[prev in list] [next in list] [prev in thread] [next in thread] 

List:       packetfence-users
Subject:    Re: [PacketFence-users] MSCHAP and Local Auth
From:       Durand fabrice via PacketFence-users <packetfence-users () lists ! sourceforge ! net>
Date:       2020-10-31 1:16:52
Message-ID: a25e5504-dec9-e89d-ead0-223b36fdd847 () inverse ! ca
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Yes it looks that you made a typo in raddb/policy.d/packetfence


Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
/usr/local/pf/raddb/sites-enabled/packetfence[190]: Failed to parse
"packetfence-mschap-authenticate" entry.

Le 20-10-30 à 21 h 00, Enrique Gross a écrit  :
> Thanks Fabrice
> 
> I probably messed up something, and should start over with my testing
> setup, this isjournalctl when starting radiusd, i have been checking
> config files regarding sql modules, but with not luck.
> 
> Thanks, and good weekend
> 
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql_mysql: Starting connect to MySQL server
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql): Reserved connection (0)
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql): Released connection (0)
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (pfguest): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (pfsponsor): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (pfsms): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (pflocal): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_reject): groupmemb_query is empty.   Please delete it from
> the configuration
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_reject): authorize_check_query is empty.   Please delete
> it from the configuration
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_reject): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_degraded): groupmemb_query is empty.   Please delete it
> from the configuration
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_degraded): Ignoring read_groups as group_membership_query
> is not configured
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_degraded): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_mschap (mschap): authenticating by calling 'ntlm_auth'
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_mschap (chrooted_mschap): authenticating by calling 'ntlm_auth'
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_mschap (chrooted_mschap_machine): authenticating by calling
> 'ntlm_auth'
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_mschap (mschap_machine): authenticating by calling 'ntlm_auth'
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_mschap (mschap_local): using internal authentication
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/policy.d/packetfence[15]: "sql" modules aren't
> allowed in 'authenticate' sections -- they have no such method.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/policy.d/packetfence[15]: Failed to parse
> "pflocal" entry.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/policy.d/packetfence[145]: Failed to parse
> "packetfence-local-auth" entry.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/policy.d/packetfence[144]: Failed to parse "else"
> subsection.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/policy.d/packetfence[140]: Failed to parse "else"
> subsection.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/sites-enabled/packetfence[190]: Failed to parse
> "packetfence-mschap-authenticate" entry.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> systemd[1]:
> packetfence-radiusd-auth.service: control process exited, code=exited
> status=1
> 
> El vie., 30 oct. 2020 a las 19:59, Durand fabrice (<fdurand@inverse.ca
> <mailto:fdurand@inverse.ca>>) escribió:
> 
> Hello Enrique,
> 
> i did the same on my side and i am able to restart radiusd.
> 
> Take a look at journalctl to see why it fail to start.
> 
> Regards
> 
> Fabrice
> 
> 
> Le 20-10-30 à 14 h 44, Enrique Gross a écrit  :
> > Hi all!
> > 
> > Thanks for your help Fabrice
> > 
> > When changing function to packetfence-local-auth, radius-auth
> fails to
> > start, i am not getting so much info of radius.log
> > 
> > Oct 30 18:39:09 pf auth[7031]: Signalled to terminate
> > Oct 30 18:39:09 pf auth[7031]: Exiting normally
> > Oct 30 18:39:09 pf auth[7031]: rlm_perl: rlm_perl::Detaching.
> Reloading. Done.
> > Oct 30 18:39:09 pf auth[7031]: rlm_perl: rlm_perl::Detaching.
> Reloading. Done.
> > 
> > And packetfence.log
> > 
> > Oct 30 18:39:09 pf packetfence: pfperl-api(2390) INFO: Stopping
> > radiusd-auth with pid 7031 (pf::services::manager::stopService)
> > Oct 30 18:39:09 pf packetfence: pfperl-api(2390) INFO: child
> exited with value 0
> > (pf::services::manager::stopService)
> > Oct 30 18:39:14 pf packetfence: pfperl-api(2394) INFO: Daemon
> > radiusd-auth took 2.123 seconds to start.
> > (pf::services::manager::launchService)
> > 
> > Thanks!
> > 
> > 
> > El jue., 29 oct. 2020 a las 21:57, Durand fabrice
> > (<fdurand@inverse.ca <mailto:fdurand@inverse.ca>>) escribió:
> > > Hello Enrique,
> > > 
> > > sorry for the late reply.
> > > 
> > > So ppp mschap with local pf account is not really implemented.
> > > 
> > > What you can try is to edit
> /usr/local/pf/raddb/policy.d/packetfence and find the following
> function:
> > > 
> > > packetfence-mschap-authenticate {
> > > if(PacketFence-Domain) {
> > > if ( "%{User-Name}" =~ /^host\/.*/) {
> > > chrooted_mschap_machine
> > > }
> > > else {
> > > chrooted_mschap
> > > }
> > > }
> > > else {
> > > if ( "%{User-Name}" =~ /^host\/.*/) {
> > > mschap_machine
> > > }
> > > else {
> > > mschap
> > > }
> > > }
> > > }
> > > 
> > > 
> > > and replace it with:
> > > 
> > > packetfence-mschap-authenticate {
> > > if(PacketFence-Domain) {
> > > if ( "%{User-Name}" =~ /^host\/.*/) {
> > > chrooted_mschap_machine
> > > }
> > > else {
> > > chrooted_mschap
> > > }
> > > }
> > > else {
> > > if ( "%{User-Name}" =~ /^host\/.*/) {
> > > mschap_machine
> > > }
> > > else {
> > > packetfence-local-auth
> > > }
> > > }
> > > }
> > > 
> > > Then restart radius and retry.
> > > 
> > > Let me know if it works.
> > > 
> > > Regards
> > > 
> > > Fabrice
> > > 
> > > 
> > > Le 20-10-26 à 12 h 15, Enrique Gross a écrit :
> > > 
> > > Thanks Fabrice
> > > 
> > > raddebug output:
> > > 
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Received Access-Request
> Id 132 from X.X.X.X:55645 to X.X.X.X:1812 length 191
> > > (727) Mon Oct 26 15:54:22 2020: Debug:     Service-Type = Framed-User
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   Framed-Protocol = PPP
> > > (727) Mon Oct 26 15:54:22 2020: Debug:     NAS-Port = 39
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   NAS-Port-Type = Virtual
> > > (727) Mon Oct 26 15:54:22 2020: Debug:     User-Name = "coyo"
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   Calling-Station-Id >     "X.X.X.X"
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   Called-Station-Id >     "X.X.X.X"
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   Acct-Session-Id >     "81d00cdf"
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   MS-CHAP-Challenge >     \
> > > 0xebf6d832753d4fdf8383548a74da2637 (727) Mon Oct 26 15:54:22 2020: Debug:   \
> > > MS-CHAP2-Response >     \
> > > 0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5
> > >  (727) Mon Oct 26 15:54:22 2020: Debug:   NAS-Identifier >     "MK-IBERA2"
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   NAS-IP-Address = X.X.X.X
> > > (727) Mon Oct 26 15:54:22 2020: Debug: # Executing section
> authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
> > > (727) Mon Oct 26 15:54:22 2020: Debug:     authorize {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy
> packetfence-nas-ip-address {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> packetfence-nas-ip-address = notfound
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        update {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           EXPAND
> %{Packet-Src-IP-Address}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> X.X.X.X
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           EXPAND
> %{Packet-Dst-IP-Address}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> X.X.X.X
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           EXPAND %l
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> 1603738462
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # update = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy
> packetfence-set-realm-if-machine {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i)   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> packetfence-set-realm-if-machine = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy
> packetfence-balanced-key-policy {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (&PacketFence-KeyBalanced && (&PacketFence-KeyBalanced =~
> /^(.*)(.)$/i)) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (&PacketFence-KeyBalanced && (&PacketFence-KeyBalanced =~
> /^(.*)(.)$/i))   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              update {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   EXPAND
> %{md5:%{Calling-Station-Id}%{User-Name}}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: -->
> 865fdf018805bc0bc5fbb22eaa6b0a60
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   EXPAND
> %{md5:%{Calling-Station-Id}%{User-Name}}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: -->
> 865fdf018805bc0bc5fbb22eaa6b0a60
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              } # update = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           } # else = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> packetfence-balanced-key-policy = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy
> packetfence-set-tenant-id {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> 0
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")   -> TRUE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")   {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              update control {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   EXPAND %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   SQL-User-Name set to 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   Executing select
> query:   SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE
> nasname = 'X.X.X.X'), 0)
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   EXPAND %{sql: SELECT
> IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname >     '%{NAS-IP-Address}'), \
> 0)}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> 1
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              } # update
> control = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           } # if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")   = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (
> &control:PacketFence-Tenant-Id == 0 ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (
> &control:PacketFence-Tenant-Id == 0 )   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> packetfence-set-tenant-id = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy
> rewrite_calling_station_id {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (&Calling-Station-Id && (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>  {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (&Calling-Station-Id && (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>                 
> -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              [noop] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           } # else = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> rewrite_calling_station_id = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy
> rewrite_called_station_id {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> ((&Called-Station-Id) && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>  {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> ((&Called-Station-Id) && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>                 
> -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              [noop] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           } # else = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> rewrite_called_station_id = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if (
> "%{client:shortname}" =~ /eduroam_tlrs/ ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        EXPAND
> %{client:shortname}
> > > (727) Mon Oct 26 15:54:22 2020: Debug:            --> X.X.X.X/32
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if (
> "%{client:shortname}" =~ /eduroam_tlrs/ )   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy filter_username {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (&User-Name) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (&User-Name)  
> -> TRUE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (&User-Name)   {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> =~ / /) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> =~ / /)   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> =~ /@[^@]*@/ ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> =~ /@[^@]*@/ )   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> =~ /\.\./ ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> =~ /\.\./ )   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if ((&User-Name
> =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))   {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if ((&User-Name
> =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))     -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> =~ /\.$/)   {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> =~ /\.$/)     -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> =~ /@\./)   {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> =~ /@\./)     -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           } # if
> (&User-Name)   = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> filter_username = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy filter_password {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (&User-Password
> &&     (&User-Password != "%{string:User-Password}")) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (&User-Password
> &&     (&User-Password != "%{string:User-Password}"))   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> filter_password = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   [preprocess] = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Found MS-CHAP
> attributes.   Setting 'Auth-Type   = mschap'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        [mschap] = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug: suffix: Checking for
> suffix after "@"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: suffix: No '@' in
> User-Name = "coyo", skipping NULL due to config.
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        [suffix] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: Checking for
> prefix before "\"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: No '\' in
> User-Name = "coyo", looking up realm NULL
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: Found realm "null"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: Adding
> Stripped-User-Name = "coyo"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: Adding Realm >     "null"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: Authentication
> realm is LOCAL
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        [ntdomain] = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if (Realm =~
> /default/) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if (Realm =~
> /default/)   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        elsif (Realm =~
> /local/) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        elsif (Realm =~
> /local/)   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        elsif (Realm =~
> /null/) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        elsif (Realm =~
> /null/)   -> TRUE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        elsif (Realm =~
> /null/)   {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: PEAP: No EAP-Message,
> not doing EAP
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           [PEAP] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # elsif (Realm =~
> /null/)   = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        ... skipping else:
> Preceding "if" was taken
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if ( !EAP-Message &&
> "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        EXPAND
> %{%{Control:Auth-type}:-No-MS_CHAP}
> > > (727) Mon Oct 26 15:54:22 2020: Debug:            --> MS-CHAP
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if ( !EAP-Message &&
> "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP")   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if
> (Control:Auth-type == "MS-CHAP") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if
> (Control:Auth-type == "MS-CHAP")   -> TRUE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if
> (Control:Auth-type == "MS-CHAP")   {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'User-Name'} >     &request:User-Name -> \
> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'NAS-IP-Address'} >     \
> &request:NAS-IP-Address -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'NAS-Port'} >     &request:NAS-Port -> \
> '39'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'Service-Type'} >     \
> &request:Service-Type -> 'Framed-User'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'Framed-Protocol'} >     \
> &request:Framed-Protocol -> 'PPP'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'Called-Station-Id'} >     \
> &request:Called-Station-Id -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'Calling-Station-Id'} >     \
> &request:Calling-Station-Id -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'NAS-Identifier'} >     \
> &request:NAS-Identifier -> 'MK-IBERA2'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'NAS-Port-Type'} >     \
> &request:NAS-Port-Type -> 'Virtual'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'Acct-Session-Id'} >     \
> &request:Acct-Session-Id -> '81d00cdf'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'Event-Timestamp'} >     \
> &request:Event-Timestamp -> 'Oct 26 2020 15:54:22 -03'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'MS-CHAP-Challenge'} >     \
> &request:MS-CHAP-Challenge -> '0xebf6d832753d4fdf8383548a74da2637'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'MS-CHAP2-Response'} >     \
> &request:MS-CHAP2-Response -> \
> '0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5'
> 
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'Stripped-User-Name'} >     \
> &request:Stripped-User-Name -> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'Realm'} = &request:Realm
> -> 'null'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_REQUEST{'SQL-User-Name'} >     \
> &request:SQL-User-Name -> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:
> $RAD_REQUEST{'FreeRADIUS-Client-IP-Address'} >     \
> &request:FreeRADIUS-Client-IP-Address -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_REQUEST{'PacketFence-KeyBalanced'}
> = &request:PacketFence-KeyBalanced ->
> '865fdf018805bc0bc5fbb22eaa6b0a60'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_REQUEST{'PacketFence-Radius-Ip'} >     \
> &request:PacketFence-Radius-Ip -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_CHECK{'Auth-Type'} >     &control:Auth-Type -> \
> 'MS-CHAP'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_CHECK{'Load-Balance-Key'} >     \
> &control:Load-Balance-Key -> '865fdf018805bc0bc5fbb22eaa6b0a60'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_CHECK{'Tmp-Integer-0'} >     \
> &control:Tmp-Integer-0 -> '1603738462'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CHECK{'PacketFence-RPC-Server'} >     \
> &control:PacketFence-RPC-Server -> '127.0.0.1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_CHECK{'PacketFence-RPC-Port'} >     \
> &control:PacketFence-RPC-Port -> '7070'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_CHECK{'PacketFence-RPC-User'} >     \
> &control:PacketFence-RPC-User -> ''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_CHECK{'PacketFence-RPC-Pass'} >     \
> &control:PacketFence-RPC-Pass -> ''''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CHECK{'PacketFence-RPC-Proto'} >     \
> &control:PacketFence-RPC-Proto -> 'http'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CHECK{'PacketFence-Request-Time'}
> = &control:PacketFence-Request-Time -> '0'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CHECK{'PacketFence-Tenant-Id'} >     \
> &control:PacketFence-Tenant-Id -> '1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_CONFIG{'Auth-Type'} >     &control:Auth-Type -> \
> 'MS-CHAP'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_CONFIG{'Load-Balance-Key'} >     \
> &control:Load-Balance-Key -> '865fdf018805bc0bc5fbb22eaa6b0a60'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:     $RAD_CONFIG{'Tmp-Integer-0'} >     \
> &control:Tmp-Integer-0 -> '1603738462'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CONFIG{'PacketFence-RPC-Server'} >     \
> &control:PacketFence-RPC-Server -> '127.0.0.1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CONFIG{'PacketFence-RPC-Port'} >     \
> &control:PacketFence-RPC-Port -> '7070'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CONFIG{'PacketFence-RPC-User'} >     \
> &control:PacketFence-RPC-User -> ''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CONFIG{'PacketFence-RPC-Pass'} >     \
> &control:PacketFence-RPC-Pass -> ''''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CONFIG{'PacketFence-RPC-Proto'} >     \
> &control:PacketFence-RPC-Proto -> 'http'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CONFIG{'PacketFence-Request-Time'}
> = &control:PacketFence-Request-Time -> '0'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:   $RAD_CONFIG{'PacketFence-Tenant-Id'} >     \
> &control:PacketFence-Tenant-Id -> '1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:NAS-Port-Type >     \
> $RAD_REQUEST{'NAS-Port-Type'} -> 'Virtual'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Acct-Session-Id >     \
> $RAD_REQUEST{'Acct-Session-Id'} -> '81d00cdf'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:PacketFence-Radius-Ip >     \
> $RAD_REQUEST{'PacketFence-Radius-Ip'} -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Service-Type >     $RAD_REQUEST{'Service-Type'} \
> -> 'Framed-User'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Called-Station-Id >     \
> $RAD_REQUEST{'Called-Station-Id'} -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Realm = $RAD_REQUEST{'Realm'}
> -> 'null'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:NAS-IP-Address >     \
> $RAD_REQUEST{'NAS-IP-Address'} -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:SQL-User-Name >     \
> $RAD_REQUEST{'SQL-User-Name'} -> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:PacketFence-NTLMv2-Only >     \
> $RAD_REQUEST{'PacketFence-NTLMv2-Only'} -> ''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Calling-Station-Id >     \
> $RAD_REQUEST{'Calling-Station-Id'} -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:PacketFence-KeyBalanced >     \
> $RAD_REQUEST{'PacketFence-KeyBalanced'} -> '865fdf018805bc0bc5fbb22eaa6b0a60'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:FreeRADIUS-Client-IP-Address >     \
> $RAD_REQUEST{'FreeRADIUS-Client-IP-Address'} -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:MS-CHAP-Challenge >     \
> $RAD_REQUEST{'MS-CHAP-Challenge'} -> '0xebf6d832753d4fdf8383548a74da2637'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Framed-Protocol >     \
> $RAD_REQUEST{'Framed-Protocol'} -> 'PPP'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:User-Name >     $RAD_REQUEST{'User-Name'} -> \
> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:NAS-Identifier >     \
> $RAD_REQUEST{'NAS-Identifier'} -> 'MK-IBERA2'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Event-Timestamp >     \
> $RAD_REQUEST{'Event-Timestamp'} -> 'Oct 26 2020 15:54:22 -03'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:MS-CHAP2-Response >     \
> $RAD_REQUEST{'MS-CHAP2-Response'} -> \
> '0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5'
> 
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:NAS-Port >     $RAD_REQUEST{'NAS-Port'} -> '39'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Stripped-User-Name >     \
> $RAD_REQUEST{'Stripped-User-Name'} -> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:Load-Balance-Key >     \
> $RAD_CHECK{'Load-Balance-Key'} -> '865fdf018805bc0bc5fbb22eaa6b0a60'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-RPC-Server >     \
> $RAD_CHECK{'PacketFence-RPC-Server'} -> '127.0.0.1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-Tenant-Id >     \
> $RAD_CHECK{'PacketFence-Tenant-Id'} -> '1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-RPC-User >     \
> $RAD_CHECK{'PacketFence-RPC-User'} -> ''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-Request-Time >     \
> $RAD_CHECK{'PacketFence-Request-Time'} -> '0'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:Auth-Type >     $RAD_CHECK{'Auth-Type'} -> \
> 'MS-CHAP'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-RPC-Pass >     \
> $RAD_CHECK{'PacketFence-RPC-Pass'} -> ''''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:Tmp-Integer-0 >     $RAD_CHECK{'Tmp-Integer-0'} \
> -> '1603738462'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-RPC-Proto >     \
> $RAD_CHECK{'PacketFence-RPC-Proto'} -> 'http'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-RPC-Port >     \
> $RAD_CHECK{'PacketFence-RPC-Port'} -> '7070'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> [packetfence-multi-domain] = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # if
> (Control:Auth-type == "MS-CHAP")   = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy
> packetfence-eap-mac-policy {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if ( &EAP-Type ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if ( &EAP-Type )  
> -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           [noop] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> packetfence-eap-mac-policy = noop
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap:
> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!! Ignoring
> control:User-Password.   Update your            !!!
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!! configuration
> so that the "known good" clear text !!!
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!! password is
> in Cleartext-Password and NOT in            !!!
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!!
> User-Password.                                                         !!!
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap:
> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        [pap] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:     } # authorize = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Found Auth-Type = MS-CHAP
> > > (727) Mon Oct 26 15:54:22 2020: Debug: # Executing group from
> file /usr/local/pf/raddb/sites-enabled/packetfence
> > > (727) Mon Oct 26 15:54:22 2020: Debug:     Auth-Type MS-CHAP {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy
> packetfence-mschap-authenticate {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (PacketFence-Domain) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (PacketFence-Domain)   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (
> "%{User-Name}" =~ /^host\/.*/) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              EXPAND %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (
> "%{User-Name}" =~ /^host\/.*/)   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Creating
> challenge hash with username: coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Client is using
> MS-CHAPv2
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Executing:
> /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --      
> --request-nt-key
> --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}}
>                 
> --challenge=%{mschap:Challenge:-00}
> --nt-response=%{mschap:NT-Response:-00}:
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
> --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}}
> 
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: --> --username=coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Creating
> challenge hash with username: coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
> --challenge=%{mschap:Challenge:-00}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: -->
> --challenge4bcfae02f18a60
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
> --nt-response=%{mschap:NT-Response:-00}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: -->
> --nt-response´4e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5
> > > (727) Mon Oct 26 15:54:22 2020: ERROR: mschap: Program returned
> code (1) and output 'Reading winbind reply failed! (0xc0000001)'
> > > (727) Mon Oct 26 15:54:22 2020: ERROR: mschap: Reading winbind
> reply failed! (0xc0000001)
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Authentication
> failed
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   [mschap] = fail
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              } # else = fail
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           } # else = fail
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> packetfence-mschap-authenticate = fail
> > > (727) Mon Oct 26 15:54:22 2020: Debug:     } # Auth-Type MS-CHAP
> = fail
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Failed to authenticate
> the user
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Using Post-Auth-Type Reject
> > > (727) Mon Oct 26 15:54:22 2020: Debug: # Executing group from
> file /usr/local/pf/raddb/sites-enabled/packetfence
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   Post-Auth-Type REJECT {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy
> packetfence-set-tenant-id {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> 1
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (
> &control:PacketFence-Tenant-Id == 0 ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if (
> &control:PacketFence-Tenant-Id == 0 )   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> packetfence-set-tenant-id = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        update {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # update = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if (! EAP-Type ||
> (EAP-Type != TTLS   && EAP-Type != PEAP) ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if (! EAP-Type ||
> (EAP-Type != TTLS   && EAP-Type != PEAP) ) -> TRUE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if (! EAP-Type ||
> (EAP-Type != TTLS   && EAP-Type != PEAP) ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           policy
> packetfence-audit-log-reject {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> && (&User-Name == "dummy")) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              if (&User-Name
> && (&User-Name == "dummy"))   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   policy request-timing {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:                    if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   EXPAND
> %{%{control:PacketFence-Request-Time}:-0}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> 0
> > > (727) Mon Oct 26 15:54:22 2020: Debug:                    if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0)   -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:                 } # policy
> request-timing = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: EXPAND
> type.reject.query
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: -->
> type.reject.query
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: Using query
> template 'query'
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: EXPAND
> %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: --> coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
> SQL-User-Name set to 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: EXPAND
> INSERT INTO radius_audit_log                       ( mac, ip,
> computer_name, user_name,                        stripped_user_name,
> realm, event_type,                        switch_id, switch_mac,
> switch_ip_address,                        radius_source_ip_address,
> called_station_id, calling_station_id, nas_port_type, ssid,
> nas_port_id,                        ifindex, nas_port, connection_type,     
> nas_ip_address, nas_identifier, auth_status,              
> reason, auth_type, eap_type,                        role,
> node_status, profile,          source, auto_reg, is_phone,                 
> pf_domain, uuid, radius_request,                        radius_reply,
> request_time, tenant_id, radius_ip)                     VALUES            (
> '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
> '%{%{control:PacketFence-Computer-Name}:-N/A}',
> '%{request:User-Name}', '%{request:Stripped-User-Name}',
> '%{request:Realm}', 'Radius-Access-Request',
> '%{%{control:PacketFence-Switch-Id}:-N/A}',
> '%{%{control:PacketFence-Switch-Mac}:-N/A}',
> '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',      
> '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
> '%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}',
> '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
> '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
> '%{%{control:PacketFence-Connection-Type}:-N/A}',   
> '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',
> 'Reject',                          '%{request:Module-Failure-Message}',
> '%{control:Auth-Type}', '%{request:EAP-Type}',
> '%{%{control:PacketFence-Role}:-N/A}',
> '%{%{control:PacketFence-Status}:-N/A}',
> '%{%{control:PacketFence-Profile}:-N/A}',
> '%{%{control:PacketFence-Source}:-N/A}',
> '%{%{control:PacketFence-AutoReg}:-0}',
> '%{%{control:PacketFence-IsPhone}:-0}',
> '%{request:PacketFence-Domain}', '',
> '%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
> '%{%{control:PacketFence-Request-Time}:-N/A}',
> '%{control:PacketFence-Tenant-Id}',
> '%{request:PacketFence-Radius-Ip}')
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: --> INSERT
> INTO radius_audit_log                       ( mac, ip, computer_name,
> user_name,                        stripped_user_name, realm, event_type,  
> switch_id, switch_mac, switch_ip_address,                 
> radius_source_ip_address, called_station_id,
> calling_station_id, nas_port_type, ssid, nas_port_id,                    
> ifindex, nas_port, connection_type,                       
> nas_ip_address, nas_identifier, auth_status,                       
> reason, auth_type, eap_type,                        role, node_status,
> profile,          source, auto_reg, is_phone,                       
> pf_domain, uuid, radius_request,                        radius_reply,
> request_time, tenant_id, radius_ip)                     VALUES            (
> 'X.X.X.X', '', 'N/A', 'coyo',                        'coyo', 'null',
> 'Radius-Access-Request',                        'N/A', 'N/A', 'N/A',        
> 'X.X.X.X', 'X.X.X.X', 'X.X.X.X',             'Virtual', '',
> '',                        'N/A', '39', 'N/A',                      'X.X.X.X',
> 'MK-IBERA2',   'Reject',      'mschap: Program returned code (1) and
> output 'Reading winbind reply failed! (0xc0000001)'',
> 'MS-CHAP', '',                'N/A', 'N/A', 'N/A',                       
> 'N/A', '0', '0',                        '', '', 'NAS-Port-Type =
> Virtual, Acct-Session-Id = "81d00cdf", PacketFence-Radius-Ip
> = "X.X.X.X", Service-Type = Framed-User, Called-Station-Id
> = "X.X.X.X", Realm = "null", NAS-IP-Address =
> X.X.X.X, PacketFence-NTLMv2-Only = "", Calling-Station-Id
> = "X.X.X.X", PacketFence-KeyBalanced =
> "865fdf018805bc0bc5fbb22eaa6b0a60",
> FreeRADIUS-Client-IP-Address = X.X.X.X, MS-CHAP-Challenge =
> 0xebf6d832753d4fdf8383548a74da2637, Framed-Protocol = PPP,
> User-Name = "coyo", NAS-Identifier = "MK-IBERA2",
> Event-Timestamp = "Oct 26 2020 15:54:22 -03",
> MS-CHAP2-Response =
> 0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5,
>  NAS-Port = 39, Stripped-User-Name = "coyo",
> Module-Failure-Message = "mschap: Program returned code (1)
> and output 'Reading winbind reply failed! (0xc0000001)'",
> Module-Failure-Message = "mschap: Reading winbind reply
> failed! (0xc0000001)", User-Password =
> "******", SQL-User-Name =
> "coyo"','MS-CHAP-Error = "\001E=691 R=0
> C=c86ce57de86611d248ddad2f2eb690ab V=3 M=Authentication
> failed"', '0', '1', 'X.X.X.X')
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: Executing
> query: INSERT INTO radius_audit_log                       ( mac, ip,
> computer_name, user_name, stripped_user_name,   realm, event_type,
> switch_id, switch_mac, switch_ip_address,
> radius_source_ip_address, called_station_id, calling_station_id,  
> nas_port_type, ssid, nas_port_id,                       
> ifindex, nas_port, connection_type,                        nas_ip_address,
> nas_identifier, auth_status,                        reason, auth_type,
> eap_type,                        role, node_status, profile,          source,
> auto_reg, is_phone,                        pf_domain, uuid,
> radius_request,                        radius_reply, request_time,
> tenant_id, radius_ip)                     VALUES            ( 'X.X.X.X', '',
> 'N/A', 'coyo',                        'coyo', 'null',
> 'Radius-Access-Request',                        'N/A', 'N/A', 'N/A',        
> 'X.X.X.X', 'X.X.X.X', 'X.X.X.X',             'Virtual', '',
> '',                        'N/A', '39', 'N/A',                      'X.X.X.X',
> 'MK-IBERA2',   'Reject',      'mschap: Program returned code (1) and
> output 'Reading winbind reply failed! (0xc0000001)'',
> 'MS-CHAP', '',                'N/A', 'N/A', 'N/A',                       
> 'N/A', '0', '0',                        '', '', 'NAS-Port-Type =
> Virtual, Acct-Session-Id = "81d00cdf", PacketFence-Radius-Ip
> = "X.X.X.X", Service-Type = Framed-User, Called-Station-Id
> = "X.X.X.X", Realm = "null", NAS-IP-Address =
> X.X.X.X, PacketFence-NTLMv2-Only = "", Calling-Station-Id
> = "X.X.X.X", PacketFence-KeyBalanced =
> "865fdf018805bc0bc5fbb22eaa6b0a60",
> FreeRADIUS-Client-IP-Address = X.X.X.X, MS-CHAP-Challenge =
> 0xebf6d832753d4fdf8383548a74da2637, Framed-Protocol = PPP,
> User-Name = "coyo", NAS-Identifier = "MK-IBERA2",
> Event-Timestamp = "Oct 26 2020 15:54:22 -03",
> MS-CHAP2-Response =
> 0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5,
>  NAS-Port = 39, Stripped-User-Name = "coyo",
> Module-Failure-Message = "mschap: Program returned code (1)
> and output 'Reading winbind reply failed! (0xc0000001)'",
> Module-Failure-Message = "mschap: Reading winbind reply
> failed! (0xc0000001)", User-Password =
> "******", SQL-User-Name =
> "coyo"','MS-CHAP-Error = "\001E=691 R=0
> C=c86ce57de86611d248ddad2f2eb690ab V=3 M=Authentication
> failed"', '0', '1', 'X.X.X.X')
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: SQL query
> returned: success
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: 1 record(s)
> updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug:   [sql_reject] = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              } # else = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           } # policy
> packetfence-audit-log-reject = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # if (! EAP-Type
> > > (EAP-Type != TTLS   && EAP-Type != PEAP) ) = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        EXPAND
> %{%{control:PacketFence-Proxied-From}:-False}
> > > (727) Mon Oct 26 15:54:22 2020: Debug:            --> False
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.access_reject: EXPAND %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.access_reject:      --> coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.access_reject: Matched entry DEFAULT at line 11
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> [attr_filter.access_reject] = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.packetfence_post_auth: EXPAND %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.packetfence_post_auth:      --> coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> [attr_filter.packetfence_post_auth] = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        [eap] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        policy
> remove_reply_message_if_eap {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (&reply:EAP-Message && &reply:Reply-Message) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           if
> (&reply:EAP-Message && &reply:Reply-Message) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:              [noop] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:           } # else = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
> remove_reply_message_if_eap = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: linelog: EXPAND
> messages.%{%{reply:Packet-Type}:-default}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: linelog: -->
> messages.Access-Reject
> > > (727) Mon Oct 26 15:54:22 2020: Debug: linelog: EXPAND
> [mac:%{Calling-Station-Id}] Rejected user: %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: linelog: -->
> [mac:X.X.X.X] Rejected user: coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug:        [linelog] = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug:     } # Post-Auth-Type
> REJECT = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Delaying response for
> 1.000000 seconds
> > > (727) Mon Oct 26 15:54:23 2020: Debug: (727) Discarding
> duplicate request from client X.X.X.X/32 port 55645 - ID: 132 due
> to delayed response
> > > (727) Mon Oct 26 15:54:23 2020: Debug: Sending delayed response
> > > (727) Mon Oct 26 15:54:23 2020: Debug: Sent Access-Reject Id
> 132 from X.X.X.X:1812 to X.X.X.X:55645 length 101
> > > (727) Mon Oct 26 15:54:23 2020: Debug:   MS-CHAP-Error >     "\001Ei1 R=0 \
> > > CÈ6ce57de86611d248ddad2f2eb690ab V=3
> M=Authentication failed"
> > > (727) Mon Oct 26 15:54:27 2020: Debug: Cleaning up request
> packet ID 132 with timestamp +10785
> > > (728) Mon Oct 26 15:54:30 2020: Debug: Received Status-Server
> Id 199 from 127.0.0.1:50706 <http://127.0.0.1:50706> to
> 127.0.0.1:18121 <http://127.0.0.1:18121> length 50
> > > (728) Mon Oct 26 15:54:30 2020: Debug:   Message-Authenticator >     \
> > > 0x746e4169562dc5520ee77b953ef0ac7b (728) Mon Oct 26 15:54:30 2020: Debug:
> FreeRADIUS-Statistics-Type = 15
> > > (728) Mon Oct 26 15:54:30 2020: Debug: # Executing group from
> file /usr/local/pf/raddb/sites-enabled/status
> > > (728) Mon Oct 26 15:54:30 2020: Debug:     Autz-Type Status-Server {
> > > (728) Mon Oct 26 15:54:30 2020: Debug:        [ok] = ok
> > > (728) Mon Oct 26 15:54:30 2020: Debug:     } # Autz-Type
> Status-Server = ok
> > > 
> > > El lun., 26 oct. 2020 a las 12:39, Fabrice Durand via
> PacketFence-users (<packetfence-users@lists.sourceforge.net
> <mailto:packetfence-users@lists.sourceforge.net>>) escribió:
> > > > Hello Enrique,
> > > > 
> > > > can you provide the raddebug output ?
> > > > 
> > > > raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000
> > > > 
> > > > 
> > > > Regards
> > > > 
> > > > Fabrice
> > > > 
> > > > 
> > > > Le 20-10-26 Ã  09 h 42, Enrique Gross via PacketFence-users a
> écrit :
> > > > > Hi Packetfence Users,
> > > > > 
> > > > > Hope you are doing fine
> > > > > 
> > > > > I am struggling to authenticate PPP users via MSCHAP with
> local PF
> > > > > authentication, my switch is a Mikrotik device, I am forwarding
> > > > > authentication via Radius to packetfence server.
> > > > > 
> > > > > I am getting error
> > > > > 
> > > > > (144) Login incorrect (mschap: Program returned code (1) and
> output
> > > > > 'Reading winbind reply failed!
> > > > > 
> > > > > When I disable MSCHAP/CHAP as an authentication method and
> use PAP my
> > > > > users can authenticate fine.
> > > > > 
> > > > > I have uncomment
> /usr/local/pf/conf/radiusd/packetfence-tunnel and
> > > > > Take care of the "Database passwords hashing method"
> > > > > 
> > > > > I will really appreciate any help
> > > > > 
> > > > > Thanks, Enrique
> > > > > 
> > > > > --
> > > > > 
> > > > > 
> > > > > _______________________________________________
> > > > > PacketFence-users mailing list
> > > > > PacketFence-users@lists.sourceforge.net
> <mailto:PacketFence-users@lists.sourceforge.net>
> > > > > https://lists.sourceforge.net/lists/listinfo/packetfence-users
> > > > --
> > > > Fabrice Durand
> > > > fdurand@inverse.ca <mailto:fdurand@inverse.ca> ::  
> +1.514.447.4918 (x135) :: www.inverse.ca <http://www.inverse.ca>
> > > > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
> PacketFence (http://packetfence.org)
> > > > 
> > > > 
> > > > 
> > > > _______________________________________________
> > > > PacketFence-users mailing list
> > > > PacketFence-users@lists.sourceforge.net
> <mailto:PacketFence-users@lists.sourceforge.net>
> > > > https://lists.sourceforge.net/lists/listinfo/packetfence-users
> > > 
> > > 
> > > --
> > > 
> > > 
> > 
> > --
> 
> 
> 
> --
> 
> Imágenes integradas 1


[Attachment #5 (multipart/related)]

[Attachment #7 (text/html)]

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <p>Yes it looks that you made a typo in raddb/policy.d/packetfence</p>
    <p><br>
    </p>
    <p>Oct 31 00:53:38 <a href="http://pf.jcc.com.ar">pf.jcc.com.ar</a>
      radiusd[17061]:
      /usr/local/pf/raddb/sites-enabled/packetfence[190]: Failed to
      parse "packetfence-mschap-authenticate" entry.</p>
    <div class="moz-cite-prefix">Le 20-10-30 Ã  21 h 00, Enrique Gross a
      écrit  :<br>
    </div>
    <blockquote type="cite"
cite="mid:CAPacS7u4c9ZNOim6kkSsXA6MmcGZoKSs+4QFw3Z2OwCz_K9UWg@mail.gmail.com">
      <meta http-equiv="content-type" content="text/html; charset=UTF-8">
      <div dir="ltr">
        <div>Thanks Fabrice</div>
        <div><br>
        </div>
        <div>I probably messed up something, and should start over with
          my testing setup, this isjournalctl when starting radiusd, i
          have been checking config files regarding sql modules, but
          with not luck.   <br>
        </div>
        <div><br>
        </div>
        <div>Thanks, and good weekend <br>
        </div>
        <div><br>
        </div>
        <div>Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql_mysql: Starting connect to MySQL server<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (sql): Reserved connection (0)<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (sql): Released connection (0)<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (pfguest): Attempting to connect to database "pf"<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (pfsponsor): Attempting to connect to database "pf"<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (pfsms): Attempting to connect to database "pf"<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (pflocal): Attempting to connect to database "pf"<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (sql_reject): groupmemb_query is empty.   Please delete
          it from the configuration<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (sql_reject): authorize_check_query is empty.   Please
          delete it from the configuration<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (sql_reject): Attempting to connect to database "pf"<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (sql_degraded): groupmemb_query is empty.   Please
          delete it from the configuration<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (sql_degraded): Ignoring read_groups as
          group_membership_query is not configured<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_sql (sql_degraded): Attempting to connect to database "pf"<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_mschap (mschap): authenticating by calling 'ntlm_auth'<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_mschap (chrooted_mschap): authenticating by calling
          'ntlm_auth'<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_mschap (chrooted_mschap_machine): authenticating by
          calling 'ntlm_auth'<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_mschap (mschap_machine): authenticating by calling
          'ntlm_auth'<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          rlm_mschap (mschap_local): using internal authentication<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          /usr/local/pf/raddb/policy.d/packetfence[15]: "sql" modules
          aren't allowed in 'authenticate' sections -- they have no such
          method.<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          /usr/local/pf/raddb/policy.d/packetfence[15]: Failed to parse
          "pflocal" entry.<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          /usr/local/pf/raddb/policy.d/packetfence[145]: Failed to parse
          "packetfence-local-auth" entry.<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          /usr/local/pf/raddb/policy.d/packetfence[144]: Failed to parse
          "else" subsection.<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          /usr/local/pf/raddb/policy.d/packetfence[140]: Failed to parse
          "else" subsection.<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
          /usr/local/pf/raddb/sites-enabled/packetfence[190]: Failed to
          parse "packetfence-mschap-authenticate" entry.<br>
          Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
            moz-do-not-send="true">pf.jcc.com.ar</a> systemd[1]:
          packetfence-radiusd-auth.service: control process exited,
          code=exited status=1<br>
        </div>
      </div>
      <br>
      <div class="gmail_quote">
        <div dir="ltr" class="gmail_attr">El vie., 30 oct. 2020 a las
          19:59, Durand fabrice (&lt;<a href="mailto:fdurand@inverse.ca"
            moz-do-not-send="true">fdurand@inverse.ca</a>&gt;) escribió:<br>
        </div>
        <blockquote class="gmail_quote" style="margin:0px 0px 0px
          0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hello
          Enrique,<br>
          <br>
          i did the same on my side and i am able to restart radiusd.<br>
          <br>
          Take a look at journalctl to see why it fail to start.<br>
          <br>
          Regards<br>
          <br>
          Fabrice<br>
          <br>
          <br>
          Le 20-10-30 à 14 h 44, Enrique Gross a écrit  :<br>
          &gt; Hi all!<br>
          &gt;<br>
          &gt; Thanks for your help Fabrice<br>
          &gt;<br>
          &gt; When changing function to packetfence-local-auth,
          radius-auth fails to<br>
          &gt; start, i am not getting so much info of radius.log<br>
          &gt;<br>
          &gt; Oct 30 18:39:09 pf auth[7031]: Signalled to terminate<br>
          &gt; Oct 30 18:39:09 pf auth[7031]: Exiting normally<br>
          &gt; Oct 30 18:39:09 pf auth[7031]: rlm_perl:
          rlm_perl::Detaching. Reloading. Done.<br>
          &gt; Oct 30 18:39:09 pf auth[7031]: rlm_perl:
          rlm_perl::Detaching. Reloading. Done.<br>
          &gt;<br>
          &gt; And packetfence.log<br>
          &gt;<br>
          &gt; Oct 30 18:39:09 pf packetfence: pfperl-api(2390) INFO:
          Stopping<br>
          &gt; radiusd-auth with pid 7031
          (pf::services::manager::stopService)<br>
          &gt; Oct 30 18:39:09 pf packetfence: pfperl-api(2390) INFO:
          child exited with value 0<br>
          &gt;     (pf::services::manager::stopService)<br>
          &gt; Oct 30 18:39:14 pf packetfence: pfperl-api(2394) INFO:
          Daemon<br>
          &gt; radiusd-auth took 2.123 seconds to start.<br>
          &gt; (pf::services::manager::launchService)<br>
          &gt;<br>
          &gt; Thanks!<br>
          &gt;<br>
          &gt;<br>
          &gt; El jue., 29 oct. 2020 a las 21:57, Durand fabrice<br>
          &gt; (&lt;<a href="mailto:fdurand@inverse.ca" target="_blank"
            moz-do-not-send="true">fdurand@inverse.ca</a>&gt;) escribió:<br>
          &gt;&gt; Hello Enrique,<br>
          &gt;&gt;<br>
          &gt;&gt; sorry for the late reply.<br>
          &gt;&gt;<br>
          &gt;&gt; So ppp mschap with local pf account is not really
          implemented.<br>
          &gt;&gt;<br>
          &gt;&gt; What you can try is to edit
          /usr/local/pf/raddb/policy.d/packetfence and find the
          following function:<br>
          &gt;&gt;<br>
          &gt;&gt; packetfence-mschap-authenticate {<br>
          &gt;&gt;         if(PacketFence-Domain) {<br>
          &gt;&gt;            if ( "%{User-Name}" =~ /^host\/.*/) {<br>
          &gt;&gt;               chrooted_mschap_machine<br>
          &gt;&gt;            }<br>
          &gt;&gt;            else {<br>
          &gt;&gt;               chrooted_mschap<br>
          &gt;&gt;            }<br>
          &gt;&gt;         }<br>
          &gt;&gt;         else {<br>
          &gt;&gt;            if ( "%{User-Name}" =~ /^host\/.*/) {<br>
          &gt;&gt;               mschap_machine<br>
          &gt;&gt;            }<br>
          &gt;&gt;            else {<br>
          &gt;&gt;               mschap<br>
          &gt;&gt;            }<br>
          &gt;&gt;         }<br>
          &gt;&gt; }<br>
          &gt;&gt;<br>
          &gt;&gt;<br>
          &gt;&gt; and replace it with:<br>
          &gt;&gt;<br>
          &gt;&gt; packetfence-mschap-authenticate {<br>
          &gt;&gt;         if(PacketFence-Domain) {<br>
          &gt;&gt;            if ( "%{User-Name}" =~ /^host\/.*/) {<br>
          &gt;&gt;               chrooted_mschap_machine<br>
          &gt;&gt;            }<br>
          &gt;&gt;            else {<br>
          &gt;&gt;               chrooted_mschap<br>
          &gt;&gt;            }<br>
          &gt;&gt;         }<br>
          &gt;&gt;         else {<br>
          &gt;&gt;            if ( "%{User-Name}" =~ /^host\/.*/) {<br>
          &gt;&gt;               mschap_machine<br>
          &gt;&gt;            }<br>
          &gt;&gt;            else {<br>
          &gt;&gt;               packetfence-local-auth<br>
          &gt;&gt;            }<br>
          &gt;&gt;         }<br>
          &gt;&gt; }<br>
          &gt;&gt;<br>
          &gt;&gt; Then restart radius and retry.<br>
          &gt;&gt;<br>
          &gt;&gt; Let me know if it works.<br>
          &gt;&gt;<br>
          &gt;&gt; Regards<br>
          &gt;&gt;<br>
          &gt;&gt; Fabrice<br>
          &gt;&gt;<br>
          &gt;&gt;<br>
          &gt;&gt; Le 20-10-26 à 12 h 15, Enrique Gross a écrit :<br>
          &gt;&gt;<br>
          &gt;&gt; Thanks Fabrice<br>
          &gt;&gt;<br>
          &gt;&gt; raddebug output:<br>
          &gt;&gt;<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: Received
          Access-Request Id 132 from X.X.X.X:55645 to X.X.X.X:1812
          length 191<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     Service-Type
          = Framed-User<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:  
            Framed-Protocol = PPP<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     NAS-Port           \
39<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:  
            NAS-Port-Type = Virtual<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     User-Name           \
"coyo"<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:  
            Calling-Station-Id = "X.X.X.X"<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:  
            Called-Station-Id = "X.X.X.X"<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:  
            Acct-Session-Id = "81d00cdf"<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:  
            MS-CHAP-Challenge = 0xebf6d832753d4fdf8383548a74da2637<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:  
            MS-CHAP2-Response \
0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5<br>
  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:  
            NAS-Identifier = "MK-IBERA2"<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:  
            NAS-IP-Address = X.X.X.X<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: # Executing
          section authorize from file
          /usr/local/pf/raddb/sites-enabled/packetfence<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     authorize {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          packetfence-nas-ip-address {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          packetfence-nas-ip-address = notfound<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        update {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           EXPAND
          %{Packet-Src-IP-Address}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
          --&gt; X.X.X.X<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           EXPAND
          %{Packet-Dst-IP-Address}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
          --&gt; X.X.X.X<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           EXPAND
          %l<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
          --&gt; 1603738462<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # update
          = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          packetfence-set-realm-if-machine {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i)   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          packetfence-set-realm-if-machine = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          packetfence-balanced-key-policy {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (&amp;PacketFence-KeyBalanced &amp;&amp;
          (&amp;PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (&amp;PacketFence-KeyBalanced &amp;&amp;
          (&amp;PacketFence-KeyBalanced =~ /^(.*)(.)$/i))   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           else {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              update
          {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
            EXPAND %{md5:%{Calling-Station-Id}%{User-Name}}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:                    
          --&gt; 865fdf018805bc0bc5fbb22eaa6b0a60<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
            EXPAND %{md5:%{Calling-Station-Id}%{User-Name}}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:                    
          --&gt; 865fdf018805bc0bc5fbb22eaa6b0a60<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              } #
          update = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           } # else
          = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          packetfence-balanced-key-policy = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          packetfence-set-tenant-id {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           EXPAND
          %{%{control:PacketFence-Tenant-Id}:-0}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
          --&gt; 0<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")   -&gt; TRUE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")   {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              update
          control {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
            EXPAND %{User-Name}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:                    
          --&gt; coyo<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
            SQL-User-Name set to 'coyo'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
            Executing select query:   SELECT IFNULL((SELECT tenant_id FROM
          radius_nas WHERE nasname = 'X.X.X.X'), 0)<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
            EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas
          WHERE nasname = '%{NAS-IP-Address}'), 0)}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:                    
          --&gt; 1<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              } #
          update control = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           } # if (
          "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")   = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          &amp;control:PacketFence-Tenant-Id == 0 ) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          &amp;control:PacketFence-Tenant-Id == 0 )   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          packetfence-set-tenant-id = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          rewrite_calling_station_id {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (&amp;Calling-Station-Id &amp;&amp; (&amp;Calling-Station-Id
          =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
  {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (&amp;Calling-Station-Id &amp;&amp; (&amp;Calling-Station-Id
          =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) \
                
          -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           else {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              [noop]
          = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           } # else
          = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          rewrite_calling_station_id = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          rewrite_called_station_id {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          ((&amp;Called-Station-Id) &amp;&amp; (&amp;Called-Station-Id
          =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
  {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          ((&amp;Called-Station-Id) &amp;&amp; (&amp;Called-Station-Id
          =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) \
                
          -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           else {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              [noop]
          = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           } # else
          = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          rewrite_called_station_id = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if (
          "%{client:shortname}" =~ /eduroam_tlrs/ ) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        EXPAND
          %{client:shortname}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:            --&gt;
          X.X.X.X/32<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if (
          "%{client:shortname}" =~ /eduroam_tlrs/ )   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          filter_username {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (&amp;User-Name) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (&amp;User-Name)   -&gt; TRUE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (&amp;User-Name)   {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name =~ / /) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name =~ / /)   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name =~ /@[^@]*@/ ) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name =~ /@[^@]*@/ )   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name =~ /\.\./ ) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name =~ /\.\./ )   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          ((&amp;User-Name =~ /@/) &amp;&amp; (&amp;User-Name !~
          /@(.+)\.(.+)$/))   {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          ((&amp;User-Name =~ /@/) &amp;&amp; (&amp;User-Name !~
          /@(.+)\.(.+)$/))     -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name =~ /\.$/)   {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name =~ /\.$/)     -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name =~ /@\./)   {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name =~ /@\./)     -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           } # if
          (&amp;User-Name)   = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          filter_username = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          filter_password {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (&amp;User-Password &amp;&amp;     (&amp;User-Password !          \
"%{string:User-Password}")) {<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:    \
                if
          (&amp;User-Password &amp;&amp;     (&amp;User-Password !          \
                "%{string:User-Password}"))   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          filter_password = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     
            [preprocess] = ok<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Found
          MS-CHAP attributes.   Setting 'Auth-Type   = mschap'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        [mschap]           \
ok<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: suffix:
          Checking for suffix after "@"<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: suffix: No '@'
          in User-Name = "coyo", skipping NULL due to config.<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        [suffix]           \
noop<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain:
          Checking for prefix before "\"<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: No
          '\' in User-Name = "coyo", looking up realm NULL<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain:
          Found realm "null"<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain:
          Adding Stripped-User-Name = "coyo"<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain:
          Adding Realm = "null"<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain:
          Authentication realm is LOCAL<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        [ntdomain]
          = ok<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if (Realm
          =~ /default/) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if (Realm
          =~ /default/)   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        elsif
          (Realm =~ /local/) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        elsif
          (Realm =~ /local/)   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        elsif
          (Realm =~ /null/) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        elsif
          (Realm =~ /null/)   -&gt; TRUE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        elsif
          (Realm =~ /null/)   {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: PEAP: No
          EAP-Message, not doing EAP<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           [PEAP]           \
noop<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # elsif
          (Realm =~ /null/)   = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        ...
          skipping else: Preceding "if" was taken<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if (
          !EAP-Message &amp;&amp; "%{%{Control:Auth-type}:-No-MS_CHAP}"
          != "MS-CHAP") {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        EXPAND
          %{%{Control:Auth-type}:-No-MS_CHAP}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:            --&gt;
          MS-CHAP<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if (
          !EAP-Message &amp;&amp; "%{%{Control:Auth-type}:-No-MS_CHAP}"
          != "MS-CHAP")   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if
          (Control:Auth-type == "MS-CHAP") {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if
          (Control:Auth-type == "MS-CHAP")   -&gt; TRUE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if
          (Control:Auth-type == "MS-CHAP")   {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'User-Name'}           \
&amp;request:User-Name -&gt; 'coyo'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: \
                Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'NAS-IP-Address'}           \
&amp;request:NAS-IP-Address -&gt; 'X.X.X.X'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'NAS-Port'}           \
&amp;request:NAS-Port -&gt; '39'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'Service-Type'}           \
&amp;request:Service-Type -&gt; 'Framed-User'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'Framed-Protocol'}           \
&amp;request:Framed-Protocol -&gt; 'PPP'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
2020: Debug:  packetfence-multi-domain:     $RAD_REQUEST{'Called-Station-Id'}
          = &amp;request:Called-Station-Id -&gt; 'X.X.X.X'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'Calling-Station-Id'}
          = &amp;request:Calling-Station-Id -&gt; 'X.X.X.X'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'NAS-Identifier'}           \
&amp;request:NAS-Identifier -&gt; 'MK-IBERA2'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'NAS-Port-Type'}           \
&amp;request:NAS-Port-Type -&gt; 'Virtual'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'Acct-Session-Id'}           \
&amp;request:Acct-Session-Id -&gt; '81d00cdf'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'Event-Timestamp'}           \
&amp;request:Event-Timestamp -&gt; 'Oct 26 2020 15:54:22 -03'<br>  &gt;&gt; (727) Mon \
Oct 26 15:54:22 2020: Debug:  packetfence-multi-domain:     \
$RAD_REQUEST{'MS-CHAP-Challenge'}  = &amp;request:MS-CHAP-Challenge -&gt;
          '0xebf6d832753d4fdf8383548a74da2637'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'MS-CHAP2-Response'}
          = &amp;request:MS-CHAP2-Response -&gt;
'0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5'<br>
  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'Stripped-User-Name'}
          = &amp;request:Stripped-User-Name -&gt; 'coyo'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'Realm'}           \
&amp;request:Realm -&gt; 'null'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_REQUEST{'SQL-User-Name'}           \
&amp;request:SQL-User-Name -&gt; 'coyo'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: \
Debug:  packetfence-multi-domain:  
            $RAD_REQUEST{'FreeRADIUS-Client-IP-Address'}           \
&amp;request:FreeRADIUS-Client-IP-Address -&gt; 'X.X.X.X'<br>  &gt;&gt; (727) Mon Oct \
26 15:54:22 2020: Debug:  packetfence-multi-domain:  
            $RAD_REQUEST{'PacketFence-KeyBalanced'}           \
&amp;request:PacketFence-KeyBalanced -&gt;  '865fdf018805bc0bc5fbb22eaa6b0a60'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:  
            $RAD_REQUEST{'PacketFence-Radius-Ip'}           \
&amp;request:PacketFence-Radius-Ip -&gt; 'X.X.X.X'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_CHECK{'Auth-Type'}           \
&amp;control:Auth-Type -&gt; 'MS-CHAP'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: \
                Debug:
          packetfence-multi-domain:     $RAD_CHECK{'Load-Balance-Key'}           \
&amp;control:Load-Balance-Key -&gt;  '865fdf018805bc0bc5fbb22eaa6b0a60'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_CHECK{'Tmp-Integer-0'}           \
&amp;control:Tmp-Integer-0 -&gt; '1603738462'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
2020: Debug:  packetfence-multi-domain:  
            $RAD_CHECK{'PacketFence-RPC-Server'}           \
&amp;control:PacketFence-RPC-Server -&gt; '127.0.0.1'<br>  &gt;&gt; (727) Mon Oct 26 \
15:54:22 2020: Debug:  packetfence-multi-domain:     \
$RAD_CHECK{'PacketFence-RPC-Port'}  = &amp;control:PacketFence-RPC-Port -&gt; \
'7070'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_CHECK{'PacketFence-RPC-User'}
          = &amp;control:PacketFence-RPC-User -&gt; ''<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_CHECK{'PacketFence-RPC-Pass'}
          = &amp;control:PacketFence-RPC-Pass -&gt; ''''<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:  
            $RAD_CHECK{'PacketFence-RPC-Proto'}           \
&amp;control:PacketFence-RPC-Proto -&gt; 'http'<br>  &gt;&gt; (727) Mon Oct 26 \
15:54:22 2020: Debug:  packetfence-multi-domain:  
            $RAD_CHECK{'PacketFence-Request-Time'}           \
&amp;control:PacketFence-Request-Time -&gt; '0'<br>  &gt;&gt; (727) Mon Oct 26 \
15:54:22 2020: Debug:  packetfence-multi-domain:  
            $RAD_CHECK{'PacketFence-Tenant-Id'}           \
&amp;control:PacketFence-Tenant-Id -&gt; '1'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain:     $RAD_CONFIG{'Auth-Type'}           \
&amp;control:Auth-Type -&gt; 'MS-CHAP'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: \
                Debug:
          packetfence-multi-domain:     $RAD_CONFIG{'Load-Balance-Key'}           \
&amp;control:Load-Balance-Key -&gt;  '865fdf018805bc0bc5fbb22eaa6b0a60'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:     $RAD_CONFIG{'Tmp-Integer-0'}           \
&amp;control:Tmp-Integer-0 -&gt; '1603738462'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
2020: Debug:  packetfence-multi-domain:  
            $RAD_CONFIG{'PacketFence-RPC-Server'}           \
&amp;control:PacketFence-RPC-Server -&gt; '127.0.0.1'<br>  &gt;&gt; (727) Mon Oct 26 \
15:54:22 2020: Debug:  packetfence-multi-domain:  
            $RAD_CONFIG{'PacketFence-RPC-Port'}           \
&amp;control:PacketFence-RPC-Port -&gt; '7070'<br>  &gt;&gt; (727) Mon Oct 26 \
15:54:22 2020: Debug:  packetfence-multi-domain:  
            $RAD_CONFIG{'PacketFence-RPC-User'}           \
&amp;control:PacketFence-RPC-User -&gt; ''<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
2020: Debug:  packetfence-multi-domain:  
            $RAD_CONFIG{'PacketFence-RPC-Pass'}           \
&amp;control:PacketFence-RPC-Pass -&gt; ''''<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
2020: Debug:  packetfence-multi-domain:  
            $RAD_CONFIG{'PacketFence-RPC-Proto'}           \
&amp;control:PacketFence-RPC-Proto -&gt; 'http'<br>  &gt;&gt; (727) Mon Oct 26 \
15:54:22 2020: Debug:  packetfence-multi-domain:  
            $RAD_CONFIG{'PacketFence-Request-Time'}           \
&amp;control:PacketFence-Request-Time -&gt; '0'<br>  &gt;&gt; (727) Mon Oct 26 \
15:54:22 2020: Debug:  packetfence-multi-domain:  
            $RAD_CONFIG{'PacketFence-Tenant-Id'}           \
&amp;control:PacketFence-Tenant-Id -&gt; '1'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain: &amp;request:NAS-Port-Type           \
$RAD_REQUEST{'NAS-Port-Type'} -&gt; 'Virtual'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain: &amp;request:Acct-Session-Id           \
$RAD_REQUEST{'Acct-Session-Id'} -&gt; '81d00cdf'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:PacketFence-Radius-Ip           \
$RAD_REQUEST{'PacketFence-Radius-Ip'} -&gt; 'X.X.X.X'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:Service-Type           \
$RAD_REQUEST{'Service-Type'} -&gt; 'Framed-User'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:Called-Station-Id           \
$RAD_REQUEST{'Called-Station-Id'} -&gt; 'X.X.X.X'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:Realm           \
$RAD_REQUEST{'Realm'} -&gt; 'null'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: \
                Debug:
          packetfence-multi-domain: &amp;request:NAS-IP-Address           \
$RAD_REQUEST{'NAS-IP-Address'} -&gt; 'X.X.X.X'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:SQL-User-Name           \
$RAD_REQUEST{'SQL-User-Name'} -&gt; 'coyo'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
2020: Debug:  packetfence-multi-domain: &amp;request:PacketFence-NTLMv2-Only
          = $RAD_REQUEST{'PacketFence-NTLMv2-Only'} -&gt; ''<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:Calling-Station-Id           \
$RAD_REQUEST{'Calling-Station-Id'} -&gt; 'X.X.X.X'<br>  &gt;&gt; (727) Mon Oct 26 \
15:54:22 2020: Debug:  packetfence-multi-domain: &amp;request:PacketFence-KeyBalanced
          = $RAD_REQUEST{'PacketFence-KeyBalanced'} -&gt;
          '865fdf018805bc0bc5fbb22eaa6b0a60'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain:
          &amp;request:FreeRADIUS-Client-IP-Address           \
$RAD_REQUEST{'FreeRADIUS-Client-IP-Address'} -&gt; 'X.X.X.X'<br>  &gt;&gt; (727) Mon \
                Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:MS-CHAP-Challenge           \
$RAD_REQUEST{'MS-CHAP-Challenge'} -&gt;  '0xebf6d832753d4fdf8383548a74da2637'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:Framed-Protocol           \
$RAD_REQUEST{'Framed-Protocol'} -&gt; 'PPP'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain: &amp;request:User-Name           \
$RAD_REQUEST{'User-Name'} -&gt; 'coyo'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: \
                Debug:
          packetfence-multi-domain: &amp;request:NAS-Identifier           \
$RAD_REQUEST{'NAS-Identifier'} -&gt; 'MK-IBERA2'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:Event-Timestamp           \
                $RAD_REQUEST{'Event-Timestamp'} -&gt; 'Oct 26 2020 15:54:22
          -03'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:MS-CHAP2-Response           \
$RAD_REQUEST{'MS-CHAP2-Response'} -&gt; \
'0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5'<br>
  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;request:NAS-Port           \
$RAD_REQUEST{'NAS-Port'} -&gt; '39'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: \
                Debug:
          packetfence-multi-domain: &amp;request:Stripped-User-Name           \
$RAD_REQUEST{'Stripped-User-Name'} -&gt; 'coyo'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;control:Load-Balance-Key           \
$RAD_CHECK{'Load-Balance-Key'} -&gt;  '865fdf018805bc0bc5fbb22eaa6b0a60'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;control:PacketFence-RPC-Server
          = $RAD_CHECK{'PacketFence-RPC-Server'} -&gt; '127.0.0.1'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;control:PacketFence-Tenant-Id           \
$RAD_CHECK{'PacketFence-Tenant-Id'} -&gt; '1'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain: &amp;control:PacketFence-RPC-User           \
$RAD_CHECK{'PacketFence-RPC-User'} -&gt; ''<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
2020: Debug:  packetfence-multi-domain:
          &amp;control:PacketFence-Request-Time           \
$RAD_CHECK{'PacketFence-Request-Time'} -&gt; '0'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;control:Auth-Type           \
$RAD_CHECK{'Auth-Type'} -&gt; 'MS-CHAP'<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: \
                Debug:
          packetfence-multi-domain: &amp;control:PacketFence-RPC-Pass           \
$RAD_CHECK{'PacketFence-RPC-Pass'} -&gt; ''''<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 \
                2020: Debug:
          packetfence-multi-domain: &amp;control:Tmp-Integer-0           \
$RAD_CHECK{'Tmp-Integer-0'} -&gt; '1603738462'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;control:PacketFence-RPC-Proto           \
$RAD_CHECK{'PacketFence-RPC-Proto'} -&gt; 'http'<br>  &gt;&gt; (727) Mon Oct 26 \
                15:54:22 2020: Debug:
          packetfence-multi-domain: &amp;control:PacketFence-RPC-Port           \
$RAD_CHECK{'PacketFence-RPC-Port'} -&gt; '7070'<br>  &gt;&gt; (727) Mon Oct 26 \
15:54:22 2020: Debug:          [packetfence-multi-domain] = updated<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # if
          (Control:Auth-type == "MS-CHAP")   = updated<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          packetfence-eap-mac-policy {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          &amp;EAP-Type ) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          &amp;EAP-Type )   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           [noop]           \
                noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          packetfence-eap-mac-policy = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: WARNING: pap:
          !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!!
          Ignoring control:User-Password.   Update your            !!!<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!!
          configuration so that the "known good" clear text !!!<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!!
          password is in Cleartext-Password and NOT in            !!!<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!!
          User-Password.                                                         \
!!!<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: WARNING: pap:
          !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        [pap]           \
noop<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     } #
          authorize = updated<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: Found
          Auth-Type = MS-CHAP<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: # Executing
          group from file /usr/local/pf/raddb/sites-enabled/packetfence<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     Auth-Type
          MS-CHAP {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          packetfence-mschap-authenticate {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (PacketFence-Domain) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (PacketFence-Domain)   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           else {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if (
          "%{User-Name}" =~ /^host\/.*/) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              EXPAND
          %{User-Name}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:                 
          --&gt; coyo<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if (
          "%{User-Name}" =~ /^host\/.*/)   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              else {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
          Creating challenge hash with username: coyo<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Client
          is using MS-CHAPv2<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
          Executing: /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --        
                --request-nt-key  
--username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}}
                
          --challenge=%{mschap:Challenge:-00}
          --nt-response=%{mschap:NT-Response:-00}:<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
--username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}}<br>
  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap:     
          --&gt; --username=coyo<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
          Creating challenge hash with username: coyo<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
          --challenge=%{mschap:Challenge:-00}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap:     
          --&gt; --challenge4bcfae02f18a60<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
          --nt-response=%{mschap:NT-Response:-00}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap:     
          --&gt;
          --nt-response´4e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: ERROR: mschap:
          Program returned code (1) and output 'Reading winbind reply
          failed! (0xc0000001)'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: ERROR: mschap:
          Reading winbind reply failed! (0xc0000001)<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
          Authentication failed<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
            [mschap] = fail<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              } #
          else = fail<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           } # else
          = fail<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          packetfence-mschap-authenticate = fail<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     } #
          Auth-Type MS-CHAP = fail<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: Failed to
          authenticate the user<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: Using
          Post-Auth-Type Reject<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: # Executing
          group from file /usr/local/pf/raddb/sites-enabled/packetfence<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:  
            Post-Auth-Type REJECT {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          packetfence-set-tenant-id {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           EXPAND
          %{%{control:PacketFence-Tenant-Id}:-0}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
          --&gt; 1<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          "%{%{control:PacketFence-Tenant-Id}:-0}" == "0")   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          &amp;control:PacketFence-Tenant-Id == 0 ) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if (
          &amp;control:PacketFence-Tenant-Id == 0 )   -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          packetfence-set-tenant-id = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        update {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # update
          = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if (!
          EAP-Type || (EAP-Type != TTLS   &amp;&amp; EAP-Type != PEAP) )
          {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if (!
          EAP-Type || (EAP-Type != TTLS   &amp;&amp; EAP-Type != PEAP) )  
          -&gt; TRUE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if (!
          EAP-Type || (EAP-Type != TTLS   &amp;&amp; EAP-Type != PEAP) )  
          {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           policy
          packetfence-audit-log-reject {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name &amp;&amp; (&amp;User-Name == "dummy")) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              if
          (&amp;User-Name &amp;&amp; (&amp;User-Name == "dummy"))   -&gt;
          FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              else {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
            policy request-timing {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:                    if
          ("%{%{control:PacketFence-Request-Time}:-0}" != 0) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:                 
            EXPAND %{%{control:PacketFence-Request-Time}:-0}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:                       
          --&gt; 0<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:                    if
          ("%{%{control:PacketFence-Request-Time}:-0}" != 0)   -&gt;
          FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:                 } #
          policy request-timing = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
          EXPAND type.reject.query<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:     
          --&gt; type.reject.query<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
          Using query template 'query'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
          EXPAND %{User-Name}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:     
          --&gt; coyo<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
          SQL-User-Name set to 'coyo'<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
          EXPAND INSERT INTO radius_audit_log                       ( mac, ip,
          computer_name, user_name,                        stripped_user_name,  
          realm, event_type,                        switch_id, switch_mac,
          switch_ip_address,                        radius_source_ip_address,
          called_station_id, calling_station_id,                       
          nas_port_type, ssid, nas_port_id,                        ifindex,
          nas_port, connection_type,                        nas_ip_address,
          nas_identifier, auth_status,                        reason, auth_type,
          eap_type,                        role, node_status, profile,              
                   source, auto_reg, is_phone,                        pf_domain,
          uuid, radius_request,                        radius_reply,
          request_time, tenant_id, radius_ip)                     VALUES           
                     ( '%{request:Calling-Station-Id}',
          '%{request:Framed-IP-Address}',
          '%{%{control:PacketFence-Computer-Name}:-N/A}',
          '%{request:User-Name}',                       
          '%{request:Stripped-User-Name}', '%{request:Realm}',
          'Radius-Access-Request',                       
          '%{%{control:PacketFence-Switch-Id}:-N/A}',
          '%{%{control:PacketFence-Switch-Mac}:-N/A}',
          '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',                 
                '%{Packet-Src-IP-Address}',
          '%{request:Called-Station-Id}',
          '%{request:Calling-Station-Id}',                       
          '%{request:NAS-Port-Type}', '%{request:Called-Station-SSID}',
          '%{request:NAS-Port-Id}',                       
          '%{%{control:PacketFence-IfIndex}:-N/A}',
          '%{request:NAS-Port}',
          '%{%{control:PacketFence-Connection-Type}:-N/A}',                    
             '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',  
          'Reject',                          '%{request:Module-Failure-Message}',
          '%{control:Auth-Type}', '%{request:EAP-Type}',                       
          '%{%{control:PacketFence-Role}:-N/A}',
          '%{%{control:PacketFence-Status}:-N/A}',
          '%{%{control:PacketFence-Profile}:-N/A}',                       
          '%{%{control:PacketFence-Source}:-N/A}',
          '%{%{control:PacketFence-AutoReg}:-0}',
          '%{%{control:PacketFence-IsPhone}:-0}',                       
          '%{request:PacketFence-Domain}', '',
          '%{pairs:&amp;request:[*]}','%{pairs:&amp;reply:[*]}',
          '%{%{control:PacketFence-Request-Time}:-N/A}',
          '%{control:PacketFence-Tenant-Id}',
          '%{request:PacketFence-Radius-Ip}')<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:     
          --&gt; INSERT INTO radius_audit_log                       ( mac, ip,
          computer_name, user_name,                        stripped_user_name,  
          realm, event_type,                        switch_id, switch_mac,
          switch_ip_address,                        radius_source_ip_address,
          called_station_id, calling_station_id,                       
          nas_port_type, ssid, nas_port_id,                        ifindex,
          nas_port, connection_type,                        nas_ip_address,
          nas_identifier, auth_status,                        reason, auth_type,
          eap_type,                        role, node_status, profile,              
                   source, auto_reg, is_phone,                        pf_domain,
          uuid, radius_request,                        radius_reply,
          request_time, tenant_id, radius_ip)                     VALUES           
                     ( 'X.X.X.X', '', 'N/A', 'coyo',                        'coyo',
          'null', 'Radius-Access-Request',                        'N/A', 'N/A',
          'N/A',                        'X.X.X.X', 'X.X.X.X', 'X.X.X.X',           
                      'Virtual', '', '',                        'N/A', '39', 'N/A',  
                               'X.X.X.X', 'MK-IBERA2',   'Reject',                    \
  'mschap: Program returned code (1) and output 'Reading
          winbind reply failed! (0xc0000001)'', 'MS-CHAP', '',        
                         'N/A', 'N/A', 'N/A',                        'N/A', '0',
          '0',                        '', '', 'NAS-Port-Type = Virtual,
          Acct-Session-Id = "81d00cdf", PacketFence-Radius-Ip =
          "X.X.X.X", Service-Type = Framed-User, Called-Station-Id
          = "X.X.X.X", Realm = "null", NAS-IP-Address =
          X.X.X.X, PacketFence-NTLMv2-Only = "",
          Calling-Station-Id = "X.X.X.X", PacketFence-KeyBalanced
          = "865fdf018805bc0bc5fbb22eaa6b0a60",
          FreeRADIUS-Client-IP-Address = X.X.X.X, MS-CHAP-Challenge
          = 0xebf6d832753d4fdf8383548a74da2637, Framed-Protocol =
          PPP, User-Name = "coyo", NAS-Identifier =
          "MK-IBERA2", Event-Timestamp = "Oct 26 2020 15:54:22
          -03", MS-CHAP2-Response =
0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5,
  NAS-Port = 39, Stripped-User-Name = "coyo",
          Module-Failure-Message = "mschap: Program returned code
          (1) and output 'Reading winbind reply failed!
          (0xc0000001)'", Module-Failure-Message = "mschap:
          Reading winbind reply failed! (0xc0000001)", User-Password
          = "******", SQL-User-Name =
          "coyo"','MS-CHAP-Error = "\001E=691 R=0
          C=c86ce57de86611d248ddad2f2eb690ab V=3 M=Authentication
          failed"', '0', '1', 'X.X.X.X')<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
          Executing query: INSERT INTO radius_audit_log                       (
          mac, ip, computer_name, user_name,                       
          stripped_user_name,   realm, event_type,                       
          switch_id, switch_mac, switch_ip_address,                       
          radius_source_ip_address, called_station_id,
          calling_station_id,                        nas_port_type, ssid,
          nas_port_id,                        ifindex, nas_port,
          connection_type,                        nas_ip_address,
          nas_identifier, auth_status,                        reason, auth_type,
          eap_type,                        role, node_status, profile,              
                   source, auto_reg, is_phone,                        pf_domain,
          uuid, radius_request,                        radius_reply,
          request_time, tenant_id, radius_ip)                     VALUES           
                     ( 'X.X.X.X', '', 'N/A', 'coyo',                        'coyo',
          'null', 'Radius-Access-Request',                        'N/A', 'N/A',
          'N/A',                        'X.X.X.X', 'X.X.X.X', 'X.X.X.X',           
                      'Virtual', '', '',                        'N/A', '39', 'N/A',  
                               'X.X.X.X', 'MK-IBERA2',   'Reject',                    \
  'mschap: Program returned code (1) and output 'Reading
          winbind reply failed! (0xc0000001)'', 'MS-CHAP', '',        
                         'N/A', 'N/A', 'N/A',                        'N/A', '0',
          '0',                        '', '', 'NAS-Port-Type = Virtual,
          Acct-Session-Id = "81d00cdf", PacketFence-Radius-Ip =
          "X.X.X.X", Service-Type = Framed-User, Called-Station-Id
          = "X.X.X.X", Realm = "null", NAS-IP-Address =
          X.X.X.X, PacketFence-NTLMv2-Only = "",
          Calling-Station-Id = "X.X.X.X", PacketFence-KeyBalanced
          = "865fdf018805bc0bc5fbb22eaa6b0a60",
          FreeRADIUS-Client-IP-Address = X.X.X.X, MS-CHAP-Challenge
          = 0xebf6d832753d4fdf8383548a74da2637, Framed-Protocol =
          PPP, User-Name = "coyo", NAS-Identifier =
          "MK-IBERA2", Event-Timestamp = "Oct 26 2020 15:54:22
          -03", MS-CHAP2-Response =
0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5,
  NAS-Port = 39, Stripped-User-Name = "coyo",
          Module-Failure-Message = "mschap: Program returned code
          (1) and output 'Reading winbind reply failed!
          (0xc0000001)'", Module-Failure-Message = "mschap:
          Reading winbind reply failed! (0xc0000001)", User-Password
          = "******", SQL-User-Name =
          "coyo"','MS-CHAP-Error = "\001E=691 R=0
          C=c86ce57de86611d248ddad2f2eb690ab V=3 M=Authentication
          failed"', '0', '1', 'X.X.X.X')<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
          SQL query returned: success<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: 1
          record(s) updated<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              
            [sql_reject] = ok<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              } #
          else = ok<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           } #
          policy packetfence-audit-log-reject = ok<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # if (!
          EAP-Type || (EAP-Type != TTLS   &amp;&amp; EAP-Type != PEAP) )  
          = ok<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if
          ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        EXPAND
          %{%{control:PacketFence-Proxied-From}:-False}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:            --&gt;
          False<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        if
          ("%{%{control:PacketFence-Proxied-From}:-False}" == "True")  
          -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          attr_filter.access_reject: EXPAND %{User-Name}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          attr_filter.access_reject:      --&gt; coyo<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          attr_filter.access_reject: Matched entry DEFAULT at line 11<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     
            [attr_filter.access_reject] = updated<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          attr_filter.packetfence_post_auth: EXPAND %{User-Name}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          attr_filter.packetfence_post_auth:      --&gt; coyo<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:
          attr_filter.packetfence_post_auth: Matched entry DEFAULT at
          line 10<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     
            [attr_filter.packetfence_post_auth] = updated<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        [eap]           \
noop<br>  &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        policy
          remove_reply_message_if_eap {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (&amp;reply:EAP-Message &amp;&amp; &amp;reply:Reply-Message) {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           if
          (&amp;reply:EAP-Message &amp;&amp; &amp;reply:Reply-Message)  
          -&gt; FALSE<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           else {<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:              [noop]
          = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:           } # else
          = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        } # policy
          remove_reply_message_if_eap = noop<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: linelog:
          EXPAND messages.%{%{reply:Packet-Type}:-default}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: linelog:     
          --&gt; messages.Access-Reject<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: linelog:
          EXPAND [mac:%{Calling-Station-Id}] Rejected user: %{User-Name}<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: linelog:     
          --&gt; [mac:X.X.X.X] Rejected user: coyo<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:        [linelog]
          = ok<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug:     } #
          Post-Auth-Type REJECT = updated<br>
          &gt;&gt; (727) Mon Oct 26 15:54:22 2020: Debug: Delaying
          response for 1.000000 seconds<br>
          &gt;&gt; (727) Mon Oct 26 15:54:23 2020: Debug: (727)
          Discarding duplicate request from client X.X.X.X/32 port 55645
          - ID: 132 due to delayed response<br>
          &gt;&gt; (727) Mon Oct 26 15:54:23 2020: Debug: Sending
          delayed response<br>
          &gt;&gt; (727) Mon Oct 26 15:54:23 2020: Debug: Sent
          Access-Reject Id 132 from X.X.X.X:1812 to X.X.X.X:55645 length
          101<br>
          &gt;&gt; (727) Mon Oct 26 15:54:23 2020: Debug:  
            MS-CHAP-Error = "\001Ei1 R=0
          CÈ6ce57de86611d248ddad2f2eb690ab V=3 M=Authentication
          failed"<br>
          &gt;&gt; (727) Mon Oct 26 15:54:27 2020: Debug: Cleaning up
          request packet ID 132 with timestamp +10785<br>
          &gt;&gt; (728) Mon Oct 26 15:54:30 2020: Debug: Received
          Status-Server Id 199 from <a href="http://127.0.0.1:50706"
            rel="noreferrer" target="_blank" \
moz-do-not-send="true">127.0.0.1:50706</a>  to <a href="http://127.0.0.1:18121" \
rel="noreferrer"  target="_blank" moz-do-not-send="true">127.0.0.1:18121</a>
          length 50<br>
          &gt;&gt; (728) Mon Oct 26 15:54:30 2020: Debug:  
            Message-Authenticator = 0x746e4169562dc5520ee77b953ef0ac7b<br>
          &gt;&gt; (728) Mon Oct 26 15:54:30 2020: Debug:  
            FreeRADIUS-Statistics-Type = 15<br>
          &gt;&gt; (728) Mon Oct 26 15:54:30 2020: Debug: # Executing
          group from file /usr/local/pf/raddb/sites-enabled/status<br>
          &gt;&gt; (728) Mon Oct 26 15:54:30 2020: Debug:     Autz-Type
          Status-Server {<br>
          &gt;&gt; (728) Mon Oct 26 15:54:30 2020: Debug:        [ok] = ok<br>
          &gt;&gt; (728) Mon Oct 26 15:54:30 2020: Debug:     } #
          Autz-Type Status-Server = ok<br>
          &gt;&gt;<br>
          &gt;&gt; El lun., 26 oct. 2020 a las 12:39, Fabrice Durand via
          PacketFence-users (&lt;<a
            href="mailto:packetfence-users@lists.sourceforge.net"
            target="_blank" \
moz-do-not-send="true">packetfence-users@lists.sourceforge.net</a>&gt;)  \
escribió:<br>  &gt;&gt;&gt; Hello Enrique,<br>
          &gt;&gt;&gt;<br>
          &gt;&gt;&gt; can you provide the raddebug output ?<br>
          &gt;&gt;&gt;<br>
          &gt;&gt;&gt; raddebug -f /usr/local/pf/var/run/radiusd.sock -t
          3000<br>
          &gt;&gt;&gt;<br>
          &gt;&gt;&gt;<br>
          &gt;&gt;&gt; Regards<br>
          &gt;&gt;&gt;<br>
          &gt;&gt;&gt; Fabrice<br>
          &gt;&gt;&gt;<br>
          &gt;&gt;&gt;<br>
          &gt;&gt;&gt; Le 20-10-26 Ã  09 h 42, Enrique Gross via
          PacketFence-users a écrit :<br>
          &gt;&gt;&gt;&gt; Hi Packetfence Users,<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt; Hope you are doing fine<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt; I am struggling to authenticate PPP users via
          MSCHAP with local PF<br>
          &gt;&gt;&gt;&gt; authentication, my switch is a Mikrotik
          device, I am forwarding<br>
          &gt;&gt;&gt;&gt; authentication via Radius to packetfence
          server.<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt; I am getting error<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt; (144) Login incorrect (mschap: Program
          returned code (1) and output<br>
          &gt;&gt;&gt;&gt; 'Reading winbind reply failed!<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt; When I disable MSCHAP/CHAP as an
          authentication method and use PAP my<br>
          &gt;&gt;&gt;&gt; users can authenticate fine.<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt; I have uncomment
          /usr/local/pf/conf/radiusd/packetfence-tunnel and<br>
          &gt;&gt;&gt;&gt; Take care of the "Database passwords hashing
          method"<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt; I will really appreciate any help<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt; Thanks, Enrique<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt; --<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt;<br>
          &gt;&gt;&gt;&gt;
          _______________________________________________<br>
          &gt;&gt;&gt;&gt; PacketFence-users mailing list<br>
          &gt;&gt;&gt;&gt; <a
            href="mailto:PacketFence-users@lists.sourceforge.net"
            target="_blank" \
moz-do-not-send="true">PacketFence-users@lists.sourceforge.net</a><br>  \
                &gt;&gt;&gt;&gt; <a
            href="https://lists.sourceforge.net/lists/listinfo/packetfence-users"
            rel="noreferrer" target="_blank" \
moz-do-not-send="true">https://lists.sourceforge.net/lists/listinfo/packetfence-users</a><br>
  &gt;&gt;&gt; --<br>
          &gt;&gt;&gt; Fabrice Durand<br>
          &gt;&gt;&gt; <a href="mailto:fdurand@inverse.ca"
            target="_blank" moz-do-not-send="true">fdurand@inverse.ca</a>
          ::   +1.514.447.4918 (x135) ::   <a
            href="http://www.inverse.ca" rel="noreferrer"
            target="_blank" moz-do-not-send="true">www.inverse.ca</a><br>
          &gt;&gt;&gt; Inverse inc. :: Leaders behind SOGo (<a
            href="http://www.sogo.nu" rel="noreferrer" target="_blank"
            moz-do-not-send="true">http://www.sogo.nu</a>) and
          PacketFence (<a href="http://packetfence.org" rel="noreferrer"
            target="_blank" moz-do-not-send="true">http://packetfence.org</a>)<br>
          &gt;&gt;&gt;<br>
          &gt;&gt;&gt;<br>
          &gt;&gt;&gt;<br>
          &gt;&gt;&gt; _______________________________________________<br>
          &gt;&gt;&gt; PacketFence-users mailing list<br>
          &gt;&gt;&gt; <a
            href="mailto:PacketFence-users@lists.sourceforge.net"
            target="_blank" \
moz-do-not-send="true">PacketFence-users@lists.sourceforge.net</a><br>  &gt;&gt;&gt; \
                <a
            href="https://lists.sourceforge.net/lists/listinfo/packetfence-users"
            rel="noreferrer" target="_blank" \
moz-do-not-send="true">https://lists.sourceforge.net/lists/listinfo/packetfence-users</a><br>
  &gt;&gt;<br>
          &gt;&gt;<br>
          &gt;&gt; --<br>
          &gt;&gt;<br>
          &gt;&gt;<br>
          &gt;<br>
          &gt; --<br>
          <br>
        </blockquote>
      </div>
      <br clear="all">
      <br>
      -- <br>
      <div dir="ltr" class="gmail_signature">
        <div dir="ltr"><br>
          <img src="cid:part40.6B4BBAEF.6BAEFF05@inverse.ca"
            alt="Imágenes integradas 1" class="" width="163" height="64">
          <br>
        </div>
      </div>
    </blockquote>
  </body>
</html>


["firma coyo.jpg" (image/jpeg)]



_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic