[Was: rlm_mschap: Unknown expansion string] Segfault while sending Access-Accept

Luca Corti cortez at tiscali.it
Tue Nov 15 17:33:35 CET 2005


On Tue, 2005-11-15 at 09:38 -0600, Michael Griego wrote:
> ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key 
> --username=%{mschap:User-Name} --challenge=%{mschap:Challenge} 
> --nt-response=%{mschap:NT-Response} --domain=%{mschap:NT-Domain}"

Thanks a lot, this makes ntlm_auth work. Unfotunately now freeradius
segfaults while sending Access-Accept:




modcall: entering group authorize for request 8
  modcall[authorize]: module "preprocess" returns ok for request 8
  modcall[authorize]: module "mschap" returns noop for request 8
    rlm_realm: Looking up realm "MYDOMAIN" for User-Name = "MYDOMAIN
\myuser"
    rlm_realm: Found realm "MYDOMAIN"
    rlm_realm: Adding Stripped-User-Name = "myuser"
    rlm_realm: Proxying request from user myuser to realm MYDOMAIN
    rlm_realm: Adding Realm = "MYDOMAIN"
    rlm_realm: Authentication realm is LOCAL.
  modcall[authorize]: module "ntdomain" returns noop for request 8
  rlm_eap: EAP packet type response id 8 length 38
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
modcall: leaving group authorize (returns updated) for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap: Success
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns ok for request 8
modcall: leaving group authenticate (returns ok) for request 8
Sending Access-Accept of id 8 to 172.16.1.250 port 1037
        MS-MPPE-Recv-Key =
0x89fe613a15cbcbf6e9fa6d7b6f730db6c1a9c548c24c6ff3d67635d28caed390
Segmentation fault

thanks

Luca

-- 
Luca Corti
PGP Key ID 1F38C091
BOFH excuse of the moment:
need to wrap system in aluminum foil to fix problem




More information about the Freeradius-Users mailing list