Hello Nathan,

Show me the output of:

grep 58:cb:52:37:5d:ab /usr/local/pf/logs/packetfence.log

Thanks,

Ludovic Zammit
lzam...@inverse.ca <mailto:lzam...@inverse.ca> ::  +1.514.447.4918 (x145) ::  
www.inverse.ca <https://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>) 
and PacketFence (http://packetfence.org <http://packetfence.org/>)







> On Apr 15, 2021, at 9:48 AM, Nathan, Josh via PacketFence-users 
> <packetfence-users@lists.sourceforge.net> wrote:
> 
> Hello,
> 
> So, I'm trying to configure a 10.2 Zen version of PF. Our user authentication 
> happens via RADIUS.  So I configured our RADIUS server under the "Internal 
> Sources" section, and everything is now "mostly" working.  My devices 
> authenticate, but the Authentication Rules don't seem to be taking effect.
> 
> When I try using the debug command for RADIUS (raddebug -f 
> /usr/local/pf/var/run/radiusd.sock -t 3600), here's what I get.  There must 
> be a setting I'm missing somewhere.  The packetfence.log file is effectively 
> silent on the issue.
> 
> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Processing response header
> (327) Thu Apr 15 15:40:43 2021: Debug: rest:   Status : 200 (OK)
> (327) Thu Apr 15 15:40:43 2021: Debug: rest:   Type   : json 
> (application/json)
> (327) Thu Apr 15 15:40:43 2021: Debug: rest: Parsing attribute 
> "control:PacketFence-Authorization-Status"
> (327) Thu Apr 15 15:40:43 2021: Debug: rest: EXPAND allow
> (327) Thu Apr 15 15:40:43 2021: Debug: rest:    --> allow
> (327) Thu Apr 15 15:40:43 2021: Debug: rest: PacketFence-Authorization-Status 
> := "allow"
> (327) Thu Apr 15 15:40:43 2021: Debug:     [rest] = updated
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent EAP Response (code 2) 
> ID 56 length 46
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Continuing tunnel setup
> (327) Thu Apr 15 15:40:43 2021: Debug:     [eap] = ok
> (327) Thu Apr 15 15:40:43 2021: Debug:   } # authorize = ok
> (327) Thu Apr 15 15:40:43 2021: Debug: Found Auth-Type = eap
> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing group from file 
> /usr/local/pf/raddb/sites-enabled/packetfence
> (327) Thu Apr 15 15:40:43 2021: Debug:   authenticate {
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Expiring EAP session with state 
> 0xce6b3ab6c75323c5
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Finished EAP session with state 
> 0xce6b3ab6c75323c5
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Previous EAP request found for 
> state 0xce6b3ab6c75323c5, released from the list
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Peer sent packet with method EAP 
> PEAP (25)
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Calling submodule eap_peap to 
> process data
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Continuing EAP-TLS
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls verify] = ok
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Done initial handshake
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: [eaptls process] = ok
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Session established.  
> Decoding tunneled attributes
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: PEAP state send tlv success
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Received EAP-TLV response
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Success
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap: Using saved attributes from 
> the original Access-Accept
> (327) Thu Apr 15 15:40:43 2021: Debug: eap_peap:   User-Name = "josh.nathan"
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Sending EAP Success (code 3) ID 
> 56 length 4
> (327) Thu Apr 15 15:40:43 2021: Debug: eap: Freeing handler
> (327) Thu Apr 15 15:40:43 2021: Debug:     [eap] = ok
> (327) Thu Apr 15 15:40:43 2021: Debug:   } # authenticate = ok
> (327) Thu Apr 15 15:40:43 2021: Debug: # Executing section post-auth from 
> file /usr/local/pf/raddb/sites-enabled/packetfence
> (327) Thu Apr 15 15:40:43 2021: Debug:   post-auth {
> (327) Thu Apr 15 15:40:43 2021: Debug:     update {
> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND %{Packet-Src-IP-Address}
> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 172.20.50.76
> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND %{Packet-Dst-IP-Address}
> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 172.20.104.31
> (327) Thu Apr 15 15:40:43 2021: Debug:     } # update = noop
> (327) Thu Apr 15 15:40:43 2021: Debug:     policy packetfence-set-tenant-id {
> (327) Thu Apr 15 15:40:43 2021: Debug:       if (!NAS-IP-Address || 
> NAS-IP-Address == "0.0.0.0"){
> (327) Thu Apr 15 15:40:43 2021: Debug:       if (!NAS-IP-Address || 
> NAS-IP-Address == "0.0.0.0") -> FALSE
> (327) Thu Apr 15 15:40:43 2021: Debug:       if ( 
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> (327) Thu Apr 15 15:40:43 2021: Debug:       EXPAND 
> %{%{control:PacketFence-Tenant-Id}:-0}
> (327) Thu Apr 15 15:40:43 2021: Debug:          --> 1
> (327) Thu Apr 15 15:40:43 2021: Debug:       if ( 
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")  -> FALSE
> (327) Thu Apr 15 15:40:43 2021: Debug:       if ( 
> &control:PacketFence-Tenant-Id == 0 ) {
> (327) Thu Apr 15 15:40:43 2021: Debug:       if ( 
> &control:PacketFence-Tenant-Id == 0 )  -> FALSE
> (327) Thu Apr 15 15:40:43 2021: Debug:     } # policy 
> packetfence-set-tenant-id = noop
> (327) Thu Apr 15 15:40:43 2021: Debug:     if 
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
> (327) Thu Apr 15 15:40:43 2021: Debug:     EXPAND 
> %{%{control:PacketFence-Proxied-From}:-False}
> (327) Thu Apr 15 15:40:43 2021: Debug:        --> False
> (327) Thu Apr 15 15:40:43 2021: Debug:     if 
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  -> FALSE
> (327) Thu Apr 15 15:40:43 2021: Debug:     if (! EAP-Type || (EAP-Type != 
> TTLS  && EAP-Type != PEAP) ) {
> (327) Thu Apr 15 15:40:43 2021: Debug:     if (! EAP-Type || (EAP-Type != 
> TTLS  && EAP-Type != PEAP) )  -> FALSE
> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth: 
> EXPAND %{User-Name}
> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth:    
> --> josh.nathan
> (327) Thu Apr 15 15:40:43 2021: Debug: attr_filter.packetfence_post_auth: 
> Matched entry DEFAULT at line 10
> (327) Thu Apr 15 15:40:43 2021: Debug:     
> [attr_filter.packetfence_post_auth] = updated
> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND 
> messages.%{%{reply:Packet-Type}:-default}
> (327) Thu Apr 15 15:40:43 2021: Debug: linelog:    --> messages.Access-Accept
> (327) Thu Apr 15 15:40:43 2021: Debug: linelog: EXPAND 
> [mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned 
> VLAN %{reply:Tunnel-Private-Group-ID}
> (327) Thu Apr 15 15:40:43 2021: Debug: linelog:    --> 
> [mac:58:cb:52:37:5d:ab] Accepted user: josh.nathan and returned VLAN
> (327) Thu Apr 15 15:40:43 2021: Debug:     [linelog] = ok
> (327) Thu Apr 15 15:40:43 2021: Debug:   } # post-auth = updated
> (327) Thu Apr 15 15:40:43 2021: Debug: Sent Access-Accept Id 229 from 
> 172.20.104.31:1812 <http://172.20.104.31:1812/> to 172.20.50.76:40485 
> <http://172.20.50.76:40485/> length 0
> (327) Thu Apr 15 15:40:43 2021: Debug:   User-Name = "josh.nathan"
> (327) Thu Apr 15 15:40:43 2021: Debug:   MS-MPPE-Recv-Key = 
> 0x600da060c2faa9fdf49eb732f5110f438b5d71f66e661345f268bf24252e85c3
> (327) Thu Apr 15 15:40:43 2021: Debug:   MS-MPPE-Send-Key = 
> 0x8d6d99afd78af3ebade3b3869adc9ceef8f9782d323d553bce8cf5c1511d05d1
> (327) Thu Apr 15 15:40:43 2021: Debug:   EAP-Message = 0x03380004
> (327) Thu Apr 15 15:40:43 2021: Debug:   Message-Authenticator = 
> 0x00000000000000000000000000000000
> (327) Thu Apr 15 15:40:43 2021: Debug: Finished request
> (317) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 219 with 
> timestamp +4564
> (318) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 220 with 
> timestamp +4564
> (319) Thu Apr 15 15:40:44 2021: Debug: Cleaning up request packet ID 221 with 
> timestamp +4564
> (328) Thu Apr 15 15:40:45 2021: Debug: Received Status-Server Id 161 from 
> 127.0.0.1:45116 <http://127.0.0.1:45116/> to 127.0.0.1:18121 
> <http://127.0.0.1:18121/> length 50
> (328) Thu Apr 15 15:40:45 2021: Debug:   Message-Authenticator = 
> 0x0630aabb861db1ebd2a0892a5d55941e
> (328) Thu Apr 15 15:40:45 2021: Debug:   FreeRADIUS-Statistics-Type = 15
> (328) Thu Apr 15 15:40:45 2021: Debug: # Executing group from file 
> /usr/local/pf/raddb/sites-enabled/status
> (328) Thu Apr 15 15:40:45 2021: Debug:   Autz-Type Status-Server {
> (328) Thu Apr 15 15:40:45 2021: Debug:     [ok] = ok
> (328) Thu Apr 15 15:40:45 2021: Debug:   } # Autz-Type Status-Server = ok
> (328) Thu Apr 15 15:40:45 2021: Debug: Sent Access-Accept Id 161 from 
> 127.0.0.1:18121 <http://127.0.0.1:18121/> to 127.0.0.1:45116 
> <http://127.0.0.1:45116/> length 0
> 
> 
> Thank you for any guidance you can give!
> 
>       
> Joshua Nathan
> IT Supervisor
> Black Forest Academy
> 
> p:    +49 (0) 7626 9161 631 m: +49 (0) 152 3452 0056
> a:
> w:    Hammersteiner Straße 50, 79400 Kandern
> bfacademy.de <http://bfacademy.de/>
> 
> 
> _______________________________________________
> PacketFence-users mailing list
> PacketFence-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/packetfence-users

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to