FreeRadius 2.1 + LDAP Authentication

Nik Alleyne nalleyne at brontecollege.ca
Fri Jun 5 20:47:36 CEST 2009


Hi Guys,
I'm hoping someone can help me, because I have been fighting with this issue for
days now.

Environment:
FC10 + FreeRadius 2.1 + OpenLdap 2.4.

I've successfully setup Certificate Based authentication on my FreeRadius server
and that works well. My problem is I have some users I want to authenticate via
username and password (EAP-PEAP).

I configured FreeRadius for such and my radtest (Access-Accept) works as well as
my NTRadPing Utility (Access-Accept) when checked against the users in LDAP.
However, I cannot seem to get my Windows XP Wireless Clients to authenticate.
Please see my debug info below for a sample user "sminhas" who has a cleartext
LDAP password as "it". Thanks for the help.

----------------  radiusd -X  -------------------------------
FreeRADIUS Version 2.1.3, for host i386-redhat-linux-gnu, built on Dec  8 2008
at 15:31:31
Copyright (C) 1999-2008 The FreeRADIUS server project and contributors.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License v2.
Starting - reading configuration files ...
including configuration file /etc/raddb/radiusd.conf
including configuration file /etc/raddb/proxy.conf
including configuration file /etc/raddb/clients.conf
including files in directory /etc/raddb/modules/
including configuration file /etc/raddb/modules/logintime
including configuration file /etc/raddb/modules/expr
including configuration file /etc/raddb/modules/perl
including configuration file /etc/raddb/modules/sradutmp
including configuration file /etc/raddb/modules/etc_group
including configuration file /etc/raddb/modules/ldap
including configuration file /etc/raddb/modules/expiration
including configuration file /etc/raddb/modules/detail
including configuration file /etc/raddb/modules/inner-eap
including configuration file /etc/raddb/modules/attr_filter
including configuration file /etc/raddb/modules/radutmp
including configuration file /etc/raddb/modules/mac2ip
including configuration file /etc/raddb/modules/digest
including configuration file /etc/raddb/modules/mac2vlan
including configuration file /etc/raddb/modules/mschap
including configuration file /etc/raddb/modules/checkval
including configuration file /etc/raddb/modules/linelog
including configuration file /etc/raddb/modules/wimax
including configuration file /etc/raddb/modules/always
including configuration file /etc/raddb/modules/policy
including configuration file /etc/raddb/modules/mschap.nik
including configuration file /etc/raddb/modules/exec
including configuration file /etc/raddb/modules/pap
including configuration file /etc/raddb/modules/smbpasswd
including configuration file /etc/raddb/modules/unix
including configuration file /etc/raddb/modules/attr_rewrite
including configuration file /etc/raddb/modules/passwd
including configuration file /etc/raddb/modules/chap
including configuration file /etc/raddb/modules/detail.log
including configuration file /etc/raddb/modules/realm
including configuration file /etc/raddb/modules/echo
including configuration file /etc/raddb/modules/sql_log
including configuration file /etc/raddb/modules/sqlcounter_expire_on_login
including configuration file /etc/raddb/modules/ldap.conf
including configuration file /etc/raddb/modules/pam
including configuration file /etc/raddb/modules/acct_unique
including configuration file /etc/raddb/modules/ippool
including configuration file /etc/raddb/modules/preprocess
including configuration file /etc/raddb/modules/files
including configuration file /etc/raddb/modules/detail.example.com
including configuration file /etc/raddb/modules/counter
including configuration file /etc/raddb/eap.conf
including configuration file /etc/raddb/policy.conf
including files in directory /etc/raddb/sites-enabled/
including configuration file /etc/raddb/sites-enabled/default
including configuration file /etc/raddb/sites-enabled/control-socket
including configuration file /etc/raddb/sites-enabled/inner-tunnel
group = radiusd
user = radiusd
including dictionary file /etc/raddb/dictionary
main {
	prefix = "/usr"
	localstatedir = "/var"
	logdir = "/var/log/radius"
	libdir = "/usr/lib/freeradius"
	radacctdir = "/var/log/radius/radacct"
	hostname_lookups = no
	max_request_time = 30
	cleanup_delay = 5
	max_requests = 1024
	allow_core_dumps = no
	pidfile = "/var/run/radiusd/radiusd.pid"
	checkrad = "/usr/sbin/checkrad"
	debug_level = 0
	proxy_requests = no
 log {
	stripped_names = no
	auth = no
	auth_badpass = no
	auth_goodpass = no
 }
 security {
	max_attributes = 200
	reject_delay = 1
	status_server = yes
 }
}
 client localhost {
	ipaddr = 127.0.0.1
	require_message_authenticator = no
	secret = "testing123"
	nastype = "other"
 }
 client 172.16.3.0/24 {
	require_message_authenticator = no
	secret = "BronteCollege"
	shortname = "bcc_WiFi"
 }
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
	retry_delay = 5
	retry_count = 3
	default_fallback = no
	dead_time = 120
	wake_all_if_all_dead = no
 }
 home_server localhost {
	ipaddr = 127.0.0.1
	port = 1812
	type = "auth"
	secret = "testing123"
	response_window = 20
	max_outstanding = 65536
	zombie_period = 40
	status_check = "status-server"
	ping_interval = 30
	check_interval = 30
	num_answers_to_alive = 3
	num_pings_to_alive = 3
	revive_interval = 120
	status_check_timeout = 4
 }
 home_server_pool my_auth_failover {
	type = fail-over
	home_server = localhost
 }
 realm example.com {
	auth_pool = my_auth_failover
 }
 realm LOCAL {
 }
radiusd: #### Instantiating modules ####
 instantiate {
 Module: Linked to module rlm_exec
 Module: Instantiating exec
  exec {
	wait = no
	input_pairs = "request"
	shell_escape = yes
  }
 Module: Linked to module rlm_expr
 Module: Instantiating expr
 Module: Linked to module rlm_expiration
 Module: Instantiating expiration
  expiration {
	reply-message = "Password Has Expired  "
  }
 Module: Linked to module rlm_logintime
 Module: Instantiating logintime
  logintime {
	reply-message = "You are calling outside your allowed timespan  "
	minimum-timeout = 60
  }
 }
radiusd: #### Loading Virtual Servers ####
server inner-tunnel {
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_pap
 Module: Instantiating pap
  pap {
	encryption_scheme = "auto"
	auto_header = no
  }
 Module: Linked to module rlm_chap
 Module: Instantiating chap
 Module: Linked to module rlm_mschap
 Module: Instantiating mschap
  mschap {
	use_mppe = yes
	require_encryption = yes
	require_strong = yes
	with_ntdomain_hack = no
  }
 Module: Linked to module rlm_unix
 Module: Instantiating unix
  unix {
	radwtmp = "/var/log/radius/radwtmp"
  }
 Module: Linked to module rlm_ldap
 Module: Instantiating ldap
  ldap {
	server = "localhost"
	port = 389
	password = "pp2%dfs;e"
	identity = "cn=Manager,dc=bcc,dc=com"
	net_timeout = 1
	timeout = 4
	timelimit = 3
	tls_mode = no
	start_tls = no
	tls_require_cert = "allow"
   tls {
	start_tls = no
	require_cert = "allow"
   }
	basedn = "dc=bcc,dc=com"
	filter = "(uid=%u)"
	base_filter = "(objectclass=uid)"
	auto_header = no
	access_attr_used_for_allow = yes
	groupname_attribute = "cn"
	groupmembership_filter =
"(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
	dictionary_mapping = "/etc/raddb/ldap.attrmap"
	ldap_debug = 0
	ldap_connections_number = 5
	compare_check_items = no
	do_xlat = yes
	set_auth_type = yes
  }
rlm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap
rlm_ldap: reading ldap<->radius mappings from file /etc/raddb/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusAuthType mapped to RADIUS Auth-Type
rlm_ldap: LDAP radiusSimultaneousUse mapped to RADIUS Simultaneous-Use
rlm_ldap: LDAP radiusCalledStationId mapped to RADIUS Called-Station-Id
rlm_ldap: LDAP radiusCallingStationId mapped to RADIUS Calling-Station-Id
rlm_ldap: LDAP lmPassword mapped to RADIUS LM-Password
rlm_ldap: LDAP ntPassword mapped to RADIUS NT-Password
rlm_ldap: LDAP sambaLmPassword mapped to RADIUS LM-Password
rlm_ldap: LDAP sambaNtPassword mapped to RADIUS NT-Password
rlm_ldap: LDAP dBCSPwd mapped to RADIUS LM-Password
rlm_ldap: LDAP acctFlags mapped to RADIUS SMB-Account-CTRL-TEXT
rlm_ldap: LDAP radiusExpiration mapped to RADIUS Expiration
rlm_ldap: LDAP radiusNASIpAddress mapped to RADIUS NAS-IP-Address
rlm_ldap: LDAP radiusServiceType mapped to RADIUS Service-Type
rlm_ldap: LDAP radiusFramedProtocol mapped to RADIUS Framed-Protocol
rlm_ldap: LDAP radiusFramedIPAddress mapped to RADIUS Framed-IP-Address
rlm_ldap: LDAP radiusFramedIPNetmask mapped to RADIUS Framed-IP-Netmask
rlm_ldap: LDAP radiusFramedRoute mapped to RADIUS Framed-Route
rlm_ldap: LDAP radiusFramedRouting mapped to RADIUS Framed-Routing
rlm_ldap: LDAP radiusFilterId mapped to RADIUS Filter-Id
rlm_ldap: LDAP radiusFramedMTU mapped to RADIUS Framed-MTU
rlm_ldap: LDAP radiusFramedCompression mapped to RADIUS Framed-Compression
rlm_ldap: LDAP radiusLoginIPHost mapped to RADIUS Login-IP-Host
rlm_ldap: LDAP radiusLoginService mapped to RADIUS Login-Service
rlm_ldap: LDAP radiusLoginTCPPort mapped to RADIUS Login-TCP-Port
rlm_ldap: LDAP radiusCallbackNumber mapped to RADIUS Callback-Number
rlm_ldap: LDAP radiusCallbackId mapped to RADIUS Callback-Id
rlm_ldap: LDAP radiusFramedIPXNetwork mapped to RADIUS Framed-IPX-Network
rlm_ldap: LDAP radiusClass mapped to RADIUS Class
rlm_ldap: LDAP radiusSessionTimeout mapped to RADIUS Session-Timeout
rlm_ldap: LDAP radiusIdleTimeout mapped to RADIUS Idle-Timeout
rlm_ldap: LDAP radiusTerminationAction mapped to RADIUS Termination-Action
rlm_ldap: LDAP radiusLoginLATService mapped to RADIUS Login-LAT-Service
rlm_ldap: LDAP radiusLoginLATNode mapped to RADIUS Login-LAT-Node
rlm_ldap: LDAP radiusLoginLATGroup mapped to RADIUS Login-LAT-Group
rlm_ldap: LDAP radiusFramedAppleTalkLink mapped to RADIUS Framed-AppleTalk-Link
rlm_ldap: LDAP radiusFramedAppleTalkNetwork mapped to RADIUS
Framed-AppleTalk-Network
rlm_ldap: LDAP radiusFramedAppleTalkZone mapped to RADIUS Framed-AppleTalk-Zone
rlm_ldap: LDAP radiusPortLimit mapped to RADIUS Port-Limit
rlm_ldap: LDAP radiusLoginLATPort mapped to RADIUS Login-LAT-Port
rlm_ldap: LDAP radiusReplyMessage mapped to RADIUS Reply-Message
conns: 0x90433c8
 Module: Linked to module rlm_eap
 Module: Instantiating eap
  eap {
	default_eap_type = "md5"
	timer_expire = 60
	ignore_unknown_eap_types = no
	cisco_accounting_username_bug = no
	max_sessions = 2048
  }
 Module: Linked to sub-module rlm_eap_md5
 Module: Instantiating eap-md5
 Module: Linked to sub-module rlm_eap_leap
 Module: Instantiating eap-leap
 Module: Linked to sub-module rlm_eap_gtc
 Module: Instantiating eap-gtc
   gtc {
	challenge = "Password: "
	auth_type = "PAP"
   }
 Module: Linked to sub-module rlm_eap_tls
 Module: Instantiating eap-tls
   tls {
	rsa_key_exchange = no
	dh_key_exchange = yes
	rsa_key_length = 512
	dh_key_length = 512
	verify_depth = 0
	pem_file_type = yes
	private_key_file = "/etc/raddb/certs/server.pem"
	certificate_file = "/etc/raddb/certs/server.pem"
	CA_file = "/etc/raddb/certs/ca.pem"
	private_key_password = "whatever"
	dh_file = "/etc/raddb/certs/dh"
	random_file = "/etc/raddb/certs/random"
	fragment_size = 1024
	include_length = yes
	check_crl = no
	cipher_list = "DEFAULT"
	make_cert_command = "/etc/raddb/certs/bootstrap"
    cache {
	enable = no
	lifetime = 24
	max_entries = 255
    }
   }
 Module: Linked to sub-module rlm_eap_ttls
 Module: Instantiating eap-ttls
   ttls {
	default_eap_type = "md5"
	copy_request_to_tunnel = no
	use_tunneled_reply = no
	virtual_server = "inner-tunnel"
   }
 Module: Linked to sub-module rlm_eap_peap
 Module: Instantiating eap-peap
   peap {
	default_eap_type = "mschapv2"
	copy_request_to_tunnel = yes
	use_tunneled_reply = no
	proxy_tunneled_request_as_eap = yes
	virtual_server = "inner-tunnel"
   }
 Module: Linked to sub-module rlm_eap_mschapv2
 Module: Instantiating eap-mschapv2
   mschapv2 {
	with_ntdomain_hack = no
   }
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_realm
 Module: Instantiating suffix
  realm suffix {
	format = "suffix"
	delimiter = "@"
	ignore_default = no
	ignore_null = no
  }
 Module: Checking session {...} for more modules to load
 Module: Linked to module rlm_radutmp
 Module: Instantiating radutmp
  radutmp {
	filename = "/var/log/radius/radutmp"
	username = "%{User-Name}"
	case_sensitive = yes
	check_with_nas = yes
	perm = 384
	callerid = yes
  }
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 Module: Linked to module rlm_attr_filter
 Module: Instantiating attr_filter.access_reject
  attr_filter attr_filter.access_reject {
	attrsfile = "/etc/raddb/attrs.access_reject"
	key = "%{User-Name}"
  }
 }
}
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_preprocess
 Module: Instantiating preprocess
  preprocess {
	huntgroups = "/etc/raddb/huntgroups"
	hints = "/etc/raddb/hints"
	with_ascend_hack = no
	ascend_channels_per_line = 23
	with_ntdomain_hack = no
	with_specialix_jetstream_hack = no
	with_cisco_vsa_hack = no
	with_alvarion_vsa_hack = no
  }
 Module: Linked to module rlm_detail
 Module: Instantiating auth_log
  detail auth_log {
	detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d"
	header = "%t"
	detailperm = 384
	dirperm = 493
	locking = no
	log_packet_header = no
  }
 Module: Checking preacct {...} for more modules to load
 Module: Linked to module rlm_acct_unique
 Module: Instantiating acct_unique
  acct_unique {
	key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
  }
 Module: Linked to module rlm_files
 Module: Instantiating files
  files {
	usersfile = "/etc/raddb/users"
	acctusersfile = "/etc/raddb/acct_users"
	preproxy_usersfile = "/etc/raddb/preproxy_users"
	compat = "no"
  }
 Module: Checking accounting {...} for more modules to load
 Module: Instantiating detail
  detail {
	detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
	header = "%t"
	detailperm = 384
	dirperm = 493
	locking = no
	log_packet_header = no
  }
 Module: Instantiating attr_filter.accounting_response
  attr_filter attr_filter.accounting_response {
	attrsfile = "/etc/raddb/attrs.accounting_response"
	key = "%{User-Name}"
  }
 Module: Checking session {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 }
radiusd: #### Opening IP addresses and Ports ####
listen {
	type = "auth"
	ipaddr = *
	port = 0
}
listen {
	type = "acct"
	ipaddr = *
	port = 0
}
listen {
	type = "control"
 listen {
	socket = "/var/run/radiusd/radiusd.sock"
 }
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on command file /var/run/radiusd/radiusd.sock
Ready to process requests.
rad_recv: Access-Request packet from host 172.16.3.243 port 1026, id=2,
length=157
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
	EAP-Message = 0x0200000c01736d696e686173
	Message-Authenticator = 0xff3ec4918f7da24d224ee1e7f4e7687e
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] 	expand:
/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] 	expand: %t -> Fri Jun  5 14:42:17 2009
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 0 length 12
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[ldap] performing user authorization for sminhas
[ldap] 	expand: (uid=%u) -> (uid=sminhas)
[ldap] 	expand: dc=bcc,dc=com -> dc=bcc,dc=com
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: attempting LDAP reconnection
rlm_ldap: (re)connect to localhost:389, authentication 0
rlm_ldap: bind as cn=Manager,dc=bcc,dc=com/pp2%dfs;e to localhost:389
rlm_ldap: waiting for bind result ...
rlm_ldap: Bind was successful
rlm_ldap: performing search in dc=bcc,dc=com, with filter (uid=sminhas)
[ldap] looking for check items in directory...
[ldap] looking for reply items in directory...
WARNING: No "known good" password was found in LDAP.  Are you sure that the user
is configured correctly?
[ldap] user sminhas authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
++[ldap] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user.  Authentication may
fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type md5
rlm_eap_md5: Issuing Challenge
++[eap] returns handled
Sending Access-Challenge of id 2 to 172.16.3.243 port 1026
	EAP-Message = 0x0101001604107dc67d8561a4104bcd5d2564a184ae21
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x448ac7e6448bc34871cad843bf022113
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.3.243 port 1026, id=3,
length=169
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
	EAP-Message = 0x020100060319
	State = 0x448ac7e6448bc34871cad843bf022113
	Message-Authenticator = 0xf484e28ce3364ad7c758370ff8a0fde7
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] 	expand:
/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] 	expand: %t -> Fri Jun  5 14:42:17 2009
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 1 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[ldap] performing user authorization for sminhas
[ldap] 	expand: (uid=%u) -> (uid=sminhas)
[ldap] 	expand: dc=bcc,dc=com -> dc=bcc,dc=com
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=bcc,dc=com, with filter (uid=sminhas)
[ldap] looking for check items in directory...
[ldap] looking for reply items in directory...
WARNING: No "known good" password was found in LDAP.  Are you sure that the user
is configured correctly?
[ldap] user sminhas authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
++[ldap] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user.  Authentication may
fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP NAK
[eap] EAP-NAK asked for EAP-Type/peap
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 3 to 172.16.3.243 port 1026
	EAP-Message = 0x010200061920
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x448ac7e64588de4871cad843bf022113
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.3.243 port 1026, id=4,
length=243
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
	EAP-Message =
0x0202005019800000004616030100410100003d03014a29675935525b99ff34aa90ab2f4f55de41f178895635aaf694bbc0d2abd39200001600040005000a000900640062000300060013001200630100
	State = 0x448ac7e64588de4871cad843bf022113
	Message-Authenticator = 0x17c9e0df16b03cba61ad387e61425b3c
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] 	expand:
/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] 	expand: %t -> Fri Jun  5 14:42:17 2009
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 70
[peap] Length Included
[peap] eaptls_verify returned 11
[peap]     (other): before/accept initialization
[peap]     TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 0041], ClientHello
[peap]     TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello
[peap]     TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 085e], Certificate
[peap]     TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
[peap]     TLS_accept: SSLv3 write server done A
[peap]     TLS_accept: SSLv3 flush data
[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 4 to 172.16.3.243 port 1026
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message = 0xa73082038fa0030201020209
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x448ac7e64689de4871cad843bf022113
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.3.243 port 1026, id=5,
length=169
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
	EAP-Message = 0x020300061900
	State = 0x448ac7e64689de4871cad843bf022113
	Message-Authenticator = 0xf3aa0fbb6061e253f2b396247dbe34f3
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] 	expand:
/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] 	expand: %t -> Fri Jun  5 14:42:17 2009
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 3 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 5 to 172.16.3.243 port 1026
	EAP-Message =
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
	EAP-Message =
0x071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a0282010100a2df5bcfc7dfaf404123cd9eee92293fc10e130290d95b45f1d5ee1477cd79cc642a29f98e6969b06c1ebcee8f7891d7d8f9f98ccfbc8d847f39c463addd68571300b9580ed93fb65aa4134ea9ea50739aeb66af4eebf7b3f22b371d09e8b358460ed87c64c97b2ce77dd66422b397
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message = 0x0734802e45757914
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x448ac7e6478ede4871cad843bf022113
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.3.243 port 1026, id=6,
length=169
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
	EAP-Message = 0x020400061900
	State = 0x448ac7e6478ede4871cad843bf022113
	Message-Authenticator = 0x326c80c3d6ff6c66412892224cf04b87
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] 	expand:
/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] 	expand: %t -> Fri Jun  5 14:42:17 2009
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 4 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 6 to 172.16.3.243 port 1026
	EAP-Message =
0x010500b519003340e5531cf0d388c39fd268db69a6b64329725766db06e51180f8cfb46d1dbed8f37dea0603d57576dad3fbbbfb27e55399fe1f7627abea0db94c5a33ff94d14d7592541bf619e787d19b83f4f4b1ecb1f2c0d2a58727e99855ad1ad66b0f9548a5bbb5c341bcf87367f7e7e7efdf521f3831b651a1b000bc0f9091a55cf56dc542d451dca7a0fb49bf0644099d3fb486a217187331461833a35b3027e12970551a49d276ec16030100040e000000
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x448ac7e6408fde4871cad843bf022113
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.3.243 port 1026, id=7,
length=485
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
	EAP-Message =
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
	EAP-Message =
0x77fb54d881fc654231d061b03f32d4e145cc5fb8ca0432861403010001011603010020e378e0b99dbd0025936afc79910bd597d21aa1ab287ffa689325d8e2f8845670
	State = 0x448ac7e6408fde4871cad843bf022113
	Message-Authenticator = 0xa56256998c90432cc95ac5e2862624b0
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] 	expand:
/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] 	expand: %t -> Fri Jun  5 14:42:17 2009
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 5 length 253
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 310
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange
[peap]     TLS_accept: SSLv3 read client key exchange A
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
[peap] <<< TLS 1.0 Handshake [length 0010], Finished
[peap]     TLS_accept: SSLv3 read finished A
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
[peap]     TLS_accept: SSLv3 write change cipher spec A
[peap] >>> TLS 1.0 Handshake [length 0010], Finished
[peap]     TLS_accept: SSLv3 write finished A
[peap]     TLS_accept: SSLv3 flush data
[peap]     (other): SSL negotiation finished successfully
SSL Connection Established
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 7 to 172.16.3.243 port 1026
	EAP-Message =
0x010600311900140301000101160301002069824744e087b896e73cdf48efd1922ee26a4e3e58d0581dacb5d8f9c5bb9dcf
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x448ac7e6418cde4871cad843bf022113
Finished request 5.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host 172.16.3.243 port 1026, id=8,
length=169
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
	EAP-Message = 0x020600061900
	State = 0x448ac7e6418cde4871cad843bf022113
	Message-Authenticator = 0x0f5f4b99a72b15cd40e377dee0ce705c
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] 	expand:
/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] 	expand: %t -> Fri Jun  5 14:42:17 2009
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 6 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3
[peap] eaptls_process returned 3
[peap] EAPTLS_SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 8 to 172.16.3.243 port 1026
	EAP-Message =
0x0107002019001703010015398fdaf093922be8a86b61cd34aa8f7c5b71e2874f
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x448ac7e6428dde4871cad843bf022113
Finished request 6.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host 172.16.3.243 port 1026, id=9,
length=198
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
	EAP-Message =
0x02070023190017030100189045a426a592c65afb91c5447a54fb5440f72e95e4f760ed
	State = 0x448ac7e6428dde4871cad843bf022113
	Message-Authenticator = 0xb1ad0301d20dcfa679c747016d1d161f
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] 	expand:
/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] 	expand: %t -> Fri Jun  5 14:42:17 2009
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 7 length 35
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Identity - sminhas
[peap] Got tunneled request
	EAP-Message = 0x0207000c01736d696e686173
server  {
  PEAP: Got tunneled identity of sminhas
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to sminhas
Sending tunneled request
	EAP-Message = 0x0207000c01736d696e686173
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 7 length 12
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[ldap] performing user authorization for sminhas
[ldap] 	expand: (uid=%u) -> (uid=sminhas)
[ldap] 	expand: dc=bcc,dc=com -> dc=bcc,dc=com
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=bcc,dc=com, with filter (uid=sminhas)
[ldap] looking for check items in directory...
[ldap] looking for reply items in directory...
WARNING: No "known good" password was found in LDAP.  Are you sure that the user
is configured correctly?
[ldap] user sminhas authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
++[ldap] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
	EAP-Message =
0x010800211a0108001c10a2cce07996096b9995cd579953c8a0d2736d696e686173
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xd835184ed83d026fcd510a2453380f9a
[peap] Got tunneled reply RADIUS code 11
	EAP-Message =
0x010800211a0108001c10a2cce07996096b9995cd579953c8a0d2736d696e686173
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xd835184ed83d026fcd510a2453380f9a
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 9 to 172.16.3.243 port 1026
	EAP-Message =
0x010800381900170301002df6dd96a1a3fefcb4dd9d07c8d6d525f94e852f0d3b70ea23e25445b745e48fcfd13751108f6480bd9887df0305
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x448ac7e64382de4871cad843bf022113
Finished request 7.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host 172.16.3.243 port 1026, id=10,
length=252
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
	EAP-Message =
0x020800591900170301004ef4f5895ae1386b18210c59be786e3390e65624aa56459564747a196beca068c47e0f4073c6607c1625606abc4dd02ebbedfd0e6bd349be90fb2fa92e52717805bca7d7decd285bc123c57d6a32ce
	State = 0x448ac7e64382de4871cad843bf022113
	Message-Authenticator = 0x996225c55ce5b8971faab11de63db92c
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] 	expand:
/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] 	expand: %t -> Fri Jun  5 14:42:17 2009
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 8 length 89
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunneled request
	EAP-Message =
0x020800421a0208003d312ecef7d7d8908f1a6b5c42a5d6cc5cda000000000000000011ecf3f719610d92861576e00d82c67ae8142c4416d96da200736d696e686173
server  {
  PEAP: Setting User-Name to sminhas
Sending tunneled request
	EAP-Message =
0x020800421a0208003d312ecef7d7d8908f1a6b5c42a5d6cc5cda000000000000000011ecf3f719610d92861576e00d82c67ae8142c4416d96da200736d696e686173
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "sminhas"
	State = 0xd835184ed83d026fcd510a2453380f9a
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 8 length 66
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[ldap] performing user authorization for sminhas
[ldap] 	expand: (uid=%u) -> (uid=sminhas)
[ldap] 	expand: dc=bcc,dc=com -> dc=bcc,dc=com
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=bcc,dc=com, with filter (uid=sminhas)
[ldap] looking for check items in directory...
[ldap] looking for reply items in directory...
WARNING: No "known good" password was found in LDAP.  Are you sure that the user
is configured correctly?
[ldap] user sminhas authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
++[ldap] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] +- entering group MS-CHAP {...}
[mschap] No Cleartext-Password configured.  Cannot create LM-Password.
[mschap] No Cleartext-Password configured.  Cannot create NT-Password.
[mschap] Told to do MS-CHAPv2 for sminhas with NT-Password
[mschap] FAILED: No NT/LM-Password.  Cannot perform authentication.
[mschap] FAILED: MS-CHAP2-Response is incorrect
++[mschap] returns reject
[eap] Freeing handler
++[eap] returns reject
Failed to authenticate the user.
} # server inner-tunnel
[peap] Got tunneled reply code 3
	MS-CHAP-Error = "\010E=691 R=1"
	EAP-Message = 0x04080004
	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Got tunneled reply RADIUS code 3
	MS-CHAP-Error = "\010E=691 R=1"
	EAP-Message = 0x04080004
	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Tunneled authentication was rejected.
[peap] FAILURE
++[eap] returns handled
Sending Access-Challenge of id 10 to 172.16.3.243 port 1026
	EAP-Message =
0x010900261900170301001b5c6c4555857f37d167f81d4e781468a5a5798f70aaade757f2758a
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x448ac7e64c83de4871cad843bf022113
Finished request 8.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host 172.16.3.243 port 1026, id=11,
length=201
	User-Name = "sminhas"
	NAS-IP-Address = 127.0.0.1
	NAS-Port = 1
	Called-Station-Id = "00-21-91-AF-8E-10:bccsecure"
	Calling-Station-Id = "00-13-E8-DC-B7-A7"
	Framed-MTU = 1400
	NAS-Port-Type = Wireless-802.11
	Connect-Info = "CONNECT 54Mbps 802.11g"
	EAP-Message =
0x020900261900170301001ba2885943dd8bbf7b657eb24589528193b4bac719e9b697782b8fa9
	State = 0x448ac7e64c83de4871cad843bf022113
	Message-Authenticator = 0x1d0008416ffcf27d3ad5f09e8f875f19
+- entering group authorize {...}
++[preprocess] returns ok
[auth_log] 	expand:
/var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d ->
/var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] /var/log/radius/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to /var/log/radius/radacct/172.16.3.243/auth-detail-20090605
[auth_log] 	expand: %t -> Fri Jun  5 14:42:17 2009
++[auth_log] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sminhas", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 9 length 38
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Received EAP-TLV response.
[peap]  Had sent TLV failure.  User was rejected earlier in this session.
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Using Post-Auth-Type Reject
+- entering group REJECT {...}
[attr_filter.access_reject] 	expand: %{User-Name} -> sminhas
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 9 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 9
Sending Access-Reject of id 11 to 172.16.3.243 port 1026
	EAP-Message = 0x04090004
	Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.8 seconds.
Cleaning up request 0 ID 2 with timestamp +16
Cleaning up request 1 ID 3 with timestamp +16
Cleaning up request 2 ID 4 with timestamp +16
Cleaning up request 3 ID 5 with timestamp +16
Cleaning up request 4 ID 6 with timestamp +16
Cleaning up request 5 ID 7 with timestamp +16
Cleaning up request 6 ID 8 with timestamp +16
Cleaning up request 7 ID 9 with timestamp +16
Cleaning up request 8 ID 10 with timestamp +16
Waking up in 1.0 seconds.
Cleaning up request 9 ID 11 with timestamp +16
Ready to process requests.
------------------------- --------------------------

Once again
Thanks




























Nik



More information about the Freeradius-Users mailing list