[prev in list] [next in list] [prev in thread] [next in thread]
List: packetfence-users
Subject: Re: [PacketFence-users] MSCHAP and Local Auth
From: Durand fabrice via PacketFence-users <packetfence-users () lists ! sourceforge ! net>
Date: 2020-10-31 1:16:52
Message-ID: a25e5504-dec9-e89d-ead0-223b36fdd847 () inverse ! ca
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
Yes it looks that you made a typo in raddb/policy.d/packetfence
Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
/usr/local/pf/raddb/sites-enabled/packetfence[190]: Failed to parse
"packetfence-mschap-authenticate" entry.
Le 20-10-30 à 21 h 00, Enrique Gross a écrit :
> Thanks Fabrice
>
> I probably messed up something, and should start over with my testing
> setup, this isjournalctl when starting radiusd, i have been checking
> config files regarding sql modules, but with not luck.
>
> Thanks, and good weekend
>
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql_mysql: Starting connect to MySQL server
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql): Reserved connection (0)
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql): Released connection (0)
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (pfguest): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (pfsponsor): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (pfsms): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (pflocal): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_reject): groupmemb_query is empty. Please delete it from
> the configuration
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_reject): authorize_check_query is empty. Please delete
> it from the configuration
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_reject): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_degraded): groupmemb_query is empty. Please delete it
> from the configuration
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_degraded): Ignoring read_groups as group_membership_query
> is not configured
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_sql (sql_degraded): Attempting to connect to database "pf"
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_mschap (mschap): authenticating by calling 'ntlm_auth'
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_mschap (chrooted_mschap): authenticating by calling 'ntlm_auth'
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_mschap (chrooted_mschap_machine): authenticating by calling
> 'ntlm_auth'
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_mschap (mschap_machine): authenticating by calling 'ntlm_auth'
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> rlm_mschap (mschap_local): using internal authentication
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/policy.d/packetfence[15]: "sql" modules aren't
> allowed in 'authenticate' sections -- they have no such method.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/policy.d/packetfence[15]: Failed to parse
> "pflocal" entry.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/policy.d/packetfence[145]: Failed to parse
> "packetfence-local-auth" entry.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/policy.d/packetfence[144]: Failed to parse "else"
> subsection.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/policy.d/packetfence[140]: Failed to parse "else"
> subsection.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> radiusd[17061]:
> /usr/local/pf/raddb/sites-enabled/packetfence[190]: Failed to parse
> "packetfence-mschap-authenticate" entry.
> Oct 31 00:53:38 pf.jcc.com.ar <http://pf.jcc.com.ar> systemd[1]:
> packetfence-radiusd-auth.service: control process exited, code=exited
> status=1
>
> El vie., 30 oct. 2020 a las 19:59, Durand fabrice (<fdurand@inverse.ca
> <mailto:fdurand@inverse.ca>>) escribió:
>
> Hello Enrique,
>
> i did the same on my side and i am able to restart radiusd.
>
> Take a look at journalctl to see why it fail to start.
>
> Regards
>
> Fabrice
>
>
> Le 20-10-30 à 14 h 44, Enrique Gross a écrit :
> > Hi all!
> >
> > Thanks for your help Fabrice
> >
> > When changing function to packetfence-local-auth, radius-auth
> fails to
> > start, i am not getting so much info of radius.log
> >
> > Oct 30 18:39:09 pf auth[7031]: Signalled to terminate
> > Oct 30 18:39:09 pf auth[7031]: Exiting normally
> > Oct 30 18:39:09 pf auth[7031]: rlm_perl: rlm_perl::Detaching.
> Reloading. Done.
> > Oct 30 18:39:09 pf auth[7031]: rlm_perl: rlm_perl::Detaching.
> Reloading. Done.
> >
> > And packetfence.log
> >
> > Oct 30 18:39:09 pf packetfence: pfperl-api(2390) INFO: Stopping
> > radiusd-auth with pid 7031 (pf::services::manager::stopService)
> > Oct 30 18:39:09 pf packetfence: pfperl-api(2390) INFO: child
> exited with value 0
> > (pf::services::manager::stopService)
> > Oct 30 18:39:14 pf packetfence: pfperl-api(2394) INFO: Daemon
> > radiusd-auth took 2.123 seconds to start.
> > (pf::services::manager::launchService)
> >
> > Thanks!
> >
> >
> > El jue., 29 oct. 2020 a las 21:57, Durand fabrice
> > (<fdurand@inverse.ca <mailto:fdurand@inverse.ca>>) escribió:
> > > Hello Enrique,
> > >
> > > sorry for the late reply.
> > >
> > > So ppp mschap with local pf account is not really implemented.
> > >
> > > What you can try is to edit
> /usr/local/pf/raddb/policy.d/packetfence and find the following
> function:
> > >
> > > packetfence-mschap-authenticate {
> > > if(PacketFence-Domain) {
> > > if ( "%{User-Name}" =~ /^host\/.*/) {
> > > chrooted_mschap_machine
> > > }
> > > else {
> > > chrooted_mschap
> > > }
> > > }
> > > else {
> > > if ( "%{User-Name}" =~ /^host\/.*/) {
> > > mschap_machine
> > > }
> > > else {
> > > mschap
> > > }
> > > }
> > > }
> > >
> > >
> > > and replace it with:
> > >
> > > packetfence-mschap-authenticate {
> > > if(PacketFence-Domain) {
> > > if ( "%{User-Name}" =~ /^host\/.*/) {
> > > chrooted_mschap_machine
> > > }
> > > else {
> > > chrooted_mschap
> > > }
> > > }
> > > else {
> > > if ( "%{User-Name}" =~ /^host\/.*/) {
> > > mschap_machine
> > > }
> > > else {
> > > packetfence-local-auth
> > > }
> > > }
> > > }
> > >
> > > Then restart radius and retry.
> > >
> > > Let me know if it works.
> > >
> > > Regards
> > >
> > > Fabrice
> > >
> > >
> > > Le 20-10-26 à 12 h 15, Enrique Gross a écrit :
> > >
> > > Thanks Fabrice
> > >
> > > raddebug output:
> > >
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Received Access-Request
> Id 132 from X.X.X.X:55645 to X.X.X.X:1812 length 191
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Service-Type = Framed-User
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Framed-Protocol = PPP
> > > (727) Mon Oct 26 15:54:22 2020: Debug: NAS-Port = 39
> > > (727) Mon Oct 26 15:54:22 2020: Debug: NAS-Port-Type = Virtual
> > > (727) Mon Oct 26 15:54:22 2020: Debug: User-Name = "coyo"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Calling-Station-Id > "X.X.X.X"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Called-Station-Id > "X.X.X.X"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Acct-Session-Id > "81d00cdf"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: MS-CHAP-Challenge > \
> > > 0xebf6d832753d4fdf8383548a74da2637 (727) Mon Oct 26 15:54:22 2020: Debug: \
> > > MS-CHAP2-Response > \
> > > 0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5
> > > (727) Mon Oct 26 15:54:22 2020: Debug: NAS-Identifier > "MK-IBERA2"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: NAS-IP-Address = X.X.X.X
> > > (727) Mon Oct 26 15:54:22 2020: Debug: # Executing section
> authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
> > > (727) Mon Oct 26 15:54:22 2020: Debug: authorize {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> packetfence-nas-ip-address {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> packetfence-nas-ip-address = notfound
> > > (727) Mon Oct 26 15:54:22 2020: Debug: update {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
> %{Packet-Src-IP-Address}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> X.X.X.X
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
> %{Packet-Dst-IP-Address}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> X.X.X.X
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND %l
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> 1603738462
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # update = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> packetfence-set-realm-if-machine {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (User-Name =~
> /host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> packetfence-set-realm-if-machine = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> packetfence-balanced-key-policy {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (&PacketFence-KeyBalanced && (&PacketFence-KeyBalanced =~
> /^(.*)(.)$/i)) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (&PacketFence-KeyBalanced && (&PacketFence-KeyBalanced =~
> /^(.*)(.)$/i)) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: update {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
> %{md5:%{Calling-Station-Id}%{User-Name}}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: -->
> 865fdf018805bc0bc5fbb22eaa6b0a60
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
> %{md5:%{Calling-Station-Id}%{User-Name}}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: -->
> 865fdf018805bc0bc5fbb22eaa6b0a60
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # update = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # else = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> packetfence-balanced-key-policy = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> packetfence-set-tenant-id {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> 0
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: update control {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: SQL-User-Name set to 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Executing select
> query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE
> nasname = 'X.X.X.X'), 0)
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND %{sql: SELECT
> IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname > '%{NAS-IP-Address}'), \
> 0)}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> 1
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # update
> control = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> &control:PacketFence-Tenant-Id == 0 ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> &control:PacketFence-Tenant-Id == 0 ) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> packetfence-set-tenant-id = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> rewrite_calling_station_id {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (&Calling-Station-Id && (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
> {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (&Calling-Station-Id && (&Calling-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
>
> -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [noop] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # else = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> rewrite_calling_station_id = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> rewrite_called_station_id {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> ((&Called-Station-Id) && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
> {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> ((&Called-Station-Id) && (&Called-Station-Id =~
> /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
>
> -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [noop] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # else = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> rewrite_called_station_id = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> "%{client:shortname}" =~ /eduroam_tlrs/ ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
> %{client:shortname}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> X.X.X.X/32
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> "%{client:shortname}" =~ /eduroam_tlrs/ ) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy filter_username {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name)
> -> TRUE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> =~ / /) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> =~ / /) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> =~ /@[^@]*@/ ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> =~ /@[^@]*@/ ) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> =~ /\.\./ ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> =~ /\.\./ ) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if ((&User-Name
> =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if ((&User-Name
> =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> =~ /\.$/) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> =~ /\.$/) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> =~ /@\./) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> =~ /@\./) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # if
> (&User-Name) = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> filter_username = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy filter_password {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Password
> && (&User-Password != "%{string:User-Password}")) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Password
> && (&User-Password != "%{string:User-Password}")) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> filter_password = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [preprocess] = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Found MS-CHAP
> attributes. Setting 'Auth-Type = mschap'
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [mschap] = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug: suffix: Checking for
> suffix after "@"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: suffix: No '@' in
> User-Name = "coyo", skipping NULL due to config.
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [suffix] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: Checking for
> prefix before "\"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: No '\' in
> User-Name = "coyo", looking up realm NULL
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: Found realm "null"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: Adding
> Stripped-User-Name = "coyo"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: Adding Realm > "null"
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: Authentication
> realm is LOCAL
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [ntdomain] = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (Realm =~
> /default/) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (Realm =~
> /default/) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: elsif (Realm =~
> /local/) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: elsif (Realm =~
> /local/) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: elsif (Realm =~
> /null/) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: elsif (Realm =~
> /null/) -> TRUE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: elsif (Realm =~
> /null/) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: PEAP: No EAP-Message,
> not doing EAP
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [PEAP] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # elsif (Realm =~
> /null/) = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: ... skipping else:
> Preceding "if" was taken
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if ( !EAP-Message &&
> "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
> %{%{Control:Auth-type}:-No-MS_CHAP}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> MS-CHAP
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if ( !EAP-Message &&
> "%{%{Control:Auth-type}:-No-MS_CHAP}" != "MS-CHAP") -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (Control:Auth-type == "MS-CHAP") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (Control:Auth-type == "MS-CHAP") -> TRUE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (Control:Auth-type == "MS-CHAP") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'User-Name'} > &request:User-Name -> \
> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'NAS-IP-Address'} > \
> &request:NAS-IP-Address -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'NAS-Port'} > &request:NAS-Port -> \
> '39'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'Service-Type'} > \
> &request:Service-Type -> 'Framed-User'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'Framed-Protocol'} > \
> &request:Framed-Protocol -> 'PPP'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'Called-Station-Id'} > \
> &request:Called-Station-Id -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'Calling-Station-Id'} > \
> &request:Calling-Station-Id -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'NAS-Identifier'} > \
> &request:NAS-Identifier -> 'MK-IBERA2'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'NAS-Port-Type'} > \
> &request:NAS-Port-Type -> 'Virtual'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'Acct-Session-Id'} > \
> &request:Acct-Session-Id -> '81d00cdf'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'Event-Timestamp'} > \
> &request:Event-Timestamp -> 'Oct 26 2020 15:54:22 -03'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'MS-CHAP-Challenge'} > \
> &request:MS-CHAP-Challenge -> '0xebf6d832753d4fdf8383548a74da2637'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'MS-CHAP2-Response'} > \
> &request:MS-CHAP2-Response -> \
> '0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5'
>
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'Stripped-User-Name'} > \
> &request:Stripped-User-Name -> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'Realm'} = &request:Realm
> -> 'null'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'SQL-User-Name'} > \
> &request:SQL-User-Name -> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain:
> $RAD_REQUEST{'FreeRADIUS-Client-IP-Address'} > \
> &request:FreeRADIUS-Client-IP-Address -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'PacketFence-KeyBalanced'}
> = &request:PacketFence-KeyBalanced ->
> '865fdf018805bc0bc5fbb22eaa6b0a60'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_REQUEST{'PacketFence-Radius-Ip'} > \
> &request:PacketFence-Radius-Ip -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CHECK{'Auth-Type'} > &control:Auth-Type -> \
> 'MS-CHAP'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CHECK{'Load-Balance-Key'} > \
> &control:Load-Balance-Key -> '865fdf018805bc0bc5fbb22eaa6b0a60'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CHECK{'Tmp-Integer-0'} > \
> &control:Tmp-Integer-0 -> '1603738462'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CHECK{'PacketFence-RPC-Server'} > \
> &control:PacketFence-RPC-Server -> '127.0.0.1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CHECK{'PacketFence-RPC-Port'} > \
> &control:PacketFence-RPC-Port -> '7070'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CHECK{'PacketFence-RPC-User'} > \
> &control:PacketFence-RPC-User -> ''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CHECK{'PacketFence-RPC-Pass'} > \
> &control:PacketFence-RPC-Pass -> ''''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CHECK{'PacketFence-RPC-Proto'} > \
> &control:PacketFence-RPC-Proto -> 'http'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CHECK{'PacketFence-Request-Time'}
> = &control:PacketFence-Request-Time -> '0'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CHECK{'PacketFence-Tenant-Id'} > \
> &control:PacketFence-Tenant-Id -> '1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CONFIG{'Auth-Type'} > &control:Auth-Type -> \
> 'MS-CHAP'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CONFIG{'Load-Balance-Key'} > \
> &control:Load-Balance-Key -> '865fdf018805bc0bc5fbb22eaa6b0a60'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CONFIG{'Tmp-Integer-0'} > \
> &control:Tmp-Integer-0 -> '1603738462'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CONFIG{'PacketFence-RPC-Server'} > \
> &control:PacketFence-RPC-Server -> '127.0.0.1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CONFIG{'PacketFence-RPC-Port'} > \
> &control:PacketFence-RPC-Port -> '7070'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CONFIG{'PacketFence-RPC-User'} > \
> &control:PacketFence-RPC-User -> ''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CONFIG{'PacketFence-RPC-Pass'} > \
> &control:PacketFence-RPC-Pass -> ''''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CONFIG{'PacketFence-RPC-Proto'} > \
> &control:PacketFence-RPC-Proto -> 'http'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CONFIG{'PacketFence-Request-Time'}
> = &control:PacketFence-Request-Time -> '0'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: $RAD_CONFIG{'PacketFence-Tenant-Id'} > \
> &control:PacketFence-Tenant-Id -> '1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:NAS-Port-Type > \
> $RAD_REQUEST{'NAS-Port-Type'} -> 'Virtual'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Acct-Session-Id > \
> $RAD_REQUEST{'Acct-Session-Id'} -> '81d00cdf'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:PacketFence-Radius-Ip > \
> $RAD_REQUEST{'PacketFence-Radius-Ip'} -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Service-Type > $RAD_REQUEST{'Service-Type'} \
> -> 'Framed-User'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Called-Station-Id > \
> $RAD_REQUEST{'Called-Station-Id'} -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Realm = $RAD_REQUEST{'Realm'}
> -> 'null'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:NAS-IP-Address > \
> $RAD_REQUEST{'NAS-IP-Address'} -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:SQL-User-Name > \
> $RAD_REQUEST{'SQL-User-Name'} -> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:PacketFence-NTLMv2-Only > \
> $RAD_REQUEST{'PacketFence-NTLMv2-Only'} -> ''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Calling-Station-Id > \
> $RAD_REQUEST{'Calling-Station-Id'} -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:PacketFence-KeyBalanced > \
> $RAD_REQUEST{'PacketFence-KeyBalanced'} -> '865fdf018805bc0bc5fbb22eaa6b0a60'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:FreeRADIUS-Client-IP-Address > \
> $RAD_REQUEST{'FreeRADIUS-Client-IP-Address'} -> 'X.X.X.X'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:MS-CHAP-Challenge > \
> $RAD_REQUEST{'MS-CHAP-Challenge'} -> '0xebf6d832753d4fdf8383548a74da2637'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Framed-Protocol > \
> $RAD_REQUEST{'Framed-Protocol'} -> 'PPP'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:User-Name > $RAD_REQUEST{'User-Name'} -> \
> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:NAS-Identifier > \
> $RAD_REQUEST{'NAS-Identifier'} -> 'MK-IBERA2'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Event-Timestamp > \
> $RAD_REQUEST{'Event-Timestamp'} -> 'Oct 26 2020 15:54:22 -03'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:MS-CHAP2-Response > \
> $RAD_REQUEST{'MS-CHAP2-Response'} -> \
> '0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5'
>
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:NAS-Port > $RAD_REQUEST{'NAS-Port'} -> '39'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &request:Stripped-User-Name > \
> $RAD_REQUEST{'Stripped-User-Name'} -> 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:Load-Balance-Key > \
> $RAD_CHECK{'Load-Balance-Key'} -> '865fdf018805bc0bc5fbb22eaa6b0a60'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-RPC-Server > \
> $RAD_CHECK{'PacketFence-RPC-Server'} -> '127.0.0.1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-Tenant-Id > \
> $RAD_CHECK{'PacketFence-Tenant-Id'} -> '1'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-RPC-User > \
> $RAD_CHECK{'PacketFence-RPC-User'} -> ''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-Request-Time > \
> $RAD_CHECK{'PacketFence-Request-Time'} -> '0'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:Auth-Type > $RAD_CHECK{'Auth-Type'} -> \
> 'MS-CHAP'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-RPC-Pass > \
> $RAD_CHECK{'PacketFence-RPC-Pass'} -> ''''
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:Tmp-Integer-0 > $RAD_CHECK{'Tmp-Integer-0'} \
> -> '1603738462'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-RPC-Proto > \
> $RAD_CHECK{'PacketFence-RPC-Proto'} -> 'http'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> packetfence-multi-domain: &control:PacketFence-RPC-Port > \
> $RAD_CHECK{'PacketFence-RPC-Port'} -> '7070'
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> [packetfence-multi-domain] = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # if
> (Control:Auth-type == "MS-CHAP") = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> packetfence-eap-mac-policy {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if ( &EAP-Type ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if ( &EAP-Type )
> -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [noop] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> packetfence-eap-mac-policy = noop
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap:
> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!! Ignoring
> control:User-Password. Update your !!!
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!! configuration
> so that the "known good" clear text !!!
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!! password is
> in Cleartext-Password and NOT in !!!
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!!
> User-Password. !!!
> > > (727) Mon Oct 26 15:54:22 2020: WARNING: pap:
> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [pap] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # authorize = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Found Auth-Type = MS-CHAP
> > > (727) Mon Oct 26 15:54:22 2020: Debug: # Executing group from
> file /usr/local/pf/raddb/sites-enabled/packetfence
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Auth-Type MS-CHAP {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> packetfence-mschap-authenticate {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (PacketFence-Domain) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (PacketFence-Domain) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> "%{User-Name}" =~ /^host\/.*/) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> "%{User-Name}" =~ /^host\/.*/) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Creating
> challenge hash with username: coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Client is using
> MS-CHAPv2
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Executing:
> /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --
> --request-nt-key
> --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}}
>
> --challenge=%{mschap:Challenge:-00}
> --nt-response=%{mschap:NT-Response:-00}:
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
> --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}}
>
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: --> --username=coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Creating
> challenge hash with username: coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
> --challenge=%{mschap:Challenge:-00}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: -->
> --challenge4bcfae02f18a60
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
> --nt-response=%{mschap:NT-Response:-00}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: -->
> --nt-response´4e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5
> > > (727) Mon Oct 26 15:54:22 2020: ERROR: mschap: Program returned
> code (1) and output 'Reading winbind reply failed! (0xc0000001)'
> > > (727) Mon Oct 26 15:54:22 2020: ERROR: mschap: Reading winbind
> reply failed! (0xc0000001)
> > > (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Authentication
> failed
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [mschap] = fail
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # else = fail
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # else = fail
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> packetfence-mschap-authenticate = fail
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # Auth-Type MS-CHAP
> = fail
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Failed to authenticate
> the user
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Using Post-Auth-Type Reject
> > > (727) Mon Oct 26 15:54:22 2020: Debug: # Executing group from
> file /usr/local/pf/raddb/sites-enabled/packetfence
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Post-Auth-Type REJECT {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> packetfence-set-tenant-id {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
> %{%{control:PacketFence-Tenant-Id}:-0}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> 1
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> &control:PacketFence-Tenant-Id == 0 ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (
> &control:PacketFence-Tenant-Id == 0 ) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> packetfence-set-tenant-id = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: update {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # update = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (! EAP-Type ||
> (EAP-Type != TTLS && EAP-Type != PEAP) ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (! EAP-Type ||
> (EAP-Type != TTLS && EAP-Type != PEAP) ) -> TRUE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (! EAP-Type ||
> (EAP-Type != TTLS && EAP-Type != PEAP) ) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> packetfence-audit-log-reject {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> && (&User-Name == "dummy")) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if (&User-Name
> && (&User-Name == "dummy")) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy request-timing {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
> %{%{control:PacketFence-Request-Time}:-0}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> 0
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> ("%{%{control:PacketFence-Request-Time}:-0}" != 0) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> request-timing = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: EXPAND
> type.reject.query
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: -->
> type.reject.query
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: Using query
> template 'query'
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: EXPAND
> %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: --> coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
> SQL-User-Name set to 'coyo'
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: EXPAND
> INSERT INTO radius_audit_log ( mac, ip,
> computer_name, user_name, stripped_user_name,
> realm, event_type, switch_id, switch_mac,
> switch_ip_address, radius_source_ip_address,
> called_station_id, calling_station_id, nas_port_type, ssid,
> nas_port_id, ifindex, nas_port, connection_type,
> nas_ip_address, nas_identifier, auth_status,
> reason, auth_type, eap_type, role,
> node_status, profile, source, auto_reg, is_phone,
> pf_domain, uuid, radius_request, radius_reply,
> request_time, tenant_id, radius_ip) VALUES (
> '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}',
> '%{%{control:PacketFence-Computer-Name}:-N/A}',
> '%{request:User-Name}', '%{request:Stripped-User-Name}',
> '%{request:Realm}', 'Radius-Access-Request',
> '%{%{control:PacketFence-Switch-Id}:-N/A}',
> '%{%{control:PacketFence-Switch-Mac}:-N/A}',
> '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
> '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
> '%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}',
> '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
> '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
> '%{%{control:PacketFence-Connection-Type}:-N/A}',
> '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',
> 'Reject', '%{request:Module-Failure-Message}',
> '%{control:Auth-Type}', '%{request:EAP-Type}',
> '%{%{control:PacketFence-Role}:-N/A}',
> '%{%{control:PacketFence-Status}:-N/A}',
> '%{%{control:PacketFence-Profile}:-N/A}',
> '%{%{control:PacketFence-Source}:-N/A}',
> '%{%{control:PacketFence-AutoReg}:-0}',
> '%{%{control:PacketFence-IsPhone}:-0}',
> '%{request:PacketFence-Domain}', '',
> '%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
> '%{%{control:PacketFence-Request-Time}:-N/A}',
> '%{control:PacketFence-Tenant-Id}',
> '%{request:PacketFence-Radius-Ip}')
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: --> INSERT
> INTO radius_audit_log ( mac, ip, computer_name,
> user_name, stripped_user_name, realm, event_type,
> switch_id, switch_mac, switch_ip_address,
> radius_source_ip_address, called_station_id,
> calling_station_id, nas_port_type, ssid, nas_port_id,
> ifindex, nas_port, connection_type,
> nas_ip_address, nas_identifier, auth_status,
> reason, auth_type, eap_type, role, node_status,
> profile, source, auto_reg, is_phone,
> pf_domain, uuid, radius_request, radius_reply,
> request_time, tenant_id, radius_ip) VALUES (
> 'X.X.X.X', '', 'N/A', 'coyo', 'coyo', 'null',
> 'Radius-Access-Request', 'N/A', 'N/A', 'N/A',
> 'X.X.X.X', 'X.X.X.X', 'X.X.X.X', 'Virtual', '',
> '', 'N/A', '39', 'N/A', 'X.X.X.X',
> 'MK-IBERA2', 'Reject', 'mschap: Program returned code (1) and
> output 'Reading winbind reply failed! (0xc0000001)'',
> 'MS-CHAP', '', 'N/A', 'N/A', 'N/A',
> 'N/A', '0', '0', '', '', 'NAS-Port-Type =
> Virtual, Acct-Session-Id = "81d00cdf", PacketFence-Radius-Ip
> = "X.X.X.X", Service-Type = Framed-User, Called-Station-Id
> = "X.X.X.X", Realm = "null", NAS-IP-Address =
> X.X.X.X, PacketFence-NTLMv2-Only = "", Calling-Station-Id
> = "X.X.X.X", PacketFence-KeyBalanced =
> "865fdf018805bc0bc5fbb22eaa6b0a60",
> FreeRADIUS-Client-IP-Address = X.X.X.X, MS-CHAP-Challenge =
> 0xebf6d832753d4fdf8383548a74da2637, Framed-Protocol = PPP,
> User-Name = "coyo", NAS-Identifier = "MK-IBERA2",
> Event-Timestamp = "Oct 26 2020 15:54:22 -03",
> MS-CHAP2-Response =
> 0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5,
> NAS-Port = 39, Stripped-User-Name = "coyo",
> Module-Failure-Message = "mschap: Program returned code (1)
> and output 'Reading winbind reply failed! (0xc0000001)'",
> Module-Failure-Message = "mschap: Reading winbind reply
> failed! (0xc0000001)", User-Password =
> "******", SQL-User-Name =
> "coyo"','MS-CHAP-Error = "\001E=691 R=0
> C=c86ce57de86611d248ddad2f2eb690ab V=3 M=Authentication
> failed"', '0', '1', 'X.X.X.X')
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: Executing
> query: INSERT INTO radius_audit_log ( mac, ip,
> computer_name, user_name, stripped_user_name, realm, event_type,
> switch_id, switch_mac, switch_ip_address,
> radius_source_ip_address, called_station_id, calling_station_id,
> nas_port_type, ssid, nas_port_id,
> ifindex, nas_port, connection_type, nas_ip_address,
> nas_identifier, auth_status, reason, auth_type,
> eap_type, role, node_status, profile, source,
> auto_reg, is_phone, pf_domain, uuid,
> radius_request, radius_reply, request_time,
> tenant_id, radius_ip) VALUES ( 'X.X.X.X', '',
> 'N/A', 'coyo', 'coyo', 'null',
> 'Radius-Access-Request', 'N/A', 'N/A', 'N/A',
> 'X.X.X.X', 'X.X.X.X', 'X.X.X.X', 'Virtual', '',
> '', 'N/A', '39', 'N/A', 'X.X.X.X',
> 'MK-IBERA2', 'Reject', 'mschap: Program returned code (1) and
> output 'Reading winbind reply failed! (0xc0000001)'',
> 'MS-CHAP', '', 'N/A', 'N/A', 'N/A',
> 'N/A', '0', '0', '', '', 'NAS-Port-Type =
> Virtual, Acct-Session-Id = "81d00cdf", PacketFence-Radius-Ip
> = "X.X.X.X", Service-Type = Framed-User, Called-Station-Id
> = "X.X.X.X", Realm = "null", NAS-IP-Address =
> X.X.X.X, PacketFence-NTLMv2-Only = "", Calling-Station-Id
> = "X.X.X.X", PacketFence-KeyBalanced =
> "865fdf018805bc0bc5fbb22eaa6b0a60",
> FreeRADIUS-Client-IP-Address = X.X.X.X, MS-CHAP-Challenge =
> 0xebf6d832753d4fdf8383548a74da2637, Framed-Protocol = PPP,
> User-Name = "coyo", NAS-Identifier = "MK-IBERA2",
> Event-Timestamp = "Oct 26 2020 15:54:22 -03",
> MS-CHAP2-Response =
> 0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5,
> NAS-Port = 39, Stripped-User-Name = "coyo",
> Module-Failure-Message = "mschap: Program returned code (1)
> and output 'Reading winbind reply failed! (0xc0000001)'",
> Module-Failure-Message = "mschap: Reading winbind reply
> failed! (0xc0000001)", User-Password =
> "******", SQL-User-Name =
> "coyo"','MS-CHAP-Error = "\001E=691 R=0
> C=c86ce57de86611d248ddad2f2eb690ab V=3 M=Authentication
> failed"', '0', '1', 'X.X.X.X')
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: SQL query
> returned: success
> > > (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: 1 record(s)
> updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [sql_reject] = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # else = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> packetfence-audit-log-reject = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # if (! EAP-Type
> > > (EAP-Type != TTLS && EAP-Type != PEAP) ) = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
> %{%{control:PacketFence-Proxied-From}:-False}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: --> False
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> ("%{%{control:PacketFence-Proxied-From}:-False}" == "True") -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.access_reject: EXPAND %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.access_reject: --> coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.access_reject: Matched entry DEFAULT at line 11
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> [attr_filter.access_reject] = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.packetfence_post_auth: EXPAND %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.packetfence_post_auth: --> coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10
> > > (727) Mon Oct 26 15:54:22 2020: Debug:
> [attr_filter.packetfence_post_auth] = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [eap] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: policy
> remove_reply_message_if_eap {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (&reply:EAP-Message && &reply:Reply-Message) {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: if
> (&reply:EAP-Message && &reply:Reply-Message) -> FALSE
> > > (727) Mon Oct 26 15:54:22 2020: Debug: else {
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [noop] = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # else = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
> remove_reply_message_if_eap = noop
> > > (727) Mon Oct 26 15:54:22 2020: Debug: linelog: EXPAND
> messages.%{%{reply:Packet-Type}:-default}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: linelog: -->
> messages.Access-Reject
> > > (727) Mon Oct 26 15:54:22 2020: Debug: linelog: EXPAND
> [mac:%{Calling-Station-Id}] Rejected user: %{User-Name}
> > > (727) Mon Oct 26 15:54:22 2020: Debug: linelog: -->
> [mac:X.X.X.X] Rejected user: coyo
> > > (727) Mon Oct 26 15:54:22 2020: Debug: [linelog] = ok
> > > (727) Mon Oct 26 15:54:22 2020: Debug: } # Post-Auth-Type
> REJECT = updated
> > > (727) Mon Oct 26 15:54:22 2020: Debug: Delaying response for
> 1.000000 seconds
> > > (727) Mon Oct 26 15:54:23 2020: Debug: (727) Discarding
> duplicate request from client X.X.X.X/32 port 55645 - ID: 132 due
> to delayed response
> > > (727) Mon Oct 26 15:54:23 2020: Debug: Sending delayed response
> > > (727) Mon Oct 26 15:54:23 2020: Debug: Sent Access-Reject Id
> 132 from X.X.X.X:1812 to X.X.X.X:55645 length 101
> > > (727) Mon Oct 26 15:54:23 2020: Debug: MS-CHAP-Error > "\001Ei1 R=0 \
> > > CÈ6ce57de86611d248ddad2f2eb690ab V=3
> M=Authentication failed"
> > > (727) Mon Oct 26 15:54:27 2020: Debug: Cleaning up request
> packet ID 132 with timestamp +10785
> > > (728) Mon Oct 26 15:54:30 2020: Debug: Received Status-Server
> Id 199 from 127.0.0.1:50706 <http://127.0.0.1:50706> to
> 127.0.0.1:18121 <http://127.0.0.1:18121> length 50
> > > (728) Mon Oct 26 15:54:30 2020: Debug: Message-Authenticator > \
> > > 0x746e4169562dc5520ee77b953ef0ac7b (728) Mon Oct 26 15:54:30 2020: Debug:
> FreeRADIUS-Statistics-Type = 15
> > > (728) Mon Oct 26 15:54:30 2020: Debug: # Executing group from
> file /usr/local/pf/raddb/sites-enabled/status
> > > (728) Mon Oct 26 15:54:30 2020: Debug: Autz-Type Status-Server {
> > > (728) Mon Oct 26 15:54:30 2020: Debug: [ok] = ok
> > > (728) Mon Oct 26 15:54:30 2020: Debug: } # Autz-Type
> Status-Server = ok
> > >
> > > El lun., 26 oct. 2020 a las 12:39, Fabrice Durand via
> PacketFence-users (<packetfence-users@lists.sourceforge.net
> <mailto:packetfence-users@lists.sourceforge.net>>) escribió:
> > > > Hello Enrique,
> > > >
> > > > can you provide the raddebug output ?
> > > >
> > > > raddebug -f /usr/local/pf/var/run/radiusd.sock -t 3000
> > > >
> > > >
> > > > Regards
> > > >
> > > > Fabrice
> > > >
> > > >
> > > > Le 20-10-26 Ã 09 h 42, Enrique Gross via PacketFence-users a
> écrit :
> > > > > Hi Packetfence Users,
> > > > >
> > > > > Hope you are doing fine
> > > > >
> > > > > I am struggling to authenticate PPP users via MSCHAP with
> local PF
> > > > > authentication, my switch is a Mikrotik device, I am forwarding
> > > > > authentication via Radius to packetfence server.
> > > > >
> > > > > I am getting error
> > > > >
> > > > > (144) Login incorrect (mschap: Program returned code (1) and
> output
> > > > > 'Reading winbind reply failed!
> > > > >
> > > > > When I disable MSCHAP/CHAP as an authentication method and
> use PAP my
> > > > > users can authenticate fine.
> > > > >
> > > > > I have uncomment
> /usr/local/pf/conf/radiusd/packetfence-tunnel and
> > > > > Take care of the "Database passwords hashing method"
> > > > >
> > > > > I will really appreciate any help
> > > > >
> > > > > Thanks, Enrique
> > > > >
> > > > > --
> > > > >
> > > > >
> > > > > _______________________________________________
> > > > > PacketFence-users mailing list
> > > > > PacketFence-users@lists.sourceforge.net
> <mailto:PacketFence-users@lists.sourceforge.net>
> > > > > https://lists.sourceforge.net/lists/listinfo/packetfence-users
> > > > --
> > > > Fabrice Durand
> > > > fdurand@inverse.ca <mailto:fdurand@inverse.ca> ::
> +1.514.447.4918 (x135) :: www.inverse.ca <http://www.inverse.ca>
> > > > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and
> PacketFence (http://packetfence.org)
> > > >
> > > >
> > > >
> > > > _______________________________________________
> > > > PacketFence-users mailing list
> > > > PacketFence-users@lists.sourceforge.net
> <mailto:PacketFence-users@lists.sourceforge.net>
> > > > https://lists.sourceforge.net/lists/listinfo/packetfence-users
> > >
> > >
> > > --
> > >
> > >
> >
> > --
>
>
>
> --
>
> Imágenes integradas 1
[Attachment #5 (multipart/related)]
[Attachment #7 (text/html)]
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<p>Yes it looks that you made a typo in raddb/policy.d/packetfence</p>
<p><br>
</p>
<p>Oct 31 00:53:38 <a href="http://pf.jcc.com.ar">pf.jcc.com.ar</a>
radiusd[17061]:
/usr/local/pf/raddb/sites-enabled/packetfence[190]: Failed to
parse "packetfence-mschap-authenticate" entry.</p>
<div class="moz-cite-prefix">Le 20-10-30 Ã 21 h 00, Enrique Gross a
écrit :<br>
</div>
<blockquote type="cite"
cite="mid:CAPacS7u4c9ZNOim6kkSsXA6MmcGZoKSs+4QFw3Z2OwCz_K9UWg@mail.gmail.com">
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<div dir="ltr">
<div>Thanks Fabrice</div>
<div><br>
</div>
<div>I probably messed up something, and should start over with
my testing setup, this isjournalctl when starting radiusd, i
have been checking config files regarding sql modules, but
with not luck. <br>
</div>
<div><br>
</div>
<div>Thanks, and good weekend <br>
</div>
<div><br>
</div>
<div>Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql_mysql: Starting connect to MySQL server<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (sql): Reserved connection (0)<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (sql): Released connection (0)<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (pfguest): Attempting to connect to database "pf"<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (pfsponsor): Attempting to connect to database "pf"<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (pfsms): Attempting to connect to database "pf"<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (pflocal): Attempting to connect to database "pf"<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (sql_reject): groupmemb_query is empty. Please delete
it from the configuration<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (sql_reject): authorize_check_query is empty. Please
delete it from the configuration<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (sql_reject): Attempting to connect to database "pf"<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (sql_degraded): groupmemb_query is empty. Please
delete it from the configuration<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (sql_degraded): Ignoring read_groups as
group_membership_query is not configured<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_sql (sql_degraded): Attempting to connect to database "pf"<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_mschap (mschap): authenticating by calling 'ntlm_auth'<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_mschap (chrooted_mschap): authenticating by calling
'ntlm_auth'<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_mschap (chrooted_mschap_machine): authenticating by
calling 'ntlm_auth'<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_mschap (mschap_machine): authenticating by calling
'ntlm_auth'<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
rlm_mschap (mschap_local): using internal authentication<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
/usr/local/pf/raddb/policy.d/packetfence[15]: "sql" modules
aren't allowed in 'authenticate' sections -- they have no such
method.<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
/usr/local/pf/raddb/policy.d/packetfence[15]: Failed to parse
"pflocal" entry.<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
/usr/local/pf/raddb/policy.d/packetfence[145]: Failed to parse
"packetfence-local-auth" entry.<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
/usr/local/pf/raddb/policy.d/packetfence[144]: Failed to parse
"else" subsection.<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
/usr/local/pf/raddb/policy.d/packetfence[140]: Failed to parse
"else" subsection.<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> radiusd[17061]:
/usr/local/pf/raddb/sites-enabled/packetfence[190]: Failed to
parse "packetfence-mschap-authenticate" entry.<br>
Oct 31 00:53:38 <a href="http://pf.jcc.com.ar"
moz-do-not-send="true">pf.jcc.com.ar</a> systemd[1]:
packetfence-radiusd-auth.service: control process exited,
code=exited status=1<br>
</div>
</div>
<br>
<div class="gmail_quote">
<div dir="ltr" class="gmail_attr">El vie., 30 oct. 2020 a las
19:59, Durand fabrice (<<a href="mailto:fdurand@inverse.ca"
moz-do-not-send="true">fdurand@inverse.ca</a>>) escribió:<br>
</div>
<blockquote class="gmail_quote" style="margin:0px 0px 0px
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hello
Enrique,<br>
<br>
i did the same on my side and i am able to restart radiusd.<br>
<br>
Take a look at journalctl to see why it fail to start.<br>
<br>
Regards<br>
<br>
Fabrice<br>
<br>
<br>
Le 20-10-30 à 14 h 44, Enrique Gross a écrit :<br>
> Hi all!<br>
><br>
> Thanks for your help Fabrice<br>
><br>
> When changing function to packetfence-local-auth,
radius-auth fails to<br>
> start, i am not getting so much info of radius.log<br>
><br>
> Oct 30 18:39:09 pf auth[7031]: Signalled to terminate<br>
> Oct 30 18:39:09 pf auth[7031]: Exiting normally<br>
> Oct 30 18:39:09 pf auth[7031]: rlm_perl:
rlm_perl::Detaching. Reloading. Done.<br>
> Oct 30 18:39:09 pf auth[7031]: rlm_perl:
rlm_perl::Detaching. Reloading. Done.<br>
><br>
> And packetfence.log<br>
><br>
> Oct 30 18:39:09 pf packetfence: pfperl-api(2390) INFO:
Stopping<br>
> radiusd-auth with pid 7031
(pf::services::manager::stopService)<br>
> Oct 30 18:39:09 pf packetfence: pfperl-api(2390) INFO:
child exited with value 0<br>
> (pf::services::manager::stopService)<br>
> Oct 30 18:39:14 pf packetfence: pfperl-api(2394) INFO:
Daemon<br>
> radiusd-auth took 2.123 seconds to start.<br>
> (pf::services::manager::launchService)<br>
><br>
> Thanks!<br>
><br>
><br>
> El jue., 29 oct. 2020 a las 21:57, Durand fabrice<br>
> (<<a href="mailto:fdurand@inverse.ca" target="_blank"
moz-do-not-send="true">fdurand@inverse.ca</a>>) escribió:<br>
>> Hello Enrique,<br>
>><br>
>> sorry for the late reply.<br>
>><br>
>> So ppp mschap with local pf account is not really
implemented.<br>
>><br>
>> What you can try is to edit
/usr/local/pf/raddb/policy.d/packetfence and find the
following function:<br>
>><br>
>> packetfence-mschap-authenticate {<br>
>> if(PacketFence-Domain) {<br>
>> if ( "%{User-Name}" =~ /^host\/.*/) {<br>
>> chrooted_mschap_machine<br>
>> }<br>
>> else {<br>
>> chrooted_mschap<br>
>> }<br>
>> }<br>
>> else {<br>
>> if ( "%{User-Name}" =~ /^host\/.*/) {<br>
>> mschap_machine<br>
>> }<br>
>> else {<br>
>> mschap<br>
>> }<br>
>> }<br>
>> }<br>
>><br>
>><br>
>> and replace it with:<br>
>><br>
>> packetfence-mschap-authenticate {<br>
>> if(PacketFence-Domain) {<br>
>> if ( "%{User-Name}" =~ /^host\/.*/) {<br>
>> chrooted_mschap_machine<br>
>> }<br>
>> else {<br>
>> chrooted_mschap<br>
>> }<br>
>> }<br>
>> else {<br>
>> if ( "%{User-Name}" =~ /^host\/.*/) {<br>
>> mschap_machine<br>
>> }<br>
>> else {<br>
>> packetfence-local-auth<br>
>> }<br>
>> }<br>
>> }<br>
>><br>
>> Then restart radius and retry.<br>
>><br>
>> Let me know if it works.<br>
>><br>
>> Regards<br>
>><br>
>> Fabrice<br>
>><br>
>><br>
>> Le 20-10-26 à 12 h 15, Enrique Gross a écrit :<br>
>><br>
>> Thanks Fabrice<br>
>><br>
>> raddebug output:<br>
>><br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: Received
Access-Request Id 132 from X.X.X.X:55645 to X.X.X.X:1812
length 191<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: Service-Type
= Framed-User<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
Framed-Protocol = PPP<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: NAS-Port \
39<br> >> (727) Mon Oct 26 15:54:22 2020: Debug:
NAS-Port-Type = Virtual<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: User-Name \
"coyo"<br> >> (727) Mon Oct 26 15:54:22 2020: Debug:
Calling-Station-Id = "X.X.X.X"<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
Called-Station-Id = "X.X.X.X"<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
Acct-Session-Id = "81d00cdf"<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
MS-CHAP-Challenge = 0xebf6d832753d4fdf8383548a74da2637<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
MS-CHAP2-Response \
0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
NAS-Identifier = "MK-IBERA2"<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
NAS-IP-Address = X.X.X.X<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: # Executing
section authorize from file
/usr/local/pf/raddb/sites-enabled/packetfence<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: authorize {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
packetfence-nas-ip-address {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
packetfence-nas-ip-address = notfound<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: update {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
%{Packet-Src-IP-Address}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> X.X.X.X<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
%{Packet-Dst-IP-Address}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> X.X.X.X<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
%l<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> 1603738462<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # update
= noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
packetfence-set-realm-if-machine {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(User-Name =~ /host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
packetfence-set-realm-if-machine = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
packetfence-balanced-key-policy {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&PacketFence-KeyBalanced &&
(&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&PacketFence-KeyBalanced &&
(&PacketFence-KeyBalanced =~ /^(.*)(.)$/i)) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: else {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: update
{<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
EXPAND %{md5:%{Calling-Station-Id}%{User-Name}}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> 865fdf018805bc0bc5fbb22eaa6b0a60<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
EXPAND %{md5:%{Calling-Station-Id}%{User-Name}}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> 865fdf018805bc0bc5fbb22eaa6b0a60<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } #
update = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # else
= noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
packetfence-balanced-key-policy = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
packetfence-set-tenant-id {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> 0<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: update
control {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
EXPAND %{User-Name}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> coyo<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
SQL-User-Name set to 'coyo'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
Executing select query: SELECT IFNULL((SELECT tenant_id FROM
radius_nas WHERE nasname = 'X.X.X.X'), 0)<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas
WHERE nasname = '%{NAS-IP-Address}'), 0)}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> 1<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } #
update control = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
packetfence-set-tenant-id = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
rewrite_calling_station_id {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&Calling-Station-Id && (&Calling-Station-Id
=~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&Calling-Station-Id && (&Calling-Station-Id
=~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) \
-> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: else {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [noop]
= noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # else
= noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
rewrite_calling_station_id = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
rewrite_called_station_id {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
((&Called-Station-Id) && (&Called-Station-Id
=~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
((&Called-Station-Id) && (&Called-Station-Id
=~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) \
-> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: else {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [noop]
= noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # else
= noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
rewrite_called_station_id = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
"%{client:shortname}" =~ /eduroam_tlrs/ ) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
%{client:shortname}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: -->
X.X.X.X/32<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
"%{client:shortname}" =~ /eduroam_tlrs/ ) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
filter_username {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name) -> TRUE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name =~ / /) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name =~ / /) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name =~ /@[^@]*@/ ) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name =~ /@[^@]*@/ ) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name =~ /\.\./ ) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name =~ /\.\./ ) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
((&User-Name =~ /@/) && (&User-Name !~
/@(.+)\.(.+)$/)) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
((&User-Name =~ /@/) && (&User-Name !~
/@(.+)\.(.+)$/)) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name =~ /\.$/) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name =~ /\.$/) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name =~ /@\./) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name =~ /@\./) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # if
(&User-Name) = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
filter_username = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
filter_password {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Password && (&User-Password ! \
"%{string:User-Password}")) {<br> >> (727) Mon Oct 26 15:54:22 2020: Debug: \
if
(&User-Password && (&User-Password ! \
"%{string:User-Password}")) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
filter_password = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
[preprocess] = ok<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Found
MS-CHAP attributes. Setting 'Auth-Type = mschap'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [mschap] \
ok<br> >> (727) Mon Oct 26 15:54:22 2020: Debug: suffix:
Checking for suffix after "@"<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: suffix: No '@'
in User-Name = "coyo", skipping NULL due to config.<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [suffix] \
noop<br> >> (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain:
Checking for prefix before "\"<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain: No
'\' in User-Name = "coyo", looking up realm NULL<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain:
Found realm "null"<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain:
Adding Stripped-User-Name = "coyo"<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain:
Adding Realm = "null"<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: ntdomain:
Authentication realm is LOCAL<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [ntdomain]
= ok<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (Realm
=~ /default/) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (Realm
=~ /default/) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: elsif
(Realm =~ /local/) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: elsif
(Realm =~ /local/) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: elsif
(Realm =~ /null/) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: elsif
(Realm =~ /null/) -> TRUE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: elsif
(Realm =~ /null/) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: PEAP: No
EAP-Message, not doing EAP<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [PEAP] \
noop<br> >> (727) Mon Oct 26 15:54:22 2020: Debug: } # elsif
(Realm =~ /null/) = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: ...
skipping else: Preceding "if" was taken<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
!EAP-Message && "%{%{Control:Auth-type}:-No-MS_CHAP}"
!= "MS-CHAP") {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
%{%{Control:Auth-type}:-No-MS_CHAP}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: -->
MS-CHAP<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
!EAP-Message && "%{%{Control:Auth-type}:-No-MS_CHAP}"
!= "MS-CHAP") -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(Control:Auth-type == "MS-CHAP") {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(Control:Auth-type == "MS-CHAP") -> TRUE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(Control:Auth-type == "MS-CHAP") {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'User-Name'} \
&request:User-Name -> 'coyo'<br> >> (727) Mon Oct 26 15:54:22 2020: \
Debug:
packetfence-multi-domain: $RAD_REQUEST{'NAS-IP-Address'} \
&request:NAS-IP-Address -> 'X.X.X.X'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'NAS-Port'} \
&request:NAS-Port -> '39'<br> >> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'Service-Type'} \
&request:Service-Type -> 'Framed-User'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'Framed-Protocol'} \
&request:Framed-Protocol -> 'PPP'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug: packetfence-multi-domain: $RAD_REQUEST{'Called-Station-Id'}
= &request:Called-Station-Id -> 'X.X.X.X'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'Calling-Station-Id'}
= &request:Calling-Station-Id -> 'X.X.X.X'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'NAS-Identifier'} \
&request:NAS-Identifier -> 'MK-IBERA2'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'NAS-Port-Type'} \
&request:NAS-Port-Type -> 'Virtual'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'Acct-Session-Id'} \
&request:Acct-Session-Id -> '81d00cdf'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'Event-Timestamp'} \
&request:Event-Timestamp -> 'Oct 26 2020 15:54:22 -03'<br> >> (727) Mon \
Oct 26 15:54:22 2020: Debug: packetfence-multi-domain: \
$RAD_REQUEST{'MS-CHAP-Challenge'} = &request:MS-CHAP-Challenge ->
'0xebf6d832753d4fdf8383548a74da2637'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'MS-CHAP2-Response'}
= &request:MS-CHAP2-Response ->
'0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'Stripped-User-Name'}
= &request:Stripped-User-Name -> 'coyo'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'Realm'} \
&request:Realm -> 'null'<br> >> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_REQUEST{'SQL-User-Name'} \
&request:SQL-User-Name -> 'coyo'<br> >> (727) Mon Oct 26 15:54:22 2020: \
Debug: packetfence-multi-domain:
$RAD_REQUEST{'FreeRADIUS-Client-IP-Address'} \
&request:FreeRADIUS-Client-IP-Address -> 'X.X.X.X'<br> >> (727) Mon Oct \
26 15:54:22 2020: Debug: packetfence-multi-domain:
$RAD_REQUEST{'PacketFence-KeyBalanced'} \
&request:PacketFence-KeyBalanced -> '865fdf018805bc0bc5fbb22eaa6b0a60'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain:
$RAD_REQUEST{'PacketFence-Radius-Ip'} \
&request:PacketFence-Radius-Ip -> 'X.X.X.X'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_CHECK{'Auth-Type'} \
&control:Auth-Type -> 'MS-CHAP'<br> >> (727) Mon Oct 26 15:54:22 2020: \
Debug:
packetfence-multi-domain: $RAD_CHECK{'Load-Balance-Key'} \
&control:Load-Balance-Key -> '865fdf018805bc0bc5fbb22eaa6b0a60'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_CHECK{'Tmp-Integer-0'} \
&control:Tmp-Integer-0 -> '1603738462'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug: packetfence-multi-domain:
$RAD_CHECK{'PacketFence-RPC-Server'} \
&control:PacketFence-RPC-Server -> '127.0.0.1'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug: packetfence-multi-domain: \
$RAD_CHECK{'PacketFence-RPC-Port'} = &control:PacketFence-RPC-Port -> \
'7070'<br> >> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_CHECK{'PacketFence-RPC-User'}
= &control:PacketFence-RPC-User -> ''<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_CHECK{'PacketFence-RPC-Pass'}
= &control:PacketFence-RPC-Pass -> ''''<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain:
$RAD_CHECK{'PacketFence-RPC-Proto'} \
&control:PacketFence-RPC-Proto -> 'http'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug: packetfence-multi-domain:
$RAD_CHECK{'PacketFence-Request-Time'} \
&control:PacketFence-Request-Time -> '0'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug: packetfence-multi-domain:
$RAD_CHECK{'PacketFence-Tenant-Id'} \
&control:PacketFence-Tenant-Id -> '1'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: $RAD_CONFIG{'Auth-Type'} \
&control:Auth-Type -> 'MS-CHAP'<br> >> (727) Mon Oct 26 15:54:22 2020: \
Debug:
packetfence-multi-domain: $RAD_CONFIG{'Load-Balance-Key'} \
&control:Load-Balance-Key -> '865fdf018805bc0bc5fbb22eaa6b0a60'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: $RAD_CONFIG{'Tmp-Integer-0'} \
&control:Tmp-Integer-0 -> '1603738462'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug: packetfence-multi-domain:
$RAD_CONFIG{'PacketFence-RPC-Server'} \
&control:PacketFence-RPC-Server -> '127.0.0.1'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug: packetfence-multi-domain:
$RAD_CONFIG{'PacketFence-RPC-Port'} \
&control:PacketFence-RPC-Port -> '7070'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug: packetfence-multi-domain:
$RAD_CONFIG{'PacketFence-RPC-User'} \
&control:PacketFence-RPC-User -> ''<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug: packetfence-multi-domain:
$RAD_CONFIG{'PacketFence-RPC-Pass'} \
&control:PacketFence-RPC-Pass -> ''''<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug: packetfence-multi-domain:
$RAD_CONFIG{'PacketFence-RPC-Proto'} \
&control:PacketFence-RPC-Proto -> 'http'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug: packetfence-multi-domain:
$RAD_CONFIG{'PacketFence-Request-Time'} \
&control:PacketFence-Request-Time -> '0'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug: packetfence-multi-domain:
$RAD_CONFIG{'PacketFence-Tenant-Id'} \
&control:PacketFence-Tenant-Id -> '1'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: &request:NAS-Port-Type \
$RAD_REQUEST{'NAS-Port-Type'} -> 'Virtual'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: &request:Acct-Session-Id \
$RAD_REQUEST{'Acct-Session-Id'} -> '81d00cdf'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: &request:PacketFence-Radius-Ip \
$RAD_REQUEST{'PacketFence-Radius-Ip'} -> 'X.X.X.X'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: &request:Service-Type \
$RAD_REQUEST{'Service-Type'} -> 'Framed-User'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: &request:Called-Station-Id \
$RAD_REQUEST{'Called-Station-Id'} -> 'X.X.X.X'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: &request:Realm \
$RAD_REQUEST{'Realm'} -> 'null'<br> >> (727) Mon Oct 26 15:54:22 2020: \
Debug:
packetfence-multi-domain: &request:NAS-IP-Address \
$RAD_REQUEST{'NAS-IP-Address'} -> 'X.X.X.X'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: &request:SQL-User-Name \
$RAD_REQUEST{'SQL-User-Name'} -> 'coyo'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug: packetfence-multi-domain: &request:PacketFence-NTLMv2-Only
= $RAD_REQUEST{'PacketFence-NTLMv2-Only'} -> ''<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: &request:Calling-Station-Id \
$RAD_REQUEST{'Calling-Station-Id'} -> 'X.X.X.X'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug: packetfence-multi-domain: &request:PacketFence-KeyBalanced
= $RAD_REQUEST{'PacketFence-KeyBalanced'} ->
'865fdf018805bc0bc5fbb22eaa6b0a60'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain:
&request:FreeRADIUS-Client-IP-Address \
$RAD_REQUEST{'FreeRADIUS-Client-IP-Address'} -> 'X.X.X.X'<br> >> (727) Mon \
Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: &request:MS-CHAP-Challenge \
$RAD_REQUEST{'MS-CHAP-Challenge'} -> '0xebf6d832753d4fdf8383548a74da2637'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: &request:Framed-Protocol \
$RAD_REQUEST{'Framed-Protocol'} -> 'PPP'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: &request:User-Name \
$RAD_REQUEST{'User-Name'} -> 'coyo'<br> >> (727) Mon Oct 26 15:54:22 2020: \
Debug:
packetfence-multi-domain: &request:NAS-Identifier \
$RAD_REQUEST{'NAS-Identifier'} -> 'MK-IBERA2'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: &request:Event-Timestamp \
$RAD_REQUEST{'Event-Timestamp'} -> 'Oct 26 2020 15:54:22
-03'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: &request:MS-CHAP2-Response \
$RAD_REQUEST{'MS-CHAP2-Response'} -> \
'0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: &request:NAS-Port \
$RAD_REQUEST{'NAS-Port'} -> '39'<br> >> (727) Mon Oct 26 15:54:22 2020: \
Debug:
packetfence-multi-domain: &request:Stripped-User-Name \
$RAD_REQUEST{'Stripped-User-Name'} -> 'coyo'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: &control:Load-Balance-Key \
$RAD_CHECK{'Load-Balance-Key'} -> '865fdf018805bc0bc5fbb22eaa6b0a60'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: &control:PacketFence-RPC-Server
= $RAD_CHECK{'PacketFence-RPC-Server'} -> '127.0.0.1'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
packetfence-multi-domain: &control:PacketFence-Tenant-Id \
$RAD_CHECK{'PacketFence-Tenant-Id'} -> '1'<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: &control:PacketFence-RPC-User \
$RAD_CHECK{'PacketFence-RPC-User'} -> ''<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug: packetfence-multi-domain:
&control:PacketFence-Request-Time \
$RAD_CHECK{'PacketFence-Request-Time'} -> '0'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: &control:Auth-Type \
$RAD_CHECK{'Auth-Type'} -> 'MS-CHAP'<br> >> (727) Mon Oct 26 15:54:22 2020: \
Debug:
packetfence-multi-domain: &control:PacketFence-RPC-Pass \
$RAD_CHECK{'PacketFence-RPC-Pass'} -> ''''<br> >> (727) Mon Oct 26 15:54:22 \
2020: Debug:
packetfence-multi-domain: &control:Tmp-Integer-0 \
$RAD_CHECK{'Tmp-Integer-0'} -> '1603738462'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: &control:PacketFence-RPC-Proto \
$RAD_CHECK{'PacketFence-RPC-Proto'} -> 'http'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug:
packetfence-multi-domain: &control:PacketFence-RPC-Port \
$RAD_CHECK{'PacketFence-RPC-Port'} -> '7070'<br> >> (727) Mon Oct 26 \
15:54:22 2020: Debug: [packetfence-multi-domain] = updated<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # if
(Control:Auth-type == "MS-CHAP") = updated<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
packetfence-eap-mac-policy {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
&EAP-Type ) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
&EAP-Type ) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [noop] \
noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
packetfence-eap-mac-policy = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: WARNING: pap:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<br>
>> (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!!
Ignoring control:User-Password. Update your !!!<br>
>> (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!!
configuration so that the "known good" clear text !!!<br>
>> (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!!
password is in Cleartext-Password and NOT in !!!<br>
>> (727) Mon Oct 26 15:54:22 2020: WARNING: pap: !!!
User-Password. \
!!!<br> >> (727) Mon Oct 26 15:54:22 2020: WARNING: pap:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [pap] \
noop<br> >> (727) Mon Oct 26 15:54:22 2020: Debug: } #
authorize = updated<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: Found
Auth-Type = MS-CHAP<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: # Executing
group from file /usr/local/pf/raddb/sites-enabled/packetfence<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: Auth-Type
MS-CHAP {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
packetfence-mschap-authenticate {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(PacketFence-Domain) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(PacketFence-Domain) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: else {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
"%{User-Name}" =~ /^host\/.*/) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
%{User-Name}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> coyo<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
"%{User-Name}" =~ /^host\/.*/) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: else {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
Creating challenge hash with username: coyo<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap: Client
is using MS-CHAPv2<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
Executing: /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --
--request-nt-key
--username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}}
--challenge=%{mschap:Challenge:-00}
--nt-response=%{mschap:NT-Response:-00}:<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
--username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
--> --username=coyo<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
Creating challenge hash with username: coyo<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
--challenge=%{mschap:Challenge:-00}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
--> --challenge4bcfae02f18a60<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap: EXPAND
--nt-response=%{mschap:NT-Response:-00}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
-->
--nt-response´4e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5<br>
>> (727) Mon Oct 26 15:54:22 2020: ERROR: mschap:
Program returned code (1) and output 'Reading winbind reply
failed! (0xc0000001)'<br>
>> (727) Mon Oct 26 15:54:22 2020: ERROR: mschap:
Reading winbind reply failed! (0xc0000001)<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: mschap:
Authentication failed<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
[mschap] = fail<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } #
else = fail<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # else
= fail<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
packetfence-mschap-authenticate = fail<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } #
Auth-Type MS-CHAP = fail<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: Failed to
authenticate the user<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: Using
Post-Auth-Type Reject<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: # Executing
group from file /usr/local/pf/raddb/sites-enabled/packetfence<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
Post-Auth-Type REJECT {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
packetfence-set-tenant-id {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(!NAS-IP-Address || NAS-IP-Address == "0.0.0.0"){<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(!NAS-IP-Address || NAS-IP-Address == "0.0.0.0") -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> 1<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
packetfence-set-tenant-id = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: update {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # update
= noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (!
EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) )
{<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (!
EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) )
-> TRUE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if (!
EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) )
{<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: policy
packetfence-audit-log-reject {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name && (&User-Name == "dummy")) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&User-Name && (&User-Name == "dummy")) ->
FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: else {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
policy request-timing {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
("%{%{control:PacketFence-Request-Time}:-0}" != 0) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
EXPAND %{%{control:PacketFence-Request-Time}:-0}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
--> 0<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
("%{%{control:PacketFence-Request-Time}:-0}" != 0) ->
FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } #
policy request-timing = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
EXPAND type.reject.query<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
--> type.reject.query<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
Using query template 'query'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
EXPAND %{User-Name}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
--> coyo<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
SQL-User-Name set to 'coyo'<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
EXPAND INSERT INTO radius_audit_log ( mac, ip,
computer_name, user_name, stripped_user_name,
realm, event_type, switch_id, switch_mac,
switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id,
nas_port_type, ssid, nas_port_id, ifindex,
nas_port, connection_type, nas_ip_address,
nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain,
uuid, radius_request, radius_reply,
request_time, tenant_id, radius_ip) VALUES
( '%{request:Calling-Station-Id}',
'%{request:Framed-IP-Address}',
'%{%{control:PacketFence-Computer-Name}:-N/A}',
'%{request:User-Name}',
'%{request:Stripped-User-Name}', '%{request:Realm}',
'Radius-Access-Request',
'%{%{control:PacketFence-Switch-Id}:-N/A}',
'%{%{control:PacketFence-Switch-Mac}:-N/A}',
'%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
'%{Packet-Src-IP-Address}',
'%{request:Called-Station-Id}',
'%{request:Calling-Station-Id}',
'%{request:NAS-Port-Type}', '%{request:Called-Station-SSID}',
'%{request:NAS-Port-Id}',
'%{%{control:PacketFence-IfIndex}:-N/A}',
'%{request:NAS-Port}',
'%{%{control:PacketFence-Connection-Type}:-N/A}',
'%{request:NAS-IP-Address}', '%{request:NAS-Identifier}',
'Reject', '%{request:Module-Failure-Message}',
'%{control:Auth-Type}', '%{request:EAP-Type}',
'%{%{control:PacketFence-Role}:-N/A}',
'%{%{control:PacketFence-Status}:-N/A}',
'%{%{control:PacketFence-Profile}:-N/A}',
'%{%{control:PacketFence-Source}:-N/A}',
'%{%{control:PacketFence-AutoReg}:-0}',
'%{%{control:PacketFence-IsPhone}:-0}',
'%{request:PacketFence-Domain}', '',
'%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
'%{%{control:PacketFence-Request-Time}:-N/A}',
'%{control:PacketFence-Tenant-Id}',
'%{request:PacketFence-Radius-Ip}')<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
--> INSERT INTO radius_audit_log ( mac, ip,
computer_name, user_name, stripped_user_name,
realm, event_type, switch_id, switch_mac,
switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id,
nas_port_type, ssid, nas_port_id, ifindex,
nas_port, connection_type, nas_ip_address,
nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain,
uuid, radius_request, radius_reply,
request_time, tenant_id, radius_ip) VALUES
( 'X.X.X.X', '', 'N/A', 'coyo', 'coyo',
'null', 'Radius-Access-Request', 'N/A', 'N/A',
'N/A', 'X.X.X.X', 'X.X.X.X', 'X.X.X.X',
'Virtual', '', '', 'N/A', '39', 'N/A',
'X.X.X.X', 'MK-IBERA2', 'Reject', \
'mschap: Program returned code (1) and output 'Reading
winbind reply failed! (0xc0000001)'', 'MS-CHAP', '',
'N/A', 'N/A', 'N/A', 'N/A', '0',
'0', '', '', 'NAS-Port-Type = Virtual,
Acct-Session-Id = "81d00cdf", PacketFence-Radius-Ip =
"X.X.X.X", Service-Type = Framed-User, Called-Station-Id
= "X.X.X.X", Realm = "null", NAS-IP-Address =
X.X.X.X, PacketFence-NTLMv2-Only = "",
Calling-Station-Id = "X.X.X.X", PacketFence-KeyBalanced
= "865fdf018805bc0bc5fbb22eaa6b0a60",
FreeRADIUS-Client-IP-Address = X.X.X.X, MS-CHAP-Challenge
= 0xebf6d832753d4fdf8383548a74da2637, Framed-Protocol =
PPP, User-Name = "coyo", NAS-Identifier =
"MK-IBERA2", Event-Timestamp = "Oct 26 2020 15:54:22
-03", MS-CHAP2-Response =
0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5,
NAS-Port = 39, Stripped-User-Name = "coyo",
Module-Failure-Message = "mschap: Program returned code
(1) and output 'Reading winbind reply failed!
(0xc0000001)'", Module-Failure-Message = "mschap:
Reading winbind reply failed! (0xc0000001)", User-Password
= "******", SQL-User-Name =
"coyo"','MS-CHAP-Error = "\001E=691 R=0
C=c86ce57de86611d248ddad2f2eb690ab V=3 M=Authentication
failed"', '0', '1', 'X.X.X.X')<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
Executing query: INSERT INTO radius_audit_log (
mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type,
switch_id, switch_mac, switch_ip_address,
radius_source_ip_address, called_station_id,
calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port,
connection_type, nas_ip_address,
nas_identifier, auth_status, reason, auth_type,
eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain,
uuid, radius_request, radius_reply,
request_time, tenant_id, radius_ip) VALUES
( 'X.X.X.X', '', 'N/A', 'coyo', 'coyo',
'null', 'Radius-Access-Request', 'N/A', 'N/A',
'N/A', 'X.X.X.X', 'X.X.X.X', 'X.X.X.X',
'Virtual', '', '', 'N/A', '39', 'N/A',
'X.X.X.X', 'MK-IBERA2', 'Reject', \
'mschap: Program returned code (1) and output 'Reading
winbind reply failed! (0xc0000001)'', 'MS-CHAP', '',
'N/A', 'N/A', 'N/A', 'N/A', '0',
'0', '', '', 'NAS-Port-Type = Virtual,
Acct-Session-Id = "81d00cdf", PacketFence-Radius-Ip =
"X.X.X.X", Service-Type = Framed-User, Called-Station-Id
= "X.X.X.X", Realm = "null", NAS-IP-Address =
X.X.X.X, PacketFence-NTLMv2-Only = "",
Calling-Station-Id = "X.X.X.X", PacketFence-KeyBalanced
= "865fdf018805bc0bc5fbb22eaa6b0a60",
FreeRADIUS-Client-IP-Address = X.X.X.X, MS-CHAP-Challenge
= 0xebf6d832753d4fdf8383548a74da2637, Framed-Protocol =
PPP, User-Name = "coyo", NAS-Identifier =
"MK-IBERA2", Event-Timestamp = "Oct 26 2020 15:54:22
-03", MS-CHAP2-Response =
0x0100abb873a94cda9a306246c4fef05e7a900000000000000000b44e09097c106ee6479636c7545e3fdd9b27a86cdbfa77a5,
NAS-Port = 39, Stripped-User-Name = "coyo",
Module-Failure-Message = "mschap: Program returned code
(1) and output 'Reading winbind reply failed!
(0xc0000001)'", Module-Failure-Message = "mschap:
Reading winbind reply failed! (0xc0000001)", User-Password
= "******", SQL-User-Name =
"coyo"','MS-CHAP-Error = "\001E=691 R=0
C=c86ce57de86611d248ddad2f2eb690ab V=3 M=Authentication
failed"', '0', '1', 'X.X.X.X')<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject:
SQL query returned: success<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: sql_reject: 1
record(s) updated<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
[sql_reject] = ok<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } #
else = ok<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } #
policy packetfence-audit-log-reject = ok<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # if (!
EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) )
= ok<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
("%{%{control:PacketFence-Proxied-From}:-False}" == "True") {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: EXPAND
%{%{control:PacketFence-Proxied-From}:-False}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: -->
False<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
("%{%{control:PacketFence-Proxied-From}:-False}" == "True")
-> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
attr_filter.access_reject: EXPAND %{User-Name}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
attr_filter.access_reject: --> coyo<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
attr_filter.access_reject: Matched entry DEFAULT at line 11<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
[attr_filter.access_reject] = updated<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
attr_filter.packetfence_post_auth: EXPAND %{User-Name}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
attr_filter.packetfence_post_auth: --> coyo<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
attr_filter.packetfence_post_auth: Matched entry DEFAULT at
line 10<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug:
[attr_filter.packetfence_post_auth] = updated<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [eap] \
noop<br> >> (727) Mon Oct 26 15:54:22 2020: Debug: policy
remove_reply_message_if_eap {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&reply:EAP-Message && &reply:Reply-Message) {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: if
(&reply:EAP-Message && &reply:Reply-Message)
-> FALSE<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: else {<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [noop]
= noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # else
= noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } # policy
remove_reply_message_if_eap = noop<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: linelog:
EXPAND messages.%{%{reply:Packet-Type}:-default}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: linelog:
--> messages.Access-Reject<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: linelog:
EXPAND [mac:%{Calling-Station-Id}] Rejected user: %{User-Name}<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: linelog:
--> [mac:X.X.X.X] Rejected user: coyo<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: [linelog]
= ok<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: } #
Post-Auth-Type REJECT = updated<br>
>> (727) Mon Oct 26 15:54:22 2020: Debug: Delaying
response for 1.000000 seconds<br>
>> (727) Mon Oct 26 15:54:23 2020: Debug: (727)
Discarding duplicate request from client X.X.X.X/32 port 55645
- ID: 132 due to delayed response<br>
>> (727) Mon Oct 26 15:54:23 2020: Debug: Sending
delayed response<br>
>> (727) Mon Oct 26 15:54:23 2020: Debug: Sent
Access-Reject Id 132 from X.X.X.X:1812 to X.X.X.X:55645 length
101<br>
>> (727) Mon Oct 26 15:54:23 2020: Debug:
MS-CHAP-Error = "\001Ei1 R=0
CÈ6ce57de86611d248ddad2f2eb690ab V=3 M=Authentication
failed"<br>
>> (727) Mon Oct 26 15:54:27 2020: Debug: Cleaning up
request packet ID 132 with timestamp +10785<br>
>> (728) Mon Oct 26 15:54:30 2020: Debug: Received
Status-Server Id 199 from <a href="http://127.0.0.1:50706"
rel="noreferrer" target="_blank" \
moz-do-not-send="true">127.0.0.1:50706</a> to <a href="http://127.0.0.1:18121" \
rel="noreferrer" target="_blank" moz-do-not-send="true">127.0.0.1:18121</a>
length 50<br>
>> (728) Mon Oct 26 15:54:30 2020: Debug:
Message-Authenticator = 0x746e4169562dc5520ee77b953ef0ac7b<br>
>> (728) Mon Oct 26 15:54:30 2020: Debug:
FreeRADIUS-Statistics-Type = 15<br>
>> (728) Mon Oct 26 15:54:30 2020: Debug: # Executing
group from file /usr/local/pf/raddb/sites-enabled/status<br>
>> (728) Mon Oct 26 15:54:30 2020: Debug: Autz-Type
Status-Server {<br>
>> (728) Mon Oct 26 15:54:30 2020: Debug: [ok] = ok<br>
>> (728) Mon Oct 26 15:54:30 2020: Debug: } #
Autz-Type Status-Server = ok<br>
>><br>
>> El lun., 26 oct. 2020 a las 12:39, Fabrice Durand via
PacketFence-users (<<a
href="mailto:packetfence-users@lists.sourceforge.net"
target="_blank" \
moz-do-not-send="true">packetfence-users@lists.sourceforge.net</a>>) \
escribió:<br> >>> Hello Enrique,<br>
>>><br>
>>> can you provide the raddebug output ?<br>
>>><br>
>>> raddebug -f /usr/local/pf/var/run/radiusd.sock -t
3000<br>
>>><br>
>>><br>
>>> Regards<br>
>>><br>
>>> Fabrice<br>
>>><br>
>>><br>
>>> Le 20-10-26 Ã 09 h 42, Enrique Gross via
PacketFence-users a écrit :<br>
>>>> Hi Packetfence Users,<br>
>>>><br>
>>>> Hope you are doing fine<br>
>>>><br>
>>>> I am struggling to authenticate PPP users via
MSCHAP with local PF<br>
>>>> authentication, my switch is a Mikrotik
device, I am forwarding<br>
>>>> authentication via Radius to packetfence
server.<br>
>>>><br>
>>>> I am getting error<br>
>>>><br>
>>>> (144) Login incorrect (mschap: Program
returned code (1) and output<br>
>>>> 'Reading winbind reply failed!<br>
>>>><br>
>>>> When I disable MSCHAP/CHAP as an
authentication method and use PAP my<br>
>>>> users can authenticate fine.<br>
>>>><br>
>>>> I have uncomment
/usr/local/pf/conf/radiusd/packetfence-tunnel and<br>
>>>> Take care of the "Database passwords hashing
method"<br>
>>>><br>
>>>> I will really appreciate any help<br>
>>>><br>
>>>> Thanks, Enrique<br>
>>>><br>
>>>> --<br>
>>>><br>
>>>><br>
>>>>
_______________________________________________<br>
>>>> PacketFence-users mailing list<br>
>>>> <a
href="mailto:PacketFence-users@lists.sourceforge.net"
target="_blank" \
moz-do-not-send="true">PacketFence-users@lists.sourceforge.net</a><br> \
>>>> <a
href="https://lists.sourceforge.net/lists/listinfo/packetfence-users"
rel="noreferrer" target="_blank" \
moz-do-not-send="true">https://lists.sourceforge.net/lists/listinfo/packetfence-users</a><br>
>>> --<br>
>>> Fabrice Durand<br>
>>> <a href="mailto:fdurand@inverse.ca"
target="_blank" moz-do-not-send="true">fdurand@inverse.ca</a>
:: +1.514.447.4918 (x135) :: <a
href="http://www.inverse.ca" rel="noreferrer"
target="_blank" moz-do-not-send="true">www.inverse.ca</a><br>
>>> Inverse inc. :: Leaders behind SOGo (<a
href="http://www.sogo.nu" rel="noreferrer" target="_blank"
moz-do-not-send="true">http://www.sogo.nu</a>) and
PacketFence (<a href="http://packetfence.org" rel="noreferrer"
target="_blank" moz-do-not-send="true">http://packetfence.org</a>)<br>
>>><br>
>>><br>
>>><br>
>>> _______________________________________________<br>
>>> PacketFence-users mailing list<br>
>>> <a
href="mailto:PacketFence-users@lists.sourceforge.net"
target="_blank" \
moz-do-not-send="true">PacketFence-users@lists.sourceforge.net</a><br> >>> \
<a
href="https://lists.sourceforge.net/lists/listinfo/packetfence-users"
rel="noreferrer" target="_blank" \
moz-do-not-send="true">https://lists.sourceforge.net/lists/listinfo/packetfence-users</a><br>
>><br>
>><br>
>> --<br>
>><br>
>><br>
><br>
> --<br>
<br>
</blockquote>
</div>
<br clear="all">
<br>
-- <br>
<div dir="ltr" class="gmail_signature">
<div dir="ltr"><br>
<img src="cid:part40.6B4BBAEF.6BAEFF05@inverse.ca"
alt="Imágenes integradas 1" class="" width="163" height="64">
<br>
</div>
</div>
</blockquote>
</body>
</html>
["firma coyo.jpg" (image/jpeg)]
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic