[tac_plus] Cisco WLC
Daniel Schmidt
daniel.schmidt at wyo.gov
Tue Jan 31 15:43:14 UTC 2012
I give up, the Cisco WLC just doesn’t seem to like authorization replacing
the pairs. Wouldn’t be the only platform that has difficulty.
# egrep 6079 tac_log.txt
Mon Jan 30 16:54:48 2012 [6079]: connect from 192.168.0.1 [192.168.0.1]
Mon Jan 30 16:54:48 2012 [6079]: Waiting for packet
Mon Jan 30 16:54:48 2012 [6079]: cfg_get_hvalue: name=192.168.0.1 attr=key
Mon Jan 30 16:54:48 2012 [6079]: cfg_get_hvalue: no host named 192.168.0.1
Mon Jan 30 16:54:48 2012 [6079]: cfg_get_phvalue: returns NULL
Mon Jan 30 16:54:48 2012 [6079]: Read AUTHOR size=71
Mon Jan 30 16:54:48 2012 [6079]: validation request from 192.168.0.1
Mon Jan 30 16:54:48 2012 [6079]: PACKET: key=my_key
Mon Jan 30 16:54:48 2012 [6079]: version 192 (0xc0), type 2, seq no 1,
flags 0x1
Mon Jan 30 16:54:48 2012 [6079]: session_id 2378080596 (0x8dbea154), Data
length 59 (0x3b)
Mon Jan 30 16:54:48 2012 [6079]: End header
Mon Jan 30 16:54:49 2012 [6079]: type=AUTHOR, priv_lvl=1, authen=1
Mon Jan 30 16:54:49 2012 [6079]: method=tacacs+
Mon Jan 30 16:54:49 2012 [6079]: svc=1 user_len=4 port_len=0 rem_addr_len=14
Mon Jan 30 16:54:49 2012 [6079]: arg_cnt=2
Mon Jan 30 16:54:49 2012 [6079]: User:
Mon Jan 30 16:54:49 2012 [6079]: stupid_user
Mon Jan 30 16:54:49 2012 [6079]: port:
Mon Jan 30 16:54:49 2012 [6079]: rem_addr:
Mon Jan 30 16:54:49 2012 [6079]: 10.0.0.1
Mon Jan 30 16:54:49 2012 [6079]: arg[0]: size=16
Mon Jan 30 16:54:49 2012 [6079]: service=ciscowlc
Mon Jan 30 16:54:49 2012 [6079]: arg[1]: size=15
Mon Jan 30 16:54:49 2012 [6079]: protocol=common
Mon Jan 30 16:54:49 2012 [6079]: End packet
Mon Jan 30 16:54:49 2012 [6079]: Start authorization request
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_value: name=stupid_user isuser=1
attr=acl rec=1
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_value: recurse group =
do_auth_access
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_pvalue: returns NULL
Mon Jan 30 16:54:49 2012 [6079]: do_author: user='stupid_user'
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_value: name=stupid_user isuser=1
attr=before rec=1
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_value: recurse group =
do_auth_access
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_pvalue: returns NULL
Mon Jan 30 16:54:49 2012 [6079]: user 'stupid_user' found
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_svc_node: username=stupid_user
N_svc proto= svcname=ciscowlc rec=1
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_svc_node: found N_svc proto=
svcname=ciscowlc
Mon Jan 30 16:54:49 2012 [6079]: nas:service=ciscowlc (passed thru)
Mon Jan 30 16:54:49 2012 [6079]: nas:protocol=common (passed thru)
Mon Jan 30 16:54:49 2012 [6079]: nas:absent, server:role1=ALL -> add
role1=ALL (k)
Mon Jan 30 16:54:49 2012 [6079]: added 1 args
Mon Jan 30 16:54:49 2012 [6079]: out_args[0] = service=ciscowlc input copy
discarded
Mon Jan 30 16:54:49 2012 [6079]: out_args[1] = protocol=common input copy
discarded
Mon Jan 30 16:54:49 2012 [6079]: out_args[2] = role1=ALL compacted to
out_args[0]
Mon Jan 30 16:54:49 2012 [6079]: 1 output args
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_value: name=stupid_user isuser=1
attr=after rec=1
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_value: recurse group =
do_auth_access
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_pvalue: returns /usr/bin/python
/root/do_auth.pyo -i $address -fix_crs_bug -u $user -d $name -l
/root/log.txt -f /root/do_auth.ini
Mon Jan 30 16:54:49 2012 [6079]: After authorization call: /usr/bin/python
/root/do_auth.pyo -i $address -fix_crs_bug -u $user -d $name -l
/root/log.txt -f /root/do_auth.ini
Mon Jan 30 16:54:49 2012 [6079]: substitute: /usr/bin/python
/root/do_auth.pyo -i $address -fix_crs_bug -u $user -d $name -l
/root/log.txt -f /root/do_auth.ini
Mon Jan 30 16:54:49 2012 [6079]: Dollar substitution: /usr/bin/python
/root/do_auth.pyo -i 10.0.0.1 -fix_crs_bug -u stupid_user -d 192.168.0.1 -l
/root/log.txt -f /root/do_auth.ini
Mon Jan 30 16:54:49 2012 [6079]: input service=ciscowlc
Mon Jan 30 16:54:49 2012 [6079]: input protocol=common
Mon Jan 30 16:54:49 2012 [6079]: input role1=ALL
Mon Jan 30 16:54:49 2012 [6079]: output role1=MONITOR
Mon Jan 30 16:54:49 2012 [6079]: pid 6080 child exited status 6080l
Mon Jan 30 16:54:49 2012 [6079]: cmd /usr/bin/python /root/do_auth.pyo -i
$address -fix_crs_bug -u $user -d $name -l /root/log.txt -f
/root/do_auth.ini returns 2 (replace & continue)
Mon Jan 30 16:54:49 2012 [6079]: status is now AUTHOR_STATUS_PASS_REPL
Mon Jan 30 16:54:49 2012 [6079]: Writing AUTHOR/PASS_REPL size=32
Mon Jan 30 16:54:49 2012 [6079]: PACKET: key=my_key
Mon Jan 30 16:54:49 2012 [6079]: version 192 (0xc0), type 2, seq no 2,
flags 0x1
Mon Jan 30 16:54:49 2012 [6079]: session_id 2378080596 (0x8dbea154), Data
length 20 (0x14)
Mon Jan 30 16:54:49 2012 [6079]: End header
Mon Jan 30 16:54:49 2012 [6079]: type=AUTHOR/REPLY status=2
(AUTHOR/PASS_REPL)
Mon Jan 30 16:54:49 2012 [6079]: msg_len=0, data_len=0 arg_cnt=1
Mon Jan 30 16:54:49 2012 [6079]: msg:
Mon Jan 30 16:54:49 2012 [6079]: data:
Mon Jan 30 16:54:49 2012 [6079]: arg[0] size=13
Mon Jan 30 16:54:49 2012 [6079]: role1=MONITOR
Mon Jan 30 16:54:49 2012 [6079]: End packet
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_hvalue: name=192.168.0.1 attr=key
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_hvalue: no host named 192.168.0.1
Mon Jan 30 16:54:49 2012 [6079]: cfg_get_phvalue: returns NULL
Mon Jan 30 16:54:49 2012 [6079]: authorization query for 'stupid_user'
unknown from 192.168.0.1 accepted
Mon Jan 30 16:54:49 2012 [6079]: 192.168.0.1: disconnect
E-Mail to and from me, in connection with the transaction
of public business,is subject to the Wyoming Public Records
Act, and may be disclosed to third parties.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.shrubbery.net/pipermail/tac_plus/attachments/20120131/3fceacda/attachment.html>
More information about the tac_plus
mailing list