Skip to content

Instantly share code, notes, and snippets.

@nqb
Last active November 19, 2019 07:33
Show Gist options
  • Save nqb/9c3907deabcc8e11ab517b4463a4f13d to your computer and use it in GitHub Desktop.
Save nqb/9c3907deabcc8e11ab517b4463a4f13d to your computer and use it in GitHub Desktop.
radius_log entry
MariaDB [pf]> select * from radius_audit_log\G;
*************************** 1. row ***************************
id: 1
tenant_id: 1
created_at: 2019-11-19 07:27:39
mac: 02:00:00:00:00:01
ip:
computer_name: N/A
user_name: inverse
stripped_user_name: inverse
realm: null
event_type: Radius-Access-Request
switch_id: 127.0.0.1
switch_mac: N/A
switch_ip_address: 127.0.0.1
radius_source_ip_address: 127.0.0.1
called_station_id:
calling_station_id: 02:00:00:00:00:01
nas_port_type: Wireless-802.11
ssid:
nas_port_id:
ifindex: 0
nas_port:
connection_type: Wireless-802.11-EAP
nas_ip_address: 127.0.0.1
nas_identifier:
auth_status: Accept
reason:
auth_type: eap
eap_type: TLS
role: registration
node_status: unreg
profile: N/A
source: N/A
auto_reg: 0
is_phone: 0
pf_domain:
uuid:
radius_request: User-Name =3D =22inverse=22=2C NAS-IP-Address =3D 127.0.0.1=2C Service-Type =3D Framed-User=2C Framed-MTU =3D 1400=2C State =3D 0xf89b5bcffe7e562c6f7745358615e100=2C Calling-Station-Id =3D =2202:00:00:00:00:01=22=2C NAS-Port-Type =3D Wireless-802.11=2C Event-Timestamp =3D =22Nov 19 2019 07:27:39 UTC=22=2C Connect-Info =3D =22CONNECT 11Mbps 802.11b=22=2C EAP-Message =3D 0x02e500060d00=2C Message-Authenticator =3D 0x24b8f28f810ab6ab1bd9ea770976245f=2C EAP-Type =3D TLS=2C Stripped-User-Name =3D =22inverse=22=2C Realm =3D =22null=22=2C FreeRADIUS-Client-IP-Address =3D 127.0.0.1=2C TLS-Cert-Serial =3D =22d5d186cc07d5aad9=22=2C TLS-Cert-Expiration =3D =22241117065811Z=22=2C TLS-Cert-Issuer =3D =22/C=3DFR/ST=3DRadius/L=3DSomewhere/O=3DExample Inc./emailAddress=3Dadmin@example.org/CN=3DExample Certificate Authority=22=2C TLS-Cert-Subject =3D =22/C=3DFR/ST=3DRadius/L=3DSomewhere/O=3DExample Inc./emailAddress=3Dadmin@example.org/CN=3DExample Certificate Authority=22=2C TLS-Cert-Common-Name =3D =22Example Certificate Authority=22=2C TLS-Client-Cert-Serial =3D =2202=22=2C TLS-Client-Cert-Expiration =3D =22200118065811Z=22=2C TLS-Client-Cert-Issuer =3D =22/C=3DFR/ST=3DRadius/L=3DSomewhere/O=3DExample Inc./emailAddress=3Dadmin@example.org/CN=3DExample Certificate Authority=22=2C TLS-Client-Cert-Subject =3D =22/C=3DFR/ST=3DRadius/O=3DExample Inc./CN=3Duser@example.org/emailAddress=3Duser@example.org=22=2C TLS-Client-Cert-Common-Name =3D =22user@example.org=22=2C TLS-Client-Cert-X509v3-Extended-Key-Usage =3D =22TLS Web Client Authentication=22=2C TLS-Client-Cert-X509v3-Extended-Key-Usage-OID =3D =221.3.6.1.5.5.7.3.2=22=2C PacketFence-KeyBalanced =3D =22f5cb8e54a4b76a906ff75d81a15d81ff=22=2C PacketFence-Radius-Ip =3D =22172.17.1.20=22=2C User-Password =3D =22=2A=2A=2A=2A=2A=2A=22=2C SQL-User-Name =3D =22inverse=22
radius_reply: MS-MPPE-Recv-Key =3D 0x5a35b6f72f74e7eb22976f8b961d9ee58a94dbdc7bf8d0e2c2f6ba9028df4391=2C MS-MPPE-Send-Key =3D 0x4eb5e3da375a4aacdfaed026ae1d41b85761e55ebf90bd49323712083c3c95df=2C EAP-MSK =3D 0x5a35b6f72f74e7eb22976f8b961d9ee58a94dbdc7bf8d0e2c2f6ba9028df43914eb5e3da375a4aacdfaed026ae1d41b85761e55ebf90bd49323712083c3c95df=2C EAP-EMSK =3D 0x7a9fd7c589c428ab08da70d093f53a17236ee8f19e7c7abbad4254db67fde73cb45144f9d223c8c40df0d2c3abe717638af3a0dc8bcc443213f0320577d9c0c4=2C EAP-Session-Id =3D 0x0d8581ddf2a766a69d3c0fcd5ce852bd7974d58e27f8207147197a620a381e429b3abc2deccddd746c1dce6033de0bf135adc3c2eac053f5dc1e27976d4ce7736f=2C EAP-Message =3D 0x03e50004=2C Message-Authenticator =3D 0x00000000000000000000000000000000=2C User-Name =3D =22inverse=22=2C Tunnel-Private-Group-Id =3D =222=22=2C Tunnel-Type =3D VLAN=2C Tunnel-Medium-Type =3D IEEE-802
request_time: 0
radius_ip: 172.17.1.20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment