Freeradius-Users Digest, Vol 42, Issue 169

Kerry Tobin kwtobin at wisc.edu
Thu Oct 30 14:21:19 CET 2008


Here is a debug example (should be sanitized) for an authentication  
that didn't work.

Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /private/etc/raddb/proxy.conf
Config:   including file: /private/etc/raddb/clients.conf
Config:   including file: /private/etc/raddb/snmp.conf
Config:   including file: /private/etc/raddb/eap.conf
Config:   including file: /private/etc/raddb/sql.conf
  main: prefix = "/"
  main: localstatedir = "/private/var"
  main: logdir = "/private/var/log/radius"
  main: libdir = "//lib"
  main: radacctdir = "/private/var/log/radius/radacct"
  main: hostname_lookups = no
  main: max_request_time = 30
  main: cleanup_delay = 5
  main: max_requests = 1024
  main: delete_blocked_requests = 0
  main: port = 0
  main: allow_core_dumps = no
  main: log_stripped_names = yes
  main: log_file = "/private/var/log/radius/radius.log"
  main: log_auth = yes
  main: log_auth_badpass = no
  main: log_auth_goodpass = no
  main: pidfile = "/private/var/run/radiusd/radiusd.pid"
  main: user = "(null)"
  main: group = "(null)"
  main: usercollide = no
  main: lower_user = "no"
  main: lower_pass = "no"
  main: nospace_user = "no"
  main: nospace_pass = "no"
  main: checkrad = "//sbin/checkrad"
  main: proxy_requests = yes
  proxy: retry_delay = 5
  proxy: retry_count = 3
  proxy: synchronous = no
  proxy: default_fallback = yes
  proxy: dead_time = 120
  proxy: post_proxy_authorize = no
  proxy: wake_all_if_all_dead = no
  security: max_attributes = 200
  security: reject_delay = 1
  security: status_server = no
  main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Loaded exec
  exec: wait = yes
  exec: program = "(null)"
  exec: input_pairs = "request"
  exec: output_pairs = "(null)"
  exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
  pap: encryption_scheme = "crypt"
  pap: auto_header = no
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
  mschap: use_mppe = yes
  mschap: require_encryption = no
  mschap: require_strong = no
  mschap: with_ntdomain_hack = no
  mschap: passwd = "(null)"
  mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap)
Module: Loaded opendirectory
  opendirectory: passwd = "(null)"
Module: Instantiated opendirectory (opendirectory)
Module: Loaded System
  unix: cache = no
  unix: passwd = "(null)"
  unix: shadow = "(null)"
  unix: group = "(null)"
  unix: radwtmp = "/private/var/log/radius/radwtmp"
  unix: usegroup = no
  unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
  eap: default_eap_type = "ttls"
  eap: timer_expire = 60
  eap: ignore_unknown_eap_types = no
  eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type leap
  gtc: challenge = "Password: "
  gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
  tls: rsa_key_exchange = no
  tls: dh_key_exchange = yes
  tls: rsa_key_length = 512
  tls: dh_key_length = 512
  tls: verify_depth = 0
  tls: CA_path = "(null)"
  tls: pem_file_type = yes
  tls: private_key_file = "/etc/certificates/ 
directory.DOMAIN.wisc.edu.key"
  tls: certificate_file = "/etc/certificates/ 
directory.DOMAIN.wisc.edu.crt"
  tls: CA_file = "/etc/certificates/directory.DOMAIN.wisc.edu.chcrt"
  tls: private_key_password = "135a*res$ij-Z#Kq&uf%SDc$x"
  tls: dh_file = "/private/etc/raddb/certs/dh"
  tls: random_file = "/private/etc/raddb/certs/random"
  tls: fragment_size = 1024
  tls: include_length = yes
  tls: check_crl = no
  tls: check_cert_cn = "(null)"
  tls: cipher_list = "(null)"
  tls: check_cert_issuer = "(null)"
rlm_eap_tls: Loading the certificate file as a chain
rlm_eap: Loaded and initialized type tls
  ttls: default_eap_type = "mschapv2"
  ttls: copy_request_to_tunnel = no
  ttls: use_tunneled_reply = no
rlm_eap: Loaded and initialized type ttls
  peap: default_eap_type = "mschapv2"
  peap: copy_request_to_tunnel = no
  peap: use_tunneled_reply = no
  peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
  mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
  preprocess: huntgroups = "/private/etc/raddb/huntgroups"
  preprocess: hints = "/private/etc/raddb/hints"
  preprocess: with_ascend_hack = no
  preprocess: ascend_channels_per_line = 23
  preprocess: with_ntdomain_hack = no
  preprocess: with_specialix_jetstream_hack = no
  preprocess: with_cisco_vsa_hack = no
  preprocess: with_alvarion_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
  realm: format = "suffix"
  realm: delimiter = "@"
  realm: ignore_default = no
  realm: ignore_null = no
Module: Instantiated realm (suffix)
  realm: format = "prefix"
  realm: delimiter = "\"
  realm: ignore_default = no
  realm: ignore_null = no
Module: Instantiated realm (DOMAIN)
Module: Loaded files
  files: usersfile = "/private/etc/raddb/users"
  files: acctusersfile = "/private/etc/raddb/acct_users"
  files: preproxy_usersfile = "/private/etc/raddb/preproxy_users"
  files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
  acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address,  
Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
  detail: detailfile = "/private/var/log/radius/radacct/%{Client-IP- 
Address}/detail-%Y%m%d"
  detail: detailperm = 384
  detail: dirperm = 493
  detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
  radutmp: filename = "/private/var/log/radius/radutmp"
  radutmp: username = "%{User-Name}"
  radutmp: case_sensitive = yes
  radutmp: check_with_nas = yes
  radutmp: perm = 384
  radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Module: Loaded SQL
  sql: driver = "rlm_sql_sqlite"
  sql: server = "localhost"
  sql: port = ""
  sql: login = "root"
  sql: password = "rootpass"
  sql: radius_db = "radius"
  sql: nas_table = "nas"
  sql: sqltrace = no
  sql: sqltracefile = "/private/var/log/radius/sqltrace.sql"
  sql: readclients = yes
  sql: deletestalesessions = yes
  sql: num_sql_socks = 5
  sql: sql_user_name = "%{User-Name}"
  sql: default_user_profile = ""
  sql: query_on_not_found = no
  sql: authorize_check_query = "SELECT id, UserName, Attribute, Value,  
op           FROM radcheck           WHERE Username = '%{SQL-User- 
Name}'           ORDER BY id"
  sql: authorize_reply_query = "SELECT id, UserName, Attribute, Value,  
op           FROM radreply           WHERE Username = '%{SQL-User- 
Name}'           ORDER BY id"
  sql: authorize_group_check_query = "SELECT  
radgroupcheck 
.id 
,radgroupcheck 
.GroupName 
,radgroupcheck.Attribute,radgroupcheck.Value,radgroupcheck.op  FROM  
radgroupcheck,usergroup WHERE usergroup.Username = '%{SQL-User-Name}'  
AND usergroup.GroupName = radgroupcheck.GroupName ORDER BY  
radgroupcheck.id"
  sql: authorize_group_reply_query = "SELECT  
radgroupreply 
.id 
,radgroupreply 
.GroupName 
,radgroupreply.Attribute,radgroupreply.Value,radgroupreply.op  FROM  
radgroupreply,usergroup WHERE usergroup.Username = '%{SQL-User-Name}'  
AND usergroup.GroupName = radgroupreply.GroupName ORDER BY  
radgroupreply.id"
  sql: accounting_onoff_query = "UPDATE radacct SET AcctStopTime='%S',  
AcctSessionTime=unix_timestamp('%S') - unix_timestamp(AcctStartTime),  
AcctTerminateCause='%{Acct-Terminate-Cause}', AcctStopDelay = '%{Acct- 
Delay-Time}' WHERE AcctSessionTime=0 AND AcctStopTime=0 AND  
NASIPAddress= '%{NAS-IP-Address}' AND AcctStartTime <= '%S'"
  sql: accounting_update_query = "           UPDATE radacct            
SET              FramedIPAddress = '%{Framed-IP- 
Address}',              AcctSessionTime     = '%{Acct-Session- 
Time}',              AcctInputOctets     = '%{Acct-Input- 
Gigawords:-0}'  << 32 |                                    '%{Acct- 
Input-Octets:-0}',              AcctOutputOctets    = '%{Acct-Output- 
Gigawords:-0}' << 32 |                                    '%{Acct- 
Output-Octets:-0}'           WHERE AcctSessionId = '%{Acct-Session- 
Id}'           AND UserName        = '%{SQL-User-Name}'           AND  
NASIPAddress    = '%{NAS-IP-Address}'"
  sql: accounting_update_query_alt = "           INSERT INTO  
radacct             (AcctSessionId,    AcctUniqueId,       
UserName,              Realm,            NASIPAddress,       
NASPortId,              NASPortType,      AcctStartTime,      
AcctSessionTime,              AcctAuthentic,    ConnectInfo_start,  
AcctInputOctets,              AcctOutputOctets, CalledStationId,    
CallingStationId,              ServiceType,      FramedProtocol,     
FramedIPAddress,              AcctStartDelay,    
XAscendSessionSvrKey)           VALUES             ('%{Acct-Session- 
Id}', '%{Acct-Unique-Session-Id}',              '%{SQL-User- 
Name}',              '%{Realm}', '%{NAS-IP-Address}', '%{NAS- 
Port}',              '%{NAS-Port-Type}',               
DATE_SUB('%S',                       INTERVAL (%{Acct-Session-Time:-0}  
+                                 %{Acct-Delay-Time:-0})  
SECOND),                       '%{Acct-Session-Time}',              '% 
{Acct-Authentic}', '',              '%{Acct-Input-Gigawords:-0}' << 32  
|              '%{Acct-Input-Octets:-0}',              '%{Acct-Output- 
Gigawords:-0}' << 32 |              '%{Acct-Output- 
Octets:-0}',              '%{Called-Station-Id}', '%{Calling-Station- 
Id}',              '%{Service-Type}', '%{Framed- 
Protocol}',              '%{Framed-IP-Address}',              '0', '% 
{X-Ascend-Session-Svr-Key}')"
  sql: accounting_start_query = "           INSERT INTO  
radacct             (AcctSessionId,    AcctUniqueId,      
UserName,              Realm,            NASIPAddress,      
NASPortId,              NASPortType,      AcctStartTime,     
AcctStopTime,              AcctSessionTime,  AcctAuthentic,     
ConnectInfo_start,              ConnectInfo_stop, AcctInputOctets,   
AcctOutputOctets,              CalledStationId,  CallingStationId,  
AcctTerminateCause,              ServiceType,      FramedProtocol,    
FramedIPAddress,              AcctStartDelay,   AcctStopDelay,     
XAscendSessionSvrKey)           VALUES             ('%{Acct-Session- 
Id}', '%{Acct-Unique-Session-Id}',              '%{SQL-User- 
Name}',              '%{Realm}', '%{NAS-IP-Address}', '%{NAS- 
Port}',              '%{NAS-Port-Type}', '%S', '0',              '0',  
'%{Acct-Authentic}', '%{Connect-Info}',              '', '0',  
'0',              '%{Called-Station-Id}', '%{Calling-Station-Id}',  
'',              '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP- 
Address}',              '%{Acct-Delay-Time:-0}', '0', '%{X-Ascend- 
Session-Svr-Key}')"
  sql: accounting_start_query_alt = "UPDATE radacct SET AcctStartTime  
= '%S', AcctStartDelay = '%{Acct-Delay-Time}', ConnectInfo_start = '% 
{Connect-Info}' WHERE AcctSessionId = '%{Acct-Session-Id}' AND  
UserName = '%{SQL-User-Name}' AND NASIPAddress = '%{NAS-IP-Address}'"
  sql: accounting_stop_query = "           UPDATE radacct  
SET              AcctStopTime       = '%S',               
AcctSessionTime    = '%{Acct-Session-Time}',               
AcctInputOctets    = '%{Acct-Input-Gigawords:-0}' << 32  
|                                   '%{Acct-Input- 
Octets:-0}',              AcctOutputOctets   = '%{Acct-Output- 
Gigawords:-0}' << 32 |                                   '%{Acct- 
Output-Octets:-0}',              AcctTerminateCause = '%{Acct- 
Terminate-Cause}',              AcctStopDelay      = '%{Acct-Delay- 
Time:-0}',              ConnectInfo_stop   = '%{Connect- 
Info}'           WHERE AcctSessionId   = '%{Acct-Session- 
Id}'           AND UserName          = '%{SQL-User-Name}'            
AND NASIPAddress      = '%{NAS-IP-Address}'"
  sql: accounting_stop_query_alt = "           INSERT INTO  
radacct             (AcctSessionId, AcctUniqueId,  
UserName,              Realm, NASIPAddress, NASPortId,               
NASPortType, AcctStartTime, AcctStopTime,               
AcctSessionTime, AcctAuthentic, ConnectInfo_start,               
ConnectInfo_stop, AcctInputOctets, AcctOutputOctets,               
CalledStationId, CallingStationId, AcctTerminateCause,               
ServiceType, FramedProtocol, FramedIPAddress,               
AcctStartDelay, AcctStopDelay)           VALUES             ('%{Acct- 
Session-Id}', '%{Acct-Unique-Session-Id}',              '%{SQL-User- 
Name}',              '%{Realm}', '%{NAS-IP-Address}', '%{NAS- 
Port}',              '%{NAS-Port-Type}',               
DATE_SUB('%S',                  INTERVAL (%{Acct-Session-Time:-0}  
+                  %{Acct-Delay-Time:-0}) SECOND),              '%S',  
'%{Acct-Session-Time}', '%{Acct-Authentic}', '',              '% 
{Connect-Info}',              '%{Acct-Input-Gigawords:-0}' << 32  
|              '%{Acct-Input-Octets:-0}',              '%{Acct-Output- 
Gigawords:-0}' << 32 |              '%{Acct-Output- 
Octets:-0}',              '%{Called-Station-Id}', '%{Calling-Station- 
Id}',              '%{Acct-Terminate-Cause}',              '%{Service- 
Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}',               
'0', '%{Acct-Delay-Time:-0}')"
  sql: group_membership_query = "SELECT GroupName FROM usergroup WHERE  
UserName='%{SQL-User-Name}'"
  sql: connect_failure_retry_delay = 60
  sql: simul_count_query = ""
  sql: simul_verify_query = "SELECT RadAcctId, AcctSessionId,  
UserName,                                NASIPAddress, NASPortId,  
FramedIPAddress,                                CallingStationId,  
FramedProtocol                                FROM  
radacct                                WHERE UserName='%{SQL-User- 
Name}'                                AND AcctStopTime = 0"
  sql: postauth_query = "INSERT into radpostauth (user, pass, reply,  
date) values ('%{User-Name}', '%{User-Password:-Chap-Password}', '% 
{reply:Packet-Type}', NOW())"
  sql: safe-characters =  
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
rlm_sql (sql): Driver rlm_sql_sqlite (module rlm_sql_sqlite) loaded  
and linked
rlm_sql (sql): Attempting to connect to root at localhost:/radius
rlm_sql (sql): starting 0
rlm_sql (sql): Attempting to connect rlm_sql_sqlite #0
rlm_sql_sqlite: Opening sqlite database for #0
rlm_sql_sqlite: sqlite3_open() = 0
rlm_sql (sql): Connected new DB handle, #0
rlm_sql (sql): starting 1
rlm_sql (sql): Attempting to connect rlm_sql_sqlite #1
rlm_sql_sqlite: Opening sqlite database for #1
rlm_sql_sqlite: sqlite3_open() = 0
rlm_sql (sql): Connected new DB handle, #1
rlm_sql (sql): starting 2
rlm_sql (sql): Attempting to connect rlm_sql_sqlite #2
rlm_sql_sqlite: Opening sqlite database for #2
rlm_sql_sqlite: sqlite3_open() = 0
rlm_sql (sql): Connected new DB handle, #2
rlm_sql (sql): starting 3
rlm_sql (sql): Attempting to connect rlm_sql_sqlite #3
rlm_sql_sqlite: Opening sqlite database for #3
rlm_sql_sqlite: sqlite3_open() = 0
rlm_sql (sql): Connected new DB handle, #3
rlm_sql (sql): starting 4
rlm_sql (sql): Attempting to connect rlm_sql_sqlite #4
rlm_sql_sqlite: Opening sqlite database for #4
rlm_sql_sqlite: sqlite3_open() = 0
rlm_sql (sql): Connected new DB handle, #4
rlm_sql (sql): - generate_sql_clients
rlm_sql (sql): Query: SELECT * FROM nas
rlm_sql (sql): Reserving sql socket id: 4
rlm_sql_sqlite: sqlite3_prepare() = 0
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.7,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.7 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.5,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.5 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.6,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.6 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.7,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.7 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.8,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.8 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.9,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.9 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.10,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.10 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.11,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.11 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.12,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.12 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.13,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.13 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.2.17,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.2.17 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.5,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.5 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.6,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.6 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.8,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.8 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.9,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.9 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.10,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.10 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.11,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.11 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.12,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.12 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.13,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.13 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.15,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.15 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.16,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.16 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.17,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.17 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.18,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.18 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.19,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.19 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.20,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.20 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.21,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.21 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 100
rlm_sql (sql): Read entry  
nasname=10.0.1.14,shortname=DOMAINWireless,secret=somesecret
rlm_sql (sql): Adding client 10.0.1.14 (DOMAINWireless) to clients list
rlm_sql_sqlite: sqlite3_step = 101
rlm_sql_sqlite: sqlite3_finalize() = 0
rlm_sql (sql): Released sql socket id: 4
Module: Instantiated sql (sql)
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=111,  
length=139
	User-Name = "DOMAIN\\testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x3872b3f61f7ac52e849a52979e0a74b8
	EAP-Message = 0x020200140142494f4348454d5c6b77746f62696e
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 11710
	NAS-IP-Address = 10.0.1.18
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
   modcall[authorize]: module "preprocess" returns ok for request 0
   modcall[authorize]: module "chap" returns noop for request 0
   modcall[authorize]: module "mschap" returns noop for request 0
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 0
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 0
   rlm_eap: EAP packet type response id 2 length 20
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 0
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 0
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 0
modcall: leaving group authorize (returns updated) for request 0
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
   rlm_eap: EAP Identity
   rlm_eap: processing type tls
   rlm_eap_tls: Initiate
   rlm_eap_tls: Start returned 1
   modcall[authenticate]: module "eap" returns handled for request 0
modcall: leaving group authenticate (returns handled) for request 0
Sending Access-Challenge of id 111 to 10.0.1.18 port 1645
	EAP-Message = 0x010300061520
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x1afaa77fee512c191c542a0d38deecdb
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=112,  
length=143
	User-Name = "DOMAIN\\testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x67fbf7c534cf8bfffe377a05ee735b87
	EAP-Message = 0x020300060319
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 11710
	State = 0x1afaa77fee512c191c542a0d38deecdb
	NAS-IP-Address = 10.0.1.18
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
   modcall[authorize]: module "preprocess" returns ok for request 1
   modcall[authorize]: module "chap" returns noop for request 1
   modcall[authorize]: module "mschap" returns noop for request 1
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 1
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 1
   rlm_eap: EAP packet type response id 3 length 6
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 1
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 1
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 1
modcall: leaving group authorize (returns updated) for request 1
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
   rlm_eap: Request found, released from the list
   rlm_eap: EAP NAK
  rlm_eap: EAP-NAK asked for EAP-Type/peap
   rlm_eap: processing type tls
   rlm_eap_tls: Initiate
   rlm_eap_tls: Start returned 1
   modcall[authenticate]: module "eap" returns handled for request 1
modcall: leaving group authenticate (returns handled) for request 1
Sending Access-Challenge of id 112 to 10.0.1.18 port 1645
	EAP-Message = 0x010400061920
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x213d9fea32566a03bf00145aa202ee95
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=113,  
length=263
	User-Name = "DOMAIN\\testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0xcaf5261f114b8a427301da998303f355
	EAP-Message =  
0x0204007e198000000074160301006f0100006b030148ee28a6353ef38a7357c1eb520b102f907c1c42da8e89adf612a0dab58a0311000018002f00350005000ac009c00ac013c01400320038001300040100002a00000014001200000f62696f6368656d5c6b77746f62696e000a00080006001700180019000b00020100
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 11710
	State = 0x213d9fea32566a03bf00145aa202ee95
	NAS-IP-Address = 10.0.1.18
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
   modcall[authorize]: module "preprocess" returns ok for request 2
   modcall[authorize]: module "chap" returns noop for request 2
   modcall[authorize]: module "mschap" returns noop for request 2
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 2
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 2
   rlm_eap: EAP packet type response id 4 length 126
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 2
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 2
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 2
modcall: leaving group authorize (returns updated) for request 2
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
   eaptls_verify returned 11
     (other): before/accept initialization
     TLS_accept: before/accept initialization
   rlm_eap_tls: <<< TLS 1.0 Handshake [length 006f], ClientHello
     TLS_accept: SSLv3 read client hello A
   rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
     TLS_accept: SSLv3 write server hello A
   rlm_eap_tls: >>> TLS 1.0 Handshake [length 0652], Certificate
     TLS_accept: SSLv3 write certificate A
   rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
     TLS_accept: SSLv3 write server done A
     TLS_accept: SSLv3 flush data
     TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
   eaptls_process returned 13
   rlm_eap_peap: EAPTLS_HANDLED
   modcall[authenticate]: module "eap" returns handled for request 2
modcall: leaving group authenticate (returns handled) for request 2
Sending Access-Challenge of id 113 to 10.0.1.18 port 1645
	EAP-Message =  
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
	EAP-Message =  
0x0b30090603550406130255533112301006035504081309576973636f6e73696e3110300e060355040713074d616469736f6e31283026060355040a131f556e6976657273697479206f6620576973636f6e73696e2d4d616469736f6e31233021060355040b131a4465706172746d656e74206f662042696f6368656d6973747279312330210603550403131a6469726563746f72792e62696f6368656d2e776973632e65647530819f300d06092a864886f70d010101050003818d0030818902818100cca2a234e44460f5581769f32d3db1c9c6a392606f399af6949cf226a89ba21bed5eb7a8232c984d62b482798bccda8c7167b5c94610adab12c3
	EAP-Message =  
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
	EAP-Message =  
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
	EAP-Message = 0x20417574686f72697479301e170d3938303832323136
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4fc9bff8a885a91d1d81c360abc301c8
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=114,  
length=143
	User-Name = "DOMAIN\\testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x9fe661434064a4c571b910b9ee4b071e
	EAP-Message = 0x020500061900
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 11710
	State = 0x4fc9bff8a885a91d1d81c360abc301c8
	NAS-IP-Address = 10.0.1.18
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
   modcall[authorize]: module "preprocess" returns ok for request 3
   modcall[authorize]: module "chap" returns noop for request 3
   modcall[authorize]: module "mschap" returns noop for request 3
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 3
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 3
   rlm_eap: EAP packet type response id 5 length 6
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 3
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 3
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 3
modcall: leaving group authorize (returns updated) for request 3
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
   rlm_eap_tls: ack handshake fragment handler
   eaptls_verify returned 1
   eaptls_process returned 13
   rlm_eap_peap: EAPTLS_HANDLED
   modcall[authenticate]: module "eap" returns handled for request 3
modcall: leaving group authenticate (returns handled) for request 3
Sending Access-Challenge of id 114 to 10.0.1.18 port 1645
	EAP-Message =  
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
	EAP-Message =  
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
	EAP-Message =  
0x0101ff301a06092a864886f67d074100040d300b1b0556332e3063030206c0300d06092a864886f70d01010505000381810058ce29eafcf7deb5ce02b917b585d1b9e3e095cc25310d00a6926e7fb692639e5095d19a6fe411de63856e98eea8ff5ac8d355b2667157dec021eb3d2aa72349010486427bfcee7fa21652b56767d340db3b2658b228773dae147761d6fa2a6627a00dfaa7735cea70f1942165445ffafcef2968a9a28779ef79ef4fac07773816030100040e000000
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xa0aad0c5eb884d3249945e643391a47d
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=115,  
length=345
	User-Name = "DOMAIN\\testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0xb8dadac61b8901eb220dba61d01750e3
	EAP-Message =  
0x020600d01980000000c61603010086100000820080597c1d11cc49a47c6c3ee78302bd41eee0e1323c3fc3840f9fe2dc48a457a019b9906d58621f0c5a874b1caf12c1a7ceea0857bd7522fef11b34665136d9eb1f8bacb11b4c4ef77d00599668698a365d225cffcf22aa6e169c3d11ca370ab08aab0a208f7e484cbfa734f3f978d9e111a782bd85406e8d5fdc3fd481f68caf371403010001011603010030ab1dfccc59cbc56427d043f0693f7f42fde9832d113038fee966cd63a0a7cd822200e3e15caecb94f28dbb3e40d8a3db
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 11710
	State = 0xa0aad0c5eb884d3249945e643391a47d
	NAS-IP-Address = 10.0.1.18
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
   modcall[authorize]: module "preprocess" returns ok for request 4
   modcall[authorize]: module "chap" returns noop for request 4
   modcall[authorize]: module "mschap" returns noop for request 4
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 4
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 4
   rlm_eap: EAP packet type response id 6 length 208
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 4
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 4
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 4
modcall: leaving group authorize (returns updated) for request 4
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
   eaptls_verify returned 11
   rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
     TLS_accept: SSLv3 read client key exchange A
   rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
   rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
     TLS_accept: SSLv3 read finished A
   rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
     TLS_accept: SSLv3 write change cipher spec A
   rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
     TLS_accept: SSLv3 write finished A
     TLS_accept: SSLv3 flush data
     (other): SSL negotiation finished successfully
SSL Connection Established
   eaptls_process returned 13
   rlm_eap_peap: EAPTLS_HANDLED
   modcall[authenticate]: module "eap" returns handled for request 4
modcall: leaving group authenticate (returns handled) for request 4
Sending Access-Challenge of id 115 to 10.0.1.18 port 1645
	EAP-Message =  
0x01070041190014030100010116030100303c15e3a238727d4976ae66e07ca837f4e9d2ef10993d36c683d53629e171c9a15bf79a9bc8a7d0516b347176e27fb31c
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6e85d2d72db4ae8cb56d58cfe9e7d6d1
Finished request 4
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=116,  
length=143
	User-Name = "DOMAIN\\testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0xc8e894313a4d893c6c9dca3213aa855a
	EAP-Message = 0x020700061900
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 11710
	State = 0x6e85d2d72db4ae8cb56d58cfe9e7d6d1
	NAS-IP-Address = 10.0.1.18
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
   modcall[authorize]: module "preprocess" returns ok for request 5
   modcall[authorize]: module "chap" returns noop for request 5
   modcall[authorize]: module "mschap" returns noop for request 5
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 5
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 5
   rlm_eap: EAP packet type response id 7 length 6
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 5
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 5
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 5
modcall: leaving group authorize (returns updated) for request 5
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
   rlm_eap_tls: ack handshake is finished
   eaptls_verify returned 3
   eaptls_process returned 3
   rlm_eap_peap: EAPTLS_SUCCESS
   modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
Sending Access-Challenge of id 116 to 10.0.1.18 port 1645
	EAP-Message =  
0x0108002b19001703010020894ebfef510203bfdefc2be5b2af64ed79409fbc312aa91620d20c1ef6c9e99e
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x667f72d2b9b60cc8c792446ba47b3535
Finished request 5
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=117,  
length=196
	User-Name = "DOMAIN\\testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0xfe1d76cf140ffb4b80272d1ad544207a
	EAP-Message =  
0x0208003b1900170301003074a58eab1fe15f4dd295b7bb5753d8d28000d7d98c25f35a410b307417f7e78903fa0e2e62d2c71a3a4ebfffbc5dabcf
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 11710
	State = 0x667f72d2b9b60cc8c792446ba47b3535
	NAS-IP-Address = 10.0.1.18
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
   modcall[authorize]: module "preprocess" returns ok for request 6
   modcall[authorize]: module "chap" returns noop for request 6
   modcall[authorize]: module "mschap" returns noop for request 6
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 6
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 6
   rlm_eap: EAP packet type response id 8 length 59
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 6
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 6
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
   eaptls_verify returned 7
   rlm_eap_tls: Done initial handshake
   eaptls_process returned 7
   rlm_eap_peap: EAPTLS_OK
   rlm_eap_peap: Session established.  Decoding tunneled attributes.
   rlm_eap_peap: Identity - DOMAIN\testuser
   rlm_eap_peap: Tunneled data is valid.
   PEAP: Got tunneled EAP-Message
	EAP-Message = 0x020800140142494f4348454d5c6b77746f62696e
   PEAP: Got tunneled identity of DOMAIN\testuser
   PEAP: Setting default EAP type for tunneled EAP session.
   PEAP: Setting User-Name to DOMAIN\testuser
   PEAP: Sending tunneled request
	EAP-Message = 0x020800140142494f4348454d5c6b77746f62696e
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "DOMAIN\\testuser"
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
   modcall[authorize]: module "preprocess" returns ok for request 6
   modcall[authorize]: module "chap" returns noop for request 6
   modcall[authorize]: module "mschap" returns noop for request 6
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 6
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 6
   rlm_eap: EAP packet type response id 8 length 20
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 6
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 6
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 127.0.0.1 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
   rlm_eap: EAP Identity
   rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
   modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
   PEAP: Got tunneled reply RADIUS code 11
	EAP-Message =  
0x010900291a0109002410ada228177cea587da67e8a14293003e242494f4348454d5c6b77746f62696e
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6fd611116704dd8d3a6e60122839a38a
   PEAP: Processing from tunneled session code 0x1cf7f0 11
	EAP-Message =  
0x010900291a0109002410ada228177cea587da67e8a14293003e242494f4348454d5c6b77746f62696e
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6fd611116704dd8d3a6e60122839a38a
   PEAP: Got tunneled Access-Challenge
   modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
Sending Access-Challenge of id 117 to 10.0.1.18 port 1645
	EAP-Message =  
0x0109004b190017030100409dc1d2e3de18e332ee1f354ca7ea42430cb28bec284d6e1df399470a7c773512c64e0ca325af994b916a1687863104e07da4f713eab336e6e31d5128d181fe8a
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xb07d9a64054ccfa304b5e8c9258b22eb
Finished request 6
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=118,  
length=244
	User-Name = "DOMAIN\\testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0xc9e25c759079c60070f69a4cc4cc4dbb
	EAP-Message =  
0x0209006b19001703010060565fea2824b81092422bbb4e6ca95a963bc2bed89a5f126b55c7fc0f68da56e6857926921aa51aa5a3fa6d6cb2192eddbffa695a21da747cda6b2b65aba5f904d479265e8b74d6b5e3498d4cb9bda71463cb3ba1ae9725a53b816ae906b22f75
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 11710
	State = 0xb07d9a64054ccfa304b5e8c9258b22eb
	NAS-IP-Address = 10.0.1.18
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
   modcall[authorize]: module "preprocess" returns ok for request 7
   modcall[authorize]: module "chap" returns noop for request 7
   modcall[authorize]: module "mschap" returns noop for request 7
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 7
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 7
   rlm_eap: EAP packet type response id 9 length 107
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 7
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 7
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
   eaptls_verify returned 7
   rlm_eap_tls: Done initial handshake
   eaptls_process returned 7
   rlm_eap_peap: EAPTLS_OK
   rlm_eap_peap: Session established.  Decoding tunneled attributes.
   rlm_eap_peap: EAP type mschapv2
   rlm_eap_peap: Tunneled data is valid.
   PEAP: Got tunneled EAP-Message
	EAP-Message =  
0x0209004a1a0209004531e06d9dd10abb52b1ca8256dc2991d6b0000000000000000049660c6e4fd26fa0eb5869b4a1542b6d2ac4fcdca827e46a0042494f4348454d5c6b77746f62696e
   PEAP: Setting User-Name to DOMAIN\testuser
   PEAP: Adding old state with 6f d6
   PEAP: Sending tunneled request
	EAP-Message =  
0x0209004a1a0209004531e06d9dd10abb52b1ca8256dc2991d6b0000000000000000049660c6e4fd26fa0eb5869b4a1542b6d2ac4fcdca827e46a0042494f4348454d5c6b77746f62696e
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "DOMAIN\\testuser"
	State = 0x6fd611116704dd8d3a6e60122839a38a
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
   modcall[authorize]: module "preprocess" returns ok for request 7
   modcall[authorize]: module "chap" returns noop for request 7
   modcall[authorize]: module "mschap" returns noop for request 7
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 7
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 7
   rlm_eap: EAP packet type response id 9 length 74
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 7
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 7
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 127.0.0.1 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/mschapv2
   rlm_eap: processing type mschapv2
   Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 7
   rlm_mschap: No User-Password configured.  Cannot create LM-Password.
   rlm_mschap: No User-Password configured.  Cannot create NT-Password.
   rlm_mschap: NT Domain delimeter found, should we have enabled  
with_ntdomain_hack?
   rlm_mschap: Told to do MS-CHAPv2 for DOMAIN\testuser with NT-Password
   rlm_mschap: No NT-Password configured. Trying DirectoryService  
Authentication.
rlm_mschap: getUserNodeRef(): dsGetRecordList() status = 0, recCount=0
rlm_osx_od: ds_mschap_auth: getUserNodeRef failed
   modcall[authenticate]: module "mschap" returns fail for request 7
modcall: leaving group MS-CHAP (returns fail) for request 7
   rlm_eap: Freeing handler
   modcall[authenticate]: module "eap" returns reject for request 7
modcall: leaving group authenticate (returns reject) for request 7
auth: Failed to validate the user.
Login incorrect: [testuser] (from client localhost port 0)
   PEAP: Got tunneled reply RADIUS code 3
	EAP-Message = 0x04090004
	Message-Authenticator = 0x00000000000000000000000000000000
   PEAP: Processing from tunneled session code 0x1d3610 3
	EAP-Message = 0x04090004
	Message-Authenticator = 0x00000000000000000000000000000000
   PEAP: Tunneled authentication was rejected.
   rlm_eap_peap: FAILURE
   modcall[authenticate]: module "eap" returns handled for request 7
modcall: leaving group authenticate (returns handled) for request 7
Sending Access-Challenge of id 118 to 10.0.1.18 port 1645
	EAP-Message =  
0x010a002b1900170301002098b863d032fc27588e4f45f63277db6a504a4bd8e4932bbdbd35d7f79843a0e1
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xe943c6bde4e335aea5e91e7bad008121
Finished request 7
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=119,  
length=180
	User-Name = "DOMAIN\\testuser"
	Framed-MTU = 1400
	Called-Station-Id = "0012.014d.d511"
	Calling-Station-Id = "001f.5bbe.f006"
	Service-Type = Login-User
	Message-Authenticator = 0x4316a82bd1b1e481b8db80d0a7212dc1
	EAP-Message =  
0x020a002b1900170301002015ce2466699e563b85fe4b34ad1795d3183f4bfde6c6ad9ca4dbb03415e4df45
	NAS-Port-Type = Wireless-802.11
	NAS-Port = 11710
	State = 0xe943c6bde4e335aea5e91e7bad008121
	NAS-IP-Address = 10.0.1.18
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
   modcall[authorize]: module "preprocess" returns ok for request 8
   modcall[authorize]: module "chap" returns noop for request 8
   modcall[authorize]: module "mschap" returns noop for request 8
     rlm_realm: No '@' in User-Name = "DOMAIN\testuser", looking up  
realm NULL
     rlm_realm: No such realm "NULL"
   modcall[authorize]: module "suffix" returns noop for request 8
     rlm_realm: Looking up realm "DOMAIN" for User-Name = "DOMAIN 
\testuser"
     rlm_realm: Found realm "DOMAIN"
     rlm_realm: Adding Stripped-User-Name = "testuser"
     rlm_realm: Proxying request from user testuser to realm DOMAIN
     rlm_realm: Adding Realm = "DOMAIN"
     rlm_realm: Authentication realm is LOCAL.
   modcall[authorize]: module "DOMAIN" returns noop for request 8
   rlm_eap: EAP packet type response id 10 length 43
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 8
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 8
rlm_opendirectory: The SACL group "com.apple.access_radius" does not  
exist on this system.
rlm_opendirectory: The host 10.0.1.18 does not have an access group.
rlm_opendirectory: no access control groups, all users allowed.
   modcall[authorize]: module "opendirectory" returns ok for request 8
modcall: leaving group authorize (returns updated) for request 8
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
   eaptls_verify returned 7
   rlm_eap_tls: Done initial handshake
   eaptls_process returned 7
   rlm_eap_peap: EAPTLS_OK
   rlm_eap_peap: Session established.  Decoding tunneled attributes.
   rlm_eap_peap: Received EAP-TLV response.
   rlm_eap_peap: Tunneled data is valid.
   rlm_eap_peap:  Had sent TLV failure.  User was rejcted rejected  
earlier in this session.
  rlm_eap: Handler failed in EAP/peap
   rlm_eap: Failed in EAP select
   modcall[authenticate]: module "eap" returns invalid for request 8
modcall: leaving group authenticate (returns invalid) for request 8
auth: Failed to validate the user.
Login incorrect: [testuser] (from client DOMAINWireless port 11710 cli  
001f.5bbe.f006)
Delaying request 8 for 1 seconds
Finished request 8
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.1.18:1645, id=119,  
length=180
Sending Access-Reject of id 119 to 10.0.1.18 port 1645
	EAP-Message = 0x040a0004
	Message-Authenticator = 0x00000000000000000000000000000000
--- Walking the entire request list ---
Cleaning up request 0 ID 111 with timestamp 48ee28a6
Cleaning up request 1 ID 112 with timestamp 48ee28a6
Cleaning up request 2 ID 113 with timestamp 48ee28a6
Cleaning up request 3 ID 114 with timestamp 48ee28a6
Cleaning up request 4 ID 115 with timestamp 48ee28a6
Cleaning up request 5 ID 116 with timestamp 48ee28a6
Cleaning up request 6 ID 117 with timestamp 48ee28a6
Cleaning up request 7 ID 118 with timestamp 48ee28a6
Cleaning up request 8 ID 119 with timestamp 48ee28a6
Nothing to do.  Sleeping until we see a request.


Kerry Tobin

>
> Date: Wed, 29 Oct 2008 20:48:57 +0100
> From: <tnt at kalik.net>
> Subject: Re: Unable to authenticate to Open Directory
> To: "FreeRadius users mailing list"
> 	<freeradius-users at lists.freeradius.org>
> Message-ID: <2IU0N0fo.1225309737.1973290.tnt at kalik.net>
> Content-Type: text/plain; charset=ISO-8859-2
>
> You should really include the debug with this. It seems that you  
> need to
> add ntdomain to the authorize section (below suffix) in order to get
> stripped username.
>
> Ivan Kalik
> Kalik Informatika ISP
>
>
> Dana 29/10/2008, "Kerry Tobin" <kwtobin at wisc.edu> pi?e:
>
>> I'm trying to use the version of FreeRadius built into OS X for
>> wireless single sign-on and I'm running into some issues.  I believe
>> this has come up before and I found the following thread http://lists.freeradius.org/mailman/htdig/freeradius-users/2008-September/msg00028.html
>> ..  I've tried to follow what was suggested there but it doesn't seem
>> to be working.  Can someone provide some slightly more thorough
>> instructions of what I should be attempting?
>>
>> Authentication works perfectly for our Macintosh systems and any
>> Windows machine if we don't send a domain for authentication but not
>> when the domain is included. I can authenticate if I add DOMAIN
>> \username as a username for one of the accounts but that's not a
>> "clean" option as far as I'm concerned.  No matter what I try with
>> proxies, nthack, etc. I can't seem to get authentication to work for
>> Windows machines.
>>
>> Kerry Tobin
>>
>

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 2441 bytes
Desc: not available
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20081030/6bee10a1/attachment.bin>


More information about the Freeradius-Users mailing list