safe_characters issue

Fabrice Durand fdurand at inverse.ca
Wed Jun 17 17:11:57 CEST 2020


I am not sure it's the case, the only place i defined safe_characters is 
in mods-enabled/sql

```

[root at localhost raddb]# grep safe_characters * -r
mods-available/dhcp_sqlippool:  # To use sqlite you need to add '%' to 
safe_characters in
mods-available/expr:#  escape   escape string similar to rlm_sql 
safe_characters
mods-available/expr:    safe_characters = 
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: 
/äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
mods-config/sql/main/mysql/extras/wimax/queries.conf:#safe_characters = 
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
mods-config/sql/main/mysql/queries.conf:#safe_characters = 
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
mods-config/sql/main/mysql/reject.conf:#safe_characters = 
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
mods-config/sql/main/postgresql/queries.conf:# safe_characters = 
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
mods-config/sql/main/sqlite/queries.conf:#safe_characters = 
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
mods-enabled/sql:        safe_characters = 
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /(),'"

```

I attached 2 debug outputs and the sql files used , the one with 
safe_characters defined in the sql {...} section (who works) and the 
other one with safe_characters defined in sql sql_degraded{...} (that 
doesn't works)

For me it looks that even if you define safe_characters in another 
section than the sql {...} one the code doesn't use it and use the one 
from the sql {...} section instead.

I did exactly the same tests on the FreeRADIUS version 3.0.13 (i am 
using another path for the configuration files than /etc/radiusd, so the 
files didn't changed) and it takes the safe_characters defined in the 
sql_degraded section.

Btw setting the safe_characters in sql{...} fixed my issue, but it looks 
to be a regression.

Regards

Fabrice



Le 20-06-17 à 10 h 19, Alan DeKok a écrit :
> On Jun 17, 2020, at 9:55 AM, Fabrice Durand <fdurand at inverse.ca> wrote:
>> OK i found something, it looks if i set the safe_characters in the main sql definition it works.
>    The configuration files are read in order, top to bottom.  So if you put the safe_characters line before *any* $INCLUDE statements, then it will override the definitions in some later $INCLUDE.
>
>    What's happening is that you have multiple definitions of safe_characters.  You were editing the second or third one, but only the first one was relevant.  By adding a definition before the others, you've made a new first definition, which is then used.
>
>    Alan DeKok.
>
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

-- 
Fabrice Durand
fdurand at inverse.ca ::  +1.514.447.4918 (x135) ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence (http://packetfence.org)

-------------- next part --------------
FreeRADIUS Version 3.0.21
Copyright (C) 1999-2019 The FreeRADIUS server project and contributors
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License
For more information about these matters, see the file named COPYRIGHT
Starting - reading configuration files ...
including dictionary file /usr/share/freeradius/dictionary
including dictionary file /usr/share/freeradius/dictionary.dhcp
including dictionary file /usr/share/freeradius/dictionary.vqp
including dictionary file /usr/local/pf/raddb/dictionary
including configuration file /usr/local/pf/raddb/auth.conf
including configuration file /usr/local/pf/raddb/radiusd.conf
including configuration file /usr/local/pf/raddb/proxy.conf
including configuration file /usr/local/pf/raddb/proxy.conf.inc
including configuration file /usr/local/pf/raddb/clients.conf
including configuration file /usr/local/pf/raddb/clients.conf.inc
including configuration file /usr/local/pf/raddb/clients.eduroam.conf.inc
including files in directory /usr/local/pf/raddb/mods-enabled/
including configuration file /usr/local/pf/raddb/mods-enabled/logintime
including configuration file /usr/local/pf/raddb/mods-enabled/ntlm_auth
including configuration file /usr/local/pf/raddb/mods-enabled/pap
including configuration file /usr/local/pf/raddb/mods-enabled/passwd
including configuration file /usr/local/pf/raddb/mods-enabled/perl
including configuration file /usr/local/pf/raddb/mods-enabled/preprocess
including configuration file /usr/local/pf/raddb/mods-enabled/radutmp
including configuration file /usr/local/pf/raddb/mods-enabled/raw
including configuration file /usr/local/pf/raddb/mods-enabled/realm
including configuration file /usr/local/pf/raddb/mods-enabled/redis
including configuration file /usr/local/pf/raddb/mods-enabled/replicate
including configuration file /usr/local/pf/raddb/mods-enabled/soh
including configuration file /usr/local/pf/raddb/mods-enabled/sradutmp
including configuration file /usr/local/pf/raddb/mods-enabled/unix
including configuration file /usr/local/pf/raddb/mods-enabled/unpack
including configuration file /usr/local/pf/raddb/mods-enabled/utf8
including configuration file /usr/local/pf/raddb/mods-enabled/eap
including configuration file /usr/local/pf/raddb/mods-enabled/rest
including configuration file /usr/local/pf/raddb/mods-enabled/sql
including configuration file /usr/local/pf/raddb/mods-config/sql/main/mysql/queries.conf
including configuration file /usr/local/pf/raddb/mods-config/sql/main/mysql/reject.conf
including configuration file /usr/local/pf/raddb/mods-enabled/mschap
including configuration file /usr/local/pf/raddb/mods-enabled/go
including configuration file /usr/local/pf/raddb/mods-enabled/always
including configuration file /usr/local/pf/raddb/mods-enabled/attr_filter
including configuration file /usr/local/pf/raddb/mods-enabled/cache_eap
including configuration file /usr/local/pf/raddb/mods-enabled/cache_ntlm
including configuration file /usr/local/pf/raddb/mods-enabled/cache_password
including configuration file /usr/local/pf/raddb/mods-enabled/chap
including configuration file /usr/local/pf/raddb/mods-enabled/detail
including configuration file /usr/local/pf/raddb/mods-enabled/detail.log
including configuration file /usr/local/pf/raddb/mods-enabled/digest
including configuration file /usr/local/pf/raddb/mods-enabled/dynamic_clients
including configuration file /usr/local/pf/raddb/mods-enabled/echo
including configuration file /usr/local/pf/raddb/mods-enabled/exec
including configuration file /usr/local/pf/raddb/mods-enabled/expiration
including configuration file /usr/local/pf/raddb/mods-enabled/expr
including configuration file /usr/local/pf/raddb/mods-enabled/files
including configuration file /usr/local/pf/raddb/mods-enabled/linelog
including files in directory /usr/local/pf/raddb/policy.d/
including configuration file /usr/local/pf/raddb/policy.d/abfab-tr
including configuration file /usr/local/pf/raddb/policy.d/accounting
including configuration file /usr/local/pf/raddb/policy.d/canonicalization
including configuration file /usr/local/pf/raddb/policy.d/control
including configuration file /usr/local/pf/raddb/policy.d/cui
including configuration file /usr/local/pf/raddb/policy.d/debug
including configuration file /usr/local/pf/raddb/policy.d/dhcp
including configuration file /usr/local/pf/raddb/policy.d/eap
including configuration file /usr/local/pf/raddb/policy.d/filter
including configuration file /usr/local/pf/raddb/policy.d/operator-name
including configuration file /usr/local/pf/raddb/policy.d/packetfence.orig
including configuration file /usr/local/pf/raddb/policy.d/packetfence
including files in directory /usr/local/pf/raddb/sites-enabled/
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-cli
including configuration file /usr/local/pf/raddb/sites-enabled/dynamic-clients
including configuration file /usr/local/pf/raddb/sites-enabled/status
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
main {
 security {
 	user = "pf"
 	group = "pf"
 	allow_core_dumps = no
 }
	name = "radiusd"
	prefix = "/usr"
	localstatedir = "/usr/local/pf/var"
	logdir = "/usr/local/pf/logs"
	run_dir = "/usr/local/pf/var/run"
}
main {
	name = "radiusd"
	prefix = "/usr"
	localstatedir = "/usr/local/pf/var"
	sbindir = "/usr/sbin"
	logdir = "/usr/local/pf/logs"
	run_dir = "/usr/local/pf/var/run"
	libdir = "/usr/lib64/freeradius:/usr/lib/freeradius"
	radacctdir = "/usr/local/pf/logs/radacct"
	hostname_lookups = no
	max_request_time = 10
	cleanup_delay = 5
	max_requests = 20000
	pidfile = "/usr/local/pf/var/run/radiusd.pid"
	checkrad = "/usr/sbin/checkrad"
	debug_level = 0
	proxy_requests = yes
 log {
 	stripped_names = no
 	auth = yes
 	auth_badpass = no
 	auth_goodpass = no
 	colourise = yes
 	msg_denied = "You are already logged in - access denied"
 }
 resources {
 }
 security {
 	max_attributes = 200
 	reject_delay = 1.000000
 	status_server = yes
 	allow_vulnerable_openssl = "yes"
 }
}
auth: #### Loading Realms and Home Servers ####
 proxy server {
 	retry_delay = 5
 	retry_count = 3
 	default_fallback = no
 	dead_time = 120
 	wake_all_if_all_dead = no
 }
 home_server localhost {
 	ipaddr = 127.0.0.1
 	port = 1812
 	type = "auth"
 	secret = <<< secret >>>
 	response_window = 20.000000
 	response_timeouts = 1
 	max_outstanding = 65536
 	zombie_period = 40
 	status_check = "status-server"
 	ping_interval = 30
 	check_interval = 30
 	check_timeout = 4
 	num_answers_to_alive = 3
 	revive_interval = 120
  limit {
  	max_connections = 16
  	max_requests = 0
  	lifetime = 0
  	idle_timeout = 0
  }
  coa {
  	irt = 2
  	mrt = 16
  	mrc = 5
  	mrd = 30
  }
 }
Ignoring "response_window = 20.000000", forcing to "response_window = 10.000000"
 home_server pf.remote {
 	ipaddr = 172.20.135.10
 	port = 1812
 	type = "auth+acct"
 	secret = <<< secret >>>
 	src_ipaddr = "172.20.135.4"
 	response_window = 6.000000
 	response_timeouts = 1
 	max_outstanding = 65536
 	zombie_period = 40
 	status_check = "status-server"
 	ping_interval = 30
 	check_interval = 30
 	check_timeout = 4
 	num_answers_to_alive = 3
 	revive_interval = 120
  limit {
  	max_connections = 16
  	max_requests = 0
  	lifetime = 0
  	idle_timeout = 0
  }
  coa {
  	irt = 2
  	mrt = 16
  	mrc = 5
  	mrd = 30
  }
 }
 home_server degraded {
 	virtual_server = "pf.degraded"
 	port = 0
 	response_window = 30.000000
 	response_timeouts = 1
 	max_outstanding = 65536
 	zombie_period = 40
 	status_check = "none"
 	ping_interval = 30
 	check_timeout = 4
 	num_answers_to_alive = 3
 	revive_interval = 300
  limit {
  	max_connections = 16
  	max_requests = 0
  	lifetime = 0
  	idle_timeout = 0
  }
  coa {
  	irt = 2
  	mrt = 16
  	mrc = 5
  	mrd = 30
  }
 }
Ignoring "response_window = 30.000000", forcing to "response_window = 10.000000"
 home_server pf0.cluster {
 	ipaddr = 172.20.135.4
 	port = 1812
 	type = "auth+acct"
 	secret = <<< secret >>>
 	src_ipaddr = "172.20.135.5"
 	response_window = 6.000000
 	response_timeouts = 1
 	max_outstanding = 65536
 	zombie_period = 40
 	status_check = "status-server"
 	ping_interval = 30
 	check_interval = 30
 	check_timeout = 4
 	num_answers_to_alive = 3
 	revive_interval = 120
  limit {
  	max_connections = 16
  	max_requests = 0
  	lifetime = 0
  	idle_timeout = 0
  }
  coa {
  	irt = 2
  	mrt = 16
  	mrc = 5
  	mrd = 30
  }
 }
 home_server pf0.cli.cluster {
 	ipaddr = 172.20.135.4
 	port = 1815
 	type = "auth"
 	secret = <<< secret >>>
 	src_ipaddr = "172.20.135.5"
 	response_window = 6.000000
 	response_timeouts = 1
 	max_outstanding = 65536
 	zombie_period = 40
 	status_check = "status-server"
 	ping_interval = 30
 	check_interval = 30
 	check_timeout = 4
 	num_answers_to_alive = 3
 	revive_interval = 120
  limit {
  	max_connections = 16
  	max_requests = 0
  	lifetime = 0
  	idle_timeout = 0
  }
  coa {
  	irt = 2
  	mrt = 16
  	mrc = 5
  	mrd = 30
  }
 }
 home_server_pool my_auth_failover {
	type = fail-over
	home_server = localhost
 }
 realm example.com {
	auth_pool = my_auth_failover
 }
 realm default {
 }
 realm local {
 }
 realm null {
 }
 realm bob {
 }
 realm bibi {
 }
 realm inverse.inc {
 }
 realm eduroam.default {
 }
 realm eduroam.local {
 }
 realm eduroam.null {
 }
 realm eduroam.bob {
 }
 realm eduroam.bibi {
 }
 realm eduroam.inverse.inc {
 }
 home_server_pool pf_auth_pool {
	type = fail-over
	home_server = pf.remote
	home_server = degraded
 }
 home_server_pool pf_acct_pool {
	type = fail-over
	home_server = pf.remote
 }
 realm remote {
	auth_pool = pf_auth_pool
	acct_pool = pf_acct_pool
 }
 home_server_pool pf_pool.cluster {
	type = keyed-balance
	home_server = pf0.cluster
 }
 home_server_pool pfacct_pool.cluster {
	type = load-balance
	home_server = pf0.cluster
 }
 realm packetfence {
	auth_pool = pf_pool.cluster
	acct_pool = pfacct_pool.cluster
 }
 home_server_pool pfcli_pool.cluster {
	type = keyed-balance
	home_server = pf0.cli.cluster
 }
 realm packetfence-cli {
	auth_pool = pfcli_pool.cluster
 }
auth: #### Loading Clients ####
 client localhost {
 	ipaddr = 127.0.0.1
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	nas_type = "other"
 	proto = "*"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client localhost_ipv6 {
 	ipv6addr = ::1
 	require_message_authenticator = no
 	secret = <<< secret >>>
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client 172.20.135.4 {
 	ipaddr = 172.20.135.4
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	shortname = "pf"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client 172.20.135.5 {
 	ipaddr = 172.20.135.5
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	shortname = "pf"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client 172.20.135.11 {
 	ipaddr = 172.20.135.11
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	shortname = "pf"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client 172.20.135.12 {
 	ipaddr = 172.20.135.12
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	shortname = "pf"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client 172.20.135.13 {
 	ipaddr = 172.20.135.13
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	shortname = "pf"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client dynamic {
 	ipaddr = 0.0.0.0/0
 	require_message_authenticator = no
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 	dynamic_clients = "dynamic_clients"
 	lifetime = 300
 }
Debugger not attached
systemd watchdog is disabled
 # Creating Auth-Type = eap
 # Creating Auth-Type = PAP
 # Creating Auth-Type = CHAP
 # Creating Auth-Type = MS-CHAP
 # Creating Auth-Type = eap-degraded
 # Creating Autz-Type = Status-Server
auth: #### Instantiating modules ####
 modules {
  # Loaded module rlm_logintime
  # Loading module "logintime" from file /usr/local/pf/raddb/mods-enabled/logintime
  logintime {
  	minimum_timeout = 60
  }
  # Loaded module rlm_exec
  # Loading module "ntlm_auth" from file /usr/local/pf/raddb/mods-enabled/ntlm_auth
  exec ntlm_auth {
  	wait = yes
  	program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}"
  	shell_escape = yes
  }
  # Loaded module rlm_pap
  # Loading module "pap" from file /usr/local/pf/raddb/mods-enabled/pap
  pap {
  	normalise = yes
  }
  # Loaded module rlm_passwd
  # Loading module "etc_passwd" from file /usr/local/pf/raddb/mods-enabled/passwd
  passwd etc_passwd {
  	filename = "/etc/passwd"
  	format = "*User-Name:Crypt-Password:"
  	delimiter = ":"
  	ignore_nislike = no
  	ignore_empty = yes
  	allow_multiple_keys = no
  	hash_size = 100
  }
  # Loaded module rlm_perl
  # Loading module "perl" from file /usr/local/pf/raddb/mods-enabled/perl
  perl {
  	filename = "/usr/local/pf/raddb/mods-config/perl/example.pl"
  	func_authorize = "authorize"
  	func_authenticate = "authenticate"
  	func_post_auth = "post_auth"
  	func_accounting = "accounting"
  	func_preacct = "preacct"
  	func_checksimul = "checksimul"
  	func_detach = "detach"
  	func_xlat = "xlat"
  	func_pre_proxy = "pre_proxy"
  	func_post_proxy = "post_proxy"
  	func_recv_coa = "recv_coa"
  	func_send_coa = "send_coa"
  }
  # Loading module "packetfence" from file /usr/local/pf/raddb/mods-enabled/perl
  perl packetfence {
  	filename = "/usr/local/pf/raddb/mods-config/perl/packetfence.pm"
  	func_authorize = "authorize"
  	func_authenticate = "authenticate"
  	func_post_auth = "post_auth"
  	func_accounting = "accounting"
  	func_preacct = "preacct"
  	func_checksimul = "checksimul"
  	func_detach = "detach"
  	func_xlat = "xlat"
  	func_pre_proxy = "pre_proxy"
  	func_post_proxy = "post_proxy"
  	func_recv_coa = "recv_coa"
  	func_send_coa = "send_coa"
  }
  # Loading module "packetfence-multi-domain" from file /usr/local/pf/raddb/mods-enabled/perl
  perl packetfence-multi-domain {
  	filename = "/usr/local/pf/raddb/mods-config/perl/packetfence-multi-domain.pm"
  	func_authorize = "authorize"
  	func_authenticate = "authenticate"
  	func_post_auth = "post_auth"
  	func_accounting = "accounting"
  	func_preacct = "preacct"
  	func_checksimul = "checksimul"
  	func_detach = "detach"
  	func_xlat = "xlat"
  	func_pre_proxy = "pre_proxy"
  	func_post_proxy = "post_proxy"
  	func_recv_coa = "recv_coa"
  	func_send_coa = "send_coa"
  }
  # Loading module "reply_in_db" from file /usr/local/pf/raddb/mods-enabled/perl
  perl reply_in_db {
  	filename = "/usr/local/pf/raddb/mods-config/perl/reply_in_db.pm"
  	func_authorize = "authorize"
  	func_authenticate = "authenticate"
  	func_post_auth = "post_auth"
  	func_accounting = "accounting"
  	func_preacct = "preacct"
  	func_checksimul = "checksimul"
  	func_detach = "detach"
  	func_xlat = "xlat"
  	func_pre_proxy = "pre_proxy"
  	func_post_proxy = "post_proxy"
  	func_recv_coa = "recv_coa"
  	func_send_coa = "send_coa"
  }
  # Loaded module rlm_preprocess
  # Loading module "preprocess" from file /usr/local/pf/raddb/mods-enabled/preprocess
  preprocess {
  	huntgroups = "/usr/local/pf/raddb/mods-config/preprocess/huntgroups"
  	hints = "/usr/local/pf/raddb/mods-config/preprocess/hints"
  	with_ascend_hack = no
  	ascend_channels_per_line = 23
  	with_ntdomain_hack = no
  	with_specialix_jetstream_hack = no
  	with_cisco_vsa_hack = no
  	with_alvarion_vsa_hack = no
  }
  # Loaded module rlm_radutmp
  # Loading module "radutmp" from file /usr/local/pf/raddb/mods-enabled/radutmp
  radutmp {
  	filename = "/usr/local/pf/logs/radutmp"
  	username = "%{User-Name}"
  	case_sensitive = yes
  	check_with_nas = yes
  	permissions = 384
  	caller_id = yes
  }
  # Loaded module rlm_raw
  # Loading module "raw" from file /usr/local/pf/raddb/mods-enabled/raw
  raw {
  	name = "raw"
  }
  # Loaded module rlm_realm
  # Loading module "IPASS" from file /usr/local/pf/raddb/mods-enabled/realm
  realm IPASS {
  	format = "prefix"
  	delimiter = "/"
  	ignore_default = no
  	ignore_null = no
  }
  # Loading module "suffix" from file /usr/local/pf/raddb/mods-enabled/realm
  realm suffix {
  	format = "suffix"
  	delimiter = "@"
  	ignore_default = no
  	ignore_null = yes
  }
  # Loading module "realmpercent" from file /usr/local/pf/raddb/mods-enabled/realm
  realm realmpercent {
  	format = "suffix"
  	delimiter = "%"
  	ignore_default = no
  	ignore_null = no
  }
  # Loading module "ntdomain" from file /usr/local/pf/raddb/mods-enabled/realm
  realm ntdomain {
  	format = "prefix"
  	delimiter = "\\"
  	ignore_default = no
  	ignore_null = no
  }
  # Loaded module rlm_redis
  # Loading module "redis" from file /usr/local/pf/raddb/mods-enabled/redis
  redis {
  	server = "127.0.0.1"
  	port = 6379
  	database = 0
  	query_timeout = 5
  }
rlm_redis: libhiredis version: 0.12.1
  # Loading module "redis_ntlm" from file /usr/local/pf/raddb/mods-enabled/redis
  redis redis_ntlm {
  	server = "127.0.0.1"
  	port = 6383
  	database = 0
  	query_timeout = 5
  }
rlm_redis: libhiredis version: 0.12.1
  # Loaded module rlm_replicate
  # Loading module "replicate" from file /usr/local/pf/raddb/mods-enabled/replicate
  # Loaded module rlm_soh
  # Loading module "soh" from file /usr/local/pf/raddb/mods-enabled/soh
  soh {
  	dhcp = yes
  }
  # Loading module "sradutmp" from file /usr/local/pf/raddb/mods-enabled/sradutmp
  radutmp sradutmp {
  	filename = "/usr/local/pf/logs/sradutmp"
  	username = "%{User-Name}"
  	case_sensitive = yes
  	check_with_nas = yes
  	permissions = 420
  	caller_id = no
  }
  # Loaded module rlm_unix
  # Loading module "unix" from file /usr/local/pf/raddb/mods-enabled/unix
  unix {
  	radwtmp = "/usr/local/pf/logs/radwtmp"
  }
Creating attribute Unix-Group
  # Loaded module rlm_unpack
  # Loading module "unpack" from file /usr/local/pf/raddb/mods-enabled/unpack
  # Loaded module rlm_utf8
  # Loading module "utf8" from file /usr/local/pf/raddb/mods-enabled/utf8
  # Loaded module rlm_eap
  # Loading module "eap" from file /usr/local/pf/raddb/mods-enabled/eap
  eap {
  	default_eap_type = "peap"
  	timer_expire = 60
  	ignore_unknown_eap_types = no
  	cisco_accounting_username_bug = no
  	max_sessions = 20000
  }
  # Loading module "eap-degraded" from file /usr/local/pf/raddb/mods-enabled/eap
  eap eap-degraded {
  	default_eap_type = "peap"
  	timer_expire = 60
  	ignore_unknown_eap_types = no
  	cisco_accounting_username_bug = no
  	max_sessions = 20000
  }
  # Loaded module rlm_rest
  # Loading module "rest" from file /usr/local/pf/raddb/mods-enabled/rest
  rest {
  	connect_uri = "http://127.0.0.1:7070/"
  	connect_timeout = 4.000000
  }
  # Loading module "rest-cli" from file /usr/local/pf/raddb/mods-enabled/rest
  rest rest-cli {
  	connect_uri = "http://127.0.0.1:7070/"
  	connect_timeout = 4.000000
  }
  # Loaded module rlm_sql
  # Loading module "sql" from file /usr/local/pf/raddb/mods-enabled/sql
  sql {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = yes
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT  id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0"
  	authorize_check_query = "SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
  	authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
  	authorize_group_check_query = "SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{SQL-Group}' ORDER BY id"
  	authorize_group_reply_query = "SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{SQL-Group}' ORDER BY id"
  	group_membership_query = "SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority"
  	simul_verify_query = "SELECT radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS NULL"
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /(),'"
  	auto_escape = no
   accounting {
   	reference = "%{tolower:type.%{Acct-Status-Type}.query}"
    type {
     accounting-on {
     	query = "UPDATE radacct SET acctstoptime = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime	= '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime), acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND nasipaddress   = '%{NAS-IP-Address}' AND acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
     }
     accounting-off {
     	query = "UPDATE radacct SET acctstoptime = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime	= '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime), acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND nasipaddress   = '%{NAS-IP-Address}' AND acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
     }
     start {
     	query = "CALL acct_start ( '%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', FROM_UNIXTIME(%{integer:Event-Timestamp}), FROM_UNIXTIME(%{integer:Event-Timestamp}), NULL, '0', '%{Acct-Authentic}', '%{Connect-Info}', '', '0', '0', '%{Called-Station-Id}', '%{Calling-Station-Id}', '', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '%{Acct-Status-Type}','%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
     }
     interim-update {
     	query = "CALL acct_update ( FROM_UNIXTIME(%{integer:Event-Timestamp}), '%{Framed-IP-Address}', '%{%{Acct-Session-Time}:-0}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Unique-Session-Id}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', '%{Acct-Authentic}', '%{Connect-Info}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Service-Type}', '%{Framed-Protocol}', '%{Acct-Status-Type}','%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
     }
     stop {
     	query = "CALL acct_stop ( FROM_UNIXTIME(%{integer:Event-Timestamp}), '%{Framed-IP-Address}', '%{%{Acct-Session-Time}:-0}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Unique-Session-Id}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', '%{Acct-Authentic}', '%{Connect-Info}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Service-Type}', '%{Framed-Protocol}', '%{Acct-Terminate-Cause}', '%{Acct-Status-Type}', '%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
     }
    }
   }
   post-auth {
   	reference = "type.accept.query"
   }
  }
rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute SQL-Group
  # Loading module "pfguest" from file /usr/local/pf/raddb/mods-enabled/sql
  sql pfguest {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "guest" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
  	group_membership_query = "select 1"
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = ".query"
   }
  }
rlm_sql (pfguest): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfguest-SQL-Group
  # Loading module "pfsponsor" from file /usr/local/pf/raddb/mods-enabled/sql
  sql pfsponsor {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "sponsor" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
  	group_membership_query = "select 1"
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = ".query"
   }
  }
rlm_sql (pfsponsor): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfsponsor-SQL-Group
  # Loading module "pfsms" from file /usr/local/pf/raddb/mods-enabled/sql
  sql pfsms {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "sms" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
  	group_membership_query = "select 1"
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = ".query"
   }
  }
rlm_sql (pfsms): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfsms-SQL-Group
  # Loading module "pflocal" from file /usr/local/pf/raddb/mods-enabled/sql
  sql pflocal {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password WHERE pid = '%{SQL-User-Name}' AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' AND NOT EXISTS (SELECT pid FROM activation WHERE pid = '%{SQL-User-Name}')"
  	group_membership_query = "select 1"
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = ".query"
   }
  }
rlm_sql (pflocal): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pflocal-SQL-Group
  # Loading module "sql_reject" from file /usr/local/pf/raddb/mods-enabled/sql
  sql sql_reject {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	authorize_check_query = ""
  	authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{Calling-Station-Id}' ORDER BY id"
  	group_membership_query = ""
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = "type.reject.query"
   }
  }
rlm_sql (sql_reject): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute sql_reject-SQL-Group
  # Loading module "sql_degraded" from file /usr/local/pf/raddb/mods-enabled/sql
  sql sql_degraded {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	group_membership_query = ""
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = ".query"
   }
  }
rlm_sql (sql_degraded): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute sql_degraded-SQL-Group
  # Loaded module rlm_mschap
  # Loading module "mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
  mschap {
  	use_mppe = yes
  	require_encryption = yes
  	require_strong = yes
  	with_ntdomain_hack = yes
  	ntlm_auth = "/usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --          --request-nt-key  --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"
  	ntlm_auth_timeout = 3
   passchange {
   }
  	allow_retry = no
  	winbind_retry_with_normalised_username = no
  }
  # Loading module "chrooted_mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
  mschap chrooted_mschap {
  	use_mppe = no
  	require_encryption = yes
  	require_strong = yes
  	with_ntdomain_hack = yes
  	ntlm_auth = "/usr/bin/sudo /usr/sbin/chroot /chroots/%{PacketFence-Domain} /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --          --request-nt-key --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
  	ntlm_auth_timeout = 3
   passchange {
   }
  	allow_retry = no
  	winbind_retry_with_normalised_username = no
  }
  # Loading module "chrooted_mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
  mschap chrooted_mschap_machine {
  	use_mppe = yes
  	require_encryption = yes
  	require_strong = yes
  	with_ntdomain_hack = yes
  	ntlm_auth = "/usr/bin/sudo /usr/sbin/chroot /chroots/%{PacketFence-Domain} /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --              --request-nt-key --username=%{mschap:User-Name:-None} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
  	ntlm_auth_timeout = 3
   passchange {
   }
  	allow_retry = no
  	winbind_retry_with_normalised_username = no
  }
  # Loading module "mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
  mschap mschap_machine {
  	use_mppe = yes
  	require_encryption = yes
  	require_strong = yes
  	with_ntdomain_hack = yes
  	ntlm_auth = "/usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --              --request-nt-key --username=%{mschap:User-Name:-None} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
  	ntlm_auth_timeout = 3
   passchange {
   }
  	allow_retry = no
  	winbind_retry_with_normalised_username = no
  }
  # Loading module "mschap_local" from file /usr/local/pf/raddb/mods-enabled/mschap
  mschap mschap_local {
  	use_mppe = no
  	require_encryption = yes
  	require_strong = yes
  	with_ntdomain_hack = yes
   passchange {
   }
  	allow_retry = yes
  	winbind_retry_with_normalised_username = no
  }
  # Loaded module rlm_always
  # Loading module "reject" from file /usr/local/pf/raddb/mods-enabled/always
  always reject {
  	rcode = "reject"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "fail" from file /usr/local/pf/raddb/mods-enabled/always
  always fail {
  	rcode = "fail"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "ok" from file /usr/local/pf/raddb/mods-enabled/always
  always ok {
  	rcode = "ok"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "handled" from file /usr/local/pf/raddb/mods-enabled/always
  always handled {
  	rcode = "handled"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "invalid" from file /usr/local/pf/raddb/mods-enabled/always
  always invalid {
  	rcode = "invalid"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "userlock" from file /usr/local/pf/raddb/mods-enabled/always
  always userlock {
  	rcode = "userlock"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "notfound" from file /usr/local/pf/raddb/mods-enabled/always
  always notfound {
  	rcode = "notfound"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "noop" from file /usr/local/pf/raddb/mods-enabled/always
  always noop {
  	rcode = "noop"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "updated" from file /usr/local/pf/raddb/mods-enabled/always
  always updated {
  	rcode = "updated"
  	simulcount = 0
  	mpp = no
  }
  # Loaded module rlm_attr_filter
  # Loading module "attr_filter.post-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.post-proxy {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/post-proxy"
  	key = "%{Realm}"
  	relaxed = no
  }
  # Loading module "attr_filter.pre-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.pre-proxy {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/pre-proxy"
  	key = "%{Realm}"
  	relaxed = no
  }
  # Loading module "attr_filter.access_reject" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.access_reject {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/access_reject"
  	key = "%{User-Name}"
  	relaxed = no
  }
  # Loading module "attr_filter.access_challenge" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.access_challenge {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/access_challenge"
  	key = "%{User-Name}"
  	relaxed = no
  }
  # Loading module "attr_filter.accounting_response" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.accounting_response {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/accounting_response"
  	key = "%{User-Name}"
  	relaxed = no
  }
  # Loading module "attr_filter.packetfence_post_auth" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.packetfence_post_auth {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/packetfence-post-auth"
  	key = "%{User-Name}"
  	relaxed = yes
  }
  # Loading module "attr_filter.packetfence_pre_proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.packetfence_pre_proxy {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/packetfence-pre-proxy"
  	key = "%{User-Name}"
  	relaxed = yes
  }
  # Loaded module rlm_cache
  # Loading module "cache_eap" from file /usr/local/pf/raddb/mods-enabled/cache_eap
  cache cache_eap {
  	driver = "rlm_cache_rbtree"
  	key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
  	ttl = 15
  	max_entries = 0
  	epoch = 0
  	add_stats = no
  }
  # Loading module "cache_ntlm" from file /usr/local/pf/raddb/mods-enabled/cache_ntlm
  cache cache_ntlm {
  	driver = "rlm_cache_rbtree"
  	key = "%{User-Name}%{Calling-Station-Id}"
  	ttl = 300
  	max_entries = 0
  	epoch = 0
  	add_stats = no
  }
  # Loading module "cache_password" from file /usr/local/pf/raddb/mods-enabled/cache_password
  cache cache_password {
  	driver = "rlm_cache_rbtree"
  	key = "%{User-Name}"
  	ttl = 3600
  	max_entries = 0
  	epoch = 0
  	add_stats = no
  }
  # Loading module "userprincipalname" from file /usr/local/pf/raddb/mods-enabled/cache_password
  cache userprincipalname {
  	driver = "rlm_cache_rbtree"
  	key = "%{User-Name}"
  	ttl = 3600
  	max_entries = 0
  	epoch = 0
  	add_stats = no
  }
  # Loading module "PacketFence-NTCacheHash" from file /usr/local/pf/raddb/mods-enabled/cache_password
  cache PacketFence-NTCacheHash {
  	driver = "rlm_cache_rbtree"
  	key = "%{User-Name}"
  	ttl = 10
  	max_entries = 0
  	epoch = 0
  	add_stats = no
  }
  # Loaded module rlm_chap
  # Loading module "chap" from file /usr/local/pf/raddb/mods-enabled/chap
  # Loaded module rlm_detail
  # Loading module "detail" from file /usr/local/pf/raddb/mods-enabled/detail
  detail {
  	filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
  	header = "%t"
  	permissions = 384
  	locking = no
  	escape_filenames = no
  	log_packet_header = no
  }
  # Loading module "auth_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  detail auth_log {
  	filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
  	header = "%t"
  	permissions = 384
  	locking = no
  	escape_filenames = no
  	log_packet_header = no
  }
  # Loading module "reply_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  detail reply_log {
  	filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
  	header = "%t"
  	permissions = 384
  	locking = no
  	escape_filenames = no
  	log_packet_header = no
  }
  # Loading module "pre_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  detail pre_proxy_log {
  	filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
  	header = "%t"
  	permissions = 384
  	locking = no
  	escape_filenames = no
  	log_packet_header = no
  }
  # Loading module "post_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  detail post_proxy_log {
  	filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
  	header = "%t"
  	permissions = 384
  	locking = no
  	escape_filenames = no
  	log_packet_header = no
  }
  # Loaded module rlm_digest
  # Loading module "digest" from file /usr/local/pf/raddb/mods-enabled/digest
  # Loaded module rlm_dynamic_clients
  # Loading module "dynamic_clients" from file /usr/local/pf/raddb/mods-enabled/dynamic_clients
  # Loading module "echo" from file /usr/local/pf/raddb/mods-enabled/echo
  exec echo {
  	wait = yes
  	program = "/bin/echo %{User-Name}"
  	input_pairs = "request"
  	output_pairs = "reply"
  	shell_escape = yes
  }
  # Loading module "exec" from file /usr/local/pf/raddb/mods-enabled/exec
  exec {
  	wait = no
  	input_pairs = "request"
  	shell_escape = yes
  	timeout = 10
  }
  # Loaded module rlm_expiration
  # Loading module "expiration" from file /usr/local/pf/raddb/mods-enabled/expiration
  # Loaded module rlm_expr
  # Loading module "expr" from file /usr/local/pf/raddb/mods-enabled/expr
  expr {
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
  }
  # Loaded module rlm_files
  # Loading module "files" from file /usr/local/pf/raddb/mods-enabled/files
  files {
  	filename = "/usr/local/pf/raddb/mods-config/files/authorize"
  	acctusersfile = "/usr/local/pf/raddb/mods-config/files/accounting"
  	preproxy_usersfile = "/usr/local/pf/raddb/mods-config/files/pre-proxy"
  }
  # Loaded module rlm_linelog
  # Loading module "linelog" from file /usr/local/pf/raddb/mods-enabled/linelog
  linelog {
  	filename = "syslog"
  	escape_filenames = no
  	syslog_facility = "local1"
  	syslog_severity = "info"
  	permissions = 384
  	format = "This is a log message for %{User-Name}"
  	reference = "messages.%{%{reply:Packet-Type}:-default}"
  }
  # Loading module "log_accounting" from file /usr/local/pf/raddb/mods-enabled/linelog
  linelog log_accounting {
  	filename = "syslog"
  	escape_filenames = no
  	syslog_facility = "local2"
  	syslog_severity = "info"
  	permissions = 384
  	format = ""
  	reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
  }
  instantiate {
  # Instantiating module "redis" from file /usr/local/pf/raddb/mods-enabled/redis
rlm_redis (redis): Initialising connection pool
   pool {
   	start = 0
   	min = 3
   	max = 64
   	spare = 10
   	uses = 0
   	lifetime = 86400
   	cleanup_interval = 300
   	idle_timeout = 600
   	retry_delay = 30
   	spread = no
   }
  # Instantiating module "rest" from file /usr/local/pf/raddb/mods-enabled/rest
   authorize {
   	uri = "http://127.0.0.1:7070//radius/rest/filter"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   authenticate {
   	uri = "http://127.0.0.1:7070//radius/rest/filter"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   preacct {
   	uri = "http://127.0.0.1:7070//radius/rest/filter"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   accounting {
   	uri = "http://127.0.0.1:7070//radius/rest/accounting"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   pre-proxy {
   	uri = "http://127.0.0.1:7070//radius/rest/filter"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   post-proxy {
   	uri = "http://127.0.0.1:7070//radius/rest/filter"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   post-auth {
   	uri = "http://127.0.0.1:7070//radius/rest/authorize"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
rlm_rest: libcurl version: libcurl/7.29.0 NSS/3.44 zlib/1.2.7 libidn/1.28 libssh2/1.8.0
rlm_rest (rest): Initialising connection pool
   pool {
   	start = 0
   	min = 3
   	max = 64
   	spare = 10
   	uses = 0
   	lifetime = 0
   	cleanup_interval = 30
   	idle_timeout = 60
   	retry_delay = 30
   	spread = no
   }
  # Instantiating module "raw" from file /usr/local/pf/raddb/mods-enabled/raw
  }
  # Instantiating module "logintime" from file /usr/local/pf/raddb/mods-enabled/logintime
  # Instantiating module "pap" from file /usr/local/pf/raddb/mods-enabled/pap
  # Instantiating module "etc_passwd" from file /usr/local/pf/raddb/mods-enabled/passwd
rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
  # Instantiating module "perl" from file /usr/local/pf/raddb/mods-enabled/perl
  # Instantiating module "packetfence" from file /usr/local/pf/raddb/mods-enabled/perl
  # Instantiating module "packetfence-multi-domain" from file /usr/local/pf/raddb/mods-enabled/perl
  # Instantiating module "reply_in_db" from file /usr/local/pf/raddb/mods-enabled/perl
  # Instantiating module "preprocess" from file /usr/local/pf/raddb/mods-enabled/preprocess
reading pairlist file /usr/local/pf/raddb/mods-config/preprocess/huntgroups
reading pairlist file /usr/local/pf/raddb/mods-config/preprocess/hints
  # Instantiating module "IPASS" from file /usr/local/pf/raddb/mods-enabled/realm
  # Instantiating module "suffix" from file /usr/local/pf/raddb/mods-enabled/realm
  # Instantiating module "realmpercent" from file /usr/local/pf/raddb/mods-enabled/realm
  # Instantiating module "ntdomain" from file /usr/local/pf/raddb/mods-enabled/realm
  # Instantiating module "redis_ntlm" from file /usr/local/pf/raddb/mods-enabled/redis
rlm_redis (redis_ntlm): Initialising connection pool
   pool {
   	start = 0
   	min = 3
   	max = 64
   	spare = 10
   	uses = 0
   	lifetime = 86400
   	cleanup_interval = 300
   	idle_timeout = 600
   	retry_delay = 30
   	spread = no
   }
  # Instantiating module "eap" from file /usr/local/pf/raddb/mods-enabled/eap
   # Linked to sub-module rlm_eap_md5
   # Linked to sub-module rlm_eap_mschapv2
   mschapv2 {
   	with_ntdomain_hack = no
   	send_error = no
   }
   # Linked to sub-module rlm_eap_peap
   peap {
   	tls = "tls-common"
   	default_eap_type = "mschapv2"
   	copy_request_to_tunnel = yes
   	use_tunneled_reply = yes
   	proxy_tunneled_request_as_eap = yes
   	virtual_server = "packetfence-degraded-tunnel"
   	soh = no
   	require_client_cert = no
   }
   tls-config tls-common {
   	verify_depth = 0
   	pem_file_type = yes
   	private_key_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.key"
   	certificate_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.crt"
   	ca_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.pem"
   	dh_file = "/usr/local/pf/raddb/certs/dh"
   	fragment_size = 1024
   	include_length = yes
   	auto_chain = yes
   	check_crl = no
   	check_all_crl = no
   	cipher_list = "DEFAULT"
   	ecdh_curve = "prime256v1"
   	tls_max_version = ""
   	tls_min_version = "1.0"
    cache {
    	enable = no
    	lifetime = 24
    	max_entries = 255
    }
    verify {
    	skip_if_ocsp_ok = no
    }
    ocsp {
    	enable = no
    	override_cert_url = yes
    	url = "http://127.0.0.1:22225/api/v1/pki/ocsp"
    	use_nonce = yes
    	timeout = 0
    	softfail = no
    }
   }
The configuration allows TLS 1.0 and/or TLS 1.1.  We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
   # Linked to sub-module rlm_eap_tls
   tls {
   	tls = "tls-common"
   }
tls: Using cached TLS configuration from previous invocation
   # Linked to sub-module rlm_eap_ttls
   ttls {
   	tls = "tls-common"
   	default_eap_type = "md5"
   	copy_request_to_tunnel = yes
   	use_tunneled_reply = yes
   	virtual_server = "packetfence-tunnel"
   	include_length = yes
   	require_client_cert = no
   }
tls: Using cached TLS configuration from previous invocation
  # Instantiating module "eap-degraded" from file /usr/local/pf/raddb/mods-enabled/eap
   # Linked to sub-module rlm_eap_md5
   # Linked to sub-module rlm_eap_mschapv2
   mschapv2 {
   	with_ntdomain_hack = no
   	send_error = no
   }
   # Linked to sub-module rlm_eap_peap
   peap {
   	tls = "tls-common"
   	default_eap_type = "mschapv2"
   	copy_request_to_tunnel = yes
   	use_tunneled_reply = yes
   	proxy_tunneled_request_as_eap = yes
   	virtual_server = "packetfence-tunnel"
   	soh = no
   	require_client_cert = no
   }
   tls-config tls-common {
   	verify_depth = 0
   	pem_file_type = yes
   	private_key_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.key"
   	certificate_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.crt"
   	ca_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.pem"
   	dh_file = "/usr/local/pf/raddb/certs/dh"
   	fragment_size = 1024
   	include_length = yes
   	auto_chain = yes
   	check_crl = no
   	check_all_crl = no
   	cipher_list = "DEFAULT"
   	ecdh_curve = "prime256v1"
   	tls_max_version = ""
   	tls_min_version = "1.0"
    cache {
    	enable = no
    	lifetime = 24
    	max_entries = 255
    }
    verify {
    	skip_if_ocsp_ok = no
    }
    ocsp {
    	enable = no
    	override_cert_url = yes
    	url = "http://127.0.0.1:22225/api/v1/pki/ocsp"
    	use_nonce = yes
    	timeout = 0
    	softfail = no
    }
   }
The configuration allows TLS 1.0 and/or TLS 1.1.  We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
   # Linked to sub-module rlm_eap_tls
   tls {
   	tls = "tls-common"
   }
tls: Using cached TLS configuration from previous invocation
   # Linked to sub-module rlm_eap_ttls
   ttls {
   	tls = "tls-common"
   	default_eap_type = "md5"
   	copy_request_to_tunnel = yes
   	use_tunneled_reply = yes
   	virtual_server = "packetfence-degraded-tunnel"
   	include_length = yes
   	require_client_cert = no
   }
tls: Using cached TLS configuration from previous invocation
  # Instantiating module "rest-cli" from file /usr/local/pf/raddb/mods-enabled/rest
   authorize {
   	uri = "http://127.0.0.1:7070//radius/rest/switch/authorize"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   authenticate {
   	uri = ""
   	method = "GET"
   	body = "none"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   accounting {
   	uri = ""
   	method = "GET"
   	body = "none"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   post-auth {
   	uri = ""
   	method = "GET"
   	body = "none"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
rlm_rest (rest-cli): Initialising connection pool
   pool {
   	start = 0
   	min = 3
   	max = 64
   	spare = 10
   	uses = 0
   	lifetime = 0
   	cleanup_interval = 30
   	idle_timeout = 60
   	retry_delay = 30
   	spread = no
   }
  # Instantiating module "sql" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql_mysql: libmysql version: 10.1.21-MariaDB
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (sql): Attempting to connect to database "pf"
rlm_sql (sql): Initialising connection pool
   pool {
   	start = 0
   	min = 3
   	max = 64
   	spare = 10
   	uses = 0
   	lifetime = 0
   	cleanup_interval = 30
   	idle_timeout = 60
   	retry_delay = 30
   	spread = no
   }
rlm_sql (sql): Processing generate_sql_clients
rlm_sql (sql) in generate_sql_clients: query is SELECT  id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0
rlm_sql (sql): 0 of 0 connections in use.  You  may need to increase "spare"
rlm_sql (sql): Opening additional connection (0), 1 of 64 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Executing select query: SELECT  id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0
rlm_sql (sql): Released connection (0)
Need 2 more connections to reach min connections (3)
rlm_sql (sql): Opening additional connection (1), 1 of 63 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
  # Instantiating module "pfguest" from file /usr/local/pf/raddb/mods-enabled/sql
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (pfguest): Attempting to connect to database "pf"
  # Instantiating module "pfsponsor" from file /usr/local/pf/raddb/mods-enabled/sql
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (pfsponsor): Attempting to connect to database "pf"
  # Instantiating module "pfsms" from file /usr/local/pf/raddb/mods-enabled/sql
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (pfsms): Attempting to connect to database "pf"
  # Instantiating module "pflocal" from file /usr/local/pf/raddb/mods-enabled/sql
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (pflocal): Attempting to connect to database "pf"
  # Instantiating module "sql_reject" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql (sql_reject): groupmemb_query is empty.  Please delete it from the configuration
rlm_sql (sql_reject): authorize_check_query is empty.  Please delete it from the configuration
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (sql_reject): Attempting to connect to database "pf"
  # Instantiating module "sql_degraded" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql (sql_degraded): groupmemb_query is empty.  Please delete it from the configuration
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (sql_degraded): Attempting to connect to database "pf"
  # Instantiating module "mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap): authenticating by calling 'ntlm_auth'
  # Instantiating module "chrooted_mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (chrooted_mschap): authenticating by calling 'ntlm_auth'
  # Instantiating module "chrooted_mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (chrooted_mschap_machine): authenticating by calling 'ntlm_auth'
  # Instantiating module "mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap_machine): authenticating by calling 'ntlm_auth'
  # Instantiating module "mschap_local" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap_local): using internal authentication
  # Instantiating module "reject" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "fail" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "ok" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "handled" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "invalid" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "userlock" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "notfound" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "noop" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "updated" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "attr_filter.post-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/post-proxy
  # Instantiating module "attr_filter.pre-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/pre-proxy
  # Instantiating module "attr_filter.access_reject" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/access_reject
[/usr/local/pf/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay" 	found in filter list for realm "DEFAULT". 
[/usr/local/pf/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec" 	found in filter list for realm "DEFAULT". 
  # Instantiating module "attr_filter.access_challenge" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/access_challenge
  # Instantiating module "attr_filter.accounting_response" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/accounting_response
  # Instantiating module "attr_filter.packetfence_post_auth" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/packetfence-post-auth
  # Instantiating module "attr_filter.packetfence_pre_proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/packetfence-pre-proxy
  # Instantiating module "cache_eap" from file /usr/local/pf/raddb/mods-enabled/cache_eap
rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
  # Instantiating module "cache_ntlm" from file /usr/local/pf/raddb/mods-enabled/cache_ntlm
rlm_cache (cache_ntlm): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
  # Instantiating module "cache_password" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (cache_password): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
  # Instantiating module "userprincipalname" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (userprincipalname): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
  # Instantiating module "PacketFence-NTCacheHash" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (PacketFence-NTCacheHash): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
  # Instantiating module "detail" from file /usr/local/pf/raddb/mods-enabled/detail
  # Instantiating module "auth_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output
  # Instantiating module "reply_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  # Instantiating module "pre_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  # Instantiating module "post_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  # Instantiating module "expiration" from file /usr/local/pf/raddb/mods-enabled/expiration
  # Instantiating module "files" from file /usr/local/pf/raddb/mods-enabled/files
reading pairlist file /usr/local/pf/raddb/mods-config/files/authorize
reading pairlist file /usr/local/pf/raddb/mods-config/files/accounting
reading pairlist file /usr/local/pf/raddb/mods-config/files/pre-proxy
  # Instantiating module "linelog" from file /usr/local/pf/raddb/mods-enabled/linelog
  # Instantiating module "log_accounting" from file /usr/local/pf/raddb/mods-enabled/linelog
 } # modules
auth: #### Loading Virtual Servers ####
server { # from file /usr/local/pf/raddb/auth.conf
} # server
server packetfence { # from file /usr/local/pf/raddb/sites-enabled/packetfence
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading preacct {...}
 # Loading accounting {...}
 # Loading pre-proxy {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server packetfence
server pf-remote { # from file /usr/local/pf/raddb/sites-enabled/packetfence
 # Loading authorize {...}
 # Loading accounting {...}
 # Loading post-proxy {...}
} # server pf-remote
server pf.degraded { # from file /usr/local/pf/raddb/sites-enabled/packetfence
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading preacct {...}
 # Loading accounting {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server pf.degraded
server packetfence-degraded-tunnel { # from file /usr/local/pf/raddb/sites-enabled/packetfence
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading session {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server packetfence-degraded-tunnel
server packetfence-tunnel { # from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading session {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server packetfence-tunnel
server packetfence-tunnel-fast { # from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading session {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server packetfence-tunnel-fast
server packetfence-cli { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cli
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading accounting {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server packetfence-cli
server dynamic_clients { # from file /usr/local/pf/raddb/sites-enabled/dynamic-clients
 # Loading authorize {...}
} # server dynamic_clients
server status { # from file /usr/local/pf/raddb/sites-enabled/status
 # Loading authorize {...}
} # server status
server pf.cluster { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
 # Loading authorize {...}
 # Loading accounting {...}
 # Loading post-proxy {...}
} # server pf.cluster
server pfcli.cluster { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
 # Loading authorize {...}
 # Loading post-proxy {...}
} # server pfcli.cluster
 thread pool {
 	start_servers = 0
 	max_servers = 64
 	min_spare_servers = 3
 	max_spare_servers = 10
 	max_requests_per_server = 0
 	cleanup_delay = 5
 	max_queue_size = 65536
 	auto_limit_acct = no
 }
Thread pool initialized
auth: #### Opening IP addresses and Ports ####
listen {
 	type = "status"
 	virtual_server = "status"
 	ipaddr = 127.0.0.1
 	port = 18121
  client admin {
  	ipaddr = 127.0.0.1
  	require_message_authenticator = no
  	secret = <<< secret >>>
   limit {
   	max_connections = 16
   	lifetime = 0
   	idle_timeout = 30
   }
  }
}
listen {
 	type = "auth"
 	virtual_server = "pf-remote"
 	ipaddr = 172.20.135.4
 	port = 0
}
listen {
 	type = "auth+acct"
 	virtual_server = "packetfence"
 	ipaddr = 172.20.135.4
 	port = 2083
 	proto = "tcp"
  tls {
  	verify_depth = 0
  	ca_path = "/usr/local/pf/raddb/certs"
  	pem_file_type = yes
  	private_key_file = "/usr/local/pf/raddb/certs/server.key"
  	certificate_file = "/usr/local/pf/raddb/certs/server.crt"
  	ca_file = "/usr/local/pf/raddb/certs/ca.pem"
  	dh_file = "/usr/local/pf/raddb/certs/dh"
  	fragment_size = 8192
  	include_length = yes
  	auto_chain = yes
  	check_crl = no
  	check_all_crl = no
  	cipher_list = "DEFAULT"
  	require_client_cert = yes
  	ecdh_curve = "prime256v1"
  	tls_max_version = ""
  	tls_min_version = "1.0"
   cache {
   	enable = no
   	lifetime = 24
   	max_entries = 255
   }
   verify {
   	skip_if_ocsp_ok = no
   }
   ocsp {
   	enable = no
   	override_cert_url = no
   	use_nonce = yes
   	timeout = 0
   	softfail = no
   }
  }
The configuration allows TLS 1.0 and/or TLS 1.1.  We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
}
listen {
 	type = "control"
 listen {
 	socket = "/usr/local/pf/var/run/radiusd.sock"
 	mode = "rw"
 	peercred = yes
 }
}
Listening on status address 127.0.0.1 port 18121 bound to server status
Listening on auth address 172.20.135.4 port 1812 bound to server pf-remote
Listening on auth+acct proto tcp address 172.20.135.4 port 2083 (TLS) bound to server packetfence
Listening on command file /usr/local/pf/var/run/radiusd.sock
Listening on proxy address * port 33071
Ready to process requests
Threads: Spawning 3 spares
Thread spawned new child 1. Total threads in pool: 1
Thread spawned new child 2. Total threads in pool: 2
Thread spawned new child 3. Total threads in pool: 3
Thread 1 waiting to be assigned a request
Waking up in 0.3 seconds.
Thread 1 got semaphore
Thread 2 waiting to be assigned a request
Thread 3 waiting to be assigned a request
Thread 1 handling request 0, (1 handled so far)
(0) Received Access-Request Id 169 from 172.20.135.5:58688 to 172.20.135.4:1812 length 243
(0)   User-Name = "64-76-ba-89-71-4c"
(0)   User-Password = "64-76-ba-89-71-4c"
(0)   NAS-IP-Address = 172.20.110.250
(0)   NAS-Port = 0
(0)   Service-Type = Call-Check
(0)   Called-Station-Id = "00:1a:1e:01:68:f8"
(0)   Calling-Station-Id = "64:76:ba:89:71:4c"
(0)   NAS-Port-Type = Wireless-802.11
(0)   Aruba-Essid-Name = "CPS-District"
(0)   Aruba-Location-Id = "MS-A181"
(0)   Aruba-AP-Group = "MS"
(0)   PacketFence-KeyBalanced = "2cab901e9652f08e98b274d193485eb3"
(0)   Message-Authenticator = 0x7e530e25ff2a29433fb983dbe71b3e57
(0)   Proxy-State = 0x313830
(0) # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
(0)   authorize {
(0)     update control {
(0)       EXPAND %{Calling-Station-Id}
(0)          --> 64:76:ba:89:71:4c
(0)       Load-Balance-Key := 64:76:ba:89:71:4c
(0)       Proxy-To-Realm := "remote"
(0)     } # update control = noop
(0)     if (!NAS-IP-Address){
(0)     if (!NAS-IP-Address) -> FALSE
(0)   } # authorize = noop
(0) Starting proxy to home server 172.20.135.10 port 1812
(0) server pf-remote {
(0) }
(0) Proxying request to home server 172.20.135.10 port 1812 timeout 6.000000
(0) Sent Access-Request Id 190 from 172.20.135.4:38624 to 172.20.135.10:1812 length 248
(0)   User-Name = "64-76-ba-89-71-4c"
(0)   User-Password = "64-76-ba-89-71-4c"
(0)   NAS-IP-Address = 172.20.110.250
(0)   NAS-Port = 0
(0)   Service-Type = Call-Check
(0)   Called-Station-Id = "00:1a:1e:01:68:f8"
(0)   Calling-Station-Id = "64:76:ba:89:71:4c"
(0)   NAS-Port-Type = Wireless-802.11
(0)   Aruba-Essid-Name = "CPS-District"
(0)   Aruba-Location-Id = "MS-A181"
(0)   Aruba-AP-Group = "MS"
(0)   PacketFence-KeyBalanced = "2cab901e9652f08e98b274d193485eb3"
(0)   Message-Authenticator = 0x7e530e25ff2a29433fb983dbe71b3e57
(0)   Proxy-State = 0x313830
(0)   Proxy-State = 0x313639
Thread 1 waiting to be assigned a request
Listening on proxy address 172.20.135.4 port 38624
Waking up in 0.3 seconds.
(0) Marking home server 172.20.135.10 port 1812 alive
Threads: total/active/spare threads = 3/0/3
Waking up in 0.3 seconds.
Thread 2 got semaphore
Thread 2 handling request 0, (1 handled so far)
(0) Clearing existing &reply: attributes
(0) Received Access-Accept Id 190 from 172.20.135.10:1812 to 172.20.135.4:38624 length 47
(0)   Tunnel-Type:0 = VLAN
(0)   Tunnel-Private-Group-Id:0 = "135"
(0)   Tunnel-Medium-Type:0 = IEEE-802
(0)   Proxy-State = 0x313830
(0)   Proxy-State = 0x313639
(0) server pf-remote {
(0)   # Executing section post-proxy from file /usr/local/pf/raddb/sites-enabled/packetfence
(0)     post-proxy {
(0)       update control {
(0)         EXPAND %{home_server:ipaddr}
(0)            --> 172.20.135.10
(0)         PacketFence-Proxied-To := 172.20.135.10
(0)       } # update control = noop
(0)       if (&proxy-reply:Packet-Type == Access-Accept) {
(0)       EXPAND &proxy-reply:Packet-Type
(0)          --> Access-Accept
(0)       if (&proxy-reply:Packet-Type == Access-Accept)  -> TRUE
(0)       if (&proxy-reply:Packet-Type == Access-Accept)  {
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Released connection (0)
Need 1 more connections to reach min connections (3)
rlm_sql (sql): Opening additional connection (2), 1 of 62 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
(0)         EXPAND %{User-Name}
(0)            --> 64-76-ba-89-71-4c
(0)         SQL-User-Name set to '64-76-ba-89-71-4c'
rlm_sql (sql): Reserved connection (1)
(0)         Executing query: DELETE FROM radreply where username="64:76:ba:89:71:4c"
(0)         SQL query affected no rows
rlm_sql (sql): Released connection (1)
(0)         EXPAND %{sql_degraded:DELETE FROM radreply where username="%{Calling-Station-Id}"}
(0)            --> 
(0) reply_in_db:   $RAD_REQUEST{'User-Name'} = &request:User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db:   $RAD_REQUEST{'User-Password'} = &request:User-Password -> '64-76-ba-89-71-4c'
(0) reply_in_db:   $RAD_REQUEST{'NAS-IP-Address'} = &request:NAS-IP-Address -> '172.20.110.250'
(0) reply_in_db:   $RAD_REQUEST{'NAS-Port'} = &request:NAS-Port -> '0'
(0) reply_in_db:   $RAD_REQUEST{'Service-Type'} = &request:Service-Type -> 'Call-Check'
(0) reply_in_db:   $RAD_REQUEST{'Called-Station-Id'} = &request:Called-Station-Id -> '00:1a:1e:01:68:f8'
(0) reply_in_db:   $RAD_REQUEST{'Calling-Station-Id'} = &request:Calling-Station-Id -> '64:76:ba:89:71:4c'
(0) reply_in_db:   $RAD_REQUEST{'Proxy-State'} = &request:Proxy-State -> '0x313830'
(0) reply_in_db:   $RAD_REQUEST{'NAS-Port-Type'} = &request:NAS-Port-Type -> 'Wireless-802.11'
(0) reply_in_db:   $RAD_REQUEST{'Message-Authenticator'} = &request:Message-Authenticator -> '0x7e530e25ff2a29433fb983dbe71b3e57'
(0) reply_in_db:   $RAD_REQUEST{'Aruba-Essid-Name'} = &request:Aruba-Essid-Name -> 'CPS-District'
(0) reply_in_db:   $RAD_REQUEST{'Aruba-Location-Id'} = &request:Aruba-Location-Id -> 'MS-A181'
(0) reply_in_db:   $RAD_REQUEST{'Aruba-AP-Group'} = &request:Aruba-AP-Group -> 'MS'
(0) reply_in_db:   $RAD_REQUEST{'Realm'} = &request:Realm -> 'remote'
(0) reply_in_db:   $RAD_REQUEST{'SQL-User-Name'} = &request:SQL-User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db:   $RAD_REQUEST{'PacketFence-KeyBalanced'} = &request:PacketFence-KeyBalanced -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db:   $RAD_CHECK{'Load-Balance-Key'} = &control:Load-Balance-Key -> '64:76:ba:89:71:4c'
(0) reply_in_db:   $RAD_CHECK{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'remote'
(0) reply_in_db:   $RAD_CHECK{'PacketFence-Proxied-To'} = &control:PacketFence-Proxied-To -> '172.20.135.10'
(0) reply_in_db:   $RAD_CONFIG{'Load-Balance-Key'} = &control:Load-Balance-Key -> '64:76:ba:89:71:4c'
(0) reply_in_db:   $RAD_CONFIG{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'remote'
(0) reply_in_db:   $RAD_CONFIG{'PacketFence-Proxied-To'} = &control:PacketFence-Proxied-To -> '172.20.135.10'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'User-Name'} = &proxy-request:User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'User-Password'} = &proxy-request:User-Password -> '64-76-ba-89-71-4c'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'NAS-IP-Address'} = &proxy-request:NAS-IP-Address -> '172.20.110.250'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'NAS-Port'} = &proxy-request:NAS-Port -> '0'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Service-Type'} = &proxy-request:Service-Type -> 'Call-Check'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Called-Station-Id'} = &proxy-request:Called-Station-Id -> '00:1a:1e:01:68:f8'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Calling-Station-Id'} = &proxy-request:Calling-Station-Id -> '64:76:ba:89:71:4c'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Proxy-State'}[0] = &proxy-request:Proxy-State -> '0x313639'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Proxy-State'}[1] = &proxy-request:Proxy-State -> '0x313830'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'NAS-Port-Type'} = &proxy-request:NAS-Port-Type -> 'Wireless-802.11'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Message-Authenticator'} = &proxy-request:Message-Authenticator -> '0x7e530e25ff2a29433fb983dbe71b3e57'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Aruba-Essid-Name'} = &proxy-request:Aruba-Essid-Name -> 'CPS-District'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Aruba-Location-Id'} = &proxy-request:Aruba-Location-Id -> 'MS-A181'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Aruba-AP-Group'} = &proxy-request:Aruba-AP-Group -> 'MS'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'PacketFence-KeyBalanced'} = &proxy-request:PacketFence-KeyBalanced -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db:   $RAD_REQUEST_PROXY_REPLY{'Proxy-State'}[0] = &proxy-reply:Proxy-State -> '0x313830'
(0) reply_in_db:   $RAD_REQUEST_PROXY_REPLY{'Proxy-State'}[1] = &proxy-reply:Proxy-State -> '0x313639'
(0) reply_in_db:   $RAD_REQUEST_PROXY_REPLY{'Tunnel-Type'} = &proxy-reply:Tunnel-Type -> 'VLAN'
(0) reply_in_db:   $RAD_REQUEST_PROXY_REPLY{'Tunnel-Medium-Type'} = &proxy-reply:Tunnel-Medium-Type -> 'IEEE-802'
(0) reply_in_db:   $RAD_REQUEST_PROXY_REPLY{'Tunnel-Private-Group-Id'} = &proxy-reply:Tunnel-Private-Group-Id -> '135'
(0) reply_in_db: &request:NAS-Port-Type = $RAD_REQUEST{'NAS-Port-Type'} -> 'Wireless-802.11'
(0) reply_in_db: &request:Proxy-State = $RAD_REQUEST{'Proxy-State'} -> '0x313830'
(0) reply_in_db: &request:Service-Type = $RAD_REQUEST{'Service-Type'} -> 'Call-Check'
(0) reply_in_db: &request:Called-Station-Id = $RAD_REQUEST{'Called-Station-Id'} -> '00:1a:1e:01:68:f8'
(0) reply_in_db: &request:Message-Authenticator = $RAD_REQUEST{'Message-Authenticator'} -> '0x7e530e25ff2a29433fb983dbe71b3e57'
(0) reply_in_db: &request:Realm = $RAD_REQUEST{'Realm'} -> 'remote'
(0) reply_in_db: &request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '172.20.110.250'
(0) reply_in_db: &request:SQL-User-Name = $RAD_REQUEST{'SQL-User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &request:Aruba-Essid-Name = $RAD_REQUEST{'Aruba-Essid-Name'} -> 'CPS-District'
(0) reply_in_db: &request:PacketFence-KeyBalanced = $RAD_REQUEST{'PacketFence-KeyBalanced'} -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: &request:Aruba-AP-Group = $RAD_REQUEST{'Aruba-AP-Group'} -> 'MS'
(0) reply_in_db: &request:User-Name = $RAD_REQUEST{'User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:Aruba-Location-Id = $RAD_REQUEST{'Aruba-Location-Id'} -> 'MS-A181'
(0) reply_in_db: &request:User-Password = $RAD_REQUEST{'User-Password'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:NAS-Port = $RAD_REQUEST{'NAS-Port'} -> '0'
(0) reply_in_db: &control:PacketFence-Proxied-To = $RAD_CHECK{'PacketFence-Proxied-To'} -> '172.20.135.10'
(0) reply_in_db: &control:Load-Balance-Key = $RAD_CHECK{'Load-Balance-Key'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &control:PacketFence-reply-insert = $RAD_CHECK{'PacketFence-reply-insert'} -> 'INSERT into radreply (username, attribute, value) values ('64:76:ba:89:71:4c','Tunnel-Medium-Type:0','IEEE-802'), ('64:76:ba:89:71:4c','Tunnel-Private-Group-Id:0','135'), ('64:76:ba:89:71:4c','Tunnel-Type:0','VLAN')'
(0) reply_in_db: &control:Proxy-To-Realm = $RAD_CHECK{'Proxy-To-Realm'} -> 'remote'
(0) reply_in_db: &proxy-request:NAS-Port-Type = $RAD_REQUEST_PROXY{'NAS-Port-Type'} -> 'Wireless-802.11'
(0) reply_in_db: &proxy-request:Proxy-State += $RAD_REQUEST_PROXY{'Proxy-State'} -> '0x313639'
(0) reply_in_db: &proxy-request:Proxy-State += $RAD_REQUEST_PROXY{'Proxy-State'} -> '0x313830'
(0) reply_in_db: &proxy-request:Service-Type = $RAD_REQUEST_PROXY{'Service-Type'} -> 'Call-Check'
(0) reply_in_db: &proxy-request:Aruba-Essid-Name = $RAD_REQUEST_PROXY{'Aruba-Essid-Name'} -> 'CPS-District'
(0) reply_in_db: &proxy-request:Calling-Station-Id = $RAD_REQUEST_PROXY{'Calling-Station-Id'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &proxy-request:Called-Station-Id = $RAD_REQUEST_PROXY{'Called-Station-Id'} -> '00:1a:1e:01:68:f8'
(0) reply_in_db: &proxy-request:PacketFence-KeyBalanced = $RAD_REQUEST_PROXY{'PacketFence-KeyBalanced'} -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: &proxy-request:Message-Authenticator = $RAD_REQUEST_PROXY{'Message-Authenticator'} -> '0x7e530e25ff2a29433fb983dbe71b3e57'
(0) reply_in_db: &proxy-request:Aruba-AP-Group = $RAD_REQUEST_PROXY{'Aruba-AP-Group'} -> 'MS'
(0) reply_in_db: &proxy-request:Aruba-Location-Id = $RAD_REQUEST_PROXY{'Aruba-Location-Id'} -> 'MS-A181'
(0) reply_in_db: &proxy-request:User-Name = $RAD_REQUEST_PROXY{'User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &proxy-request:User-Password = $RAD_REQUEST_PROXY{'User-Password'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &proxy-request:NAS-IP-Address = $RAD_REQUEST_PROXY{'NAS-IP-Address'} -> '172.20.110.250'
(0) reply_in_db: &proxy-request:NAS-Port = $RAD_REQUEST_PROXY{'NAS-Port'} -> '0'
(0) reply_in_db: &proxy-reply:Tunnel-Private-Group-Id:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Private-Group-Id:0'} -> '135'
(0) reply_in_db: &proxy-reply:Tunnel-Medium-Type:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Medium-Type:0'} -> 'IEEE-802'
(0) reply_in_db: &proxy-reply:Tunnel-Type:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Type:0'} -> 'VLAN'
(0) reply_in_db: &proxy-reply:Proxy-State += $RAD_REQUEST_PROXY_REPLY{'Proxy-State'} -> '0x313830'
(0) reply_in_db: &proxy-reply:Proxy-State += $RAD_REQUEST_PROXY_REPLY{'Proxy-State'} -> '0x313639'
(0)         [reply_in_db] = ok
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Released connection (0)
(0)         EXPAND %{User-Name}
(0)            --> 64-76-ba-89-71-4c
(0)         SQL-User-Name set to '64-76-ba-89-71-4c'
rlm_sql (sql): Reserved connection (2)
(0)         Executing query: INSERT into radreply (username, attribute, value) values ('64:76:ba:89:71:4c','Tunnel-Medium-Type:0','IEEE-802'), ('64:76:ba:89:71:4c','Tunnel-Private-Group-Id:0','135'), ('64:76:ba:89:71:4c','Tunnel-Type:0','VLAN')
rlm_sql_mysql: Records: 3  Duplicates: 0  Warnings: 0
rlm_sql (sql): Released connection (2)
(0)         EXPAND %{sql_degraded:%{control:PacketFence-reply-insert}}
(0)            --> 3
(0)       } # if (&proxy-reply:Packet-Type == Access-Accept)  = ok
(0)       ... skipping else: Preceding "if" was taken
(0) attr_filter.packetfence_post_auth: EXPAND %{User-Name}
(0) attr_filter.packetfence_post_auth:    --> 64-76-ba-89-71-4c
(0) attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10
(0)       [attr_filter.packetfence_post_auth] = updated
(0)     } # post-proxy = updated
(0) }
(0) Found Auth-Type = Accept
(0) Auth-Type = Accept, accepting the user
(0) Login OK: [64-76-ba-89-71-4c] (from client pf port 0 cli 64:76:ba:89:71:4c)
(0) Sent Access-Accept Id 169 from 172.20.135.4:1812 to 172.20.135.5:58688 length 0
(0)   Tunnel-Private-Group-Id:0 = "135"
(0)   Tunnel-Medium-Type:0 = IEEE-802
(0)   Tunnel-Type:0 = VLAN
(0)   Proxy-State = 0x313830
(0) Finished request
Thread 2 waiting to be assigned a request
Waking up in 4.6 seconds.
-------------- next part --------------
FreeRADIUS Version 3.0.21
Copyright (C) 1999-2019 The FreeRADIUS server project and contributors
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License
For more information about these matters, see the file named COPYRIGHT
Starting - reading configuration files ...
including dictionary file /usr/share/freeradius/dictionary
including dictionary file /usr/share/freeradius/dictionary.dhcp
including dictionary file /usr/share/freeradius/dictionary.vqp
including dictionary file /usr/local/pf/raddb/dictionary
including configuration file /usr/local/pf/raddb/auth.conf
including configuration file /usr/local/pf/raddb/radiusd.conf
including configuration file /usr/local/pf/raddb/proxy.conf
including configuration file /usr/local/pf/raddb/proxy.conf.inc
including configuration file /usr/local/pf/raddb/clients.conf
including configuration file /usr/local/pf/raddb/clients.conf.inc
including configuration file /usr/local/pf/raddb/clients.eduroam.conf.inc
including files in directory /usr/local/pf/raddb/mods-enabled/
including configuration file /usr/local/pf/raddb/mods-enabled/logintime
including configuration file /usr/local/pf/raddb/mods-enabled/ntlm_auth
including configuration file /usr/local/pf/raddb/mods-enabled/pap
including configuration file /usr/local/pf/raddb/mods-enabled/passwd
including configuration file /usr/local/pf/raddb/mods-enabled/perl
including configuration file /usr/local/pf/raddb/mods-enabled/preprocess
including configuration file /usr/local/pf/raddb/mods-enabled/radutmp
including configuration file /usr/local/pf/raddb/mods-enabled/raw
including configuration file /usr/local/pf/raddb/mods-enabled/realm
including configuration file /usr/local/pf/raddb/mods-enabled/redis
including configuration file /usr/local/pf/raddb/mods-enabled/replicate
including configuration file /usr/local/pf/raddb/mods-enabled/soh
including configuration file /usr/local/pf/raddb/mods-enabled/sradutmp
including configuration file /usr/local/pf/raddb/mods-enabled/unix
including configuration file /usr/local/pf/raddb/mods-enabled/unpack
including configuration file /usr/local/pf/raddb/mods-enabled/utf8
including configuration file /usr/local/pf/raddb/mods-enabled/eap
including configuration file /usr/local/pf/raddb/mods-enabled/rest
including configuration file /usr/local/pf/raddb/mods-enabled/sql
including configuration file /usr/local/pf/raddb/mods-config/sql/main/mysql/queries.conf
including configuration file /usr/local/pf/raddb/mods-config/sql/main/mysql/reject.conf
including configuration file /usr/local/pf/raddb/mods-enabled/mschap
including configuration file /usr/local/pf/raddb/mods-enabled/go
including configuration file /usr/local/pf/raddb/mods-enabled/always
including configuration file /usr/local/pf/raddb/mods-enabled/attr_filter
including configuration file /usr/local/pf/raddb/mods-enabled/cache_eap
including configuration file /usr/local/pf/raddb/mods-enabled/cache_ntlm
including configuration file /usr/local/pf/raddb/mods-enabled/cache_password
including configuration file /usr/local/pf/raddb/mods-enabled/chap
including configuration file /usr/local/pf/raddb/mods-enabled/detail
including configuration file /usr/local/pf/raddb/mods-enabled/detail.log
including configuration file /usr/local/pf/raddb/mods-enabled/digest
including configuration file /usr/local/pf/raddb/mods-enabled/dynamic_clients
including configuration file /usr/local/pf/raddb/mods-enabled/echo
including configuration file /usr/local/pf/raddb/mods-enabled/exec
including configuration file /usr/local/pf/raddb/mods-enabled/expiration
including configuration file /usr/local/pf/raddb/mods-enabled/expr
including configuration file /usr/local/pf/raddb/mods-enabled/files
including configuration file /usr/local/pf/raddb/mods-enabled/linelog
including files in directory /usr/local/pf/raddb/policy.d/
including configuration file /usr/local/pf/raddb/policy.d/abfab-tr
including configuration file /usr/local/pf/raddb/policy.d/accounting
including configuration file /usr/local/pf/raddb/policy.d/canonicalization
including configuration file /usr/local/pf/raddb/policy.d/control
including configuration file /usr/local/pf/raddb/policy.d/cui
including configuration file /usr/local/pf/raddb/policy.d/debug
including configuration file /usr/local/pf/raddb/policy.d/dhcp
including configuration file /usr/local/pf/raddb/policy.d/eap
including configuration file /usr/local/pf/raddb/policy.d/filter
including configuration file /usr/local/pf/raddb/policy.d/operator-name
including configuration file /usr/local/pf/raddb/policy.d/packetfence.orig
including configuration file /usr/local/pf/raddb/policy.d/packetfence
including files in directory /usr/local/pf/raddb/sites-enabled/
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-cli
including configuration file /usr/local/pf/raddb/sites-enabled/dynamic-clients
including configuration file /usr/local/pf/raddb/sites-enabled/status
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
main {
 security {
 	user = "pf"
 	group = "pf"
 	allow_core_dumps = no
 }
	name = "radiusd"
	prefix = "/usr"
	localstatedir = "/usr/local/pf/var"
	logdir = "/usr/local/pf/logs"
	run_dir = "/usr/local/pf/var/run"
}
main {
	name = "radiusd"
	prefix = "/usr"
	localstatedir = "/usr/local/pf/var"
	sbindir = "/usr/sbin"
	logdir = "/usr/local/pf/logs"
	run_dir = "/usr/local/pf/var/run"
	libdir = "/usr/lib64/freeradius:/usr/lib/freeradius"
	radacctdir = "/usr/local/pf/logs/radacct"
	hostname_lookups = no
	max_request_time = 10
	cleanup_delay = 5
	max_requests = 20000
	pidfile = "/usr/local/pf/var/run/radiusd.pid"
	checkrad = "/usr/sbin/checkrad"
	debug_level = 0
	proxy_requests = yes
 log {
 	stripped_names = no
 	auth = yes
 	auth_badpass = no
 	auth_goodpass = no
 	colourise = yes
 	msg_denied = "You are already logged in - access denied"
 }
 resources {
 }
 security {
 	max_attributes = 200
 	reject_delay = 1.000000
 	status_server = yes
 	allow_vulnerable_openssl = "yes"
 }
}
auth: #### Loading Realms and Home Servers ####
 proxy server {
 	retry_delay = 5
 	retry_count = 3
 	default_fallback = no
 	dead_time = 120
 	wake_all_if_all_dead = no
 }
 home_server localhost {
 	ipaddr = 127.0.0.1
 	port = 1812
 	type = "auth"
 	secret = <<< secret >>>
 	response_window = 20.000000
 	response_timeouts = 1
 	max_outstanding = 65536
 	zombie_period = 40
 	status_check = "status-server"
 	ping_interval = 30
 	check_interval = 30
 	check_timeout = 4
 	num_answers_to_alive = 3
 	revive_interval = 120
  limit {
  	max_connections = 16
  	max_requests = 0
  	lifetime = 0
  	idle_timeout = 0
  }
  coa {
  	irt = 2
  	mrt = 16
  	mrc = 5
  	mrd = 30
  }
 }
Ignoring "response_window = 20.000000", forcing to "response_window = 10.000000"
 home_server pf.remote {
 	ipaddr = 172.20.135.10
 	port = 1812
 	type = "auth+acct"
 	secret = <<< secret >>>
 	src_ipaddr = "172.20.135.4"
 	response_window = 6.000000
 	response_timeouts = 1
 	max_outstanding = 65536
 	zombie_period = 40
 	status_check = "status-server"
 	ping_interval = 30
 	check_interval = 30
 	check_timeout = 4
 	num_answers_to_alive = 3
 	revive_interval = 120
  limit {
  	max_connections = 16
  	max_requests = 0
  	lifetime = 0
  	idle_timeout = 0
  }
  coa {
  	irt = 2
  	mrt = 16
  	mrc = 5
  	mrd = 30
  }
 }
 home_server degraded {
 	virtual_server = "pf.degraded"
 	port = 0
 	response_window = 30.000000
 	response_timeouts = 1
 	max_outstanding = 65536
 	zombie_period = 40
 	status_check = "none"
 	ping_interval = 30
 	check_timeout = 4
 	num_answers_to_alive = 3
 	revive_interval = 300
  limit {
  	max_connections = 16
  	max_requests = 0
  	lifetime = 0
  	idle_timeout = 0
  }
  coa {
  	irt = 2
  	mrt = 16
  	mrc = 5
  	mrd = 30
  }
 }
Ignoring "response_window = 30.000000", forcing to "response_window = 10.000000"
 home_server pf0.cluster {
 	ipaddr = 172.20.135.4
 	port = 1812
 	type = "auth+acct"
 	secret = <<< secret >>>
 	src_ipaddr = "172.20.135.5"
 	response_window = 6.000000
 	response_timeouts = 1
 	max_outstanding = 65536
 	zombie_period = 40
 	status_check = "status-server"
 	ping_interval = 30
 	check_interval = 30
 	check_timeout = 4
 	num_answers_to_alive = 3
 	revive_interval = 120
  limit {
  	max_connections = 16
  	max_requests = 0
  	lifetime = 0
  	idle_timeout = 0
  }
  coa {
  	irt = 2
  	mrt = 16
  	mrc = 5
  	mrd = 30
  }
 }
 home_server pf0.cli.cluster {
 	ipaddr = 172.20.135.4
 	port = 1815
 	type = "auth"
 	secret = <<< secret >>>
 	src_ipaddr = "172.20.135.5"
 	response_window = 6.000000
 	response_timeouts = 1
 	max_outstanding = 65536
 	zombie_period = 40
 	status_check = "status-server"
 	ping_interval = 30
 	check_interval = 30
 	check_timeout = 4
 	num_answers_to_alive = 3
 	revive_interval = 120
  limit {
  	max_connections = 16
  	max_requests = 0
  	lifetime = 0
  	idle_timeout = 0
  }
  coa {
  	irt = 2
  	mrt = 16
  	mrc = 5
  	mrd = 30
  }
 }
 home_server_pool my_auth_failover {
	type = fail-over
	home_server = localhost
 }
 realm example.com {
	auth_pool = my_auth_failover
 }
 realm default {
 }
 realm local {
 }
 realm null {
 }
 realm bob {
 }
 realm bibi {
 }
 realm inverse.inc {
 }
 realm eduroam.default {
 }
 realm eduroam.local {
 }
 realm eduroam.null {
 }
 realm eduroam.bob {
 }
 realm eduroam.bibi {
 }
 realm eduroam.inverse.inc {
 }
 home_server_pool pf_auth_pool {
	type = fail-over
	home_server = pf.remote
	home_server = degraded
 }
 home_server_pool pf_acct_pool {
	type = fail-over
	home_server = pf.remote
 }
 realm remote {
	auth_pool = pf_auth_pool
	acct_pool = pf_acct_pool
 }
 home_server_pool pf_pool.cluster {
	type = keyed-balance
	home_server = pf0.cluster
 }
 home_server_pool pfacct_pool.cluster {
	type = load-balance
	home_server = pf0.cluster
 }
 realm packetfence {
	auth_pool = pf_pool.cluster
	acct_pool = pfacct_pool.cluster
 }
 home_server_pool pfcli_pool.cluster {
	type = keyed-balance
	home_server = pf0.cli.cluster
 }
 realm packetfence-cli {
	auth_pool = pfcli_pool.cluster
 }
auth: #### Loading Clients ####
 client localhost {
 	ipaddr = 127.0.0.1
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	nas_type = "other"
 	proto = "*"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client localhost_ipv6 {
 	ipv6addr = ::1
 	require_message_authenticator = no
 	secret = <<< secret >>>
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client 172.20.135.4 {
 	ipaddr = 172.20.135.4
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	shortname = "pf"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client 172.20.135.5 {
 	ipaddr = 172.20.135.5
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	shortname = "pf"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client 172.20.135.11 {
 	ipaddr = 172.20.135.11
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	shortname = "pf"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client 172.20.135.12 {
 	ipaddr = 172.20.135.12
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	shortname = "pf"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client 172.20.135.13 {
 	ipaddr = 172.20.135.13
 	require_message_authenticator = no
 	secret = <<< secret >>>
 	shortname = "pf"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 }
 client dynamic {
 	ipaddr = 0.0.0.0/0
 	require_message_authenticator = no
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
 	dynamic_clients = "dynamic_clients"
 	lifetime = 300
 }
Debugger not attached
systemd watchdog is disabled
 # Creating Auth-Type = eap
 # Creating Auth-Type = PAP
 # Creating Auth-Type = CHAP
 # Creating Auth-Type = MS-CHAP
 # Creating Auth-Type = eap-degraded
 # Creating Autz-Type = Status-Server
auth: #### Instantiating modules ####
 modules {
  # Loaded module rlm_logintime
  # Loading module "logintime" from file /usr/local/pf/raddb/mods-enabled/logintime
  logintime {
  	minimum_timeout = 60
  }
  # Loaded module rlm_exec
  # Loading module "ntlm_auth" from file /usr/local/pf/raddb/mods-enabled/ntlm_auth
  exec ntlm_auth {
  	wait = yes
  	program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}"
  	shell_escape = yes
  }
  # Loaded module rlm_pap
  # Loading module "pap" from file /usr/local/pf/raddb/mods-enabled/pap
  pap {
  	normalise = yes
  }
  # Loaded module rlm_passwd
  # Loading module "etc_passwd" from file /usr/local/pf/raddb/mods-enabled/passwd
  passwd etc_passwd {
  	filename = "/etc/passwd"
  	format = "*User-Name:Crypt-Password:"
  	delimiter = ":"
  	ignore_nislike = no
  	ignore_empty = yes
  	allow_multiple_keys = no
  	hash_size = 100
  }
  # Loaded module rlm_perl
  # Loading module "perl" from file /usr/local/pf/raddb/mods-enabled/perl
  perl {
  	filename = "/usr/local/pf/raddb/mods-config/perl/example.pl"
  	func_authorize = "authorize"
  	func_authenticate = "authenticate"
  	func_post_auth = "post_auth"
  	func_accounting = "accounting"
  	func_preacct = "preacct"
  	func_checksimul = "checksimul"
  	func_detach = "detach"
  	func_xlat = "xlat"
  	func_pre_proxy = "pre_proxy"
  	func_post_proxy = "post_proxy"
  	func_recv_coa = "recv_coa"
  	func_send_coa = "send_coa"
  }
  # Loading module "packetfence" from file /usr/local/pf/raddb/mods-enabled/perl
  perl packetfence {
  	filename = "/usr/local/pf/raddb/mods-config/perl/packetfence.pm"
  	func_authorize = "authorize"
  	func_authenticate = "authenticate"
  	func_post_auth = "post_auth"
  	func_accounting = "accounting"
  	func_preacct = "preacct"
  	func_checksimul = "checksimul"
  	func_detach = "detach"
  	func_xlat = "xlat"
  	func_pre_proxy = "pre_proxy"
  	func_post_proxy = "post_proxy"
  	func_recv_coa = "recv_coa"
  	func_send_coa = "send_coa"
  }
  # Loading module "packetfence-multi-domain" from file /usr/local/pf/raddb/mods-enabled/perl
  perl packetfence-multi-domain {
  	filename = "/usr/local/pf/raddb/mods-config/perl/packetfence-multi-domain.pm"
  	func_authorize = "authorize"
  	func_authenticate = "authenticate"
  	func_post_auth = "post_auth"
  	func_accounting = "accounting"
  	func_preacct = "preacct"
  	func_checksimul = "checksimul"
  	func_detach = "detach"
  	func_xlat = "xlat"
  	func_pre_proxy = "pre_proxy"
  	func_post_proxy = "post_proxy"
  	func_recv_coa = "recv_coa"
  	func_send_coa = "send_coa"
  }
  # Loading module "reply_in_db" from file /usr/local/pf/raddb/mods-enabled/perl
  perl reply_in_db {
  	filename = "/usr/local/pf/raddb/mods-config/perl/reply_in_db.pm"
  	func_authorize = "authorize"
  	func_authenticate = "authenticate"
  	func_post_auth = "post_auth"
  	func_accounting = "accounting"
  	func_preacct = "preacct"
  	func_checksimul = "checksimul"
  	func_detach = "detach"
  	func_xlat = "xlat"
  	func_pre_proxy = "pre_proxy"
  	func_post_proxy = "post_proxy"
  	func_recv_coa = "recv_coa"
  	func_send_coa = "send_coa"
  }
  # Loaded module rlm_preprocess
  # Loading module "preprocess" from file /usr/local/pf/raddb/mods-enabled/preprocess
  preprocess {
  	huntgroups = "/usr/local/pf/raddb/mods-config/preprocess/huntgroups"
  	hints = "/usr/local/pf/raddb/mods-config/preprocess/hints"
  	with_ascend_hack = no
  	ascend_channels_per_line = 23
  	with_ntdomain_hack = no
  	with_specialix_jetstream_hack = no
  	with_cisco_vsa_hack = no
  	with_alvarion_vsa_hack = no
  }
  # Loaded module rlm_radutmp
  # Loading module "radutmp" from file /usr/local/pf/raddb/mods-enabled/radutmp
  radutmp {
  	filename = "/usr/local/pf/logs/radutmp"
  	username = "%{User-Name}"
  	case_sensitive = yes
  	check_with_nas = yes
  	permissions = 384
  	caller_id = yes
  }
  # Loaded module rlm_raw
  # Loading module "raw" from file /usr/local/pf/raddb/mods-enabled/raw
  raw {
  	name = "raw"
  }
  # Loaded module rlm_realm
  # Loading module "IPASS" from file /usr/local/pf/raddb/mods-enabled/realm
  realm IPASS {
  	format = "prefix"
  	delimiter = "/"
  	ignore_default = no
  	ignore_null = no
  }
  # Loading module "suffix" from file /usr/local/pf/raddb/mods-enabled/realm
  realm suffix {
  	format = "suffix"
  	delimiter = "@"
  	ignore_default = no
  	ignore_null = yes
  }
  # Loading module "realmpercent" from file /usr/local/pf/raddb/mods-enabled/realm
  realm realmpercent {
  	format = "suffix"
  	delimiter = "%"
  	ignore_default = no
  	ignore_null = no
  }
  # Loading module "ntdomain" from file /usr/local/pf/raddb/mods-enabled/realm
  realm ntdomain {
  	format = "prefix"
  	delimiter = "\\"
  	ignore_default = no
  	ignore_null = no
  }
  # Loaded module rlm_redis
  # Loading module "redis" from file /usr/local/pf/raddb/mods-enabled/redis
  redis {
  	server = "127.0.0.1"
  	port = 6379
  	database = 0
  	query_timeout = 5
  }
rlm_redis: libhiredis version: 0.12.1
  # Loading module "redis_ntlm" from file /usr/local/pf/raddb/mods-enabled/redis
  redis redis_ntlm {
  	server = "127.0.0.1"
  	port = 6383
  	database = 0
  	query_timeout = 5
  }
rlm_redis: libhiredis version: 0.12.1
  # Loaded module rlm_replicate
  # Loading module "replicate" from file /usr/local/pf/raddb/mods-enabled/replicate
  # Loaded module rlm_soh
  # Loading module "soh" from file /usr/local/pf/raddb/mods-enabled/soh
  soh {
  	dhcp = yes
  }
  # Loading module "sradutmp" from file /usr/local/pf/raddb/mods-enabled/sradutmp
  radutmp sradutmp {
  	filename = "/usr/local/pf/logs/sradutmp"
  	username = "%{User-Name}"
  	case_sensitive = yes
  	check_with_nas = yes
  	permissions = 420
  	caller_id = no
  }
  # Loaded module rlm_unix
  # Loading module "unix" from file /usr/local/pf/raddb/mods-enabled/unix
  unix {
  	radwtmp = "/usr/local/pf/logs/radwtmp"
  }
Creating attribute Unix-Group
  # Loaded module rlm_unpack
  # Loading module "unpack" from file /usr/local/pf/raddb/mods-enabled/unpack
  # Loaded module rlm_utf8
  # Loading module "utf8" from file /usr/local/pf/raddb/mods-enabled/utf8
  # Loaded module rlm_eap
  # Loading module "eap" from file /usr/local/pf/raddb/mods-enabled/eap
  eap {
  	default_eap_type = "peap"
  	timer_expire = 60
  	ignore_unknown_eap_types = no
  	cisco_accounting_username_bug = no
  	max_sessions = 20000
  }
  # Loading module "eap-degraded" from file /usr/local/pf/raddb/mods-enabled/eap
  eap eap-degraded {
  	default_eap_type = "peap"
  	timer_expire = 60
  	ignore_unknown_eap_types = no
  	cisco_accounting_username_bug = no
  	max_sessions = 20000
  }
  # Loaded module rlm_rest
  # Loading module "rest" from file /usr/local/pf/raddb/mods-enabled/rest
  rest {
  	connect_uri = "http://127.0.0.1:7070/"
  	connect_timeout = 4.000000
  }
  # Loading module "rest-cli" from file /usr/local/pf/raddb/mods-enabled/rest
  rest rest-cli {
  	connect_uri = "http://127.0.0.1:7070/"
  	connect_timeout = 4.000000
  }
  # Loaded module rlm_sql
  # Loading module "sql" from file /usr/local/pf/raddb/mods-enabled/sql
  sql {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = yes
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT  id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0"
  	authorize_check_query = "SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
  	authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
  	authorize_group_check_query = "SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{SQL-Group}' ORDER BY id"
  	authorize_group_reply_query = "SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{SQL-Group}' ORDER BY id"
  	group_membership_query = "SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority"
  	simul_verify_query = "SELECT radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS NULL"
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = "%{tolower:type.%{Acct-Status-Type}.query}"
    type {
     accounting-on {
     	query = "UPDATE radacct SET acctstoptime = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime	= '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime), acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND nasipaddress   = '%{NAS-IP-Address}' AND acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
     }
     accounting-off {
     	query = "UPDATE radacct SET acctstoptime = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime	= '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime), acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND nasipaddress   = '%{NAS-IP-Address}' AND acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
     }
     start {
     	query = "CALL acct_start ( '%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', FROM_UNIXTIME(%{integer:Event-Timestamp}), FROM_UNIXTIME(%{integer:Event-Timestamp}), NULL, '0', '%{Acct-Authentic}', '%{Connect-Info}', '', '0', '0', '%{Called-Station-Id}', '%{Calling-Station-Id}', '', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '%{Acct-Status-Type}','%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
     }
     interim-update {
     	query = "CALL acct_update ( FROM_UNIXTIME(%{integer:Event-Timestamp}), '%{Framed-IP-Address}', '%{%{Acct-Session-Time}:-0}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Unique-Session-Id}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', '%{Acct-Authentic}', '%{Connect-Info}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Service-Type}', '%{Framed-Protocol}', '%{Acct-Status-Type}','%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
     }
     stop {
     	query = "CALL acct_stop ( FROM_UNIXTIME(%{integer:Event-Timestamp}), '%{Framed-IP-Address}', '%{%{Acct-Session-Time}:-0}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Unique-Session-Id}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', '%{Acct-Authentic}', '%{Connect-Info}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Service-Type}', '%{Framed-Protocol}', '%{Acct-Terminate-Cause}', '%{Acct-Status-Type}', '%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
     }
    }
   }
   post-auth {
   	reference = "type.accept.query"
   }
  }
rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute SQL-Group
  # Loading module "pfguest" from file /usr/local/pf/raddb/mods-enabled/sql
  sql pfguest {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "guest" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
  	group_membership_query = "select 1"
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = ".query"
   }
  }
rlm_sql (pfguest): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfguest-SQL-Group
  # Loading module "pfsponsor" from file /usr/local/pf/raddb/mods-enabled/sql
  sql pfsponsor {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "sponsor" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
  	group_membership_query = "select 1"
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = ".query"
   }
  }
rlm_sql (pfsponsor): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfsponsor-SQL-Group
  # Loading module "pfsms" from file /usr/local/pf/raddb/mods-enabled/sql
  sql pfsms {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "sms" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
  	group_membership_query = "select 1"
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = ".query"
   }
  }
rlm_sql (pfsms): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfsms-SQL-Group
  # Loading module "pflocal" from file /usr/local/pf/raddb/mods-enabled/sql
  sql pflocal {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password WHERE pid = '%{SQL-User-Name}' AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' AND NOT EXISTS (SELECT pid FROM activation WHERE pid = '%{SQL-User-Name}')"
  	group_membership_query = "select 1"
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = ".query"
   }
  }
rlm_sql (pflocal): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pflocal-SQL-Group
  # Loading module "sql_reject" from file /usr/local/pf/raddb/mods-enabled/sql
  sql sql_reject {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	authorize_check_query = ""
  	authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{Calling-Station-Id}' ORDER BY id"
  	group_membership_query = ""
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = "type.reject.query"
   }
  }
rlm_sql (sql_reject): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute sql_reject-SQL-Group
  # Loading module "sql_degraded" from file /usr/local/pf/raddb/mods-enabled/sql
  sql sql_degraded {
  	driver = "rlm_sql_mysql"
  	server = "127.0.0.1"
  	port = 3306
  	login = "pf"
  	password = <<< secret >>>
  	radius_db = "pf"
  	read_groups = yes
  	read_profiles = yes
  	read_clients = no
  	delete_stale_sessions = yes
  	sql_user_name = "%{User-Name}"
  	default_user_profile = ""
  	client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
  	group_membership_query = ""
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /(),'"
  	auto_escape = no
   accounting {
   	reference = ".query"
    type {
     accounting-on {
     }
     accounting-off {
     }
     start {
     }
     interim-update {
     }
     stop {
     }
    }
   }
   post-auth {
   	reference = ".query"
   }
  }
rlm_sql (sql_degraded): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute sql_degraded-SQL-Group
  # Loaded module rlm_mschap
  # Loading module "mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
  mschap {
  	use_mppe = yes
  	require_encryption = yes
  	require_strong = yes
  	with_ntdomain_hack = yes
  	ntlm_auth = "/usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --          --request-nt-key  --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"
  	ntlm_auth_timeout = 3
   passchange {
   }
  	allow_retry = no
  	winbind_retry_with_normalised_username = no
  }
  # Loading module "chrooted_mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
  mschap chrooted_mschap {
  	use_mppe = no
  	require_encryption = yes
  	require_strong = yes
  	with_ntdomain_hack = yes
  	ntlm_auth = "/usr/bin/sudo /usr/sbin/chroot /chroots/%{PacketFence-Domain} /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --          --request-nt-key --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
  	ntlm_auth_timeout = 3
   passchange {
   }
  	allow_retry = no
  	winbind_retry_with_normalised_username = no
  }
  # Loading module "chrooted_mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
  mschap chrooted_mschap_machine {
  	use_mppe = yes
  	require_encryption = yes
  	require_strong = yes
  	with_ntdomain_hack = yes
  	ntlm_auth = "/usr/bin/sudo /usr/sbin/chroot /chroots/%{PacketFence-Domain} /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --              --request-nt-key --username=%{mschap:User-Name:-None} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
  	ntlm_auth_timeout = 3
   passchange {
   }
  	allow_retry = no
  	winbind_retry_with_normalised_username = no
  }
  # Loading module "mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
  mschap mschap_machine {
  	use_mppe = yes
  	require_encryption = yes
  	require_strong = yes
  	with_ntdomain_hack = yes
  	ntlm_auth = "/usr/local/pf/bin/ntlm_auth_wrapper -p 8125 --              --request-nt-key --username=%{mschap:User-Name:-None} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
  	ntlm_auth_timeout = 3
   passchange {
   }
  	allow_retry = no
  	winbind_retry_with_normalised_username = no
  }
  # Loading module "mschap_local" from file /usr/local/pf/raddb/mods-enabled/mschap
  mschap mschap_local {
  	use_mppe = no
  	require_encryption = yes
  	require_strong = yes
  	with_ntdomain_hack = yes
   passchange {
   }
  	allow_retry = yes
  	winbind_retry_with_normalised_username = no
  }
  # Loaded module rlm_always
  # Loading module "reject" from file /usr/local/pf/raddb/mods-enabled/always
  always reject {
  	rcode = "reject"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "fail" from file /usr/local/pf/raddb/mods-enabled/always
  always fail {
  	rcode = "fail"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "ok" from file /usr/local/pf/raddb/mods-enabled/always
  always ok {
  	rcode = "ok"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "handled" from file /usr/local/pf/raddb/mods-enabled/always
  always handled {
  	rcode = "handled"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "invalid" from file /usr/local/pf/raddb/mods-enabled/always
  always invalid {
  	rcode = "invalid"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "userlock" from file /usr/local/pf/raddb/mods-enabled/always
  always userlock {
  	rcode = "userlock"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "notfound" from file /usr/local/pf/raddb/mods-enabled/always
  always notfound {
  	rcode = "notfound"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "noop" from file /usr/local/pf/raddb/mods-enabled/always
  always noop {
  	rcode = "noop"
  	simulcount = 0
  	mpp = no
  }
  # Loading module "updated" from file /usr/local/pf/raddb/mods-enabled/always
  always updated {
  	rcode = "updated"
  	simulcount = 0
  	mpp = no
  }
  # Loaded module rlm_attr_filter
  # Loading module "attr_filter.post-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.post-proxy {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/post-proxy"
  	key = "%{Realm}"
  	relaxed = no
  }
  # Loading module "attr_filter.pre-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.pre-proxy {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/pre-proxy"
  	key = "%{Realm}"
  	relaxed = no
  }
  # Loading module "attr_filter.access_reject" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.access_reject {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/access_reject"
  	key = "%{User-Name}"
  	relaxed = no
  }
  # Loading module "attr_filter.access_challenge" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.access_challenge {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/access_challenge"
  	key = "%{User-Name}"
  	relaxed = no
  }
  # Loading module "attr_filter.accounting_response" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.accounting_response {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/accounting_response"
  	key = "%{User-Name}"
  	relaxed = no
  }
  # Loading module "attr_filter.packetfence_post_auth" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.packetfence_post_auth {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/packetfence-post-auth"
  	key = "%{User-Name}"
  	relaxed = yes
  }
  # Loading module "attr_filter.packetfence_pre_proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.packetfence_pre_proxy {
  	filename = "/usr/local/pf/raddb/mods-config/attr_filter/packetfence-pre-proxy"
  	key = "%{User-Name}"
  	relaxed = yes
  }
  # Loaded module rlm_cache
  # Loading module "cache_eap" from file /usr/local/pf/raddb/mods-enabled/cache_eap
  cache cache_eap {
  	driver = "rlm_cache_rbtree"
  	key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
  	ttl = 15
  	max_entries = 0
  	epoch = 0
  	add_stats = no
  }
  # Loading module "cache_ntlm" from file /usr/local/pf/raddb/mods-enabled/cache_ntlm
  cache cache_ntlm {
  	driver = "rlm_cache_rbtree"
  	key = "%{User-Name}%{Calling-Station-Id}"
  	ttl = 300
  	max_entries = 0
  	epoch = 0
  	add_stats = no
  }
  # Loading module "cache_password" from file /usr/local/pf/raddb/mods-enabled/cache_password
  cache cache_password {
  	driver = "rlm_cache_rbtree"
  	key = "%{User-Name}"
  	ttl = 3600
  	max_entries = 0
  	epoch = 0
  	add_stats = no
  }
  # Loading module "userprincipalname" from file /usr/local/pf/raddb/mods-enabled/cache_password
  cache userprincipalname {
  	driver = "rlm_cache_rbtree"
  	key = "%{User-Name}"
  	ttl = 3600
  	max_entries = 0
  	epoch = 0
  	add_stats = no
  }
  # Loading module "PacketFence-NTCacheHash" from file /usr/local/pf/raddb/mods-enabled/cache_password
  cache PacketFence-NTCacheHash {
  	driver = "rlm_cache_rbtree"
  	key = "%{User-Name}"
  	ttl = 10
  	max_entries = 0
  	epoch = 0
  	add_stats = no
  }
  # Loaded module rlm_chap
  # Loading module "chap" from file /usr/local/pf/raddb/mods-enabled/chap
  # Loaded module rlm_detail
  # Loading module "detail" from file /usr/local/pf/raddb/mods-enabled/detail
  detail {
  	filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
  	header = "%t"
  	permissions = 384
  	locking = no
  	escape_filenames = no
  	log_packet_header = no
  }
  # Loading module "auth_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  detail auth_log {
  	filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
  	header = "%t"
  	permissions = 384
  	locking = no
  	escape_filenames = no
  	log_packet_header = no
  }
  # Loading module "reply_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  detail reply_log {
  	filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
  	header = "%t"
  	permissions = 384
  	locking = no
  	escape_filenames = no
  	log_packet_header = no
  }
  # Loading module "pre_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  detail pre_proxy_log {
  	filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
  	header = "%t"
  	permissions = 384
  	locking = no
  	escape_filenames = no
  	log_packet_header = no
  }
  # Loading module "post_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  detail post_proxy_log {
  	filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
  	header = "%t"
  	permissions = 384
  	locking = no
  	escape_filenames = no
  	log_packet_header = no
  }
  # Loaded module rlm_digest
  # Loading module "digest" from file /usr/local/pf/raddb/mods-enabled/digest
  # Loaded module rlm_dynamic_clients
  # Loading module "dynamic_clients" from file /usr/local/pf/raddb/mods-enabled/dynamic_clients
  # Loading module "echo" from file /usr/local/pf/raddb/mods-enabled/echo
  exec echo {
  	wait = yes
  	program = "/bin/echo %{User-Name}"
  	input_pairs = "request"
  	output_pairs = "reply"
  	shell_escape = yes
  }
  # Loading module "exec" from file /usr/local/pf/raddb/mods-enabled/exec
  exec {
  	wait = no
  	input_pairs = "request"
  	shell_escape = yes
  	timeout = 10
  }
  # Loaded module rlm_expiration
  # Loading module "expiration" from file /usr/local/pf/raddb/mods-enabled/expiration
  # Loaded module rlm_expr
  # Loading module "expr" from file /usr/local/pf/raddb/mods-enabled/expr
  expr {
  	safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
  }
  # Loaded module rlm_files
  # Loading module "files" from file /usr/local/pf/raddb/mods-enabled/files
  files {
  	filename = "/usr/local/pf/raddb/mods-config/files/authorize"
  	acctusersfile = "/usr/local/pf/raddb/mods-config/files/accounting"
  	preproxy_usersfile = "/usr/local/pf/raddb/mods-config/files/pre-proxy"
  }
  # Loaded module rlm_linelog
  # Loading module "linelog" from file /usr/local/pf/raddb/mods-enabled/linelog
  linelog {
  	filename = "syslog"
  	escape_filenames = no
  	syslog_facility = "local1"
  	syslog_severity = "info"
  	permissions = 384
  	format = "This is a log message for %{User-Name}"
  	reference = "messages.%{%{reply:Packet-Type}:-default}"
  }
  # Loading module "log_accounting" from file /usr/local/pf/raddb/mods-enabled/linelog
  linelog log_accounting {
  	filename = "syslog"
  	escape_filenames = no
  	syslog_facility = "local2"
  	syslog_severity = "info"
  	permissions = 384
  	format = ""
  	reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
  }
  instantiate {
  # Instantiating module "redis" from file /usr/local/pf/raddb/mods-enabled/redis
rlm_redis (redis): Initialising connection pool
   pool {
   	start = 0
   	min = 3
   	max = 64
   	spare = 10
   	uses = 0
   	lifetime = 86400
   	cleanup_interval = 300
   	idle_timeout = 600
   	retry_delay = 30
   	spread = no
   }
  # Instantiating module "rest" from file /usr/local/pf/raddb/mods-enabled/rest
   authorize {
   	uri = "http://127.0.0.1:7070//radius/rest/filter"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   authenticate {
   	uri = "http://127.0.0.1:7070//radius/rest/filter"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   preacct {
   	uri = "http://127.0.0.1:7070//radius/rest/filter"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   accounting {
   	uri = "http://127.0.0.1:7070//radius/rest/accounting"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   pre-proxy {
   	uri = "http://127.0.0.1:7070//radius/rest/filter"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   post-proxy {
   	uri = "http://127.0.0.1:7070//radius/rest/filter"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   post-auth {
   	uri = "http://127.0.0.1:7070//radius/rest/authorize"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
rlm_rest: libcurl version: libcurl/7.29.0 NSS/3.44 zlib/1.2.7 libidn/1.28 libssh2/1.8.0
rlm_rest (rest): Initialising connection pool
   pool {
   	start = 0
   	min = 3
   	max = 64
   	spare = 10
   	uses = 0
   	lifetime = 0
   	cleanup_interval = 30
   	idle_timeout = 60
   	retry_delay = 30
   	spread = no
   }
  # Instantiating module "raw" from file /usr/local/pf/raddb/mods-enabled/raw
  }
  # Instantiating module "logintime" from file /usr/local/pf/raddb/mods-enabled/logintime
  # Instantiating module "pap" from file /usr/local/pf/raddb/mods-enabled/pap
  # Instantiating module "etc_passwd" from file /usr/local/pf/raddb/mods-enabled/passwd
rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
  # Instantiating module "perl" from file /usr/local/pf/raddb/mods-enabled/perl
  # Instantiating module "packetfence" from file /usr/local/pf/raddb/mods-enabled/perl
  # Instantiating module "packetfence-multi-domain" from file /usr/local/pf/raddb/mods-enabled/perl
  # Instantiating module "reply_in_db" from file /usr/local/pf/raddb/mods-enabled/perl
  # Instantiating module "preprocess" from file /usr/local/pf/raddb/mods-enabled/preprocess
reading pairlist file /usr/local/pf/raddb/mods-config/preprocess/huntgroups
reading pairlist file /usr/local/pf/raddb/mods-config/preprocess/hints
  # Instantiating module "IPASS" from file /usr/local/pf/raddb/mods-enabled/realm
  # Instantiating module "suffix" from file /usr/local/pf/raddb/mods-enabled/realm
  # Instantiating module "realmpercent" from file /usr/local/pf/raddb/mods-enabled/realm
  # Instantiating module "ntdomain" from file /usr/local/pf/raddb/mods-enabled/realm
  # Instantiating module "redis_ntlm" from file /usr/local/pf/raddb/mods-enabled/redis
rlm_redis (redis_ntlm): Initialising connection pool
   pool {
   	start = 0
   	min = 3
   	max = 64
   	spare = 10
   	uses = 0
   	lifetime = 86400
   	cleanup_interval = 300
   	idle_timeout = 600
   	retry_delay = 30
   	spread = no
   }
  # Instantiating module "eap" from file /usr/local/pf/raddb/mods-enabled/eap
   # Linked to sub-module rlm_eap_md5
   # Linked to sub-module rlm_eap_mschapv2
   mschapv2 {
   	with_ntdomain_hack = no
   	send_error = no
   }
   # Linked to sub-module rlm_eap_peap
   peap {
   	tls = "tls-common"
   	default_eap_type = "mschapv2"
   	copy_request_to_tunnel = yes
   	use_tunneled_reply = yes
   	proxy_tunneled_request_as_eap = yes
   	virtual_server = "packetfence-degraded-tunnel"
   	soh = no
   	require_client_cert = no
   }
   tls-config tls-common {
   	verify_depth = 0
   	pem_file_type = yes
   	private_key_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.key"
   	certificate_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.crt"
   	ca_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.pem"
   	dh_file = "/usr/local/pf/raddb/certs/dh"
   	fragment_size = 1024
   	include_length = yes
   	auto_chain = yes
   	check_crl = no
   	check_all_crl = no
   	cipher_list = "DEFAULT"
   	ecdh_curve = "prime256v1"
   	tls_max_version = ""
   	tls_min_version = "1.0"
    cache {
    	enable = no
    	lifetime = 24
    	max_entries = 255
    }
    verify {
    	skip_if_ocsp_ok = no
    }
    ocsp {
    	enable = no
    	override_cert_url = yes
    	url = "http://127.0.0.1:22225/api/v1/pki/ocsp"
    	use_nonce = yes
    	timeout = 0
    	softfail = no
    }
   }
The configuration allows TLS 1.0 and/or TLS 1.1.  We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
   # Linked to sub-module rlm_eap_tls
   tls {
   	tls = "tls-common"
   }
tls: Using cached TLS configuration from previous invocation
   # Linked to sub-module rlm_eap_ttls
   ttls {
   	tls = "tls-common"
   	default_eap_type = "md5"
   	copy_request_to_tunnel = yes
   	use_tunneled_reply = yes
   	virtual_server = "packetfence-tunnel"
   	include_length = yes
   	require_client_cert = no
   }
tls: Using cached TLS configuration from previous invocation
  # Instantiating module "eap-degraded" from file /usr/local/pf/raddb/mods-enabled/eap
   # Linked to sub-module rlm_eap_md5
   # Linked to sub-module rlm_eap_mschapv2
   mschapv2 {
   	with_ntdomain_hack = no
   	send_error = no
   }
   # Linked to sub-module rlm_eap_peap
   peap {
   	tls = "tls-common"
   	default_eap_type = "mschapv2"
   	copy_request_to_tunnel = yes
   	use_tunneled_reply = yes
   	proxy_tunneled_request_as_eap = yes
   	virtual_server = "packetfence-tunnel"
   	soh = no
   	require_client_cert = no
   }
   tls-config tls-common {
   	verify_depth = 0
   	pem_file_type = yes
   	private_key_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.key"
   	certificate_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.crt"
   	ca_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.pem"
   	dh_file = "/usr/local/pf/raddb/certs/dh"
   	fragment_size = 1024
   	include_length = yes
   	auto_chain = yes
   	check_crl = no
   	check_all_crl = no
   	cipher_list = "DEFAULT"
   	ecdh_curve = "prime256v1"
   	tls_max_version = ""
   	tls_min_version = "1.0"
    cache {
    	enable = no
    	lifetime = 24
    	max_entries = 255
    }
    verify {
    	skip_if_ocsp_ok = no
    }
    ocsp {
    	enable = no
    	override_cert_url = yes
    	url = "http://127.0.0.1:22225/api/v1/pki/ocsp"
    	use_nonce = yes
    	timeout = 0
    	softfail = no
    }
   }
The configuration allows TLS 1.0 and/or TLS 1.1.  We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
   # Linked to sub-module rlm_eap_tls
   tls {
   	tls = "tls-common"
   }
tls: Using cached TLS configuration from previous invocation
   # Linked to sub-module rlm_eap_ttls
   ttls {
   	tls = "tls-common"
   	default_eap_type = "md5"
   	copy_request_to_tunnel = yes
   	use_tunneled_reply = yes
   	virtual_server = "packetfence-degraded-tunnel"
   	include_length = yes
   	require_client_cert = no
   }
tls: Using cached TLS configuration from previous invocation
  # Instantiating module "rest-cli" from file /usr/local/pf/raddb/mods-enabled/rest
   authorize {
   	uri = "http://127.0.0.1:7070//radius/rest/switch/authorize"
   	method = "post"
   	body = "json"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   authenticate {
   	uri = ""
   	method = "GET"
   	body = "none"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   accounting {
   	uri = ""
   	method = "GET"
   	body = "none"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
   post-auth {
   	uri = ""
   	method = "GET"
   	body = "none"
   	auth = "none"
   	require_auth = no
   	timeout = 4.000000
   	chunk = 0
    tls {
    	check_cert = yes
    	check_cert_cn = yes
    }
   }
rlm_rest (rest-cli): Initialising connection pool
   pool {
   	start = 0
   	min = 3
   	max = 64
   	spare = 10
   	uses = 0
   	lifetime = 0
   	cleanup_interval = 30
   	idle_timeout = 60
   	retry_delay = 30
   	spread = no
   }
  # Instantiating module "sql" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql_mysql: libmysql version: 10.1.21-MariaDB
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (sql): Attempting to connect to database "pf"
rlm_sql (sql): Initialising connection pool
   pool {
   	start = 0
   	min = 3
   	max = 64
   	spare = 10
   	uses = 0
   	lifetime = 0
   	cleanup_interval = 30
   	idle_timeout = 60
   	retry_delay = 30
   	spread = no
   }
rlm_sql (sql): Processing generate_sql_clients
rlm_sql (sql) in generate_sql_clients: query is SELECT  id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0
rlm_sql (sql): 0 of 0 connections in use.  You  may need to increase "spare"
rlm_sql (sql): Opening additional connection (0), 1 of 64 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Executing select query: SELECT  id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0
rlm_sql (sql): Released connection (0)
Need 2 more connections to reach min connections (3)
rlm_sql (sql): Opening additional connection (1), 1 of 63 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
  # Instantiating module "pfguest" from file /usr/local/pf/raddb/mods-enabled/sql
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (pfguest): Attempting to connect to database "pf"
  # Instantiating module "pfsponsor" from file /usr/local/pf/raddb/mods-enabled/sql
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (pfsponsor): Attempting to connect to database "pf"
  # Instantiating module "pfsms" from file /usr/local/pf/raddb/mods-enabled/sql
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (pfsms): Attempting to connect to database "pf"
  # Instantiating module "pflocal" from file /usr/local/pf/raddb/mods-enabled/sql
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (pflocal): Attempting to connect to database "pf"
  # Instantiating module "sql_reject" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql (sql_reject): groupmemb_query is empty.  Please delete it from the configuration
rlm_sql (sql_reject): authorize_check_query is empty.  Please delete it from the configuration
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (sql_reject): Attempting to connect to database "pf"
  # Instantiating module "sql_degraded" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql (sql_degraded): groupmemb_query is empty.  Please delete it from the configuration
   mysql {
    tls {
    	tls_required = no
    }
   	warnings = "auto"
   }
rlm_sql (sql_degraded): Attempting to connect to database "pf"
  # Instantiating module "mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap): authenticating by calling 'ntlm_auth'
  # Instantiating module "chrooted_mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (chrooted_mschap): authenticating by calling 'ntlm_auth'
  # Instantiating module "chrooted_mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (chrooted_mschap_machine): authenticating by calling 'ntlm_auth'
  # Instantiating module "mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap_machine): authenticating by calling 'ntlm_auth'
  # Instantiating module "mschap_local" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap_local): using internal authentication
  # Instantiating module "reject" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "fail" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "ok" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "handled" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "invalid" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "userlock" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "notfound" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "noop" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "updated" from file /usr/local/pf/raddb/mods-enabled/always
  # Instantiating module "attr_filter.post-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/post-proxy
  # Instantiating module "attr_filter.pre-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/pre-proxy
  # Instantiating module "attr_filter.access_reject" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/access_reject
[/usr/local/pf/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay" 	found in filter list for realm "DEFAULT". 
[/usr/local/pf/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec" 	found in filter list for realm "DEFAULT". 
  # Instantiating module "attr_filter.access_challenge" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/access_challenge
  # Instantiating module "attr_filter.accounting_response" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/accounting_response
  # Instantiating module "attr_filter.packetfence_post_auth" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/packetfence-post-auth
  # Instantiating module "attr_filter.packetfence_pre_proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/packetfence-pre-proxy
  # Instantiating module "cache_eap" from file /usr/local/pf/raddb/mods-enabled/cache_eap
rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
  # Instantiating module "cache_ntlm" from file /usr/local/pf/raddb/mods-enabled/cache_ntlm
rlm_cache (cache_ntlm): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
  # Instantiating module "cache_password" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (cache_password): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
  # Instantiating module "userprincipalname" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (userprincipalname): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
  # Instantiating module "PacketFence-NTCacheHash" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (PacketFence-NTCacheHash): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
  # Instantiating module "detail" from file /usr/local/pf/raddb/mods-enabled/detail
  # Instantiating module "auth_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output
  # Instantiating module "reply_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  # Instantiating module "pre_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  # Instantiating module "post_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
  # Instantiating module "expiration" from file /usr/local/pf/raddb/mods-enabled/expiration
  # Instantiating module "files" from file /usr/local/pf/raddb/mods-enabled/files
reading pairlist file /usr/local/pf/raddb/mods-config/files/authorize
reading pairlist file /usr/local/pf/raddb/mods-config/files/accounting
reading pairlist file /usr/local/pf/raddb/mods-config/files/pre-proxy
  # Instantiating module "linelog" from file /usr/local/pf/raddb/mods-enabled/linelog
  # Instantiating module "log_accounting" from file /usr/local/pf/raddb/mods-enabled/linelog
 } # modules
auth: #### Loading Virtual Servers ####
server { # from file /usr/local/pf/raddb/auth.conf
} # server
server packetfence { # from file /usr/local/pf/raddb/sites-enabled/packetfence
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading preacct {...}
 # Loading accounting {...}
 # Loading pre-proxy {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server packetfence
server pf-remote { # from file /usr/local/pf/raddb/sites-enabled/packetfence
 # Loading authorize {...}
 # Loading accounting {...}
 # Loading post-proxy {...}
} # server pf-remote
server pf.degraded { # from file /usr/local/pf/raddb/sites-enabled/packetfence
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading preacct {...}
 # Loading accounting {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server pf.degraded
server packetfence-degraded-tunnel { # from file /usr/local/pf/raddb/sites-enabled/packetfence
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading session {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server packetfence-degraded-tunnel
server packetfence-tunnel { # from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading session {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server packetfence-tunnel
server packetfence-tunnel-fast { # from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading session {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server packetfence-tunnel-fast
server packetfence-cli { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cli
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading accounting {...}
 # Loading post-proxy {...}
 # Loading post-auth {...}
} # server packetfence-cli
server dynamic_clients { # from file /usr/local/pf/raddb/sites-enabled/dynamic-clients
 # Loading authorize {...}
} # server dynamic_clients
server status { # from file /usr/local/pf/raddb/sites-enabled/status
 # Loading authorize {...}
} # server status
server pf.cluster { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
 # Loading authorize {...}
 # Loading accounting {...}
 # Loading post-proxy {...}
} # server pf.cluster
server pfcli.cluster { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
 # Loading authorize {...}
 # Loading post-proxy {...}
} # server pfcli.cluster
 thread pool {
 	start_servers = 0
 	max_servers = 64
 	min_spare_servers = 3
 	max_spare_servers = 10
 	max_requests_per_server = 0
 	cleanup_delay = 5
 	max_queue_size = 65536
 	auto_limit_acct = no
 }
Thread pool initialized
auth: #### Opening IP addresses and Ports ####
listen {
 	type = "status"
 	virtual_server = "status"
 	ipaddr = 127.0.0.1
 	port = 18121
  client admin {
  	ipaddr = 127.0.0.1
  	require_message_authenticator = no
  	secret = <<< secret >>>
   limit {
   	max_connections = 16
   	lifetime = 0
   	idle_timeout = 30
   }
  }
}
listen {
 	type = "auth"
 	virtual_server = "pf-remote"
 	ipaddr = 172.20.135.4
 	port = 0
}
listen {
 	type = "auth+acct"
 	virtual_server = "packetfence"
 	ipaddr = 172.20.135.4
 	port = 2083
 	proto = "tcp"
  tls {
  	verify_depth = 0
  	ca_path = "/usr/local/pf/raddb/certs"
  	pem_file_type = yes
  	private_key_file = "/usr/local/pf/raddb/certs/server.key"
  	certificate_file = "/usr/local/pf/raddb/certs/server.crt"
  	ca_file = "/usr/local/pf/raddb/certs/ca.pem"
  	dh_file = "/usr/local/pf/raddb/certs/dh"
  	fragment_size = 8192
  	include_length = yes
  	auto_chain = yes
  	check_crl = no
  	check_all_crl = no
  	cipher_list = "DEFAULT"
  	require_client_cert = yes
  	ecdh_curve = "prime256v1"
  	tls_max_version = ""
  	tls_min_version = "1.0"
   cache {
   	enable = no
   	lifetime = 24
   	max_entries = 255
   }
   verify {
   	skip_if_ocsp_ok = no
   }
   ocsp {
   	enable = no
   	override_cert_url = no
   	use_nonce = yes
   	timeout = 0
   	softfail = no
   }
  }
The configuration allows TLS 1.0 and/or TLS 1.1.  We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
  limit {
  	max_connections = 16
  	lifetime = 0
  	idle_timeout = 30
  }
}
listen {
 	type = "control"
 listen {
 	socket = "/usr/local/pf/var/run/radiusd.sock"
 	mode = "rw"
 	peercred = yes
 }
}
Listening on status address 127.0.0.1 port 18121 bound to server status
Listening on auth address 172.20.135.4 port 1812 bound to server pf-remote
Listening on auth+acct proto tcp address 172.20.135.4 port 2083 (TLS) bound to server packetfence
Listening on command file /usr/local/pf/var/run/radiusd.sock
Listening on proxy address * port 46609
Ready to process requests
Threads: Spawning 3 spares
Thread spawned new child 1. Total threads in pool: 1
Thread spawned new child 2. Total threads in pool: 2
Thread 1 waiting to be assigned a request
Thread spawned new child 3. Total threads in pool: 3
Thread 2 waiting to be assigned a request
Thread 2 got semaphore
Waking up in 0.3 seconds.
Thread 2 handling request 0, (1 handled so far)
Thread 3 waiting to be assigned a request
(0) Received Access-Request Id 70 from 172.20.135.5:58688 to 172.20.135.4:1812 length 243
(0)   User-Name = "64-76-ba-89-71-4c"
(0)   User-Password = "64-76-ba-89-71-4c"
(0)   NAS-IP-Address = 172.20.110.250
(0)   NAS-Port = 0
(0)   Service-Type = Call-Check
(0)   Called-Station-Id = "00:1a:1e:01:68:f8"
(0)   Calling-Station-Id = "64:76:ba:89:71:4c"
(0)   NAS-Port-Type = Wireless-802.11
(0)   Aruba-Essid-Name = "CPS-District"
(0)   Aruba-Location-Id = "MS-A181"
(0)   Aruba-AP-Group = "MS"
(0)   PacketFence-KeyBalanced = "2cab901e9652f08e98b274d193485eb3"
(0)   Message-Authenticator = 0xa6f70b05137e44e089e1f208ec6f6196
(0)   Proxy-State = 0x323334
(0) # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
(0)   authorize {
(0)     update control {
(0)       EXPAND %{Calling-Station-Id}
(0)          --> 64:76:ba:89:71:4c
(0)       Load-Balance-Key := 64:76:ba:89:71:4c
(0)       Proxy-To-Realm := "remote"
(0)     } # update control = noop
(0)     if (!NAS-IP-Address){
(0)     if (!NAS-IP-Address) -> FALSE
(0)   } # authorize = noop
(0) Starting proxy to home server 172.20.135.10 port 1812
(0) server pf-remote {
(0) }
(0) Proxying request to home server 172.20.135.10 port 1812 timeout 6.000000
Listening on proxy address 172.20.135.4 port 50053
Waking up in 0.3 seconds.
(0) Sent Access-Request Id 218 from 172.20.135.4:50053 to 172.20.135.10:1812 length 247
(0)   User-Name = "64-76-ba-89-71-4c"
(0)   User-Password = "64-76-ba-89-71-4c"
(0)   NAS-IP-Address = 172.20.110.250
(0)   NAS-Port = 0
(0)   Service-Type = Call-Check
(0)   Called-Station-Id = "00:1a:1e:01:68:f8"
(0)   Calling-Station-Id = "64:76:ba:89:71:4c"
(0)   NAS-Port-Type = Wireless-802.11
(0)   Aruba-Essid-Name = "CPS-District"
(0)   Aruba-Location-Id = "MS-A181"
(0)   Aruba-AP-Group = "MS"
(0)   PacketFence-KeyBalanced = "2cab901e9652f08e98b274d193485eb3"
(0)   Message-Authenticator = 0xa6f70b05137e44e089e1f208ec6f6196
(0)   Proxy-State = 0x323334
(0)   Proxy-State = 0x3730
Thread 2 waiting to be assigned a request
(0) Marking home server 172.20.135.10 port 1812 alive
Threads: total/active/spare threads = 3/0/3
Waking up in 0.3 seconds.
Thread 3 got semaphore
Thread 3 handling request 0, (1 handled so far)
(0) Clearing existing &reply: attributes
(0) Received Access-Accept Id 218 from 172.20.135.10:1812 to 172.20.135.4:50053 length 46
(0)   Tunnel-Type:0 = VLAN
(0)   Tunnel-Private-Group-Id:0 = "135"
(0)   Tunnel-Medium-Type:0 = IEEE-802
(0)   Proxy-State = 0x323334
(0)   Proxy-State = 0x3730
(0) server pf-remote {
(0)   # Executing section post-proxy from file /usr/local/pf/raddb/sites-enabled/packetfence
(0)     post-proxy {
(0)       update control {
(0)         EXPAND %{home_server:ipaddr}
(0)            --> 172.20.135.10
(0)         PacketFence-Proxied-To := 172.20.135.10
(0)       } # update control = noop
(0)       if (&proxy-reply:Packet-Type == Access-Accept) {
(0)       EXPAND &proxy-reply:Packet-Type
(0)          --> Access-Accept
(0)       if (&proxy-reply:Packet-Type == Access-Accept)  -> TRUE
(0)       if (&proxy-reply:Packet-Type == Access-Accept)  {
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Released connection (0)
Need 1 more connections to reach min connections (3)
rlm_sql (sql): Opening additional connection (2), 1 of 62 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
(0)         EXPAND %{User-Name}
(0)            --> 64-76-ba-89-71-4c
(0)         SQL-User-Name set to '64-76-ba-89-71-4c'
rlm_sql (sql): Reserved connection (1)
(0)         Executing query: DELETE FROM radreply where username="64:76:ba:89:71:4c"
(0)         SQL query affected no rows
rlm_sql (sql): Released connection (1)
(0)         EXPAND %{sql_degraded:DELETE FROM radreply where username="%{Calling-Station-Id}"}
(0)            --> 
(0) reply_in_db:   $RAD_REQUEST{'User-Name'} = &request:User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db:   $RAD_REQUEST{'User-Password'} = &request:User-Password -> '64-76-ba-89-71-4c'
(0) reply_in_db:   $RAD_REQUEST{'NAS-IP-Address'} = &request:NAS-IP-Address -> '172.20.110.250'
(0) reply_in_db:   $RAD_REQUEST{'NAS-Port'} = &request:NAS-Port -> '0'
(0) reply_in_db:   $RAD_REQUEST{'Service-Type'} = &request:Service-Type -> 'Call-Check'
(0) reply_in_db:   $RAD_REQUEST{'Called-Station-Id'} = &request:Called-Station-Id -> '00:1a:1e:01:68:f8'
(0) reply_in_db:   $RAD_REQUEST{'Calling-Station-Id'} = &request:Calling-Station-Id -> '64:76:ba:89:71:4c'
(0) reply_in_db:   $RAD_REQUEST{'Proxy-State'} = &request:Proxy-State -> '0x323334'
(0) reply_in_db:   $RAD_REQUEST{'NAS-Port-Type'} = &request:NAS-Port-Type -> 'Wireless-802.11'
(0) reply_in_db:   $RAD_REQUEST{'Message-Authenticator'} = &request:Message-Authenticator -> '0xa6f70b05137e44e089e1f208ec6f6196'
(0) reply_in_db:   $RAD_REQUEST{'Aruba-Essid-Name'} = &request:Aruba-Essid-Name -> 'CPS-District'
(0) reply_in_db:   $RAD_REQUEST{'Aruba-Location-Id'} = &request:Aruba-Location-Id -> 'MS-A181'
(0) reply_in_db:   $RAD_REQUEST{'Aruba-AP-Group'} = &request:Aruba-AP-Group -> 'MS'
(0) reply_in_db:   $RAD_REQUEST{'Realm'} = &request:Realm -> 'remote'
(0) reply_in_db:   $RAD_REQUEST{'SQL-User-Name'} = &request:SQL-User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db:   $RAD_REQUEST{'PacketFence-KeyBalanced'} = &request:PacketFence-KeyBalanced -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db:   $RAD_CHECK{'Load-Balance-Key'} = &control:Load-Balance-Key -> '64:76:ba:89:71:4c'
(0) reply_in_db:   $RAD_CHECK{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'remote'
(0) reply_in_db:   $RAD_CHECK{'PacketFence-Proxied-To'} = &control:PacketFence-Proxied-To -> '172.20.135.10'
(0) reply_in_db:   $RAD_CONFIG{'Load-Balance-Key'} = &control:Load-Balance-Key -> '64:76:ba:89:71:4c'
(0) reply_in_db:   $RAD_CONFIG{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'remote'
(0) reply_in_db:   $RAD_CONFIG{'PacketFence-Proxied-To'} = &control:PacketFence-Proxied-To -> '172.20.135.10'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'User-Name'} = &proxy-request:User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'User-Password'} = &proxy-request:User-Password -> '64-76-ba-89-71-4c'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'NAS-IP-Address'} = &proxy-request:NAS-IP-Address -> '172.20.110.250'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'NAS-Port'} = &proxy-request:NAS-Port -> '0'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Service-Type'} = &proxy-request:Service-Type -> 'Call-Check'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Called-Station-Id'} = &proxy-request:Called-Station-Id -> '00:1a:1e:01:68:f8'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Calling-Station-Id'} = &proxy-request:Calling-Station-Id -> '64:76:ba:89:71:4c'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Proxy-State'}[0] = &proxy-request:Proxy-State -> '0x3730'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Proxy-State'}[1] = &proxy-request:Proxy-State -> '0x323334'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'NAS-Port-Type'} = &proxy-request:NAS-Port-Type -> 'Wireless-802.11'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Message-Authenticator'} = &proxy-request:Message-Authenticator -> '0xa6f70b05137e44e089e1f208ec6f6196'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Aruba-Essid-Name'} = &proxy-request:Aruba-Essid-Name -> 'CPS-District'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Aruba-Location-Id'} = &proxy-request:Aruba-Location-Id -> 'MS-A181'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'Aruba-AP-Group'} = &proxy-request:Aruba-AP-Group -> 'MS'
(0) reply_in_db:   $RAD_REQUEST_PROXY{'PacketFence-KeyBalanced'} = &proxy-request:PacketFence-KeyBalanced -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db:   $RAD_REQUEST_PROXY_REPLY{'Proxy-State'}[0] = &proxy-reply:Proxy-State -> '0x323334'
(0) reply_in_db:   $RAD_REQUEST_PROXY_REPLY{'Proxy-State'}[1] = &proxy-reply:Proxy-State -> '0x3730'
(0) reply_in_db:   $RAD_REQUEST_PROXY_REPLY{'Tunnel-Type'} = &proxy-reply:Tunnel-Type -> 'VLAN'
(0) reply_in_db:   $RAD_REQUEST_PROXY_REPLY{'Tunnel-Medium-Type'} = &proxy-reply:Tunnel-Medium-Type -> 'IEEE-802'
(0) reply_in_db:   $RAD_REQUEST_PROXY_REPLY{'Tunnel-Private-Group-Id'} = &proxy-reply:Tunnel-Private-Group-Id -> '135'
(0) reply_in_db: &request:NAS-Port-Type = $RAD_REQUEST{'NAS-Port-Type'} -> 'Wireless-802.11'
(0) reply_in_db: &request:Proxy-State = $RAD_REQUEST{'Proxy-State'} -> '0x323334'
(0) reply_in_db: &request:Service-Type = $RAD_REQUEST{'Service-Type'} -> 'Call-Check'
(0) reply_in_db: &request:Called-Station-Id = $RAD_REQUEST{'Called-Station-Id'} -> '00:1a:1e:01:68:f8'
(0) reply_in_db: &request:Message-Authenticator = $RAD_REQUEST{'Message-Authenticator'} -> '0xa6f70b05137e44e089e1f208ec6f6196'
(0) reply_in_db: &request:Realm = $RAD_REQUEST{'Realm'} -> 'remote'
(0) reply_in_db: &request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '172.20.110.250'
(0) reply_in_db: &request:SQL-User-Name = $RAD_REQUEST{'SQL-User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &request:Aruba-Essid-Name = $RAD_REQUEST{'Aruba-Essid-Name'} -> 'CPS-District'
(0) reply_in_db: &request:PacketFence-KeyBalanced = $RAD_REQUEST{'PacketFence-KeyBalanced'} -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: &request:Aruba-AP-Group = $RAD_REQUEST{'Aruba-AP-Group'} -> 'MS'
(0) reply_in_db: &request:User-Name = $RAD_REQUEST{'User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:Aruba-Location-Id = $RAD_REQUEST{'Aruba-Location-Id'} -> 'MS-A181'
(0) reply_in_db: &request:User-Password = $RAD_REQUEST{'User-Password'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:NAS-Port = $RAD_REQUEST{'NAS-Port'} -> '0'
(0) reply_in_db: &control:PacketFence-Proxied-To = $RAD_CHECK{'PacketFence-Proxied-To'} -> '172.20.135.10'
(0) reply_in_db: &control:Load-Balance-Key = $RAD_CHECK{'Load-Balance-Key'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &control:PacketFence-reply-insert = $RAD_CHECK{'PacketFence-reply-insert'} -> 'INSERT into radreply (username, attribute, value) values ('64:76:ba:89:71:4c','Tunnel-Medium-Type:0','IEEE-802'), ('64:76:ba:89:71:4c','Tunnel-Private-Group-Id:0','135'), ('64:76:ba:89:71:4c','Tunnel-Type:0','VLAN')'
(0) reply_in_db: &control:Proxy-To-Realm = $RAD_CHECK{'Proxy-To-Realm'} -> 'remote'
(0) reply_in_db: &proxy-request:NAS-Port-Type = $RAD_REQUEST_PROXY{'NAS-Port-Type'} -> 'Wireless-802.11'
(0) reply_in_db: &proxy-request:Proxy-State += $RAD_REQUEST_PROXY{'Proxy-State'} -> '0x3730'
(0) reply_in_db: &proxy-request:Proxy-State += $RAD_REQUEST_PROXY{'Proxy-State'} -> '0x323334'
(0) reply_in_db: &proxy-request:Service-Type = $RAD_REQUEST_PROXY{'Service-Type'} -> 'Call-Check'
(0) reply_in_db: &proxy-request:Aruba-Essid-Name = $RAD_REQUEST_PROXY{'Aruba-Essid-Name'} -> 'CPS-District'
(0) reply_in_db: &proxy-request:Calling-Station-Id = $RAD_REQUEST_PROXY{'Calling-Station-Id'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &proxy-request:Called-Station-Id = $RAD_REQUEST_PROXY{'Called-Station-Id'} -> '00:1a:1e:01:68:f8'
(0) reply_in_db: &proxy-request:PacketFence-KeyBalanced = $RAD_REQUEST_PROXY{'PacketFence-KeyBalanced'} -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: &proxy-request:Message-Authenticator = $RAD_REQUEST_PROXY{'Message-Authenticator'} -> '0xa6f70b05137e44e089e1f208ec6f6196'
(0) reply_in_db: &proxy-request:Aruba-AP-Group = $RAD_REQUEST_PROXY{'Aruba-AP-Group'} -> 'MS'
(0) reply_in_db: &proxy-request:Aruba-Location-Id = $RAD_REQUEST_PROXY{'Aruba-Location-Id'} -> 'MS-A181'
(0) reply_in_db: &proxy-request:User-Name = $RAD_REQUEST_PROXY{'User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &proxy-request:User-Password = $RAD_REQUEST_PROXY{'User-Password'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &proxy-request:NAS-IP-Address = $RAD_REQUEST_PROXY{'NAS-IP-Address'} -> '172.20.110.250'
(0) reply_in_db: &proxy-request:NAS-Port = $RAD_REQUEST_PROXY{'NAS-Port'} -> '0'
(0) reply_in_db: &proxy-reply:Tunnel-Private-Group-Id:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Private-Group-Id:0'} -> '135'
(0) reply_in_db: &proxy-reply:Tunnel-Medium-Type:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Medium-Type:0'} -> 'IEEE-802'
(0) reply_in_db: &proxy-reply:Tunnel-Type:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Type:0'} -> 'VLAN'
(0) reply_in_db: &proxy-reply:Proxy-State += $RAD_REQUEST_PROXY_REPLY{'Proxy-State'} -> '0x323334'
(0) reply_in_db: &proxy-reply:Proxy-State += $RAD_REQUEST_PROXY_REPLY{'Proxy-State'} -> '0x3730'
(0)         [reply_in_db] = ok
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Released connection (0)
(0)         EXPAND %{User-Name}
(0)            --> 64-76-ba-89-71-4c
(0)         SQL-User-Name set to '64-76-ba-89-71-4c'
rlm_sql (sql): Reserved connection (2)
(0)         Executing query: INSERT into radreply =28username=2C attribute=2C value=29 values =28=2764:76:ba:89:71:4c=27=2C=27Tunnel-Medium-Type:0=27=2C=27IEEE-802=27=29=2C =28=2764:76:ba:89:71:4c=27=2C=27Tunnel-Private-Group-Id:0=27=2C=27135=27=29=2C =28=2764:76:ba:89:71:4c=27=2C=27Tunnel-Type:0=27=2C=27VLAN=27=29
(0)         ERROR: rlm_sql_mysql: ERROR 1064 (You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near '=28username=2C attribute=2C value=29 values =28=2764:76:ba:89:71:4c=27=2C=27Tunn' at line 1): 42000
(0)         ERROR: SQL query failed: server error
rlm_sql (sql): Released connection (2)
(0)         EXPAND %{sql_degraded:%{control:PacketFence-reply-insert}}
(0)            --> 
(0)       } # if (&proxy-reply:Packet-Type == Access-Accept)  = ok
(0)       ... skipping else: Preceding "if" was taken
(0) attr_filter.packetfence_post_auth: EXPAND %{User-Name}
(0) attr_filter.packetfence_post_auth:    --> 64-76-ba-89-71-4c
(0) attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10
(0)       [attr_filter.packetfence_post_auth] = updated
(0)     } # post-proxy = updated
(0) }
(0) Found Auth-Type = Accept
(0) Auth-Type = Accept, accepting the user
(0) Login OK: [64-76-ba-89-71-4c] (from client pf port 0 cli 64:76:ba:89:71:4c)
(0) Sent Access-Accept Id 70 from 172.20.135.4:1812 to 172.20.135.5:58688 length 0
(0)   Tunnel-Private-Group-Id:0 = "135"
(0)   Tunnel-Medium-Type:0 = IEEE-802
(0)   Tunnel-Type:0 = VLAN
(0)   Proxy-State = 0x323334
(0) Finished request
Thread 3 waiting to be assigned a request
Waking up in 4.6 seconds.
-------------- next part --------------



sql {
	driver = "rlm_sql_mysql"
        safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /(),'"

	dialect = "mysql"

	server = "127.0.0.1"
	port = 3306
	login = "pf"
	password = "inverse"

	radius_db = "pf"




	acct_table1 = "radacct"
	acct_table2 = "radacct"

	postauth_table = "radpostauth"

	authcheck_table = "radcheck"
	groupcheck_table = "radgroupcheck"

	authreply_table = "radreply"
	groupreply_table = "radgroupreply"

	usergroup_table = "radusergroup"



	delete_stale_sessions = yes




	pool {
		start = ${thread[pool].start_servers}

		min = ${thread[pool].min_spare_servers}

		max = ${thread[pool].max_servers}

		spare = ${thread[pool].max_spare_servers}

		uses = 0

		retry_delay = 30

		lifetime = 0

		idle_timeout = 60

	}

	read_clients = yes

	client_table = "radius_nas"



	group_attribute = "SQL-Group"

	$INCLUDE ${modconfdir}/${.:name}/main/${dialect}/queries.conf
}

sql pfguest {
        database = "mysql"
        driver = "rlm_sql_${database}"
        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"

        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
        authcheck_table = "password"
        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

	    delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"
        authorize_check_query = "\
                              SELECT 1, pid, ( \
                              CASE \
                                  WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
                                  ELSE 'Cleartext-Password' \
                              END ) AS passwordhash, \
                              REPLACE(password,'{ntlm}',''), \":=\" \
                              FROM ${authcheck_table} \
                              JOIN activation using (pid) \
                              WHERE pid = '%{SQL-User-Name}' \
                                  AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"guest\" \
                                  AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
                                  AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
                                  LIMIT 1"

        postauth_query = ""
        group_membership_query = "select 1"
        pool = sql
}

sql pfsponsor {
        database = "mysql"
        driver = "rlm_sql_${database}"

        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"

        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
        authcheck_table = "password"
        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

	    delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"
        authorize_check_query = "\
                              SELECT 1, pid, ( \
                              CASE \
                                  WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
                                  ELSE 'Cleartext-Password' \
                              END ) AS passwordhash, \
                              REPLACE(password,'{ntlm}',''), \":=\" \
                              FROM ${authcheck_table} \
                              JOIN activation using (pid) \
                              WHERE pid = '%{SQL-User-Name}' \
                                  AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"sponsor\" \
                                  AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
                                  AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
                                  LIMIT 1"

        postauth_query = ""
        group_membership_query = "select 1"
        pool = sql
}

sql pfsms {
        database = "mysql"
        driver = "rlm_sql_${database}"
        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"

        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
	    authcheck_table = "password"

        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

	    delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"
        authorize_check_query = "\
                              SELECT 1, pid, ( \
                              CASE \
                                  WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
                                  ELSE 'Cleartext-Password' \
                              END ) AS passwordhash, \
                              REPLACE(password,'{ntlm}',''), \":=\" \
                              FROM ${authcheck_table} \
                              JOIN activation using (pid) \
                              WHERE pid = '%{SQL-User-Name}' \
                                  AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"sms\" \
                                  AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
                                  AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
                                  LIMIT 1"

        postauth_query = ""
        group_membership_query = "select 1"
        pool = sql
}

sql pflocal {
        database = "mysql"
        driver = "rlm_sql_${database}"
        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"

        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
        authcheck_table = "password"
        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

	    delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"
        authorize_check_query = "\
                              SELECT 1, pid, ( \
                              CASE \
                                  WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
                                  ELSE 'Cleartext-Password' \
                              END ) AS passwordhash, \
                              REPLACE(password,'{ntlm}',''), \":=\" \
                              FROM ${authcheck_table} \
                              WHERE pid = '%{SQL-User-Name}' \
                              AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
                              AND NOT EXISTS (SELECT pid FROM activation WHERE pid = '%{SQL-User-Name}')"

        postauth_query = ""
        group_membership_query = "select 1"
        pool = sql 
}

sql sql_reject {
        database = "mysql"
        driver = "rlm_sql_${database}"
        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"


        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
        authcheck_table = "password"
        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

        delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"
        authorize_check_query = ""

        postauth_query = ""
        group_membership_query = ""
        pool = sql
        $INCLUDE ${modconfdir}/${.:name}/main/mysql/reject.conf
}

sql sql_degraded {
        database = "mysql"
        driver = "rlm_sql_${database}"

        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"


        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
        authcheck_table = "password"
        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

        delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"

        postauth_query = ""
        group_membership_query = ""
        pool = sql
        client_table = "radius_nas"
}
-------------- next part --------------



sql {
	driver = "rlm_sql_mysql"

	dialect = "mysql"

	server = "127.0.0.1"
	port = 3306
	login = "pf"
	password = "inverse"

	radius_db = "pf"




	acct_table1 = "radacct"
	acct_table2 = "radacct"

	postauth_table = "radpostauth"

	authcheck_table = "radcheck"
	groupcheck_table = "radgroupcheck"

	authreply_table = "radreply"
	groupreply_table = "radgroupreply"

	usergroup_table = "radusergroup"



	delete_stale_sessions = yes




	pool {
		start = ${thread[pool].start_servers}

		min = ${thread[pool].min_spare_servers}

		max = ${thread[pool].max_servers}

		spare = ${thread[pool].max_spare_servers}

		uses = 0

		retry_delay = 30

		lifetime = 0

		idle_timeout = 60

	}

	read_clients = yes

	client_table = "radius_nas"



	group_attribute = "SQL-Group"

	$INCLUDE ${modconfdir}/${.:name}/main/${dialect}/queries.conf
}

sql pfguest {
        database = "mysql"
        driver = "rlm_sql_${database}"
        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"

        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
        authcheck_table = "password"
        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

	    delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"
        authorize_check_query = "\
                              SELECT 1, pid, ( \
                              CASE \
                                  WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
                                  ELSE 'Cleartext-Password' \
                              END ) AS passwordhash, \
                              REPLACE(password,'{ntlm}',''), \":=\" \
                              FROM ${authcheck_table} \
                              JOIN activation using (pid) \
                              WHERE pid = '%{SQL-User-Name}' \
                                  AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"guest\" \
                                  AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
                                  AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
                                  LIMIT 1"

        postauth_query = ""
        group_membership_query = "select 1"
        pool = sql
}

sql pfsponsor {
        database = "mysql"
        driver = "rlm_sql_${database}"

        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"

        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
        authcheck_table = "password"
        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

	    delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"
        authorize_check_query = "\
                              SELECT 1, pid, ( \
                              CASE \
                                  WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
                                  ELSE 'Cleartext-Password' \
                              END ) AS passwordhash, \
                              REPLACE(password,'{ntlm}',''), \":=\" \
                              FROM ${authcheck_table} \
                              JOIN activation using (pid) \
                              WHERE pid = '%{SQL-User-Name}' \
                                  AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"sponsor\" \
                                  AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
                                  AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
                                  LIMIT 1"

        postauth_query = ""
        group_membership_query = "select 1"
        pool = sql
}

sql pfsms {
        database = "mysql"
        driver = "rlm_sql_${database}"
        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"

        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
	    authcheck_table = "password"

        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

	    delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"
        authorize_check_query = "\
                              SELECT 1, pid, ( \
                              CASE \
                                  WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
                                  ELSE 'Cleartext-Password' \
                              END ) AS passwordhash, \
                              REPLACE(password,'{ntlm}',''), \":=\" \
                              FROM ${authcheck_table} \
                              JOIN activation using (pid) \
                              WHERE pid = '%{SQL-User-Name}' \
                                  AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"sms\" \
                                  AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
                                  AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
                                  LIMIT 1"

        postauth_query = ""
        group_membership_query = "select 1"
        pool = sql
}

sql pflocal {
        database = "mysql"
        driver = "rlm_sql_${database}"
        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"

        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
        authcheck_table = "password"
        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

	    delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"
        authorize_check_query = "\
                              SELECT 1, pid, ( \
                              CASE \
                                  WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
                                  ELSE 'Cleartext-Password' \
                              END ) AS passwordhash, \
                              REPLACE(password,'{ntlm}',''), \":=\" \
                              FROM ${authcheck_table} \
                              WHERE pid = '%{SQL-User-Name}' \
                              AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
                              AND NOT EXISTS (SELECT pid FROM activation WHERE pid = '%{SQL-User-Name}')"

        postauth_query = ""
        group_membership_query = "select 1"
        pool = sql 
}

sql sql_reject {
        database = "mysql"
        driver = "rlm_sql_${database}"
        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"


        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
        authcheck_table = "password"
        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

        delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"
        authorize_check_query = ""

        postauth_query = ""
        group_membership_query = ""
        pool = sql
        $INCLUDE ${modconfdir}/${.:name}/main/mysql/reject.conf
}

sql sql_degraded {
        database = "mysql"
        driver = "rlm_sql_${database}"

        server = "127.0.0.1"
        port = 3306
        login = "pf"
        password = "inverse"


        radius_db = "pf"
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        postauth_table = "radpostauth"
        authcheck_table = "password"
        authreply_table = "radreply"
        groupcheck_table = "radgroupcheck"
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"

        delete_stale_sessions = yes
        sqltrace = no
        sqltracefile = ${logdir}/sqltrace.sql

        sql_user_name = "%{User-Name}"

        postauth_query = ""
        group_membership_query = ""
        pool = sql
        client_table = "radius_nas"
        safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /(),'"
}


More information about the Freeradius-Users mailing list