Hello Enrique,
use_tunneled_reply is a freeradius attribute but i don't think it's
related to the issue (it's the authentication part).
(https://github.com/inverse-inc/packetfence/blob/devel/conf/radiusd/eap.conf.example)
The issue is when the CoA is sent.
Regards
Fabrice
Le 21-01-08 à 11 h 36, Enrique Gross a écrit :
Fabrice, Adrian, PF users
Happy 2021!
I have received feedback from Mikrotik Support regarding Error-Cause =
Unsupported-Extension:
Hello,
Thank you for contacting MikroTik Support and sorry for the late
reply.
Yes, it seems that's the case, with using wrong attributes, as
Error 406 means an unsupported extension.
As a test, you could try enabling "use_tunneled_reply" on your
RADIUS server.
If it still doesn't work, please let us know and send us a
Supout.rif made while the issue is present - like in your screenshot.
Best regards,
Guntis G.
Where i can enable "use_tunneled_reply" on packetfence so i can test
this?
My TK support on Mikrotik is still open, a good opportunity to send
them any testing.
Thanks, Enrique.
El dom, 20 dic 2020 a las 19:27, Adrian D'Atri-Guiran via
PacketFence-users (<packetfence-users@lists.sourceforge.net
<mailto:packetfence-users@lists.sourceforge.net>>) escribió:
Hi Fabrice,
It seems to me that mikrotik also requires the IP address. When I
submit anything that doesn't have the Framed-Ip-Address as part of
the query, i see "Radius disconnect with no ip provided" in radius
logs (see attached).
https://forum.mikrotik.com/viewtopic.php?t=6672
On Tue, Dec 15, 2020 at 11:55 AM Fabrice Durand
<fdur...@inverse.ca <mailto:fdur...@inverse.ca>> wrote:
Hello Adrian,
if you can try with other mac format to see if one works.
like:
5c:e0:c5:c1:d6:fd
5C:E0:C5:C1:D6:FD
5c-e0-c5-c1-d6-fd
5C-E0-C5-C1-D6-FD
5ce0c5c1d6fd
5CE0C5C1D6FD
Regards
Fabrice
Le 20-12-15 à 13 h 06, Adrian D'Atri-Guiran a écrit :
Hi Fabrice,
I played around with it a bit further, and here's a working test:
echo "Framed-IP-Address=10.5.50.2" | radclient -x
10.2.2.1:3799 <http://10.2.2.1:3799> disconnect secret
Sent Disconnect-Request Id 44 from 0.0.0.0:37354
<http://0.0.0.0:37354> to 10.2.2.1:3799
<http://10.2.2.1:3799> length 26
Framed-IP-Address = 10.5.50.2
Received Disconnect-ACK Id 44 from 10.2.2.1:3799
<http://10.2.2.1:3799> to 10.2.2.254:37354
<http://10.2.2.254:37354> length 30
NAS-Identifier = "MikroTik"
Where 10.5.50.2 is the client IP. and 10.2.2.1 is the ip of
my main mikrotik router that manages the hotspot. This
command instantly deauthenticated the client, but did not
remove the client's Cookie. For this reason I believe that
we should have "cookie" disabled under Hotspot -> Server
Profiles -> Login -> Login By (uncheck Cookie).
My problem is I don't know how to fix Mikrotik.pm how do I
access the client IP? I want to do something like:
'Framed-IP-Address' => "$client_ip_address",
on:
https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Mikrotik.pm#L230
<https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Mikrotik.pm#L230>
Also I guess we must be careful here because in some
scenarios if the client has been assigned a new IP and
packetfence is not yet aware of it, this could break. MAC
address would probably be better for deauthenticating, but I
haven't managed to get that working yet.
Thanks!
-Adrian
On Mon, Dec 14, 2020 at 6:02 PM Adrian D'Atri-Guiran
<adrian.datri.gui...@gmail.com
<mailto:adrian.datri.gui...@gmail.com>> wrote:
Thank you,
>btw you can try to add:
>'Calling-Station-Id' => $mac,
I have attempted this and the result was a new error (and
client remains authenticated on the mikrotik hotspot):
Dec 14 20:58:08 radius pfqueue: pfqueue(4868) WARN:
[mac:5c:e0:c5:c1:d6:fd] Unable to pull accounting history
for device 5c:e0:c5:c1:d6:fd. The history set doesn't
exist yet.
(pf::accounting_events_history::latest_mac_history)
Dec 14 20:58:08 radius pfqueue: pfqueue(4868) WARN:
[mac:5c:e0:c5:c1:d6:fd] Unable to pull accounting history
for device 5c:e0:c5:c1:d6:fd. The history set doesn't
exist yet.
(pf::accounting_events_history::latest_mac_history)
Dec 14 20:58:18 radius packetfence_httpd.webservices:
httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd]
[5c:e0:c5:c1:d6:fd] DesAssociating mac on switch
(10.2.2.1) (pf::api::desAssociate)
Dec 14 20:58:18 radius packetfence_httpd.webservices:
httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd]
deauthenticating 5c:e0:c5:c1:d6:fd
(pf::Switch::Mikrotik::radiusDisconnect)
Dec 14 20:58:18 radius packetfence_httpd.webservices:
httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd]
controllerIp is set, we will use controller 10.2.2.1 to
perform deauth (pf::Switch::Mikrotik::radiusDisconnect)
Dec 14 20:58:18 radius packetfence_httpd.webservices:
httpd.webservices(4444) WARN: [mac:5c:e0:c5:c1:d6:fd]
Unable to perform RADIUS Disconnect-Request.
Disconnect-NAK received with Error-Cause:
Unsupported-Extension.
(pf::Switch::Mikrotik::radiusDisconnect)
Dec 14 20:58:18 radius packetfence_httpd.webservices:
httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd]
[5c:e0:c5:c1:d6:fd] DesAssociating mac on switch
(10.2.2.1) (pf::api::desAssociate)
Dec 14 20:58:18 radius packetfence_httpd.webservices:
httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd]
deauthenticating 5c:e0:c5:c1:d6:fd
(pf::Switch::Mikrotik::radiusDisconnect)
Dec 14 20:58:18 radius packetfence_httpd.webservices:
httpd.webservices(4444) INFO: [mac:5c:e0:c5:c1:d6:fd]
controllerIp is set, we will use controller 10.2.2.1 to
perform deauth (pf::Switch::Mikrotik::radiusDisconnect)
Dec 14 20:58:18 radius packetfence_httpd.webservices:
httpd.webservices(4444) WARN: [mac:5c:e0:c5:c1:d6:fd]
Unable to perform RADIUS Disconnect-Request.
Disconnect-NAK received with Error-Cause:
Unsupported-Extension.
(pf::Switch::Mikrotik::radiusDisconnect)
On Fri, Dec 11, 2020 at 5:43 PM Durand fabrice via
PacketFence-users
<packetfence-users@lists.sourceforge.net
<mailto:packetfence-users@lists.sourceforge.net>> wrote:
btw you can try to add:
'Calling-Station-Id' => $mac,
here:
https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/Switch/Mikrotik.pm#L230
Le 20-12-11 à 20 h 31, Durand fabrice via
PacketFence-users a écrit :
> The code needs to be updated:
>
>
> https://forum.mikrotik.com/viewtopic.php?t=33063
>
>
> Le 20-12-11 à 14 h 28, Enrique Gross via
PacketFence-users a écrit :
>> Hi PF users! Hope you all doing well
>>
>> Hi Fabrice,
>>
>> I have read the mail Adrian sent you regarding COA
and Mikrotik. I
>> have been using SSH to disconnect CAPSMAN devices,
but I was
>> interested in using Radius COA.
>>
>> This is the output of radsniff after successful
registration at the
>> captive-portal, role is assigned but no
disconnection is made
>>
>> 2020-12-11 16:18:39.352569 (1) Disconnect-Request
Id 219
>> any:192.168.67.86:56875
<http://192.168.67.86:56875> -> 192.168.67.254:3799
<http://192.168.67.254:3799> +0.000
>> User-Name = "C2:F7:64:FB:0E:69"
>> Authenticator-Field =
0x677a789c11f3586ec7e73859e5b3080a
>> 2020-12-11 16:18:39.375064 (2) Disconnect-NAK Id 219
>> any:192.168.67.86:56875
<http://192.168.67.86:56875> <- 192.168.67.254:3799
<http://192.168.67.254:3799> +0.022 +0.022
>> NAS-Identifier = "MK-IBERA2"
>> Error-Cause = Unsupported-Extension
>> Authenticator-Field =
0xb6261e8e06e5ecf78db2049bea689396
>> 2020-12-11 16:18:44.575064 (1) Cleaning up request
packet ID 219
>>
>> This is Mikrotik side of log:
>>
>> 16:18:39 radius,debug,packet received
Disconnect-Request with id 219
>> from 192.168.67.86:56875 <http://192.168.67.86:56875>
>> 16:18:39 radius,debug,packet Signature =
>> 0x677a789c11f3586ec7e73859e5b3080a
>> 16:18:39 radius,debug,packet User-Name =
"C2:F7:64:FB:0E:69"
>> 16:18:39 radius,debug received remote request 25
>> code=Disconnect-Request from 192.168.67.86:56875
<http://192.168.67.86:56875>
>> 16:18:39 radius,debug sending Disconnect-NAK to
remote request 25
>> 16:18:39 radius,debug,packet sending
Disconnect-NAK with id 219 to
>> 192.168.67.86:56875 <http://192.168.67.86:56875>
>> 16:18:39 radius,debug,packet Signature =
>> 0xb6261e8e06e5ecf78db2049bea689396
>> 16:18:39 radius,debug,packet Error-Cause = 406
>> 16:18:39 radius,debug,packet NAS-Identifier =
"MK-IBERA2"
>>
>> Thanks for your help,
>>
>> Enrique
>>
>>
>> --
>>
>>
>> _______________________________________________
>> PacketFence-users mailing list
>> PacketFence-users@lists.sourceforge.net
<mailto:PacketFence-users@lists.sourceforge.net>
>>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
>
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
<mailto:PacketFence-users@lists.sourceforge.net>
>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
<mailto:PacketFence-users@lists.sourceforge.net>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Fabrice Durand
fdur...@inverse.ca <mailto:fdur...@inverse.ca> :: +1.514.447.4918 (x135)
::www.inverse.ca <http://www.inverse.ca>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
PacketFence (http://packetfence.org)
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
<mailto:PacketFence-users@lists.sourceforge.net>
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Imágenes integradas 1
--
Fabrice Durand
fdur...@inverse.ca :: +1.514.447.4918 (x135) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users