Vista user fails EAP-PEAP with Freeradius 2.1.6

Anatoly Oreshkin Anatoly.Oreshkin at pnpi.spb.ru
Mon Jun 29 17:05:24 CEST 2009


Now I've set radius config files as follows:

users
-----

csd-notebook\oreshkin Cleartext-Password := "my pass"

eap.conf
--------

peap {

default_eap_type = mschapv2
use_tunneled_reply = no
proxy_tunneled_request_as_eap = no
virtual_server = "inner-tunnel"
}

modules/mschap
--------------

use_mppe = yes
require_encryption = yes
require_strong = yes
with_ntdomain_hack = no

modules/preprocess
------------------

with_ascend_hack = no
with_ntdomain_hack = no
with_specialix_jetstream_hack = no

sites-available/default
-----------------------

authorize {
           ...
           mschap
           .....
           suffix

}


After these corrections I ran /usr/local/sbin/radiusd -fX

Here is the output:

-----------------------

FreeRADIUS Version 2.1.6, for host i686-pc-linux-gnu, built on Jun 25 2009 at 10:47:00
Copyright (C) 1999-2009 The FreeRADIUS server project and contributors. 
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A 
PARTICULAR PURPOSE. 
You may redistribute copies of FreeRADIUS under the terms of the 
GNU General Public License v2. 
Starting - reading configuration files ...
including configuration file /usr/local/etc/raddb/radiusd.conf
including configuration file /usr/local/etc/raddb/proxy.conf
including configuration file /usr/local/etc/raddb/clients.conf
including files in directory /usr/local/etc/raddb/modules/
including configuration file /usr/local/etc/raddb/modules/realm
including configuration file /usr/local/etc/raddb/modules/expiration
including configuration file /usr/local/etc/raddb/modules/radutmp
including configuration file /usr/local/etc/raddb/modules/exec
including configuration file /usr/local/etc/raddb/modules/policy
including configuration file /usr/local/etc/raddb/modules/expr
including configuration file /usr/local/etc/raddb/modules/linelog
including configuration file /usr/local/etc/raddb/modules/smsotp
including configuration file /usr/local/etc/raddb/modules/ldap
including configuration file /usr/local/etc/raddb/modules/counter
including configuration file /usr/local/etc/raddb/modules/wimax
including configuration file /usr/local/etc/raddb/modules/chap
including configuration file /usr/local/etc/raddb/modules/sql_log
including configuration file /usr/local/etc/raddb/modules/mac2ip
including configuration file /usr/local/etc/raddb/modules/krb5
including configuration file /usr/local/etc/raddb/modules/digest
including configuration file /usr/local/etc/raddb/modules/mschap
including configuration file /usr/local/etc/raddb/modules/perl
including configuration file /usr/local/etc/raddb/modules/mac2vlan
including configuration file /usr/local/etc/raddb/modules/unix
including configuration file /usr/local/etc/raddb/modules/inner-eap
including configuration file /usr/local/etc/raddb/modules/checkval
including configuration file /usr/local/etc/raddb/modules/acct_unique
including configuration file /usr/local/etc/raddb/modules/logintime
including configuration file /usr/local/etc/raddb/modules/detail.example.com
including configuration file /usr/local/etc/raddb/modules/attr_rewrite
including configuration file /usr/local/etc/raddb/modules/always
including configuration file /usr/local/etc/raddb/modules/attr_filter
including configuration file /usr/local/etc/raddb/modules/smbpasswd
including configuration file /usr/local/etc/raddb/modules/etc_group
including configuration file /usr/local/etc/raddb/modules/echo
including configuration file /usr/local/etc/raddb/modules/ippool
including configuration file /usr/local/etc/raddb/modules/preprocess
including configuration file /usr/local/etc/raddb/modules/sqlcounter_expire_on_login
including configuration file /usr/local/etc/raddb/modules/pam
including configuration file /usr/local/etc/raddb/modules/otp
including configuration file /usr/local/etc/raddb/modules/detail
including configuration file /usr/local/etc/raddb/modules/sradutmp
including configuration file /usr/local/etc/raddb/modules/pap
including configuration file /usr/local/etc/raddb/modules/files
including configuration file /usr/local/etc/raddb/modules/passwd
including configuration file /usr/local/etc/raddb/modules/detail.log
including configuration file /usr/local/etc/raddb/eap.conf
including configuration file /usr/local/etc/raddb/policy.conf
including files in directory /usr/local/etc/raddb/sites-enabled/
including configuration file /usr/local/etc/raddb/sites-enabled/inner-tunnel
including configuration file /usr/local/etc/raddb/sites-enabled/control-socket
including configuration file /usr/local/etc/raddb/sites-enabled/default
group = radiusd
user = radiusd
including dictionary file /usr/local/etc/raddb/dictionary
main {
 	prefix = "/usr/local"
 	localstatedir = "/usr/local/var"
 	logdir = "/usr/local/var/log/radius"
 	libdir = "/usr/local/lib"
 	radacctdir = "/usr/local/var/log/radius/radacct"
 	hostname_lookups = no
 	max_request_time = 30
 	cleanup_delay = 5
 	max_requests = 1024
 	allow_core_dumps = no
 	pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
 	checkrad = "/usr/local/sbin/checkrad"
 	debug_level = 0
 	proxy_requests = yes
  log {
 	stripped_names = no
 	auth = no
 	auth_badpass = no
 	auth_goodpass = no
  }
  security {
 	max_attributes = 200
 	reject_delay = 1
 	status_server = yes
  }
}
radiusd: #### Loading Realms and Home Servers ####
  proxy server {
 	retry_delay = 5
 	retry_count = 3
 	default_fallback = yes
 	dead_time = 120
 	wake_all_if_all_dead = no
  }
  realm LOCAL {
 	authhost = LOCAL
 	accthost = LOCAL
  }
  realm DEFAULT {
 	authhost = LOCAL
 	accthost = LOCAL
  }
radiusd: #### Loading Clients ####
  client 127.0.0.1 {
 	require_message_authenticator = no
 	secret = "testing123"
 	shortname = "localhost"
 	nastype = "other"
  }
  client 192.168.14.240 {
 	require_message_authenticator = no
 	secret = "testing7760"
 	shortname = "3com7760"
 	nastype = "other"
  }
radiusd: #### Instantiating modules ####
  instantiate {
  Module: Linked to module rlm_exec
  Module: Instantiating exec
   exec {
 	wait = no
 	input_pairs = "request"
 	shell_escape = yes
   }
  Module: Linked to module rlm_expr
  Module: Instantiating expr
  Module: Linked to module rlm_expiration
  Module: Instantiating expiration
   expiration {
 	reply-message = "Password Has Expired  "
   }
  Module: Linked to module rlm_logintime
  Module: Instantiating logintime
   logintime {
 	reply-message = "You are calling outside your allowed timespan  "
 	minimum-timeout = 60
   }
  }
radiusd: #### Loading Virtual Servers ####
server inner-tunnel {
  modules {
  Module: Checking authenticate {...} for more modules to load
  Module: Linked to module rlm_pap
  Module: Instantiating pap
   pap {
 	encryption_scheme = "auto"
 	auto_header = no
   }
  Module: Linked to module rlm_chap
  Module: Instantiating chap
  Module: Linked to module rlm_mschap
  Module: Instantiating mschap
   mschap {
 	use_mppe = yes
 	require_encryption = yes
 	require_strong = yes
 	with_ntdomain_hack = no
   }
  Module: Linked to module rlm_unix
  Module: Instantiating unix
   unix {
 	radwtmp = "/usr/local/var/log/radius/radwtmp"
   }
  Module: Linked to module rlm_eap
  Module: Instantiating eap
   eap {
 	default_eap_type = "peap"
 	timer_expire = 60
 	ignore_unknown_eap_types = no
 	cisco_accounting_username_bug = no
 	max_sessions = 2048
   }
  Module: Linked to sub-module rlm_eap_md5
  Module: Instantiating eap-md5
  Module: Linked to sub-module rlm_eap_leap
  Module: Instantiating eap-leap
  Module: Linked to sub-module rlm_eap_gtc
  Module: Instantiating eap-gtc
    gtc {
 	challenge = "Password: "
 	auth_type = "PAP"
    }
  Module: Linked to sub-module rlm_eap_tls
  Module: Instantiating eap-tls
    tls {
 	rsa_key_exchange = no
 	dh_key_exchange = yes
 	rsa_key_length = 512
 	dh_key_length = 512
 	verify_depth = 0
 	pem_file_type = yes
 	private_key_file = "/usr/local/etc/raddb/certs/server.pem"
 	certificate_file = "/usr/local/etc/raddb/certs/server.pem"
 	CA_file = "/usr/local/etc/raddb/certs/ca.pem"
 	private_key_password = "whatever"
 	dh_file = "/usr/local/etc/raddb/certs/dh"
 	random_file = "/usr/local/etc/raddb/certs/random"
 	fragment_size = 1024
 	include_length = yes
 	check_crl = no
 	cipher_list = "DEFAULT"
 	make_cert_command = "/usr/local/etc/raddb/certs/bootstrap"
     cache {
 	enable = no
 	lifetime = 24
 	max_entries = 255
     }
    }
  Module: Linked to sub-module rlm_eap_peap
  Module: Instantiating eap-peap
    peap {
 	default_eap_type = "mschapv2"
 	copy_request_to_tunnel = no
 	use_tunneled_reply = no
 	proxy_tunneled_request_as_eap = no
 	virtual_server = "inner-tunnel"
    }
  Module: Linked to sub-module rlm_eap_mschapv2
  Module: Instantiating eap-mschapv2
    mschapv2 {
 	with_ntdomain_hack = no
    }
  Module: Checking authorize {...} for more modules to load
  Module: Linked to module rlm_realm
  Module: Instantiating suffix
   realm suffix {
 	format = "suffix"
 	delimiter = "@"
 	ignore_default = no
 	ignore_null = no
   }
  Module: Linked to module rlm_files
  Module: Instantiating files
   files {
 	usersfile = "/usr/local/etc/raddb/users"
 	acctusersfile = "/usr/local/etc/raddb/acct_users"
 	preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
 	compat = "no"
   }
  Module: Checking session {...} for more modules to load
  Module: Linked to module rlm_radutmp
  Module: Instantiating radutmp
   radutmp {
 	filename = "/usr/local/var/log/radius/radutmp"
 	username = "%{User-Name}"
 	case_sensitive = yes
 	check_with_nas = yes
 	perm = 384
 	callerid = yes
   }
  Module: Checking post-proxy {...} for more modules to load
  Module: Checking post-auth {...} for more modules to load
  Module: Linked to module rlm_attr_filter
  Module: Instantiating attr_filter.access_reject
   attr_filter attr_filter.access_reject {
 	attrsfile = "/usr/local/etc/raddb/attrs.access_reject"
 	key = "%{User-Name}"
   }
  } # modules
} # server
server {
  modules {
  Module: Checking authenticate {...} for more modules to load
  Module: Checking authorize {...} for more modules to load
  Module: Linked to module rlm_preprocess
  Module: Instantiating preprocess
   preprocess {
 	huntgroups = "/usr/local/etc/raddb/huntgroups"
 	hints = "/usr/local/etc/raddb/hints"
 	with_ascend_hack = no
 	ascend_channels_per_line = 23
 	with_ntdomain_hack = no
 	with_specialix_jetstream_hack = no
 	with_cisco_vsa_hack = no
 	with_alvarion_vsa_hack = no
   }
  Module: Checking preacct {...} for more modules to load
  Module: Linked to module rlm_acct_unique
  Module: Instantiating acct_unique
   acct_unique {
 	key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
   }
  Module: Checking accounting {...} for more modules to load
  Module: Linked to module rlm_detail
  Module: Instantiating detail
   detail {
 	detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
 	header = "%t"
 	detailperm = 384
 	dirperm = 493
 	locking = no
 	log_packet_header = no
   }
  Module: Instantiating attr_filter.accounting_response
   attr_filter attr_filter.accounting_response {
 	attrsfile = "/usr/local/etc/raddb/attrs.accounting_response"
 	key = "%{User-Name}"
   }
  Module: Checking session {...} for more modules to load
  Module: Checking post-proxy {...} for more modules to load
  Module: Checking post-auth {...} for more modules to load
  } # modules
} # server
radiusd: #### Opening IP addresses and Ports ####
listen {
 	type = "auth"
 	ipaddr = *
 	port = 0
}
listen {
 	type = "acct"
 	ipaddr = *
 	port = 0
}
listen {
 	type = "control"
  listen {
 	socket = "/usr/local/var/run/radiusd/radiusd.sock"
  }
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on command file /usr/local/var/run/radiusd/radiusd.sock
Listening on proxy address * port 1814
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.14.240 port 2314, id=0, length=235
 	Message-Authenticator = 0x47767ff4be2c413547180f425237b800
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x0200001a016373642d6e6f7465626f6f6b5c6f726573686b696e
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 0 length 26
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[files] users: Matched entry DEFAULT at line 159
[files] users: Matched entry DEFAULT at line 178
[files] users: Matched entry csd-notebook\oreshkin at line 227
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 0 to 192.168.14.240 port 2314
 	Framed-IP-Address = 255.255.255.254
 	Framed-MTU = 576
 	Service-Type = Framed-User
 	EAP-Message = 0x010100061920
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0xaba45806aba5414cdd215ddc292a636d
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2314, id=1, length=359
 	Message-Authenticator = 0x753bb967994447875d84923815ad3cf8
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0xaba45806aba5414cdd215ddc292a636d
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x0201008419800000007a16030100750100007103014a4866f4625f59f8533ea757bcae736a8de325efbf1b47bd9110fc542983e45e000018002f00350005000ac009c00ac013c0140032003800130004010000300000001a00180000156373642d6e6f7465626f6f6b5c6f726573686b696e000a00080006001700180019000b00020100
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 1 length 132
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
   TLS Length 122
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap]     (other): before/accept initialization 
[peap]     TLS_accept: before/accept initialization 
[peap] <<< TLS 1.0 Handshake [length 0075], ClientHello 
[peap]     TLS_accept: SSLv3 read client hello A 
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello 
[peap]     TLS_accept: SSLv3 write server hello A 
[peap] >>> TLS 1.0 Handshake [length 084e], Certificate 
[peap]     TLS_accept: SSLv3 write certificate A 
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone 
[peap]     TLS_accept: SSLv3 write server done A 
[peap]     TLS_accept: SSLv3 flush data 
[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase 
In SSL Accept mode 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 1 to 192.168.14.240 port 2314
 	EAP-Message = 0x0102040019c00000088b160301002a0200002603014a4866b5494ed98d89e8f92bf89019ec04f5e11ea081256a73764e6a742c0b6800002f00160301084e0b00084a0008470003a6308203a23082028aa003020102020101300d06092a864886f70d0101040500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f72697479
 	EAP-Message = 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
 	EAP-Message = 0xe98c8abecfdd6268e021a8a17fb6966857f052859cef7a6bdcec12d2127ab2bc72c2b785a25f33c61aec0ff80079a53fb35cdbaebbfa29de9b24841a9a6c46a08073d66b09f3149fc840696c56ef61943d5e2679be18fc2733a012e261b9e9e6ae20c7ba01e2c6e4bfb3ce39325000bc51a2230319e4f8b16bffa46deb80631149f3e97333105b307b101958e9b83407c4398deb9cb32f7c23bdba70c091e79258f0c191edd239290beb26d0aaa8adf6f5ece5f633aef45ef0d4fea2c52b56fc39110203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d01010405000382010100973882c5663e2d6b29
 	EAP-Message = 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
 	EAP-Message = 0x973082037fa0030201020201
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0xaba45806aaa6414cdd215ddc292a636d
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2314, id=2, length=233
 	Message-Authenticator = 0x1bddadff5ad3d32a306af8a12e026a45
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0xaba45806aaa6414cdd215ddc292a636d
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x020200061900
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 2 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 2 to 192.168.14.240 port 2314
 	EAP-Message = 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
 	EAP-Message = 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
 	EAP-Message = 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
 	EAP-Message = 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
 	EAP-Message = 0xde231ca42761b9ba
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0xaba45806a9a7414cdd215ddc292a636d
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2314, id=3, length=233
 	Message-Authenticator = 0x64c1b1a0a06dd8cc08992773507bcab8
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0xaba45806a9a7414cdd215ddc292a636d
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x020300061900
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 3 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 3 to 192.168.14.240 port 2314
 	EAP-Message = 0x010400a51900504fbacfc37f212076882bd7b098391319a08e59fc4d3dee5493579716c999ee20be7eed64f3b465e8ff5b718e9751b2c4ca5d1cd6700ccf0341f6a270aed40707094b7b6c39c78c581fa330b26bfb74042202fde6398f0fa591d0e164f5980d197175a49c7b9769cebfa4eef1f5527383f230b4df20935fa3903e171a05d038c6effefc1bf76e95dd86d637a53fc8ae83bdc13ea56d16030100040e000000
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0xaba45806a8a0414cdd215ddc292a636d
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2314, id=4, length=565
 	Message-Authenticator = 0xba503c17155e6d42a3be06930a681d79
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0xaba45806a8a0414cdd215ddc292a636d
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 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
 	EAP-Message = 0xab6de08f6d8c822ab1b92f483b6899aec710de392b1642381403010001011603010030e577f031b8b4a85125422741b21dd93d89a06508a3c9f35acd00b5c75fe90ac8822f3d0f0eedd2db039e4aa3f1d938a5
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 4 length 253
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
   TLS Length 326
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange 
[peap]     TLS_accept: SSLv3 read client key exchange A 
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001] 
[peap] <<< TLS 1.0 Handshake [length 0010], Finished 
[peap]     TLS_accept: SSLv3 read finished A 
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001] 
[peap]     TLS_accept: SSLv3 write change cipher spec A 
[peap] >>> TLS 1.0 Handshake [length 0010], Finished 
[peap]     TLS_accept: SSLv3 write finished A 
[peap]     TLS_accept: SSLv3 flush data 
[peap]     (other): SSL negotiation finished successfully 
SSL Connection Established 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 4 to 192.168.14.240 port 2314
 	EAP-Message = 0x01050041190014030100010116030100301922a27d4207f2c6a15c15ac4c5d272c2329586453d0a7e6e4c0875d663a77dbff213dd04a70659ee8ab72c546051d63
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0xaba45806afa1414cdd215ddc292a636d
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2314, id=5, length=233
 	Message-Authenticator = 0xa162ada44b4dad0e0cdbf510b913d3a7
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0xaba45806afa1414cdd215ddc292a636d
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x020500061900
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 5 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3 
[peap] eaptls_process returned 3 
[peap] EAPTLS_SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 5 to 192.168.14.240 port 2314
 	EAP-Message = 0x0106002b1900170301002091259dd434c2cb8f2a1027bf501c0d6d52305362c8437e0b1e84a7ae6154d33f
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0xaba45806aea2414cdd215ddc292a636d
Finished request 5.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2314, id=6, length=286
 	Message-Authenticator = 0xb82edb312250e293044619548d5b6389
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0xaba45806aea2414cdd215ddc292a636d
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x0206003b19001703010030e8d7977d2380daa8416ddf1ace59ea8ba0c893ef2133e47bbde298deb6e1165b3a301dd7c070586a044ed66668a1d683
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 6 length 59
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Identity - csd-notebook\oreshkin
[peap] Got tunneled request
 	EAP-Message = 0x0206001a016373642d6e6f7465626f6f6b5c6f726573686b696e
server  {
   PEAP: Got tunneled identity of csd-notebook\oreshkin
   PEAP: Setting default EAP type for tunneled EAP session.
   PEAP: Setting User-Name to csd-notebook\oreshkin
Sending tunneled request
 	EAP-Message = 0x0206001a016373642d6e6f7465626f6f6b5c6f726573686b696e
 	FreeRADIUS-Proxied-To = 127.0.0.1
 	User-Name = "csd-notebook\\oreshkin"
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
++[control] returns ok
[eap] EAP packet type response id 6 length 26
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry DEFAULT at line 159
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
 	EAP-Message = 0x0107002f1a0107002a10a282d12f0dd933c3a359cd13a41ba3e06373642d6e6f7465626f6f6b5c6f726573686b696e
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0xb48e8179b4899b23b9e808e550e671c6
[peap] Got tunneled reply RADIUS code 11
 	EAP-Message = 0x0107002f1a0107002a10a282d12f0dd933c3a359cd13a41ba3e06373642d6e6f7465626f6f6b5c6f726573686b696e
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0xb48e8179b4899b23b9e808e550e671c6
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 6 to 192.168.14.240 port 2314
 	EAP-Message = 0x0107004b190017030100408bd73b5801a22af1c714349263e834c5bb34f8f093ec313a4de0f5b0d7ecfd36b9ec280f7e95053e4d8bb3fe45b3990b9071937e1530eebe19d39d176fc95520
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0xaba45806ada3414cdd215ddc292a636d
Finished request 6.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2314, id=7, length=334
 	Message-Authenticator = 0xd9d2a3401282e7993132db5f3b7d7739
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0xaba45806ada3414cdd215ddc292a636d
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x0207006b1900170301006063e47ce71fee3679697b243b8346ef2f5616ae1f7df2be5a9da6e595cae35d3c3499fc90d2dfa6e8dc8af626174a3e7bb80ca1aad431fccd024ac7baa9e856c460f3fee2b307d94bfc9e9a7b804ea16b8475465f32525f1cf22ae71e802460ab
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 7 length 107
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunneled request
 	EAP-Message = 0x020700431a0207003e312a694e36486d37248a3c9c9170a2a27400000000000000006cf039cec2329fab4cb1bf3cda1116171805f43cea2b4034006f726573686b696e
server  {
   PEAP: Setting User-Name to csd-notebook\oreshkin
Sending tunneled request
 	EAP-Message = 0x020700431a0207003e312a694e36486d37248a3c9c9170a2a27400000000000000006cf039cec2329fab4cb1bf3cda1116171805f43cea2b4034006f726573686b696e
 	FreeRADIUS-Proxied-To = 127.0.0.1
 	User-Name = "csd-notebook\\oreshkin"
 	State = 0xb48e8179b4899b23b9e808e550e671c6
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
++[control] returns ok
[eap] EAP packet type response id 7 length 67
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry DEFAULT at line 159
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] +- entering group MS-CHAP {...}
[mschap] No Cleartext-Password configured.  Cannot create LM-Password.
[mschap] No Cleartext-Password configured.  Cannot create NT-Password.
[mschap]   NT Domain delimeter found, should we have enabled with_ntdomain_hack?
[mschap] Told to do MS-CHAPv2 for csd-notebook\oreshkin with NT-Password
[mschap] FAILED: No NT/LM-Password.  Cannot perform authentication.
[mschap] FAILED: MS-CHAP2-Response is incorrect
++[mschap] returns reject
[eap] Freeing handler
++[eap] returns reject
Failed to authenticate the user.
} # server inner-tunnel
[peap] Got tunneled reply code 3
 	MS-CHAP-Error = "\007E=691 R=1"
 	EAP-Message = 0x04070004
 	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Got tunneled reply RADIUS code 3
 	MS-CHAP-Error = "\007E=691 R=1"
 	EAP-Message = 0x04070004
 	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Tunneled authentication was rejected.
[peap] FAILURE
++[eap] returns handled
Sending Access-Challenge of id 7 to 192.168.14.240 port 2314
 	EAP-Message = 0x0108002b190017030100203c179d01b38ec59b39e6563580c2e2e78646d92a5013ffd9284ae539305e4e5b
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0xaba45806acac414cdd215ddc292a636d
Finished request 7.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2314, id=8, length=270
 	Message-Authenticator = 0xb6c5dfb1bb733f1f0df3abd55c5ab68a
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0xaba45806acac414cdd215ddc292a636d
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x0208002b19001703010020eb2401b4d03015acaec3b2137e3adff0771aa842ddeb25c6e93d664f27404065
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 8 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Received EAP-TLV response.
[peap]  Had sent TLV failure.  User was rejected earlier in this session.
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Using Post-Auth-Type Reject
+- entering group REJECT {...}
[attr_filter.access_reject] 	expand: %{User-Name} -> csd-notebook\oreshkin
  attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 8 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 8
Sending Access-Reject of id 8 to 192.168.14.240 port 2314
 	EAP-Message = 0x04080004
 	Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.9 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2315, id=0, length=235
 	Message-Authenticator = 0x82b2e86b08ec4762ce20ad3563a0099b
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x0200001a016373642d6e6f7465626f6f6b5c6f726573686b696e
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 0 length 26
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[files] users: Matched entry DEFAULT at line 159
[files] users: Matched entry DEFAULT at line 178
[files] users: Matched entry csd-notebook\oreshkin at line 227
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 0 to 192.168.14.240 port 2315
 	Framed-IP-Address = 255.255.255.254
 	Framed-MTU = 576
 	Service-Type = Framed-User
 	EAP-Message = 0x010100061920
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0x501ad849501bc1f62bf861d1aa85d6cf
Finished request 9.
Going to the next request
Waking up in 0.1 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2315, id=1, length=359
 	Message-Authenticator = 0xb12323419ce1d98b42a7443edfc37c49
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0x501ad849501bc1f62bf861d1aa85d6cf
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x0201008419800000007a16030100750100007103014a4866f98d50665dbb9094f54b63002db7a50e9cac6ce66c4b381bf5c6889c99000018002f00350005000ac009c00ac013c0140032003800130004010000300000001a00180000156373642d6e6f7465626f6f6b5c6f726573686b696e000a00080006001700180019000b00020100
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 1 length 132
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
   TLS Length 122
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap]     (other): before/accept initialization 
[peap]     TLS_accept: before/accept initialization 
[peap] <<< TLS 1.0 Handshake [length 0075], ClientHello 
[peap]     TLS_accept: SSLv3 read client hello A 
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello 
[peap]     TLS_accept: SSLv3 write server hello A 
[peap] >>> TLS 1.0 Handshake [length 084e], Certificate 
[peap]     TLS_accept: SSLv3 write certificate A 
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone 
[peap]     TLS_accept: SSLv3 write server done A 
[peap]     TLS_accept: SSLv3 flush data 
[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase 
In SSL Accept mode 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 1 to 192.168.14.240 port 2315
 	EAP-Message = 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
 	EAP-Message = 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
 	EAP-Message = 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
 	EAP-Message = 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
 	EAP-Message = 0x973082037fa0030201020201
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0x501ad8495118c1f62bf861d1aa85d6cf
Finished request 10.
Going to the next request
Waking up in 0.1 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2315, id=2, length=233
 	Message-Authenticator = 0xf15b97da02a74f8db5515105665966c1
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0x501ad8495118c1f62bf861d1aa85d6cf
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x020200061900
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 2 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 2 to 192.168.14.240 port 2315
 	EAP-Message = 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
 	EAP-Message = 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
 	EAP-Message = 0x16b46a471819383d8be674378c3d33bdc0a8d6686542a3ba1c32a97249786aea2c38a22a49992fcfaf54806b50415060a433e9dc013696f9c0240657098f46782b1d0536f691d9667f6c153a4d2982cb2f75a3a9ebfa4831caea445f4bff1ae6fe4ad8eec82213b2a20d02dd1b6cb2dc425698f21ede7c2917aa6f103749084b755046bb83a3746e2f0203010001a381f33081f0301d0603551d0e04160414d64b150fdb7f312ac6c3982680da07466046ab9f3081c00603551d230481b83081b58014d64b150fdb7f312ac6c3982680da07466046ab9fa18199a48196308193310b3009060355040613024652310f300d060355040813065261646975
 	EAP-Message = 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
 	EAP-Message = 0xde231ca42761b9ba
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0x501ad8495219c1f62bf861d1aa85d6cf
Finished request 11.
Going to the next request
Waking up in 0.1 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2315, id=3, length=233
 	Message-Authenticator = 0x102bdb8be15cc8b89ad9f55fbebb20ed
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0x501ad8495219c1f62bf861d1aa85d6cf
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x020300061900
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 3 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 3 to 192.168.14.240 port 2315
 	EAP-Message = 0x010400a51900504fbacfc37f212076882bd7b098391319a08e59fc4d3dee5493579716c999ee20be7eed64f3b465e8ff5b718e9751b2c4ca5d1cd6700ccf0341f6a270aed40707094b7b6c39c78c581fa330b26bfb74042202fde6398f0fa591d0e164f5980d197175a49c7b9769cebfa4eef1f5527383f230b4df20935fa3903e171a05d038c6effefc1bf76e95dd86d637a53fc8ae83bdc13ea56d16030100040e000000
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0x501ad849531ec1f62bf861d1aa85d6cf
Finished request 12.
Going to the next request
Waking up in 0.1 seconds.
rad_recv: Access-Request packet from host 192.168.14.240 port 2315, id=4, length=565
 	Message-Authenticator = 0x47cc13a52f1db47f021573a31de3f004
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0x501ad849531ec1f62bf861d1aa85d6cf
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 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
 	EAP-Message = 0x570bd0887f07e57a078657c468b62298076b5c5a6c297478140301000101160301003089114f8fb9bc3086961a96ced1cf0dca13eda65ce60d9e119631ff494b482df7d783ff2e79b721bf210b51702cc60eb5
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 4 length 253
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
   TLS Length 326
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange 
[peap]     TLS_accept: SSLv3 read client key exchange A 
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001] 
[peap] <<< TLS 1.0 Handshake [length 0010], Finished 
[peap]     TLS_accept: SSLv3 read finished A 
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001] 
[peap]     TLS_accept: SSLv3 write change cipher spec A 
[peap] >>> TLS 1.0 Handshake [length 0010], Finished 
[peap]     TLS_accept: SSLv3 write finished A 
[peap]     TLS_accept: SSLv3 flush data 
[peap]     (other): SSL negotiation finished successfully 
SSL Connection Established 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 4 to 192.168.14.240 port 2315
 	EAP-Message = 0x0105004119001403010001011603010030494e77d6b991c784981a9520cfe13f446ccdf0a91e1e3124237c92ffbf6dfca3695b2ba1fcfb06666e3e4e5510c9710e
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0x501ad849541fc1f62bf861d1aa85d6cf
Finished request 13.
Going to the next request
rad_recv: Access-Request packet from host 192.168.14.240 port 2315, id=5, length=233
 	Message-Authenticator = 0x9a56f2a701f4f42475c84201fb8dcd53
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0x501ad849541fc1f62bf861d1aa85d6cf
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x020500061900
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 5 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3 
[peap] eaptls_process returned 3 
[peap] EAPTLS_SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 5 to 192.168.14.240 port 2315
 	EAP-Message = 0x0106002b1900170301002034e97bc79a272ecb521f3e94b4772539591cd7be7c565746afc3833e677fea6e
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0x501ad849551cc1f62bf861d1aa85d6cf
Finished request 14.
Going to the next request
rad_recv: Access-Request packet from host 192.168.14.240 port 2315, id=6, length=286
 	Message-Authenticator = 0x2b530943ca1844b5c9b555553bb2cbe7
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0x501ad849551cc1f62bf861d1aa85d6cf
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x0206003b1900170301003055cbf34f135d9ebbb6e7ce92023e18547e07495197030edbd78308c276d6f99eb70798328d1277428c9fa9ecb3444d0e
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 6 length 59
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Identity - csd-notebook\oreshkin
[peap] Got tunneled request
 	EAP-Message = 0x0206001a016373642d6e6f7465626f6f6b5c6f726573686b696e
server  {
   PEAP: Got tunneled identity of csd-notebook\oreshkin
   PEAP: Setting default EAP type for tunneled EAP session.
   PEAP: Setting User-Name to csd-notebook\oreshkin
Sending tunneled request
 	EAP-Message = 0x0206001a016373642d6e6f7465626f6f6b5c6f726573686b696e
 	FreeRADIUS-Proxied-To = 127.0.0.1
 	User-Name = "csd-notebook\\oreshkin"
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
++[control] returns ok
[eap] EAP packet type response id 6 length 26
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry DEFAULT at line 159
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
 	EAP-Message = 0x0107002f1a0107002a1021e75a6989f9f183110c3994e771ce616373642d6e6f7465626f6f6b5c6f726573686b696e
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0x2addebfc2adaf1ef7c77c8527280c598
[peap] Got tunneled reply RADIUS code 11
 	EAP-Message = 0x0107002f1a0107002a1021e75a6989f9f183110c3994e771ce616373642d6e6f7465626f6f6b5c6f726573686b696e
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0x2addebfc2adaf1ef7c77c8527280c598
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 6 to 192.168.14.240 port 2315
 	EAP-Message = 0x0107004b190017030100403fb7d1534b1fcb251b1b0ad3e0edc356fb1ddc11e6cd9bb4b9630767b9a72926759e7bf8b7d4afabd5880e6d29283c0a05bcc8514602124853ab67b1fdb3f756
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0x501ad849561dc1f62bf861d1aa85d6cf
Finished request 15.
Going to the next request
rad_recv: Access-Request packet from host 192.168.14.240 port 2315, id=7, length=334
 	Message-Authenticator = 0x0725f16d24a8efc8052bbfb6ee0e8017
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0x501ad849561dc1f62bf861d1aa85d6cf
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x0207006b1900170301006020b58f951c4fc7ea92f7ca877531deb41937f6f3b02c49835603bfa8c2cc08fe2457bcef4d76e6c2707f2ad961c83b059232a8820410573d9ecacb4a2f51d46358fa8ce99be1846f5b803dfbd38cbf3881fb9fcfc7d78c7f048d2e56271dbc14
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 7 length 107
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunneled request
 	EAP-Message = 0x020700431a0207003e31ca390541198a975fff7454233ab4bed900000000000000007d13ccc72b5db1a648cf1b1c5da99bce12d7f42b9539eb57006f726573686b696e
server  {
   PEAP: Setting User-Name to csd-notebook\oreshkin
Sending tunneled request
 	EAP-Message = 0x020700431a0207003e31ca390541198a975fff7454233ab4bed900000000000000007d13ccc72b5db1a648cf1b1c5da99bce12d7f42b9539eb57006f726573686b696e
 	FreeRADIUS-Proxied-To = 127.0.0.1
 	User-Name = "csd-notebook\\oreshkin"
 	State = 0x2addebfc2adaf1ef7c77c8527280c598
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
++[control] returns ok
[eap] EAP packet type response id 7 length 67
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry DEFAULT at line 159
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] +- entering group MS-CHAP {...}
[mschap] No Cleartext-Password configured.  Cannot create LM-Password.
[mschap] No Cleartext-Password configured.  Cannot create NT-Password.
[mschap]   NT Domain delimeter found, should we have enabled with_ntdomain_hack?
[mschap] Told to do MS-CHAPv2 for csd-notebook\oreshkin with NT-Password
[mschap] FAILED: No NT/LM-Password.  Cannot perform authentication.
[mschap] FAILED: MS-CHAP2-Response is incorrect
++[mschap] returns reject
[eap] Freeing handler
++[eap] returns reject
Failed to authenticate the user.
} # server inner-tunnel
[peap] Got tunneled reply code 3
 	MS-CHAP-Error = "\007E=691 R=1"
 	EAP-Message = 0x04070004
 	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Got tunneled reply RADIUS code 3
 	MS-CHAP-Error = "\007E=691 R=1"
 	EAP-Message = 0x04070004
 	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Tunneled authentication was rejected.
[peap] FAILURE
++[eap] returns handled
Sending Access-Challenge of id 7 to 192.168.14.240 port 2315
 	EAP-Message = 0x0108002b19001703010020c9616b63e4be3e858ad8f1d9c8a91ee39555cff3233a7d2e42cdc4e92999fa75
 	Message-Authenticator = 0x00000000000000000000000000000000
 	State = 0x501ad8495712c1f62bf861d1aa85d6cf
Finished request 16.
Going to the next request
rad_recv: Access-Request packet from host 192.168.14.240 port 2315, id=8, length=270
 	Message-Authenticator = 0xc4a486de7f9675287a2d85f37937f986
 	Service-Type = Framed-User
 	User-Name = "csd-notebook\\oreshkin"
 	Framed-MTU = 1488
 	State = 0x501ad8495712c1f62bf861d1aa85d6cf
 	Called-Station-Id = "00-18-6E-8F-73-40:200901azk71And"
 	Calling-Station-Id = "00-16-EA-8A-DE-38"
 	NAS-Identifier = "3Com Access Point 7760"
 	NAS-Port-Type = Wireless-802.11
 	Connect-Info = "CONNECT 54Mbps 802.11g"
 	EAP-Message = 0x0208002b19001703010020e801a72097cf7b7479c45e2ec5d3da393251f0a3e7db3b68e7ba9ceb75632263
 	NAS-IP-Address = 192.168.14.240
 	NAS-Port = 1
 	NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "csd-notebook\oreshkin", looking up realm NULL
[suffix] Found realm "DEFAULT"
[suffix] Adding Stripped-User-Name = "csd-notebook\oreshkin"
[suffix] Adding Realm = "DEFAULT"
[suffix] Authentication realm is LOCAL.
++[suffix] returns ok
[eap] EAP packet type response id 8 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Received EAP-TLV response.
[peap]  Had sent TLV failure.  User was rejected earlier in this session.
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Using Post-Auth-Type Reject
+- entering group REJECT {...}
[attr_filter.access_reject] 	expand: %{User-Name} -> csd-notebook\oreshkin
  attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 17 for 1 seconds
Going to the next request
Cleaning up request 0 ID 0 with timestamp +5
Cleaning up request 1 ID 1 with timestamp +5
Cleaning up request 2 ID 2 with timestamp +5
Cleaning up request 3 ID 3 with timestamp +5
Cleaning up request 4 ID 4 with timestamp +5
Cleaning up request 5 ID 5 with timestamp +5
Cleaning up request 6 ID 6 with timestamp +5
Cleaning up request 7 ID 7 with timestamp +5
Waking up in 0.8 seconds.
Sending delayed reject for request 17
Sending Access-Reject of id 8 to 192.168.14.240 port 2315
 	EAP-Message = 0x04080004
 	Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 0.1 seconds.
Cleaning up request 8 ID 8 with timestamp +5
Waking up in 3.7 seconds.
Cleaning up request 9 ID 0 with timestamp +10
Cleaning up request 10 ID 1 with timestamp +10
Cleaning up request 11 ID 2 with timestamp +10
Cleaning up request 12 ID 3 with timestamp +10
Cleaning up request 13 ID 4 with timestamp +10
Cleaning up request 14 ID 5 with timestamp +10
Cleaning up request 15 ID 6 with timestamp +10
Cleaning up request 16 ID 7 with timestamp +10
Waking up in 1.0 seconds.
Cleaning up request 17 ID 8 with timestamp +10
Ready to process requests.


-------------------------------------------------



All the same the EAP-PEAP authentication failed.
What else is wrong ?

Thanks.




On Fri, 26 Jun 2009, Ivan Kalik wrote:

> Date: Fri, 26 Jun 2009 20:50:31 +0100 (BST)
> From: Ivan Kalik <tnt at kalik.net>
> To: FreeRadius users mailing list <freeradius-users at lists.freeradius.org>
> Subject: Re: Vista user fails EAP-PEAP with Freeradius 2.1.6
> 
>> I was using successfuly EAP-PEAP with FreeRaduis 1.0.1 to authenticate
>> Windows Vista user  but now after transferring to FreeRadius  2.1.6.
>> user authentication fails.
>> The configuration is the same as in FR 1.0.1
>> I have just corrected  configuration files of FR 2.1.6 to correspond my
>> needs.
>> Both FreeRaduis 1.0.1 and FreeRaduis 2.1.6  is installed on Linux RedHat
>> Enterprise 4.1.
>>
>> The file "users"  contains only 1 user:
>>
>> oreshkin Cleartext-Password := "my password"
>>
>> I've corrected the following files:
>> radiusd.conf, clients.conf, eap.conf, proxy.conf, modules/mschap,
>> modules/preprocess, sites-available/default
>>
> ...
>> [eap] Identity does not match User-Name, setting from EAP Identity.
> ...
>>
>> What is wrong ?  Any hints.
>
> You have changed the User-Name. Don't do that.
>
> Ivan Kalik
> Kalik Informatika ISP
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
>



More information about the Freeradius-Users mailing list