Hi Fabrice,
thanks for answering. Here is the output:
Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
(21571) Fri Apr 1 08:22:32 2022: Debug: authenticate {
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: Expiring EAP session with state
0xdd37fd22d8d7e4c8
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: Finished EAP session with state
0xdd37fd22d8d7e4c8
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: Previous EAP request found for
state 0xdd37fd22d8d7e4c8, released from the list
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: Peer sent packet with method EAP
PEAP (25)
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: Calling submodule eap_peap to
process data
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: (TLS) EAP Done initial
handshake
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Session established.
Decoding tunneled attributes
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: PEAP state WAITING FOR INNER
IDENTITY
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Identity - nijat
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Got inner identity 'nijat'
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Setting default EAP type for
tunneled EAP session
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Got tunneled request
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: EAP-Message =
0x02e0000a016e696a6174
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Setting User-Name to nijat
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Sending tunneled request to
packetfence-tunnel
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: EAP-Message =
0x02e0000a016e696a6174
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: FreeRADIUS-Proxied-To =
127.0.0.1
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: User-Name = "nijat"
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: NAS-IP-Address =
10.80.80.67
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: NAS-Identifier =
"7a4558c7885f"
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: NAS-Port-Type =
Wireless-802.11
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Service-Type = Framed-User
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Calling-Station-Id :=
"be:f1:bd:b6:40:a3"
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Connect-Info = "CONNECT
0Mbps 802.11a"
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Acct-Session-Id =
"A036F4CC8D711505"
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Acct-Multi-Session-Id =
"E87228BDB3EDFE41"
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: WLAN-Pairwise-Cipher =
1027076
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: WLAN-Group-Cipher = 1027076
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: WLAN-AKM-Suite = 1027073
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Framed-MTU = 1400
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: PacketFence-Radius-Ip :=
"10.80.80.143"
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: PacketFence-KeyBalanced :=
"b6125b7968479546eeef8c210c3176af"
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Called-Station-Id :=
"7a:45:58:c7:88:5f:pftest"
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Event-Timestamp = "Apr 1
2022 08:22:32 UTC"
(21571) Fri Apr 1 08:22:32 2022: Debug: Virtual server packetfence-tunnel
received request
(21571) Fri Apr 1 08:22:32 2022: Debug: EAP-Message = 0x02e0000a016e696a6174
(21571) Fri Apr 1 08:22:32 2022: Debug: FreeRADIUS-Proxied-To = 127.0.0.1
(21571) Fri Apr 1 08:22:32 2022: Debug: User-Name = "nijat"
(21571) Fri Apr 1 08:22:32 2022: Debug: NAS-IP-Address = 10.80.80.67
(21571) Fri Apr 1 08:22:32 2022: Debug: NAS-Identifier = "7a4558c7885f"
(21571) Fri Apr 1 08:22:32 2022: Debug: NAS-Port-Type = Wireless-802.11
(21571) Fri Apr 1 08:22:32 2022: Debug: Service-Type = Framed-User
(21571) Fri Apr 1 08:22:32 2022: Debug: Calling-Station-Id :=
"be:f1:bd:b6:40:a3"
(21571) Fri Apr 1 08:22:32 2022: Debug: Connect-Info = "CONNECT 0Mbps
802.11a"
(21571) Fri Apr 1 08:22:32 2022: Debug: Acct-Session-Id = "A036F4CC8D711505"
(21571) Fri Apr 1 08:22:32 2022: Debug: Acct-Multi-Session-Id =
"E87228BDB3EDFE41"
(21571) Fri Apr 1 08:22:32 2022: Debug: WLAN-Pairwise-Cipher = 1027076
(21571) Fri Apr 1 08:22:32 2022: Debug: WLAN-Group-Cipher = 1027076
(21571) Fri Apr 1 08:22:32 2022: Debug: WLAN-AKM-Suite = 1027073
(21571) Fri Apr 1 08:22:32 2022: Debug: Framed-MTU = 1400
(21571) Fri Apr 1 08:22:32 2022: Debug: PacketFence-Radius-Ip :=
"10.80.80.143"
(21571) Fri Apr 1 08:22:32 2022: Debug: PacketFence-KeyBalanced :=
"b6125b7968479546eeef8c210c3176af"
(21571) Fri Apr 1 08:22:32 2022: Debug: Called-Station-Id :=
"7a:45:58:c7:88:5f:pftest"
(21571) Fri Apr 1 08:22:32 2022: Debug: Event-Timestamp = "Apr 1 2022
08:22:32 UTC"
(21571) Fri Apr 1 08:22:32 2022: WARNING: Outer and inner identities are the
same. User privacy is compromised.
(21571) Fri Apr 1 08:22:32 2022: Debug: server packetfence-tunnel {
(21571) Fri Apr 1 08:22:32 2022: Debug: # Executing section authorize from
file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(21571) Fri Apr 1 08:22:32 2022: Debug: authorize {
(21571) Fri Apr 1 08:22:32 2022: Debug: if ( outer.EAP-Type == TTLS) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if ( outer.EAP-Type == TTLS) ->
FALSE
(21571) Fri Apr 1 08:22:32 2022: Debug: policy
packetfence-set-realm-if-machine {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (User-Name =~
/host\/([a-z0-9_-]*)[\.](.*)/i) -> FALSE
(21571) Fri Apr 1 08:22:32 2022: Debug: } # policy
packetfence-set-realm-if-machine = notfound
(21571) Fri Apr 1 08:22:32 2022: Debug: policy packetfence-set-tenant-id
{
(21571) Fri Apr 1 08:22:32 2022: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0"){
(21571) Fri Apr 1 08:22:32 2022: Debug: if (!NAS-IP-Address ||
NAS-IP-Address == "0.0.0.0") -> FALSE
(21571) Fri Apr 1 08:22:32 2022: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(21571) Fri Apr 1 08:22:32 2022: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(21571) Fri Apr 1 08:22:32 2022: Debug: --> 0
(21571) Fri Apr 1 08:22:32 2022: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
(21571) Fri Apr 1 08:22:32 2022: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(21571) Fri Apr 1 08:22:32 2022: Debug: if
("%{request:Called-Station-Id}" =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})/i)
{
(21571) Fri Apr 1 08:22:32 2022: Debug: EXPAND
%{request:Called-Station-Id}
(21571) Fri Apr 1 08:22:32 2022: Debug: -->
7a:45:58:c7:88:5f:pftest
(21571) Fri Apr 1 08:22:32 2022: Debug: if
("%{request:Called-Station-Id}" =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})/i)
-> TRUE
(21571) Fri Apr 1 08:22:32 2022: Debug: if
("%{request:Called-Station-Id}" =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})/i)
{
(21571) Fri Apr 1 08:22:32 2022: Debug: update control {
(21571) Fri Apr 1 08:22:32 2022: Debug: EXPAND %{User-Name}
(21571) Fri Apr 1 08:22:32 2022: Debug: --> nijat
(21571) Fri Apr 1 08:22:32 2022: Debug: SQL-User-Name set to
'nijat'
(21571) Fri Apr 1 08:22:32 2022: Debug: Executing select query:
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'7a:45:58:c7:88:5f'), 0)
(21571) Fri Apr 1 08:22:32 2022: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}'), 0)}
(21571) Fri Apr 1 08:22:32 2022: Debug: --> 0
(21571) Fri Apr 1 08:22:32 2022: Debug: } # update control = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: } # if
("%{request:Called-Station-Id}" =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})/i)
= noop
(21571) Fri Apr 1 08:22:32 2022: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(21571) Fri Apr 1 08:22:32 2022: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(21571) Fri Apr 1 08:22:32 2022: Debug: --> 0
(21571) Fri Apr 1 08:22:32 2022: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
(21571) Fri Apr 1 08:22:32 2022: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(21571) Fri Apr 1 08:22:32 2022: Debug: update control {
(21571) Fri Apr 1 08:22:32 2022: Debug: EXPAND %{User-Name}
(21571) Fri Apr 1 08:22:32 2022: Debug: --> nijat
(21571) Fri Apr 1 08:22:32 2022: Debug: SQL-User-Name set to
'nijat'
(21571) Fri Apr 1 08:22:32 2022: Debug: Executing select query:
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '10.80.80.67'),
0)
(21571) Fri Apr 1 08:22:32 2022: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{NAS-IP-Address}'),
0)}
(21571) Fri Apr 1 08:22:32 2022: Debug: --> 1
(21571) Fri Apr 1 08:22:32 2022: Debug: } # update control = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> TRUE
(21571) Fri Apr 1 08:22:32 2022: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(21571) Fri Apr 1 08:22:32 2022: Debug: update control {
(21571) Fri Apr 1 08:22:32 2022: Debug: EXPAND %{User-Name}
(21571) Fri Apr 1 08:22:32 2022: Debug: --> nijat
(21571) Fri Apr 1 08:22:32 2022: Debug: SQL-User-Name set to
'nijat'
(21571) Fri Apr 1 08:22:32 2022: Debug: Executing select query:
SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <=
INET_ATON('10.80.80.67') and INET_ATON('10.80.80.67') <= end_ip order by
range_length limit 1), 1)
(21571) Fri Apr 1 08:22:32 2022: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <=
INET_ATON('%{NAS-IP-Address}') and INET_ATON('%{NAS-IP-Address}') <= end_ip
order by range_length limit 1), 1)}
(21571) Fri Apr 1 08:22:32 2022: Debug: --> 1
(21571) Fri Apr 1 08:22:32 2022: Debug: } # update control = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: } # if (
&control:PacketFence-Tenant-Id == 0 ) = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: } # policy
packetfence-set-tenant-id = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: policy filter_username {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name) -> TRUE
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name =~ / /) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name =~ / /) ->
FALSE
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name =~ /@[^@]*@/
) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name =~ /@[^@]*@/
) -> FALSE
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name =~ /\.\./ ) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name =~ /\.\./ )
-> FALSE
(21571) Fri Apr 1 08:22:32 2022: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name =~ /\.$/) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name =~ /\.$/)
-> FALSE
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name =~ /@\./) {
(21571) Fri Apr 1 08:22:32 2022: Debug: if (&User-Name =~ /@\./)
-> FALSE
(21571) Fri Apr 1 08:22:32 2022: Debug: } # if (&User-Name) = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: } # policy filter_username = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: update {
(21571) Fri Apr 1 08:22:32 2022: Debug: EXPAND
%{outer.request:User-Name}
(21571) Fri Apr 1 08:22:32 2022: Debug: --> nijat
(21571) Fri Apr 1 08:22:32 2022: Debug: } # update = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: [mschap] = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: suffix: Checking for suffix after "@"
(21571) Fri Apr 1 08:22:32 2022: Debug: suffix: No '@' in User-Name = "nijat",
skipping NULL due to config.
(21571) Fri Apr 1 08:22:32 2022: Debug: [suffix] = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: ntdomain: Checking for prefix before
"\"
(21571) Fri Apr 1 08:22:32 2022: Debug: ntdomain: No '\' in User-Name =
"nijat", looking up realm NULL
(21571) Fri Apr 1 08:22:32 2022: Debug: ntdomain: Found realm "null"
(21571) Fri Apr 1 08:22:32 2022: Debug: ntdomain: Adding Stripped-User-Name =
"nijat"
(21571) Fri Apr 1 08:22:32 2022: Debug: ntdomain: Adding Realm = "null"
(21571) Fri Apr 1 08:22:32 2022: Debug: ntdomain: Authentication realm is LOCAL
(21571) Fri Apr 1 08:22:32 2022: Debug: [ntdomain] = ok
(21571) Fri Apr 1 08:22:32 2022: Debug: update control {
(21571) Fri Apr 1 08:22:32 2022: Debug: } # update control = noop
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: Peer sent EAP Response (code 2)
ID 224 length 10
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: EAP-Identity reply, returning
'ok' so we can short-circuit the rest of authorize
(21571) Fri Apr 1 08:22:32 2022: Debug: [eap] = ok
(21571) Fri Apr 1 08:22:32 2022: Debug: } # authorize = ok
(21571) Fri Apr 1 08:22:32 2022: WARNING: You set Proxy-To-Realm = local,
but it is a LOCAL realm! Cancelling proxy request.
(21571) Fri Apr 1 08:22:32 2022: Debug: Found Auth-Type = eap
(21571) Fri Apr 1 08:22:32 2022: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(21571) Fri Apr 1 08:22:32 2022: Debug: authenticate {
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: Peer sent packet with method EAP
Identity (1)
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: Calling submodule eap_mschapv2 to
process data
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_mschapv2: Issuing Challenge
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: Sending EAP Request (code 1) ID
225 length 43
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: EAP session adding &reply:State =
0xc0015143c0e04be0
(21571) Fri Apr 1 08:22:32 2022: Debug: [eap] = handled
(21571) Fri Apr 1 08:22:32 2022: Debug: } # authenticate = handled
(21571) Fri Apr 1 08:22:32 2022: Debug: } # server packetfence-tunnel
(21571) Fri Apr 1 08:22:32 2022: Debug: Virtual server sending reply
(21571) Fri Apr 1 08:22:32 2022: Debug: EAP-Message =
0x01e1002b1a01e10026108dd189798549a3fa2b743ff85850de1e667265657261646975732d332e302e3235
(21571) Fri Apr 1 08:22:32 2022: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(21571) Fri Apr 1 08:22:32 2022: Debug: State =
0xc0015143c0e04be05026e3704434a669
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Got tunneled reply code 11
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: EAP-Message =
0x01e1002b1a01e10026108dd189798549a3fa2b743ff85850de1e667265657261646975732d332e302e3235
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Message-Authenticator =
0x00000000000000000000000000000000
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: State =
0xc0015143c0e04be05026e3704434a669
(21571) Fri Apr 1 08:22:32 2022: Debug: eap_peap: Got tunneled Access-Challenge
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: Sending EAP Request (code 1) ID
225 length 74
(21571) Fri Apr 1 08:22:32 2022: Debug: eap: EAP session adding &reply:State =
0xdd37fd22dbd6e4c8
(21571) Fri Apr 1 08:22:32 2022: Debug: [eap] = handled
(21571) Fri Apr 1 08:22:32 2022: Debug: } # authenticate = handled
(21571) Fri Apr 1 08:22:32 2022: Debug: Using Post-Auth-Type Challenge
(21571) Fri Apr 1 08:22:32 2022: Debug: Post-Auth-Type sub-section not found.
Ignoring.
(21571) Fri Apr 1 08:22:32 2022: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(21571) Fri Apr 1 08:22:32 2022: Debug: session-state: Saving cached attributes
(21571) Fri Apr 1 08:22:32 2022: Debug: Framed-MTU = 994
(21571) Fri Apr 1 08:22:32 2022: Debug: TLS-Session-Cipher-Suite =
"ECDHE-RSA-AES128-GCM-SHA256"
(21571) Fri Apr 1 08:22:32 2022: Debug: TLS-Session-Version = "TLS 1.2"
(21571) Fri Apr 1 08:22:32 2022: Debug: Sent Access-Challenge Id 61 from
10.80.80.143:1812 to 10.80.80.67:55172 length 132
(21571) Fri Apr 1 08:22:32 2022: Debug: EAP-Message =
0x01e1004a1900170303003fbc37259a75552b7546e8809ad730f61488803c5cb18a964c9b9dfe084e6f398a089c714940ceaf8acd15902edc1a07ada1f6e6271d0192e283e9cb6b5cfe15
(21571) Fri Apr 1 08:22:32 2022: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(21571) Fri Apr 1 08:22:32 2022: Debug: State =
0xdd37fd22dbd6e4c89ecf933de8c2fe04
(21571) Fri Apr 1 08:22:32 2022: Debug: Finished request
Hello Nicat, can you run this command and try to connect ? raddebug -f
/usr/local/pf/var/run/radiusd.sock -t 300 Then paste the output. RegardsFabrice
Le mer. 30 mars 2022 à 08:54, Nijat Sultanov via PacketFence-users
<[email protected]> a écrit :Hi there,
I was looking for a support from packetfence and tried the mailing list.
Somehow I'm not able to make a topic in the packetfence section on
sourceforge.net.
Maybe you can help me now.
I'm trying to run packetfence with my unify AP, but struggle to make a
successful authentification with my user. Previously I used a Switch and the
authentification worked fine. Now, I'm trying to make a wireless
authentification but somehow I'm getting rejected everytime with the reason:
mschap: MS-CHAP2-Response is incorrect.
He is the RADIUS Auditing Log:
Request Time
0RADIUS Request
User-Name = "nijat" Event-Timestamp = "Mar 28 2022 14:54:48 UTC"
Calling-Station-Id = "be:f1:bd:b6:40:a3" WLAN-AKM-Suite = 1027073
MS-CHAP-User-Name = "nijat" PacketFence-Outer-User = "nijat" Realm = "null"
MS-CHAP2-Response =
0x6e69e18213141ad3c9c9de0c32d6cedd713f0000000000000000dec8317a42db25f2e4ce62cf8b49d5727646a3cdbc15b035
Acct-Multi-Session-Id = "723AF7C45EAA7B4C" NAS-IP-Address = 10.80.80.67
Service-Type = Framed-User PacketFence-Radius-Ip = "10.80.80.143"
PacketFence-KeyBalanced = "b6125b7968479546eeef8c210c3176af" WLAN-Group-Cipher
= 1027076 NAS-Identifier = "7a4558c7885f" Called-Station-Id =
"7a:45:58:c7:88:5f:pftest" EAP-Type = MSCHAPv2 EAP-Message =
0x026e00401a026e003b31e18213141ad3c9c9de0c32d6cedd713f0000000000000000dec8317a42db25f2e4ce62cf8b49d5727646a3cdbc15b035006e696a6174
Framed-MTU = 1400 WLAN-Pairwise-Cipher = 1027076 Stripped-User-Name = "nijat"
Acct-Session-Id = "9C80BE880B7D623E" FreeRADIUS-Proxied-To = 127.0.0.1 State =
0xeeed1a94ee8300284b8988160fb70984 Called-Station-SSID = "pftest" NAS-Port-Type
= Wireless-802.11 Connect-Info = "CONNECT 0Mbps 802.11a" MS-CHAP-Challenge =
0x573a1544f904d394d0a45b27858fcedf Module-Failure-Message = "mschap:
MS-CHAP2-Response is incorrect" User-Password = "******" SQL-User-Name =
"nijat"RADIUS Reply
MS-CHAP-Error = "nE=691 R=0 C=59ed45f1aa35086ebe0c808a8ff4e84b V=3
M=Authentication rejected" EAP-Message = 0x046e0004 Message-Authenticator =
0x00000000000000000000000000000000
-- Nicat Sultan
Trainee Systemintegration
Lucas Beier Moritz Maus Fusion2go IT GbR +49 2253 - 609 89 47
[email protected]https://fusion2go.deTriftweg 9, 53902 Bad Münstereifel
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
-- Nicat Sultan
Trainee Systemintegration
Lucas Beier Moritz Maus Fusion2go IT GbR +49 2253 - 609 89 47
[email protected]https://fusion2go.deTriftweg 9, 53902 Bad Münstereifel
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users