EAP-TTLS-MSCHAPV2. Failed to authenticate.

Koos Beens koos at vera-groningen.nl
Wed Aug 17 21:26:34 CEST 2005


> "Koos Beens" <koos at vera-groningen.nl> wrote:
>>   rlm_mschap: Found MS-CHAP attributes.  Setting 'Auth-Type  = MS-CHAP'
> ...
>> modcall: leaving group authorize (returns ok) for request 5
>>   rad_check_password:  Found Auth-Type MS-CHAP
>> auth: type "MS-CHAP"
>>   ERROR: Unknown value specified for Auth-Type.  Cannot perform
>> requested
>> action.
>
>   You deleted the "mschap" entry from the "authenticate" section.
>
>   Don't do that.
>
>   Alan DeKok.
>

It is now working fine if I set mschap on the supplicant.

If I set mschap-v2 however it waits forever while authenticating while
radius is keeping repeating the last few messages. What can I do to solve
it?

Here's the output:

Sending Access-Accept of id 0 to 192.168.0.4 port 1026
        MS-MPPE-Recv-Key = 0xfe00eb1b1e74d1f1f7ca6bc49108
        MS-MPPE-Send-Key = 0x29eb1ee202d656d7c014d936017c
        MS-MPPE-Encryption-Policy = 0x00000001
        MS-MPPE-Encryption-Types = 0x00000006
        MS-MPPE-Recv-Key =
0x60fe9859f1b3f94569a45616b65ab8d6f7f23ad0efb5aafd8e8746070bc7bc
        MS-MPPE-Send-Key =
0x6328e25652da39b0ff5eb16f2e6d314843201e1206c12b73539e5e733fbb08
        EAP-Message = 0x03050004
        Message-Authenticator = 0x00000000000000000000000000000000
        User-Name = "TestUser"
Finished request 5
Going to the next request
--- Walking the entire request list ---
Waking up in 5 seconds...
--- Walking the entire request list ---
Cleaning up request 5 ID 0 with timestamp 43038d5b
Nothing to do.  Sleeping until we see a request.
rad_recv: Access-Request packet from host 192.168.0.4 port 1026, id=0,
length=129
        User-Name = "TestUser"
        NAS-IP-Address = 192.168.0.4
        Called-Station-Id = "001217d45891"
        Calling-Station-Id = "000d93edf8f6"
        NAS-Identifier = "001217d45891"
        NAS-Port = 35
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x0201000d0154657374557572
        Message-Authenticator = 0x0d19505516fa507c6b8f913938de43
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: No '@' in User-Name = "TestUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
  rlm_eap: EAP packet type response id 1 length 13
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry TestUser at line 206
  modcall[authorize]: module "files" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
 rlm_eap_tls: Requiring client certificate
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
Sending Access-Challenge of id 0 to 192.168.0.4 port 1026
        EAP-Message = 0x010200060d20
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xbd4781d526084e898aba9280a52ab572
Finished request 6
Going to the next request
--- Walking the entire request list ---
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.0.4 port 1026, id=0,
length=140
        User-Name = "TestUser"
        NAS-IP-Address = 192.168.0.4
        Called-Station-Id = "001217d45891"
        Calling-Station-Id = "000d93edf8f6"
        NAS-Identifier = "001217d45891"
        NAS-Port = 35
        Framed-MTU = 1400
        State = 0xbd4781d526084e898aba9280a52ab572
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020200060315
        Message-Authenticator = 0x8d40293482bea86e457103007aa6609e
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
    rlm_realm: No '@' in User-Name = "TestUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 7
  rlm_eap: EAP packet type response id 2 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry TestUser at line 206
  modcall[authorize]: module "files" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP NAK
 rlm_eap: EAP-NAK asked for EAP-Type/ttls
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 7
modcall: leaving group authenticate (returns handled) for request 7
Sending Access-Challene of id 0 to 192.168.0.4 port 1026
        EAP-Message = 0x01300061520
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x2cd35d70b11751775357b0de8ce89a
Finished request 7
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.0.4 port 1026, id=0,
length=268
        User-Name = "TestUser"
        NAS-IP-Address = 192.168.0.4
        Called-Station-Id = "007d45891"
        Calling-Station-Id = "0003edf8f6"
        NAS-Identifier = "0012d45891"
        NAS-Port = 35
        Framed-MTU = 1400
        State = 0x2cd37013b11751775357b0de8ce89a
        NAS-Port-Type = Wireless-802.11
        EAP-Message =
0x0203008615800000007c160301007701000073030143038d78cba4d41f41d6beccd967b9bccb98b0f657ddb82a9918735529a02b203c4b9b037b5db06da2407a6f5a4284e62fd5c59d69631df387a9f74ce87796002c00050004000aff830009ff82000300080006ff8000010016001500140013001200110018001b001a001700190100
        Message-Authenticator = 0x001ca8ac3f9a4e2b992151ad3749a1c9
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
  modcall[authorize]: module "preprocess" returns ok for request 8
  modcall[authorize]: module "mschap" returns noop for request 8
    rlm_realm: No '@' in User-Name = "TestUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 8
  rlm_eap: EAP packet type response id 3 length 134
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
    users: Matched entry TestUser at line 206
  modcall[authorize]: module "files" returns ok for request 8
modcall: leaving group authorize (returns updated) for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/ttls
  rlm_eap: processing type ttls
  rlm_eap_ttls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
    (other): before/accept initialization
    TLS_accept: before/accept initialization
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0077], ClientHello
    TLS_accept: SSLv3 read client hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
    TLS_accept: SSLv3 write server hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0706], Certificate
    TLS_accept: SSLv3 write certificate A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
    TLS_accept: SSLv3 write server done A
    TLS_accept: SSLv3 flush data
    TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 8
modcall: leaving group authenticate (returns handled) for request 8
Sending Access-Challenge of id 0 to 192.168.0.4 port 1026
        EAP-Message =
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
        EAP-Message =
0x20506f7020756e64657267726f756e64310b30090603550403130253453125302306092a864886f70d01090116166b6f6f7340766572612d67726f6e696e67656e2e6e6c301e170d3035303830333138323933325a170d3036303830333138323933325a3081b3310b3009060355040613024e4c311230100603550408130947726f6e696e67656e311230100603550407130947726f6e696e67656e314430420605040a133b566572612047726f6e696e67656e202d20436c756220666f722074686520696e7465726e6174696f6e616c20506f7020756e64657267726f756e64310f300d0603550403130677632d3233383125302306092a864886
        EAP-Message =
0xf70d01090116166b6f6f7340766572612d67726f6e696e67656e2e6e6c30819f300d06092a864886f70d010101050003818d003081890281810096a0f8a0df1bbc4bbe569236e51cb3b31b1470736b82ea9a6f15784eaf4ec8b07ae508c07719c2676a8fd7c7a78de69115b47dda69d3f9d52b8653f9b86fd569a75f0b3fdf8980a90da4cb06500e205dea10da1942b1e68453d4bdad99f0f5c9b3c5c1f2191a884c94a872b42fd723cb445d3d187b395992fea2d3b649d350203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101040500038181000a4f3d2dc962563c00bf60e9f760b672daf2
        EAP-Message =
0x85559f62c03c4f00a32ac06e605f5c640ca67f7acbbec964ecbef0edd335fdbec000dd143a021834ef83b9b00ffeef47696ad4eabe4adfaed2bf8fa2ae19be256c5c5be23d044c1d0c53a29f965686a224a9a2ccf9bfc5cf757e4cf24e69cf5bbb0b8535d9e0ed21dab2c28d12f70003fc308203f830820361a003020102020900c0cd6500c2a598e300d06092a864886f70d01010405003081af310b3009060355040613024e4c311230100603550408130947726f6e696e67656e311230100603550407130947726f6e696e67656e314442060355040a133b566572612047726f6e696e67656e202d20436c756220666f722074686520696e7465
        EAP-Message = 0x726e61696f6e616c20506f7020756e64657267726f
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x19c612cc675ed1faba24af4d9b51f8
Finished request 8
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.0.4 port 1026, id=0,
length=140
        User-Name = "TestUser"
        NAS-IP-Address = 192.168.100.4
        Called-Station-Id = "00121d45891"
        Calling-Station-Id = "000d9edf8f6"
        NAS-Identifier = "001217d4591"
        NAS-Port = 35
        Framed-MTU = 1400
        State = 0x19c612cc675ed1fae2ba24af4d9b5f
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020400061500
        Message-Authenticator = 0x710acdf8f2e6d3338f9f2de5836af0
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 9
  modcall[authorize]: module "preprocess" returns ok for request 9
  modcall[authorize]: module "mschap" returns noop for request 9
    rlm_realm: No '@' in User-Name = "TestUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 9
  rlm_eap: EAP packet type response id 4 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 9
    users: Matched entry TestUser at line 206
  modcall[authorize]: module "files" returns ok for request 9
modcall: leaving group authorize (returns updated) for request 9
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 9
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/ttls
  rlm_eap: processing type ttls
  rlm_eap_ttls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 9
modcall: leaving group authenticate (returns handled) for request 9
Sending Access-Challenge of id 0 to 192.168.0.4 port 1026
        EAP-Message =
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
        EAP-Message =
0x6b6f6f7340766572612d67726f6e696e67656e2e6e6c30819f300d06092a864886f70d0101010500818d0030818902818100c06bb7a492f9bd8270a9756026bc6c8b84f2aa9622e476c1304ae458133cab3fcdc25bd417751550f0509a0521a5ec23f90a4453f399b51418090704180b05846f0a2b2cc305ff1f8f4627094382d8c581c78510c91cf154a6376fdd13d9072966bb2d62bd281539babb2f27bb41f1f5e41ef8bd74f0fd9972164e5af2b450203010001a382011830820114301d0603551d0e0416041483ee2641b14809e14ecf14e8df86e588dbe956283081e40603551d230481dc3081d9801483ee2641b14809e14ecf14e8df86
        EAP-Message =
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
        EAP-Message =
0xd7e0bb7c7cd294dfeb5bd2c80896124350be56c18c1d370333aba0a2df2dae9354f1f07695be21138fbbd907b1a8a12ea8738a58d5df80f59349ff12c64eb22855e914faf48d1e09b30ead1eb60f33b31b520b6c4e3feb0cadf2fd69c83d0c7832125335963736cf2a961bbb16030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xc63024dae978abe26ad08471f1575567
Finished request 9
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.0.4 port 1026, id=0,
length=330
        User-Name = "TestUser"
        NAS-IP-Address = 192.168.0.4
        Called-Station-Id = "0012175891"
        Calling-Station-Id = "0003edf8f6"
        NAS-Identifier = "0012d45891"
        NAS-Port = 35
        Framed-MTU = 1400
        State = 0xc63024da78abe26ad08471f1575567
        NAS-Port-Type = Wireless-802.11
        EAP-Message =
0x020500c41580000ba16030100861000008200802189076c137e46b7afe24adde8afc91153edd5ee01b07906a756b0d006c76f7e78f25e0841b07822ebb278ce25d85f2746b14c400e5a70c777953ffb1552e906848f38595c449dfe328c4ebe0e28f2d5189a54354db48da6ff5402e97c1e7c2ca8e5b9a355b8c6ddafddc17b00748b876575678122ce6443363f5eae5a3cb14030100010116030100240cec26f1a320287a78dbaef380e96ecff129ec81b63cbd0a881d6f6d24ec0c19643713ed
        Message-Authenticator = 0x87c1ac4912f50886b42dd93841fe1fd3
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 10
  modcall[authorize]: module "preprocess" returns ok for request 10
  modcall[authorize]: module "mschap" returns noop for request 10
    rlm_realm: No '@' in User-Name = "TestUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 10
  rlm_eap: EAP packet type response id 5 length 196
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 10
    users: Matched entry TestUser at line 206
  modcall[authorize]: module "files" returns ok for request 10
modcall: leaving group authorize (returns updated) for request 10
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 10
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/ttls
  rlm_eap: processing type ttls
  rlm_eap_ttls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
    TLS_accept: SSLv3 read client key exchange A
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 read finished A
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
    TLS_accept: SSLv3 write change cipher spec A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 write finished A
    TLS_accept: SSLv3 flush data
    (other): SSL negotiation finished successfully
SSL Connection Established
  eaptls_process returned 13
  modcall[authenticate]: module "eap" returns handled for request 10
modcall: leaving group authenticate (returns handled) for request 10
Sending Access-Challenge of id 0 to 192.168.0.4 port 1026
        EAP-Message =
0x010600391580000002f140301000101160301002452b652ba709c7190e13871ac45647b05cc66804ad143e6cf07d34e9cdb7ab1e98b229d3
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe064087eb0bc5d11666273925e1a01c9
Finished request 10
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 192.168.0.4 port 1026, id=0,
length=277
        User-Name = "TestUser"
        NAS-IP-Address = 192.168.0.4
        Called-Station-Id = "0017d45891"
        Calling-Station-Id = "0003edf8f6"
        NAS-Identifier = "0017d45891"
        NAS-Port = 35
        Framed-MTU = 1400
        State = 0xe06408b0bc5d666273925e1a01c9
        NAS-Port-Type = Wireless-802.11
        EAP-Message =
0x0206008f158000000085170301008066b70b12659cce7d136c04500a2063ee5e20a3f8055564e453415eff7208b80cba62fed70b22636f8e211ec41bba271aab8010ad89aecc510634659d10826f7c6c6d162547e9b739c9ef8f2738d0d74a160cc5a63c73a44e3d1bee2384322303b9de92f98d6b9e0e601408ba01d88c4e2352ab7bffd4d67d4545c520320c0c
        Message-Authenticator = 0xef4b6103b1653738a0cba32b34fbbd3b
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 11
  modcall[authorize]: module "preprocess" returns ok for request 11
  modcall[authorize]: module "mschap" returns noop for request 11
    rlm_realm: No '@' in User-Name = "TestUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 11
  rlm_eap: EAP packet type response id 6 length 143
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 11
    users: Matched entry TestUser at line 206
  modcall[authorize]: module "files" returns ok for request 11
modcall: leaving group authorize (returns updated) for request 11
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 11
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/ttls
  rlm_eap: processing type ttls
  rlm_eap_ttls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
  eaptls_process returned 7
  rlm_eap_ttls: Session established.  Proceeding to decode tunneled
attributes.
  TTLS: Got tunneled request
        User-Name = "TestUser"
        MS-CHAP-Challenge = 0xc0eb97214c04f72f045cf383a6b87aec
        MS-CHAP2-Response =
0x6600793724d64b5f6bd466c5a43112f62300000000000000009347d3b8744557799d0d4d323a0b931f103e78918172d080
        FreeRADIUS-Proxied-To = 127.0.0.1
  TTLS: Sending tunneled request
        User-Name = "TestUser"
        MS-CHAP-Challenge = 0xcb9721c04f72f045cf383a6b87aec
        MS-CHAP2-Response =
0x6600793724d64b5f6bd466c4c53112f62300000000000000009347d3b8744557799d0d4d323a0b931f103e78918172d080
        FreeRADIUS-Proxied-To = 127.0.0.1
        NAS-IP-Address = 192.168.100.4
        Called-Station-Id = "00121d45891"
        Calling-Station-Id = "000d9edf8f6"
        NAS-Identifier = "001217d4591"
        NAS-Port = 35
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 11
  modcall[authorize]: module "preprocess" returns ok for request 11
  rlm_mschap: Found MS-CHAP attributes.  Setting 'Auth-Type  = MS-CHAP'
  modcall[authorize]: module "mschap" returns ok for request 11
    rlm_realm: No '@' in User-Name = "TestUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 11
  rlm_eap: No EAP-Message, not doing EAP
  modcall[authorize]: module "eap" returns noop for request 11
    users: Matched entry TestUser at line 206
  modcall[authorize]: module "files" returns ok for request 11
modcall: leaving group authorize (returns ok) for request 11
  rad_check_password:  Found Auth-Type MS-CHAP
auth: type "MS-CHAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 11
  rlm_mschap: Told to do MS-CHAPv2 for TestUser with NT-Password
rlm_mschap: adding MS-CHAPv2 MPPE keys
  modcall[authenticate]: module "mschap" returns ok for request 11
modcall: leaving group MS-CHAP (returns ok) for request 11
  TTLS: Got tunneled reply RADIUS code 2
        MS-CHAP2-Success =
0x66533d636336336534326435336563346166636239636333333438636230633664653566643765336364
        MS-MPPE-Recv-Key = 0xdb42b2fda5c99138697af7c0416ffac
        MS-MPPE-Send-Key = 0x4febcc146921dc46949345c68e58d04
        MS-MPPE-Encryption-Policy = 0x00000001
        MS-MPPE-Encryption-Types = 0x00000006
  TTLS: Got tunneled Access-Accept
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns ok for request 11
modcall: leaving group authenticate (returns ok) for request 11
Sending Access-Accept of id 0 to 192.168.0.4 port 1026
        MS-MPPE-Recv-Key = 0xdb42b2fda5c99e8697af7c0416ffac
        MS-MPPE-Send-Key = 0x4febcc1469213dc449345c68e58d04
        MS-MPPE-Encryption-Policy = 0x00000001
        MS-MPPE-Encryption-Types = 0x00000006
        MS-MPPE-Recv-Key =
0x1d865bdcd18b29fa3b24c5e040a94a6691015658fcef7d6c335967349ef3d5
        MS-MPPE-Send-Key =
0x86b2b619fd8b39a5f7a7f6f7a87bcf304a694996dc02a42283d0e49c6468cdf
        EAP-Message = 0x03060004
        Message-Authenticator = 0x00000000000000000000000000000000
        User-Name = "TestUser"
Finished request 11
Going to the next request
Waking up in 5 seconds...
--- Walking the entire request list ---
Cleaning up request 11 ID 0 with timestamp 43038d77
Nothing to do.  Sleeping until we see a request.







More information about the Freeradius-Users mailing list