0.0.229:3495 to 10.0.0.234:1812 length 220 > (704) Thu Oct 15 10:35:31 2020: Debug: NAS-Identifier = "damji60E" > (704) Thu Oct 15 10:35:31 2020: Debug: User-Name = "b0:35:b5:b9:fb:aa" > (704) Thu Oct 15 10:35:31 2020: Debug: User-Password = "b0:35:b5:b9:fb:aa" > (704) Thu Oct 15 10:35:31 2020: Debug: NAS-IP-Address = 10.0.0.229 > (704) Thu Oct 15 10:35:31 2020: Debug: NAS-Port-Type = Virtual > (704) Thu Oct 15 10:35:31 2020: Debug: Called-Station-Id = > "08-5B-0E-0E-35-C4:FDTUNNEL" > (704) Thu Oct 15 10:35:31 2020: Debug: Calling-Station-Id = > "B0-35-B5-B9-FB-AA" > (704) Thu Oct 15 10:35:31 2020: Debug: Fortinet-SSID = "FDTUNNEL" > (704) Thu Oct 15 10:35:31 2020: Debug: Fortinet-AP-Name = "FAP11C3X13002176" > (704) Thu Oct 15 10:35:31 2020: Debug: Acct-Session-Id = "5c191ef8" > (704) Thu Oct 15 10:35:31 2020: Debug: Connect-Info = "web-auth" > (704) Thu Oct 15 10:35:31 2020: Debug: Fortinet-Vdom-Name = "root" > (704) Thu Oct 15 10:35:31 2020: Debug: Service-Type = Login-User > (704) Thu Oct 15 10:35:31 2020: Debug: # Executing section authorize from > file /usr/local/pf/raddb/sites-enabled/packetfence > (704) Thu Oct 15 10:35:31 2020: Debug: authorize { > (704) Thu Oct 15 10:35:31 2020: Debug: update { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{Packet-Src-IP-Address} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 10.0.0.229 > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{Packet-Dst-IP-Address} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 10.0.0.234 > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %l > (704) Thu Oct 15 10:35:31 2020: Debug: --> 1602772531 > (704) Thu Oct 15 10:35:31 2020: Debug: } # update = noop > (704) Thu Oct 15 10:35:31 2020: Debug: policy > packetfence-set-realm-if-machine { > (704) Thu Oct 15 10:35:31 2020: Debug: if (User-Name =~ > /host\/([a-z0-9_-]*)[\.](.*)/i) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (User-Name =~ > /host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy > packetfence-set-realm-if-machine = noop > (704) Thu Oct 15 10:35:31 2020: Debug: policy > packetfence-balanced-key-policy { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&PacketFence-KeyBalanced && > (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&PacketFence-KeyBalanced && > (&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: else { > (704) Thu Oct 15 10:35:31 2020: Debug: update { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{md5:%{Calling-Station-Id}%{User-Name}} > (704) Thu Oct 15 10:35:31 2020: Debug: --> > dc41feae55319aa1564020b73056c100 > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{md5:%{Calling-Station-Id}%{User-Name}} > (704) Thu Oct 15 10:35:31 2020: Debug: --> > dc41feae55319aa1564020b73056c100 > (704) Thu Oct 15 10:35:31 2020: Debug: } # update = noop > (704) Thu Oct 15 10:35:31 2020: Debug: } # else = noop > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy > packetfence-balanced-key-policy = noop > (704) Thu Oct 15 10:35:31 2020: Debug: policy packetfence-set-tenant-id { > (704) Thu Oct 15 10:35:31 2020: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0"){ > (704) Thu Oct 15 10:35:31 2020: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0") -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{%{control:PacketFence-Tenant-Id}:-0} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 0 > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { > (704) Thu Oct 15 10:35:31 2020: Debug: update control { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{User-Name} > (704) Thu Oct 15 10:35:31 2020: Debug: --> b0:35:b5:b9:fb:aa > (704) Thu Oct 15 10:35:31 2020: Debug: SQL-User-Name set to > 'b0:35:b5:b9:fb:aa' > (704) Thu Oct 15 10:35:31 2020: Debug: Executing select query: > SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = > '10.0.0.229'), 0) > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{sql: SELECT > IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = > '%{NAS-IP-Address}'), 0)} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 0 > (704) Thu Oct 15 10:35:31 2020: Debug: } # update control = noop > (704) Thu Oct 15 10:35:31 2020: Debug: } # if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) { > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) -> TRUE > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) { > (704) Thu Oct 15 10:35:31 2020: Debug: update control { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{User-Name} > (704) Thu Oct 15 10:35:31 2020: Debug: --> b0:35:b5:b9:fb:aa > (704) Thu Oct 15 10:35:31 2020: Debug: SQL-User-Name set to > 'b0:35:b5:b9:fb:aa' > (704) Thu Oct 15 10:35:31 2020: Debug: Executing select query: > SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= > INET_ATON('10.0.0.229') and INET_ATON('10.0.0.229') <= end_ip order by > range_length limit 1), 1) > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{sql: SELECT > IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= > INET_ATON('%{NAS-IP-Address}') and INET_ATON('%{NAS-IP-Address}') <= end_ip > order by range_length limit 1), 1)}(704) Thu Oct 15 10:35:31 2020: Debug: > --> 1 > (704) Thu Oct 15 10:35:31 2020: Debug: } # update control = noop > (704) Thu Oct 15 10:35:31 2020: Debug: } # if ( > &control:PacketFence-Tenant-Id == 0 ) = noop > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy > packetfence-set-tenant-id = noop > (704) Thu Oct 15 10:35:31 2020: Debug: policy rewrite_calling_station_id { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&Calling-Station-Id && > (&Calling-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) > { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&Calling-Station-Id && > (&Calling-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) > -> TRUE(704) Thu Oct 15 10:35:31 2020: Debug: if (&Calling-Station-Id > && (&Calling-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) > { > (704) Thu Oct 15 10:35:31 2020: Debug: update request { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}} > (704) Thu Oct 15 10:35:31 2020: Debug: --> b0:35:b5:b9:fb:aa > (704) Thu Oct 15 10:35:31 2020: Debug: } # update request = noop > (704) Thu Oct 15 10:35:31 2020: Debug: [updated] = updated > (704) Thu Oct 15 10:35:31 2020: Debug: } # if (&Calling-Station-Id && > (&Calling-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) > = updated > (704) Thu Oct 15 10:35:31 2020: Debug: ... skipping else: Preceding > "if" was taken > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy > rewrite_calling_station_id = updated > (704) Thu Oct 15 10:35:31 2020: Debug: policy rewrite_called_station_id { > (704) Thu Oct 15 10:35:31 2020: Debug: if ((&Called-Station-Id) && > (&Called-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) > { > (704) Thu Oct 15 10:35:31 2020: Debug: if ((&Called-Station-Id) && > (&Called-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) > -> TRUE > (704) Thu Oct 15 10:35:31 2020: Debug: if ((&Called-Station-Id) && > (&Called-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) > { > (704) Thu Oct 15 10:35:31 2020: Debug: update request { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 08:5b:0e:0e:35:c4 > (704) Thu Oct 15 10:35:31 2020: Debug: } # update request = noop > (704) Thu Oct 15 10:35:31 2020: Debug: if ("%{8}") { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{8} > (704) Thu Oct 15 10:35:31 2020: Debug: --> FDTUNNEL > (704) Thu Oct 15 10:35:31 2020: Debug: if ("%{8}") -> TRUE > (704) Thu Oct 15 10:35:31 2020: Debug: if ("%{8}") { > (704) Thu Oct 15 10:35:31 2020: Debug: update request { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{Called-Station-Id}:%{8} > (704) Thu Oct 15 10:35:31 2020: Debug: --> > 08:5b:0e:0e:35:c4:FDTUNNEL > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{8} > (704) Thu Oct 15 10:35:31 2020: Debug: --> FDTUNNEL > (704) Thu Oct 15 10:35:31 2020: Debug: } # update request = noop > (704) Thu Oct 15 10:35:31 2020: Debug: } # if ("%{8}") = noop > (704) Thu Oct 15 10:35:31 2020: Debug: ... skipping elsif: Preceding > "if" was taken > (704) Thu Oct 15 10:35:31 2020: Debug: ... skipping elsif: Preceding > "if" was taken > (704) Thu Oct 15 10:35:31 2020: Debug: ... skipping elsif: Preceding > "if" was taken > (704) Thu Oct 15 10:35:31 2020: Debug: [updated] = updated > (704) Thu Oct 15 10:35:31 2020: Debug: } # if ((&Called-Station-Id) && > (&Called-Station-Id =~ > /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) > = updated > (704) Thu Oct 15 10:35:31 2020: Debug: ... skipping else: Preceding > "if" was taken > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy > rewrite_called_station_id = updated > (704) Thu Oct 15 10:35:31 2020: Debug: if ( "%{client:shortname}" =~ > /eduroam_tlrs/ ) { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{client:shortname} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 10.0.0.229/32 > (704) Thu Oct 15 10:35:31 2020: Debug: if ( "%{client:shortname}" =~ > /eduroam_tlrs/ ) -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: policy filter_username { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name) -> TRUE > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name =~ / /) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name =~ / /) -> > FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name =~ /@[^@]*@/ ) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name =~ /@[^@]*@/ ) > -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name =~ /\.\./ ) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name =~ /\.\./ ) -> > FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if ((&User-Name =~ /@/) && > (&User-Name !~ /@(.+)\.(.+)$/)) { > (704) Thu Oct 15 10:35:31 2020: Debug: if ((&User-Name =~ /@/) && > (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name =~ /\.$/) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name =~ /\.$/) -> > FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name =~ /@\./) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name =~ /@\./) -> > FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: } # if (&User-Name) = updated > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy filter_username = > updated > (704) Thu Oct 15 10:35:31 2020: Debug: policy filter_password { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Password && > (&User-Password != "%{string:User-Password}")) { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{string:User-Password} > (704) Thu Oct 15 10:35:31 2020: Debug: --> b0:35:b5:b9:fb:aa > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Password && > (&User-Password != "%{string:User-Password}")) -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy filter_password = > updated > (704) Thu Oct 15 10:35:31 2020: Debug: [preprocess] = ok > (704) Thu Oct 15 10:35:31 2020: Debug: [mschap] = noop > (704) Thu Oct 15 10:35:31 2020: Debug: suffix: Checking for suffix after "@" > (704) Thu Oct 15 10:35:31 2020: Debug: suffix: No '@' in User-Name = > "b0:35:b5:b9:fb:aa", skipping NULL due to config. > (704) Thu Oct 15 10:35:31 2020: Debug: [suffix] = noop > (704) Thu Oct 15 10:35:31 2020: Debug: ntdomain: Checking for prefix before > "\" > (704) Thu Oct 15 10:35:31 2020: Debug: ntdomain: No '\' in User-Name = > "b0:35:b5:b9:fb:aa", looking up realm NULL > (704) Thu Oct 15 10:35:31 2020: Debug: ntdomain: Found realm "null" > (704) Thu Oct 15 10:35:31 2020: Debug: ntdomain: Adding Stripped-User-Name = > "b0:35:b5:b9:fb:aa" > (704) Thu Oct 15 10:35:31 2020: Debug: ntdomain: Adding Realm = "null" > (704) Thu Oct 15 10:35:31 2020: Debug: ntdomain: Authentication realm is LOCAL > (704) Thu Oct 15 10:35:31 2020: Debug: [ntdomain] = ok > (704) Thu Oct 15 10:35:31 2020: Debug: eap: No EAP-Message, not doing EAP > (704) Thu Oct 15 10:35:31 2020: Debug: [eap] = noop > (704) Thu Oct 15 10:35:31 2020: Debug: if ( !EAP-Message && > "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{%{Control:Auth-type}:-No-MS_CHAP} > (704) Thu Oct 15 10:35:31 2020: Debug: --> No-MS_CHAP > (704) Thu Oct 15 10:35:31 2020: Debug: if ( !EAP-Message && > "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") -> TRUE > (704) Thu Oct 15 10:35:31 2020: Debug: if ( !EAP-Message && > "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") { > (704) Thu Oct 15 10:35:31 2020: Debug: update { > (704) Thu Oct 15 10:35:31 2020: Debug: } # update = noop > (704) Thu Oct 15 10:35:31 2020: Debug: } # if ( !EAP-Message && > "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") = noop > (704) Thu Oct 15 10:35:31 2020: Debug: if (Control:Auth-type == > "MS-CHAP") { > (704) Thu Oct 15 10:35:31 2020: Debug: if (Control:Auth-type == > "MS-CHAP") -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: policy packetfence-eap-mac-policy { > (704) Thu Oct 15 10:35:31 2020: Debug: if ( &EAP-Type ) { > (704) Thu Oct 15 10:35:31 2020: Debug: if ( &EAP-Type ) -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: [noop] = noop > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy > packetfence-eap-mac-policy = noop > (704) Thu Oct 15 10:35:31 2020: WARNING: pap: > !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > (704) Thu Oct 15 10:35:31 2020: WARNING: pap: !!! Ignoring > control:User-Password. Update your !!! > (704) Thu Oct 15 10:35:31 2020: WARNING: pap: !!! configuration so that the > "known good" clear text !!! > (704) Thu Oct 15 10:35:31 2020: WARNING: pap: !!! password is in > Cleartext-Password and NOT in !!! > (704) Thu Oct 15 10:35:31 2020: WARNING: pap: !!! User-Password. > !!! > (704) Thu Oct 15 10:35:31 2020: WARNING: pap: > !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > (704) Thu Oct 15 10:35:31 2020: WARNING: pap: Auth-Type already set. Not > setting to PAP > (704) Thu Oct 15 10:35:31 2020: Debug: [pap] = noop > (704) Thu Oct 15 10:35:31 2020: Debug: } # authorize = updated > (704) Thu Oct 15 10:35:31 2020: Debug: Found Auth-Type = Accept > (704) Thu Oct 15 10:35:31 2020: Debug: Auth-Type = Accept, accepting the user > (704) Thu Oct 15 10:35:31 2020: Debug: # Executing section post-auth from > file /usr/local/pf/raddb/sites-enabled/packetfence > (704) Thu Oct 15 10:35:31 2020: Debug: post-auth { > (704) Thu Oct 15 10:35:31 2020: Debug: update { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{Packet-Src-IP-Address} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 10.0.0.229 > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND %{Packet-Dst-IP-Address} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 10.0.0.234 > (704) Thu Oct 15 10:35:31 2020: Debug: } # update = noop > (704) Thu Oct 15 10:35:31 2020: Debug: policy packetfence-set-tenant-id { > (704) Thu Oct 15 10:35:31 2020: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0"){ > (704) Thu Oct 15 10:35:31 2020: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0") -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{%{control:PacketFence-Tenant-Id}:-0} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 1 > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) { > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy > packetfence-set-tenant-id = noop > (704) Thu Oct 15 10:35:31 2020: Debug: if > ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{%{control:PacketFence-Proxied-From}:-False} > (704) Thu Oct 15 10:35:31 2020: Debug: --> False > (704) Thu Oct 15 10:35:31 2020: Debug: if > ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if (! EAP-Type || (EAP-Type != > TTLS && EAP-Type != PEAP) ) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (! EAP-Type || (EAP-Type != > TTLS && EAP-Type != PEAP) ) -> TRUE > (704) Thu Oct 15 10:35:31 2020: Debug: if (! EAP-Type || (EAP-Type != > TTLS && EAP-Type != PEAP) ) { > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Expanding URI components > (704) Thu Oct 15 10:35:31 2020: Debug: rest: EXPAND http://127.0.0.1:7070 > (704) Thu Oct 15 10:35:31 2020: Debug: rest: --> http://127.0.0.1:7070 > (704) Thu Oct 15 10:35:31 2020: Debug: rest: EXPAND //radius/rest/authorize > (704) Thu Oct 15 10:35:31 2020: Debug: rest: --> //radius/rest/authorize > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Sending HTTP POST to > "http://127.0.0.1:7070//radius/rest/authorize" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute "User-Name" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "User-Password" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "NAS-IP-Address" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute "Service-Type" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "Called-Station-Id" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "Calling-Station-Id" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "NAS-Identifier" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "NAS-Port-Type" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "Acct-Session-Id" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "Event-Timestamp" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute "Connect-Info" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "Fortinet-Vdom-Name" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "Fortinet-SSID" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "Fortinet-AP-Name" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "Stripped-User-Name" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute "Realm" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "SQL-User-Name" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "FreeRADIUS-Client-IP-Address" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "Called-Station-SSID" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "PacketFence-KeyBalanced" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Encoding attribute > "PacketFence-Radius-Ip" > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Processing response header > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Status : 100 (Continue) > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Continuing... > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Processing response header > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Status : 401 (Unauthorized) > (704) Thu Oct 15 10:35:31 2020: Debug: rest: Type : json > (application/json) > (704) Thu Oct 15 10:35:31 2020: ERROR: rest: Server returned: > (704) Thu Oct 15 10:35:31 2020: ERROR: rest: {"Reply-Message":"Network device > does not support this mode of > operation","control:PacketFence-Eap-Type":0,"control:PacketFence-Authorization-Status":"allow","control:PacketFence-Mac":"b0:35:b5:b9:fb:aa","control:PacketFence-Request-Time":1602772531,"control:PacketFence-Switch-Ip-Address":"10.0.0.229","control:PacketFence-IfIndex":"external","control:PacketFence-UserName":"b0:35:b5:b9:fb:aa","control:PacketFence-Connection-Type":"CLI-Access","control:PacketFence-Switch-Id":"10.0.0.229","control:PacketFence-Switch-Mac":"08:5b:0e:0e:35:c4"} > (704) Thu Oct 15 10:35:31 2020: Debug: [rest] = invalid > (704) Thu Oct 15 10:35:31 2020: Debug: } # if (! EAP-Type || (EAP-Type != > TTLS && EAP-Type != PEAP) ) = invalid > (704) Thu Oct 15 10:35:31 2020: Debug: } # post-auth = invalid > (704) Thu Oct 15 10:35:31 2020: Debug: Using Post-Auth-Type Reject > (704) Thu Oct 15 10:35:31 2020: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/packetfence > (704) Thu Oct 15 10:35:31 2020: Debug: Post-Auth-Type REJECT { > (704) Thu Oct 15 10:35:31 2020: Debug: policy packetfence-set-tenant-id { > (704) Thu Oct 15 10:35:31 2020: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0"){ > (704) Thu Oct 15 10:35:31 2020: Debug: if (!NAS-IP-Address || > NAS-IP-Address == "0.0.0.0") -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{%{control:PacketFence-Tenant-Id}:-0} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 1 > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) { > (704) Thu Oct 15 10:35:31 2020: Debug: if ( > &control:PacketFence-Tenant-Id == 0 ) -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy > packetfence-set-tenant-id = noop > (704) Thu Oct 15 10:35:31 2020: Debug: update { > (704) Thu Oct 15 10:35:31 2020: Debug: } # update = noop > (704) Thu Oct 15 10:35:31 2020: Debug: if (! EAP-Type || (EAP-Type != > TTLS && EAP-Type != PEAP) ) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (! EAP-Type || (EAP-Type != > TTLS && EAP-Type != PEAP) ) -> TRUE > (704) Thu Oct 15 10:35:31 2020: Debug: if (! EAP-Type || (EAP-Type != > TTLS && EAP-Type != PEAP) ) { > (704) Thu Oct 15 10:35:31 2020: Debug: policy > packetfence-audit-log-reject { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name && (&User-Name > == "dummy")) { > (704) Thu Oct 15 10:35:31 2020: Debug: if (&User-Name && (&User-Name > == "dummy")) -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: else { > (704) Thu Oct 15 10:35:31 2020: Debug: policy request-timing { > (704) Thu Oct 15 10:35:31 2020: Debug: if > ("%{%{control:PacketFence-Request-Time}:-0}" != 0) { > (704) Thu Oct 15 10:35:31 2020: Debug: EXPAND > %{%{control:PacketFence-Request-Time}:-0} > (704) Thu Oct 15 10:35:31 2020: Debug: --> 0 > (704) Thu Oct 15 10:35:31 2020: Debug: if > ("%{%{control:PacketFence-Request-Time}:-0}" != 0) -> FALSE > (704) Thu Oct 15 10:35:31 2020: Debug: } # policy request-timing = > noop > (704) Thu Oct 15 10:35:31 2020: Debug: sql_reject: EXPAND type.reject.query > (704) Thu Oct 15 10:35:31 2020: Debug: sql_reject: --> type.reject.query > (704) Thu Oct 15 10:35:31 2020: Debug: sql_reject: Using query template > 'query' > (704) Thu Oct 15 10:35:31 2020: Debug: sql_reject: EXPAND %{User-Name} > (704) Thu Oct 15 10:35:31 2020: Debug: sql_reject: --> b0:35:b5:b9:fb:aa > (704) Thu Oct 15 10:35:31 2020: Debug: sql_reject: SQL-User-Name set to > 'b0:35:b5:b9:fb:aa' > > > On Friday, October 16, 2020, 01:43:44 PM EDT, Ludovic Zammit > <[email protected]> wrote: > > > Hello, > > Yes please, could you send the output of the command: > > raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3600 | tee raddebug.log > > Thanks, > > Ludovic Zammit > [email protected] <mailto:[email protected]> :: +1.514.447.4918 (x145) :: > www.inverse.ca <http://www.inverse.ca/> > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu > <http://www.sogo.nu/>) and PacketFence (http://packetfence.org > <http://packetfence.org/>) > > > > >> On Oct 15, 2020, at 11:23 AM, rahim damji via PacketFence-users >> <[email protected] >> <mailto:[email protected]>> wrote: >> >> I can post my debug if needed >> >> Thanks >> >> Rahim >> _______________________________________________ >> PacketFence-users mailing list >> [email protected] >> <mailto:[email protected]> >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >
_______________________________________________ PacketFence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
