Pastebin of the response. https://pastebin.com/L70fKEB7
*Joshua Wise* Systems Engineer, Celina ISD 469-742-9113 https://www.celinaisd.com On Sat, Mar 27, 2021 at 8:13 AM Durand fabrice via PacketFence-users < packetfence-users@lists.sourceforge.net> wrote: > Then run the command without the filter and reconnect your device. > > raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3600 > > > Le 21-03-27 à 08 h 29, Joshua Wise via PacketFence-users a écrit : > > Command appears to run endlessly, I grabbed a snippet that appears to be > what is repeated. > > (3440) Sat Mar 27 07:25:15 2021: Debug: Received Status-Server Id 51 from > 127.0.0.1:51452 to 127.0.0.1:18121 length 50 > (3440) Sat Mar 27 07:25:15 2021: Debug: Message-Authenticator = > 0x9257e8cab94913463172d8be5663c80b > (3440) Sat Mar 27 07:25:15 2021: Debug: FreeRADIUS-Statistics-Type = 15 > (3440) Sat Mar 27 07:25:15 2021: Debug: # Executing group from file > /usr/local/pf/raddb/sites-enabled/status > (3440) Sat Mar 27 07:25:15 2021: Debug: Autz-Type Status-Server { > (3440) Sat Mar 27 07:25:15 2021: Debug: [ok] = ok > (3440) Sat Mar 27 07:25:15 2021: Debug: } # Autz-Type Status-Server = ok > (3440) Sat Mar 27 07:25:15 2021: Debug: Sent Access-Accept Id 51 from > 127.0.0.1:18121 to 127.0.0.1:51452 length 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: FreeRADIUS-Total-Access-Requests > = 3441 > (3440) Sat Mar 27 07:25:15 2021: Debug: FreeRADIUS-Total-Access-Accepts > = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: FreeRADIUS-Total-Access-Rejects > = 2 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Access-Challenges = 16 > (3440) Sat Mar 27 07:25:15 2021: Debug: FreeRADIUS-Total-Auth-Responses > = 18 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Auth-Duplicate-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Auth-Malformed-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Auth-Invalid-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Auth-Dropped-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Auth-Unknown-Types = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Accounting-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Accounting-Responses = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Acct-Duplicate-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Acct-Malformed-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Acct-Invalid-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Acct-Dropped-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Acct-Unknown-Types = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Accepts = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Rejects = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Access-Challenges = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Responses = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Duplicate-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Malformed-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Invalid-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Dropped-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Auth-Unknown-Types = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Accounting-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Accounting-Responses = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Duplicate-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Malformed-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Invalid-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Dropped-Requests = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: > FreeRADIUS-Total-Proxy-Acct-Unknown-Types = 0 > (3440) Sat Mar 27 07:25:15 2021: Debug: Finished request > (3440) Sat Mar 27 07:25:20 2021: Debug: Cleaning up request packet ID 51 > with timestamp +51321 > > *Joshua Wise* > Systems Engineer, Celina ISD > 469-742-9113 > https://www.celinaisd.com > > > On Fri, Mar 26, 2021 at 9:00 PM Durand fabrice via PacketFence-users < > packetfence-users@lists.sourceforge.net> wrote: > >> Hello Joshua, >> >> let's run that: >> >> raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3600 -c '( >> Calling-Station-Id =~ /78[-:]?4f[-:]?43[-:]?97[-:]?f5[-:]?fe/i )' >> >> >> And paste the output. >> >> Regards >> >> Fabrice >> >> >> Le 21-03-26 à 18 h 22, Joshua Wise via PacketFence-users a écrit : >> >> RADIUS Reply is empty. >> >> I ran the specified patch, restarted services, same error. >> >> *Joshua Wise* >> Systems Engineer, Celina ISD >> 469-742-9113 >> https://www.celinaisd.com >> >> >> On Fri, Mar 26, 2021 at 1:47 PM Ludovic Zammit <lzam...@inverse.ca> >> wrote: >> >>> I never seen that error message. >>> >>> It needs more investigation. >>> >>> What is the radius reply given by pf for that authentication ? Just >>> below the radius request. >>> >>> Did you patch your server with : >>> >>> /usr/local/pf/addons/pf-maint.pl >>> >>> Then restart all pf services: >>> >>> /usr/local/pf/bin/pfcmd service pf restart >>> >>> Thanks, >>> >>> Ludovic zammitlzam...@inverse.ca :: +1.514.447.4918 (x145) :: >>> www.inverse.ca >>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >>> (http://packetfence.org) >>> >>> >>> >>> >>> >>> On Mar 26, 2021, at 2:24 PM, Joshua Wise <joshuaw...@celinaisd.com> >>> wrote: >>> >>> RADIS Request Audit log: >>> >>> NAS-Port-Type = Wireless-802.11 PacketFence-Outer-User = " >>> testw...@celinaisd.com" PacketFence-Radius-Ip = "10.56.64.44" >>> Service-Type = Framed-User Called-Station-Id = "00-1A-1E-01-EC-98-cisd.1x" >>> State = 0x6f17c8406f1fd21550a9f72c8da28ab6 FreeRADIUS-Proxied-To = >>> 127.0.0.1 Realm = "default" NAS-IP-Address = 10.56.64.44 >>> PacketFence-NTLMv2-Only = "" Calling-Station-Id = "78:4f:43:97:f5:fe" >>> Aruba-Essid-Name = "cisd.1x" PacketFence-KeyBalanced = >>> "e779e78c1ea9a92dab5dc5d6d30a8dc7" PacketFence-Domain = "celinaisd" >>> Aruba-AP-Group = "CS701" User-Name = "testw...@celinaisd.com" >>> Aruba-Location-Id = "ADMIN-MDF-AP16" NAS-Identifier = "10.56.64.222" >>> Event-Timestamp = "Mar 25 2021 08:33:08 CDT" EAP-Message = >>> 0x020800511a0208004c316ec62dd3023b6ff16890ed459e79818b0000000000000000175ed1760cce67ff48491f88d067ce8bc17ec36c65b75de60074657374776966694063656c696e616973642e636f6d >>> Stripped-User-Name = "testwifi" NAS-Port = 0 Framed-MTU = 1100 EAP-Type = >>> MSCHAPv2 PacketFence-UserNameAttribute = "testw...@celinaisd.com" >>> Module-Failure-Message = "celinaisd: Attribute \"User-Password\" is >>> required for authentication" User-Password = "******" SQL-User-Name = " >>> testw...@celinaisd.com" >>> >>> *Joshua Wise* >>> Systems Engineer, Celina ISD >>> 469-742-9113 >>> https://www.celinaisd.com >>> >>> >>> On Fri, Mar 26, 2021 at 12:12 PM Ludovic Zammit <lzam...@inverse.ca> >>> wrote: >>> >>>> For that radius request, go check Auditing and show me the radius >>>> request. >>>> Thanks, >>>> >>>> >>>> Ludovic Zammit >>>> lzam...@inverse.ca :: +1.514.447.4918 (x145) :: www.inverse.ca >>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >>>> (http://packetfence.org) >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>> >>>> On Mar 26, 2021, at 8:43 AM, Joshua Wise <joshuaw...@celinaisd.com> >>>> wrote: >>>> >>>> Here we go: >>>> >>>> Mar 26 07:40:11 packetfence auth[2770]: (10350) Login incorrect >>>> (celinaisd: Attribute "User-Password" is required for authentication): [ >>>> testw...@celinaisd.com] (from client 10.56.64.222/32 port 0 cli >>>> 78:4f:43:97:f5:fe via TLS tunnel) >>>> Mar 26 07:40:11 packetfence auth[2770]: [mac:78:4f:43:97:f5:fe] >>>> Rejected user: testw...@celinaisd.com >>>> Mar 26 07:40:11 packetfence auth[2770]: (10351) Login incorrect >>>> (eap_peap: The users session was previously rejected: returning reject >>>> (again.)): [testw...@celinaisd.com] (from client 10.56.64.222/32 port >>>> 0 cli 78:4f:43:97:f5:fe) >>>> >>>> *Joshua Wise* >>>> Systems Engineer, Celina ISD >>>> 469-742-9113 >>>> https://www.celinaisd.com >>>> >>>> >>>> On Fri, Mar 26, 2021 at 7:00 AM Ludovic Zammit <lzam...@inverse.ca> >>>> wrote: >>>> >>>>> That’s not good, you should have something in the log related to that >>>>> Mac address. Try another computer or clear the cache info related to your >>>>> Mac in the wifi controller. >>>>> >>>>> Check: >>>>> >>>>> grep MAC_ADDRESS /usr/local/pf/logs/radius.log >>>>> >>>>> Use 00:11:22:33:44:55 for the Mac address format. >>>>> >>>>> Thanks, >>>>> >>>>> >>>>> Ludovic Zammit >>>>> lzam...@inverse.ca :: +1.514.447.4918 (x145) :: www.inverse.ca >>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >>>>> (http://packetfence.org) >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> On Mar 25, 2021, at 2:20 PM, Joshua Wise <joshuaw...@celinaisd.com> >>>>> wrote: >>>>> >>>>> I don't get a response when using that command. I can see the log file >>>>> exists, modifying with vi shows the following repeatedly. >>>>> >>>>> Mar 25 03:52:58 packetfence packetfence: pfperl-api(2202) INFO: Using >>>>> 300 resolution threshold (pf::pfcron::task::cluster_check::run) >>>>> Mar 25 03:52:58 packetfence packetfence: pfperl-api(2202) INFO: All >>>>> cluster members are running the same configuration version >>>>> (pf::pfcron::task::cluster_check::run) >>>>> Mar 25 03:52:58 packetfence packetfence: pfperl-api(2204) INFO: >>>>> processed 0 security_events during security_event maintenance >>>>> (1616662378.2789 1616662378.28441) >>>>> (pf::security_event::security_event_maintenance) >>>>> Mar 25 03:52:58 packetfence packetfence: pfperl-api(2204) INFO: >>>>> processed 0 security_events during security_event maintenance >>>>> (1616662378.2855 1616662378.2874) >>>>> (pf::security_event::security_event_maintenance) >>>>> Mar 25 03:53:58 packetfence packetfence: pfperl-api(2204) INFO: Using >>>>> 300 resolution threshold (pf::pfcron::task::cluster_check::run) >>>>> >>>>> *Joshua Wise* >>>>> Systems Engineer, Celina ISD >>>>> 469-742-9113 >>>>> https://www.celinaisd.com >>>>> >>>>> >>>>> On Thu, Mar 25, 2021 at 10:08 AM Ludovic Zammit <lzam...@inverse.ca> >>>>> wrote: >>>>> >>>>>> Give me the output of: >>>>>> >>>>>> grep MAC_ADDRESS /usr/local/pf/logs/packetfence.log >>>>>> >>>>>> Thanks, >>>>>> >>>>>> >>>>>> Ludovic Zammit >>>>>> lzam...@inverse.ca :: +1.514.447.4918 (x145) :: www.inverse.ca >>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence >>>>>> (http://packetfence.org) >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> On Mar 25, 2021, at 8:39 AM, Joshua Wise <joshuaw...@celinaisd.com> >>>>>> wrote: >>>>>> >>>>>> SSID type is 802.1x with WPA2-Enterprise. >>>>>> >>>>>> *Joshua Wise* >>>>>> Systems Engineer, Celina ISD >>>>>> 469-742-9113 >>>>>> https://www.celinaisd.com >>>>>> >>>>>> >>>>>> On Thu, Mar 25, 2021 at 7:08 AM Ludovic Zammit <lzam...@inverse.ca> >>>>>> wrote: >>>>>> >>>>>>> Hello, >>>>>>> >>>>>>> What’s your SSID type ? Open SSID or 8021.x with WPA2 Entreprise? >>>>>>> >>>>>>> Thanks, >>>>>>> >>>>>>> >>>>>>> Ludovic Zammit >>>>>>> lzam...@inverse.ca :: +1.514.447.4918 (x145) :: www.inverse.ca >>>>>>> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and >>>>>>> PacketFence (http://packetfence.org) >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> On Mar 24, 2021, at 3:06 PM, Joshua Wise via PacketFence-users < >>>>>>> packetfence-users@lists.sourceforge.net> wrote: >>>>>>> >>>>>>> I'm in the process of testing Packefence with our Aruba Controller. >>>>>>> I've added our on-prem Active Directory to Packetfence, and can test >>>>>>> authentication fine with pftest, no issues. >>>>>>> >>>>>>> I've configured our Aruba Controller with an 802.1x SSID, RADIUS, >>>>>>> etc. >>>>>>> >>>>>>> When I attempt to connect with username/password, it fails. I can >>>>>>> see in the RADIUS log that I get an error "Attribute "User-Password" is >>>>>>> required for authentication." >>>>>>> >>>>>>> Within that log, I can go to the RADIUS section and see: >>>>>>> User-Password = "******" >>>>>>> >>>>>>> This makes me think the password is being passed from our Controller >>>>>>> to Packetfence just fine. >>>>>>> >>>>>>> Not sure what I'm missing, any ideas or suggestions? >>>>>>> >>>>>>> *Joshua Wise* >>>>>>> Systems Engineer, Celina ISD >>>>>>> 469-742-9113 >>>>>>> https://www.celinaisd.com >>>>>>> _______________________________________________ >>>>>>> PacketFence-users mailing list >>>>>>> PacketFence-users@lists.sourceforge.net >>>>>>> https://lists.sourceforge.net/lists/listinfo/packetfence-users >>>>>>> >>>>>>> >>>>>>> >>>>>> >>>>> >>>> >>> >> >> _______________________________________________ >> PacketFence-users mailing >> listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users >> >> _______________________________________________ >> PacketFence-users mailing list >> PacketFence-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> > > > _______________________________________________ > PacketFence-users mailing > listPacketFence-users@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/packetfence-users > > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users