Segmentation fault when use Odyssey Client

Hangjun He elmerhe at yahoo.com.cn
Tue May 20 10:44:41 CEST 2008


If I select EAP-TTLS + use only my certificate for auth will cause segmentation fault. Others seems OK.
   
  Debug info:
  rad_recv: Access-Request packet from host 192.168.200.57:32785, id=95, length=325
 
        User-Name = "bbb"
 
        NAS-IP-Address = 192.168.200.57
 
        NAS-Identifier = "auth_test"
 
        NAS-Port = 0
 
        Called-Station-Id = "00-19-77-02-E6-90:auth-wpa2-tkip-8021x"
 
        Calling-Station-Id = "00-1D-7E-03-2B-CF"
 
        Framed-MTU = 1500
 
        NAS-Port-Type = Wireless-802.11
 
        Connect-Info = "CONNECT 11Mbps 802.11b"
 
        EAP-Message = 0x0215009015800000008616030100461000004200400d423029041904e4b654b0384c78b56d7490853af607b909c2f54fc376bebac512ebfb7663e9ee2fc7320d175037da31f09e90ad986d539d519d6ef6c39f577914030100010116030100302027f914730434165f520dc31734211631a5c96402b0ddabaf4d815209d07bb6c0f2817ed3a2233822587288715beab6
 
        State = 0x4f6739def5f0e9f45fd60479253cc3cd
 
        Message-Authenticator = 0xe06aac6aeeefc91f7920fd60b05ea9ab
 
  Processing the authorize section of radiusd.conf
 
modcall: entering group authorize for request 9
 
  modcall[authorize]: module "preprocess" returns ok for request 9
 
  modcall[authorize]: module "chap" returns noop for request 9
 
  modcall[authorize]: module "mschap" returns noop for request 9
 
    rlm_realm: No '@' in User-Name = "bbb", looking up realm NULL
 
    rlm_realm: No such realm "NULL"
 
  modcall[authorize]: module "suffix" returns noop for request 9
 
  rlm_eap: EAP packet type response id 21 length 144
 
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
 
  modcall[authorize]: module "eap" returns updated for request 9
 
rlm_ldap: - authorize
 
rlm_ldap: performing user authorization for bbb
 
radius_xlat:  '(uid=bbb)'
 
radius_xlat:  'ou=radius,dc=bestgo,dc=aero'
 
rlm_ldap: ldap_get_conn: Checking Id: 0
 
rlm_ldap: ldap_get_conn: Got Id: 0
 
rlm_ldap: performing search in ou=radius,dc=bestgo,dc=aero, with filter (uid=bbb)
 
rlm_ldap: checking if remote access for bbb is allowed by uid
 
rlm_ldap: No default NMAS login sequence
 
rlm_ldap: looking for check items in directory...
 
rlm_ldap: Adding userPassword as User-Password == "1234"
 
rlm_ldap: looking for reply items in directory...
 
rlm_ldap: Adding radiusTunnelPrivateGroupId as Tunnel-Private-Group-Id:0 = "1"
 
rlm_ldap: Adding radiusTunnelMediumType as Tunnel-Medium-Type:0 = IPv4
 
rlm_ldap: Adding radiusTunnelType as Tunnel-Type:0 = GRE
 
rlm_ldap: user bbb authorized to use remote access
 
rlm_ldap: ldap_release_conn: Release Id: 0
 
  modcall[authorize]: module "ldap" returns ok for request 9
 
rlm_pap: Found existing Auth-Type, not changing it.
 
  modcall[authorize]: module "pap" returns noop for request 9
 
modcall: leaving group authorize (returns updated) for request 9
 
  rad_check_password:  Found Auth-Type EAP
 
auth: type "EAP"
 
  Processing the authenticate section of radiusd.conf
 
modcall: entering group authenticate for request 9
 
  rlm_eap: Request found, released from the list
 
  rlm_eap: EAP/ttls
 
  rlm_eap: processing type ttls
 
  rlm_eap_ttls: Authenticate
 
  rlm_eap_tls: processing TLS
 
rlm_eap_tls:  Length Included
 
  eaptls_verify returned 11 
 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0046], ClientKeyExchange  
 
    TLS_accept: SSLv3 read client key exchange A 
 
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]  
 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished  
 
    TLS_accept: SSLv3 read finished A 
 
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]  
 
    TLS_accept: SSLv3 write change cipher spec A 
 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished  
 
    TLS_accept: SSLv3 write finished A 
 
    TLS_accept: SSLv3 flush data 
 
    (other): SSL negotiation finished successfully 
 
SSL Connection Established 
 
  eaptls_process returned 13 
 
  modcall[authenticate]: module "eap" returns handled for request 9
 
modcall: leaving group authenticate (returns handled) for request 9
 
Sending Access-Challenge of id 95 to 192.168.200.57 port 32785
 
        Tunnel-Private-Group-Id:0 = "1"
 
        Tunnel-Medium-Type:0 = IPv4
 
        Tunnel-Type:0 = GRE
 
        EAP-Message = 0x0116004515800000003b1403010001011603010030b081e94e6f9087f3c237216ab3fd9d65fc8311b18e37e66208369fb451d373695f16b167d85e80c870295da3d2f21cf4
 
        Message-Authenticator = 0x00000000000000000000000000000000
 
        State = 0x10aabdcc7ef9ba295475b0706b6e070c
 
Finished request 9
 
Going to the next request
 
Waking up in 6 seconds...
 
rad_recv: Access-Request packet from host 192.168.200.57:32785, id=96, length=187
 
        User-Name = "bbb"
 
        NAS-IP-Address = 192.168.200.57
 
        NAS-Identifier = "auth_test"
 
        NAS-Port = 0
 
        Called-Station-Id = "00-19-77-02-E6-90:auth-wpa2-tkip-8021x"
 
        Calling-Station-Id = "00-1D-7E-03-2B-CF"
 
        Framed-MTU = 1500
 
        NAS-Port-Type = Wireless-802.11
 
        Connect-Info = "CONNECT 11Mbps 802.11b"
 
        EAP-Message = 0x021600061500
 
        State = 0x10aabdcc7ef9ba295475b0706b6e070c
 
        Message-Authenticator = 0xa07cb0441d0e9d898030c912f9ae54d3
 
  Processing the authorize section of radiusd.conf
 
modcall: entering group authorize for request 10
 
  modcall[authorize]: module "preprocess" returns ok for request 10
 
  modcall[authorize]: module "chap" returns noop for request 10
 
  modcall[authorize]: module "mschap" returns noop for request 10
 
    rlm_realm: No '@' in User-Name = "bbb", looking up realm NULL
 
    rlm_realm: No such realm "NULL"
 
  modcall[authorize]: module "suffix" returns noop for request 10
 
  rlm_eap: EAP packet type response id 22 length 6
 
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
 
  modcall[authorize]: module "eap" returns updated for request 10
 
rlm_ldap: - authorize
 
rlm_ldap: performing user authorization for bbb
 
radius_xlat:  '(uid=bbb)'
 
radius_xlat:  'ou=radius,dc=bestgo,dc=aero'
 
rlm_ldap: ldap_get_conn: Checking Id: 0
 
rlm_ldap: ldap_get_conn: Got Id: 0
 
rlm_ldap: performing search in ou=radius,dc=bestgo,dc=aero, with filter (uid=bbb)
 
rlm_ldap: checking if remote access for bbb is allowed by uid
 
rlm_ldap: No default NMAS login sequence
 
rlm_ldap: looking for check items in directory...
 
rlm_ldap: Adding userPassword as User-Password == "1234"
 
rlm_ldap: looking for reply items in directory...
 
rlm_ldap: Adding radiusTunnelPrivateGroupId as Tunnel-Private-Group-Id:0 = "1"
 
rlm_ldap: Adding radiusTunnelMediumType as Tunnel-Medium-Type:0 = IPv4
 
rlm_ldap: Adding radiusTunnelType as Tunnel-Type:0 = GRE
 
rlm_ldap: user bbb authorized to use remote access
 
rlm_ldap: ldap_release_conn: Release Id: 0
 
  modcall[authorize]: module "ldap" returns ok for request 10
 
rlm_pap: Found existing Auth-Type, not changing it.
 
  modcall[authorize]: module "pap" returns noop for request 10
 
modcall: leaving group authorize (returns updated) for request 10
 
  rad_check_password:  Found Auth-Type EAP
 
auth: type "EAP"
 
  Processing the authenticate section of radiusd.conf
 
modcall: entering group authenticate for request 10
 
  rlm_eap: Request found, released from the list
 
  rlm_eap: EAP/ttls
 
  rlm_eap: processing type ttls
 
  rlm_eap_ttls: Authenticate
 
  rlm_eap_tls: processing TLS
 
rlm_eap_tls: Received EAP-TLS ACK message
 
  rlm_eap_tls: ack handshake is finished
 
  eaptls_verify returned 3 
 
  eaptls_process returned 3

Segmentation fault
   
  John

       
---------------------------------
 雅虎邮箱,您的终生邮箱!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20080520/e10b76e8/attachment.html>


More information about the Freeradius-Users mailing list