|
From: Amjad A. <amj...@gm...> - 2018-07-31 06:32:23
|
Hi
I have simple VLAN enforcement setup with one switch and few client
machines connected to it. I'm using PEAP/MSCHAP2.
I have no windows domain in this setup but getting reading winbind reply
failed.
Please check the log below (highlighted) and let me know what configuration
i'm missing on.
Thanks
Ali
(1208) Mon Jul 30 14:09:33 2018: Debug: Received Access-Request Id 128 from
10.10.51.148:1812 to 10.10.50.233:1812 length 222
(1208) Mon Jul 30 14:09:33 2018: Debug: User-Name = "pica8"
(1208) Mon Jul 30 14:09:33 2018: Debug: NAS-IP-Address = 0.0.0.0
(1208) Mon Jul 30 14:09:33 2018: Debug: NAS-Port-Type = Ethernet
(1208) Mon Jul 30 14:09:33 2018: Debug: NAS-Port = 20
(1208) Mon Jul 30 14:09:33 2018: Debug: Called-Station-Id =
"48-6E-73-02-00-D4"
(1208) Mon Jul 30 14:09:33 2018: Debug: Calling-Station-Id =
"E0-DB-55-CD-84-62"
(1208) Mon Jul 30 14:09:33 2018: Debug: Framed-MTU = 1500
(1208) Mon Jul 30 14:09:33 2018: Debug: EAP-Message =
0x029c005f190017030300545734f9588dd90bbfe6e0e58f92704bda9453532d894b0675ab7d5f64660fc4d2cae78c0e66e2175f2c3261644ac10fe19295aedfcd954a65e30e2aac876105ac09d948e75ae98e955656ff37a53da6bb8a90ff15
(1208) Mon Jul 30 14:09:33 2018: Debug: State =
0xc842f886cedee1df0a7cf6df90a93b00
(1208) Mon Jul 30 14:09:33 2018: Debug: Message-Authenticator =
0x0c863f591d1790b3994a62add703bbc0
(1208) Mon Jul 30 14:09:33 2018: Debug: session-state: No cached attributes
(1208) Mon Jul 30 14:09:33 2018: Debug: # Executing section authorize from
file /usr/local/pf/raddb/sites-enabled/packetfence
(1208) Mon Jul 30 14:09:33 2018: Debug: authorize {
(1208) Mon Jul 30 14:09:33 2018: Debug: update {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND
%{Packet-Src-IP-Address}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> 10.10.51.148
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND %l
(1208) Mon Jul 30 14:09:33 2018: Debug: --> 1532930973
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: policy
packetfence-set-tenant-id {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> 0
(1208) Mon Jul 30 14:09:33 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(1208) Mon Jul 30 14:09:33 2018: Debug: update control {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND %{User-Name}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: SQL-User-Name set to
'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: Executing select query:
SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'10.10.51.148'), 0)
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'%{Packet-Src-IP-Address}'), 0)}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> 1
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update control = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy
packetfence-set-tenant-id = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: policy
rewrite_calling_station_id {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
-> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&Calling-Station-Id &&
(&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
{
(1208) Mon Jul 30 14:09:33 2018: Debug: update request {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> e0:db:55:cd:84:62
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update request = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: [updated] = updated
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if (&Calling-Station-Id
&& (&Calling-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i))
= updated
(1208) Mon Jul 30 14:09:33 2018: Debug: ... skipping else: Preceding
"if" was taken
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy
rewrite_calling_station_id = updated
(1208) Mon Jul 30 14:09:33 2018: Debug: policy
rewrite_called_station_id {
(1208) Mon Jul 30 14:09:33 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(1208) Mon Jul 30 14:09:33 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(1208) Mon Jul 30 14:09:33 2018: Debug: update request {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> 48:6e:73:02:00:d4
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update request = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: if ("%{8}") {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND %{8}
(1208) Mon Jul 30 14:09:33 2018: Debug: -->
(1208) Mon Jul 30 14:09:33 2018: Debug: if ("%{8}") -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif ( (Colubris-AVPair)
&& "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif ( (Colubris-AVPair)
&& "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif (Aruba-Essid-Name) {
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif (Aruba-Essid-Name)
-> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif ( (Cisco-AVPair) &&
"%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif ( (Cisco-AVPair) &&
"%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: [updated] = updated
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if ((&Called-Station-Id)
&& (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
= updated
(1208) Mon Jul 30 14:09:33 2018: Debug: ... skipping else: Preceding
"if" was taken
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy
rewrite_called_station_id = updated
(1208) Mon Jul 30 14:09:33 2018: Debug: policy filter_username {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name) -> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ / /) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ / /) ->
FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /@[^@]*@/
) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /@[^@]*@/
) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /\.\./ ) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /\.\./ )
-> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if ((&User-Name =~ /@/) &&
(&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /\.$/) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /\.$/)
-> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /@\./) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /@\./)
-> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if (&User-Name) = updated
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy filter_username =
updated
(1208) Mon Jul 30 14:09:33 2018: Debug: policy filter_password {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Password &&
(&User-Password != "%{string:User-Password}")) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy filter_password =
updated
(1208) Mon Jul 30 14:09:33 2018: Debug: [preprocess] = ok
(1208) Mon Jul 30 14:09:33 2018: Debug: suffix: Checking for suffix after
"@"
(1208) Mon Jul 30 14:09:33 2018: Debug: suffix: No '@' in User-Name =
"pica8", skipping NULL due to config.
(1208) Mon Jul 30 14:09:33 2018: Debug: [suffix] = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: Checking for prefix
before "\"
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: No '\' in User-Name =
"pica8", looking up realm NULL
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: Found realm "null"
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: Adding Stripped-User-Name
= "pica8"
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: Adding Realm = "null"
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: Authentication realm is
LOCAL
(1208) Mon Jul 30 14:09:33 2018: Debug: [ntdomain] = ok
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Peer sent EAP Response (code
2) ID 156 length 95
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Continuing tunnel setup
(1208) Mon Jul 30 14:09:33 2018: Debug: [eap] = ok
(1208) Mon Jul 30 14:09:33 2018: Debug: } # authorize = ok
(1208) Mon Jul 30 14:09:33 2018: Debug: Found Auth-Type = eap
(1208) Mon Jul 30 14:09:33 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(1208) Mon Jul 30 14:09:33 2018: Debug: authenticate {
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Expiring EAP session with
state 0x15d0941d154c8e42
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Finished EAP session with
state 0xc842f886cedee1df
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Previous EAP request found for
state 0xc842f886cedee1df, released from the list
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Peer sent packet with method
EAP PEAP (25)
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Calling submodule eap_peap to
process data
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Continuing EAP-TLS
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: [eaptls verify] = ok
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Done initial handshake
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: [eaptls process] = ok
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Session established.
Decoding tunneled attributes
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: PEAP state phase2
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: EAP method MSCHAPv2 (26)
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Got tunneled request
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: EAP-Message =
0x029c00401a029c003b31753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b007069636138
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Setting User-Name to pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Sending tunneled request
to packetfence-tunnel
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: EAP-Message =
0x029c00401a029c003b31753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b007069636138
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: FreeRADIUS-Proxied-To =
127.0.0.1
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: User-Name = "pica8"
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: State =
0x15d0941d154c8e42b2938126a0a7b2ef
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: NAS-IP-Address = 0.0.0.0
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: NAS-Port-Type = Ethernet
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: NAS-Port = 20
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Calling-Station-Id :=
"e0:db:55:cd:84:62"
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Framed-MTU = 1500
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Called-Station-Id :=
"48:6e:73:02:00:d4"
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Event-Timestamp = "7月
30 2018 14:09:33 CST"
(1208) Mon Jul 30 14:09:33 2018: Debug: Virtual server packetfence-tunnel
received request
(1208) Mon Jul 30 14:09:33 2018: Debug: EAP-Message =
0x029c00401a029c003b31753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b007069636138
(1208) Mon Jul 30 14:09:33 2018: Debug: FreeRADIUS-Proxied-To = 127.0.0.1
(1208) Mon Jul 30 14:09:33 2018: Debug: User-Name = "pica8"
(1208) Mon Jul 30 14:09:33 2018: Debug: State =
0x15d0941d154c8e42b2938126a0a7b2ef
(1208) Mon Jul 30 14:09:33 2018: Debug: NAS-IP-Address = 0.0.0.0
(1208) Mon Jul 30 14:09:33 2018: Debug: NAS-Port-Type = Ethernet
(1208) Mon Jul 30 14:09:33 2018: Debug: NAS-Port = 20
(1208) Mon Jul 30 14:09:33 2018: Debug: Calling-Station-Id :=
"e0:db:55:cd:84:62"
(1208) Mon Jul 30 14:09:33 2018: Debug: Framed-MTU = 1500
(1208) Mon Jul 30 14:09:33 2018: Debug: Called-Station-Id :=
"48:6e:73:02:00:d4"
(1208) Mon Jul 30 14:09:33 2018: Debug: Event-Timestamp = "7月 30 2018
14:09:33 CST"
(1208) Mon Jul 30 14:09:33 2018: WARNING: Outer and inner identities are
the same. User privacy is compromised.
(1208) Mon Jul 30 14:09:33 2018: Debug: server packetfence-tunnel {
(1208) Mon Jul 30 14:09:33 2018: Debug: session-state: No cached
attributes
(1208) Mon Jul 30 14:09:33 2018: Debug: # Executing section authorize
from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(1208) Mon Jul 30 14:09:33 2018: Debug: authorize {
(1208) Mon Jul 30 14:09:33 2018: Debug: if ( outer.EAP-Type == TTLS) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if ( outer.EAP-Type == TTLS)
-> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: policy filter_username {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name) -> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ / /) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ / /)
-> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~
/@[^@]*@/ ) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~
/@[^@]*@/ ) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /\.\./
) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /\.\./
) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: if ((&User-Name =~ /@/)
&& (&User-Name !~ /@(.+)\.(.+)$/)) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if ((&User-Name =~ /@/)
&& (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /\.$/)
{
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /\.$/)
-> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /@\./)
{
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name =~ /@\./)
-> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if (&User-Name) =
notfound
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy filter_username =
notfound
(1208) Mon Jul 30 14:09:33 2018: Debug: [mschap] = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: suffix: Checking for suffix after
"@"
(1208) Mon Jul 30 14:09:33 2018: Debug: suffix: No '@' in User-Name =
"pica8", skipping NULL due to config.
(1208) Mon Jul 30 14:09:33 2018: Debug: [suffix] = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: Checking for prefix
before "\"
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: No '\' in User-Name =
"pica8", looking up realm NULL
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: Found realm "null"
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: Adding Stripped-User-Name
= "pica8"
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: Adding Realm = "null"
(1208) Mon Jul 30 14:09:33 2018: Debug: ntdomain: Authentication realm is
LOCAL
(1208) Mon Jul 30 14:09:33 2018: Debug: [ntdomain] = ok
(1208) Mon Jul 30 14:09:33 2018: Debug: update control {
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update control = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Peer sent EAP Response (code
2) ID 156 length 64
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: No EAP Start, assuming it's an
on-going EAP conversation
(1208) Mon Jul 30 14:09:33 2018: Debug: [eap] = updated
(1208) Mon Jul 30 14:09:33 2018: Debug: policy
rewrite_called_station_id {
(1208) Mon Jul 30 14:09:33 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(1208) Mon Jul 30 14:09:33 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
-> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if ((&Called-Station-Id) &&
(&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
{
(1208) Mon Jul 30 14:09:33 2018: Debug: update request {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND
%{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> 48:6e:73:02:00:d4
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update request = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: if ("%{8}") {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND %{8}
(1208) Mon Jul 30 14:09:33 2018: Debug: -->
(1208) Mon Jul 30 14:09:33 2018: Debug: if ("%{8}") -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif ( (Colubris-AVPair)
&& "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif ( (Colubris-AVPair)
&& "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif (Aruba-Essid-Name) {
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif (Aruba-Essid-Name)
-> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif ( (Cisco-AVPair)
&& "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
(1208) Mon Jul 30 14:09:33 2018: Debug: elsif ( (Cisco-AVPair)
&& "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: [updated] = updated
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if
((&Called-Station-Id) && (&Called-Station-Id =~
/^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i))
= updated
(1208) Mon Jul 30 14:09:33 2018: Debug: ... skipping else:
Preceding "if" was taken
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy
rewrite_called_station_id = updated
(1208) Mon Jul 30 14:09:33 2018: Debug: policy packetfence-local-auth
{
(1208) Mon Jul 30 14:09:33 2018: Debug: policy
packetfence-set-tenant-id {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND
%{%{control:PacketFence-Tenant-Id}:-0}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> 0
(1208) Mon Jul 30 14:09:33 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
(1208) Mon Jul 30 14:09:33 2018: Debug: update control {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND %{User-Name}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: SQL-User-Name set to
'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: Executing select
query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'10.10.51.148'), 0)
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND %{sql: SELECT
IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname =
'%{Packet-Src-IP-Address}'), 0)}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> 1
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update control =
noop
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if (
"%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (
&control:PacketFence-Tenant-Id == 0 ) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy
packetfence-set-tenant-id = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: update control {
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update control = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: pflocal: EXPAND %{User-Name}
(1208) Mon Jul 30 14:09:33 2018: Debug: pflocal: --> pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: pflocal: SQL-User-Name set to
'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: pflocal: EXPAND SELECT 1, pid,
"Cleartext-Password", REPLACE(password,'{ntlm}',''), ":=" FROM
password WHERE pid = '%{SQL-User-Name}' AND
password.tenant_id = '%{control:PacketFence-Tenant-Id}' AND NOT
EXISTS (SELECT pid FROM activation WHERE pid = '%{SQL-User-Name}')
(1208) Mon Jul 30 14:09:33 2018: Debug: pflocal: --> SELECT 1, pid,
"Cleartext-Password", REPLACE(password,'{ntlm}',''), ":=" FROM
password WHERE pid = 'pica8' AND password.tenant_id =
'1' AND NOT EXISTS (SELECT pid FROM activation WHERE pid =
'pica8')
(1208) Mon Jul 30 14:09:33 2018: Debug: pflocal: Executing select query:
SELECT 1, pid, "Cleartext-Password", REPLACE(password,'{ntlm}',''), ":="
FROM password WHERE pid = 'pica8' AND
password.tenant_id = '1' AND NOT EXISTS (SELECT pid FROM
activation WHERE pid = 'pica8')
(1208) Mon Jul 30 14:09:33 2018: Debug: pflocal: EXPAND select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pflocal: --> select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pflocal: Executing select query:
select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pflocal: User found in the group
table
(1208) Mon Jul 30 14:09:33 2018: Debug: [pflocal] = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound ||
noop) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound ||
noop) -> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound ||
noop) {
(1208) Mon Jul 30 14:09:33 2018: Debug: pfguest: EXPAND %{User-Name}
(1208) Mon Jul 30 14:09:33 2018: Debug: pfguest: --> pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: pfguest: SQL-User-Name set to
'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: pfguest: EXPAND SELECT 1, pid,
"Cleartext-Password", REPLACE(password,'{ntlm}',''), ":=" FROM
password JOIN activation using (pid) WHERE pid =
'%{SQL-User-Name}' AND (SELECT type from activation WHERE
pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "guest"
AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00
00:00:00' ) AND password.tenant_id =
'%{control:PacketFence-Tenant-Id}' LIMIT 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfguest: --> SELECT 1, pid,
"Cleartext-Password", REPLACE(password,'{ntlm}',''), ":=" FROM
password JOIN activation using (pid) WHERE pid =
'pica8' AND (SELECT type from activation WHERE pid='pica8'
ORDER BY code_id DESC LIMIT 1) = "guest" AND ( now() <=
password.unregdate OR password.unregdate = '0000-00-00 00:00:00' )
AND password.tenant_id = '1' LIMIT 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfguest: Executing select query:
SELECT 1, pid, "Cleartext-Password", REPLACE(password,'{ntlm}',''), ":="
FROM password JOIN activation using (pid) WHERE
pid = 'pica8' AND (SELECT type from activation WHERE
pid='pica8' ORDER BY code_id DESC LIMIT 1) = "guest" AND (
now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00'
) AND password.tenant_id = '1' LIMIT 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfguest: EXPAND select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfguest: --> select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfguest: Executing select query:
select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfguest: User found in the group
table
(1208) Mon Jul 30 14:09:33 2018: Debug: [pfguest] = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound ||
noop) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound ||
noop) -> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound ||
noop) {
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsponsor: EXPAND %{User-Name}
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsponsor: --> pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsponsor: SQL-User-Name set to
'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsponsor: EXPAND SELECT 1, pid,
"Cleartext-Password", REPLACE(password,'{ntlm}',''), ":=" FROM
password JOIN activation using (pid) WHERE pid =
'%{SQL-User-Name}' AND (SELECT type from activation WHERE
pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "sponsor"
AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00
00:00:00' ) AND password.tenant_id =
'%{control:PacketFence-Tenant-Id}' LIMIT 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsponsor: --> SELECT 1, pid,
"Cleartext-Password", REPLACE(password,'{ntlm}',''), ":=" FROM
password JOIN activation using (pid) WHERE pid =
'pica8' AND (SELECT type from activation WHERE pid='pica8'
ORDER BY code_id DESC LIMIT 1) = "sponsor" AND ( now() <=
password.unregdate OR password.unregdate = '0000-00-00 00:00:00' )
AND password.tenant_id = '1' LIMIT 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsponsor: Executing select query:
SELECT 1, pid, "Cleartext-Password", REPLACE(password,'{ntlm}',''), ":="
FROM password JOIN activation using (pid) WHERE
pid = 'pica8' AND (SELECT type from activation WHERE
pid='pica8' ORDER BY code_id DESC LIMIT 1) = "sponsor" AND (
now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00'
) AND password.tenant_id = '1' LIMIT 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsponsor: EXPAND select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsponsor: --> select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsponsor: Executing select query:
select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsponsor: User found in the group
table
(1208) Mon Jul 30 14:09:33 2018: Debug: [pfsponsor] = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound ||
noop) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound ||
noop) -> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound ||
noop) {
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsms: EXPAND %{User-Name}
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsms: --> pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsms: SQL-User-Name set to 'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsms: EXPAND SELECT 1, pid,
"Cleartext-Password", REPLACE(password,'{ntlm}',''), ":=" FROM
password JOIN activation using (pid) WHERE pid =
'%{SQL-User-Name}' AND (SELECT type from activation WHERE
pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "sms"
AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00
00:00:00' ) AND password.tenant_id =
'%{control:PacketFence-Tenant-Id}' LIMIT 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsms: --> SELECT 1, pid,
"Cleartext-Password", REPLACE(password,'{ntlm}',''), ":=" FROM
password JOIN activation using (pid) WHERE pid =
'pica8' AND (SELECT type from activation WHERE pid='pica8'
ORDER BY code_id DESC LIMIT 1) = "sms" AND ( now() <=
password.unregdate OR password.unregdate = '0000-00-00 00:00:00' )
AND password.tenant_id = '1' LIMIT 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsms: Executing select query:
SELECT 1, pid, "Cleartext-Password", REPLACE(password,'{ntlm}',''), ":="
FROM password JOIN activation using (pid) WHERE
pid = 'pica8' AND (SELECT type from activation WHERE
pid='pica8' ORDER BY code_id DESC LIMIT 1) = "sms" AND ( now()
<= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' )
AND password.tenant_id = '1' LIMIT 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsms: EXPAND select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsms: --> select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsms: Executing select query:
select 1
(1208) Mon Jul 30 14:09:33 2018: Debug: pfsms: User found in the group table
(1208) Mon Jul 30 14:09:33 2018: Debug: [pfsms] = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound
|| noop) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound
|| noop) -> TRUE
(1208) Mon Jul 30 14:09:33 2018: Debug: if (fail || notfound
|| noop) {
(1208) Mon Jul 30 14:09:33 2018: Debug: update control {
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update control
= noop
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if (fail ||
notfound || noop) = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if (fail ||
notfound || noop) = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if (fail || notfound
|| noop) = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: } # if (fail || notfound ||
noop) = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy
packetfence-local-auth = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: [pap] = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: } # authorize = updated
(1208) Mon Jul 30 14:09:33 2018: WARNING: You set Proxy-To-Realm = local,
but it is a LOCAL realm! Cancelling proxy request.
(1208) Mon Jul 30 14:09:33 2018: Debug: Found Auth-Type = eap
(1208) Mon Jul 30 14:09:33 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(1208) Mon Jul 30 14:09:33 2018: Debug: authenticate {
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Expiring EAP session with
state 0x15d0941d154c8e42
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Finished EAP session with
state 0x15d0941d154c8e42
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Previous EAP request found for
state 0x15d0941d154c8e42, released from the list
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Peer sent packet with method
EAP MSCHAPv2 (26)
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Calling submodule eap_mschapv2
to process data
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_mschapv2: # Executing group
from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_mschapv2: Auth-Type MS-CHAP {
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'User-Name'} = &request:User-Name -> 'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'NAS-IP-Address'} = &request:NAS-IP-Address -> '0.0.0.0'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'NAS-Port'} = &request:NAS-Port -> '20'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'Framed-MTU'} = &request:Framed-MTU -> '1500'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'State'} = &request:State ->
'0x15d0941d154c8e42b2938126a0a7b2ef'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'Called-Station-Id'} = &request:Called-Station-Id ->
'48:6e:73:02:00:d4'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'Calling-Station-Id'} = &request:Calling-Station-Id ->
'e0:db:55:cd:84:62'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'NAS-Port-Type'} = &request:NAS-Port-Type -> 'Ethernet'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'Event-Timestamp'} = &request:Event-Timestamp -> '7月 30 2018
14:09:33 CST'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'EAP-Message'} = &request:EAP-Message ->
'0x029c00401a029c003b31753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b007069636138'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'FreeRADIUS-Proxied-To'} = &request:FreeRADIUS-Proxied-To ->
'127.0.0.1'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'MS-CHAP-Challenge'} = &request:MS-CHAP-Challenge ->
'0x0d1786a82b1bcffe8b7ed2f24315a0b3'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'MS-CHAP2-Response'} = &request:MS-CHAP2-Response ->
'0x9c69753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'EAP-Type'} = &request:EAP-Type -> 'MSCHAPv2'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'Stripped-User-Name'} = &request:Stripped-User-Name -> 'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'Realm'} = &request:Realm -> 'null'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_REQUEST{'MS-CHAP-User-Name'} = &request:MS-CHAP-User-Name -> 'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_CHECK{'Auth-Type'} = &control:Auth-Type -> 'eap'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_CHECK{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'LOCAL'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_CHECK{'MS-CHAP-Use-NTLM-Auth'} = &control:MS-CHAP-Use-NTLM-Auth ->
'Yes'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_CHECK{'PacketFence-Tenant-Id'} = &control:PacketFence-Tenant-Id -> '1'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_CONFIG{'Auth-Type'} = &control:Auth-Type -> 'eap'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_CONFIG{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'LOCAL'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_CONFIG{'MS-CHAP-Use-NTLM-Auth'} = &control:MS-CHAP-Use-NTLM-Auth ->
'Yes'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
$RAD_CONFIG{'PacketFence-Tenant-Id'} = &control:PacketFence-Tenant-Id ->
'1'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&request:MS-CHAP2-Response = $RAD_REQUEST{'MS-CHAP2-Response'} ->
'0x9c69753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&request:Called-Station-Id = $RAD_REQUEST{'Called-Station-Id'} ->
'48:6e:73:02:00:d4'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence: &request:Realm =
$RAD_REQUEST{'Realm'} -> 'null'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence: &request:State =
$RAD_REQUEST{'State'} -> '0x15d0941d154c8e42b2938126a0a7b2ef'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&request:FreeRADIUS-Proxied-To = $RAD_REQUEST{'FreeRADIUS-Proxied-To'} ->
'127.0.0.1'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence: &request:NAS-Port-Type
= $RAD_REQUEST{'NAS-Port-Type'} -> 'Ethernet'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&request:Stripped-User-Name = $RAD_REQUEST{'Stripped-User-Name'} -> 'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence: &request:NAS-Port =
$RAD_REQUEST{'NAS-Port'} -> '20'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} ->
'e0:db:55:cd:84:62'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence: &request:EAP-Message =
$RAD_REQUEST{'EAP-Message'} ->
'0x029c00401a029c003b31753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b007069636138'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&request:MS-CHAP-User-Name = $RAD_REQUEST{'MS-CHAP-User-Name'} -> 'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '0.0.0.0'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&request:MS-CHAP-Challenge = $RAD_REQUEST{'MS-CHAP-Challenge'} ->
'0x0d1786a82b1bcffe8b7ed2f24315a0b3'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence: &request:User-Name =
$RAD_REQUEST{'User-Name'} -> 'pica8'
(1208) Mon Jul 30 14:09:33 2018: ERROR: packetfence: Failed to create pair
- failed to parse time string "7月 30 2018 14:09:33 CST"
(1208) Mon Jul 30 14:09:33 2018: ERROR: packetfence:
&request:Event-Timestamp = $RAD_REQUEST{'Event-Timestamp'} -> '7月 30 2018
14:09:33 CST'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence: &request:EAP-Type =
$RAD_REQUEST{'EAP-Type'} -> 'MSCHAPv2'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence: &request:Framed-MTU =
$RAD_REQUEST{'Framed-MTU'} -> '1500'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&control:MS-CHAP-Use-NTLM-Auth = $RAD_CHECK{'MS-CHAP-Use-NTLM-Auth'} ->
'Yes'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&control:Proxy-To-Realm = $RAD_CHECK{'Proxy-To-Realm'} -> 'LOCAL'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence: &control:Auth-Type =
$RAD_CHECK{'Auth-Type'} -> 'eap'
(1208) Mon Jul 30 14:09:33 2018: Debug: packetfence:
&control:PacketFence-Tenant-Id = $RAD_CHECK{'PacketFence-Tenant-Id'} -> '1'
(1208) Mon Jul 30 14:09:33 2018: Debug: [packetfence] = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&control:NT-Password &&
&control:NT-Password != "") {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&control:NT-Password &&
&control:NT-Password != "") -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: else {
(1208) Mon Jul 30 14:09:33 2018: Debug: policy
packetfence-mschap-authenticate {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (PacketFence-Domain) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (PacketFence-Domain) ->
FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: else {
(1208) Mon Jul 30 14:09:33 2018: Debug: if ( "%{User-Name}" =~
/^host\/.*/) {
(1208) Mon Jul 30 14:09:33 2018: Debug: EXPAND %{User-Name}
(1208) Mon Jul 30 14:09:33 2018: Debug: --> pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: if ( "%{User-Name}" =~
/^host\/.*/) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: else {
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: Creating challenge hash
with username: pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: Client is using MS-CHAPv2
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: Executing:
/usr/local/pf/bin/ntlm_auth_wrapper -- --request-nt-key
--username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}
--challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}:
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: EXPAND
--username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: --> --username=pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: Creating challenge hash
with username: pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: EXPAND
--challenge=%{mschap:Challenge:-00}
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: -->
--challenge=3c1baed75c51b4bc
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: EXPAND
--nt-response=%{mschap:NT-Response:-00}
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: -->
--nt-response=4bc37e26922005aa7651961595b9427b37ecf0135f1fc82b
(1208) Mon Jul 30 14:09:33 2018: ERROR: mschap: Program returned code (1)
and output 'Reading winbind reply failed! (0xc0000001)'
(1208) Mon Jul 30 14:09:33 2018: Debug: mschap: External script failed
(1208) Mon Jul 30 14:09:33 2018: ERROR: mschap: External script says:
Reading winbind reply failed! (0xc0000001)
(1208) Mon Jul 30 14:09:33 2018: ERROR: mschap: MS-CHAP2-Response is
incorrect
(1208) Mon Jul 30 14:09:33 2018: Debug: [mschap] = reject
(1208) Mon Jul 30 14:09:33 2018: Debug: } # else = reject
(1208) Mon Jul 30 14:09:33 2018: Debug: } # else = reject
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy
packetfence-mschap-authenticate = reject
(1208) Mon Jul 30 14:09:33 2018: Debug: } # else = reject
(1208) Mon Jul 30 14:09:33 2018: Debug: } # Auth-Type MS-CHAP = reject
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Sending EAP Failure (code 4)
ID 156 length 4
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Freeing handler
(1208) Mon Jul 30 14:09:33 2018: Debug: [eap] = reject
(1208) Mon Jul 30 14:09:33 2018: Debug: } # authenticate = reject
(1208) Mon Jul 30 14:09:33 2018: Debug: Failed to authenticate the user
(1208) Mon Jul 30 14:09:33 2018: Debug: Using Post-Auth-Type Reject
(1208) Mon Jul 30 14:09:33 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence-tunnel
(1208) Mon Jul 30 14:09:33 2018: Debug: Post-Auth-Type REJECT {
(1208) Mon Jul 30 14:09:33 2018: Debug: update {
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: policy
packetfence-audit-log-reject {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name &&
(&User-Name == "dummy")) {
(1208) Mon Jul 30 14:09:33 2018: Debug: if (&User-Name &&
(&User-Name == "dummy")) -> FALSE
(1208) Mon Jul 30 14:09:33 2018: Debug: else {
(1208) Mon Jul 30 14:09:33 2018: Debug: policy request-timing {
(1208) Mon Jul 30 14:09:33 2018: Debug: if
(control:PacketFence-Request-Time != 0) {
(1208) Mon Jul 30 14:09:33 2018: ERROR: Failed retrieving
values required to evaluate condition
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy request-timing
= noop
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: EXPAND type.reject.query
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: --> type.reject.query
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: Using query template
'query'
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: EXPAND %{User-Name}
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: --> pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: SQL-User-Name set to
'pica8'
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: EXPAND INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason,
auth_type, eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain, uuid,
radius_request, radius_reply, request_time, tenant_id)
VALUES ( '%{request:Calling-Station-Id}',
'%{request:Framed-IP-Address}',
'%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}',
'%{request:Stripped-User-Name}', '%{request:Realm}',
'Radius-Access-Request',
'%{%{control:PacketFence-Switch-Id}:-N/A}',
'%{%{control:PacketFence-Switch-Mac}:-N/A}',
'%{%{control:PacketFence-Switch-Ip-Address}:-N/A}',
'%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}',
'%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}',
'%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}',
'%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}',
'%{%{control:PacketFence-Connection-Type}:-N/A}',
'%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Reject',
'%{request:Module-Failure-Message}', '%{control:Auth-Type}',
'%{request:EAP-Type}',
'%{%{control:PacketFence-Role}:-N/A}',
'%{%{control:PacketFence-Status}:-N/A}',
'%{%{control:PacketFence-Profile}:-N/A}',
'%{%{control:PacketFence-Source}:-N/A}',
'%{%{control:PacketFence-AutoReg}:-0}',
'%{%{control:PacketFence-IsPhone}:-0}',
'%{request:PacketFence-Domain}', '',
'%{pairs:&request:[*]}','%{pairs:&reply:[*]}',
'%{%{control:PacketFence-Request-Time}:-N/A}',
'%{control:PacketFence-Tenant-Id}')
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: --> INSERT INTO
radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type, switch_id,
switch_mac, switch_ip_address, radius_source_ip_address,
called_station_id, calling_station_id, nas_port_type, ssid,
nas_port_id, ifindex, nas_port, connection_type,
nas_ip_address, nas_identifier, auth_status, reason,
auth_type, eap_type, role, node_status, profile,
source, auto_reg, is_phone, pf_domain, uuid,
radius_request, radius_reply, request_time, tenant_id)
VALUES ( 'e0:db:55:cd:84:62', '', 'N/A', 'pica8',
'pica8', 'null', 'Radius-Access-Request', 'N/A',
'N/A', 'N/A', '10.10.51.148', '48:6e:73:02:00:d4',
'e0:db:55:cd:84:62', 'Ethernet', '', '',
'N/A', '20', 'N/A', '0.0.0.0', '', 'Reject',
'mschap: Program returned code =281=29 and output =27Reading winbind reply
failed=21 =280xc0000001=29=27', 'eap', 'MSCHAPv2', 'N/A',
'N/A', 'N/A', 'N/A', '0', '0', '', '',
'MS-CHAP2-Response =3D
0x9c69753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b=2C
Called-Station-Id =3D =2248:6e:73:02:00:d4=22=2C Realm =3D =22null=22=2C
State =3D 0x15d0941d154c8e42b2938126a0a7b2ef=2C FreeRADIUS-Proxied-To =3D
127.0.0.1=2C NAS-Port-Type =3D Ethernet=2C Stripped-User-Name =3D
=22pica8=22=2C NAS-Port =3D 20=2C Calling-Station-Id =3D
=22e0:db:55:cd:84:62=22=2C EAP-Message =3D
0x029c00401a029c003b31753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b007069636138=2C
MS-CHAP-User-Name =3D =22pica8=22=2C NAS-IP-Address =3D 0.0.0.0=2C
MS-CHAP-Challenge =3D 0x0d1786a82b1bcffe8b7ed2f24315a0b3=2C User-Name =3D
=22pica8=22=2C Event-Timestamp =3D =221月 1 1970 08:00:00 CST=22=2C
EAP-Type =3D MSCHAPv2=2C Framed-MTU =3D 1500=2C Module-Failure-Message =3D
=22mschap: Program returned code =281=29 and output =27Reading winbind
reply failed=21 =280xc0000001=29=27=22=2C Module-Failure-Message =3D
=22mschap: External script says: Reading winbind reply failed=21
=280xc0000001=29=22=2C Module-Failure-Message =3D =22mschap:
MS-CHAP2-Response is incorrect=22=2C User-Password =3D
=22=2A=2A=2A=2A=2A=2A=22=2C Module-Failure-Message =3D =22Failed retrieving
values required to evaluate condition=22=2C SQL-User-Name =3D
=22pica8=22','MS-CHAP-Error =3D =22=5C234E=3D691 R=3D0
C=3D81b9dd2bf900d6a6ed58462cea9c8bf3 V=3D3 M=3DAuthentication failed=22=2C
EAP-Message =3D 0x049c0004=2C Message-Authenticator =3D
0x00000000000000000000000000000000', 'N/A', '1')
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: Executing query: INSERT
INTO radius_audit_log ( mac, ip, computer_name, user_name,
stripped_user_name, realm, event_type,
switch_id, switch_mac, switch_ip_address,
radius_source_ip_address, called_station_id, calling_station_id,
nas_port_type, ssid, nas_port_id, ifindex, nas_port,
connection_type, nas_ip_address, nas_identifier,
auth_status, reason, auth_type, eap_type,
role, node_status, profile, source, auto_reg, is_phone,
pf_domain, uuid, radius_request, radius_reply,
request_time, tenant_id) VALUES (
'e0:db:55:cd:84:62', '', 'N/A', 'pica8', 'pica8', 'null',
'Radius-Access-Request', 'N/A', 'N/A', 'N/A',
'10.10.51.148', '48:6e:73:02:00:d4', 'e0:db:55:cd:84:62',
'Ethernet', '', '', 'N/A', '20', 'N/A',
'0.0.0.0', '', 'Reject', 'mschap: Program returned code
=281=29 and output =27Reading winbind reply failed=21 =280xc0000001=29=27',
'eap', 'MSCHAPv2', 'N/A', 'N/A', 'N/A',
'N/A', '0', '0', '', '', 'MS-CHAP2-Response =3D
0x9c69753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b=2C
Called-Station-Id =3D =2248:6e:73:02:00:d4=22=2C Realm =3D =22null=22=2C
State =3D 0x15d0941d154c8e42b2938126a0a7b2ef=2C FreeRADIUS-Proxied-To =3D
127.0.0.1=2C NAS-Port-Type =3D Ethernet=2C Stripped-User-Name =3D
=22pica8=22=2C NAS-Port =3D 20=2C Calling-Station-Id =3D
=22e0:db:55:cd:84:62=22=2C EAP-Message =3D
0x029c00401a029c003b31753b2023215fc17b42aaeea9906dfb2f00000000000000004bc37e26922005aa7651961595b9427b37ecf0135f1fc82b007069636138=2C
MS-CHAP-User-Name =3D =22pica8=22=2C NAS-IP-Address =3D 0.0.0.0=2C
MS-CHAP-Challenge =3D 0x0d1786a82b1bcffe8b7ed2f24315a0b3=2C User-Name =3D
=22pica8=22=2C Event-Timestamp =3D =221月 1 1970 08:00:00 CST=22=2C
EAP-Type =3D MSCHAPv2=2C Framed-MTU =3D 1500=2C Module-Failure-Message =3D
=22mschap: Program returned code =281=29 and output =27Reading winbind
reply failed=21 =280xc0000001=29=27=22=2C Module-Failure-Message =3D
=22mschap: External script says: Reading winbind reply failed=21
=280xc0000001=29=22=2C Module-Failure-Message =3D =22mschap:
MS-CHAP2-Response is incorrect=22=2C User-Password =3D
=22=2A=2A=2A=2A=2A=2A=22=2C Module-Failure-Message =3D =22Failed retrieving
values required to evaluate condition=22=2C SQL-User-Name =3D
=22pica8=22','MS-CHAP-Error =3D =22=5C234E=3D691 R=3D0
C=3D81b9dd2bf900d6a6ed58462cea9c8bf3 V=3D3 M=3DAuthentication failed=22=2C
EAP-Message =3D 0x049c0004=2C Message-Authenticator =3D
0x00000000000000000000000000000000', 'N/A', '1')
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: SQL query returned:
success
(1208) Mon Jul 30 14:09:33 2018: Debug: sql_reject: 1 record(s) updated
(1208) Mon Jul 30 14:09:33 2018: Debug: [sql_reject] = ok
(1208) Mon Jul 30 14:09:33 2018: Debug: } # else = ok
(1208) Mon Jul 30 14:09:33 2018: Debug: } # policy
packetfence-audit-log-reject = ok
(1208) Mon Jul 30 14:09:33 2018: Debug: attr_filter.access_reject: EXPAND
%{User-Name}
(1208) Mon Jul 30 14:09:33 2018: Debug: attr_filter.access_reject: -->
pica8
(1208) Mon Jul 30 14:09:33 2018: Debug: attr_filter.access_reject: Matched
entry DEFAULT at line 11
(1208) Mon Jul 30 14:09:33 2018: Debug: [attr_filter.access_reject] =
updated
(1208) Mon Jul 30 14:09:33 2018: Debug: update outer.session-state {
(1208) Mon Jul 30 14:09:33 2018: Debug: } # update
outer.session-state = noop
(1208) Mon Jul 30 14:09:33 2018: Debug: } # Post-Auth-Type REJECT =
updated
(1208) Mon Jul 30 14:09:33 2018: Debug: } # server packetfence-tunnel
(1208) Mon Jul 30 14:09:33 2018: Debug: Virtual server sending reply
(1208) Mon Jul 30 14:09:33 2018: Debug: MS-CHAP-Error = "\234E=691 R=0
C=81b9dd2bf900d6a6ed58462cea9c8bf3 V=3 M=Authentication failed"
(1208) Mon Jul 30 14:09:33 2018: Debug: EAP-Message = 0x049c0004
(1208) Mon Jul 30 14:09:33 2018: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Got tunneled reply code 3
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: MS-CHAP-Error =
"\234E=691 R=0 C=81b9dd2bf900d6a6ed58462cea9c8bf3 V=3 M=Authentication
failed"
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: EAP-Message = 0x049c0004
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Message-Authenticator =
0x00000000000000000000000000000000
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: Tunneled authentication
was rejected
(1208) Mon Jul 30 14:09:33 2018: Debug: eap_peap: FAILURE
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: Sending EAP Request (code 1)
ID 157 length 46
(1208) Mon Jul 30 14:09:33 2018: Debug: eap: EAP session adding
&reply:State = 0xc842f886cfdfe1df
(1208) Mon Jul 30 14:09:33 2018: Debug: [eap] = handled
(1208) Mon Jul 30 14:09:33 2018: Debug: } # authenticate = handled
(1208) Mon Jul 30 14:09:33 2018: Debug: Using Post-Auth-Type Challenge
(1208) Mon Jul 30 14:09:33 2018: Debug: Post-Auth-Type sub-section not
found. Ignoring.
(1208) Mon Jul 30 14:09:33 2018: Debug: # Executing group from file
/usr/local/pf/raddb/sites-enabled/packetfence
(1208) Mon Jul 30 14:09:33 2018: Debug: session-state: Saving cached
attributes
(1208) Mon Jul 30 14:09:33 2018: Debug: Module-Failure-Message :=
"mschap: Program returned code (1) and output 'Reading winbind reply
failed! (0xc0000001)'"
(1208) Mon Jul 30 14:09:33 2018: Debug: Sent Access-Challenge Id 128 from
10.10.50.233:1812 to 10.10.51.148:1812 length 0
(1208) Mon Jul 30 14:09:33 2018: Debug: EAP-Message =
0x019d002e190017030300232c5c8a446448cff82e6aa80a36fee6536d9df2310f5d8347982da83c467e219d6338f1
(1208) Mon Jul 30 14:09:33 2018: Debug: Message-Authenticator =
0x00000000000000000000000000000000
(1208) Mon Jul 30 14:09:33 2018: Debug: State =
0xc842f886cfdfe1df0a7cf6df90a93b00
(1208) Mon Jul 30 14:09:33 2018: Debug: Finished request
--
Amjad Ali
|