attributes lost

Marc Boisis-Delavaud mdelavau at univ-lr.fr
Mon Apr 14 10:34:09 CEST 2008


Hello,

When I authenticate in PEAP, my ldap attributes (ex Tunnel-Private- 
Group-Id)  aren't send to the client, why ?

Here is my debug:

rlm_ldap: looking for reply items in directory...
rlm_ldap: LDAP attribute radiusClass as RADIUS attribute Class =  
0x4f553d61646d696e3b
rlm_ldap: LDAP attribute radiusClass as RADIUS attribute Class =  
0x4f553d61646d696e3b
rlm_ldap: LDAP attribute radiusTunnelPrivateGroupId as RADIUS  
attribute Tunnel-Private-Group-Id:0 = "1"
rlm_ldap: LDAP attribute radiusTunnelMediumType as RADIUS attribute  
Tunnel-Medium-Type:0 = IEEE-802
rlm_ldap: LDAP attribute radiusTunnelType as RADIUS attribute Tunnel- 
Type:0 = VLAN
WARNING: No "known good" password was found in LDAP.  Are you sure  
that the user is configured correctly?
rlm_ldap: user mdelavau authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
+++[ldap_prof] returns ok
++- group  returns ok
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/mschapv2
   rlm_eap: processing type mschapv2
   rlm_eap: Freeing handler
++[eap] returns ok
+- entering group session
	expand: /opt/freeradius/radium/var/log/radius/radutmp -> /opt/ 
freeradius/radium/var/log/radius/radutmp
	expand: %{User-Name} -> mdelavau at univ-lr.fr
++[radutmp] returns ok
Login OK: [mdelavau at univ-lr.fr/<via Auth-Type = EAP>] (from client  
heros59 port 0)
+- entering group post-auth
	expand: /opt/freeradius/radium/var/log/radius/radacct/%{Client-IP- 
Address}/reply-detail-%Y%m%d -> /opt/freeradius/radium/var/log/radius/ 
radacct/10.14.0.59/reply-detail-20080414
rlm_detail: /opt/freeradius/radium/var/log/radius/radacct/%{Client-IP- 
Address}/reply-detail-%Y%m%d expands to /opt/freeradius/radium/var/log/ 
radius/radacct/10.14.0.59/reply-detail-20080414
	expand: %t -> Mon Apr 14 10:04:29 2008
++[reply_log] returns ok
} # server inner-tunnel
   PEAP: Got tunneled reply RADIUS code 2
	Class = 0x4f553d61646d696e3b
	Tunnel-Private-Group-Id:0 = "1"
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Type:0 = VLAN
	EAP-Message = 0x03090004
	Message-Authenticator = 0x00000000000000000000000000000000
	User-Name = "mdelavau"
   PEAP: Processing from tunneled session code 0x730f30 2
	Class = 0x4f553d61646d696e3b
	Tunnel-Private-Group-Id:0 = "1"
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Type:0 = VLAN
	EAP-Message = 0x03090004
	Message-Authenticator = 0x00000000000000000000000000000000
	User-Name = "mdelavau"
   PEAP: Tunneled authentication was successful.
   rlm_eap_peap: SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 233 to 10.14.0.59 port 1645
	EAP-Message =  
0x010a002b1900170301002091080b47d0c51811b6674b7a649bd231e1f5fea643dd96b28362ea273fe51553
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xe5e74631eded5f77803ca60988c6d413
Finished request 22.
Going to the next request
Waking up in 4.6 seconds.
rad_recv: Access-Request packet from host 10.14.0.59 port 1645,  
id=234, length=243
	User-Name = "mdelavau at univ-lr.fr"
	Framed-MTU = 1400
	Called-Station-Id = "0012.44bd.0b03"
	Calling-Station-Id = "0019.e304.476e"
	Cisco-AVPair = "ssid=eduroam"
	WISPr-Location-Name = "CRI Arpae"
	Service-Type = Authenticate-Only
	Message-Authenticator = 0x8cefe9357b38e5f0a52c291945837712
	EAP-Message =  
0x020a002b19001703010020dc122ffd1ad0290d995b344b65adbda0824e52829616cca6dfb590d9b510b732
	NAS-Port-Type = Wireless-802.11
	Cisco-NAS-Port = "36654"
	NAS-Port = 36654
	State = 0xe5e74631eded5f77803ca60988c6d413
	NAS-IP-Address = 10.14.0.59
	NAS-Identifier = "heros59"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
     rlm_realm: Looking up realm "univ-lr.fr" for User-Name = "mdelavau at univ-lr.fr 
"
     rlm_realm: Found realm "univ-lr.fr"
     rlm_realm: Adding Stripped-User-Name = "mdelavau"
     rlm_realm: Proxying request from user mdelavau to realm univ-lr.fr
     rlm_realm: Adding Realm = "univ-lr.fr"
     rlm_realm: Authentication realm is LOCAL.
++[suffix] returns noop
   rlm_eap: EAP packet type response id 10 length 43
   rlm_eap: Continuing tunnel setup.
++[eap] returns ok
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
   eaptls_verify returned 7
   rlm_eap_tls: Done initial handshake
   eaptls_process returned 7
   rlm_eap_peap: EAPTLS_OK
   rlm_eap_peap: Session established.  Decoding tunneled attributes.
   rlm_eap_peap: Received EAP-TLV response.
   rlm_eap_peap: Success
   rlm_eap: Freeing handler
++[eap] returns ok
Login OK: [mdelavau at univ-lr.fr/<via Auth-Type = EAP>] (from client  
heros59 port 36654 cli 0019.e304.476e)
+- entering group post-auth
++[exec] returns noop
Sending Access-Accept of id 234 to 10.14.0.59 port 1645
	MS-MPPE-Recv-Key =  
0xbf9d41342546813406854e35cabdf79521b33e2c316aff8d599716484cc18c20
	MS-MPPE-Send-Key =  
0xaff6c3d06041e693b8acb1067d382699f150da706b799e4960ab82be1f25a96a
	EAP-Message = 0x030a0004
	Message-Authenticator = 0x00000000000000000000000000000000
	User-Name = "mdelavau"




More information about the Freeradius-Users mailing list