thanks for the suggestions.
The key used is the right one.
/usr/local/bin/tacacs_client:75: DeprecationWarning: The 'warn' method is deprecated, use 'warning' instead
log.warn("\033[93mTACACS+ --debug will log raw packet data INCLUDING PASSWORDS;"
WARNING:__main__:TACACS+ --debug will log raw packet data INCLUDING PASSWORDS;proceed at your own risk!
sent body <action: 1, authen_type: 2, authen_service: 1, data: b'7V*uDfb96ffI', data_len: 12, priv_lvl: 0, port: python_tty0, port_len: 11, rem_addr: python_device, rem_addr_len: 13, user: cwac1019, user_len: 8>
recv body <data: b'', data_len: 0, flags: 0, server_msg: b'', server_msg_len: 0, status: PASS>
Here is the log from tac_plus:
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 ---<start packet>---
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 key used: T4c4csCDWT
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 version: 193, type: 1, seq no: 1, flags: unencrypted
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 session id: e63f6dc6, data length: 52
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 packet body [partially masked] (len: 52): \001\000\002\001\b\v\r\fcwac1019python_tty0python_device************
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 0000 01 00 02 01 08 0b 0d 0c 63 77 61 63 31 30 31 39 ........ cwac1019
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 0010 70 79 74 68 6f 6e 5f 74 74 79 30 70 79 74 68 6f python_t ty0pytho
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 0020 6e 5f 64 65 76 69 63 65 2a 2a 2a 2a 2a 2a 2a 2a n_device ********
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 0030 2a 2a 2a 2a ****
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 AUTHEN/START, priv_lvl=0
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 action=login (1)
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 authen_type=pap (2)
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 service=login (1)
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 user_len=8 port_len=11 rem_addr_len=13
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 data_len=12
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 user (len: 8): cwac1019
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 port (len: 11): python_tty0
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 rem_addr (len: 13): python_device
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 ---<end packet>---
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 authen: hdr->seq_no: 1
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 looking for user cwac1019 realm default
604158: 09:15:26.699 0/c66d3fe6: 127.0.0.1 user lookup failed
604158: 09:15:26.722 0/00000000: - creating user cwac1019 in realm default
604158: file=cwac1019 line=1 sym=[{] buf='{'
604158: file=cwac1019 line=1 sym=[member] buf='member'
604158: file=cwac1019 line=1 sym=[=] buf='='
604158: file=cwac1019 line=1 sym=[<string>] buf='Admin'
604158: file=__internal__ line=1 sym=[acl] buf='acl'
604158: file=__internal__ line=1 sym=[=] buf='='
604158: file=__internal__ line=1 sym=[<string>] buf='__internal__realm_default'
604158: file=__internal__ line=1 sym=[{] buf='{'
604158: file=__internal__ line=1 sym=[realm] buf='realm'
604158: file=__internal__ line=1 sym=[=] buf='='
604158: file=__internal__ line=1 sym=[default] buf='default'
604158: file=__internal__ line=1 sym=[}] buf='}'
604158: file=__internal__ line=1 sym=[<end-of-file>] buf=''
604158: file=cwac1019 line=1 sym=[}] buf='}'
604158: file=cwac1019 line=1 sym=[<end-of-file>] buf=''
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 looking for user cwac1019 realm default
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cfg_get: checking user/group cwac1019, tag (NULL)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default: NAS matched (unrestricted)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default: NAC matched (unrestricted)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default: Port matched (unrestricted)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default line 1: Realm "default" <=> "default"
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default: Realm matched
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default: Timespec matched (unrestricted)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default: ACL matched (unrestricted)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default: match
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cfg_get: checking user/group Admin, tag (NULL)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 user lookup succeded
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cfg_get: checking user/group cwac1019, tag (NULL)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default: match (cached)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cfg_get: checking user/group Admin, tag (NULL)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cfg_get: checking user/group cwac1019, tag (NULL)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default: match (cached)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cfg_get: checking user/group Admin, tag (NULL)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cfg_get: checking user/group cwac1019, tag (NULL)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cwac1019@python_device: ACL __internal__realm_default: match (cached)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 cfg_get: checking user/group Admin, tag (NULL)
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 pap login for 'cwac1019' from python_device on python_tty0 succeeded
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 Writing AUTHEN/PASS size=18
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 ---<start packet>---
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 key used: T4c4csCDWT
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 version: 193, type: 1, seq no: 2, flags: unencrypted
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 session id: e63f6dc6, data length: 6
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 packet body (len: 6): \001\000\000\000\000\000
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 0000 01 00 00 00 00 00 ......
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 AUTHEN, status=1 (AUTHEN/PASS) flags=0x0
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 msg_len=0, data_len=0
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 msg (len: 0):
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 data (len: 0):
604158: 09:15:26.722 0/c66d3fe6: 127.0.0.1 ---<end packet>---
I know you said tac_plus isn't supported anymore but i wonder if you can help me once more? :D
Best Regads