Advertisement
Guest User

Untitled

a guest
May 24th, 2018
541
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 265.59 KB | None | 0 0
  1. (0) Thu May 24 17:30:29 2018: Debug: Received Access-Request Id 25 from 172.20.5.79:52628 to 172.20.5.3:1812 length 372
  2. (0) Thu May 24 17:30:29 2018: Debug: Framed-MTU = 1480
  3. (0) Thu May 24 17:30:29 2018: Debug: NAS-IP-Address = 172.20.9.150
  4. (0) Thu May 24 17:30:29 2018: Debug: NAS-Identifier = "Test"
  5. (0) Thu May 24 17:30:29 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  6. (0) Thu May 24 17:30:29 2018: Debug: Service-Type = Framed-User
  7. (0) Thu May 24 17:30:29 2018: Debug: Framed-Protocol = PPP
  8. (0) Thu May 24 17:30:29 2018: Debug: NAS-Port = 1
  9. (0) Thu May 24 17:30:29 2018: Debug: NAS-Port-Type = Ethernet
  10. (0) Thu May 24 17:30:29 2018: Debug: NAS-Port-Id = "1"
  11. (0) Thu May 24 17:30:29 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  12. (0) Thu May 24 17:30:29 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  13. (0) Thu May 24 17:30:29 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  14. (0) Thu May 24 17:30:29 2018: Debug: Tunnel-Type:0 = VLAN
  15. (0) Thu May 24 17:30:29 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  16. (0) Thu May 24 17:30:29 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  17. (0) Thu May 24 17:30:29 2018: Debug: EAP-Message = 0x0201002401686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445
  18. (0) Thu May 24 17:30:29 2018: Debug: Message-Authenticator = 0x6617fad777f9bd50b77d4b3fbe07f915
  19. (0) Thu May 24 17:30:29 2018: Debug: MS-RAS-Vendor = 11
  20. (0) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  21. (0) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  22. (0) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  23. (0) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  24. (0) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0138
  25. (0) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x013a
  26. (0) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0140
  27. (0) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0141
  28. (0) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0151
  29. (0) Thu May 24 17:30:29 2018: Debug: Proxy-State = 0x3134
  30. (0) Thu May 24 17:30:29 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  31. (0) Thu May 24 17:30:29 2018: Debug: authorize {
  32. (0) Thu May 24 17:30:29 2018: Debug: update {
  33. (0) Thu May 24 17:30:29 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  34. (0) Thu May 24 17:30:29 2018: Debug: --> 172.20.5.79
  35. (0) Thu May 24 17:30:29 2018: Debug: EXPAND %l
  36. (0) Thu May 24 17:30:29 2018: Debug: --> 1527175829
  37. (0) Thu May 24 17:30:29 2018: Debug: } # update = noop
  38. (0) Thu May 24 17:30:29 2018: Debug: policy packetfence-set-tenant-id {
  39. (0) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  40. (0) Thu May 24 17:30:29 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  41. (0) Thu May 24 17:30:29 2018: Debug: --> 0
  42. (0) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  43. (0) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  44. (0) Thu May 24 17:30:29 2018: Debug: update control {
  45. (0) Thu May 24 17:30:29 2018: Debug: EXPAND %{User-Name}
  46. (0) Thu May 24 17:30:29 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  47. (0) Thu May 24 17:30:29 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  48. (0) Thu May 24 17:30:29 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  49. (0) Thu May 24 17:30:29 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  50. (0) Thu May 24 17:30:29 2018: Debug: --> 0
  51. (0) Thu May 24 17:30:29 2018: Debug: } # update control = noop
  52. (0) Thu May 24 17:30:29 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  53. (0) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  54. (0) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  55. (0) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  56. (0) Thu May 24 17:30:29 2018: Debug: update control {
  57. (0) Thu May 24 17:30:29 2018: Debug: EXPAND %{User-Name}
  58. (0) Thu May 24 17:30:29 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  59. (0) Thu May 24 17:30:29 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  60. (0) Thu May 24 17:30:29 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  61. (0) Thu May 24 17:30:29 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  62. (0) Thu May 24 17:30:29 2018: Debug: --> 1
  63. (0) Thu May 24 17:30:29 2018: Debug: } # update control = noop
  64. (0) Thu May 24 17:30:29 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  65. (0) Thu May 24 17:30:29 2018: Debug: } # policy packetfence-set-tenant-id = noop
  66. (0) Thu May 24 17:30:29 2018: Debug: policy rewrite_calling_station_id {
  67. (0) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  68. (0) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  69. (0) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  70. (0) Thu May 24 17:30:29 2018: Debug: update request {
  71. (0) Thu May 24 17:30:29 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  72. (0) Thu May 24 17:30:29 2018: Debug: --> 00:e0:4c:60:43:20
  73. (0) Thu May 24 17:30:29 2018: Debug: } # update request = noop
  74. (0) Thu May 24 17:30:29 2018: Debug: [updated] = updated
  75. (0) Thu May 24 17:30:29 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  76. (0) Thu May 24 17:30:29 2018: Debug: ... skipping else: Preceding "if" was taken
  77. (0) Thu May 24 17:30:29 2018: Debug: } # policy rewrite_calling_station_id = updated
  78. (0) Thu May 24 17:30:29 2018: Debug: policy rewrite_called_station_id {
  79. (0) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  80. (0) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  81. (0) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  82. (0) Thu May 24 17:30:29 2018: Debug: update request {
  83. (0) Thu May 24 17:30:29 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  84. (0) Thu May 24 17:30:29 2018: Debug: --> 94:18:82:b9:32:80
  85. (0) Thu May 24 17:30:29 2018: Debug: } # update request = noop
  86. (0) Thu May 24 17:30:29 2018: Debug: if ("%{8}") {
  87. (0) Thu May 24 17:30:29 2018: Debug: EXPAND %{8}
  88. (0) Thu May 24 17:30:29 2018: Debug: -->
  89. (0) Thu May 24 17:30:29 2018: Debug: if ("%{8}") -> FALSE
  90. (0) Thu May 24 17:30:29 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  91. (0) Thu May 24 17:30:29 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  92. (0) Thu May 24 17:30:29 2018: Debug: elsif (Aruba-Essid-Name) {
  93. (0) Thu May 24 17:30:29 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  94. (0) Thu May 24 17:30:29 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  95. (0) Thu May 24 17:30:29 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  96. (0) Thu May 24 17:30:29 2018: Debug: [updated] = updated
  97. (0) Thu May 24 17:30:29 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  98. (0) Thu May 24 17:30:29 2018: Debug: ... skipping else: Preceding "if" was taken
  99. (0) Thu May 24 17:30:29 2018: Debug: } # policy rewrite_called_station_id = updated
  100. (0) Thu May 24 17:30:29 2018: Debug: policy filter_username {
  101. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name) {
  102. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name) -> TRUE
  103. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name) {
  104. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ / /) {
  105. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ / /) -> FALSE
  106. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  107. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  108. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.\./ ) {
  109. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  110. (0) Thu May 24 17:30:29 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  111. (0) Thu May 24 17:30:29 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  112. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.$/) {
  113. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  114. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@\./) {
  115. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  116. (0) Thu May 24 17:30:29 2018: Debug: } # if (&User-Name) = updated
  117. (0) Thu May 24 17:30:29 2018: Debug: } # policy filter_username = updated
  118. (0) Thu May 24 17:30:29 2018: Debug: policy filter_password {
  119. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  120. (0) Thu May 24 17:30:29 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  121. (0) Thu May 24 17:30:29 2018: Debug: } # policy filter_password = updated
  122. (0) Thu May 24 17:30:29 2018: Debug: [preprocess] = ok
  123. (0) Thu May 24 17:30:29 2018: Debug: suffix: Checking for suffix after "@"
  124. (0) Thu May 24 17:30:29 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  125. (0) Thu May 24 17:30:29 2018: Debug: [suffix] = noop
  126. (0) Thu May 24 17:30:29 2018: Debug: ntdomain: Checking for prefix before "\"
  127. (0) Thu May 24 17:30:29 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  128. (0) Thu May 24 17:30:29 2018: Debug: ntdomain: Found realm "null"
  129. (0) Thu May 24 17:30:29 2018: Debug: ntdomain: Adding Realm = "null"
  130. (0) Thu May 24 17:30:29 2018: Debug: ntdomain: Authentication realm is LOCAL
  131. (0) Thu May 24 17:30:29 2018: Debug: [ntdomain] = ok
  132. (0) Thu May 24 17:30:29 2018: Debug: eap: Peer sent EAP Response (code 2) ID 1 length 36
  133. (0) Thu May 24 17:30:29 2018: Debug: eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
  134. (0) Thu May 24 17:30:29 2018: Debug: [eap] = ok
  135. (0) Thu May 24 17:30:29 2018: Debug: } # authorize = ok
  136. (0) Thu May 24 17:30:29 2018: Debug: Found Auth-Type = eap
  137. (0) Thu May 24 17:30:29 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  138. (0) Thu May 24 17:30:29 2018: Debug: authenticate {
  139. (0) Thu May 24 17:30:29 2018: Debug: eap: Peer sent packet with method EAP Identity (1)
  140. (0) Thu May 24 17:30:29 2018: Debug: eap: Calling submodule eap_peap to process data
  141. (0) Thu May 24 17:30:29 2018: Debug: eap_peap: Initiating new EAP-TLS session
  142. (0) Thu May 24 17:30:29 2018: Debug: eap_peap: [eaptls start] = request
  143. (0) Thu May 24 17:30:29 2018: Debug: eap: Sending EAP Request (code 1) ID 2 length 6
  144. (0) Thu May 24 17:30:29 2018: Debug: eap: EAP session adding &reply:State = 0x49c411c249c6082f
  145. (0) Thu May 24 17:30:29 2018: Debug: [eap] = handled
  146. (0) Thu May 24 17:30:29 2018: Debug: } # authenticate = handled
  147. (0) Thu May 24 17:30:29 2018: Debug: Using Post-Auth-Type Challenge
  148. (0) Thu May 24 17:30:29 2018: Debug: Post-Auth-Type sub-section not found. Ignoring.
  149. (0) Thu May 24 17:30:29 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  150. (0) Thu May 24 17:30:29 2018: Debug: Sent Access-Challenge Id 25 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  151. (0) Thu May 24 17:30:29 2018: Debug: EAP-Message = 0x010200061920
  152. (0) Thu May 24 17:30:29 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  153. (0) Thu May 24 17:30:29 2018: Debug: State = 0x49c411c249c6082fb3b3797cce5894f4
  154. (0) Thu May 24 17:30:29 2018: Debug: Proxy-State = 0x3134
  155. (0) Thu May 24 17:30:29 2018: Debug: Finished request
  156. (1) Thu May 24 17:30:29 2018: Debug: Received Access-Request Id 8 from 172.20.5.79:52628 to 172.20.5.3:1812 length 520
  157. (1) Thu May 24 17:30:29 2018: Debug: Framed-MTU = 1480
  158. (1) Thu May 24 17:30:29 2018: Debug: NAS-IP-Address = 172.20.9.150
  159. (1) Thu May 24 17:30:29 2018: Debug: NAS-Identifier = "Test"
  160. (1) Thu May 24 17:30:29 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  161. (1) Thu May 24 17:30:29 2018: Debug: Service-Type = Framed-User
  162. (1) Thu May 24 17:30:29 2018: Debug: Framed-Protocol = PPP
  163. (1) Thu May 24 17:30:29 2018: Debug: NAS-Port = 1
  164. (1) Thu May 24 17:30:29 2018: Debug: NAS-Port-Type = Ethernet
  165. (1) Thu May 24 17:30:29 2018: Debug: NAS-Port-Id = "1"
  166. (1) Thu May 24 17:30:29 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  167. (1) Thu May 24 17:30:29 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  168. (1) Thu May 24 17:30:29 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  169. (1) Thu May 24 17:30:29 2018: Debug: Tunnel-Type:0 = VLAN
  170. (1) Thu May 24 17:30:29 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  171. (1) Thu May 24 17:30:29 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  172. (1) Thu May 24 17:30:29 2018: Debug: State = 0x49c411c249c6082fb3b3797cce5894f4
  173. (1) Thu May 24 17:30:29 2018: Debug: EAP-Message = 0x020200a619800000009c16030300970100009303035b06da94218ad8be62e68a5597bfdebed186a04d4b719f26cb30cf87486b51c200002ac02cc02bc030c02f009f009ec024c023c028c027c00ac009c014c013009d009c003d003c0035002f000a01000040000500050100000000000a00080006001d
  174. (1) Thu May 24 17:30:29 2018: Debug: Message-Authenticator = 0x95f7b8858d65bd7c000a05026301c991
  175. (1) Thu May 24 17:30:29 2018: Debug: MS-RAS-Vendor = 11
  176. (1) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  177. (1) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  178. (1) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  179. (1) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  180. (1) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0138
  181. (1) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x013a
  182. (1) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0140
  183. (1) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0141
  184. (1) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0151
  185. (1) Thu May 24 17:30:29 2018: Debug: Proxy-State = 0x3135
  186. (1) Thu May 24 17:30:29 2018: Debug: session-state: No cached attributes
  187. (1) Thu May 24 17:30:29 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  188. (1) Thu May 24 17:30:29 2018: Debug: authorize {
  189. (1) Thu May 24 17:30:29 2018: Debug: update {
  190. (1) Thu May 24 17:30:29 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  191. (1) Thu May 24 17:30:29 2018: Debug: --> 172.20.5.79
  192. (1) Thu May 24 17:30:29 2018: Debug: EXPAND %l
  193. (1) Thu May 24 17:30:29 2018: Debug: --> 1527175829
  194. (1) Thu May 24 17:30:29 2018: Debug: } # update = noop
  195. (1) Thu May 24 17:30:29 2018: Debug: policy packetfence-set-tenant-id {
  196. (1) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  197. (1) Thu May 24 17:30:29 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  198. (1) Thu May 24 17:30:29 2018: Debug: --> 0
  199. (1) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  200. (1) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  201. (1) Thu May 24 17:30:29 2018: Debug: update control {
  202. (1) Thu May 24 17:30:29 2018: Debug: EXPAND %{User-Name}
  203. (1) Thu May 24 17:30:29 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  204. (1) Thu May 24 17:30:29 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  205. (1) Thu May 24 17:30:29 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  206. (1) Thu May 24 17:30:29 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  207. (1) Thu May 24 17:30:29 2018: Debug: --> 0
  208. (1) Thu May 24 17:30:29 2018: Debug: } # update control = noop
  209. (1) Thu May 24 17:30:29 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  210. (1) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  211. (1) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  212. (1) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  213. (1) Thu May 24 17:30:29 2018: Debug: update control {
  214. (1) Thu May 24 17:30:29 2018: Debug: EXPAND %{User-Name}
  215. (1) Thu May 24 17:30:29 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  216. (1) Thu May 24 17:30:29 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  217. (1) Thu May 24 17:30:29 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  218. (1) Thu May 24 17:30:29 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  219. (1) Thu May 24 17:30:29 2018: Debug: --> 1
  220. (1) Thu May 24 17:30:29 2018: Debug: } # update control = noop
  221. (1) Thu May 24 17:30:29 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  222. (1) Thu May 24 17:30:29 2018: Debug: } # policy packetfence-set-tenant-id = noop
  223. (1) Thu May 24 17:30:29 2018: Debug: policy rewrite_calling_station_id {
  224. (1) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  225. (1) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  226. (1) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  227. (1) Thu May 24 17:30:29 2018: Debug: update request {
  228. (1) Thu May 24 17:30:29 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  229. (1) Thu May 24 17:30:29 2018: Debug: --> 00:e0:4c:60:43:20
  230. (1) Thu May 24 17:30:29 2018: Debug: } # update request = noop
  231. (1) Thu May 24 17:30:29 2018: Debug: [updated] = updated
  232. (1) Thu May 24 17:30:29 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  233. (1) Thu May 24 17:30:29 2018: Debug: ... skipping else: Preceding "if" was taken
  234. (1) Thu May 24 17:30:29 2018: Debug: } # policy rewrite_calling_station_id = updated
  235. (1) Thu May 24 17:30:29 2018: Debug: policy rewrite_called_station_id {
  236. (1) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  237. (1) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  238. (1) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  239. (1) Thu May 24 17:30:29 2018: Debug: update request {
  240. (1) Thu May 24 17:30:29 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  241. (1) Thu May 24 17:30:29 2018: Debug: --> 94:18:82:b9:32:80
  242. (1) Thu May 24 17:30:29 2018: Debug: } # update request = noop
  243. (1) Thu May 24 17:30:29 2018: Debug: if ("%{8}") {
  244. (1) Thu May 24 17:30:29 2018: Debug: EXPAND %{8}
  245. (1) Thu May 24 17:30:29 2018: Debug: -->
  246. (1) Thu May 24 17:30:29 2018: Debug: if ("%{8}") -> FALSE
  247. (1) Thu May 24 17:30:29 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  248. (1) Thu May 24 17:30:29 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  249. (1) Thu May 24 17:30:29 2018: Debug: elsif (Aruba-Essid-Name) {
  250. (1) Thu May 24 17:30:29 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  251. (1) Thu May 24 17:30:29 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  252. (1) Thu May 24 17:30:29 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  253. (1) Thu May 24 17:30:29 2018: Debug: [updated] = updated
  254. (1) Thu May 24 17:30:29 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  255. (1) Thu May 24 17:30:29 2018: Debug: ... skipping else: Preceding "if" was taken
  256. (1) Thu May 24 17:30:29 2018: Debug: } # policy rewrite_called_station_id = updated
  257. (1) Thu May 24 17:30:29 2018: Debug: policy filter_username {
  258. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name) {
  259. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name) -> TRUE
  260. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name) {
  261. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ / /) {
  262. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ / /) -> FALSE
  263. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  264. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  265. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.\./ ) {
  266. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  267. (1) Thu May 24 17:30:29 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  268. (1) Thu May 24 17:30:29 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  269. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.$/) {
  270. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  271. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@\./) {
  272. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  273. (1) Thu May 24 17:30:29 2018: Debug: } # if (&User-Name) = updated
  274. (1) Thu May 24 17:30:29 2018: Debug: } # policy filter_username = updated
  275. (1) Thu May 24 17:30:29 2018: Debug: policy filter_password {
  276. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  277. (1) Thu May 24 17:30:29 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  278. (1) Thu May 24 17:30:29 2018: Debug: } # policy filter_password = updated
  279. (1) Thu May 24 17:30:29 2018: Debug: [preprocess] = ok
  280. (1) Thu May 24 17:30:29 2018: Debug: suffix: Checking for suffix after "@"
  281. (1) Thu May 24 17:30:29 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  282. (1) Thu May 24 17:30:29 2018: Debug: [suffix] = noop
  283. (1) Thu May 24 17:30:29 2018: Debug: ntdomain: Checking for prefix before "\"
  284. (1) Thu May 24 17:30:29 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  285. (1) Thu May 24 17:30:29 2018: Debug: ntdomain: Found realm "null"
  286. (1) Thu May 24 17:30:29 2018: Debug: ntdomain: Adding Realm = "null"
  287. (1) Thu May 24 17:30:29 2018: Debug: ntdomain: Authentication realm is LOCAL
  288. (1) Thu May 24 17:30:29 2018: Debug: [ntdomain] = ok
  289. (1) Thu May 24 17:30:29 2018: Debug: eap: Peer sent EAP Response (code 2) ID 2 length 166
  290. (1) Thu May 24 17:30:29 2018: Debug: eap: Continuing tunnel setup
  291. (1) Thu May 24 17:30:29 2018: Debug: [eap] = ok
  292. (1) Thu May 24 17:30:29 2018: Debug: } # authorize = ok
  293. (1) Thu May 24 17:30:29 2018: Debug: Found Auth-Type = eap
  294. (1) Thu May 24 17:30:29 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  295. (1) Thu May 24 17:30:29 2018: Debug: authenticate {
  296. (1) Thu May 24 17:30:29 2018: Debug: eap: Expiring EAP session with state 0x49c411c249c6082f
  297. (1) Thu May 24 17:30:29 2018: Debug: eap: Finished EAP session with state 0x49c411c249c6082f
  298. (1) Thu May 24 17:30:29 2018: Debug: eap: Previous EAP request found for state 0x49c411c249c6082f, released from the list
  299. (1) Thu May 24 17:30:29 2018: Debug: eap: Peer sent packet with method EAP PEAP (25)
  300. (1) Thu May 24 17:30:29 2018: Debug: eap: Calling submodule eap_peap to process data
  301. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: Continuing EAP-TLS
  302. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: Peer indicated complete TLS record size will be 156 bytes
  303. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: Got complete TLS record (156 bytes)
  304. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: [eaptls verify] = length included
  305. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: (other): before/accept initialization
  306. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: TLS_accept: before/accept initialization
  307. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: TLS_accept: SSLv3 read client hello A
  308. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: TLS_accept: SSLv3 write server hello A
  309. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: TLS_accept: SSLv3 write certificate A
  310. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: TLS_accept: SSLv3 write key exchange A
  311. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: TLS_accept: SSLv3 write server done A
  312. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: TLS_accept: SSLv3 flush data
  313. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: TLS_accept: SSLv3 read client certificate A
  314. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: TLS_accept: Need to read more data: SSLv3 read client key exchange A
  315. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: TLS_accept: Need to read more data: SSLv3 read client key exchange A
  316. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: In SSL Handshake Phase
  317. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: In SSL Accept mode
  318. (1) Thu May 24 17:30:29 2018: Debug: eap_peap: [eaptls process] = handled
  319. (1) Thu May 24 17:30:29 2018: Debug: eap: Sending EAP Request (code 1) ID 3 length 1004
  320. (1) Thu May 24 17:30:29 2018: Debug: eap: EAP session adding &reply:State = 0x49c411c248c7082f
  321. (1) Thu May 24 17:30:29 2018: Debug: [eap] = handled
  322. (1) Thu May 24 17:30:29 2018: Debug: } # authenticate = handled
  323. (1) Thu May 24 17:30:29 2018: Debug: Using Post-Auth-Type Challenge
  324. (1) Thu May 24 17:30:29 2018: Debug: Post-Auth-Type sub-section not found. Ignoring.
  325. (1) Thu May 24 17:30:29 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  326. (1) Thu May 24 17:30:29 2018: Debug: Sent Access-Challenge Id 8 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  327. (1) Thu May 24 17:30:29 2018: Debug: EAP-Message = 0x010303ec19c000000ef11603030039020000350303b92d82b691d11d3e346c50cb14b78f557a46944605b693a7f89d9c0f431797ea00c03000000dff01000100000b0004030001021603030d530b000d4f000d4c0006723082066e30820456a00302010202131c00000069cf888ce5f58d0c7b00040000
  328. (1) Thu May 24 17:30:29 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  329. (1) Thu May 24 17:30:29 2018: Debug: State = 0x49c411c248c7082fb3b3797cce5894f4
  330. (1) Thu May 24 17:30:29 2018: Debug: Proxy-State = 0x3135
  331. (1) Thu May 24 17:30:29 2018: Debug: Finished request
  332. (2) Thu May 24 17:30:29 2018: Debug: Received Access-Request Id 98 from 172.20.5.79:52628 to 172.20.5.3:1812 length 360
  333. (2) Thu May 24 17:30:29 2018: Debug: Framed-MTU = 1480
  334. (2) Thu May 24 17:30:29 2018: Debug: NAS-IP-Address = 172.20.9.150
  335. (2) Thu May 24 17:30:29 2018: Debug: NAS-Identifier = "Test"
  336. (2) Thu May 24 17:30:29 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  337. (2) Thu May 24 17:30:29 2018: Debug: Service-Type = Framed-User
  338. (2) Thu May 24 17:30:29 2018: Debug: Framed-Protocol = PPP
  339. (2) Thu May 24 17:30:29 2018: Debug: NAS-Port = 1
  340. (2) Thu May 24 17:30:29 2018: Debug: NAS-Port-Type = Ethernet
  341. (2) Thu May 24 17:30:29 2018: Debug: NAS-Port-Id = "1"
  342. (2) Thu May 24 17:30:29 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  343. (2) Thu May 24 17:30:29 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  344. (2) Thu May 24 17:30:29 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  345. (2) Thu May 24 17:30:29 2018: Debug: Tunnel-Type:0 = VLAN
  346. (2) Thu May 24 17:30:29 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  347. (2) Thu May 24 17:30:29 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  348. (2) Thu May 24 17:30:29 2018: Debug: State = 0x49c411c248c7082fb3b3797cce5894f4
  349. (2) Thu May 24 17:30:29 2018: Debug: EAP-Message = 0x020300061900
  350. (2) Thu May 24 17:30:29 2018: Debug: Message-Authenticator = 0xdfa0273502264dfec8a6595aeaf12f71
  351. (2) Thu May 24 17:30:29 2018: Debug: MS-RAS-Vendor = 11
  352. (2) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  353. (2) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  354. (2) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  355. (2) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  356. (2) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0138
  357. (2) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x013a
  358. (2) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0140
  359. (2) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0141
  360. (2) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0151
  361. (2) Thu May 24 17:30:29 2018: Debug: Proxy-State = 0x3136
  362. (2) Thu May 24 17:30:29 2018: Debug: session-state: No cached attributes
  363. (2) Thu May 24 17:30:29 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  364. (2) Thu May 24 17:30:29 2018: Debug: authorize {
  365. (2) Thu May 24 17:30:29 2018: Debug: update {
  366. (2) Thu May 24 17:30:29 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  367. (2) Thu May 24 17:30:29 2018: Debug: --> 172.20.5.79
  368. (2) Thu May 24 17:30:29 2018: Debug: EXPAND %l
  369. (2) Thu May 24 17:30:29 2018: Debug: --> 1527175829
  370. (2) Thu May 24 17:30:29 2018: Debug: } # update = noop
  371. (2) Thu May 24 17:30:29 2018: Debug: policy packetfence-set-tenant-id {
  372. (2) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  373. (2) Thu May 24 17:30:29 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  374. (2) Thu May 24 17:30:29 2018: Debug: --> 0
  375. (2) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  376. (2) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  377. (2) Thu May 24 17:30:29 2018: Debug: update control {
  378. (2) Thu May 24 17:30:29 2018: Debug: EXPAND %{User-Name}
  379. (2) Thu May 24 17:30:29 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  380. (2) Thu May 24 17:30:29 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  381. (2) Thu May 24 17:30:29 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  382. (2) Thu May 24 17:30:29 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  383. (2) Thu May 24 17:30:29 2018: Debug: --> 0
  384. (2) Thu May 24 17:30:29 2018: Debug: } # update control = noop
  385. (2) Thu May 24 17:30:29 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  386. (2) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  387. (2) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  388. (2) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  389. (2) Thu May 24 17:30:29 2018: Debug: update control {
  390. (2) Thu May 24 17:30:29 2018: Debug: EXPAND %{User-Name}
  391. (2) Thu May 24 17:30:29 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  392. (2) Thu May 24 17:30:29 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  393. (2) Thu May 24 17:30:29 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  394. (2) Thu May 24 17:30:29 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  395. (2) Thu May 24 17:30:29 2018: Debug: --> 1
  396. (2) Thu May 24 17:30:29 2018: Debug: } # update control = noop
  397. (2) Thu May 24 17:30:29 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  398. (2) Thu May 24 17:30:29 2018: Debug: } # policy packetfence-set-tenant-id = noop
  399. (2) Thu May 24 17:30:29 2018: Debug: policy rewrite_calling_station_id {
  400. (2) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  401. (2) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  402. (2) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  403. (2) Thu May 24 17:30:29 2018: Debug: update request {
  404. (2) Thu May 24 17:30:29 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  405. (2) Thu May 24 17:30:29 2018: Debug: --> 00:e0:4c:60:43:20
  406. (2) Thu May 24 17:30:29 2018: Debug: } # update request = noop
  407. (2) Thu May 24 17:30:29 2018: Debug: [updated] = updated
  408. (2) Thu May 24 17:30:29 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  409. (2) Thu May 24 17:30:29 2018: Debug: ... skipping else: Preceding "if" was taken
  410. (2) Thu May 24 17:30:29 2018: Debug: } # policy rewrite_calling_station_id = updated
  411. (2) Thu May 24 17:30:29 2018: Debug: policy rewrite_called_station_id {
  412. (2) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  413. (2) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  414. (2) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  415. (2) Thu May 24 17:30:29 2018: Debug: update request {
  416. (2) Thu May 24 17:30:29 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  417. (2) Thu May 24 17:30:29 2018: Debug: --> 94:18:82:b9:32:80
  418. (2) Thu May 24 17:30:29 2018: Debug: } # update request = noop
  419. (2) Thu May 24 17:30:29 2018: Debug: if ("%{8}") {
  420. (2) Thu May 24 17:30:29 2018: Debug: EXPAND %{8}
  421. (2) Thu May 24 17:30:29 2018: Debug: -->
  422. (2) Thu May 24 17:30:29 2018: Debug: if ("%{8}") -> FALSE
  423. (2) Thu May 24 17:30:29 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  424. (2) Thu May 24 17:30:29 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  425. (2) Thu May 24 17:30:29 2018: Debug: elsif (Aruba-Essid-Name) {
  426. (2) Thu May 24 17:30:29 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  427. (2) Thu May 24 17:30:29 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  428. (2) Thu May 24 17:30:29 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  429. (2) Thu May 24 17:30:29 2018: Debug: [updated] = updated
  430. (2) Thu May 24 17:30:29 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  431. (2) Thu May 24 17:30:29 2018: Debug: ... skipping else: Preceding "if" was taken
  432. (2) Thu May 24 17:30:29 2018: Debug: } # policy rewrite_called_station_id = updated
  433. (2) Thu May 24 17:30:29 2018: Debug: policy filter_username {
  434. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name) {
  435. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name) -> TRUE
  436. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name) {
  437. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ / /) {
  438. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ / /) -> FALSE
  439. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  440. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  441. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.\./ ) {
  442. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  443. (2) Thu May 24 17:30:29 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  444. (2) Thu May 24 17:30:29 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  445. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.$/) {
  446. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  447. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@\./) {
  448. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  449. (2) Thu May 24 17:30:29 2018: Debug: } # if (&User-Name) = updated
  450. (2) Thu May 24 17:30:29 2018: Debug: } # policy filter_username = updated
  451. (2) Thu May 24 17:30:29 2018: Debug: policy filter_password {
  452. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  453. (2) Thu May 24 17:30:29 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  454. (2) Thu May 24 17:30:29 2018: Debug: } # policy filter_password = updated
  455. (2) Thu May 24 17:30:29 2018: Debug: [preprocess] = ok
  456. (2) Thu May 24 17:30:29 2018: Debug: suffix: Checking for suffix after "@"
  457. (2) Thu May 24 17:30:29 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  458. (2) Thu May 24 17:30:29 2018: Debug: [suffix] = noop
  459. (2) Thu May 24 17:30:29 2018: Debug: ntdomain: Checking for prefix before "\"
  460. (2) Thu May 24 17:30:29 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  461. (2) Thu May 24 17:30:29 2018: Debug: ntdomain: Found realm "null"
  462. (2) Thu May 24 17:30:29 2018: Debug: ntdomain: Adding Realm = "null"
  463. (2) Thu May 24 17:30:29 2018: Debug: ntdomain: Authentication realm is LOCAL
  464. (2) Thu May 24 17:30:29 2018: Debug: [ntdomain] = ok
  465. (2) Thu May 24 17:30:29 2018: Debug: eap: Peer sent EAP Response (code 2) ID 3 length 6
  466. (2) Thu May 24 17:30:29 2018: Debug: eap: Continuing tunnel setup
  467. (2) Thu May 24 17:30:29 2018: Debug: [eap] = ok
  468. (2) Thu May 24 17:30:29 2018: Debug: } # authorize = ok
  469. (2) Thu May 24 17:30:29 2018: Debug: Found Auth-Type = eap
  470. (2) Thu May 24 17:30:29 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  471. (2) Thu May 24 17:30:29 2018: Debug: authenticate {
  472. (2) Thu May 24 17:30:29 2018: Debug: eap: Expiring EAP session with state 0x49c411c248c7082f
  473. (2) Thu May 24 17:30:29 2018: Debug: eap: Finished EAP session with state 0x49c411c248c7082f
  474. (2) Thu May 24 17:30:29 2018: Debug: eap: Previous EAP request found for state 0x49c411c248c7082f, released from the list
  475. (2) Thu May 24 17:30:29 2018: Debug: eap: Peer sent packet with method EAP PEAP (25)
  476. (2) Thu May 24 17:30:29 2018: Debug: eap: Calling submodule eap_peap to process data
  477. (2) Thu May 24 17:30:29 2018: Debug: eap_peap: Continuing EAP-TLS
  478. (2) Thu May 24 17:30:29 2018: Debug: eap_peap: Peer ACKed our handshake fragment
  479. (2) Thu May 24 17:30:29 2018: Debug: eap_peap: [eaptls verify] = request
  480. (2) Thu May 24 17:30:29 2018: Debug: eap_peap: [eaptls process] = handled
  481. (2) Thu May 24 17:30:29 2018: Debug: eap: Sending EAP Request (code 1) ID 4 length 1000
  482. (2) Thu May 24 17:30:29 2018: Debug: eap: EAP session adding &reply:State = 0x49c411c24bc0082f
  483. (2) Thu May 24 17:30:29 2018: Debug: [eap] = handled
  484. (2) Thu May 24 17:30:29 2018: Debug: } # authenticate = handled
  485. (2) Thu May 24 17:30:29 2018: Debug: Using Post-Auth-Type Challenge
  486. (2) Thu May 24 17:30:29 2018: Debug: Post-Auth-Type sub-section not found. Ignoring.
  487. (2) Thu May 24 17:30:29 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  488. (2) Thu May 24 17:30:29 2018: Debug: Sent Access-Challenge Id 98 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  489. (2) Thu May 24 17:30:29 2018: Debug: EAP-Message = 0x010403e81940412c434e3d5075626c69632532304b657925323053657276696365732c434e3d53657276696365732c434e3d436f6e66696775726174696f6e2c44433d504552534f4e414c414d542c44433d44453f634143657274696669636174653f626173653f6f626a656374436c6173733d636572
  490. (2) Thu May 24 17:30:29 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  491. (2) Thu May 24 17:30:29 2018: Debug: State = 0x49c411c24bc0082fb3b3797cce5894f4
  492. (2) Thu May 24 17:30:29 2018: Debug: Proxy-State = 0x3136
  493. (2) Thu May 24 17:30:29 2018: Debug: Finished request
  494. (3) Thu May 24 17:30:29 2018: Debug: Received Access-Request Id 46 from 172.20.5.79:52628 to 172.20.5.3:1812 length 360
  495. (3) Thu May 24 17:30:29 2018: Debug: Framed-MTU = 1480
  496. (3) Thu May 24 17:30:29 2018: Debug: NAS-IP-Address = 172.20.9.150
  497. (3) Thu May 24 17:30:29 2018: Debug: NAS-Identifier = "Test"
  498. (3) Thu May 24 17:30:29 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  499. (3) Thu May 24 17:30:29 2018: Debug: Service-Type = Framed-User
  500. (3) Thu May 24 17:30:29 2018: Debug: Framed-Protocol = PPP
  501. (3) Thu May 24 17:30:29 2018: Debug: NAS-Port = 1
  502. (3) Thu May 24 17:30:29 2018: Debug: NAS-Port-Type = Ethernet
  503. (3) Thu May 24 17:30:29 2018: Debug: NAS-Port-Id = "1"
  504. (3) Thu May 24 17:30:29 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  505. (3) Thu May 24 17:30:29 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  506. (3) Thu May 24 17:30:29 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  507. (3) Thu May 24 17:30:29 2018: Debug: Tunnel-Type:0 = VLAN
  508. (3) Thu May 24 17:30:29 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  509. (3) Thu May 24 17:30:29 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  510. (3) Thu May 24 17:30:29 2018: Debug: State = 0x49c411c24bc0082fb3b3797cce5894f4
  511. (3) Thu May 24 17:30:29 2018: Debug: EAP-Message = 0x020400061900
  512. (3) Thu May 24 17:30:29 2018: Debug: Message-Authenticator = 0x5b12c3df57f3f0f4904afac48a2d58c9
  513. (3) Thu May 24 17:30:29 2018: Debug: MS-RAS-Vendor = 11
  514. (3) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  515. (3) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  516. (3) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  517. (3) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  518. (3) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0138
  519. (3) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x013a
  520. (3) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0140
  521. (3) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0141
  522. (3) Thu May 24 17:30:29 2018: Debug: HP-Capability-Advert = 0x0151
  523. (3) Thu May 24 17:30:29 2018: Debug: Proxy-State = 0x3137
  524. (3) Thu May 24 17:30:29 2018: Debug: session-state: No cached attributes
  525. (3) Thu May 24 17:30:29 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  526. (3) Thu May 24 17:30:29 2018: Debug: authorize {
  527. (3) Thu May 24 17:30:29 2018: Debug: update {
  528. (3) Thu May 24 17:30:29 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  529. (3) Thu May 24 17:30:29 2018: Debug: --> 172.20.5.79
  530. (3) Thu May 24 17:30:29 2018: Debug: EXPAND %l
  531. (3) Thu May 24 17:30:29 2018: Debug: --> 1527175829
  532. (3) Thu May 24 17:30:29 2018: Debug: } # update = noop
  533. (3) Thu May 24 17:30:29 2018: Debug: policy packetfence-set-tenant-id {
  534. (3) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  535. (3) Thu May 24 17:30:29 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  536. (3) Thu May 24 17:30:29 2018: Debug: --> 0
  537. (3) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  538. (3) Thu May 24 17:30:29 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  539. (3) Thu May 24 17:30:29 2018: Debug: update control {
  540. (3) Thu May 24 17:30:29 2018: Debug: EXPAND %{User-Name}
  541. (3) Thu May 24 17:30:29 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  542. (3) Thu May 24 17:30:29 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  543. (3) Thu May 24 17:30:29 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  544. (3) Thu May 24 17:30:29 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  545. (3) Thu May 24 17:30:29 2018: Debug: --> 0
  546. (3) Thu May 24 17:30:29 2018: Debug: } # update control = noop
  547. (3) Thu May 24 17:30:29 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  548. (3) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  549. (3) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  550. (3) Thu May 24 17:30:29 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  551. (3) Thu May 24 17:30:29 2018: Debug: update control {
  552. (3) Thu May 24 17:30:29 2018: Debug: EXPAND %{User-Name}
  553. (3) Thu May 24 17:30:29 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  554. (3) Thu May 24 17:30:29 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  555. (3) Thu May 24 17:30:29 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  556. (3) Thu May 24 17:30:29 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  557. (3) Thu May 24 17:30:29 2018: Debug: --> 1
  558. (3) Thu May 24 17:30:29 2018: Debug: } # update control = noop
  559. (3) Thu May 24 17:30:29 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  560. (3) Thu May 24 17:30:29 2018: Debug: } # policy packetfence-set-tenant-id = noop
  561. (3) Thu May 24 17:30:29 2018: Debug: policy rewrite_calling_station_id {
  562. (3) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  563. (3) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  564. (3) Thu May 24 17:30:29 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  565. (3) Thu May 24 17:30:29 2018: Debug: update request {
  566. (3) Thu May 24 17:30:29 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  567. (3) Thu May 24 17:30:29 2018: Debug: --> 00:e0:4c:60:43:20
  568. (3) Thu May 24 17:30:29 2018: Debug: } # update request = noop
  569. (3) Thu May 24 17:30:29 2018: Debug: [updated] = updated
  570. (3) Thu May 24 17:30:29 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  571. (3) Thu May 24 17:30:29 2018: Debug: ... skipping else: Preceding "if" was taken
  572. (3) Thu May 24 17:30:29 2018: Debug: } # policy rewrite_calling_station_id = updated
  573. (3) Thu May 24 17:30:29 2018: Debug: policy rewrite_called_station_id {
  574. (3) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  575. (3) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  576. (3) Thu May 24 17:30:29 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  577. (3) Thu May 24 17:30:29 2018: Debug: update request {
  578. (3) Thu May 24 17:30:29 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  579. (3) Thu May 24 17:30:29 2018: Debug: --> 94:18:82:b9:32:80
  580. (3) Thu May 24 17:30:29 2018: Debug: } # update request = noop
  581. (3) Thu May 24 17:30:29 2018: Debug: if ("%{8}") {
  582. (3) Thu May 24 17:30:29 2018: Debug: EXPAND %{8}
  583. (3) Thu May 24 17:30:29 2018: Debug: -->
  584. (3) Thu May 24 17:30:29 2018: Debug: if ("%{8}") -> FALSE
  585. (3) Thu May 24 17:30:29 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  586. (3) Thu May 24 17:30:29 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  587. (3) Thu May 24 17:30:29 2018: Debug: elsif (Aruba-Essid-Name) {
  588. (3) Thu May 24 17:30:29 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  589. (3) Thu May 24 17:30:29 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  590. (3) Thu May 24 17:30:29 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  591. (3) Thu May 24 17:30:29 2018: Debug: [updated] = updated
  592. (3) Thu May 24 17:30:29 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  593. (3) Thu May 24 17:30:29 2018: Debug: ... skipping else: Preceding "if" was taken
  594. (3) Thu May 24 17:30:29 2018: Debug: } # policy rewrite_called_station_id = updated
  595. (3) Thu May 24 17:30:29 2018: Debug: policy filter_username {
  596. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name) {
  597. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name) -> TRUE
  598. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name) {
  599. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ / /) {
  600. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ / /) -> FALSE
  601. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  602. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  603. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.\./ ) {
  604. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  605. (3) Thu May 24 17:30:29 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  606. (3) Thu May 24 17:30:29 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  607. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.$/) {
  608. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  609. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@\./) {
  610. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  611. (3) Thu May 24 17:30:29 2018: Debug: } # if (&User-Name) = updated
  612. (3) Thu May 24 17:30:29 2018: Debug: } # policy filter_username = updated
  613. (3) Thu May 24 17:30:29 2018: Debug: policy filter_password {
  614. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  615. (3) Thu May 24 17:30:29 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  616. (3) Thu May 24 17:30:29 2018: Debug: } # policy filter_password = updated
  617. (3) Thu May 24 17:30:29 2018: Debug: [preprocess] = ok
  618. (3) Thu May 24 17:30:29 2018: Debug: suffix: Checking for suffix after "@"
  619. (3) Thu May 24 17:30:29 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  620. (3) Thu May 24 17:30:29 2018: Debug: [suffix] = noop
  621. (3) Thu May 24 17:30:29 2018: Debug: ntdomain: Checking for prefix before "\"
  622. (3) Thu May 24 17:30:29 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  623. (3) Thu May 24 17:30:29 2018: Debug: ntdomain: Found realm "null"
  624. (3) Thu May 24 17:30:29 2018: Debug: ntdomain: Adding Realm = "null"
  625. (3) Thu May 24 17:30:29 2018: Debug: ntdomain: Authentication realm is LOCAL
  626. (3) Thu May 24 17:30:29 2018: Debug: [ntdomain] = ok
  627. (3) Thu May 24 17:30:29 2018: Debug: eap: Peer sent EAP Response (code 2) ID 4 length 6
  628. (3) Thu May 24 17:30:29 2018: Debug: eap: Continuing tunnel setup
  629. (3) Thu May 24 17:30:29 2018: Debug: [eap] = ok
  630. (3) Thu May 24 17:30:29 2018: Debug: } # authorize = ok
  631. (3) Thu May 24 17:30:29 2018: Debug: Found Auth-Type = eap
  632. (3) Thu May 24 17:30:29 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  633. (3) Thu May 24 17:30:29 2018: Debug: authenticate {
  634. (3) Thu May 24 17:30:29 2018: Debug: eap: Expiring EAP session with state 0x49c411c24bc0082f
  635. (3) Thu May 24 17:30:29 2018: Debug: eap: Finished EAP session with state 0x49c411c24bc0082f
  636. (3) Thu May 24 17:30:29 2018: Debug: eap: Previous EAP request found for state 0x49c411c24bc0082f, released from the list
  637. (3) Thu May 24 17:30:29 2018: Debug: eap: Peer sent packet with method EAP PEAP (25)
  638. (3) Thu May 24 17:30:29 2018: Debug: eap: Calling submodule eap_peap to process data
  639. (3) Thu May 24 17:30:29 2018: Debug: eap_peap: Continuing EAP-TLS
  640. (3) Thu May 24 17:30:29 2018: Debug: eap_peap: Peer ACKed our handshake fragment
  641. (3) Thu May 24 17:30:29 2018: Debug: eap_peap: [eaptls verify] = request
  642. (3) Thu May 24 17:30:29 2018: Debug: eap_peap: [eaptls process] = handled
  643. (3) Thu May 24 17:30:29 2018: Debug: eap: Sending EAP Request (code 1) ID 5 length 1000
  644. (3) Thu May 24 17:30:29 2018: Debug: eap: EAP session adding &reply:State = 0x49c411c24ac1082f
  645. (3) Thu May 24 17:30:29 2018: Debug: [eap] = handled
  646. (3) Thu May 24 17:30:29 2018: Debug: } # authenticate = handled
  647. (3) Thu May 24 17:30:29 2018: Debug: Using Post-Auth-Type Challenge
  648. (3) Thu May 24 17:30:29 2018: Debug: Post-Auth-Type sub-section not found. Ignoring.
  649. (3) Thu May 24 17:30:29 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  650. (3) Thu May 24 17:30:29 2018: Debug: Sent Access-Challenge Id 46 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  651. (3) Thu May 24 17:30:29 2018: Debug: EAP-Message = 0x010503e81940857fb02e359be06bba356a6ddeee561f174e4574ba18734e04703fe2439d7059336b92dfc9c6e4a42fd6832f045572ea2bd3424158f0059d1d69794f39d849cb93d4e849a9f645afc696f5c4bba51abd52c560313d10c35497a721d195168c4b97c7b87a40e8ebcf2d761663cdaccc0cb8
  652. (3) Thu May 24 17:30:29 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  653. (3) Thu May 24 17:30:29 2018: Debug: State = 0x49c411c24ac1082fb3b3797cce5894f4
  654. (3) Thu May 24 17:30:29 2018: Debug: Proxy-State = 0x3137
  655. (3) Thu May 24 17:30:29 2018: Debug: Finished request
  656. (4) Thu May 24 17:30:30 2018: Debug: Received Access-Request Id 200 from 172.20.5.79:52628 to 172.20.5.3:1812 length 360
  657. (4) Thu May 24 17:30:30 2018: Debug: Framed-MTU = 1480
  658. (4) Thu May 24 17:30:30 2018: Debug: NAS-IP-Address = 172.20.9.150
  659. (4) Thu May 24 17:30:30 2018: Debug: NAS-Identifier = "Test"
  660. (4) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  661. (4) Thu May 24 17:30:30 2018: Debug: Service-Type = Framed-User
  662. (4) Thu May 24 17:30:30 2018: Debug: Framed-Protocol = PPP
  663. (4) Thu May 24 17:30:30 2018: Debug: NAS-Port = 1
  664. (4) Thu May 24 17:30:30 2018: Debug: NAS-Port-Type = Ethernet
  665. (4) Thu May 24 17:30:30 2018: Debug: NAS-Port-Id = "1"
  666. (4) Thu May 24 17:30:30 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  667. (4) Thu May 24 17:30:30 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  668. (4) Thu May 24 17:30:30 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  669. (4) Thu May 24 17:30:30 2018: Debug: Tunnel-Type:0 = VLAN
  670. (4) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  671. (4) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  672. (4) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c24ac1082fb3b3797cce5894f4
  673. (4) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x020500061900
  674. (4) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0xe4777662f43f9f986461b2fe572c90c2
  675. (4) Thu May 24 17:30:30 2018: Debug: MS-RAS-Vendor = 11
  676. (4) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  677. (4) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  678. (4) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  679. (4) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  680. (4) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0138
  681. (4) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x013a
  682. (4) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0140
  683. (4) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0141
  684. (4) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0151
  685. (4) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3138
  686. (4) Thu May 24 17:30:30 2018: Debug: session-state: No cached attributes
  687. (4) Thu May 24 17:30:30 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  688. (4) Thu May 24 17:30:30 2018: Debug: authorize {
  689. (4) Thu May 24 17:30:30 2018: Debug: update {
  690. (4) Thu May 24 17:30:30 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  691. (4) Thu May 24 17:30:30 2018: Debug: --> 172.20.5.79
  692. (4) Thu May 24 17:30:30 2018: Debug: EXPAND %l
  693. (4) Thu May 24 17:30:30 2018: Debug: --> 1527175830
  694. (4) Thu May 24 17:30:30 2018: Debug: } # update = noop
  695. (4) Thu May 24 17:30:30 2018: Debug: policy packetfence-set-tenant-id {
  696. (4) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  697. (4) Thu May 24 17:30:30 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  698. (4) Thu May 24 17:30:30 2018: Debug: --> 0
  699. (4) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  700. (4) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  701. (4) Thu May 24 17:30:30 2018: Debug: update control {
  702. (4) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  703. (4) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  704. (4) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  705. (4) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  706. (4) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  707. (4) Thu May 24 17:30:30 2018: Debug: --> 0
  708. (4) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  709. (4) Thu May 24 17:30:30 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  710. (4) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  711. (4) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  712. (4) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  713. (4) Thu May 24 17:30:30 2018: Debug: update control {
  714. (4) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  715. (4) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  716. (4) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  717. (4) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  718. (4) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  719. (4) Thu May 24 17:30:30 2018: Debug: --> 1
  720. (4) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  721. (4) Thu May 24 17:30:30 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  722. (4) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-set-tenant-id = noop
  723. (4) Thu May 24 17:30:30 2018: Debug: policy rewrite_calling_station_id {
  724. (4) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  725. (4) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  726. (4) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  727. (4) Thu May 24 17:30:30 2018: Debug: update request {
  728. (4) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  729. (4) Thu May 24 17:30:30 2018: Debug: --> 00:e0:4c:60:43:20
  730. (4) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  731. (4) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  732. (4) Thu May 24 17:30:30 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  733. (4) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  734. (4) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_calling_station_id = updated
  735. (4) Thu May 24 17:30:30 2018: Debug: policy rewrite_called_station_id {
  736. (4) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  737. (4) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  738. (4) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  739. (4) Thu May 24 17:30:30 2018: Debug: update request {
  740. (4) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  741. (4) Thu May 24 17:30:30 2018: Debug: --> 94:18:82:b9:32:80
  742. (4) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  743. (4) Thu May 24 17:30:30 2018: Debug: if ("%{8}") {
  744. (4) Thu May 24 17:30:30 2018: Debug: EXPAND %{8}
  745. (4) Thu May 24 17:30:30 2018: Debug: -->
  746. (4) Thu May 24 17:30:30 2018: Debug: if ("%{8}") -> FALSE
  747. (4) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  748. (4) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  749. (4) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) {
  750. (4) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  751. (4) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  752. (4) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  753. (4) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  754. (4) Thu May 24 17:30:30 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  755. (4) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  756. (4) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_called_station_id = updated
  757. (4) Thu May 24 17:30:30 2018: Debug: policy filter_username {
  758. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  759. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name) -> TRUE
  760. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  761. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) {
  762. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) -> FALSE
  763. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  764. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  765. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) {
  766. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  767. (4) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  768. (4) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  769. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) {
  770. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  771. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) {
  772. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  773. (4) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name) = updated
  774. (4) Thu May 24 17:30:30 2018: Debug: } # policy filter_username = updated
  775. (4) Thu May 24 17:30:30 2018: Debug: policy filter_password {
  776. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  777. (4) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  778. (4) Thu May 24 17:30:30 2018: Debug: } # policy filter_password = updated
  779. (4) Thu May 24 17:30:30 2018: Debug: [preprocess] = ok
  780. (4) Thu May 24 17:30:30 2018: Debug: suffix: Checking for suffix after "@"
  781. (4) Thu May 24 17:30:30 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  782. (4) Thu May 24 17:30:30 2018: Debug: [suffix] = noop
  783. (4) Thu May 24 17:30:30 2018: Debug: ntdomain: Checking for prefix before "\"
  784. (4) Thu May 24 17:30:30 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  785. (4) Thu May 24 17:30:30 2018: Debug: ntdomain: Found realm "null"
  786. (4) Thu May 24 17:30:30 2018: Debug: ntdomain: Adding Realm = "null"
  787. (4) Thu May 24 17:30:30 2018: Debug: ntdomain: Authentication realm is LOCAL
  788. (4) Thu May 24 17:30:30 2018: Debug: [ntdomain] = ok
  789. (4) Thu May 24 17:30:30 2018: Debug: eap: Peer sent EAP Response (code 2) ID 5 length 6
  790. (4) Thu May 24 17:30:30 2018: Debug: eap: Continuing tunnel setup
  791. (4) Thu May 24 17:30:30 2018: Debug: [eap] = ok
  792. (4) Thu May 24 17:30:30 2018: Debug: } # authorize = ok
  793. (4) Thu May 24 17:30:30 2018: Debug: Found Auth-Type = eap
  794. (4) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  795. (4) Thu May 24 17:30:30 2018: Debug: authenticate {
  796. (4) Thu May 24 17:30:30 2018: Debug: eap: Expiring EAP session with state 0x49c411c24ac1082f
  797. (4) Thu May 24 17:30:30 2018: Debug: eap: Finished EAP session with state 0x49c411c24ac1082f
  798. (4) Thu May 24 17:30:30 2018: Debug: eap: Previous EAP request found for state 0x49c411c24ac1082f, released from the list
  799. (4) Thu May 24 17:30:30 2018: Debug: eap: Peer sent packet with method EAP PEAP (25)
  800. (4) Thu May 24 17:30:30 2018: Debug: eap: Calling submodule eap_peap to process data
  801. (4) Thu May 24 17:30:30 2018: Debug: eap_peap: Continuing EAP-TLS
  802. (4) Thu May 24 17:30:30 2018: Debug: eap_peap: Peer ACKed our handshake fragment
  803. (4) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls verify] = request
  804. (4) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls process] = handled
  805. (4) Thu May 24 17:30:30 2018: Debug: eap: Sending EAP Request (code 1) ID 6 length 849
  806. (4) Thu May 24 17:30:30 2018: Debug: eap: EAP session adding &reply:State = 0x49c411c24dc2082f
  807. (4) Thu May 24 17:30:30 2018: Debug: [eap] = handled
  808. (4) Thu May 24 17:30:30 2018: Debug: } # authenticate = handled
  809. (4) Thu May 24 17:30:30 2018: Debug: Using Post-Auth-Type Challenge
  810. (4) Thu May 24 17:30:30 2018: Debug: Post-Auth-Type sub-section not found. Ignoring.
  811. (4) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  812. (4) Thu May 24 17:30:30 2018: Debug: Sent Access-Challenge Id 200 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  813. (4) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x010603511900a5c818e32bb9ae33a322fd61cd5755b68853dd9ccbb6d3a16fb3a4128bea0fbf2c9703ed5d8543d0274ae47cbfb3a9350eca86224e212354d0f5757d95c75c3604b636f7def58ee79640d07a8e92d6d283cfe481f5ab13dd5e2b69a7d3fef209d339cab685bdb44726bfafa18faa078d07
  814. (4) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  815. (4) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c24dc2082fb3b3797cce5894f4
  816. (4) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3138
  817. (4) Thu May 24 17:30:30 2018: Debug: Finished request
  818. (5) Thu May 24 17:30:30 2018: Debug: Received Access-Request Id 58 from 172.20.5.79:52628 to 172.20.5.3:1812 length 490
  819. (5) Thu May 24 17:30:30 2018: Debug: Framed-MTU = 1480
  820. (5) Thu May 24 17:30:30 2018: Debug: NAS-IP-Address = 172.20.9.150
  821. (5) Thu May 24 17:30:30 2018: Debug: NAS-Identifier = "Test"
  822. (5) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  823. (5) Thu May 24 17:30:30 2018: Debug: Service-Type = Framed-User
  824. (5) Thu May 24 17:30:30 2018: Debug: Framed-Protocol = PPP
  825. (5) Thu May 24 17:30:30 2018: Debug: NAS-Port = 1
  826. (5) Thu May 24 17:30:30 2018: Debug: NAS-Port-Type = Ethernet
  827. (5) Thu May 24 17:30:30 2018: Debug: NAS-Port-Id = "1"
  828. (5) Thu May 24 17:30:30 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  829. (5) Thu May 24 17:30:30 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  830. (5) Thu May 24 17:30:30 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  831. (5) Thu May 24 17:30:30 2018: Debug: Tunnel-Type:0 = VLAN
  832. (5) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  833. (5) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  834. (5) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c24dc2082fb3b3797cce5894f4
  835. (5) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x0206008819800000007e1603030046100000424104ce352eced3447730353b40337d70531fcfbe117630605c68bb0487e0eb71ecd5596dd1ef415501a624645f16c29017567c0c86fc963eb5177fa9489f05bbe26414030300010116030300280000000000000000e4c6ec892ed54c3945a18cf995cee9
  836. (5) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x863c0f59d9f13c57e96a1cd8812c2d54
  837. (5) Thu May 24 17:30:30 2018: Debug: MS-RAS-Vendor = 11
  838. (5) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  839. (5) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  840. (5) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  841. (5) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  842. (5) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0138
  843. (5) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x013a
  844. (5) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0140
  845. (5) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0141
  846. (5) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0151
  847. (5) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3139
  848. (5) Thu May 24 17:30:30 2018: Debug: session-state: No cached attributes
  849. (5) Thu May 24 17:30:30 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  850. (5) Thu May 24 17:30:30 2018: Debug: authorize {
  851. (5) Thu May 24 17:30:30 2018: Debug: update {
  852. (5) Thu May 24 17:30:30 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  853. (5) Thu May 24 17:30:30 2018: Debug: --> 172.20.5.79
  854. (5) Thu May 24 17:30:30 2018: Debug: EXPAND %l
  855. (5) Thu May 24 17:30:30 2018: Debug: --> 1527175830
  856. (5) Thu May 24 17:30:30 2018: Debug: } # update = noop
  857. (5) Thu May 24 17:30:30 2018: Debug: policy packetfence-set-tenant-id {
  858. (5) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  859. (5) Thu May 24 17:30:30 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  860. (5) Thu May 24 17:30:30 2018: Debug: --> 0
  861. (5) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  862. (5) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  863. (5) Thu May 24 17:30:30 2018: Debug: update control {
  864. (5) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  865. (5) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  866. (5) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  867. (5) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  868. (5) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  869. (5) Thu May 24 17:30:30 2018: Debug: --> 0
  870. (5) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  871. (5) Thu May 24 17:30:30 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  872. (5) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  873. (5) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  874. (5) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  875. (5) Thu May 24 17:30:30 2018: Debug: update control {
  876. (5) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  877. (5) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  878. (5) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  879. (5) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  880. (5) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  881. (5) Thu May 24 17:30:30 2018: Debug: --> 1
  882. (5) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  883. (5) Thu May 24 17:30:30 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  884. (5) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-set-tenant-id = noop
  885. (5) Thu May 24 17:30:30 2018: Debug: policy rewrite_calling_station_id {
  886. (5) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  887. (5) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  888. (5) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  889. (5) Thu May 24 17:30:30 2018: Debug: update request {
  890. (5) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  891. (5) Thu May 24 17:30:30 2018: Debug: --> 00:e0:4c:60:43:20
  892. (5) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  893. (5) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  894. (5) Thu May 24 17:30:30 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  895. (5) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  896. (5) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_calling_station_id = updated
  897. (5) Thu May 24 17:30:30 2018: Debug: policy rewrite_called_station_id {
  898. (5) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  899. (5) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  900. (5) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  901. (5) Thu May 24 17:30:30 2018: Debug: update request {
  902. (5) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  903. (5) Thu May 24 17:30:30 2018: Debug: --> 94:18:82:b9:32:80
  904. (5) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  905. (5) Thu May 24 17:30:30 2018: Debug: if ("%{8}") {
  906. (5) Thu May 24 17:30:30 2018: Debug: EXPAND %{8}
  907. (5) Thu May 24 17:30:30 2018: Debug: -->
  908. (5) Thu May 24 17:30:30 2018: Debug: if ("%{8}") -> FALSE
  909. (5) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  910. (5) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  911. (5) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) {
  912. (5) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  913. (5) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  914. (5) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  915. (5) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  916. (5) Thu May 24 17:30:30 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  917. (5) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  918. (5) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_called_station_id = updated
  919. (5) Thu May 24 17:30:30 2018: Debug: policy filter_username {
  920. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  921. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name) -> TRUE
  922. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  923. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) {
  924. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) -> FALSE
  925. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  926. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  927. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) {
  928. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  929. (5) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  930. (5) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  931. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) {
  932. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  933. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) {
  934. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  935. (5) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name) = updated
  936. (5) Thu May 24 17:30:30 2018: Debug: } # policy filter_username = updated
  937. (5) Thu May 24 17:30:30 2018: Debug: policy filter_password {
  938. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  939. (5) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  940. (5) Thu May 24 17:30:30 2018: Debug: } # policy filter_password = updated
  941. (5) Thu May 24 17:30:30 2018: Debug: [preprocess] = ok
  942. (5) Thu May 24 17:30:30 2018: Debug: suffix: Checking for suffix after "@"
  943. (5) Thu May 24 17:30:30 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  944. (5) Thu May 24 17:30:30 2018: Debug: [suffix] = noop
  945. (5) Thu May 24 17:30:30 2018: Debug: ntdomain: Checking for prefix before "\"
  946. (5) Thu May 24 17:30:30 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  947. (5) Thu May 24 17:30:30 2018: Debug: ntdomain: Found realm "null"
  948. (5) Thu May 24 17:30:30 2018: Debug: ntdomain: Adding Realm = "null"
  949. (5) Thu May 24 17:30:30 2018: Debug: ntdomain: Authentication realm is LOCAL
  950. (5) Thu May 24 17:30:30 2018: Debug: [ntdomain] = ok
  951. (5) Thu May 24 17:30:30 2018: Debug: eap: Peer sent EAP Response (code 2) ID 6 length 136
  952. (5) Thu May 24 17:30:30 2018: Debug: eap: Continuing tunnel setup
  953. (5) Thu May 24 17:30:30 2018: Debug: [eap] = ok
  954. (5) Thu May 24 17:30:30 2018: Debug: } # authorize = ok
  955. (5) Thu May 24 17:30:30 2018: Debug: Found Auth-Type = eap
  956. (5) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  957. (5) Thu May 24 17:30:30 2018: Debug: authenticate {
  958. (5) Thu May 24 17:30:30 2018: Debug: eap: Expiring EAP session with state 0x49c411c24dc2082f
  959. (5) Thu May 24 17:30:30 2018: Debug: eap: Finished EAP session with state 0x49c411c24dc2082f
  960. (5) Thu May 24 17:30:30 2018: Debug: eap: Previous EAP request found for state 0x49c411c24dc2082f, released from the list
  961. (5) Thu May 24 17:30:30 2018: Debug: eap: Peer sent packet with method EAP PEAP (25)
  962. (5) Thu May 24 17:30:30 2018: Debug: eap: Calling submodule eap_peap to process data
  963. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: Continuing EAP-TLS
  964. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: Peer indicated complete TLS record size will be 126 bytes
  965. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: Got complete TLS record (126 bytes)
  966. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls verify] = length included
  967. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: TLS_accept: SSLv3 read client key exchange A
  968. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: TLS_accept: SSLv3 read certificate verify A
  969. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: TLS_accept: SSLv3 read finished A
  970. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: TLS_accept: SSLv3 write change cipher spec A
  971. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: TLS_accept: SSLv3 write finished A
  972. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: TLS_accept: SSLv3 flush data
  973. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: (other): SSL negotiation finished successfully
  974. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: SSL Connection Established
  975. (5) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls process] = handled
  976. (5) Thu May 24 17:30:30 2018: Debug: eap: Sending EAP Request (code 1) ID 7 length 57
  977. (5) Thu May 24 17:30:30 2018: Debug: eap: EAP session adding &reply:State = 0x49c411c24cc3082f
  978. (5) Thu May 24 17:30:30 2018: Debug: [eap] = handled
  979. (5) Thu May 24 17:30:30 2018: Debug: } # authenticate = handled
  980. (5) Thu May 24 17:30:30 2018: Debug: Using Post-Auth-Type Challenge
  981. (5) Thu May 24 17:30:30 2018: Debug: Post-Auth-Type sub-section not found. Ignoring.
  982. (5) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  983. (5) Thu May 24 17:30:30 2018: Debug: Sent Access-Challenge Id 58 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  984. (5) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x0107003919001403030001011603030028c204d6dc726b81da71a67e708091ab875e0c5756c6a0bef05bcc116c35b2ad4068bbd39829055953
  985. (5) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  986. (5) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c24cc3082fb3b3797cce5894f4
  987. (5) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3139
  988. (5) Thu May 24 17:30:30 2018: Debug: Finished request
  989. (6) Thu May 24 17:30:30 2018: Debug: Received Access-Request Id 109 from 172.20.5.79:52628 to 172.20.5.3:1812 length 360
  990. (6) Thu May 24 17:30:30 2018: Debug: Framed-MTU = 1480
  991. (6) Thu May 24 17:30:30 2018: Debug: NAS-IP-Address = 172.20.9.150
  992. (6) Thu May 24 17:30:30 2018: Debug: NAS-Identifier = "Test"
  993. (6) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  994. (6) Thu May 24 17:30:30 2018: Debug: Service-Type = Framed-User
  995. (6) Thu May 24 17:30:30 2018: Debug: Framed-Protocol = PPP
  996. (6) Thu May 24 17:30:30 2018: Debug: NAS-Port = 1
  997. (6) Thu May 24 17:30:30 2018: Debug: NAS-Port-Type = Ethernet
  998. (6) Thu May 24 17:30:30 2018: Debug: NAS-Port-Id = "1"
  999. (6) Thu May 24 17:30:30 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  1000. (6) Thu May 24 17:30:30 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  1001. (6) Thu May 24 17:30:30 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  1002. (6) Thu May 24 17:30:30 2018: Debug: Tunnel-Type:0 = VLAN
  1003. (6) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  1004. (6) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  1005. (6) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c24cc3082fb3b3797cce5894f4
  1006. (6) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x020700061900
  1007. (6) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x5c999f89a3773ffa1a1be600c701a541
  1008. (6) Thu May 24 17:30:30 2018: Debug: MS-RAS-Vendor = 11
  1009. (6) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  1010. (6) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  1011. (6) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  1012. (6) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  1013. (6) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0138
  1014. (6) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x013a
  1015. (6) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0140
  1016. (6) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0141
  1017. (6) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0151
  1018. (6) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3230
  1019. (6) Thu May 24 17:30:30 2018: Debug: session-state: No cached attributes
  1020. (6) Thu May 24 17:30:30 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  1021. (6) Thu May 24 17:30:30 2018: Debug: authorize {
  1022. (6) Thu May 24 17:30:30 2018: Debug: update {
  1023. (6) Thu May 24 17:30:30 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  1024. (6) Thu May 24 17:30:30 2018: Debug: --> 172.20.5.79
  1025. (6) Thu May 24 17:30:30 2018: Debug: EXPAND %l
  1026. (6) Thu May 24 17:30:30 2018: Debug: --> 1527175830
  1027. (6) Thu May 24 17:30:30 2018: Debug: } # update = noop
  1028. (6) Thu May 24 17:30:30 2018: Debug: policy packetfence-set-tenant-id {
  1029. (6) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  1030. (6) Thu May 24 17:30:30 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  1031. (6) Thu May 24 17:30:30 2018: Debug: --> 0
  1032. (6) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  1033. (6) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  1034. (6) Thu May 24 17:30:30 2018: Debug: update control {
  1035. (6) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  1036. (6) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  1037. (6) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  1038. (6) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  1039. (6) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  1040. (6) Thu May 24 17:30:30 2018: Debug: --> 0
  1041. (6) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  1042. (6) Thu May 24 17:30:30 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  1043. (6) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  1044. (6) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  1045. (6) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  1046. (6) Thu May 24 17:30:30 2018: Debug: update control {
  1047. (6) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  1048. (6) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  1049. (6) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  1050. (6) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  1051. (6) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  1052. (6) Thu May 24 17:30:30 2018: Debug: --> 1
  1053. (6) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  1054. (6) Thu May 24 17:30:30 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  1055. (6) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-set-tenant-id = noop
  1056. (6) Thu May 24 17:30:30 2018: Debug: policy rewrite_calling_station_id {
  1057. (6) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  1058. (6) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  1059. (6) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  1060. (6) Thu May 24 17:30:30 2018: Debug: update request {
  1061. (6) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  1062. (6) Thu May 24 17:30:30 2018: Debug: --> 00:e0:4c:60:43:20
  1063. (6) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  1064. (6) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  1065. (6) Thu May 24 17:30:30 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  1066. (6) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  1067. (6) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_calling_station_id = updated
  1068. (6) Thu May 24 17:30:30 2018: Debug: policy rewrite_called_station_id {
  1069. (6) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  1070. (6) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  1071. (6) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  1072. (6) Thu May 24 17:30:30 2018: Debug: update request {
  1073. (6) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  1074. (6) Thu May 24 17:30:30 2018: Debug: --> 94:18:82:b9:32:80
  1075. (6) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  1076. (6) Thu May 24 17:30:30 2018: Debug: if ("%{8}") {
  1077. (6) Thu May 24 17:30:30 2018: Debug: EXPAND %{8}
  1078. (6) Thu May 24 17:30:30 2018: Debug: -->
  1079. (6) Thu May 24 17:30:30 2018: Debug: if ("%{8}") -> FALSE
  1080. (6) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  1081. (6) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  1082. (6) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) {
  1083. (6) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  1084. (6) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  1085. (6) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  1086. (6) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  1087. (6) Thu May 24 17:30:30 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  1088. (6) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  1089. (6) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_called_station_id = updated
  1090. (6) Thu May 24 17:30:30 2018: Debug: policy filter_username {
  1091. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  1092. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name) -> TRUE
  1093. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  1094. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) {
  1095. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) -> FALSE
  1096. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  1097. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  1098. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) {
  1099. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  1100. (6) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  1101. (6) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  1102. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) {
  1103. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  1104. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) {
  1105. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  1106. (6) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name) = updated
  1107. (6) Thu May 24 17:30:30 2018: Debug: } # policy filter_username = updated
  1108. (6) Thu May 24 17:30:30 2018: Debug: policy filter_password {
  1109. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  1110. (6) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  1111. (6) Thu May 24 17:30:30 2018: Debug: } # policy filter_password = updated
  1112. (6) Thu May 24 17:30:30 2018: Debug: [preprocess] = ok
  1113. (6) Thu May 24 17:30:30 2018: Debug: suffix: Checking for suffix after "@"
  1114. (6) Thu May 24 17:30:30 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  1115. (6) Thu May 24 17:30:30 2018: Debug: [suffix] = noop
  1116. (6) Thu May 24 17:30:30 2018: Debug: ntdomain: Checking for prefix before "\"
  1117. (6) Thu May 24 17:30:30 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  1118. (6) Thu May 24 17:30:30 2018: Debug: ntdomain: Found realm "null"
  1119. (6) Thu May 24 17:30:30 2018: Debug: ntdomain: Adding Realm = "null"
  1120. (6) Thu May 24 17:30:30 2018: Debug: ntdomain: Authentication realm is LOCAL
  1121. (6) Thu May 24 17:30:30 2018: Debug: [ntdomain] = ok
  1122. (6) Thu May 24 17:30:30 2018: Debug: eap: Peer sent EAP Response (code 2) ID 7 length 6
  1123. (6) Thu May 24 17:30:30 2018: Debug: eap: Continuing tunnel setup
  1124. (6) Thu May 24 17:30:30 2018: Debug: [eap] = ok
  1125. (6) Thu May 24 17:30:30 2018: Debug: } # authorize = ok
  1126. (6) Thu May 24 17:30:30 2018: Debug: Found Auth-Type = eap
  1127. (6) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  1128. (6) Thu May 24 17:30:30 2018: Debug: authenticate {
  1129. (6) Thu May 24 17:30:30 2018: Debug: eap: Expiring EAP session with state 0x49c411c24cc3082f
  1130. (6) Thu May 24 17:30:30 2018: Debug: eap: Finished EAP session with state 0x49c411c24cc3082f
  1131. (6) Thu May 24 17:30:30 2018: Debug: eap: Previous EAP request found for state 0x49c411c24cc3082f, released from the list
  1132. (6) Thu May 24 17:30:30 2018: Debug: eap: Peer sent packet with method EAP PEAP (25)
  1133. (6) Thu May 24 17:30:30 2018: Debug: eap: Calling submodule eap_peap to process data
  1134. (6) Thu May 24 17:30:30 2018: Debug: eap_peap: Continuing EAP-TLS
  1135. (6) Thu May 24 17:30:30 2018: Debug: eap_peap: Peer ACKed our handshake fragment. handshake is finished
  1136. (6) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls verify] = success
  1137. (6) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls process] = success
  1138. (6) Thu May 24 17:30:30 2018: Debug: eap_peap: Session established. Decoding tunneled attributes
  1139. (6) Thu May 24 17:30:30 2018: Debug: eap_peap: PEAP state TUNNEL ESTABLISHED
  1140. (6) Thu May 24 17:30:30 2018: Debug: eap: Sending EAP Request (code 1) ID 8 length 40
  1141. (6) Thu May 24 17:30:30 2018: Debug: eap: EAP session adding &reply:State = 0x49c411c24fcc082f
  1142. (6) Thu May 24 17:30:30 2018: Debug: [eap] = handled
  1143. (6) Thu May 24 17:30:30 2018: Debug: } # authenticate = handled
  1144. (6) Thu May 24 17:30:30 2018: Debug: Using Post-Auth-Type Challenge
  1145. (6) Thu May 24 17:30:30 2018: Debug: Post-Auth-Type sub-section not found. Ignoring.
  1146. (6) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  1147. (6) Thu May 24 17:30:30 2018: Debug: Sent Access-Challenge Id 109 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  1148. (6) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x010800281900170303001dc204d6dc726b81db8a469ae587be1edde1f1702951d298552627b74f15
  1149. (6) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  1150. (6) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c24fcc082fb3b3797cce5894f4
  1151. (6) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3230
  1152. (6) Thu May 24 17:30:30 2018: Debug: Finished request
  1153. (7) Thu May 24 17:30:30 2018: Debug: Received Access-Request Id 213 from 172.20.5.79:52628 to 172.20.5.3:1812 length 421
  1154. (7) Thu May 24 17:30:30 2018: Debug: Framed-MTU = 1480
  1155. (7) Thu May 24 17:30:30 2018: Debug: NAS-IP-Address = 172.20.9.150
  1156. (7) Thu May 24 17:30:30 2018: Debug: NAS-Identifier = "Test"
  1157. (7) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  1158. (7) Thu May 24 17:30:30 2018: Debug: Service-Type = Framed-User
  1159. (7) Thu May 24 17:30:30 2018: Debug: Framed-Protocol = PPP
  1160. (7) Thu May 24 17:30:30 2018: Debug: NAS-Port = 1
  1161. (7) Thu May 24 17:30:30 2018: Debug: NAS-Port-Type = Ethernet
  1162. (7) Thu May 24 17:30:30 2018: Debug: NAS-Port-Id = "1"
  1163. (7) Thu May 24 17:30:30 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  1164. (7) Thu May 24 17:30:30 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  1165. (7) Thu May 24 17:30:30 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  1166. (7) Thu May 24 17:30:30 2018: Debug: Tunnel-Type:0 = VLAN
  1167. (7) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  1168. (7) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  1169. (7) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c24fcc082fb3b3797cce5894f4
  1170. (7) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x0208004319001703030038000000000000000136a4dbac58bd2162f5d7e53a853d094521715a022e1e966ac88f81da70ab5f61b4c725ffab5824956fb62a49d8fb96b8
  1171. (7) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x5e78675bf103d85dff0c18c3ef6d31b8
  1172. (7) Thu May 24 17:30:30 2018: Debug: MS-RAS-Vendor = 11
  1173. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  1174. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  1175. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  1176. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  1177. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0138
  1178. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x013a
  1179. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0140
  1180. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0141
  1181. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0151
  1182. (7) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3231
  1183. (7) Thu May 24 17:30:30 2018: Debug: session-state: No cached attributes
  1184. (7) Thu May 24 17:30:30 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  1185. (7) Thu May 24 17:30:30 2018: Debug: authorize {
  1186. (7) Thu May 24 17:30:30 2018: Debug: update {
  1187. (7) Thu May 24 17:30:30 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  1188. (7) Thu May 24 17:30:30 2018: Debug: --> 172.20.5.79
  1189. (7) Thu May 24 17:30:30 2018: Debug: EXPAND %l
  1190. (7) Thu May 24 17:30:30 2018: Debug: --> 1527175830
  1191. (7) Thu May 24 17:30:30 2018: Debug: } # update = noop
  1192. (7) Thu May 24 17:30:30 2018: Debug: policy packetfence-set-tenant-id {
  1193. (7) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  1194. (7) Thu May 24 17:30:30 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  1195. (7) Thu May 24 17:30:30 2018: Debug: --> 0
  1196. (7) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  1197. (7) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  1198. (7) Thu May 24 17:30:30 2018: Debug: update control {
  1199. (7) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  1200. (7) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  1201. (7) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  1202. (7) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  1203. (7) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  1204. (7) Thu May 24 17:30:30 2018: Debug: --> 0
  1205. (7) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  1206. (7) Thu May 24 17:30:30 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  1207. (7) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  1208. (7) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  1209. (7) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  1210. (7) Thu May 24 17:30:30 2018: Debug: update control {
  1211. (7) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  1212. (7) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  1213. (7) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  1214. (7) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  1215. (7) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  1216. (7) Thu May 24 17:30:30 2018: Debug: --> 1
  1217. (7) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  1218. (7) Thu May 24 17:30:30 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  1219. (7) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-set-tenant-id = noop
  1220. (7) Thu May 24 17:30:30 2018: Debug: policy rewrite_calling_station_id {
  1221. (7) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  1222. (7) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  1223. (7) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  1224. (7) Thu May 24 17:30:30 2018: Debug: update request {
  1225. (7) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  1226. (7) Thu May 24 17:30:30 2018: Debug: --> 00:e0:4c:60:43:20
  1227. (7) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  1228. (7) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  1229. (7) Thu May 24 17:30:30 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  1230. (7) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  1231. (7) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_calling_station_id = updated
  1232. (7) Thu May 24 17:30:30 2018: Debug: policy rewrite_called_station_id {
  1233. (7) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  1234. (7) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  1235. (7) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  1236. (7) Thu May 24 17:30:30 2018: Debug: update request {
  1237. (7) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  1238. (7) Thu May 24 17:30:30 2018: Debug: --> 94:18:82:b9:32:80
  1239. (7) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  1240. (7) Thu May 24 17:30:30 2018: Debug: if ("%{8}") {
  1241. (7) Thu May 24 17:30:30 2018: Debug: EXPAND %{8}
  1242. (7) Thu May 24 17:30:30 2018: Debug: -->
  1243. (7) Thu May 24 17:30:30 2018: Debug: if ("%{8}") -> FALSE
  1244. (7) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  1245. (7) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  1246. (7) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) {
  1247. (7) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  1248. (7) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  1249. (7) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  1250. (7) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  1251. (7) Thu May 24 17:30:30 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  1252. (7) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  1253. (7) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_called_station_id = updated
  1254. (7) Thu May 24 17:30:30 2018: Debug: policy filter_username {
  1255. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  1256. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name) -> TRUE
  1257. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  1258. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) {
  1259. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) -> FALSE
  1260. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  1261. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  1262. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) {
  1263. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  1264. (7) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  1265. (7) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  1266. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) {
  1267. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  1268. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) {
  1269. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  1270. (7) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name) = updated
  1271. (7) Thu May 24 17:30:30 2018: Debug: } # policy filter_username = updated
  1272. (7) Thu May 24 17:30:30 2018: Debug: policy filter_password {
  1273. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  1274. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  1275. (7) Thu May 24 17:30:30 2018: Debug: } # policy filter_password = updated
  1276. (7) Thu May 24 17:30:30 2018: Debug: [preprocess] = ok
  1277. (7) Thu May 24 17:30:30 2018: Debug: suffix: Checking for suffix after "@"
  1278. (7) Thu May 24 17:30:30 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  1279. (7) Thu May 24 17:30:30 2018: Debug: [suffix] = noop
  1280. (7) Thu May 24 17:30:30 2018: Debug: ntdomain: Checking for prefix before "\"
  1281. (7) Thu May 24 17:30:30 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  1282. (7) Thu May 24 17:30:30 2018: Debug: ntdomain: Found realm "null"
  1283. (7) Thu May 24 17:30:30 2018: Debug: ntdomain: Adding Realm = "null"
  1284. (7) Thu May 24 17:30:30 2018: Debug: ntdomain: Authentication realm is LOCAL
  1285. (7) Thu May 24 17:30:30 2018: Debug: [ntdomain] = ok
  1286. (7) Thu May 24 17:30:30 2018: Debug: eap: Peer sent EAP Response (code 2) ID 8 length 67
  1287. (7) Thu May 24 17:30:30 2018: Debug: eap: Continuing tunnel setup
  1288. (7) Thu May 24 17:30:30 2018: Debug: [eap] = ok
  1289. (7) Thu May 24 17:30:30 2018: Debug: } # authorize = ok
  1290. (7) Thu May 24 17:30:30 2018: Debug: Found Auth-Type = eap
  1291. (7) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  1292. (7) Thu May 24 17:30:30 2018: Debug: authenticate {
  1293. (7) Thu May 24 17:30:30 2018: Debug: eap: Expiring EAP session with state 0x49c411c24fcc082f
  1294. (7) Thu May 24 17:30:30 2018: Debug: eap: Finished EAP session with state 0x49c411c24fcc082f
  1295. (7) Thu May 24 17:30:30 2018: Debug: eap: Previous EAP request found for state 0x49c411c24fcc082f, released from the list
  1296. (7) Thu May 24 17:30:30 2018: Debug: eap: Peer sent packet with method EAP PEAP (25)
  1297. (7) Thu May 24 17:30:30 2018: Debug: eap: Calling submodule eap_peap to process data
  1298. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Continuing EAP-TLS
  1299. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls verify] = ok
  1300. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Done initial handshake
  1301. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls process] = ok
  1302. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Session established. Decoding tunneled attributes
  1303. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: PEAP state WAITING FOR INNER IDENTITY
  1304. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Identity - host/Admin-15-NB.PERSONALAMT.DE
  1305. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Got inner identity 'host/Admin-15-NB.PERSONALAMT.DE'
  1306. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Setting default EAP type for tunneled EAP session
  1307. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Got tunneled request
  1308. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP-Message = 0x0208002401686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445
  1309. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Setting User-Name to host/Admin-15-NB.PERSONALAMT.DE
  1310. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Sending tunneled request to packetfence-tunnel
  1311. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP-Message = 0x0208002401686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445
  1312. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1
  1313. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  1314. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Framed-MTU = 1480
  1315. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-IP-Address = 172.20.9.150
  1316. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Identifier = "Test"
  1317. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Service-Type = Framed-User
  1318. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Framed-Protocol = PPP
  1319. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Port = 1
  1320. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Port-Type = Ethernet
  1321. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Port-Id = "1"
  1322. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Calling-Station-Id := "00:e0:4c:60:43:20"
  1323. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  1324. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Type:0 = VLAN
  1325. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Medium-Type:0 = IEEE-802
  1326. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Private-Group-Id:0 = "1"
  1327. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: MS-RAS-Vendor = 11
  1328. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b28
  1329. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b2e
  1330. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b30
  1331. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b3d
  1332. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0138
  1333. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x013a
  1334. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0140
  1335. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0141
  1336. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0151
  1337. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Called-Station-Id := "94:18:82:b9:32:80"
  1338. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Event-Timestamp = "Mai 24 2018 17:30:30 CEST"
  1339. (7) Thu May 24 17:30:30 2018: Debug: Virtual server packetfence-tunnel received request
  1340. (7) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x0208002401686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445
  1341. (7) Thu May 24 17:30:30 2018: Debug: FreeRADIUS-Proxied-To = 127.0.0.1
  1342. (7) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  1343. (7) Thu May 24 17:30:30 2018: Debug: Framed-MTU = 1480
  1344. (7) Thu May 24 17:30:30 2018: Debug: NAS-IP-Address = 172.20.9.150
  1345. (7) Thu May 24 17:30:30 2018: Debug: NAS-Identifier = "Test"
  1346. (7) Thu May 24 17:30:30 2018: Debug: Service-Type = Framed-User
  1347. (7) Thu May 24 17:30:30 2018: Debug: Framed-Protocol = PPP
  1348. (7) Thu May 24 17:30:30 2018: Debug: NAS-Port = 1
  1349. (7) Thu May 24 17:30:30 2018: Debug: NAS-Port-Type = Ethernet
  1350. (7) Thu May 24 17:30:30 2018: Debug: NAS-Port-Id = "1"
  1351. (7) Thu May 24 17:30:30 2018: Debug: Calling-Station-Id := "00:e0:4c:60:43:20"
  1352. (7) Thu May 24 17:30:30 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  1353. (7) Thu May 24 17:30:30 2018: Debug: Tunnel-Type:0 = VLAN
  1354. (7) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  1355. (7) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  1356. (7) Thu May 24 17:30:30 2018: Debug: MS-RAS-Vendor = 11
  1357. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  1358. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  1359. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  1360. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  1361. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0138
  1362. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x013a
  1363. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0140
  1364. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0141
  1365. (7) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0151
  1366. (7) Thu May 24 17:30:30 2018: Debug: Called-Station-Id := "94:18:82:b9:32:80"
  1367. (7) Thu May 24 17:30:30 2018: Debug: Event-Timestamp = "Mai 24 2018 17:30:30 CEST"
  1368. (7) Thu May 24 17:30:30 2018: WARNING: Outer and inner identities are the same. User privacy is compromised.
  1369. (7) Thu May 24 17:30:30 2018: Debug: server packetfence-tunnel {
  1370. (7) Thu May 24 17:30:30 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
  1371. (7) Thu May 24 17:30:30 2018: Debug: authorize {
  1372. (7) Thu May 24 17:30:30 2018: Debug: if ( outer.EAP-Type == TTLS) {
  1373. (7) Thu May 24 17:30:30 2018: Debug: if ( outer.EAP-Type == TTLS) -> FALSE
  1374. (7) Thu May 24 17:30:30 2018: Debug: policy filter_username {
  1375. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  1376. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name) -> TRUE
  1377. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  1378. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) {
  1379. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) -> FALSE
  1380. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  1381. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  1382. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) {
  1383. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  1384. (7) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  1385. (7) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  1386. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) {
  1387. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  1388. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) {
  1389. (7) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  1390. (7) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name) = notfound
  1391. (7) Thu May 24 17:30:30 2018: Debug: } # policy filter_username = notfound
  1392. (7) Thu May 24 17:30:30 2018: Debug: [mschap] = noop
  1393. (7) Thu May 24 17:30:30 2018: Debug: suffix: Checking for suffix after "@"
  1394. (7) Thu May 24 17:30:30 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  1395. (7) Thu May 24 17:30:30 2018: Debug: [suffix] = noop
  1396. (7) Thu May 24 17:30:30 2018: Debug: ntdomain: Checking for prefix before "\"
  1397. (7) Thu May 24 17:30:30 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  1398. (7) Thu May 24 17:30:30 2018: Debug: ntdomain: Found realm "null"
  1399. (7) Thu May 24 17:30:30 2018: Debug: ntdomain: Adding Realm = "null"
  1400. (7) Thu May 24 17:30:30 2018: Debug: ntdomain: Authentication realm is LOCAL
  1401. (7) Thu May 24 17:30:30 2018: Debug: [ntdomain] = ok
  1402. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'User-Name'} = &request:User-Name -> 'host/Admin-15-NB.PERSONALAMT.DE'
  1403. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-IP-Address'} = &request:NAS-IP-Address -> '172.20.9.150'
  1404. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Port'} = &request:NAS-Port -> '1'
  1405. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Service-Type'} = &request:Service-Type -> 'Framed-User'
  1406. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Framed-Protocol'} = &request:Framed-Protocol -> 'PPP'
  1407. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Framed-MTU'} = &request:Framed-MTU -> '1480'
  1408. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Called-Station-Id'} = &request:Called-Station-Id -> '94:18:82:b9:32:80'
  1409. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Calling-Station-Id'} = &request:Calling-Station-Id -> '00:e0:4c:60:43:20'
  1410. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Identifier'} = &request:NAS-Identifier -> 'Test'
  1411. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Port-Type'} = &request:NAS-Port-Type -> 'Ethernet'
  1412. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Tunnel-Type'} = &request:Tunnel-Type -> 'VLAN'
  1413. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Tunnel-Medium-Type'} = &request:Tunnel-Medium-Type -> 'IEEE-802'
  1414. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Tunnel-Private-Group-Id'} = &request:Tunnel-Private-Group-Id -> '1'
  1415. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Event-Timestamp'} = &request:Event-Timestamp -> 'Mai 24 2018 17:30:30 CEST'
  1416. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Connect-Info'} = &request:Connect-Info -> 'CONNECT Ethernet 1000Mbps Full duplex'
  1417. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'EAP-Message'} = &request:EAP-Message -> '0x0208002401686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445'
  1418. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Port-Id'} = &request:NAS-Port-Id -> '1'
  1419. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'FreeRADIUS-Proxied-To'} = &request:FreeRADIUS-Proxied-To -> '127.0.0.1'
  1420. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[0] = &request:HP-Capability-Advert -> '0x011a0000000b28'
  1421. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[1] = &request:HP-Capability-Advert -> '0x011a0000000b2e'
  1422. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[2] = &request:HP-Capability-Advert -> '0x011a0000000b30'
  1423. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[3] = &request:HP-Capability-Advert -> '0x011a0000000b3d'
  1424. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[4] = &request:HP-Capability-Advert -> '0x0138'
  1425. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[5] = &request:HP-Capability-Advert -> '0x013a'
  1426. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[6] = &request:HP-Capability-Advert -> '0x0140'
  1427. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[7] = &request:HP-Capability-Advert -> '0x0141'
  1428. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[8] = &request:HP-Capability-Advert -> '0x0151'
  1429. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'MS-RAS-Vendor'} = &request:MS-RAS-Vendor -> '11'
  1430. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Realm'} = &request:Realm -> 'null'
  1431. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_CHECK{'EAP-Type'} = &control:EAP-Type -> 'MSCHAPv2'
  1432. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_CONFIG{'EAP-Type'} = &control:EAP-Type -> 'MSCHAPv2'
  1433. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b28'
  1434. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b2e'
  1435. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b30'
  1436. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b3d'
  1437. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0138'
  1438. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x013a'
  1439. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0140'
  1440. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0141'
  1441. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0151'
  1442. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Port-Type = $RAD_REQUEST{'NAS-Port-Type'} -> 'Ethernet'
  1443. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:MS-RAS-Vendor = $RAD_REQUEST{'MS-RAS-Vendor'} -> '11'
  1444. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Service-Type = $RAD_REQUEST{'Service-Type'} -> 'Framed-User'
  1445. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Called-Station-Id = $RAD_REQUEST{'Called-Station-Id'} -> '94:18:82:b9:32:80'
  1446. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:FreeRADIUS-Proxied-To = $RAD_REQUEST{'FreeRADIUS-Proxied-To'} -> '127.0.0.1'
  1447. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Tunnel-Type:0 = $RAD_REQUEST{'Tunnel-Type:0'} -> 'VLAN'
  1448. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Connect-Info = $RAD_REQUEST{'Connect-Info'} -> 'CONNECT Ethernet 1000Mbps Full duplex'
  1449. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Realm = $RAD_REQUEST{'Realm'} -> 'null'
  1450. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '172.20.9.150'
  1451. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Port-Id = $RAD_REQUEST{'NAS-Port-Id'} -> '1'
  1452. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Tunnel-Medium-Type:0 = $RAD_REQUEST{'Tunnel-Medium-Type:0'} -> 'IEEE-802'
  1453. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} -> '00:e0:4c:60:43:20'
  1454. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:PacketFence-Domain = $RAD_REQUEST{'PacketFence-Domain'} -> 'LKMRBI'
  1455. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Framed-Protocol = $RAD_REQUEST{'Framed-Protocol'} -> 'PPP'
  1456. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Tunnel-Private-Group-Id:0 = $RAD_REQUEST{'Tunnel-Private-Group-Id:0'} -> '1'
  1457. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:User-Name = $RAD_REQUEST{'User-Name'} -> 'host/Admin-15-NB.PERSONALAMT.DE'
  1458. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Identifier = $RAD_REQUEST{'NAS-Identifier'} -> 'Test'
  1459. (7) Thu May 24 17:30:30 2018: ERROR: packetfence-multi-domain: Failed to create pair - failed to parse time string "Mai 24 2018 17:30:30 CEST"
  1460. (7) Thu May 24 17:30:30 2018: ERROR: packetfence-multi-domain: &request:Event-Timestamp = $RAD_REQUEST{'Event-Timestamp'} -> 'Mai 24 2018 17:30:30 CEST'
  1461. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:EAP-Message = $RAD_REQUEST{'EAP-Message'} -> '0x0208002401686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445'
  1462. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Port = $RAD_REQUEST{'NAS-Port'} -> '1'
  1463. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Framed-MTU = $RAD_REQUEST{'Framed-MTU'} -> '1480'
  1464. (7) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &control:EAP-Type = $RAD_CHECK{'EAP-Type'} -> 'MSCHAPv2'
  1465. (7) Thu May 24 17:30:30 2018: Debug: [packetfence-multi-domain] = updated
  1466. (7) Thu May 24 17:30:30 2018: Debug: update control {
  1467. (7) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  1468. (7) Thu May 24 17:30:30 2018: Debug: eap: Peer sent EAP Response (code 2) ID 8 length 36
  1469. (7) Thu May 24 17:30:30 2018: Debug: eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
  1470. (7) Thu May 24 17:30:30 2018: Debug: [eap] = ok
  1471. (7) Thu May 24 17:30:30 2018: Debug: } # authorize = ok
  1472. (7) Thu May 24 17:30:30 2018: WARNING: You set Proxy-To-Realm = local, but it is a LOCAL realm! Cancelling proxy request.
  1473. (7) Thu May 24 17:30:30 2018: Debug: Found Auth-Type = eap
  1474. (7) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
  1475. (7) Thu May 24 17:30:30 2018: Debug: authenticate {
  1476. (7) Thu May 24 17:30:30 2018: Debug: eap: Peer sent packet with method EAP Identity (1)
  1477. (7) Thu May 24 17:30:30 2018: Debug: eap: Calling submodule eap_mschapv2 to process data
  1478. (7) Thu May 24 17:30:30 2018: Debug: eap_mschapv2: Issuing Challenge
  1479. (7) Thu May 24 17:30:30 2018: Debug: eap: Sending EAP Request (code 1) ID 9 length 43
  1480. (7) Thu May 24 17:30:30 2018: Debug: eap: EAP session adding &reply:State = 0x3c540b463c5d11bc
  1481. (7) Thu May 24 17:30:30 2018: Debug: [eap] = handled
  1482. (7) Thu May 24 17:30:30 2018: Debug: } # authenticate = handled
  1483. (7) Thu May 24 17:30:30 2018: Debug: } # server packetfence-tunnel
  1484. (7) Thu May 24 17:30:30 2018: Debug: Virtual server sending reply
  1485. (7) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x0109002b1a0109002610cdf91c10176e1e591aaaba0ec7e8ec7c667265657261646975732d332e302e3135
  1486. (7) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  1487. (7) Thu May 24 17:30:30 2018: Debug: State = 0x3c540b463c5d11bc9b9de9eca83b76bb
  1488. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Got tunneled reply code 11
  1489. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP-Message = 0x0109002b1a0109002610cdf91c10176e1e591aaaba0ec7e8ec7c667265657261646975732d332e302e3135
  1490. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Message-Authenticator = 0x00000000000000000000000000000000
  1491. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: State = 0x3c540b463c5d11bc9b9de9eca83b76bb
  1492. (7) Thu May 24 17:30:30 2018: Debug: eap_peap: Got tunneled Access-Challenge
  1493. (7) Thu May 24 17:30:30 2018: Debug: eap: Sending EAP Request (code 1) ID 9 length 74
  1494. (7) Thu May 24 17:30:30 2018: Debug: eap: EAP session adding &reply:State = 0x49c411c24ecd082f
  1495. (7) Thu May 24 17:30:30 2018: Debug: [eap] = handled
  1496. (7) Thu May 24 17:30:30 2018: Debug: } # authenticate = handled
  1497. (7) Thu May 24 17:30:30 2018: Debug: Using Post-Auth-Type Challenge
  1498. (7) Thu May 24 17:30:30 2018: Debug: Post-Auth-Type sub-section not found. Ignoring.
  1499. (7) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  1500. (7) Thu May 24 17:30:30 2018: Debug: Sent Access-Challenge Id 213 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  1501. (7) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x0109004a1900170303003fc204d6dc726b81dcc38d0d7620d43ee6de16f96200d67e765fc7bb27f998ee98c0f5f5354569f64774c4e71fff345b908044d152a3c9f1e873fd6168148cfe
  1502. (7) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  1503. (7) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c24ecd082fb3b3797cce5894f4
  1504. (7) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3231
  1505. (7) Thu May 24 17:30:30 2018: Debug: Finished request
  1506. (8) Thu May 24 17:30:30 2018: Debug: Received Access-Request Id 45 from 172.20.5.79:52628 to 172.20.5.3:1812 length 475
  1507. (8) Thu May 24 17:30:30 2018: Debug: Framed-MTU = 1480
  1508. (8) Thu May 24 17:30:30 2018: Debug: NAS-IP-Address = 172.20.9.150
  1509. (8) Thu May 24 17:30:30 2018: Debug: NAS-Identifier = "Test"
  1510. (8) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  1511. (8) Thu May 24 17:30:30 2018: Debug: Service-Type = Framed-User
  1512. (8) Thu May 24 17:30:30 2018: Debug: Framed-Protocol = PPP
  1513. (8) Thu May 24 17:30:30 2018: Debug: NAS-Port = 1
  1514. (8) Thu May 24 17:30:30 2018: Debug: NAS-Port-Type = Ethernet
  1515. (8) Thu May 24 17:30:30 2018: Debug: NAS-Port-Id = "1"
  1516. (8) Thu May 24 17:30:30 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  1517. (8) Thu May 24 17:30:30 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  1518. (8) Thu May 24 17:30:30 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  1519. (8) Thu May 24 17:30:30 2018: Debug: Tunnel-Type:0 = VLAN
  1520. (8) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  1521. (8) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  1522. (8) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c24ecd082fb3b3797cce5894f4
  1523. (8) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x020900791900170303006e0000000000000002a78ef4f10e50144dbc569670d2043607c8b6d6c274870853ca9edcdb980828dd20f4f9fcb6688dd0341132568c405fc296ce490f5d3c4e69b080f795b66b51262d6a50103c60f728f1cd51f5111530a6cf80a208d6943cafd1270353ba40124e28ef6028
  1524. (8) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x4d4f3198399a23f5b92ece5023620b1a
  1525. (8) Thu May 24 17:30:30 2018: Debug: MS-RAS-Vendor = 11
  1526. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  1527. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  1528. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  1529. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  1530. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0138
  1531. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x013a
  1532. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0140
  1533. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0141
  1534. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0151
  1535. (8) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3232
  1536. (8) Thu May 24 17:30:30 2018: Debug: session-state: No cached attributes
  1537. (8) Thu May 24 17:30:30 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  1538. (8) Thu May 24 17:30:30 2018: Debug: authorize {
  1539. (8) Thu May 24 17:30:30 2018: Debug: update {
  1540. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  1541. (8) Thu May 24 17:30:30 2018: Debug: --> 172.20.5.79
  1542. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %l
  1543. (8) Thu May 24 17:30:30 2018: Debug: --> 1527175830
  1544. (8) Thu May 24 17:30:30 2018: Debug: } # update = noop
  1545. (8) Thu May 24 17:30:30 2018: Debug: policy packetfence-set-tenant-id {
  1546. (8) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  1547. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  1548. (8) Thu May 24 17:30:30 2018: Debug: --> 0
  1549. (8) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  1550. (8) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  1551. (8) Thu May 24 17:30:30 2018: Debug: update control {
  1552. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  1553. (8) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  1554. (8) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  1555. (8) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  1556. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  1557. (8) Thu May 24 17:30:30 2018: Debug: --> 0
  1558. (8) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  1559. (8) Thu May 24 17:30:30 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  1560. (8) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  1561. (8) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  1562. (8) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  1563. (8) Thu May 24 17:30:30 2018: Debug: update control {
  1564. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  1565. (8) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  1566. (8) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  1567. (8) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  1568. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  1569. (8) Thu May 24 17:30:30 2018: Debug: --> 1
  1570. (8) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  1571. (8) Thu May 24 17:30:30 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  1572. (8) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-set-tenant-id = noop
  1573. (8) Thu May 24 17:30:30 2018: Debug: policy rewrite_calling_station_id {
  1574. (8) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  1575. (8) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  1576. (8) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  1577. (8) Thu May 24 17:30:30 2018: Debug: update request {
  1578. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  1579. (8) Thu May 24 17:30:30 2018: Debug: --> 00:e0:4c:60:43:20
  1580. (8) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  1581. (8) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  1582. (8) Thu May 24 17:30:30 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  1583. (8) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  1584. (8) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_calling_station_id = updated
  1585. (8) Thu May 24 17:30:30 2018: Debug: policy rewrite_called_station_id {
  1586. (8) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  1587. (8) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  1588. (8) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  1589. (8) Thu May 24 17:30:30 2018: Debug: update request {
  1590. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  1591. (8) Thu May 24 17:30:30 2018: Debug: --> 94:18:82:b9:32:80
  1592. (8) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  1593. (8) Thu May 24 17:30:30 2018: Debug: if ("%{8}") {
  1594. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{8}
  1595. (8) Thu May 24 17:30:30 2018: Debug: -->
  1596. (8) Thu May 24 17:30:30 2018: Debug: if ("%{8}") -> FALSE
  1597. (8) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  1598. (8) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  1599. (8) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) {
  1600. (8) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  1601. (8) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  1602. (8) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  1603. (8) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  1604. (8) Thu May 24 17:30:30 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  1605. (8) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  1606. (8) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_called_station_id = updated
  1607. (8) Thu May 24 17:30:30 2018: Debug: policy filter_username {
  1608. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  1609. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name) -> TRUE
  1610. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  1611. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) {
  1612. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) -> FALSE
  1613. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  1614. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  1615. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) {
  1616. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  1617. (8) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  1618. (8) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  1619. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) {
  1620. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  1621. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) {
  1622. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  1623. (8) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name) = updated
  1624. (8) Thu May 24 17:30:30 2018: Debug: } # policy filter_username = updated
  1625. (8) Thu May 24 17:30:30 2018: Debug: policy filter_password {
  1626. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  1627. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  1628. (8) Thu May 24 17:30:30 2018: Debug: } # policy filter_password = updated
  1629. (8) Thu May 24 17:30:30 2018: Debug: [preprocess] = ok
  1630. (8) Thu May 24 17:30:30 2018: Debug: suffix: Checking for suffix after "@"
  1631. (8) Thu May 24 17:30:30 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  1632. (8) Thu May 24 17:30:30 2018: Debug: [suffix] = noop
  1633. (8) Thu May 24 17:30:30 2018: Debug: ntdomain: Checking for prefix before "\"
  1634. (8) Thu May 24 17:30:30 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  1635. (8) Thu May 24 17:30:30 2018: Debug: ntdomain: Found realm "null"
  1636. (8) Thu May 24 17:30:30 2018: Debug: ntdomain: Adding Realm = "null"
  1637. (8) Thu May 24 17:30:30 2018: Debug: ntdomain: Authentication realm is LOCAL
  1638. (8) Thu May 24 17:30:30 2018: Debug: [ntdomain] = ok
  1639. (8) Thu May 24 17:30:30 2018: Debug: eap: Peer sent EAP Response (code 2) ID 9 length 121
  1640. (8) Thu May 24 17:30:30 2018: Debug: eap: Continuing tunnel setup
  1641. (8) Thu May 24 17:30:30 2018: Debug: [eap] = ok
  1642. (8) Thu May 24 17:30:30 2018: Debug: } # authorize = ok
  1643. (8) Thu May 24 17:30:30 2018: Debug: Found Auth-Type = eap
  1644. (8) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  1645. (8) Thu May 24 17:30:30 2018: Debug: authenticate {
  1646. (8) Thu May 24 17:30:30 2018: Debug: eap: Expiring EAP session with state 0x3c540b463c5d11bc
  1647. (8) Thu May 24 17:30:30 2018: Debug: eap: Finished EAP session with state 0x49c411c24ecd082f
  1648. (8) Thu May 24 17:30:30 2018: Debug: eap: Previous EAP request found for state 0x49c411c24ecd082f, released from the list
  1649. (8) Thu May 24 17:30:30 2018: Debug: eap: Peer sent packet with method EAP PEAP (25)
  1650. (8) Thu May 24 17:30:30 2018: Debug: eap: Calling submodule eap_peap to process data
  1651. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Continuing EAP-TLS
  1652. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls verify] = ok
  1653. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Done initial handshake
  1654. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls process] = ok
  1655. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Session established. Decoding tunneled attributes
  1656. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: PEAP state phase2
  1657. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP method MSCHAPv2 (26)
  1658. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Got tunneled request
  1659. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP-Message = 0x0209005a1a02090055316159b5ecaefb2209298539b2a82fc5ad0000000000000000bee84769b24f2eb26a8e3902bb9448be4a3371baa932ccef00686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445
  1660. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Setting User-Name to host/Admin-15-NB.PERSONALAMT.DE
  1661. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Sending tunneled request to packetfence-tunnel
  1662. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP-Message = 0x0209005a1a02090055316159b5ecaefb2209298539b2a82fc5ad0000000000000000bee84769b24f2eb26a8e3902bb9448be4a3371baa932ccef00686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445
  1663. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1
  1664. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  1665. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: State = 0x3c540b463c5d11bc9b9de9eca83b76bb
  1666. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Framed-MTU = 1480
  1667. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-IP-Address = 172.20.9.150
  1668. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Identifier = "Test"
  1669. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Service-Type = Framed-User
  1670. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Framed-Protocol = PPP
  1671. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Port = 1
  1672. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Port-Type = Ethernet
  1673. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Port-Id = "1"
  1674. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Calling-Station-Id := "00:e0:4c:60:43:20"
  1675. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  1676. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Type:0 = VLAN
  1677. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Medium-Type:0 = IEEE-802
  1678. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Private-Group-Id:0 = "1"
  1679. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: MS-RAS-Vendor = 11
  1680. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b28
  1681. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b2e
  1682. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b30
  1683. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b3d
  1684. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0138
  1685. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x013a
  1686. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0140
  1687. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0141
  1688. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0151
  1689. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Called-Station-Id := "94:18:82:b9:32:80"
  1690. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Event-Timestamp = "Mai 24 2018 17:30:30 CEST"
  1691. (8) Thu May 24 17:30:30 2018: Debug: Virtual server packetfence-tunnel received request
  1692. (8) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x0209005a1a02090055316159b5ecaefb2209298539b2a82fc5ad0000000000000000bee84769b24f2eb26a8e3902bb9448be4a3371baa932ccef00686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445
  1693. (8) Thu May 24 17:30:30 2018: Debug: FreeRADIUS-Proxied-To = 127.0.0.1
  1694. (8) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  1695. (8) Thu May 24 17:30:30 2018: Debug: State = 0x3c540b463c5d11bc9b9de9eca83b76bb
  1696. (8) Thu May 24 17:30:30 2018: Debug: Framed-MTU = 1480
  1697. (8) Thu May 24 17:30:30 2018: Debug: NAS-IP-Address = 172.20.9.150
  1698. (8) Thu May 24 17:30:30 2018: Debug: NAS-Identifier = "Test"
  1699. (8) Thu May 24 17:30:30 2018: Debug: Service-Type = Framed-User
  1700. (8) Thu May 24 17:30:30 2018: Debug: Framed-Protocol = PPP
  1701. (8) Thu May 24 17:30:30 2018: Debug: NAS-Port = 1
  1702. (8) Thu May 24 17:30:30 2018: Debug: NAS-Port-Type = Ethernet
  1703. (8) Thu May 24 17:30:30 2018: Debug: NAS-Port-Id = "1"
  1704. (8) Thu May 24 17:30:30 2018: Debug: Calling-Station-Id := "00:e0:4c:60:43:20"
  1705. (8) Thu May 24 17:30:30 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  1706. (8) Thu May 24 17:30:30 2018: Debug: Tunnel-Type:0 = VLAN
  1707. (8) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  1708. (8) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  1709. (8) Thu May 24 17:30:30 2018: Debug: MS-RAS-Vendor = 11
  1710. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  1711. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  1712. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  1713. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  1714. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0138
  1715. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x013a
  1716. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0140
  1717. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0141
  1718. (8) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0151
  1719. (8) Thu May 24 17:30:30 2018: Debug: Called-Station-Id := "94:18:82:b9:32:80"
  1720. (8) Thu May 24 17:30:30 2018: Debug: Event-Timestamp = "Mai 24 2018 17:30:30 CEST"
  1721. (8) Thu May 24 17:30:30 2018: WARNING: Outer and inner identities are the same. User privacy is compromised.
  1722. (8) Thu May 24 17:30:30 2018: Debug: server packetfence-tunnel {
  1723. (8) Thu May 24 17:30:30 2018: Debug: session-state: No cached attributes
  1724. (8) Thu May 24 17:30:30 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
  1725. (8) Thu May 24 17:30:30 2018: Debug: authorize {
  1726. (8) Thu May 24 17:30:30 2018: Debug: if ( outer.EAP-Type == TTLS) {
  1727. (8) Thu May 24 17:30:30 2018: Debug: if ( outer.EAP-Type == TTLS) -> FALSE
  1728. (8) Thu May 24 17:30:30 2018: Debug: policy filter_username {
  1729. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  1730. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name) -> TRUE
  1731. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  1732. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) {
  1733. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) -> FALSE
  1734. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  1735. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  1736. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) {
  1737. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  1738. (8) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  1739. (8) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  1740. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) {
  1741. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  1742. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) {
  1743. (8) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  1744. (8) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name) = notfound
  1745. (8) Thu May 24 17:30:30 2018: Debug: } # policy filter_username = notfound
  1746. (8) Thu May 24 17:30:30 2018: Debug: [mschap] = noop
  1747. (8) Thu May 24 17:30:30 2018: Debug: suffix: Checking for suffix after "@"
  1748. (8) Thu May 24 17:30:30 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  1749. (8) Thu May 24 17:30:30 2018: Debug: [suffix] = noop
  1750. (8) Thu May 24 17:30:30 2018: Debug: ntdomain: Checking for prefix before "\"
  1751. (8) Thu May 24 17:30:30 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  1752. (8) Thu May 24 17:30:30 2018: Debug: ntdomain: Found realm "null"
  1753. (8) Thu May 24 17:30:30 2018: Debug: ntdomain: Adding Realm = "null"
  1754. (8) Thu May 24 17:30:30 2018: Debug: ntdomain: Authentication realm is LOCAL
  1755. (8) Thu May 24 17:30:30 2018: Debug: [ntdomain] = ok
  1756. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'User-Name'} = &request:User-Name -> 'host/Admin-15-NB.PERSONALAMT.DE'
  1757. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-IP-Address'} = &request:NAS-IP-Address -> '172.20.9.150'
  1758. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Port'} = &request:NAS-Port -> '1'
  1759. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Service-Type'} = &request:Service-Type -> 'Framed-User'
  1760. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Framed-Protocol'} = &request:Framed-Protocol -> 'PPP'
  1761. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Framed-MTU'} = &request:Framed-MTU -> '1480'
  1762. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'State'} = &request:State -> '0x3c540b463c5d11bc9b9de9eca83b76bb'
  1763. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Called-Station-Id'} = &request:Called-Station-Id -> '94:18:82:b9:32:80'
  1764. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Calling-Station-Id'} = &request:Calling-Station-Id -> '00:e0:4c:60:43:20'
  1765. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Identifier'} = &request:NAS-Identifier -> 'Test'
  1766. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Port-Type'} = &request:NAS-Port-Type -> 'Ethernet'
  1767. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Tunnel-Type'} = &request:Tunnel-Type -> 'VLAN'
  1768. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Tunnel-Medium-Type'} = &request:Tunnel-Medium-Type -> 'IEEE-802'
  1769. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Tunnel-Private-Group-Id'} = &request:Tunnel-Private-Group-Id -> '1'
  1770. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Event-Timestamp'} = &request:Event-Timestamp -> 'Mai 24 2018 17:30:30 CEST'
  1771. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Connect-Info'} = &request:Connect-Info -> 'CONNECT Ethernet 1000Mbps Full duplex'
  1772. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'EAP-Message'} = &request:EAP-Message -> '0x0209005a1a02090055316159b5ecaefb2209298539b2a82fc5ad0000000000000000bee84769b24f2eb26a8e3902bb9448be4a3371baa932ccef00686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445'
  1773. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Port-Id'} = &request:NAS-Port-Id -> '1'
  1774. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'FreeRADIUS-Proxied-To'} = &request:FreeRADIUS-Proxied-To -> '127.0.0.1'
  1775. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[0] = &request:HP-Capability-Advert -> '0x011a0000000b28'
  1776. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[1] = &request:HP-Capability-Advert -> '0x011a0000000b2e'
  1777. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[2] = &request:HP-Capability-Advert -> '0x011a0000000b30'
  1778. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[3] = &request:HP-Capability-Advert -> '0x011a0000000b3d'
  1779. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[4] = &request:HP-Capability-Advert -> '0x0138'
  1780. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[5] = &request:HP-Capability-Advert -> '0x013a'
  1781. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[6] = &request:HP-Capability-Advert -> '0x0140'
  1782. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[7] = &request:HP-Capability-Advert -> '0x0141'
  1783. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[8] = &request:HP-Capability-Advert -> '0x0151'
  1784. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'MS-RAS-Vendor'} = &request:MS-RAS-Vendor -> '11'
  1785. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Realm'} = &request:Realm -> 'null'
  1786. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b28'
  1787. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b2e'
  1788. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b30'
  1789. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b3d'
  1790. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0138'
  1791. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x013a'
  1792. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0140'
  1793. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0141'
  1794. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0151'
  1795. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Port-Type = $RAD_REQUEST{'NAS-Port-Type'} -> 'Ethernet'
  1796. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:MS-RAS-Vendor = $RAD_REQUEST{'MS-RAS-Vendor'} -> '11'
  1797. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Service-Type = $RAD_REQUEST{'Service-Type'} -> 'Framed-User'
  1798. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Called-Station-Id = $RAD_REQUEST{'Called-Station-Id'} -> '94:18:82:b9:32:80'
  1799. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:State = $RAD_REQUEST{'State'} -> '0x3c540b463c5d11bc9b9de9eca83b76bb'
  1800. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:FreeRADIUS-Proxied-To = $RAD_REQUEST{'FreeRADIUS-Proxied-To'} -> '127.0.0.1'
  1801. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Tunnel-Type:0 = $RAD_REQUEST{'Tunnel-Type:0'} -> 'VLAN'
  1802. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Connect-Info = $RAD_REQUEST{'Connect-Info'} -> 'CONNECT Ethernet 1000Mbps Full duplex'
  1803. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Realm = $RAD_REQUEST{'Realm'} -> 'null'
  1804. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '172.20.9.150'
  1805. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Port-Id = $RAD_REQUEST{'NAS-Port-Id'} -> '1'
  1806. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Tunnel-Medium-Type:0 = $RAD_REQUEST{'Tunnel-Medium-Type:0'} -> 'IEEE-802'
  1807. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} -> '00:e0:4c:60:43:20'
  1808. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:PacketFence-Domain = $RAD_REQUEST{'PacketFence-Domain'} -> 'LKMRBI'
  1809. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Framed-Protocol = $RAD_REQUEST{'Framed-Protocol'} -> 'PPP'
  1810. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Tunnel-Private-Group-Id:0 = $RAD_REQUEST{'Tunnel-Private-Group-Id:0'} -> '1'
  1811. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:User-Name = $RAD_REQUEST{'User-Name'} -> 'host/Admin-15-NB.PERSONALAMT.DE'
  1812. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Identifier = $RAD_REQUEST{'NAS-Identifier'} -> 'Test'
  1813. (8) Thu May 24 17:30:30 2018: ERROR: packetfence-multi-domain: Failed to create pair - failed to parse time string "Mai 24 2018 17:30:30 CEST"
  1814. (8) Thu May 24 17:30:30 2018: ERROR: packetfence-multi-domain: &request:Event-Timestamp = $RAD_REQUEST{'Event-Timestamp'} -> 'Mai 24 2018 17:30:30 CEST'
  1815. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:EAP-Message = $RAD_REQUEST{'EAP-Message'} -> '0x0209005a1a02090055316159b5ecaefb2209298539b2a82fc5ad0000000000000000bee84769b24f2eb26a8e3902bb9448be4a3371baa932ccef00686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445'
  1816. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Port = $RAD_REQUEST{'NAS-Port'} -> '1'
  1817. (8) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Framed-MTU = $RAD_REQUEST{'Framed-MTU'} -> '1480'
  1818. (8) Thu May 24 17:30:30 2018: Debug: [packetfence-multi-domain] = updated
  1819. (8) Thu May 24 17:30:30 2018: Debug: update control {
  1820. (8) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  1821. (8) Thu May 24 17:30:30 2018: Debug: eap: Peer sent EAP Response (code 2) ID 9 length 90
  1822. (8) Thu May 24 17:30:30 2018: Debug: eap: No EAP Start, assuming it's an on-going EAP conversation
  1823. (8) Thu May 24 17:30:30 2018: Debug: [eap] = updated
  1824. (8) Thu May 24 17:30:30 2018: Debug: policy rewrite_called_station_id {
  1825. (8) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  1826. (8) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  1827. (8) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  1828. (8) Thu May 24 17:30:30 2018: Debug: update request {
  1829. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  1830. (8) Thu May 24 17:30:30 2018: Debug: --> 94:18:82:b9:32:80
  1831. (8) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  1832. (8) Thu May 24 17:30:30 2018: Debug: if ("%{8}") {
  1833. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{8}
  1834. (8) Thu May 24 17:30:30 2018: Debug: -->
  1835. (8) Thu May 24 17:30:30 2018: Debug: if ("%{8}") -> FALSE
  1836. (8) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  1837. (8) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  1838. (8) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) {
  1839. (8) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  1840. (8) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  1841. (8) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  1842. (8) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  1843. (8) Thu May 24 17:30:30 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  1844. (8) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  1845. (8) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_called_station_id = updated
  1846. (8) Thu May 24 17:30:30 2018: Debug: [pap] = noop
  1847. (8) Thu May 24 17:30:30 2018: Debug: } # authorize = updated
  1848. (8) Thu May 24 17:30:30 2018: WARNING: You set Proxy-To-Realm = local, but it is a LOCAL realm! Cancelling proxy request.
  1849. (8) Thu May 24 17:30:30 2018: Debug: Found Auth-Type = eap
  1850. (8) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
  1851. (8) Thu May 24 17:30:30 2018: Debug: authenticate {
  1852. (8) Thu May 24 17:30:30 2018: Debug: eap: Expiring EAP session with state 0x3c540b463c5d11bc
  1853. (8) Thu May 24 17:30:30 2018: Debug: eap: Finished EAP session with state 0x3c540b463c5d11bc
  1854. (8) Thu May 24 17:30:30 2018: Debug: eap: Previous EAP request found for state 0x3c540b463c5d11bc, released from the list
  1855. (8) Thu May 24 17:30:30 2018: Debug: eap: Peer sent packet with method EAP MSCHAPv2 (26)
  1856. (8) Thu May 24 17:30:30 2018: Debug: eap: Calling submodule eap_mschapv2 to process data
  1857. (8) Thu May 24 17:30:30 2018: Debug: eap_mschapv2: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
  1858. (8) Thu May 24 17:30:30 2018: Debug: eap_mschapv2: Auth-Type MS-CHAP {
  1859. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'User-Name'} = &request:User-Name -> 'host/Admin-15-NB.PERSONALAMT.DE'
  1860. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'NAS-IP-Address'} = &request:NAS-IP-Address -> '172.20.9.150'
  1861. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'NAS-Port'} = &request:NAS-Port -> '1'
  1862. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Service-Type'} = &request:Service-Type -> 'Framed-User'
  1863. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Framed-Protocol'} = &request:Framed-Protocol -> 'PPP'
  1864. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Framed-MTU'} = &request:Framed-MTU -> '1480'
  1865. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'State'} = &request:State -> '0x3c540b463c5d11bc9b9de9eca83b76bb'
  1866. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Called-Station-Id'} = &request:Called-Station-Id -> '94:18:82:b9:32:80'
  1867. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Calling-Station-Id'} = &request:Calling-Station-Id -> '00:e0:4c:60:43:20'
  1868. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'NAS-Identifier'} = &request:NAS-Identifier -> 'Test'
  1869. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'NAS-Port-Type'} = &request:NAS-Port-Type -> 'Ethernet'
  1870. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Tunnel-Type'} = &request:Tunnel-Type -> 'VLAN'
  1871. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Tunnel-Medium-Type'} = &request:Tunnel-Medium-Type -> 'IEEE-802'
  1872. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Tunnel-Private-Group-Id'} = &request:Tunnel-Private-Group-Id -> '1'
  1873. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Event-Timestamp'} = &request:Event-Timestamp -> 'Jan 1 1970 01:00:00 CET'
  1874. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Connect-Info'} = &request:Connect-Info -> 'CONNECT Ethernet 1000Mbps Full duplex'
  1875. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'EAP-Message'} = &request:EAP-Message -> '0x0209005a1a02090055316159b5ecaefb2209298539b2a82fc5ad0000000000000000bee84769b24f2eb26a8e3902bb9448be4a3371baa932ccef00686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445'
  1876. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'NAS-Port-Id'} = &request:NAS-Port-Id -> '1'
  1877. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'FreeRADIUS-Proxied-To'} = &request:FreeRADIUS-Proxied-To -> '127.0.0.1'
  1878. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'HP-Capability-Advert'}[0] = &request:HP-Capability-Advert -> '0x011a0000000b28'
  1879. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'HP-Capability-Advert'}[1] = &request:HP-Capability-Advert -> '0x011a0000000b2e'
  1880. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'HP-Capability-Advert'}[2] = &request:HP-Capability-Advert -> '0x011a0000000b30'
  1881. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'HP-Capability-Advert'}[3] = &request:HP-Capability-Advert -> '0x011a0000000b3d'
  1882. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'HP-Capability-Advert'}[4] = &request:HP-Capability-Advert -> '0x0138'
  1883. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'HP-Capability-Advert'}[5] = &request:HP-Capability-Advert -> '0x013a'
  1884. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'HP-Capability-Advert'}[6] = &request:HP-Capability-Advert -> '0x0140'
  1885. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'HP-Capability-Advert'}[7] = &request:HP-Capability-Advert -> '0x0141'
  1886. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'HP-Capability-Advert'}[8] = &request:HP-Capability-Advert -> '0x0151'
  1887. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'MS-RAS-Vendor'} = &request:MS-RAS-Vendor -> '11'
  1888. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'MS-CHAP-Challenge'} = &request:MS-CHAP-Challenge -> '0xcdf91c10176e1e591aaaba0ec7e8ec7c'
  1889. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'MS-CHAP2-Response'} = &request:MS-CHAP2-Response -> '0x096f6159b5ecaefb2209298539b2a82fc5ad0000000000000000bee84769b24f2eb26a8e3902bb9448be4a3371baa932ccef'
  1890. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'EAP-Type'} = &request:EAP-Type -> 'MSCHAPv2'
  1891. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'Realm'} = &request:Realm -> 'null'
  1892. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'MS-CHAP-User-Name'} = &request:MS-CHAP-User-Name -> 'host/Admin-15-NB.PERSONALAMT.DE'
  1893. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_REQUEST{'PacketFence-Domain'} = &request:PacketFence-Domain -> 'LKMRBI'
  1894. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_CHECK{'Auth-Type'} = &control:Auth-Type -> 'eap'
  1895. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_CHECK{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'LOCAL'
  1896. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_CONFIG{'Auth-Type'} = &control:Auth-Type -> 'eap'
  1897. (8) Thu May 24 17:30:30 2018: Debug: packetfence: $RAD_CONFIG{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'LOCAL'
  1898. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b28'
  1899. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b2e'
  1900. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b30'
  1901. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b3d'
  1902. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0138'
  1903. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x013a'
  1904. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0140'
  1905. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0141'
  1906. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0151'
  1907. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:NAS-Port-Type = $RAD_REQUEST{'NAS-Port-Type'} -> 'Ethernet'
  1908. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:MS-RAS-Vendor = $RAD_REQUEST{'MS-RAS-Vendor'} -> '11'
  1909. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Service-Type = $RAD_REQUEST{'Service-Type'} -> 'Framed-User'
  1910. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Called-Station-Id = $RAD_REQUEST{'Called-Station-Id'} -> '94:18:82:b9:32:80'
  1911. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:State = $RAD_REQUEST{'State'} -> '0x3c540b463c5d11bc9b9de9eca83b76bb'
  1912. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:FreeRADIUS-Proxied-To = $RAD_REQUEST{'FreeRADIUS-Proxied-To'} -> '127.0.0.1'
  1913. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Tunnel-Type:0 = $RAD_REQUEST{'Tunnel-Type:0'} -> 'VLAN'
  1914. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Connect-Info = $RAD_REQUEST{'Connect-Info'} -> 'CONNECT Ethernet 1000Mbps Full duplex'
  1915. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Realm = $RAD_REQUEST{'Realm'} -> 'null'
  1916. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:EAP-Type = $RAD_REQUEST{'EAP-Type'} -> 'MSCHAPv2'
  1917. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '172.20.9.150'
  1918. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:NAS-Port-Id = $RAD_REQUEST{'NAS-Port-Id'} -> '1'
  1919. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Tunnel-Medium-Type:0 = $RAD_REQUEST{'Tunnel-Medium-Type:0'} -> 'IEEE-802'
  1920. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} -> '00:e0:4c:60:43:20'
  1921. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:MS-CHAP-User-Name = $RAD_REQUEST{'MS-CHAP-User-Name'} -> 'host/Admin-15-NB.PERSONALAMT.DE'
  1922. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:MS-CHAP-Challenge = $RAD_REQUEST{'MS-CHAP-Challenge'} -> '0xcdf91c10176e1e591aaaba0ec7e8ec7c'
  1923. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:PacketFence-Domain = $RAD_REQUEST{'PacketFence-Domain'} -> 'LKMRBI'
  1924. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Framed-Protocol = $RAD_REQUEST{'Framed-Protocol'} -> 'PPP'
  1925. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Tunnel-Private-Group-Id:0 = $RAD_REQUEST{'Tunnel-Private-Group-Id:0'} -> '1'
  1926. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:User-Name = $RAD_REQUEST{'User-Name'} -> 'host/Admin-15-NB.PERSONALAMT.DE'
  1927. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:NAS-Identifier = $RAD_REQUEST{'NAS-Identifier'} -> 'Test'
  1928. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Event-Timestamp = $RAD_REQUEST{'Event-Timestamp'} -> 'Jan 1 1970 01:00:00 CET'
  1929. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:EAP-Message = $RAD_REQUEST{'EAP-Message'} -> '0x0209005a1a02090055316159b5ecaefb2209298539b2a82fc5ad0000000000000000bee84769b24f2eb26a8e3902bb9448be4a3371baa932ccef00686f73742f41646d696e2d31352d4e422e504552534f4e414c414d542e4445'
  1930. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:MS-CHAP2-Response = $RAD_REQUEST{'MS-CHAP2-Response'} -> '0x096f6159b5ecaefb2209298539b2a82fc5ad0000000000000000bee84769b24f2eb26a8e3902bb9448be4a3371baa932ccef'
  1931. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:NAS-Port = $RAD_REQUEST{'NAS-Port'} -> '1'
  1932. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &request:Framed-MTU = $RAD_REQUEST{'Framed-MTU'} -> '1480'
  1933. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &control:Auth-Type = $RAD_CHECK{'Auth-Type'} -> 'eap'
  1934. (8) Thu May 24 17:30:30 2018: Debug: packetfence: &control:Proxy-To-Realm = $RAD_CHECK{'Proxy-To-Realm'} -> 'LOCAL'
  1935. (8) Thu May 24 17:30:30 2018: Debug: [packetfence] = noop
  1936. (8) Thu May 24 17:30:30 2018: Debug: if (&control:NT-Password && &control:NT-Password != "") {
  1937. (8) Thu May 24 17:30:30 2018: Debug: if (&control:NT-Password && &control:NT-Password != "") -> FALSE
  1938. (8) Thu May 24 17:30:30 2018: Debug: else {
  1939. (8) Thu May 24 17:30:30 2018: Debug: policy packetfence-mschap-authenticate {
  1940. (8) Thu May 24 17:30:30 2018: Debug: if (PacketFence-Domain) {
  1941. (8) Thu May 24 17:30:30 2018: Debug: if (PacketFence-Domain) -> TRUE
  1942. (8) Thu May 24 17:30:30 2018: Debug: if (PacketFence-Domain) {
  1943. (8) Thu May 24 17:30:30 2018: Debug: if ( "%{User-Name}" =~ /^host\/.*/) {
  1944. (8) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  1945. (8) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  1946. (8) Thu May 24 17:30:30 2018: Debug: if ( "%{User-Name}" =~ /^host\/.*/) -> TRUE
  1947. (8) Thu May 24 17:30:30 2018: Debug: if ( "%{User-Name}" =~ /^host\/.*/) {
  1948. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: Creating challenge hash with username: host/Admin-15-NB.PERSONALAMT.DE
  1949. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: Client is using MS-CHAPv2
  1950. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: Executing: /usr/bin/sudo /usr/sbin/chroot /chroots/%{PacketFence-Domain} /usr/local/pf/bin/ntlm_auth_wrapper --         --request-nt-key --username=%{mschap:User-Name:-None} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}:
  1951. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: EXPAND /chroots/%{PacketFence-Domain}
  1952. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: --> /chroots/LKMRBI
  1953. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: EXPAND --username=%{mschap:User-Name:-None}
  1954. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: --> --username=Admin-15-NB$
  1955. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: Creating challenge hash with username: host/Admin-15-NB.PERSONALAMT.DE
  1956. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: EXPAND --challenge=%{mschap:Challenge:-00}
  1957. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: --> --challenge=0d1410748d2ee087
  1958. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: EXPAND --nt-response=%{mschap:NT-Response:-00}
  1959. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: --> --nt-response=bee84769b24f2eb26a8e3902bb9448be4a3371baa932ccef
  1960. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: Program returned code (0) and output 'NT_KEY: 9238003533F2707D4BA51680D501B17B'
  1961. (8) Thu May 24 17:30:30 2018: Debug: chrooted_mschap_machine: Adding MS-CHAPv2 MPPE keys
  1962. (8) Thu May 24 17:30:30 2018: Debug: [chrooted_mschap_machine] = ok
  1963. (8) Thu May 24 17:30:30 2018: Debug: } # if ( "%{User-Name}" =~ /^host\/.*/) = ok
  1964. (8) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  1965. (8) Thu May 24 17:30:30 2018: Debug: } # if (PacketFence-Domain) = ok
  1966. (8) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  1967. (8) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-mschap-authenticate = ok
  1968. (8) Thu May 24 17:30:30 2018: Debug: } # else = ok
  1969. (8) Thu May 24 17:30:30 2018: Debug: } # Auth-Type MS-CHAP = ok
  1970. (8) Thu May 24 17:30:30 2018: Debug: MSCHAP Success
  1971. (8) Thu May 24 17:30:30 2018: Debug: eap: Sending EAP Request (code 1) ID 10 length 51
  1972. (8) Thu May 24 17:30:30 2018: Debug: eap: EAP session adding &reply:State = 0x3c540b463d5e11bc
  1973. (8) Thu May 24 17:30:30 2018: Debug: [eap] = handled
  1974. (8) Thu May 24 17:30:30 2018: Debug: } # authenticate = handled
  1975. (8) Thu May 24 17:30:30 2018: Debug: } # server packetfence-tunnel
  1976. (8) Thu May 24 17:30:30 2018: Debug: Virtual server sending reply
  1977. (8) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x010a00331a0309002e533d30394632373546394339393343453935314134424530343143343544313131333939454439443145
  1978. (8) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  1979. (8) Thu May 24 17:30:30 2018: Debug: State = 0x3c540b463d5e11bc9b9de9eca83b76bb
  1980. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Got tunneled reply code 11
  1981. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP-Message = 0x010a00331a0309002e533d30394632373546394339393343453935314134424530343143343544313131333939454439443145
  1982. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Message-Authenticator = 0x00000000000000000000000000000000
  1983. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: State = 0x3c540b463d5e11bc9b9de9eca83b76bb
  1984. (8) Thu May 24 17:30:30 2018: Debug: eap_peap: Got tunneled Access-Challenge
  1985. (8) Thu May 24 17:30:30 2018: Debug: eap: Sending EAP Request (code 1) ID 10 length 82
  1986. (8) Thu May 24 17:30:30 2018: Debug: eap: EAP session adding &reply:State = 0x49c411c241ce082f
  1987. (8) Thu May 24 17:30:30 2018: Debug: [eap] = handled
  1988. (8) Thu May 24 17:30:30 2018: Debug: } # authenticate = handled
  1989. (8) Thu May 24 17:30:30 2018: Debug: Using Post-Auth-Type Challenge
  1990. (8) Thu May 24 17:30:30 2018: Debug: Post-Auth-Type sub-section not found. Ignoring.
  1991. (8) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  1992. (8) Thu May 24 17:30:30 2018: Debug: Sent Access-Challenge Id 45 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  1993. (8) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x010a005219001703030047c204d6dc726b81dd07bdc2f29d1b871755f0e3c2803973b98daa082477ae639163c200fb1056db60fca4f92576f381118b5e69f851e4d690c42ecec8446757950ef1df41010fa0
  1994. (8) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  1995. (8) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c241ce082fb3b3797cce5894f4
  1996. (8) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3232
  1997. (8) Thu May 24 17:30:30 2018: Debug: Finished request
  1998. (9) Thu May 24 17:30:30 2018: Debug: Received Access-Request Id 195 from 172.20.5.79:52628 to 172.20.5.3:1812 length 391
  1999. (9) Thu May 24 17:30:30 2018: Debug: Framed-MTU = 1480
  2000. (9) Thu May 24 17:30:30 2018: Debug: NAS-IP-Address = 172.20.9.150
  2001. (9) Thu May 24 17:30:30 2018: Debug: NAS-Identifier = "Test"
  2002. (9) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  2003. (9) Thu May 24 17:30:30 2018: Debug: Service-Type = Framed-User
  2004. (9) Thu May 24 17:30:30 2018: Debug: Framed-Protocol = PPP
  2005. (9) Thu May 24 17:30:30 2018: Debug: NAS-Port = 1
  2006. (9) Thu May 24 17:30:30 2018: Debug: NAS-Port-Type = Ethernet
  2007. (9) Thu May 24 17:30:30 2018: Debug: NAS-Port-Id = "1"
  2008. (9) Thu May 24 17:30:30 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  2009. (9) Thu May 24 17:30:30 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  2010. (9) Thu May 24 17:30:30 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  2011. (9) Thu May 24 17:30:30 2018: Debug: Tunnel-Type:0 = VLAN
  2012. (9) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  2013. (9) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  2014. (9) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c241ce082fb3b3797cce5894f4
  2015. (9) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x020a00251900170303001a0000000000000003f85f904f5b005d854c2ef032be778bffdd0e
  2016. (9) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x02de20183a7587ca0dbadf2398e2e22b
  2017. (9) Thu May 24 17:30:30 2018: Debug: MS-RAS-Vendor = 11
  2018. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  2019. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  2020. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  2021. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  2022. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0138
  2023. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x013a
  2024. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0140
  2025. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0141
  2026. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0151
  2027. (9) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3233
  2028. (9) Thu May 24 17:30:30 2018: Debug: session-state: No cached attributes
  2029. (9) Thu May 24 17:30:30 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  2030. (9) Thu May 24 17:30:30 2018: Debug: authorize {
  2031. (9) Thu May 24 17:30:30 2018: Debug: update {
  2032. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  2033. (9) Thu May 24 17:30:30 2018: Debug: --> 172.20.5.79
  2034. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %l
  2035. (9) Thu May 24 17:30:30 2018: Debug: --> 1527175830
  2036. (9) Thu May 24 17:30:30 2018: Debug: } # update = noop
  2037. (9) Thu May 24 17:30:30 2018: Debug: policy packetfence-set-tenant-id {
  2038. (9) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  2039. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  2040. (9) Thu May 24 17:30:30 2018: Debug: --> 0
  2041. (9) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  2042. (9) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  2043. (9) Thu May 24 17:30:30 2018: Debug: update control {
  2044. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  2045. (9) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  2046. (9) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  2047. (9) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  2048. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  2049. (9) Thu May 24 17:30:30 2018: Debug: --> 0
  2050. (9) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  2051. (9) Thu May 24 17:30:30 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  2052. (9) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  2053. (9) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  2054. (9) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  2055. (9) Thu May 24 17:30:30 2018: Debug: update control {
  2056. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  2057. (9) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  2058. (9) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  2059. (9) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  2060. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  2061. (9) Thu May 24 17:30:30 2018: Debug: --> 1
  2062. (9) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  2063. (9) Thu May 24 17:30:30 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  2064. (9) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-set-tenant-id = noop
  2065. (9) Thu May 24 17:30:30 2018: Debug: policy rewrite_calling_station_id {
  2066. (9) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  2067. (9) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  2068. (9) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  2069. (9) Thu May 24 17:30:30 2018: Debug: update request {
  2070. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  2071. (9) Thu May 24 17:30:30 2018: Debug: --> 00:e0:4c:60:43:20
  2072. (9) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  2073. (9) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  2074. (9) Thu May 24 17:30:30 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  2075. (9) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  2076. (9) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_calling_station_id = updated
  2077. (9) Thu May 24 17:30:30 2018: Debug: policy rewrite_called_station_id {
  2078. (9) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  2079. (9) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  2080. (9) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  2081. (9) Thu May 24 17:30:30 2018: Debug: update request {
  2082. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  2083. (9) Thu May 24 17:30:30 2018: Debug: --> 94:18:82:b9:32:80
  2084. (9) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  2085. (9) Thu May 24 17:30:30 2018: Debug: if ("%{8}") {
  2086. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{8}
  2087. (9) Thu May 24 17:30:30 2018: Debug: -->
  2088. (9) Thu May 24 17:30:30 2018: Debug: if ("%{8}") -> FALSE
  2089. (9) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  2090. (9) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  2091. (9) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) {
  2092. (9) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  2093. (9) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  2094. (9) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  2095. (9) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  2096. (9) Thu May 24 17:30:30 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  2097. (9) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  2098. (9) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_called_station_id = updated
  2099. (9) Thu May 24 17:30:30 2018: Debug: policy filter_username {
  2100. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  2101. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name) -> TRUE
  2102. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  2103. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) {
  2104. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) -> FALSE
  2105. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  2106. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  2107. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) {
  2108. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  2109. (9) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  2110. (9) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  2111. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) {
  2112. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  2113. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) {
  2114. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  2115. (9) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name) = updated
  2116. (9) Thu May 24 17:30:30 2018: Debug: } # policy filter_username = updated
  2117. (9) Thu May 24 17:30:30 2018: Debug: policy filter_password {
  2118. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  2119. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  2120. (9) Thu May 24 17:30:30 2018: Debug: } # policy filter_password = updated
  2121. (9) Thu May 24 17:30:30 2018: Debug: [preprocess] = ok
  2122. (9) Thu May 24 17:30:30 2018: Debug: suffix: Checking for suffix after "@"
  2123. (9) Thu May 24 17:30:30 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  2124. (9) Thu May 24 17:30:30 2018: Debug: [suffix] = noop
  2125. (9) Thu May 24 17:30:30 2018: Debug: ntdomain: Checking for prefix before "\"
  2126. (9) Thu May 24 17:30:30 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  2127. (9) Thu May 24 17:30:30 2018: Debug: ntdomain: Found realm "null"
  2128. (9) Thu May 24 17:30:30 2018: Debug: ntdomain: Adding Realm = "null"
  2129. (9) Thu May 24 17:30:30 2018: Debug: ntdomain: Authentication realm is LOCAL
  2130. (9) Thu May 24 17:30:30 2018: Debug: [ntdomain] = ok
  2131. (9) Thu May 24 17:30:30 2018: Debug: eap: Peer sent EAP Response (code 2) ID 10 length 37
  2132. (9) Thu May 24 17:30:30 2018: Debug: eap: Continuing tunnel setup
  2133. (9) Thu May 24 17:30:30 2018: Debug: [eap] = ok
  2134. (9) Thu May 24 17:30:30 2018: Debug: } # authorize = ok
  2135. (9) Thu May 24 17:30:30 2018: Debug: Found Auth-Type = eap
  2136. (9) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  2137. (9) Thu May 24 17:30:30 2018: Debug: authenticate {
  2138. (9) Thu May 24 17:30:30 2018: Debug: eap: Expiring EAP session with state 0x3c540b463d5e11bc
  2139. (9) Thu May 24 17:30:30 2018: Debug: eap: Finished EAP session with state 0x49c411c241ce082f
  2140. (9) Thu May 24 17:30:30 2018: Debug: eap: Previous EAP request found for state 0x49c411c241ce082f, released from the list
  2141. (9) Thu May 24 17:30:30 2018: Debug: eap: Peer sent packet with method EAP PEAP (25)
  2142. (9) Thu May 24 17:30:30 2018: Debug: eap: Calling submodule eap_peap to process data
  2143. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Continuing EAP-TLS
  2144. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls verify] = ok
  2145. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Done initial handshake
  2146. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls process] = ok
  2147. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Session established. Decoding tunneled attributes
  2148. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: PEAP state phase2
  2149. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP method MSCHAPv2 (26)
  2150. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Got tunneled request
  2151. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP-Message = 0x020a00061a03
  2152. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Setting User-Name to host/Admin-15-NB.PERSONALAMT.DE
  2153. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Sending tunneled request to packetfence-tunnel
  2154. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP-Message = 0x020a00061a03
  2155. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1
  2156. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  2157. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: State = 0x3c540b463d5e11bc9b9de9eca83b76bb
  2158. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Framed-MTU = 1480
  2159. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-IP-Address = 172.20.9.150
  2160. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Identifier = "Test"
  2161. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Service-Type = Framed-User
  2162. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Framed-Protocol = PPP
  2163. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Port = 1
  2164. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Port-Type = Ethernet
  2165. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: NAS-Port-Id = "1"
  2166. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Calling-Station-Id := "00:e0:4c:60:43:20"
  2167. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  2168. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Type:0 = VLAN
  2169. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Medium-Type:0 = IEEE-802
  2170. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Private-Group-Id:0 = "1"
  2171. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: MS-RAS-Vendor = 11
  2172. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b28
  2173. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b2e
  2174. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b30
  2175. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x011a0000000b3d
  2176. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0138
  2177. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x013a
  2178. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0140
  2179. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0141
  2180. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: HP-Capability-Advert = 0x0151
  2181. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Called-Station-Id := "94:18:82:b9:32:80"
  2182. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Event-Timestamp = "Mai 24 2018 17:30:30 CEST"
  2183. (9) Thu May 24 17:30:30 2018: Debug: Virtual server packetfence-tunnel received request
  2184. (9) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x020a00061a03
  2185. (9) Thu May 24 17:30:30 2018: Debug: FreeRADIUS-Proxied-To = 127.0.0.1
  2186. (9) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  2187. (9) Thu May 24 17:30:30 2018: Debug: State = 0x3c540b463d5e11bc9b9de9eca83b76bb
  2188. (9) Thu May 24 17:30:30 2018: Debug: Framed-MTU = 1480
  2189. (9) Thu May 24 17:30:30 2018: Debug: NAS-IP-Address = 172.20.9.150
  2190. (9) Thu May 24 17:30:30 2018: Debug: NAS-Identifier = "Test"
  2191. (9) Thu May 24 17:30:30 2018: Debug: Service-Type = Framed-User
  2192. (9) Thu May 24 17:30:30 2018: Debug: Framed-Protocol = PPP
  2193. (9) Thu May 24 17:30:30 2018: Debug: NAS-Port = 1
  2194. (9) Thu May 24 17:30:30 2018: Debug: NAS-Port-Type = Ethernet
  2195. (9) Thu May 24 17:30:30 2018: Debug: NAS-Port-Id = "1"
  2196. (9) Thu May 24 17:30:30 2018: Debug: Calling-Station-Id := "00:e0:4c:60:43:20"
  2197. (9) Thu May 24 17:30:30 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  2198. (9) Thu May 24 17:30:30 2018: Debug: Tunnel-Type:0 = VLAN
  2199. (9) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  2200. (9) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  2201. (9) Thu May 24 17:30:30 2018: Debug: MS-RAS-Vendor = 11
  2202. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  2203. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  2204. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  2205. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  2206. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0138
  2207. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x013a
  2208. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0140
  2209. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0141
  2210. (9) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0151
  2211. (9) Thu May 24 17:30:30 2018: Debug: Called-Station-Id := "94:18:82:b9:32:80"
  2212. (9) Thu May 24 17:30:30 2018: Debug: Event-Timestamp = "Mai 24 2018 17:30:30 CEST"
  2213. (9) Thu May 24 17:30:30 2018: WARNING: Outer and inner identities are the same. User privacy is compromised.
  2214. (9) Thu May 24 17:30:30 2018: Debug: server packetfence-tunnel {
  2215. (9) Thu May 24 17:30:30 2018: Debug: session-state: No cached attributes
  2216. (9) Thu May 24 17:30:30 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
  2217. (9) Thu May 24 17:30:30 2018: Debug: authorize {
  2218. (9) Thu May 24 17:30:30 2018: Debug: if ( outer.EAP-Type == TTLS) {
  2219. (9) Thu May 24 17:30:30 2018: Debug: if ( outer.EAP-Type == TTLS) -> FALSE
  2220. (9) Thu May 24 17:30:30 2018: Debug: policy filter_username {
  2221. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  2222. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name) -> TRUE
  2223. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  2224. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) {
  2225. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) -> FALSE
  2226. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  2227. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  2228. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) {
  2229. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  2230. (9) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  2231. (9) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  2232. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) {
  2233. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  2234. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) {
  2235. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  2236. (9) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name) = notfound
  2237. (9) Thu May 24 17:30:30 2018: Debug: } # policy filter_username = notfound
  2238. (9) Thu May 24 17:30:30 2018: Debug: [mschap] = noop
  2239. (9) Thu May 24 17:30:30 2018: Debug: suffix: Checking for suffix after "@"
  2240. (9) Thu May 24 17:30:30 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  2241. (9) Thu May 24 17:30:30 2018: Debug: [suffix] = noop
  2242. (9) Thu May 24 17:30:30 2018: Debug: ntdomain: Checking for prefix before "\"
  2243. (9) Thu May 24 17:30:30 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  2244. (9) Thu May 24 17:30:30 2018: Debug: ntdomain: Found realm "null"
  2245. (9) Thu May 24 17:30:30 2018: Debug: ntdomain: Adding Realm = "null"
  2246. (9) Thu May 24 17:30:30 2018: Debug: ntdomain: Authentication realm is LOCAL
  2247. (9) Thu May 24 17:30:30 2018: Debug: [ntdomain] = ok
  2248. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'User-Name'} = &request:User-Name -> 'host/Admin-15-NB.PERSONALAMT.DE'
  2249. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-IP-Address'} = &request:NAS-IP-Address -> '172.20.9.150'
  2250. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Port'} = &request:NAS-Port -> '1'
  2251. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Service-Type'} = &request:Service-Type -> 'Framed-User'
  2252. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Framed-Protocol'} = &request:Framed-Protocol -> 'PPP'
  2253. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Framed-MTU'} = &request:Framed-MTU -> '1480'
  2254. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'State'} = &request:State -> '0x3c540b463d5e11bc9b9de9eca83b76bb'
  2255. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Called-Station-Id'} = &request:Called-Station-Id -> '94:18:82:b9:32:80'
  2256. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Calling-Station-Id'} = &request:Calling-Station-Id -> '00:e0:4c:60:43:20'
  2257. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Identifier'} = &request:NAS-Identifier -> 'Test'
  2258. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Port-Type'} = &request:NAS-Port-Type -> 'Ethernet'
  2259. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Tunnel-Type'} = &request:Tunnel-Type -> 'VLAN'
  2260. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Tunnel-Medium-Type'} = &request:Tunnel-Medium-Type -> 'IEEE-802'
  2261. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Tunnel-Private-Group-Id'} = &request:Tunnel-Private-Group-Id -> '1'
  2262. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Event-Timestamp'} = &request:Event-Timestamp -> 'Mai 24 2018 17:30:30 CEST'
  2263. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Connect-Info'} = &request:Connect-Info -> 'CONNECT Ethernet 1000Mbps Full duplex'
  2264. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'EAP-Message'} = &request:EAP-Message -> '0x020a00061a03'
  2265. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'NAS-Port-Id'} = &request:NAS-Port-Id -> '1'
  2266. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'FreeRADIUS-Proxied-To'} = &request:FreeRADIUS-Proxied-To -> '127.0.0.1'
  2267. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[0] = &request:HP-Capability-Advert -> '0x011a0000000b28'
  2268. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[1] = &request:HP-Capability-Advert -> '0x011a0000000b2e'
  2269. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[2] = &request:HP-Capability-Advert -> '0x011a0000000b30'
  2270. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[3] = &request:HP-Capability-Advert -> '0x011a0000000b3d'
  2271. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[4] = &request:HP-Capability-Advert -> '0x0138'
  2272. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[5] = &request:HP-Capability-Advert -> '0x013a'
  2273. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[6] = &request:HP-Capability-Advert -> '0x0140'
  2274. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[7] = &request:HP-Capability-Advert -> '0x0141'
  2275. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'HP-Capability-Advert'}[8] = &request:HP-Capability-Advert -> '0x0151'
  2276. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'MS-RAS-Vendor'} = &request:MS-RAS-Vendor -> '11'
  2277. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: $RAD_REQUEST{'Realm'} = &request:Realm -> 'null'
  2278. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b28'
  2279. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b2e'
  2280. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b30'
  2281. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x011a0000000b3d'
  2282. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0138'
  2283. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x013a'
  2284. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0140'
  2285. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0141'
  2286. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:HP-Capability-Advert += $RAD_REQUEST{'HP-Capability-Advert'} -> '0x0151'
  2287. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Port-Type = $RAD_REQUEST{'NAS-Port-Type'} -> 'Ethernet'
  2288. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:MS-RAS-Vendor = $RAD_REQUEST{'MS-RAS-Vendor'} -> '11'
  2289. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Service-Type = $RAD_REQUEST{'Service-Type'} -> 'Framed-User'
  2290. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Called-Station-Id = $RAD_REQUEST{'Called-Station-Id'} -> '94:18:82:b9:32:80'
  2291. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:State = $RAD_REQUEST{'State'} -> '0x3c540b463d5e11bc9b9de9eca83b76bb'
  2292. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:FreeRADIUS-Proxied-To = $RAD_REQUEST{'FreeRADIUS-Proxied-To'} -> '127.0.0.1'
  2293. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Tunnel-Type:0 = $RAD_REQUEST{'Tunnel-Type:0'} -> 'VLAN'
  2294. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Connect-Info = $RAD_REQUEST{'Connect-Info'} -> 'CONNECT Ethernet 1000Mbps Full duplex'
  2295. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Realm = $RAD_REQUEST{'Realm'} -> 'null'
  2296. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '172.20.9.150'
  2297. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Port-Id = $RAD_REQUEST{'NAS-Port-Id'} -> '1'
  2298. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Tunnel-Medium-Type:0 = $RAD_REQUEST{'Tunnel-Medium-Type:0'} -> 'IEEE-802'
  2299. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} -> '00:e0:4c:60:43:20'
  2300. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:PacketFence-Domain = $RAD_REQUEST{'PacketFence-Domain'} -> 'LKMRBI'
  2301. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Framed-Protocol = $RAD_REQUEST{'Framed-Protocol'} -> 'PPP'
  2302. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Tunnel-Private-Group-Id:0 = $RAD_REQUEST{'Tunnel-Private-Group-Id:0'} -> '1'
  2303. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:User-Name = $RAD_REQUEST{'User-Name'} -> 'host/Admin-15-NB.PERSONALAMT.DE'
  2304. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Identifier = $RAD_REQUEST{'NAS-Identifier'} -> 'Test'
  2305. (9) Thu May 24 17:30:30 2018: ERROR: packetfence-multi-domain: Failed to create pair - failed to parse time string "Mai 24 2018 17:30:30 CEST"
  2306. (9) Thu May 24 17:30:30 2018: ERROR: packetfence-multi-domain: &request:Event-Timestamp = $RAD_REQUEST{'Event-Timestamp'} -> 'Mai 24 2018 17:30:30 CEST'
  2307. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:EAP-Message = $RAD_REQUEST{'EAP-Message'} -> '0x020a00061a03'
  2308. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:NAS-Port = $RAD_REQUEST{'NAS-Port'} -> '1'
  2309. (9) Thu May 24 17:30:30 2018: Debug: packetfence-multi-domain: &request:Framed-MTU = $RAD_REQUEST{'Framed-MTU'} -> '1480'
  2310. (9) Thu May 24 17:30:30 2018: Debug: [packetfence-multi-domain] = updated
  2311. (9) Thu May 24 17:30:30 2018: Debug: update control {
  2312. (9) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  2313. (9) Thu May 24 17:30:30 2018: Debug: eap: Peer sent EAP Response (code 2) ID 10 length 6
  2314. (9) Thu May 24 17:30:30 2018: Debug: eap: No EAP Start, assuming it's an on-going EAP conversation
  2315. (9) Thu May 24 17:30:30 2018: Debug: [eap] = updated
  2316. (9) Thu May 24 17:30:30 2018: Debug: policy rewrite_called_station_id {
  2317. (9) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  2318. (9) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  2319. (9) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  2320. (9) Thu May 24 17:30:30 2018: Debug: update request {
  2321. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  2322. (9) Thu May 24 17:30:30 2018: Debug: --> 94:18:82:b9:32:80
  2323. (9) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  2324. (9) Thu May 24 17:30:30 2018: Debug: if ("%{8}") {
  2325. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{8}
  2326. (9) Thu May 24 17:30:30 2018: Debug: -->
  2327. (9) Thu May 24 17:30:30 2018: Debug: if ("%{8}") -> FALSE
  2328. (9) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  2329. (9) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  2330. (9) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) {
  2331. (9) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  2332. (9) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  2333. (9) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  2334. (9) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  2335. (9) Thu May 24 17:30:30 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  2336. (9) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  2337. (9) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_called_station_id = updated
  2338. (9) Thu May 24 17:30:30 2018: Debug: [pap] = noop
  2339. (9) Thu May 24 17:30:30 2018: Debug: } # authorize = updated
  2340. (9) Thu May 24 17:30:30 2018: WARNING: You set Proxy-To-Realm = local, but it is a LOCAL realm! Cancelling proxy request.
  2341. (9) Thu May 24 17:30:30 2018: Debug: Found Auth-Type = eap
  2342. (9) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
  2343. (9) Thu May 24 17:30:30 2018: Debug: authenticate {
  2344. (9) Thu May 24 17:30:30 2018: Debug: eap: Expiring EAP session with state 0x3c540b463d5e11bc
  2345. (9) Thu May 24 17:30:30 2018: Debug: eap: Finished EAP session with state 0x3c540b463d5e11bc
  2346. (9) Thu May 24 17:30:30 2018: Debug: eap: Previous EAP request found for state 0x3c540b463d5e11bc, released from the list
  2347. (9) Thu May 24 17:30:30 2018: Debug: eap: Peer sent packet with method EAP MSCHAPv2 (26)
  2348. (9) Thu May 24 17:30:30 2018: Debug: eap: Calling submodule eap_mschapv2 to process data
  2349. (9) Thu May 24 17:30:30 2018: Debug: eap: Sending EAP Success (code 3) ID 10 length 4
  2350. (9) Thu May 24 17:30:30 2018: Debug: eap: Freeing handler
  2351. (9) Thu May 24 17:30:30 2018: Debug: [eap] = ok
  2352. (9) Thu May 24 17:30:30 2018: Debug: } # authenticate = ok
  2353. (9) Thu May 24 17:30:30 2018: Debug: # Executing section post-auth from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
  2354. (9) Thu May 24 17:30:30 2018: Debug: post-auth {
  2355. (9) Thu May 24 17:30:30 2018: Debug: policy packetfence-set-tenant-id {
  2356. (9) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  2357. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  2358. (9) Thu May 24 17:30:30 2018: Debug: --> 0
  2359. (9) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  2360. (9) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  2361. (9) Thu May 24 17:30:30 2018: Debug: update control {
  2362. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  2363. (9) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  2364. (9) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  2365. (9) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  2366. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  2367. (9) Thu May 24 17:30:30 2018: Debug: --> 0
  2368. (9) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  2369. (9) Thu May 24 17:30:30 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  2370. (9) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  2371. (9) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  2372. (9) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  2373. (9) Thu May 24 17:30:30 2018: Debug: update control {
  2374. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  2375. (9) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  2376. (9) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  2377. (9) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  2378. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  2379. (9) Thu May 24 17:30:30 2018: Debug: --> 1
  2380. (9) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  2381. (9) Thu May 24 17:30:30 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  2382. (9) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-set-tenant-id = noop
  2383. (9) Thu May 24 17:30:30 2018: Debug: rest: Expanding URI components
  2384. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND http://127.0.0.1:7070
  2385. (9) Thu May 24 17:30:30 2018: Debug: rest: --> http://127.0.0.1:7070
  2386. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND //radius/rest/authorize
  2387. (9) Thu May 24 17:30:30 2018: Debug: rest: --> //radius/rest/authorize
  2388. (9) Thu May 24 17:30:30 2018: Debug: rest: Sending HTTP POST to "http://127.0.0.1:7070//radius/rest/authorize"
  2389. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "User-Name"
  2390. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "NAS-IP-Address"
  2391. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "NAS-Port"
  2392. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Service-Type"
  2393. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Framed-Protocol"
  2394. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Framed-MTU"
  2395. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "State"
  2396. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Called-Station-Id"
  2397. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Calling-Station-Id"
  2398. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "NAS-Identifier"
  2399. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "NAS-Port-Type"
  2400. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Tunnel-Type"
  2401. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Tunnel-Medium-Type"
  2402. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Tunnel-Private-Group-Id"
  2403. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Event-Timestamp"
  2404. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Connect-Info"
  2405. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "EAP-Message"
  2406. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "NAS-Port-Id"
  2407. (9) Thu May 24 17:30:30 2018: Debug: rest: Returning 1012 bytes of JSON data (buffer full or chunk exceeded)
  2408. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "NAS-Port-Id"
  2409. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "FreeRADIUS-Proxied-To"
  2410. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "HP-Capability-Advert"
  2411. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "MS-RAS-Vendor"
  2412. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "EAP-Type"
  2413. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "Realm"
  2414. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "SQL-User-Name"
  2415. (9) Thu May 24 17:30:30 2018: Debug: rest: Encoding attribute "PacketFence-Domain"
  2416. (9) Thu May 24 17:30:30 2018: Debug: rest: Processing response header
  2417. (9) Thu May 24 17:30:30 2018: Debug: rest: Status : 100 (Continue)
  2418. (9) Thu May 24 17:30:30 2018: Debug: rest: Continuing...
  2419. (9) Thu May 24 17:30:30 2018: Debug: rest: Processing response header
  2420. (9) Thu May 24 17:30:30 2018: Debug: rest: Status : 200 (OK)
  2421. (9) Thu May 24 17:30:30 2018: Debug: rest: Type : json (application/json)
  2422. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Profile"
  2423. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND AD
  2424. (9) Thu May 24 17:30:30 2018: Debug: rest: --> AD
  2425. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Profile := "AD"
  2426. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Role"
  2427. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND default
  2428. (9) Thu May 24 17:30:30 2018: Debug: rest: --> default
  2429. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Role := "default"
  2430. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Eap-Type"
  2431. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 26
  2432. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 26
  2433. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Eap-Type := "26"
  2434. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "Tunnel-Type"
  2435. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 13
  2436. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 13
  2437. (9) Thu May 24 17:30:30 2018: Debug: rest: Tunnel-Type := VLAN
  2438. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-AutoReg"
  2439. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 1
  2440. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 1
  2441. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-AutoReg := "1"
  2442. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Authorization-Status"
  2443. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND allow
  2444. (9) Thu May 24 17:30:30 2018: Debug: rest: --> allow
  2445. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Authorization-Status := "allow"
  2446. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "Tunnel-Private-Group-ID"
  2447. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 1
  2448. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 1
  2449. (9) Thu May 24 17:30:30 2018: Debug: rest: Tunnel-Private-Group-Id := "1"
  2450. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Request-Time"
  2451. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 1527175830
  2452. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 1527175830
  2453. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Request-Time := 1527175830
  2454. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Switch-Ip-Address"
  2455. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 172.20.9.150
  2456. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 172.20.9.150
  2457. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Switch-Ip-Address := "172.20.9.150"
  2458. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-IsPhone"
  2459. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-IsPhone := ""
  2460. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-UserName"
  2461. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND host/Admin-15-NB.PERSONALAMT.DE
  2462. (9) Thu May 24 17:30:30 2018: Debug: rest: --> host/Admin-15-NB.PERSONALAMT.DE
  2463. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-UserName := "host/Admin-15-NB.PERSONALAMT.DE"
  2464. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Switch-Mac"
  2465. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 94:18:82:b9:32:80
  2466. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 94:18:82:b9:32:80
  2467. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Switch-Mac := "94:18:82:b9:32:80"
  2468. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Switch-Id"
  2469. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 172.20.9.150
  2470. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 172.20.9.150
  2471. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Switch-Id := "172.20.9.150"
  2472. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "Tunnel-Medium-Type"
  2473. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 6
  2474. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 6
  2475. (9) Thu May 24 17:30:30 2018: Debug: rest: Tunnel-Medium-Type := IEEE-802
  2476. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Computer-Name"
  2477. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND Admin-15-NB
  2478. (9) Thu May 24 17:30:30 2018: Debug: rest: --> Admin-15-NB
  2479. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Computer-Name := "Admin-15-NB"
  2480. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Mac"
  2481. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 00:e0:4c:60:43:20
  2482. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 00:e0:4c:60:43:20
  2483. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Mac := "00:e0:4c:60:43:20"
  2484. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-IfIndex"
  2485. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND 1
  2486. (9) Thu May 24 17:30:30 2018: Debug: rest: --> 1
  2487. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-IfIndex := "1"
  2488. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Connection-Type"
  2489. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND Ethernet-EAP
  2490. (9) Thu May 24 17:30:30 2018: Debug: rest: --> Ethernet-EAP
  2491. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Connection-Type := "Ethernet-EAP"
  2492. (9) Thu May 24 17:30:30 2018: Debug: rest: Parsing attribute "control:PacketFence-Status"
  2493. (9) Thu May 24 17:30:30 2018: Debug: rest: EXPAND reg
  2494. (9) Thu May 24 17:30:30 2018: Debug: rest: --> reg
  2495. (9) Thu May 24 17:30:30 2018: Debug: rest: PacketFence-Status := "reg"
  2496. (9) Thu May 24 17:30:30 2018: Debug: [rest] = updated
  2497. (9) Thu May 24 17:30:30 2018: Debug: update {
  2498. (9) Thu May 24 17:30:30 2018: Debug: } # update = noop
  2499. (9) Thu May 24 17:30:30 2018: Debug: if (&control:PacketFence-Authorization-Status == "deny") {
  2500. (9) Thu May 24 17:30:30 2018: Debug: if (&control:PacketFence-Authorization-Status == "deny") -> FALSE
  2501. (9) Thu May 24 17:30:30 2018: Debug: else {
  2502. (9) Thu May 24 17:30:30 2018: Debug: policy packetfence-audit-log-accept {
  2503. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name != "dummy") {
  2504. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name != "dummy") -> TRUE
  2505. (9) Thu May 24 17:30:30 2018: Debug: if (&User-Name != "dummy") {
  2506. (9) Thu May 24 17:30:30 2018: Debug: policy request-timing {
  2507. (9) Thu May 24 17:30:30 2018: Debug: if (control:PacketFence-Request-Time != 0) {
  2508. (9) Thu May 24 17:30:30 2018: Debug: if (control:PacketFence-Request-Time != 0) -> TRUE
  2509. (9) Thu May 24 17:30:30 2018: Debug: if (control:PacketFence-Request-Time != 0) {
  2510. (9) Thu May 24 17:30:30 2018: Debug: update control {
  2511. (9) Thu May 24 17:30:30 2018: Debug: Not a number at ""
  2512. (9) Thu May 24 17:30:30 2018: Debug: EXPAND %{expr: %{control:PacketFence-Request-Time} - %{control:Tmp-Integer-0}}
  2513. (9) Thu May 24 17:30:30 2018: Debug: -->
  2514. (9) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  2515. (9) Thu May 24 17:30:30 2018: Debug: } # if (control:PacketFence-Request-Time != 0) = noop
  2516. (9) Thu May 24 17:30:30 2018: Debug: } # policy request-timing = noop
  2517. (9) Thu May 24 17:30:30 2018: Debug: sql: EXPAND type.accept.query
  2518. (9) Thu May 24 17:30:30 2018: Debug: sql: --> type.accept.query
  2519. (9) Thu May 24 17:30:30 2018: Debug: sql: Using query template 'query'
  2520. (9) Thu May 24 17:30:30 2018: Debug: sql: EXPAND %{User-Name}
  2521. (9) Thu May 24 17:30:30 2018: Debug: sql: --> host/Admin-15-NB.PERSONALAMT.DE
  2522. (9) Thu May 24 17:30:30 2018: Debug: sql: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  2523. (9) Thu May 24 17:30:30 2018: Debug: sql: EXPAND INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name, stripped_user_name, realm, event_type, switch_id, switch_mac, switch_ip_address, radius_source_ip_address, called_station_id, calling_station_id, nas_port_type, ssid, nas_port_id, ifindex, nas_port, connection_type, nas_ip_address, nas_identifier, auth_status, reason, auth_type, eap_type, role, node_status, profile, source, auto_reg, is_phone, pf_domain, uuid, radius_request, radius_reply, request_time, tenant_id) VALUES ( '%{request:Calling-Station-Id}', '%{request:Framed-IP-Address}', '%{%{control:PacketFence-Computer-Name}:-N/A}', '%{request:User-Name}', '%{request:Stripped-User-Name}', '%{request:Realm}', 'Radius-Access-Request', '%{%{control:PacketFence-Switch-Id}:-N/A}', '%{%{control:PacketFence-Switch-Mac}:-N/A}', '%{%{control:PacketFence-Switch-Ip-Address}:-N/A}', '%{Packet-Src-IP-Address}', '%{request:Called-Station-Id}', '%{request:Calling-Station-Id}', '%{request:NAS-Port-Type}', '%{request:Called-Station-SSID}', '%{request:NAS-Port-Id}', '%{%{control:PacketFence-IfIndex}:-N/A}', '%{request:NAS-Port}', '%{%{control:PacketFence-Connection-Type}:-N/A}', '%{request:NAS-IP-Address}', '%{request:NAS-Identifier}', 'Accept', '%{request:Module-Failure-Message}', '%{control:Auth-Type}', '%{request:EAP-Type}', '%{%{control:PacketFence-Role}:-N/A}', '%{%{control:PacketFence-Status}:-N/A}', '%{%{control:PacketFence-Profile}:-N/A}', '%{%{control:PacketFence-Source}:-N/A}', '%{%{control:PacketFence-AutoReg}:-0}', '%{%{control:PacketFence-IsPhone}:-0}', '%{request:PacketFence-Domain}', '', '%{pairs:&request:[*]}','%{pairs:&reply:[*]}', '%{control:PacketFence-Request-Time}', '%{control:PacketFence-Tenant-Id}')
  2524. (9) Thu May 24 17:30:30 2018: Debug: sql: --> INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name, stripped_user_name, realm, event_type, switch_id, switch_mac, switch_ip_address, radius_source_ip_address, called_station_id, calling_station_id, nas_port_type, ssid, nas_port_id, ifindex, nas_port, connection_type, nas_ip_address, nas_identifier, auth_status, reason, auth_type, eap_type, role, node_status, profile, source, auto_reg, is_phone, pf_domain, uuid, radius_request, radius_reply, request_time, tenant_id) VALUES ( '00:e0:4c:60:43:20', '', 'Admin-15-NB', 'host/Admin-15-NB.PERSONALAMT.DE', '', 'null', 'Radius-Access-Request', '172.20.9.150', '94:18:82:b9:32:80', '172.20.9.150', '172.20.5.79', '94:18:82:b9:32:80', '00:e0:4c:60:43:20', 'Ethernet', '', '1', '1', '1', 'Ethernet-EAP', '172.20.9.150', 'Test', 'Accept', '', 'eap', 'MSCHAPv2', 'default', 'reg', 'AD', 'N/A', '1', '0', 'LKMRBI', '', 'User-Name =3D =22host/Admin-15-NB.PERSONALAMT.DE=22=2C NAS-IP-Address =3D 172.20.9.150=2C NAS-Port =3D 1=2C Service-Type =3D Framed-User=2C Framed-Protocol =3D PPP=2C Framed-MTU =3D 1480=2C State =3D 0x3c540b463d5e11bc9b9de9eca83b76bb=2C Called-Station-Id =3D =2294:18:82:b9:32:80=22=2C Calling-Station-Id =3D =2200:e0:4c:60:43:20=22=2C NAS-Identifier =3D =22Test=22=2C NAS-Port-Type =3D Ethernet=2C Tunnel-Type:0 =3D VLAN=2C Tunnel-Medium-Type:0 =3D IEEE-802=2C Tunnel-Private-Group-Id:0 =3D =221=22=2C Event-Timestamp =3D =22Jan 1 1970 01:00:00 CET=22=2C Connect-Info =3D =22CONNECT Ethernet 1000Mbps Full duplex=22=2C EAP-Message =3D 0x020a00061a03=2C NAS-Port-Id =3D =221=22=2C FreeRADIUS-Proxied-To =3D 127.0.0.1=2C HP-Capability-Advert =3D 0x011a0000000b28=2C HP-Capability-Advert =3D 0x011a0000000b2e=2C HP-Capability-Advert =3D 0x011a0000000b30=2C HP-Capability-Advert =3D 0x011a0000000b3d=2C HP-Capability-Advert =3D 0x0138=2C HP-Capability-Advert =3D 0x013a=2C HP-Capability-Advert =3D 0x0140=2C HP-Capability-Advert =3D 0x0141=2C HP-Capability-Advert =3D 0x0151=2C MS-RAS-Vendor =3D 11=2C EAP-Type =3D MSCHAPv2=2C Realm =3D =22null=22=2C PacketFence-Domain =3D =22LKMRBI=22=2C User-Password =3D =22=2A=2A=2A=2A=2A=2A=22=2C SQL-User-Name =3D =22host/Admin-15-NB.PERSONALAMT.DE=22','MS-MPPE-Encryption-Policy =3D Encryption-Required=2C MS-MPPE-Encryption-Types =3D 4=2C MS-MPPE-Send-Key =3D 0x35ed63e74ce1691755c714e79b7a0ede=2C MS-MPPE-Recv-Key =3D 0x7e7adfcaee73aa321bb088e4d809fd78=2C EAP-Message =3D 0x030a0004=2C Message-Authenticator =3D 0x00000000000000000000000000000000=2C User-Name =3D =22host/Admin-15-NB.PERSONALAMT.DE=22=2C Tunnel-Type =3D VLAN=2C Tunnel-Private-Group-Id =3D =221=22=2C Tunnel-Medium-Type =3D IEEE-802', '0', '1')
  2525. (9) Thu May 24 17:30:30 2018: Debug: sql: Executing query: INSERT INTO radius_audit_log ( mac, ip, computer_name, user_name, stripped_user_name, realm, event_type, switch_id, switch_mac, switch_ip_address, radius_source_ip_address, called_station_id, calling_station_id, nas_port_type, ssid, nas_port_id, ifindex, nas_port, connection_type, nas_ip_address, nas_identifier, auth_status, reason, auth_type, eap_type, role, node_status, profile, source, auto_reg, is_phone, pf_domain, uuid, radius_request, radius_reply, request_time, tenant_id) VALUES ( '00:e0:4c:60:43:20', '', 'Admin-15-NB', 'host/Admin-15-NB.PERSONALAMT.DE', '', 'null', 'Radius-Access-Request', '172.20.9.150', '94:18:82:b9:32:80', '172.20.9.150', '172.20.5.79', '94:18:82:b9:32:80', '00:e0:4c:60:43:20', 'Ethernet', '', '1', '1', '1', 'Ethernet-EAP', '172.20.9.150', 'Test', 'Accept', '', 'eap', 'MSCHAPv2', 'default', 'reg', 'AD', 'N/A', '1', '0', 'LKMRBI', '', 'User-Name =3D =22host/Admin-15-NB.PERSONALAMT.DE=22=2C NAS-IP-Address =3D 172.20.9.150=2C NAS-Port =3D 1=2C Service-Type =3D Framed-User=2C Framed-Protocol =3D PPP=2C Framed-MTU =3D 1480=2C State =3D 0x3c540b463d5e11bc9b9de9eca83b76bb=2C Called-Station-Id =3D =2294:18:82:b9:32:80=22=2C Calling-Station-Id =3D =2200:e0:4c:60:43:20=22=2C NAS-Identifier =3D =22Test=22=2C NAS-Port-Type =3D Ethernet=2C Tunnel-Type:0 =3D VLAN=2C Tunnel-Medium-Type:0 =3D IEEE-802=2C Tunnel-Private-Group-Id:0 =3D =221=22=2C Event-Timestamp =3D =22Jan 1 1970 01:00:00 CET=22=2C Connect-Info =3D =22CONNECT Ethernet 1000Mbps Full duplex=22=2C EAP-Message =3D 0x020a00061a03=2C NAS-Port-Id =3D =221=22=2C FreeRADIUS-Proxied-To =3D 127.0.0.1=2C HP-Capability-Advert =3D 0x011a0000000b28=2C HP-Capability-Advert =3D 0x011a0000000b2e=2C HP-Capability-Advert =3D 0x011a0000000b30=2C HP-Capability-Advert =3D 0x011a0000000b3d=2C HP-Capability-Advert =3D 0x0138=2C HP-Capability-Advert =3D 0x013a=2C HP-Capability-Advert =3D 0x0140=2C HP-Capability-Advert =3D 0x0141=2C HP-Capability-Advert =3D 0x0151=2C MS-RAS-Vendor =3D 11=2C EAP-Type =3D MSCHAPv2=2C Realm =3D =22null=22=2C PacketFence-Domain =3D =22LKMRBI=22=2C User-Password =3D =22=2A=2A=2A=2A=2A=2A=22=2C SQL-User-Name =3D =22host/Admin-15-NB.PERSONALAMT.DE=22','MS-MPPE-Encryption-Policy =3D Encryption-Required=2C MS-MPPE-Encryption-Types =3D 4=2C MS-MPPE-Send-Key =3D 0x35ed63e74ce1691755c714e79b7a0ede=2C MS-MPPE-Recv-Key =3D 0x7e7adfcaee73aa321bb088e4d809fd78=2C EAP-Message =3D 0x030a0004=2C Message-Authenticator =3D 0x00000000000000000000000000000000=2C User-Name =3D =22host/Admin-15-NB.PERSONALAMT.DE=22=2C Tunnel-Type =3D VLAN=2C Tunnel-Private-Group-Id =3D =221=22=2C Tunnel-Medium-Type =3D IEEE-802', '0', '1')
  2526. (9) Thu May 24 17:30:30 2018: Debug: sql: SQL query returned: success
  2527. (9) Thu May 24 17:30:30 2018: Debug: sql: 1 record(s) updated
  2528. (9) Thu May 24 17:30:30 2018: Debug: [sql] = ok
  2529. (9) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name != "dummy") = ok
  2530. (9) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-audit-log-accept = ok
  2531. (9) Thu May 24 17:30:30 2018: Debug: } # else = ok
  2532. (9) Thu May 24 17:30:30 2018: Debug: update outer.session-state {
  2533. (9) Thu May 24 17:30:30 2018: Debug: } # update outer.session-state = noop
  2534. (9) Thu May 24 17:30:30 2018: Debug: } # post-auth = updated
  2535. (9) Thu May 24 17:30:30 2018: Debug: } # server packetfence-tunnel
  2536. (9) Thu May 24 17:30:30 2018: Debug: Virtual server sending reply
  2537. (9) Thu May 24 17:30:30 2018: Debug: MS-MPPE-Encryption-Policy = Encryption-Required
  2538. (9) Thu May 24 17:30:30 2018: Debug: MS-MPPE-Encryption-Types = 4
  2539. (9) Thu May 24 17:30:30 2018: Debug: MS-MPPE-Send-Key = 0x35ed63e74ce1691755c714e79b7a0ede
  2540. (9) Thu May 24 17:30:30 2018: Debug: MS-MPPE-Recv-Key = 0x7e7adfcaee73aa321bb088e4d809fd78
  2541. (9) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x030a0004
  2542. (9) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  2543. (9) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  2544. (9) Thu May 24 17:30:30 2018: Debug: Tunnel-Type = VLAN
  2545. (9) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id = "1"
  2546. (9) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type = IEEE-802
  2547. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Got tunneled reply code 2
  2548. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: MS-MPPE-Encryption-Policy = Encryption-Required
  2549. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: MS-MPPE-Encryption-Types = 4
  2550. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: MS-MPPE-Send-Key = 0x35ed63e74ce1691755c714e79b7a0ede
  2551. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: MS-MPPE-Recv-Key = 0x7e7adfcaee73aa321bb088e4d809fd78
  2552. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: EAP-Message = 0x030a0004
  2553. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Message-Authenticator = 0x00000000000000000000000000000000
  2554. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  2555. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Type = VLAN
  2556. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Private-Group-Id = "1"
  2557. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Medium-Type = IEEE-802
  2558. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunneled authentication was successful
  2559. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: SUCCESS
  2560. (9) Thu May 24 17:30:30 2018: Debug: eap_peap: Saving tunneled attributes for later
  2561. (9) Thu May 24 17:30:30 2018: Debug: eap: Sending EAP Request (code 1) ID 11 length 46
  2562. (9) Thu May 24 17:30:30 2018: Debug: eap: EAP session adding &reply:State = 0x49c411c240cf082f
  2563. (9) Thu May 24 17:30:30 2018: Debug: [eap] = handled
  2564. (9) Thu May 24 17:30:30 2018: Debug: } # authenticate = handled
  2565. (9) Thu May 24 17:30:30 2018: Debug: Using Post-Auth-Type Challenge
  2566. (9) Thu May 24 17:30:30 2018: Debug: Post-Auth-Type sub-section not found. Ignoring.
  2567. (9) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  2568. (9) Thu May 24 17:30:30 2018: Debug: Sent Access-Challenge Id 195 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  2569. (9) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x010b002e19001703030023c204d6dc726b81dea460e72a3058f76c0954f167b05ed831daa346a94cdf054fec3c1d
  2570. (9) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  2571. (9) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c240cf082fb3b3797cce5894f4
  2572. (9) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3233
  2573. (9) Thu May 24 17:30:30 2018: Debug: Finished request
  2574. (10) Thu May 24 17:30:30 2018: Debug: Received Access-Request Id 153 from 172.20.5.79:52628 to 172.20.5.3:1812 length 400
  2575. (10) Thu May 24 17:30:30 2018: Debug: Framed-MTU = 1480
  2576. (10) Thu May 24 17:30:30 2018: Debug: NAS-IP-Address = 172.20.9.150
  2577. (10) Thu May 24 17:30:30 2018: Debug: NAS-Identifier = "Test"
  2578. (10) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  2579. (10) Thu May 24 17:30:30 2018: Debug: Service-Type = Framed-User
  2580. (10) Thu May 24 17:30:30 2018: Debug: Framed-Protocol = PPP
  2581. (10) Thu May 24 17:30:30 2018: Debug: NAS-Port = 1
  2582. (10) Thu May 24 17:30:30 2018: Debug: NAS-Port-Type = Ethernet
  2583. (10) Thu May 24 17:30:30 2018: Debug: NAS-Port-Id = "1"
  2584. (10) Thu May 24 17:30:30 2018: Debug: Called-Station-Id = "94-18-82-b9-32-80"
  2585. (10) Thu May 24 17:30:30 2018: Debug: Calling-Station-Id = "00-e0-4c-60-43-20"
  2586. (10) Thu May 24 17:30:30 2018: Debug: Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
  2587. (10) Thu May 24 17:30:30 2018: Debug: Tunnel-Type:0 = VLAN
  2588. (10) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type:0 = IEEE-802
  2589. (10) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id:0 = "1"
  2590. (10) Thu May 24 17:30:30 2018: Debug: State = 0x49c411c240cf082fb3b3797cce5894f4
  2591. (10) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x020b002e190017030300230000000000000004b77df085fba8258708e81f575620c8b880eefae106a939fc14e2cb
  2592. (10) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x8b8a73f4165251a5ad7912c2f4cb0dee
  2593. (10) Thu May 24 17:30:30 2018: Debug: MS-RAS-Vendor = 11
  2594. (10) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b28
  2595. (10) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b2e
  2596. (10) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b30
  2597. (10) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x011a0000000b3d
  2598. (10) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0138
  2599. (10) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x013a
  2600. (10) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0140
  2601. (10) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0141
  2602. (10) Thu May 24 17:30:30 2018: Debug: HP-Capability-Advert = 0x0151
  2603. (10) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3234
  2604. (10) Thu May 24 17:30:30 2018: Debug: session-state: No cached attributes
  2605. (10) Thu May 24 17:30:30 2018: Debug: # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
  2606. (10) Thu May 24 17:30:30 2018: Debug: authorize {
  2607. (10) Thu May 24 17:30:30 2018: Debug: update {
  2608. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  2609. (10) Thu May 24 17:30:30 2018: Debug: --> 172.20.5.79
  2610. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %l
  2611. (10) Thu May 24 17:30:30 2018: Debug: --> 1527175830
  2612. (10) Thu May 24 17:30:30 2018: Debug: } # update = noop
  2613. (10) Thu May 24 17:30:30 2018: Debug: policy packetfence-set-tenant-id {
  2614. (10) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  2615. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  2616. (10) Thu May 24 17:30:30 2018: Debug: --> 0
  2617. (10) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> TRUE
  2618. (10) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  2619. (10) Thu May 24 17:30:30 2018: Debug: update control {
  2620. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  2621. (10) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  2622. (10) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  2623. (10) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '172.20.5.79'), 0)
  2624. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id FROM radius_nas WHERE nasname = '%{Packet-Src-IP-Address}'), 0)}
  2625. (10) Thu May 24 17:30:30 2018: Debug: --> 0
  2626. (10) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  2627. (10) Thu May 24 17:30:30 2018: Debug: } # if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") = noop
  2628. (10) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  2629. (10) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> TRUE
  2630. (10) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  2631. (10) Thu May 24 17:30:30 2018: Debug: update control {
  2632. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{User-Name}
  2633. (10) Thu May 24 17:30:30 2018: Debug: --> host/Admin-15-NB.PERSONALAMT.DE
  2634. (10) Thu May 24 17:30:30 2018: Debug: SQL-User-Name set to 'host/Admin-15-NB.PERSONALAMT.DE'
  2635. (10) Thu May 24 17:30:30 2018: Debug: Executing select query: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('172.20.5.79') and INET_ATON('172.20.5.79') <= end_ip order by range_length limit 1), 1)
  2636. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{sql: SELECT IFNULL((SELECT tenant_id from radius_nas WHERE start_ip <= INET_ATON('%{Packet-Src-IP-Address}') and INET_ATON('%{Packet-Src-IP-Address}') <= end_ip order by range_length limit 1), 1)}
  2637. (10) Thu May 24 17:30:30 2018: Debug: --> 1
  2638. (10) Thu May 24 17:30:30 2018: Debug: } # update control = noop
  2639. (10) Thu May 24 17:30:30 2018: Debug: } # if ( &control:PacketFence-Tenant-Id == 0 ) = noop
  2640. (10) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-set-tenant-id = noop
  2641. (10) Thu May 24 17:30:30 2018: Debug: policy rewrite_calling_station_id {
  2642. (10) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  2643. (10) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) -> TRUE
  2644. (10) Thu May 24 17:30:30 2018: Debug: if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) {
  2645. (10) Thu May 24 17:30:30 2018: Debug: update request {
  2646. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  2647. (10) Thu May 24 17:30:30 2018: Debug: --> 00:e0:4c:60:43:20
  2648. (10) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  2649. (10) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  2650. (10) Thu May 24 17:30:30 2018: Debug: } # if (&Calling-Station-Id && (&Calling-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})$/i)) = updated
  2651. (10) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  2652. (10) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_calling_station_id = updated
  2653. (10) Thu May 24 17:30:30 2018: Debug: policy rewrite_called_station_id {
  2654. (10) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  2655. (10) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) -> TRUE
  2656. (10) Thu May 24 17:30:30 2018: Debug: if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) {
  2657. (10) Thu May 24 17:30:30 2018: Debug: update request {
  2658. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{tolower:%{1}:%{2}:%{3}:%{4}:%{5}:%{6}}
  2659. (10) Thu May 24 17:30:30 2018: Debug: --> 94:18:82:b9:32:80
  2660. (10) Thu May 24 17:30:30 2018: Debug: } # update request = noop
  2661. (10) Thu May 24 17:30:30 2018: Debug: if ("%{8}") {
  2662. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{8}
  2663. (10) Thu May 24 17:30:30 2018: Debug: -->
  2664. (10) Thu May 24 17:30:30 2018: Debug: if ("%{8}") -> FALSE
  2665. (10) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) {
  2666. (10) Thu May 24 17:30:30 2018: Debug: elsif ( (Colubris-AVPair) && "%{Colubris-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  2667. (10) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) {
  2668. (10) Thu May 24 17:30:30 2018: Debug: elsif (Aruba-Essid-Name) -> FALSE
  2669. (10) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) {
  2670. (10) Thu May 24 17:30:30 2018: Debug: elsif ( (Cisco-AVPair) && "%{Cisco-AVPair}" =~ /^ssid=(.*)$/i) -> FALSE
  2671. (10) Thu May 24 17:30:30 2018: Debug: [updated] = updated
  2672. (10) Thu May 24 17:30:30 2018: Debug: } # if ((&Called-Station-Id) && (&Called-Station-Id =~ /^([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})[^0-9a-f]?([0-9a-f]{2})(:(.+))?$/i)) = updated
  2673. (10) Thu May 24 17:30:30 2018: Debug: ... skipping else: Preceding "if" was taken
  2674. (10) Thu May 24 17:30:30 2018: Debug: } # policy rewrite_called_station_id = updated
  2675. (10) Thu May 24 17:30:30 2018: Debug: policy filter_username {
  2676. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  2677. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name) -> TRUE
  2678. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name) {
  2679. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) {
  2680. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ / /) -> FALSE
  2681. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) {
  2682. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@[^@]*@/ ) -> FALSE
  2683. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) {
  2684. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.\./ ) -> FALSE
  2685. (10) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
  2686. (10) Thu May 24 17:30:30 2018: Debug: if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE
  2687. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) {
  2688. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /\.$/) -> FALSE
  2689. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) {
  2690. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Name =~ /@\./) -> FALSE
  2691. (10) Thu May 24 17:30:30 2018: Debug: } # if (&User-Name) = updated
  2692. (10) Thu May 24 17:30:30 2018: Debug: } # policy filter_username = updated
  2693. (10) Thu May 24 17:30:30 2018: Debug: policy filter_password {
  2694. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) {
  2695. (10) Thu May 24 17:30:30 2018: Debug: if (&User-Password && (&User-Password != "%{string:User-Password}")) -> FALSE
  2696. (10) Thu May 24 17:30:30 2018: Debug: } # policy filter_password = updated
  2697. (10) Thu May 24 17:30:30 2018: Debug: [preprocess] = ok
  2698. (10) Thu May 24 17:30:30 2018: Debug: suffix: Checking for suffix after "@"
  2699. (10) Thu May 24 17:30:30 2018: Debug: suffix: No '@' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", skipping NULL due to config.
  2700. (10) Thu May 24 17:30:30 2018: Debug: [suffix] = noop
  2701. (10) Thu May 24 17:30:30 2018: Debug: ntdomain: Checking for prefix before "\"
  2702. (10) Thu May 24 17:30:30 2018: Debug: ntdomain: No '\' in User-Name = "host/Admin-15-NB.PERSONALAMT.DE", looking up realm NULL
  2703. (10) Thu May 24 17:30:30 2018: Debug: ntdomain: Found realm "null"
  2704. (10) Thu May 24 17:30:30 2018: Debug: ntdomain: Adding Realm = "null"
  2705. (10) Thu May 24 17:30:30 2018: Debug: ntdomain: Authentication realm is LOCAL
  2706. (10) Thu May 24 17:30:30 2018: Debug: [ntdomain] = ok
  2707. (10) Thu May 24 17:30:30 2018: Debug: eap: Peer sent EAP Response (code 2) ID 11 length 46
  2708. (10) Thu May 24 17:30:30 2018: Debug: eap: Continuing tunnel setup
  2709. (10) Thu May 24 17:30:30 2018: Debug: [eap] = ok
  2710. (10) Thu May 24 17:30:30 2018: Debug: } # authorize = ok
  2711. (10) Thu May 24 17:30:30 2018: Debug: Found Auth-Type = eap
  2712. (10) Thu May 24 17:30:30 2018: Debug: # Executing group from file /usr/local/pf/raddb/sites-enabled/packetfence
  2713. (10) Thu May 24 17:30:30 2018: Debug: authenticate {
  2714. (10) Thu May 24 17:30:30 2018: Debug: eap: Expiring EAP session with state 0x49c411c240cf082f
  2715. (10) Thu May 24 17:30:30 2018: Debug: eap: Finished EAP session with state 0x49c411c240cf082f
  2716. (10) Thu May 24 17:30:30 2018: Debug: eap: Previous EAP request found for state 0x49c411c240cf082f, released from the list
  2717. (10) Thu May 24 17:30:30 2018: Debug: eap: Peer sent packet with method EAP PEAP (25)
  2718. (10) Thu May 24 17:30:30 2018: Debug: eap: Calling submodule eap_peap to process data
  2719. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: Continuing EAP-TLS
  2720. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls verify] = ok
  2721. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: Done initial handshake
  2722. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: [eaptls process] = ok
  2723. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: Session established. Decoding tunneled attributes
  2724. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: PEAP state send tlv success
  2725. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: Received EAP-TLV response
  2726. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: Success
  2727. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: Using saved attributes from the original Access-Accept
  2728. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  2729. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Type = VLAN
  2730. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Private-Group-Id = "1"
  2731. (10) Thu May 24 17:30:30 2018: Debug: eap_peap: Tunnel-Medium-Type = IEEE-802
  2732. (10) Thu May 24 17:30:30 2018: Debug: eap: Sending EAP Success (code 3) ID 11 length 4
  2733. (10) Thu May 24 17:30:30 2018: Debug: eap: Freeing handler
  2734. (10) Thu May 24 17:30:30 2018: Debug: [eap] = ok
  2735. (10) Thu May 24 17:30:30 2018: Debug: } # authenticate = ok
  2736. (10) Thu May 24 17:30:30 2018: Debug: # Executing section post-auth from file /usr/local/pf/raddb/sites-enabled/packetfence
  2737. (10) Thu May 24 17:30:30 2018: Debug: post-auth {
  2738. (10) Thu May 24 17:30:30 2018: Debug: update {
  2739. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{Packet-Src-IP-Address}
  2740. (10) Thu May 24 17:30:30 2018: Debug: --> 172.20.5.79
  2741. (10) Thu May 24 17:30:30 2018: Debug: } # update = noop
  2742. (10) Thu May 24 17:30:30 2018: Debug: policy packetfence-set-tenant-id {
  2743. (10) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") {
  2744. (10) Thu May 24 17:30:30 2018: Debug: EXPAND %{%{control:PacketFence-Tenant-Id}:-0}
  2745. (10) Thu May 24 17:30:30 2018: Debug: --> 1
  2746. (10) Thu May 24 17:30:30 2018: Debug: if ( "%{%{control:PacketFence-Tenant-Id}:-0}" == "0") -> FALSE
  2747. (10) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) {
  2748. (10) Thu May 24 17:30:30 2018: Debug: if ( &control:PacketFence-Tenant-Id == 0 ) -> FALSE
  2749. (10) Thu May 24 17:30:30 2018: Debug: } # policy packetfence-set-tenant-id = noop
  2750. (10) Thu May 24 17:30:30 2018: Debug: if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) {
  2751. (10) Thu May 24 17:30:30 2018: Debug: if (! EAP-Type || (EAP-Type != TTLS && EAP-Type != PEAP) ) -> FALSE
  2752. (10) Thu May 24 17:30:30 2018: Debug: attr_filter.packetfence_post_auth: EXPAND %{User-Name}
  2753. (10) Thu May 24 17:30:30 2018: Debug: attr_filter.packetfence_post_auth: --> host/Admin-15-NB.PERSONALAMT.DE
  2754. (10) Thu May 24 17:30:30 2018: Debug: attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10
  2755. (10) Thu May 24 17:30:30 2018: Debug: [attr_filter.packetfence_post_auth] = updated
  2756. (10) Thu May 24 17:30:30 2018: Debug: linelog: EXPAND messages.%{%{reply:Packet-Type}:-default}
  2757. (10) Thu May 24 17:30:30 2018: Debug: linelog: --> messages.Access-Accept
  2758. (10) Thu May 24 17:30:30 2018: Debug: linelog: EXPAND [mac:%{Calling-Station-Id}] Accepted user: %{reply:User-Name} and returned VLAN %{reply:Tunnel-Private-Group-ID}
  2759. (10) Thu May 24 17:30:30 2018: Debug: linelog: --> [mac:00:e0:4c:60:43:20] Accepted user: host/Admin-15-NB.PERSONALAMT.DE and returned VLAN 1
  2760. (10) Thu May 24 17:30:30 2018: Debug: [linelog] = ok
  2761. (10) Thu May 24 17:30:30 2018: Debug: } # post-auth = updated
  2762. (10) Thu May 24 17:30:30 2018: Debug: Sent Access-Accept Id 153 from 172.20.5.3:1812 to 172.20.5.79:52628 length 0
  2763. (10) Thu May 24 17:30:30 2018: Debug: User-Name = "host/Admin-15-NB.PERSONALAMT.DE"
  2764. (10) Thu May 24 17:30:30 2018: Debug: Tunnel-Type = VLAN
  2765. (10) Thu May 24 17:30:30 2018: Debug: Tunnel-Private-Group-Id = "1"
  2766. (10) Thu May 24 17:30:30 2018: Debug: Tunnel-Medium-Type = IEEE-802
  2767. (10) Thu May 24 17:30:30 2018: Debug: MS-MPPE-Recv-Key = 0x2db6a2bc6e32acd329e3226d0c9168e0059bb49a5c5aa598555418d839ff1fe5
  2768. (10) Thu May 24 17:30:30 2018: Debug: MS-MPPE-Send-Key = 0x3b4631a53e7ad98da55ea9d10351fd61b79b58d12ba675eca644839050883a59
  2769. (10) Thu May 24 17:30:30 2018: Debug: EAP-Message = 0x030b0004
  2770. (10) Thu May 24 17:30:30 2018: Debug: Message-Authenticator = 0x00000000000000000000000000000000
  2771. (10) Thu May 24 17:30:30 2018: Debug: Proxy-State = 0x3234
  2772. (10) Thu May 24 17:30:30 2018: Debug: Finished request
  2773. (0) Thu May 24 17:30:34 2018: Debug: Cleaning up request packet ID 25 with timestamp +56
  2774. (1) Thu May 24 17:30:34 2018: Debug: Cleaning up request packet ID 8 with timestamp +56
  2775. (2) Thu May 24 17:30:34 2018: Debug: Cleaning up request packet ID 98 with timestamp +56
  2776. (3) Thu May 24 17:30:34 2018: Debug: Cleaning up request packet ID 46 with timestamp +56
  2777. (4) Thu May 24 17:30:35 2018: Debug: Cleaning up request packet ID 200 with timestamp +57
  2778. (5) Thu May 24 17:30:35 2018: Debug: Cleaning up request packet ID 58 with timestamp +57
  2779. (6) Thu May 24 17:30:35 2018: Debug: Cleaning up request packet ID 109 with timestamp +57
  2780. (7) Thu May 24 17:30:35 2018: Debug: Cleaning up request packet ID 213 with timestamp +57
  2781. (8) Thu May 24 17:30:35 2018: Debug: Cleaning up request packet ID 45 with timestamp +57
  2782. (9) Thu May 24 17:30:35 2018: Debug: Cleaning up request packet ID 195 with timestamp +57
  2783. (10) Thu May 24 17:30:35 2018: Debug: Cleaning up request packet ID 153 with timestamp +57
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement