Unable to authenticate to Open Directory

Kerry Tobin kwtobin at wisc.edu
Mon Nov 3 14:44:45 CET 2008


Just for reference, here is a copy of the log when it works (without  
including a domain)...

Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /private/etc/raddb/proxy.conf
Config:   including file: /private/etc/raddb/clients.conf
Config:   including file: /private/etc/raddb/snmp.conf
Config:   including file: /private/etc/raddb/eap.conf
Config:   including file: /private/etc/raddb/sql.conf
main: prefix = "/"
main: localstatedir = "/private/var"
main: logdir = "/private/var/log/radius"
main: libdir = "//lib"
main: radacctdir = "/private/var/log/radius/radacct"
main: hostname_lookups = no
main: max_request_time = 30
main: cleanup_delay = 5
main: max_requests = 1024
main: delete_blocked_requests = 0
main: port = 0
main: allow_core_dumps = no
main: log_stripped_names = yes
main: log_file = "/private/var/log/radius/radius.log"
main: log_auth = yes
main: log_auth_badpass = no
main: log_auth_goodpass = no
main: pidfile = "/private/var/run/radiusd/radiusd.pid"
main: user = "(null)"
main: group = "(null)"
main: usercollide = no
main: lower_user = "no"
main: lower_pass = "no"
main: nospace_user = "no"
main: nospace_pass = "no"
main: checkrad = "//sbin/checkrad"
main: proxy_requests = yes
proxy: retry_delay = 5
proxy: retry_count = 3
proxy: synchronous = no
proxy: default_fallback = yes
proxy: dead_time = 120
proxy: post_proxy_authorize = no
proxy: wake_all_if_all_dead = no
security: max_attributes = 200
security: reject_delay = 1
security: status_server = no
main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Loaded exec
exec: wait = yes
exec: program = "(null)"
exec: input_pairs = "request"
exec: output_pairs = "(null)"
exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
pap: encryption_scheme = "crypt"
pap: auto_header = no
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
mschap: use_mppe = yes
mschap: require_encryption = no
mschap: require_strong = no
mschap: with_ntdomain_hack = yes
mschap: passwd = "(null)"
mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap)
Module: Loaded opendirectory
opendirectory: passwd = "(null)"
Module: Instantiated opendirectory (opendirectory)
Module: Loaded System
unix: cache = no
unix: passwd = "(null)"
unix: shadow = "(null)"
unix: group = "(null)"
unix: radwtmp = "/private/var/log/radius/radwtmp"
unix: usegroup = no
unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
eap: default_eap_type = "ttls"
eap: timer_expire = 60
eap: ignore_unknown_eap_types = no
eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type leap
gtc: challenge = "Password: "
gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
tls: rsa_key_exchange = no
tls: dh_key_exchange = yes
tls: rsa_key_length = 512
tls: dh_key_length = 512
tls: verify_depth = 0
tls: CA_path = "(null)"
tls: pem_file_type = yes
tls: private_key_file = "/etc/certificates/ 
directory.domain.wisc.edu.key"
tls: certificate_file = "/etc/certificates/ 
directory.domain.wisc.edu.crt"
tls: CA_file = "/etc/certificates/directory.domain.wisc.edu.chcrt"
tls: private_key_password = "somepassword"
tls: dh_file = "/private/etc/raddb/certs/dh"
tls: random_file = "/private/etc/raddb/certs/random"
tls: fragment_size = 1024
tls: include_length = yes
tls: check_crl = no
tls: check_cert_cn = "(null)"
tls: cipher_list = "(null)"
tls: check_cert_issuer = "(null)"
rlm_eap_tls: Loading the certificate file as a chain
rlm_eap: Loaded and initialized type tls
ttls: default_eap_type = "mschapv2"
ttls: copy_request_to_tunnel = no
ttls: use_tunneled_reply = no
rlm_eap: Loaded and initialized type ttls
peap: default_eap_type = "mschapv2"
peap: copy_request_to_tunnel = no
peap: use_tunneled_reply = no
peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
preprocess: huntgroups = "/private/etc/raddb/huntgroups"
preprocess: hints = "/private/etc/raddb/hints"
preprocess: with_ascend_hack = no
preprocess: ascend_channels_per_line = 23
preprocess: with_ntdomain_hack = no
preprocess: with_specialix_jetstream_hack = no
preprocess: with_cisco_vsa_hack = no
preprocess: with_alvarion_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
realm: format = "suffix"
realm: delimiter = "@"
realm: ignore_default = no
realm: ignore_null = no
Module: Instantiated realm (suffix)
realm: format = "prefix"
realm: delimiter = "\"
realm: ignore_default = no
realm: ignore_null = no
Module: Instantiated realm (DOMAIN)
Module: Loaded files
files: usersfile = "/private/etc/raddb/users"
files: acctusersfile = "/private/etc/raddb/acct_users"
files: preproxy_usersfile = "/private/etc/raddb/preproxy_users"
files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client- 
IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
detail: detailfile = "/private/var/log/radius/radacct/%{Client-IP- 
Address}/detail-%Y%m%d"
detail: detailperm = 384
detail: dirperm = 493
detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
radutmp: filename = "/private/var/log/radius/radutmp"
radutmp: username = "%{User-Name}"
radutmp: case_sensitive = yes
radutmp: check_with_nas = yes
radutmp: perm = 384
radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Module: Loaded SQL
sql: driver = "rlm_sql_sqlite"
sql: server = "localhost"
sql: port = ""
sql: login = "root"
sql: password = "rootpass"
sql: radius_db = "radius"
sql: nas_table = "nas"
sql: sqltrace = no
sql: sqltracefile = "/private/var/log/radius/sqltrace.sql"
sql: readclients = yes
sql: deletestalesessions = yes
sql: num_sql_socks = 5
sql: sql_user_name = "%{User-Name}"
sql: default_user_profile = ""
sql: query_on_not_found = no
sql: authorize_check_query = "SELECT id, UserName, Attribute, Value,  
op           FROM radcheck           WHERE Username = '%{SQL-User- 
Name}'           ORDER BY id"
sql: authorize_reply_query = "SELECT id, UserName, Attribute, Value,  
op           FROM radreply           WHERE Username = '%{SQL-User- 
Name}'           ORDER BY id"
sql: authorize_group_check_query = "SELECT  
radgroupcheck 
.id 
,radgroupcheck 
.GroupName 
,radgroupcheck.Attribute,radgroupcheck.Value,radgroupcheck.op  FROM  
radgroupcheck,usergroup WHERE usergroup.Username = '%{SQL-User-Name}'  
AND usergroup.GroupName = radgroupcheck.GroupName ORDER BY  
radgroupcheck.id"
sql: authorize_group_reply_query = "SELECT  
radgroupreply 
.id 
,radgroupreply 
.GroupName 
,radgroupreply.Attribute,radgroupreply.Value,radgroupreply.op  FROM  
radgroupreply,usergroup WHERE usergroup.Username = '%{SQL-User-Name}'  
AND usergroup.GroupName = radgroupreply.GroupName ORDER BY  
radgroupreply.id"
sql: accounting_onoff_query = "UPDATE radacct SET AcctStopTime='%S',  
AcctSessionTime=unix_timestamp('%S') - unix_timestamp(AcctStartTime),  
AcctTerminateCause='%{Acct-Terminate-Cause}', AcctStopDelay = '%{Acct- 
Delay-Time}' WHERE AcctSessionTime=0 AND AcctStopTime=0 AND  
NASIPAddress= '%{NAS-IP-Address}' AND AcctStartTime <= '%S'"
sql: accounting_update_query = "           UPDATE radacct            
SET              FramedIPAddress = '%{Framed-IP- 
Address}',              AcctSessionTime     = '%{Acct-Session- 
Time}',              AcctInputOctets     = '%{Acct-Input- 
Gigawords:-0}'  << 32 |                                    '%{Acct- 
Input-Octets:-0}',              AcctOutputOctets    = '%{Acct-Output- 
Gigawords:-0}' << 32 |                             '%{Acct-Output- 
Octets:-0}'           WHERE AcctSessionId = '%{Acct-Session- 
Id}'           AND UserName        = '%{SQL-User-Name}'           AND  
NASIPAddress    = '%{NAS-IP-Address}'"
sql: accounting_update_query_alt = "           INSERT INTO  
radacct             (AcctSessionId,    AcctUniqueId,       
UserName,              Realm,            NASIPAddress,       
NASPortId,              NASPortType,      AcctStartTime,      
AcctSessionTime,              AcctAuthentic,    ConnectInfo_start,  
AcctInputOctets,              AcctOutputOctets, CalledStationId,    
CallingStationId,              ServiceType,      FramedProtocol,     
FramedIPAddress,              AcctStartDelay,    
XAscendSessionSvrKey)           VALUES             ('%{Acct-Session- 
Id}', '%{Acct-Unique-Session-Id}',             '%{SQL-User- 
Name}',              '%{Realm}', '%{NAS-IP-Address}', '%{NAS- 
Port}',              '%{NAS-Port-Type}',               
DATE_SUB('%S',                       INTERVAL (%{Acct-Session-Time:-0}  
+   %{Acct-Delay-Time:-0}) SECOND),                       '%{Acct- 
Session-Time}',              '%{Acct-Authentic}', '',              '% 
{Acct-Input-Gigawords:-0}' << 32 |              '%{Acct-Input- 
Octets:-0}',              '%{Acct-Output-Gigawords:-0}' << 32  
|              '%{Acct-Output-Octets:-0}',              '%{Called- 
Station-Id}', '%{Calling-Station-Id}',              '%{Service-Type}',  
'%{Framed-Protocol}',              '%{Framed-IP- 
Address}',              '0', '%{X-Ascend-Session-Svr-Key}')"
sql: accounting_start_query = "           INSERT INTO  
radacct             (AcctSessionId,    AcctUniqueId,      
UserName,              Realm,            NASIPAddress,      
NASPortId,              NASPortType,      AcctStartTime,     
AcctStopTime,              AcctSessionTime,  AcctAuthentic,     
ConnectInfo_start,              ConnectInfo_stop, AcctInputOctets,   
AcctOutputOctets,              CalledStationId,  CallingStationId,  
AcctTerminateCause,              ServiceType,      FramedProtocol,    
FramedIPAddress,              AcctStartDelay,   AcctStopDelay,     
XAscendSessionSvrKey)           VALUES             ('%{Acct-Session- 
Id}', '%{Acct-Unique-Session-Id}',              '%{SQL-User- 
Name}',              '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '% 
{NAS-Port-Type}', '%S', '0',              '0', '%{Acct-Authentic}', '% 
{Connect-Info}',              '', '0', '0',              '%{Called- 
Station-Id}', '%{Calling-Station-Id}', '',              '%{Service- 
Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}',              '% 
{Acct-Delay-Time:-0}', '0', '%{X-Ascend-Session-Svr-Key}')"
sql: accounting_start_query_alt = "UPDATE radacct SET AcctStartTime =  
'%S', AcctStartDelay = '%{Acct-Delay-Time}', ConnectInfo_start = '% 
{Connect-Info}' WHERE AcctSessionId = '%{Acct-Session-Id}' AND  
UserName = '%{SQL-User-Name}' AND NASIPAddress = '%{NAS-IP-Address}'"
sql: accounting_stop_query = "           UPDATE radacct  
SET              AcctStopTime       = '%S',               
AcctSessionTime    = '%{Acct-Session-Time}',               
AcctInputOctets    = '%{Acct-Input-Gigawords:-0}' << 32  
|                                   '%{Acct-Input- 
Octets:-0}',              AcctOutputOctets   = '%{Acct-Output- 
Gigawords:-0}' << 32 |                                   '%{Acct- 
Output-Octets:-0}', AcctTerminateCause = '%{Acct-Terminate- 
Cause}',              AcctStopDelay      = '%{Acct-Delay- 
Time:-0}',              ConnectInfo_stop   = '%{Connect- 
Info}'           WHERE AcctSessionId   = '%{Acct-Session- 
Id}'           AND UserName          = '%{SQL-User-Name}'            
AND NASIPAddress      = '%{NAS-IP-Address}'"
sql: accounting_stop_query_alt = "           INSERT INTO  
radacct             (AcctSessionId, AcctUniqueId,  
UserName,              Realm, NASIPAddress, NASPortId,               
NASPortType, AcctStartTime, AcctStopTime,               
AcctSessionTime, AcctAuthentic, ConnectInfo_start,               
ConnectInfo_stop, AcctInputOctets, AcctOutputOctets,               
CalledStationId, CallingStationId, AcctTerminateCause,               
ServiceType, FramedProtocol, FramedIPAddress,               
AcctStartDelay, AcctStopDelay)           VALUES             ('%{Acct- 
Session-Id}', '%{Acct-Unique-Session-Id}',              '%{SQL-User- 
Name}',              '%{Realm}', '%{NAS-IP-Address}', '%{NAS- 
Port}',              '%{NAS-Port-Type}',               
DATE_SUB('%S',                  INTERVAL (%{Acct-Session-Time:-0}  
+                  %{Acct-Delay-Time:-0}) SECOND),              '%S',  
'%{Acct-Session-Time}', '%{Acct-Authentic}', '',              '% 
{Connect-Info}',              '%{Acct-Input-Gigawords:-0}' << 32  
|              '%{Acct-Input-Octets:-0}',              '%{Acct-Output- 
Gigawords:-0}' << 32 |              '%{Acct-Output- 
Octets:-0}',              '%{Called-Station-Id}', '%{Calling-Station- 
Id}',              '%{Acct-Terminate-Cause}',              '%{Service- 
Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}',               
'0', '%{Acct-Delay-Time:-0}')"
sql: group_membership_query = "SELECT GroupName FROM usergroup WHERE  
UserName='%{SQL-User-Name}'"
sql: connect_failure_retry_delay = 60
sql: simul_count_query = ""
sql: simul_verify_query = "SELECT RadAcctId, AcctSessionId,  
UserName,                                NASIPAddress, NASPortId,  
FramedIPAddress,                                CallingStationId,  
FramedProtocol                                FROM  
radacct                                WHERE UserName='%{SQL-User- 
Name}'                                AND AcctStopTime = 0"
sql: postauth_query = "INSERT into radpostauth (user, pass, reply,  
date) values ('%{User-Name}', '%{User-Password:-Chap-Password}', '% 
{reply:Packet-Type}', NOW())"
sql: safe-characters =  
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
rlm_sql (sql): Driver rlm_sql_sqlite (module rlm_sql_sqlite) loaded  
and linked
rlm_sql (sql): Attempting to connect to root at localhost:/radius
rlm_sql (sql): starting 0
rlm_sql (sql): Attempting to connect rlm_sql_sqlite #0
rlm_sql_sqlite: Opening sqlite database for #0
rlm_sql_sqlite: sqlite3_open() = 0
rlm_sql (sql): Connected new DB handle, #0
rlm_sql (sql): starting 1
rlm_sql (sql): Attempting to connect rlm_sql_sqlite #1
rlm_sql_sqlite: Opening sqlite database for #1
rlm_sql_sqlite: sqlite3_open() = 0
rlm_sql (sql): Connected new DB handle, #1
rlm_sql (sql): starting 2
rlm_sql (sql): Attempting to connect rlm_sql_sqlite #2
rlm_sql_sqlite: Opening sqlite database for #2
rlm_sql_sqlite: sqlite3_open() = 0
rlm_sql (sql): Connected new DB handle, #2
rlm_sql (sql): starting 3
rlm_sql (sql): Attempting to connect rlm_sql_sqlite #3
rlm_sql_sqlite: Opening sqlite database for #3
rlm_sql_sqlite: sqlite3_open() = 0
rlm_sql (sql): Connected new DB handle, #3
rlm_sql (sql): starting 4
rlm_sql (sql): Attempting to connect rlm_sql_sqlite #4
rlm_sql_sqlite: Opening sqlite database for #4
rlm_sql_sqlite: sqlite3_open() = 0
rlm_sql (sql): Connected new DB handle, #4
rlm_sql (sql): - generate_sql_clients
rlm_sql (sql): Query: SELECT * FROM nas
rlm_sql (sql): Reserving sql socket id: 4
rlm_sql_sqlite: sqlite3_prepare() = 0
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.7,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.7 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.5,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.5 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.6,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.6 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.7,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.7 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.8,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.8 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.9,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.9 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.10,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.10 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.11,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.11 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.12,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.12 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.13,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.13 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.17,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.17 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.5,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.5 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.6,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.6 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.8,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.8 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.9,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.9 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.10,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.10 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.11,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.11 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.12,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.12 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.13,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.13 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.15,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.15 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.16,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.16 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.17,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.17 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.18,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.18 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.19,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.19 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.20,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.20 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.21,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.21 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.14,shortname=DomainWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.14 (DomainWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 101
rlm_sql_sqlite: sqlite3_finalize() = 0
rlm_sql (sql): Released sql socket id: 4
Module: Instantiated sql (sql)
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=150,  
length=123
	User-Name = "testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x21a70099d67ed895b6d58202f8cf33b8
	EAP-Message = 0x0202000c016b77746f62696e
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 25057
	NAS-IP-Address = 10.0.1.18
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
  modcall[authorize]: module "preprocess" returns ok for request 0
  modcall[authorize]: module "chap" returns noop for request 0
  modcall[authorize]: module "mschap" returns noop for request 0
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 0
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 0
  rlm_eap: EAP packet type response id 2 length 12
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 0
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 0
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 0
modcall: leaving group authorize (returns updated) for request 0
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 0
modcall: leaving group authenticate (returns handled) for request 0
Sending Access-Challenge of id 150 to 10.0.1.18 port 1645
	EAP-Message = 0x010300061520
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4a2a0a2e5a86cf597090ff098e667925
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=151,  
length=135
	User-Name = "testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x6e8db458b814fef228cdbb484d169e43
	EAP-Message = 0x020300060319
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 25057
	State = 0x4a2a0a2e5a86cf597090ff098e667925
	NAS-IP-Address = 10.0.1.18
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
  modcall[authorize]: module "preprocess" returns ok for request 1
  modcall[authorize]: module "chap" returns noop for request 1
  modcall[authorize]: module "mschap" returns noop for request 1
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 1
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 1
  rlm_eap: EAP packet type response id 3 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 1
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 1
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 1
modcall: leaving group authorize (returns updated) for request 1
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
  rlm_eap: Request found, released from the list
  rlm_eap: EAP NAK
rlm_eap: EAP-NAK asked for EAP-Type/peap
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 1
modcall: leaving group authenticate (returns handled) for request 1
Sending Access-Challenge of id 151 to 10.0.1.18 port 1645
	EAP-Message = 0x010400061920
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x591c749deb8d973b0b860c325be1e762
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=152,  
length=247
	User-Name = "testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0xfe9b3bd973921b51a3919768a9544a99
	EAP-Message =  
0x0204007619800000006c1603010067010000630301490b0b124aaaaa38210b473f8640fc3cf6510a59c107fa80e45e729c84601032000018002f00350005000ac009c00ac013c0140032003800130004010000220000000c000a0000076b77746f62696e000a00080006001700180019000b00020100
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 25057
	State = 0x591c749deb8d973b0b860c325be1e762
	NAS-IP-Address = 10.0.1.18
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
  modcall[authorize]: module "preprocess" returns ok for request 2
  modcall[authorize]: module "chap" returns noop for request 2
  modcall[authorize]: module "mschap" returns noop for request 2
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 2
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 2
  rlm_eap: EAP packet type response id 4 length 118
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 2
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 2
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 2
modcall: leaving group authorize (returns updated) for request 2
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
    (other): before/accept initialization
    TLS_accept: before/accept initialization
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0067], ClientHello
    TLS_accept: SSLv3 read client hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
    TLS_accept: SSLv3 write server hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0652], Certificate
    TLS_accept: SSLv3 write certificate A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
    TLS_accept: SSLv3 write server done A
    TLS_accept: SSLv3 flush data
    TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 2
modcall: leaving group authenticate (returns handled) for request 2
Sending Access-Challenge of id 152 to 10.0.1.18 port 1645
	EAP-Message =  
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
	EAP-Message =  
0x0b30090603550406130255533112301006035504081309576973636f6e73696e3110300e060355040713074d616469736f6e31283026060355040a131f556e6976657273697479206f6620576973636f6e73696e2d4d616469736f6e31233021060355040b131a4465706172746d656e74206f662042696f6368656d6973747279312330210603550403131a6469726563746f72792e62696f6368656d2e776973632e65647530819f300d06092a864886f70d010101050003818d0030818902818100cca2a234e44460f5581769f32d3db1c9c6a392606f399af6949cf226a89ba21bed5eb7a8232c984d62b482798bccda8c7167b5c94610adab12c3
	EAP-Message =  
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
	EAP-Message =  
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
	EAP-Message = 0x20417574686f72697479301e170d3938303832323136
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4481a86ff249a39acb99677008e7640c
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=153,  
length=135
	User-Name = "testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x300263e09617853187428735b5f0a7a4
	EAP-Message = 0x020500061900
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 25057
	State = 0x4481a86ff249a39acb99677008e7640c
	NAS-IP-Address = 10.0.1.18
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
  modcall[authorize]: module "preprocess" returns ok for request 3
  modcall[authorize]: module "chap" returns noop for request 3
  modcall[authorize]: module "mschap" returns noop for request 3
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 3
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 3
  rlm_eap: EAP packet type response id 5 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 3
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 3
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 3
modcall: leaving group authorize (returns updated) for request 3
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 3
modcall: leaving group authenticate (returns handled) for request 3
Sending Access-Challenge of id 153 to 10.0.1.18 port 1645
	EAP-Message =  
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
	EAP-Message =  
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
	EAP-Message =  
0x0101ff301a06092a864886f67d074100040d300b1b0556332e3063030206c0300d06092a864886f70d01010505000381810058ce29eafcf7deb5ce02b917b585d1b9e3e095cc25310d00a6926e7fb692639e5095d19a6fe411de63856e98eea8ff5ac8d355b2667157dec021eb3d2aa72349010486427bfcee7fa21652b56767d340db3b2658b228773dae147761d6fa2a6627a00dfaa7735cea70f1942165445ffafcef2968a9a28779ef79ef4fac07773816030100040e000000
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x5d94317e82482ee07e077c7a806d4655
Finished request 3
Going to the next request
--- Walking the entire request list ---
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=154,  
length=337
	User-Name = "testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x7e2872804be87cb5c24fe79702856c86
	EAP-Message =  
0x020600d01980000000c6160301008610000082008076d2ab064c7dfbc8fe01377fc52003057f9f35f5e1684cda34a84aa202c7d19fa6def52cddec20eaf610dcb432ba43d6c34dd785d060bbc2387ff4356b4ebc9e63fdd8015132e4c823109a05f0cdf064cd8b84f3c3a98c7ff9ed6190d305d46a4bf84bca1c4853beade13b5ebf7498b6e32c6de431da31203f960fcd0cce91741403010001011603010030a023c37a60d970f43574b78b177863fa654636bad6554c5958b52df7a2716d17f111a049f8f61040a9aecfb1f01025f3
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 25057
	State = 0x5d94317e82482ee07e077c7a806d4655
	NAS-IP-Address = 10.0.1.18
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
  modcall[authorize]: module "preprocess" returns ok for request 4
  modcall[authorize]: module "chap" returns noop for request 4
  modcall[authorize]: module "mschap" returns noop for request 4
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 4
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 4
  rlm_eap: EAP packet type response id 6 length 208
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 4
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 4
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 4
modcall: leaving group authorize (returns updated) for request 4
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
    TLS_accept: SSLv3 read client key exchange A
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 read finished A
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
    TLS_accept: SSLv3 write change cipher spec A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 write finished A
    TLS_accept: SSLv3 flush data
    (other): SSL negotiation finished successfully
SSL Connection Established
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 4
modcall: leaving group authenticate (returns handled) for request 4
Sending Access-Challenge of id 154 to 10.0.1.18 port 1645
	EAP-Message =  
0x01070041190014030100010116030100308f4e0a54a4e126298fe8c058330f25b8b731580ee4057fc1674d10b8afaf62959fc9114339a9505d8684e14f6b9fab2f
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xb061ad88ae044e6291277650b7657920
Finished request 4
Going to the next request
Waking up in 5 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 150 with timestamp 490b0b0f
Cleaning up request 1 ID 151 with timestamp 490b0b0f
Cleaning up request 2 ID 152 with timestamp 490b0b0f
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 3 ID 153 with timestamp 490b0b10
Cleaning up request 4 ID 154 with timestamp 490b0b10
Nothing to do.  Sleeping until we see a request.
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=155,  
length=135
	User-Name = "testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0xed4dd7ada864c069682d62e4c66ff599
	EAP-Message = 0x020700061900
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 25057
	State = 0xb061ad88ae044e6291277650b7657920
	NAS-IP-Address = 10.0.1.18
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "chap" returns noop for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 5
  rlm_eap: EAP packet type response id 7 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 5
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 5
modcall: leaving group authorize (returns updated) for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3
  eaptls_process returned 3
  rlm_eap_peap: EAPTLS_SUCCESS
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
Sending Access-Challenge of id 155 to 10.0.1.18 port 1645
	EAP-Message =  
0x0108002b19001703010020b4352c9800616cfdf05642f275727036c70820cfd76a8acb862937e3451bc166
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x495a2a86b4a66263e9ac633eb6a300f1
Finished request 5
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=156,  
length=172
	User-Name = "testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x8da931deaef5a23772da110067910fba
	EAP-Message =  
0x0208002b19001703010020d6d53eb955487c8c34f6727e49477111cd1d6bfd26f2009ebe3fa20478345ee8
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 25057
	State = 0x495a2a86b4a66263e9ac633eb6a300f1
	NAS-IP-Address = 10.0.1.18
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "chap" returns noop for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 6
  rlm_eap: EAP packet type response id 8 length 43
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 6
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - testuser
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
	EAP-Message = 0x0208000c016b77746f62696e
  PEAP: Got tunneled identity of testuser
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to testuser
  PEAP: Sending tunneled request
	EAP-Message = 0x0208000c016b77746f62696e
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "testuser"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "chap" returns noop for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 6
  rlm_eap: EAP packet type response id 8 length 12
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 6
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 127.0.0.1 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: EAP Identity
  rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
  PEAP: Got tunneled reply RADIUS code 11
	EAP-Message =  
0x010900211a0109001c103f2d9656bb43c33d8482d9678ce3a4836b77746f62696e
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x7451159cd4fc6d6145041f37015cb62a
  PEAP: Processing from tunneled session code 0x3cfb10 11
	EAP-Message =  
0x010900211a0109001c103f2d9656bb43c33d8482d9678ce3a4836b77746f62696e
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x7451159cd4fc6d6145041f37015cb62a
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
Sending Access-Challenge of id 156 to 10.0.1.18 port 1645
	EAP-Message =  
0x0109004b190017030100400becdb075ca506f4c7a8b1f6ef169639bbf89df30e6dfcb409cf185bae6c163aa8c17da4e7f9fe5f27b3df78233e556b9a6aab83a548ab9c64a988653c8fd0c5
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x08c676252f67b7cf64a343e62ed932f0
Finished request 6
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=157,  
length=236
	User-Name = "testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x31c1a65ee1f701ce20a9e3ad53505fec
	EAP-Message =  
0x0209006b190017030100609b4e7a540cbfbde54f7d8911273d4af32fb066522788be221fb4c9972784310c90425251130fac2a277ec4dacfa3d912036e54a01cba805f4b8c590a6a3fc8041623368987eab3d2bcc10e079c9e1958263e1178b0d8e2aecb2001f30b293c9e
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 25057
	State = 0x08c676252f67b7cf64a343e62ed932f0
	NAS-IP-Address = 10.0.1.18
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "chap" returns noop for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 7
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 7
  rlm_eap: EAP packet type response id 9 length 107
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 7
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
	EAP-Message =  
0x020900421a0209003d311d8a59247ccad005f9e47537587d898700000000000000004300be800e43b82cd1989672cf3c1edf846c6d969689a0e9006b77746f62696e
  PEAP: Setting User-Name to testuser
  PEAP: Adding old state with 74 51
  PEAP: Sending tunneled request
	EAP-Message =  
0x020900421a0209003d311d8a59247ccad005f9e47537587d898700000000000000004300be800e43b82cd1989672cf3c1edf846c6d969689a0e9006b77746f62696e
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "testuser"
	State = 0x7451159cd4fc6d6145041f37015cb62a
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "chap" returns noop for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 7
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 7
  rlm_eap: EAP packet type response id 9 length 66
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 7
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 127.0.0.1 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 7
  rlm_mschap: No User-Password configured.  Cannot create LM-Password.
  rlm_mschap: No User-Password configured.  Cannot create NT-Password.
  rlm_mschap: Told to do MS-CHAPv2 for testuser with NT-Password
  rlm_mschap: No NT-Password configured. Trying DirectoryService  
Authentication.
?rlm_mschap:username_string = testuser, shortUserName=testuser (length  
= 7)
?rlm_mschap: stepbuf server challenge:?
3f2d9656bb43c33d8482d9678ce3a483
?rlm_mschap: stepbuf peer challenge:??
1d8a59247ccad005f9e47537587d8987
?rlm_mschap stepbuf p24:??
4300be800e43b82cd1989672cf3c1edf846c6d969689a0e9
rlm_mschap: dsDoDirNodeAuth returns stepbuff:  
S=DB62FA32A5AF20F567740F16CE228D01B89521CB (len=66)
  modcall[authenticate]: module "mschap" returns ok for request 7
modcall: leaving group MS-CHAP (returns ok) for request 7
MSCHAP Success
  modcall[authenticate]: module "eap" returns handled for request 7
modcall: leaving group authenticate (returns handled) for request 7
  PEAP: Got tunneled reply RADIUS code 11
	MS-CHAP2-Success =  
0x09533d44423632464133324135414632304635363737343046313643453232384430314238393532314342000000102c3d0007000000d9040701d40407010000000000d881
	EAP-Message =  
0x010a00331a0309002e533d44423632464133324135414632304635363737343046313643453232384430314238393532314342
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6cb06a5aa4c91ddfcdae1d8189c2fcbb
  PEAP: Processing from tunneled session code 0x3d27d0 11
	MS-CHAP2-Success =  
0x09533d44423632464133324135414632304635363737343046313643453232384430314238393532314342000000102c3d0007000000d9040701d40407010000000000d881
	EAP-Message =  
0x010a00331a0309002e533d44423632464133324135414632304635363737343046313643453232384430314238393532314342
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6cb06a5aa4c91ddfcdae1d8189c2fcbb
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 7
modcall: leaving group authenticate (returns handled) for request 7
Sending Access-Challenge of id 157 to 10.0.1.18 port 1645
	EAP-Message =  
0x010a005b19001703010050be148087de289c86c93160779f7f6be95172100fc8f4edd137fa1b566732ffb2c3a926a2c8f17d5a9e6e42e22d0a6cd48d67cec692aa245282e5bf5920a5c7080b11928d54a09a1a1a6bb26bb9595e4a
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x38a8a1783e50d956e286c47ecdc1b7d1
Finished request 7
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=158,  
length=172
	User-Name = "testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x1bb337b5caa1f7333e459d2b33b4291f
	EAP-Message =  
0x020a002b19001703010020204036769ed5dbe464e3334da06804a15a469833fba472047c60a28bf037eb91
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 25057
	State = 0x38a8a1783e50d956e286c47ecdc1b7d1
	NAS-IP-Address = 10.0.1.18
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
  modcall[authorize]: module "preprocess" returns ok for request 8
  modcall[authorize]: module "chap" returns noop for request 8
  modcall[authorize]: module "mschap" returns noop for request 8
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 8
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 8
  rlm_eap: EAP packet type response id 10 length 43
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 8
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 8
modcall: leaving group authorize (returns updated) for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
	EAP-Message = 0x020a00061a03
  PEAP: Setting User-Name to testuser
  PEAP: Adding old state with 6c b0
  PEAP: Sending tunneled request
	EAP-Message = 0x020a00061a03
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "testuser"
	State = 0x6cb06a5aa4c91ddfcdae1d8189c2fcbb
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
  modcall[authorize]: module "preprocess" returns ok for request 8
  modcall[authorize]: module "chap" returns noop for request 8
  modcall[authorize]: module "mschap" returns noop for request 8
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 8
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 8
  rlm_eap: EAP packet type response id 10 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 8
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 8
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 127.0.0.1 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 8
modcall: leaving group authorize (returns updated) for request 8
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns ok for request 8
modcall: leaving group authenticate (returns ok) for request 8
Login OK: [testuser] (from client localhost port 0)
  PEAP: Got tunneled reply RADIUS code 2
	EAP-Message = 0x030a0004
	Message-Authenticator = 0x00000000000000000000000000000000
	User-Name = "testuser"
  PEAP: Processing from tunneled session code 0x3d0790 2
	EAP-Message = 0x030a0004
	Message-Authenticator = 0x00000000000000000000000000000000
	User-Name = "testuser"
  PEAP: Tunneled authentication was successful.
  rlm_eap_peap: SUCCESS
  modcall[authenticate]: module "eap" returns handled for request 8
modcall: leaving group authenticate (returns handled) for request 8
Sending Access-Challenge of id 158 to 10.0.1.18 port 1645
	EAP-Message =  
0x010b002b19001703010020fc461ad563c5f166e5e7949ec4b5663c719cbcebd2a71c694eafd473ea4c04be
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xd259d1069cc2d2bee25600aa1139b2c9
Finished request 8
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=159,  
length=172
	User-Name = "testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x6c710ad694578ce636eb66fca6ef90c8
	EAP-Message =  
0x020b002b19001703010020e4d27f5ec66f0babcfba34fefe7ec5f1b979d4e86701aa0e70e5218d27883366
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 25057
	State = 0xd259d1069cc2d2bee25600aa1139b2c9
	NAS-IP-Address = 10.0.1.18
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 9
  modcall[authorize]: module "preprocess" returns ok for request 9
  modcall[authorize]: module "chap" returns noop for request 9
  modcall[authorize]: module "mschap" returns noop for request 9
    rlm_realm: No '@' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 9
    rlm_realm: No '\' in User-Name = "testuser", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "DOMAIN" returns noop for request 9
  rlm_eap: EAP packet type response id 11 length 43
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 9
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 9
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
  modcall[authorize]: module "opendirectory" returns ok for request 9
modcall: leaving group authorize (returns updated) for request 9
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 9
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap: Success
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns ok for request 9
modcall: leaving group authenticate (returns ok) for request 9
Login OK: [testuser] (from client DomainWireless port 25057 cli 001f. 
5bbe.f006)
Sending Access-Accept of id 159 to 10.0.1.18 port 1645
	MS-MPPE-Recv-Key =  
0x2b4538f01f984b67a1f7663d4ed1de76f2378883e9bc80f1d52edc595071fa42
	MS-MPPE-Send-Key =  
0x704ed16dcbe365fb60a510bf5c5bf1419e7feb27e49d36ea8e1c75b06708c78c
	EAP-Message = 0x030b0004
	Message-Authenticator = 0x00000000000000000000000000000000
	User-Name = "testuser"
Finished request 9
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Cleaning up request 5 ID 155 with timestamp 490b0b17
Cleaning up request 6 ID 156 with timestamp 490b0b17
Cleaning up request 7 ID 157 with timestamp 490b0b17
Cleaning up request 8 ID 158 with timestamp 490b0b17
Cleaning up request 9 ID 159 with timestamp 490b0b17
Nothing to do.  Sleeping until we see a request.

Kerry Tobin

>
>
> Message: 1
> Date: Thu, 30 Oct 2008 15:14:02 +0100
> From: <tnt at kalik.net>
> Subject: Re: Freeradius-Users Digest, Vol 42, Issue 169
> To: "FreeRadius users mailing list"
> 	<freeradius-users at lists.freeradius.org>
> Message-ID: <6pV6Kdh8.1225376042.7408230.tnt at kalik.net>
> Content-Type: text/plain; charset=ISO-8859-2
>
>> rlm_mschap: NT Domain delimeter found, should we have enabled
>> with_ntdomain_hack
>
> You need to enable with_ntdomain_hack in mschap module. ntdomain realm
> works for pap requests.
>
> Ivan Kalik
> Kalik Informatika ISP



More information about the Freeradius-Users mailing list