Fabrice, Adrian, PF users Happy 2021!
I have received feedback from Mikrotik Support regarding Error-Cause = Unsupported-Extension: Hello, > > Thank you for contacting MikroTik Support and sorry for the late reply. > > Yes, it seems that's the case, with using wrong attributes, as Error 406 > means an unsupported extension. > > As a test, you could try enabling "use_tunneled_reply" on your RADIUS > server. > > If it still doesn't work, please let us know and send us a Supout.rif made > while the issue is present - like in your screenshot. > > Best regards, > Guntis G. > Where i can enable "use_tunneled_reply" on packetfence so i can test this? My TK support on Mikrotik is still open, a good opportunity to send them any testing. Thanks, Enrique. El dom, 20 dic 2020 a las 19:27, Adrian D'Atri-Guiran via PacketFence-users (<packetfence-users@lists.sourceforge.net>) escribió: > Hi Fabrice, > > It seems to me that mikrotik also requires the IP address. When I submit > anything that doesn't have the Framed-Ip-Address as part of the query, i > see "Radius disconnect with no ip provided" in radius logs (see attached). > > https://forum.mikrotik.com/viewtopic.php?t=6672 > > On Tue, Dec 15, 2020 at 11:55 AM Fabrice Durand <fdur...@inverse.ca> > wrote: > >> Hello Adrian, >> >> if you can try with other mac format to see if one works. >> >> like: >> >> 5c:e0:c5:c1:d6:fd >> >> 5C:E0:C5:C1:D6:FD >> >> 5c-e0-c5-c1-d6-fd >> >> 5C-E0-C5-C1-D6-FD >> >> 5ce0c5c1d6fd >> >> 5CE0C5C1D6FD >> >> Regards >> >> Fabrice >> >> >> Le 20-12-15 à 13 h 06, Adrian D'Atri-Guiran a écrit : >> >> Hi Fabrice, >> >> I played around with it a bit further, and here's a working test: >> echo "Framed-IP-Address=10.5.50.2" | radclient -x 10.2.2.1:3799 >> disconnect secret >> Sent Disconnect-Request Id 44 from 0.0.0.0:37354 to 10.2.2.1:3799 length >> 26 >> Framed-IP-Address = 10.5.50.2 >> Received Disconnect-ACK Id 44 from 10.2.2.1:3799 to 10.2.2.254:37354 >> length 30 >> NAS-Identifier = "MikroTik" >> >> Where 10.5.50.2 is the client IP. and 10.2.2.1 is the ip of my main >> mikrotik router that manages the hotspot. This command instantly >> deauthenticated the client, but did not remove the client's Cookie. For >> this reason I believe that we should have "cookie" disabled under Hotspot >> -> Server Profiles -> Login -> Login By (uncheck Cookie). >> >> My problem is I don't know how to fix Mikrotik.pm how do I access the >> client IP? I want to do something like: >> 'Framed-IP-Address' => "$client_ip_address", >> on: >> https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/ >> Mikrotik.pm#L230 >> >> Also I guess we must be careful here because in some scenarios if the >> client has been assigned a new IP and packetfence is not yet aware of it, >> this could break. MAC address would probably be better for >> deauthenticating, but I haven't managed to get that working yet. >> >> Thanks! >> -Adrian >> >> >> On Mon, Dec 14, 2020 at 6:02 PM Adrian D'Atri-Guiran < >> adrian.datri.gui...@gmail.com> wrote: >> >>> Thank you, >>> >>> >btw you can try to add: >>> >'Calling-Station-Id' => $mac, >>> I have attempted this and the result was a new error (and client remains >>> authenticated on the mikrotik hotspot): >>> >>> Dec 14 20:58:08 radius pfqueue: pfqueue(4868) WARN: >>> [mac:5c:e0:c5:c1:d6:fd] Unable to pull accounting history for device >>> 5c:e0:c5:c1:d6:fd. The history set doesn't exist yet. >>> (pf::accounting_events_history::latest_mac_history) >>> Dec 14 20:58:08 radius pfqueue: pfqueue(4868) WARN: >>> [mac:5c:e0:c5:c1:d6:fd] Unable to pull accounting history for device >>> 5c:e0:c5:c1:d6:fd. The history set doesn't exist yet. >>> (pf::accounting_events_history::latest_mac_history) >>> Dec 14 20:58:18 radius packetfence_httpd.webservices: >>> httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd] [5c:e0:c5:c1:d6:fd] >>> DesAssociating mac on switch (10.2.2.1) (pf::api::desAssociate) >>> Dec 14 20:58:18 radius packetfence_httpd.webservices: >>> httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd] deauthenticating >>> 5c:e0:c5:c1:d6:fd (pf::Switch::Mikrotik::radiusDisconnect) >>> Dec 14 20:58:18 radius packetfence_httpd.webservices: >>> httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd] controllerIp is set, >>> we will use controller 10.2.2.1 to perform deauth >>> (pf::Switch::Mikrotik::radiusDisconnect) >>> Dec 14 20:58:18 radius packetfence_httpd.webservices: >>> httpd.webservices(4444) WARN: [mac:5c:e0:c5:c1:d6:fd] Unable to perform >>> RADIUS Disconnect-Request. Disconnect-NAK received with Error-Cause: >>> Unsupported-Extension. (pf::Switch::Mikrotik::radiusDisconnect) >>> Dec 14 20:58:18 radius packetfence_httpd.webservices: >>> httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd] [5c:e0:c5:c1:d6:fd] >>> DesAssociating mac on switch (10.2.2.1) (pf::api::desAssociate) >>> Dec 14 20:58:18 radius packetfence_httpd.webservices: >>> httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd] deauthenticating >>> 5c:e0:c5:c1:d6:fd (pf::Switch::Mikrotik::radiusDisconnect) >>> Dec 14 20:58:18 radius packetfence_httpd.webservices: >>> httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd] controllerIp is set, >>> we will use controller 10.2.2.1 to perform deauth >>> (pf::Switch::Mikrotik::radiusDisconnect) >>> Dec 14 20:58:18 radius packetfence_httpd.webservices: >>> httpd.webservices(4444) WARN: [mac:5c:e0:c5:c1:d6:fd] Unable to perform >>> RADIUS Disconnect-Request. Disconnect-NAK received with Error-Cause: >>> Unsupported-Extension. (pf::Switch::Mikrotik::radiusDisconnect) >>> >>> >>> >>> On Fri, Dec 11, 2020 at 5:43 PM Durand fabrice via PacketFence-users < >>> packetfence-users@lists.sourceforge.net> wrote: >>> >>>> btw you can try to add: >>>> >>>> 'Calling-Station-Id' => $mac, >>>> >>>> here: >>>> >>>> >>>> https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Mikrotik.pm#L230 >>>> >>>> >>>> Le 20-12-11 à 20 h 31, Durand fabrice via PacketFence-users a écrit : >>>> > The code needs to be updated: >>>> > >>>> > >>>> > https://forum.mikrotik.com/viewtopic.php?t=33063 >>>> > >>>> > >>>> > Le 20-12-11 à 14 h 28, Enrique Gross via PacketFence-users a écrit : >>>> >> Hi PF users! Hope you all doing well >>>> >> >>>> >> Hi Fabrice, >>>> >> >>>> >> I have read the mail Adrian sent you regarding COA and Mikrotik. I >>>> >> have been using SSH to disconnect CAPSMAN devices, but I was >>>> >> interested in using Radius COA. >>>> >> >>>> >> This is the output of radsniff after successful registration at the >>>> >> captive-portal, role is assigned but no disconnection is made >>>> >> >>>> >> 2020-12-11 16:18:39.352569 (1) Disconnect-Request Id 219 >>>> >> any:192.168.67.86:56875 -> 192.168.67.254:3799 +0.000 >>>> >> User-Name = "C2:F7:64:FB:0E:69" >>>> >> Authenticator-Field = 0x677a789c11f3586ec7e73859e5b3080a >>>> >> 2020-12-11 16:18:39.375064 (2) Disconnect-NAK Id 219 >>>> >> any:192.168.67.86:56875 <- 192.168.67.254:3799 +0.022 +0.022 >>>> >> NAS-Identifier = "MK-IBERA2" >>>> >> Error-Cause = Unsupported-Extension >>>> >> Authenticator-Field = 0xb6261e8e06e5ecf78db2049bea689396 >>>> >> 2020-12-11 16:18:44.575064 (1) Cleaning up request packet ID 219 >>>> >> >>>> >> This is Mikrotik side of log: >>>> >> >>>> >> 16:18:39 radius,debug,packet received Disconnect-Request with id 219 >>>> >> from 192.168.67.86:56875 >>>> >> 16:18:39 radius,debug,packet Signature = >>>> >> 0x677a789c11f3586ec7e73859e5b3080a >>>> >> 16:18:39 radius,debug,packet User-Name = "C2:F7:64:FB:0E:69" >>>> >> 16:18:39 radius,debug received remote request 25 >>>> >> code=Disconnect-Request from 192.168.67.86:56875 >>>> >> 16:18:39 radius,debug sending Disconnect-NAK to remote request 25 >>>> >> 16:18:39 radius,debug,packet sending Disconnect-NAK with id 219 to >>>> >> 192.168.67.86:56875 >>>> >> 16:18:39 radius,debug,packet Signature = >>>> >> 0xb6261e8e06e5ecf78db2049bea689396 >>>> >> 16:18:39 radius,debug,packet Error-Cause = 406 >>>> >> 16:18:39 radius,debug,packet NAS-Identifier = "MK-IBERA2" >>>> >> >>>> >> Thanks for your help, >>>> >> >>>> >> Enrique >>>> >> >>>> >> >>>> >> -- >>>> >> >>>> >> >>>> >> _______________________________________________ >>>> >> PacketFence-users mailing list >>>> >> PacketFence-users@lists.sourceforge.net >>>> >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>> > >>>> > >>>> > _______________________________________________ >>>> > PacketFence-users mailing list >>>> > PacketFence-users@lists.sourceforge.net >>>> > https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>> >>>> >>>> _______________________________________________ >>>> PacketFence-users mailing list >>>> PacketFence-users@lists.sourceforge.net >>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>> >>> -- >> Fabrice durandfdur...@inverse.ca :: +1.514.447.4918 (x135) :: >> www.inverse.ca >> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >> (http://packetfence.org) >> >> _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users > -- [image: Imágenes integradas 1]
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users