Can anyone help me make sense of why it's not letting me in?
Running v. 5.2.1.20
2020/12/19 02:38:36-platformMessage: connected ******** 2020/12/19 02:38:36-tcp.create: https://secure.*******.org.uk 2020/12/19 02:38:36-tcp.create: secure.*********.org.uk 443 / 2020/12/19 02:38:36-tcp.connect 11 2020/12/19 02:38:36-{"tlsVersion":{"min":"tls1","max":"tls1.2"}} 2020/12/19 02:38:36-tcp.secure 2020/12/19 02:38:36-setKeepAlive 2020/12/19 02:38:36-connected: {"cmd":"connected","config":"********","clientid":"d73cf5d59238db90a12edda8d016d8f8","language":"en-GB","platform":"arm","payload":"https://secure.*******.org.uk","username":"","username2":"","realm":"","role":"","check":"true","operation":"write"} 2020/12/19 02:38:36-connected message: 5.2.1.20 2020/12/19 02:38:36-not string type 2020/12/19 02:38:36-Client::Client 2020/12/19 02:38:36-PulseVpnThread: https://secure.*******.org.uk 2020/12/19 02:38:36-Client::init 2020/12/19 02:38:36-connectAndAuthentication: https://secure.******.org.uk:443/ 2020/12/19 02:38:36-Client::tcp_connect: secure.********.org.uk:443 2020/12/19 02:38:36-Client:endHttp GET / HTTP/1.1 Host: secure.******.org.uk Connection: keep-alive User-Agent: odJPAService Content-type: EAP Upgrade: IF-T/TLS 1.0 Content-length: 0 2020/12/19 02:38:36-Client::RecvHttp 2020/12/19 02:38:36-sendMessageToTunnel: 231 2020/12/19 02:38:36-Client::RecvHttp HTTP/1.1 101 Switching Protocols Content-type: application/octet-stream Pragma: no-cache Upgrade: IF-T/TLS 1.0 Connection: Upgrade Connection: Keep-Alive Keep-Alive: timeout=15 Strict-Transport-Security: max-age=31536000 2020/12/19 02:38:36-Client:
endIft: vendor=21911, request=1, size=4 2020/12/19 02:38:36-sendMessageToTunnel: 20 2020/12/19 02:38:36-sendMessageToTunnel: 20 2020/12/19 02:38:36-Client::RecvIft: vendor=21911, request=2, size=20 id=501 2020/12/19 02:38:36-Client:
endIft: vendor=2636, request=136, size=61 2020/12/19 02:38:36-Client::RecvIft: vendor=21911, request=5, size=20 id=502 2020/12/19 02:38:36-onInit 2020/12/19 02:38:36-InitODSTK 2020/12/19 02:38:36-Callback code=ODSTK_CB_EAP_STATUS eapstate=1 2020/12/19 02:38:36-Callback code=ODSTK_CB_EAP_TRANSMIT_RESPONSE; Response size=14 bytes 2020/12/19 02:38:36-Client:
endEap: size=14 2020/12/19 02:38:36-Callback code=ODSTK_CB_EAP_STATUS eapstate=2 2020/12/19 02:38:36-sendMessageToTunnel: 96 2020/12/19 02:38:36-Client::RecvIft: vendor=21911, request=5, size=96 id=503 2020/12/19 02:38:36-ReceiveEapMessage: size=76 2020/12/19 02:38:36-Processing EAP-Request/254: code = 1, id = 2, length = 76 2020/12/19 02:38:36-EAP-JUAC::Received Version 2 2020/12/19 02:38:36-EAP-JUAC::Received Min Version 1 2020/12/19 02:38:36-EAP-JUAC:
ending Version Requested 2 2020/12/19 02:38:36-EAP-JUAC:
ending JPR_FULL_CLIENT_LICENSE 0 2020/12/19 02:38:36-EAP-JUAC:
ending JPR_UAC_PLATFORM ChromeOS 2020/12/19 02:38:36-ODSTK_CB_EAP_GET_ENDPOINT_USER_AGENT 2020/12/19 02:38:36-EAP-JUAC:
ending JPR_UAC_USER_AGENT Pulse-Secure/8.1.0.0 (ChromeOS; ARM) PulseVpn/5.2.1.20 2020/12/19 02:38:36-Callback code=ODSTK_CB_EAP_JUAC_GET_CLIENT_ID 2020/12/19 02:38:36-EAP-JUAC:
ending JPR_UAC_CLIENT_ID D73CF5D59238DB90A12EDDA8D016D8F8 2020/12/19 02:38:36-Callback code=ODSTK_CB_EAP_JUAC_GET_CHANNEL_ID 2020/12/19 02:38:36-Callback code=ODSTK_CB_EAP_JUAC_GET_CLIENT_ID 2020/12/19 02:38:36-EAP-JUAC:
ending JPR_UAC_CHANNEL_ID D73CF5D59238DB90A12EDDA8D016D8F8 2020/12/19 02:38:36-EAP-JUAC:
ending JPR_UAC_LANGUAGE en-GB 2020/12/19 02:38:36-ODSTK_CB_EAP_GET_ENDPOINT_MAC_ADDRESS 2020/12/19 02:38:36-EAP-JUAC:
ending JPR_UAC_USE_EMBEDDED_BROWSER 1 2020/12/19 02:38:36-EAP-JUAC::Received JPR_UAC_SERVERID 0274MZ51A0Y0M04ZS 2020/12/19 02:38:36-ODSTK_CB_EAP_NOTIFY_DSID_FAILED 2020/12/19 02:38:36-Callback code=ODSTK_CB_EAP_TRANSMIT_RESPONSE; Response size=224 bytes 2020/12/19 02:38:36-Client:
endEap: size=224 2020/12/19 02:38:36-Callback code=ODSTK_CB_EAP_STATUS eapstate=4 2020/12/19 02:38:37-sendMessageToTunnel: 56 2020/12/19 02:38:37-Client::RecvIft: vendor=21911, request=5, size=56 id=504 2020/12/19 02:38:37-ReceiveEapMessage: size=36 2020/12/19 02:38:37-Processing EAP-Request/254: code = 1, id = 3, length = 36 2020/12/19 02:38:37-EAP-JAUTH::HandleRequest 2020/12/19 02:38:37-ODSTK_CB_EAP_GET_USERNAME_PASSWORD: token=0, retry=0, secondaryauth=0 userprompt= passprompt= 2020/12/19 02:38:37-prompt: {"cmd":"prompt","dialog":"usernamepassword","retry":"false","secondary":"false"} 2020/12/19 02:38:37-createWindow: usernamepassword.html 2020/12/19 02:38:37-prompt_title: <h4>Enter Credential</h4> 2020/12/19 02:38:45-usernamepassword submit 2020/12/19 02:38:45-onMessage: prompt 2020/12/19 02:38:45-platform_message: prompt 2020/12/19 02:38:45-username: Ross_Simmons 2020/12/19 02:38:45-EAP-JUAC:
ending JPR_UAC_ENDPOINT_USERNAME Ross_Simmons 2020/12/19 02:38:45-Callback code=ODSTK_CB_EAP_TRANSMIT_RESPONSE; Response size=76 bytes 2020/12/19 02:38:45-Client:
endEap: size=76 2020/12/19 02:38:46-sendMessageToTunnel: 56 2020/12/19 02:38:46-Client::RecvIft: vendor=21911, request=5, size=56 id=505 2020/12/19 02:38:46-ReceiveEapMessage: size=36 2020/12/19 02:38:46-Processing EAP-Request/254: code = 1, id = 4, length = 36 2020/12/19 02:38:46-ODSTK_TNC_NOTIFY_STATUS: nNarID=0 nConnectionID=-1 connectionState=0 2020/12/19 02:38:46-BeginHandshake 2020/12/19 02:38:46-ODSTK_TNC_NOTIFY_STATUS: nNarID=10 nConnectionID=10 connectionState=1 2020/12/19 02:38:46-Callback code=ODSTK_CB_EAP_TRANSMIT_RESPONSE; Response size=112 bytes 2020/12/19 02:38:46-Client:
endEap: size=112 2020/12/19 02:38:46-sendMessageToTunnel: 112 2020/12/19 02:38:46-Client::RecvIft: vendor=21911, request=5, size=112 id=506 2020/12/19 02:38:46-ReceiveEapMessage: size=92 2020/12/19 02:38:46-Processing EAP-Request/254: code = 1, id = 5, length = 92 2020/12/19 02:38:46-EAP-JUAC::Received Offered Session To End - Session ID: a2c626b7 2020/12/19 02:38:46-EAP-JUAC::Received Offered Session - Source IP: 2.126.161.233 2020/12/19 02:38:46-EAP-JUAC::Received Offered Session - First Access Time: 2020-12-19 02:29:31 +0000 2020/12/19 02:38:46-Callback code=ODSTK_CB_EAP_GET_SESSION 2020/12/19 02:38:46-Session warning: 2.126.161.233 2020-12-19 02:29:31 +0000 2020/12/19 02:38:46-prompt: {"cmd":"prompt","dialog":"session","selection":"2.126.161.233 2020-12-19 02:29:31 +0000"} 2020/12/19 02:38:46-createWindow: selectionprompt.html 2020/12/19 02:38:46-prompt_title: <h4>Enter Session Selection</h4> 2020/12/19 02:38:48-selectButton 2020/12/19 02:38:48-onMessage: prompt 2020/12/19 02:38:48-platform_message: prompt 2020/12/19 02:38:48-EAP-JUAC:
ending JPR_UAC_SESSION_TO_END a2c626b7 2020/12/19 02:38:48-Callback code=ODSTK_CB_EAP_TRANSMIT_RESPONSE; Response size=32 bytes 2020/12/19 02:38:48-Client:
endEap: size=32 2020/12/19 02:38:48-sendMessageToTunnel: 208 2020/12/19 02:38:48-Client::RecvIft: vendor=21911, request=5, size=208 id=507 2020/12/19 02:38:48-ReceiveEapMessage: size=188 2020/12/19 02:38:48-Processing EAP-Request/254: code = 1, id = 6, length = 188 2020/12/19 02:38:48-EAP-JUAC::Received DSID <opaque> 2020/12/19 02:38:48-EAP-JUAC::Received DSID Lifetime 28800 2020/12/19 02:38:48-EAP-JUAC::Received URI 10.0.0.61 2020/12/19 02:38:48-EAP-JUAC::Received cert hash bfe8f264bcd2f20c9eed60248bea5c4d 2020/12/19 02:38:48-EAP-JUAC::Received UAC REQUEST FLAGS 0x00000010 2020/12/19 02:38:48-EAP-JUAC::Received SESSION EXPIRATION WARNING TIME 300 2020/12/19 02:38:48-EAP-JUAC::Received RESULT STATUS 0 2020/12/19 02:38:48-Callback code=ODSTK_CB_EAP_GET_EXTEND_SESSION_FLAG 2020/12/19 02:38:48-EAP-JUAC::new session 2020/12/19 02:38:48-EAP-JUAC::lifetime = 28800, expiration 3FFEFE80 2020/12/19 02:38:48-Callback code=ODSTK_CB_EAP_TRANSMIT_RESPONSE; Response size=12 bytes 2020/12/19 02:38:48-Client:
endEap: size=12 2020/12/19 02:38:48-sendMessageToTunnel: 24 2020/12/19 02:38:48-sendMessageToTunnel: 20 2020/12/19 02:38:48-Client::RecvIft: vendor=21911, request=7, size=24 id=508 2020/12/19 02:38:48-ReceiveEapMessage: size=4 2020/12/19 02:38:48-Processing EAP-Success: code = 3, id = 6, length = 4 2020/12/19 02:38:48-ODSTK_TNC_GET_REMEDIATION_DATA nNarID=10 nConnectionID=10 2020/12/19 02:38:48-ODSTK_TNC_NOTIFY_STATUS: nNarID=10 nConnectionID=10 connectionState=1 2020/12/19 02:38:48-Callback code=ODSTK_CB_EAP_JUAC_SET_SESSION_INFO 2020/12/19 02:38:48-Callback code=ODSTK_CB_EAP_STATUS eapstate=6 2020/12/19 02:38:48-Client::RecvIft: vendor=2636, request=143, size=20 id=509 2020/12/19 02:38:48-IFT_INIT_DONE 2020/12/19 02:38:48-Error 0x90000026: Not supported. 2020/12/19 02:38:48-prompt: {"cmd":"prompt","dialog":"error","message":"Not supported."} 2020/12/19 02:38:48-createWindow: errorprompt.html 2020/12/19 02:38:48-prompt_title: <h4>Connection Error</h4> 2020/12/19 02:38:48-prompt_message: Not supported. 2020/12/19 02:38:49-error submit 2020/12/19 02:38:49-onMessage: error 2020/12/19 02:38:49-platform_message: prompt 2020/12/19 02:38:49-Client::~Client 2020/12/19 02:38:50-platformMessage: disconnected ******** 2020/12/19 02:38:50-IFT_LOGOUT 2020/12/19 02:38:50-tcp.disconnect 11 2020/12/19 02:38:50-notifyComplete! 2020/12/19 02:38:50-cmd disconnected done 2020/12/19 02:38:52-refresh #log-tab
@RHS96 We would need to check the VPN server user access logs / debuglog (more verbose) for more information.
ChromeOS client shows that the authentication followed by user session creation was successfully, however closes the session with "Not-supported".
When did this issue was first observed? was it working before? Not-supported might be sent due to the access mechanism assigned for your user-role.. please check with the VPN administrator.
User session creation:
2020/12/19 02:38:48-EAP-JUAC::new session 2020/12/19 02:38:48-EAP-JUAC::lifetime = 28800, expiration 3FFEFE80