PacketFence - BTS - PacketFence
View Issue Details
0001622PacketFencehardware modulespublic2013-01-11 07:082013-01-11 09:23
jbehrend 
 
normalminoralways
closedwon't fix 
3.6.1 
 
0001622: Wireless Deauthentication using SSH on Trapeze HW
The SSH-transport does not deauthenticate:

pf/bin/pfcmd_vlan -deauthenticate -switch 134.104.29.3 -mac 18:87:96:1a:f6:fa

the log shows:

Jan 11 12:59:30 pfcmd_vlan(12885) ERROR: Unable to connect to 134.104.29.3 using SSH. Failed with Failed to get first prompt at /usr/local/pf/lib/pf/SNMP/Trapeze.pm line 133. (pf::SNMP::Trapeze::deauthenticateMacDefault)

This is because the SSH fingerprint is not present for the host:
So I added this and all is well:

line: 133
        $session->connect(
            Name => $this->{_cliUser},
            Password => $this->{_cliPwd},
### by jan
            SHKC => 0
###
        );

Reference is:
http://search.cpan.org/~oliver/Net-Appliance-Session-2.111080/lib/Net/Appliance/Session/Cookbook/Recipe02.pod [^]

No tags attached.
Issue History
2013-01-11 07:08jbehrendNew Issue
2013-01-11 07:08jbehrendgit revision => 3.6.1-201212070045 (Debian Package)
2013-01-11 09:23dwuelfrathgit revision3.6.1-201212070045 (Debian Package) =>
2013-01-11 09:23dwuelfrathNote Added: 0003291
2013-01-11 09:23dwuelfrathStatusnew => closed
2013-01-11 09:23dwuelfrathResolutionopen => won't fix

Notes
(0003291)
dwuelfrath   
2013-01-11 09:23   
Please see this FAQ entry:
http://www.packetfence.org/support/faqs/article/is-there-a-way-to-avoid-host-key-verification-on-every-ssh-based-network-devices.html [^]