Check multiple attributes for one user

Krijn Tanis | WiMood krijntanis at wimood.nl
Tue Oct 5 09:02:03 CEST 2010


The Radius debug output:

=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2010.10.05 08:53:37
=~=~=~=~=~=~=~=~=~=~=~=
freeradius -X
FreeRADIUS Version 2.1.8, for host i486-pc-linux-gnu, built on Jan  5 2010
at 02:49:11
Copyright (C) 1999-2009 The FreeRADIUS server project and contributors. 
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A 
PARTICULAR PURPOSE. 
You may redistribute copies of FreeRADIUS under the terms of the 
GNU General Public License v2. 
Starting - reading configuration files ...
including configuration file /etc/freeradius/radiusd.conf
including configuration file /etc/freeradius/proxy.conf
including configuration file /etc/freeradius/clients.conf
including files in directory /etc/freeradius/modules/
including configuration file /etc/freeradius/modules/ippool
including configuration file /etc/freeradius/modules/echo
including configuration file /etc/freeradius/modules/passwd
including configuration file /etc/freeradius/modules/pam
including configuration file /etc/freeradius/modules/sradutmp
including configuration file /etc/freeradius/modules/ntlm_auth
including configuration file /etc/freeradius/modules/smbpasswd
including configuration file /etc/freeradius/modules/detail
including configuration file /etc/freeradius/modules/attr_filter
including configuration file /etc/freeradius/modules/krb5
including configuration file /etc/freeradius/modules/mac2vlan
including configuration file /etc/freeradius/modules/unix
including configuration file /etc/freeradius/modules/checkval
including configuration file /etc/freeradius/modules/etc_group
including configuration file /etc/freeradius/modules/smsotp
including configuration file /etc/freeradius/modules/inner-eap
including configuration file /etc/freeradius/modules/attr_rewrite
including configuration file /etc/freeradius/modules/policy
including configuration file /etc/freeradius/modules/counter
including configuration file /etc/freeradius/modules/sql_log
including configuration file /etc/freeradius/modules/radutmp
including configuration file /etc/freeradius/modules/realm
including configuration file /etc/freeradius/modules/perl
including configuration file /etc/freeradius/modules/otp
including configuration file /etc/freeradius/modules/ldap
including configuration file /etc/freeradius/modules/chap
including configuration file /etc/freeradius/modules/digest
including configuration file /etc/freeradius/modules/cui
including configuration file /etc/freeradius/modules/preprocess
including configuration file /etc/freeradius/modules/pap
including configuration file
/etc/freeradius/modules/sqlcounter_expire_on_login
including configuration file /etc/freeradius/modules/exec
including configuration file /etc/freeradius/modules/expr
including configuration file /etc/freeradius/modules/detail.example.com
including configuration file /etc/freeradius/modules/wimax
including configuration file /etc/freeradius/modules/detail.log
including configuration file /etc/freeradius/modules/files
including configuration file /etc/freeradius/modules/mac2ip
including configuration file /etc/freeradius/modules/mschap
including configuration file /etc/freeradius/modules/logintime
including configuration file /etc/freeradius/modules/expiration
including configuration file /etc/freeradius/modules/always
including configuration file /etc/freeradius/modules/linelog
including configuration file /etc/freeradius/modules/acct_unique
including configuration file /etc/freeradius/eap.conf
including configuration file /etc/freeradius/sql.conf
including configuration file /etc/freeradius/sql/mysql/dialup.conf
including configuration file /etc/freeradius/policy.conf
including files in directory /etc/freeradius/sites-enabled/
including configuration file /etc/freeradius/sites-enabled/default
including configuration file /etc/freeradius/sites-enabled/inner-tunnel
main {
user = "freerad"
group = "freerad"
allow_core_dumps = no
}
including dictionary file /etc/freeradius/dictionary
main {
prefix = "/usr"
localstatedir = "/var"
logdir = "/var/log/freeradius"
libdir = "/usr/lib/freeradius"
radacctdir = "/var/log/freeradius/radacct"
hostname_lookups = no
max_request_time = 30
cleanup_delay = 5
max_requests = 1024
pidfile = "/var/run/freeradius/freeradius.pid"
checkrad = "/usr/sbin/checkrad"
debug_level = 0
proxy_requests = yes
 log {
stripped_names = no
auth = no
auth_badpass = no
auth_goodpass = no
 }
 security {
max_attributes = 200
reject_delay = 1
status_server = yes
 }
}
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
retry_delay = 5
retry_count = 3
default_fallback = no
dead_time = 120
wake_all_if_all_dead = no
 }
 home_server localhost {
ipaddr = 127.0.0.1
port = 1812
type = "auth"
secret = "testing123"
response_window = 20
max_outstanding = 65536
require_message_authenticator = no
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
num_answers_to_alive = 3
num_pings_to_alive = 3
revive_interval = 120
status_check_timeout = 4
irt = 2
mrt = 16
mrc = 5
mrd = 30
 }
 home_server_pool my_auth_failover {
type = fail-over
home_server = localhost
 }
 realm example.com {
auth_pool = my_auth_failover
 }
 realm LOCAL {
 }
radiusd: #### Loading Clients ####
 client localhost {
ipaddr = 127.0.0.1
require_message_authenticator = no
secret = "testing123"
nastype = "other"
 }
radiusd: #### Instantiating modules ####
 instantiate {
 Module: Linked to module rlm_exec
 Module: Instantiating exec
  exec {
wait = no
input_pairs = "request"
shell_escape = yes
  }
 Module: Linked to module rlm_expr
 Module: Instantiating expr
 Module: Linked to module rlm_expiration
 Module: Instantiating expiration
  expiration {
reply-message = "Password Has Expired  "
  }
 Module: Linked to module rlm_logintime
 Module: Instantiating logintime
  logintime {
reply-message = "You are calling outside your allowed timespan  "
minimum-timeout = 60
  }
 }
radiusd: #### Loading Virtual Servers ####
server inner-tunnel {
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_pap
 Module: Instantiating pap
  pap {
encryption_scheme = "auto"
auto_header = no
  }
 Module: Linked to module rlm_chap
 Module: Instantiating chap
 Module: Linked to module rlm_mschap
 Module: Instantiating mschap
  mschap {
use_mppe = yes
require_encryption = no
require_strong = no
with_ntdomain_hack = no
  }
 Module: Linked to module rlm_unix
 Module: Instantiating unix
  unix {
radwtmp = "/var/log/freeradius/radwtmp"
  }
 Module: Linked to module rlm_eap
 Module: Instantiating eap
  eap {
default_eap_type = "ttls"
timer_expire = 60
ignore_unknown_eap_types = no
cisco_accounting_username_bug = no
max_sessions = 4096
  }
 Module: Linked to sub-module rlm_eap_md5
 Module: Instantiating eap-md5
 Module: Linked to sub-module rlm_eap_leap
 Module: Instantiating eap-leap
 Module: Linked to sub-module rlm_eap_gtc
 Module: Instantiating eap-gtc
   gtc {
challenge = "Password: "
auth_type = "PAP"
   }
 Module: Linked to sub-module rlm_eap_tls
 Module: Instantiating eap-tls
   tls {
rsa_key_exchange = no
dh_key_exchange = yes
rsa_key_length = 512
dh_key_length = 512
verify_depth = 0
pem_file_type = yes
private_key_file = "/etc/freeradius/certs/server.key"
certificate_file = "/etc/freeradius/certs/server.pem"
CA_file = "/etc/freeradius/certs/ca.pem"
private_key_password = "whatever"
dh_file = "/etc/freeradius/certs/dh"
random_file = "/etc/freeradius/certs/random"
fragment_size = 1024
include_length = yes
check_crl = no
cipher_list = "DEFAULT"
make_cert_command = "/etc/freeradius/certs/bootstrap"
    cache {
enable = no
lifetime = 24
max_entries = 255
    }
   }
 Module: Linked to sub-module rlm_eap_ttls
 Module: Instantiating eap-ttls
   ttls {
default_eap_type = "md5"
copy_request_to_tunnel = no
use_tunneled_reply = no
virtual_server = "inner-tunnel"
include_length = yes
   }
 Module: Linked to sub-module rlm_eap_peap
 Module: Instantiating eap-peap
   peap {
default_eap_type = "mschapv2"
copy_request_to_tunnel = no
use_tunneled_reply = no
proxy_tunneled_request_as_eap = yes
virtual_server = "inner-tunnel"
   }
 Module: Linked to sub-module rlm_eap_mschapv2
 Module: Instantiating eap-mschapv2
   mschapv2 {
with_ntdomain_hack = no
   }
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_realm
 Module: Instantiating suffix
  realm suffix {
format = "suffix"
delimiter = "@"
ignore_default = no
ignore_null = no
  }
 Module: Linked to module rlm_files
 Module: Instantiating files
  files {
usersfile = "/etc/freeradius/users"
acctusersfile = "/etc/freeradius/acct_users"
preproxy_usersfile = "/etc/freeradius/preproxy_users"
compat = "no"
  }
 Module: Linked to module rlm_sql
 Module: Instantiating sql
  sql {
driver = "rlm_sql_mysql"
server = "localhost"
port = ""
login = "radius"
password = "pxHP7KoX"
radius_db = "radius"
read_groups = yes
sqltrace = no
sqltracefile = "/var/log/freeradius/sqltrace.sql"
readclients = yes
deletestalesessions = yes
num_sql_socks = 5
lifetime = 0
max_queries = 0
sql_user_name = "%{User-Name}"
default_user_profile = ""
nas_query = "SELECT id, nasname, shortname, type, secret FROM nas"
authorize_check_query = "SELECT id, username, attribute, value, op
FROM radcheck           WHERE username = '%{SQL-User-Name}'           ORDER
BY id"
authorize_reply_query = "SELECT id, username, attribute, value, op
FROM radreply           WHERE username = '%{SQL-User-Name}'           ORDER
BY id"
authorize_group_check_query = "SELECT id, groupname, attribute,
Value, op           FROM radgroupcheck           WHERE groupname =
'%{Sql-Group}'           ORDER BY id"
authorize_group_reply_query = "SELECT id, groupname, attribute,
value, op           FROM radgroupreply           WHERE groupname =
'%{Sql-Group}'           ORDER BY id"
accounting_onoff_query = "          UPDATE radacct           SET
acctstoptime       =  '%S',              acctsessiontime    =
unix_timestamp('%S') -
unix_timestamp(acctstarttime),              acctterminatecause =
'%{Acct-Terminate-Cause}',              acctstopdelay      =
%{%{Acct-Delay-Time}:-0}           WHERE acctstoptime IS NULL           AND
nasipaddress      =  '%{NAS-IP-Address}'           AND acctstarttime     <=
'%S'"
accounting_update_query = "           UPDATE radacct           SET
framedipaddress = '%{Framed-IP-Address}',              acctsessiontime     =
'%{Acct-Session-Time}',              acctinputoctets     =
'%{%{Acct-Input-Gigawords}:-0}'  << 32 |
'%{%{Acct-Input-Octets}:-0}',              acctoutputoctets    =
'%{%{Acct-Output-Gigawords}:-0}' << 32 |
'%{%{Acct-Output-Octets}:-0}'           WHERE acctsessionid =
'%{Acct-Session-Id}'           AND username        = '%{SQL-User-Name}'
AND nasipaddress    = '%{NAS-IP-Address}'"
accounting_update_query_alt = "           INSERT INTO radacct
(acctsessionid,    acctuniqueid,      username,              realm,
nasipaddress,      nasportid,              nasporttype,      acctstarttime,
acctsessiontime,              acctauthentic,    connectinfo_start,
acctinputoctets,              acctoutputoctets, calledstationid,
callingstationid,              servicetype,      framedprotocol,
framedipaddress,              acctstartdelay,   xascendsessionsvrkey)
VALUES             ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}',
'%{SQL-User-Name}',              '%{Realm}', '%{NAS-IP-Address}',
'%{NAS-Port}',              '%{NAS-Port-Type}',              DATE_SUB('%S',
INTERVAL (%{%{Acct-Session-Time}:-0} +
%{%{Acct-Delay-Time}:-0}) SECOND),
'%{Acct-Session-Time}',              '%{Acct-Authentic}', '',
'%{%{Acct-Input-Gigawords}:-0}' << 32 |
'%{%{Acct-Input-Octets}:-0}',              '%{%{Acct-Output-Gigawords}:-0}'
<< 32 |              '%{%{Acct-Output-Octets}:-0}',
'%{Called-Station-Id}', '%{Calling-Station-Id}',
'%{Service-Type}', '%{Framed-Protocol}',
'%{Framed-IP-Address}',              '0', '%{X-Ascend-Session-Svr-Key}')"
accounting_start_query = "           INSERT INTO radacct
(acctsessionid,    acctuniqueid,     username,              realm,
nasipaddress,     nasportid,              nasporttype,      acctstarttime,
acctstoptime,              acctsessiontime,  acctauthentic,
connectinfo_start,              connectinfo_stop, acctinputoctets,
acctoutputoctets,              calledstationid,  callingstationid,
acctterminatecause,              servicetype,      framedprotocol,
framedipaddress,              acctstartdelay,   acctstopdelay,
xascendsessionsvrkey)           VALUES             ('%{Acct-Session-Id}',
'%{Acct-Unique-Session-Id}',              '%{SQL-User-Name}',
'%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}',
'%{NAS-Port-Type}', '%S', NULL,              '0', '%{Acct-Authentic}',
'%{Connect-Info}',              '', '0', '0',
'%{Called-Station-Id}', '%{Calling-Station-Id}', '',
'%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}',
'%{%{Acct-Delay-Time}:-0}', '0', '%{X-Ascend-Session-Svr-Key}')"
accounting_start_query_alt = "           UPDATE radacct SET
acctstarttime     = '%S',              acctstartdelay    =
'%{%{Acct-Delay-Time}:-0}',              connectinfo_start =
'%{Connect-Info}'           WHERE acctsessionid  = '%{Acct-Session-Id}'
AND username         = '%{SQL-User-Name}'           AND nasipaddress     =
'%{NAS-IP-Address}'"
accounting_stop_query = "           UPDATE radacct SET
acctstoptime       = '%S',              acctsessiontime    =
'%{Acct-Session-Time}',              acctinputoctets    =
'%{%{Acct-Input-Gigawords}:-0}' << 32 |
'%{%{Acct-Input-Octets}:-0}',              acctoutputoctets   =
'%{%{Acct-Output-Gigawords}:-0}' << 32 |
'%{%{Acct-Output-Octets}:-0}',              acctterminatecause =
'%{Acct-Terminate-Cause}',              acctstopdelay      =
'%{%{Acct-Delay-Time}:-0}',              connectinfo_stop   =
'%{Connect-Info}'           WHERE acctsessionid   = '%{Acct-Session-Id}'
AND username          = '%{SQL-User-Name}'           AND nasipaddress      =
'%{NAS-IP-Address}'"
accounting_stop_query_alt = "           INSERT INTO radacct
(acctsessionid, acctuniqueid, username,              realm, nasipaddress,
nasportid,              nasporttype, acctstarttime, acctstoptime,
acctsessiontime, acctauthentic, connectinfo_start,
connectinfo_stop, acctinputoctets, acctoutputoctets,
calledstationid, callingstationid, acctterminatecause,
servicetype, framedprotocol, framedipaddress,              acctstartdelay,
acctstopdelay)           VALUES             ('%{Acct-Session-Id}',
'%{Acct-Unique-Session-Id}',              '%{SQL-User-Name}',
'%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}',
'%{NAS-Port-Type}',              DATE_SUB('%S',                  INTERVAL
(%{%{Acct-Session-Time}:-0} +                  %{%{Acct-Delay-Time}:-0})
SECOND),              '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '',
'%{Connect-Info}',              '%{%{Acct-Input-Gigawords}:-0}' << 32 |
'%{%{Acct-Input-Octets}:-0}',              '%{%{Acct-Output-Gigawords}:-0}'
<< 32 |              '%{%{Acct-Output-Octets}:-0}',
'%{Called-Station-Id}', '%{Calling-Station-Id}',
'%{Acct-Terminate-Cause}',              '%{Service-Type}',
'%{Framed-Protocol}', '%{Framed-IP-Address}',              '0',
'%{%{Acct-Delay-Time}:-0}')"
group_membership_query = "SELECT groupname           FROM radusergroup
WHERE username = '%{SQL-User-Name}'           ORDER BY priority"
connect_failure_retry_delay = 60
simul_count_query = ""
simul_verify_query = "SELECT radacctid, acctsessionid, username,
nasipaddress, nasportid, framedipaddress,
callingstationid, framedprotocol                                FROM radacct
WHERE username = '%{SQL-User-Name}'                                AND
acctstoptime IS NULL"
postauth_query = "INSERT INTO radpostauth
(username, pass, reply, authdate)                           VALUES (
'%{User-Name}',
'%{%{User-Password}:-%{Chap-Password}}',
'%{reply:Packet-Type}', '%S')"
safe-characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  }
rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
rlm_sql (sql): Attempting to connect to radius at localhost:/radius
rlm_sql (sql): starting 0
rlm_sql (sql): Attempting to connect rlm_sql_mysql #0
rlm_sql_mysql: Starting connect to MySQL server for #0
rlm_sql (sql): Connected new DB handle, #0
rlm_sql (sql): starting 1
rlm_sql (sql): Attempting to connect rlm_sql_mysql #1
rlm_sql_mysql: Starting connect to MySQL server for #1
rlm_sql (sql): Connected new DB handle, #1
rlm_sql (sql): starting 2
rlm_sql (sql): Attempting to connect rlm_sql_mysql #2
rlm_sql_mysql: Starting connect to MySQL server for #2
rlm_sql (sql): Connected new DB handle, #2
rlm_sql (sql): starting 3
rlm_sql (sql): Attempting to connect rlm_sql_mysql #3
rlm_sql_mysql: Starting connect to MySQL server for #3
rlm_sql (sql): Connected new DB handle, #3
rlm_sql (sql): starting 4
rlm_sql (sql): Attempting to connect rlm_sql_mysql #4
rlm_sql_mysql: Starting connect to MySQL server for #4
rlm_sql (sql): Connected new DB handle, #4
rlm_sql (sql): Processing generate_sql_clients
rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname,
shortname, type, secret FROM nas
rlm_sql (sql): Reserving sql socket id: 4
rlm_sql (sql): Read entry
nasname=192.168.1.170,shortname=testap-test,secret=testing123
rlm_sql (sql): Adding client 192.168.1.170 (testap-test, server=<none>) to
clients list
rlm_sql (sql): Released sql socket id: 4
 Module: Checking session {...} for more modules to load
 Module: Linked to module rlm_radutmp
 Module: Instantiating radutmp
  radutmp {
filename = "/var/log/freeradius/radutmp"
username = "%{User-Name}"
case_sensitive = yes
check_with_nas = yes
perm = 384
callerid = yes
  }
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 Module: Linked to module rlm_attr_filter
 Module: Instantiating attr_filter.access_reject
  attr_filter attr_filter.access_reject {
attrsfile = "/etc/freeradius/attrs.access_reject"
key = "%{User-Name}"
  }
 } # modules
} # server
server {
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_preprocess
 Module: Instantiating preprocess
  preprocess {
huntgroups = "/etc/freeradius/huntgroups"
hints = "/etc/freeradius/hints"
with_ascend_hack = no
ascend_channels_per_line = 23
with_ntdomain_hack = no
with_specialix_jetstream_hack = no
with_cisco_vsa_hack = no
with_alvarion_vsa_hack = no
  }
 Module: Checking preacct {...} for more modules to load
 Module: Linked to module rlm_acct_unique
 Module: Instantiating acct_unique
  acct_unique {
key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address,
NAS-Port"
  }
 Module: Checking accounting {...} for more modules to load
 Module: Linked to module rlm_detail
 Module: Instantiating detail
  detail {
detailfile =
"/var/log/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
header = "%t"
detailperm = 384
dirperm = 493
locking = no
log_packet_header = no
  }
 Module: Instantiating attr_filter.accounting_response
  attr_filter attr_filter.accounting_response {
attrsfile = "/etc/freeradius/attrs.accounting_response"
key = "%{User-Name}"
  }
 Module: Checking session {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 } # modules
} # server
radiusd: #### Opening IP addresses and Ports ####
listen {
type = "auth"
ipaddr = *
port = 0
}
listen {
type = "acct"
ipaddr = *
port = 0
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on proxy address * port 1814
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.1.170 port 3074, id=1,
length=272
User-Name = "krijn"
NAS-Identifier = "00-0b-6b-4f-80-65:testap"
NAS-IP-Address = 192.168.1.170
NAS-Port = 5
NAS-Port-Id = "ath0"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Framed-MTU = 1400
Called-Station-Id = "00-0B-6B-4F-80-65:testap"
Calling-Station-Id = "00-0B-6B-D9-D0-14"
Event-Timestamp = "Oct  5 2010 08:59:07 CEST"
WISPr-Location-ID = "isocc=(null),cc=(null),ac=(null),network=(null)"
WISPr-Location-Name = "(null),(null)"
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x0200000a016b72696a6e
Message-Authenticator = 0xa74b44261469ee92ecf675d56836dabc
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "krijn", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 0 length 10
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
++[files] returns noop
[sql] expand: %{User-Name} -> krijn
[sql] sql_set_user escaped user --> 'krijn'
rlm_sql (sql): Reserving sql socket id: 3
[sql] expand: SELECT id, username, attribute, value, op           FROM
radcheck           WHERE username = '%{SQL-User-Name}'           ORDER BY id
-> SELECT id, username, attribute, value, op           FROM radcheck
WHERE username = 'krijn'           ORDER BY id
[sql] User found in radcheck table
[sql] expand: SELECT id, username, attribute, value, op           FROM
radreply           WHERE username = '%{SQL-User-Name}'           ORDER BY id
-> SELECT id, username, attribute, value, op           FROM radreply
WHERE username = 'krijn'           ORDER BY id
[sql] expand: SELECT groupname           FROM radusergroup           WHERE
username = '%{SQL-User-Name}'           ORDER BY priority -> SELECT
groupname           FROM radusergroup           WHERE username = 'krijn'
ORDER BY priority
[sql] expand: SELECT id, groupname, attribute,           Value, op
FROM radgroupcheck           WHERE groupname = '%{Sql-Group}'
ORDER BY id -> SELECT id, groupname, attribute,           Value, op
FROM radgroupcheck           WHERE groupname = '1'           ORDER BY id
[sql] User found in group 1
[sql] expand: SELECT id, groupname, attribute,           value, op
FROM radgroupreply           WHERE groupname = '%{Sql-Group}'
ORDER BY id -> SELECT id, groupname, attribute,           value, op
FROM radgroupreply           WHERE groupname = '1'           ORDER BY id
rlm_sql (sql): Released sql socket id: 3
++[sql] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 1 to 192.168.1.170 port 3074
WISPr-Bandwidth-Max-Down = 1024000
WISPr-Bandwidth-Max-Up = 256000
Acct-Interim-Interval = 600
Idle-Timeout = 2628000
EAP-Message = 0x010100061520
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3c19f5cd3c18e0363152d338edbf53e8
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.1.170 port 3074, id=2,
length=286
User-Name = "krijn"
NAS-Identifier = "00-0b-6b-4f-80-65:testap"
NAS-IP-Address = 192.168.1.170
NAS-Port = 5
NAS-Port-Id = "ath0"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Framed-MTU = 1400
Called-Station-Id = "00-0B-6B-4F-80-65:testap"
Calling-Station-Id = "00-0B-6B-D9-D0-14"
Event-Timestamp = "Oct  5 2010 08:59:07 CEST"
WISPr-Location-ID = "isocc=(null),cc=(null),ac=(null),network=(null)"
WISPr-Location-Name = "(null),(null)"
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020100060319
State = 0x3c19f5cd3c18e0363152d338edbf53e8
Message-Authenticator = 0xa37663f649567f230f75a8fb1cc7cb1b
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "krijn", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 1 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
++[files] returns noop
[sql] expand: %{User-Name} -> krijn
[sql] sql_set_user escaped user --> 'krijn'
rlm_sql (sql): Reserving sql socket id: 2
[sql] expand: SELECT id, username, attribute, value, op           FROM
radcheck           WHERE username = '%{SQL-User-Name}'           ORDER BY id
-> SELECT id, username, attribute, value, op           FROM radcheck
WHERE username = 'krijn'           ORDER BY id
[sql] User found in radcheck table
[sql] expand: SELECT id, username, attribute, value, op           FROM
radreply           WHERE username = '%{SQL-User-Name}'           ORDER BY id
-> SELECT id, username, attribute, value, op           FROM radreply
WHERE username = 'krijn'           ORDER BY id
[sql] expand: SELECT groupname           FROM radusergroup           WHERE
username = '%{SQL-User-Name}'           ORDER BY priority -> SELECT
groupname           FROM radusergroup           WHERE username = 'krijn'
ORDER BY priority
[sql] expand: SELECT id, groupname, attribute,           Value, op
FROM radgroupcheck           WHERE groupname = '%{Sql-Group}'
ORDER BY id -> SELECT id, groupname, attribute,           Value, op
FROM radgroupcheck           WHERE groupname = '1'           ORDER BY id
[sql] User found in group 1
[sql] expand: SELECT id, groupname, attribute,           value, op
FROM radgroupreply           WHERE groupname = '%{Sql-Group}'
ORDER BY id -> SELECT id, groupname, attribute,           value, op
FROM radgroupreply           WHERE groupname = '1'           ORDER BY id
rlm_sql (sql): Released sql socket id: 2
++[sql] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP NAK
[eap] EAP-NAK asked for EAP-Type/peap
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 2 to 192.168.1.170 port 3074
WISPr-Bandwidth-Max-Down = 1024000
WISPr-Bandwidth-Max-Up = 256000
Acct-Interim-Interval = 600
Idle-Timeout = 2628000
EAP-Message = 0x010200061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3c19f5cd3d1bec363152d338edbf53e8
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.1.170 port 3074, id=3,
length=386
User-Name = "krijn"
NAS-Identifier = "00-0b-6b-4f-80-65:testap"
NAS-IP-Address = 192.168.1.170
NAS-Port = 5
NAS-Port-Id = "ath0"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Framed-MTU = 1400
Called-Station-Id = "00-0B-6B-4F-80-65:testap"
Calling-Station-Id = "00-0B-6B-D9-D0-14"
Event-Timestamp = "Oct  5 2010 08:59:07 CEST"
WISPr-Location-ID = "isocc=(null),cc=(null),ac=(null),network=(null)"
WISPr-Location-Name = "(null),(null)"
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message =
0x0202006a1900160301005f0100005b03010000001340e29ad00b6989cd564d258938da96c8
39029d5a5d1c2d4d8619182500003400390038003500160013000a00330032002f0066000500
04006300620061001500120009006500640060001400110008000600030100
State = 0x3c19f5cd3d1bec363152d338edbf53e8
Message-Authenticator = 0x3efeb0cfcfbf6419b4dc2dc8792caa02
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "krijn", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 106
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap]     (other): before/accept initialization 
[peap]     TLS_accept: before/accept initialization 
[peap] <<< TLS 1.0 Handshake [length 005f], ClientHello  
[peap]     TLS_accept: SSLv3 read client hello A 
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello  
[peap]     TLS_accept: SSLv3 write server hello A 
[peap] >>> TLS 1.0 Handshake [length 01af], Certificate  
[peap]     TLS_accept: SSLv3 write certificate A 
[peap] >>> TLS 1.0 Handshake [length 018d], ServerKeyExchange  
[peap]     TLS_accept: SSLv3 write key exchange A 
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
[peap]     TLS_accept: SSLv3 write server done A 
[peap]     TLS_accept: SSLv3 flush data 
[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate
A
In SSL Handshake Phase 
In SSL Accept mode  
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 3 to 192.168.1.170 port 3074
EAP-Message =
0x010303841900160301002a0200002603014caaccbc9c615b2f095fd11045adac321956ffcb
3f36352a2b6fd272306d35610000390016030101af0b0001ab0001a80001a5308201a1308201
0a020900fff668e689d331e6300d06092a864886f70d01010505003015311330110603550403
130a74657374736572766572301e170d3130313030343134303132335a170d32303130303131
34303132335a3015311330110603550403130a7465737473657276657230819f300d06092a86
4886f70d010101050003818d0030818902818100bf167df6f931627b07b69e4cc3dd25ae815a
4ae7c793c14abdf53a8a6caa06bf79fd93347e5b37b332827265
EAP-Message =
0x4842529d400d5dda7f8b3bbe950cfc113c7328263fb130ddf251f8faccfb58d4856c46faf7
9d7568ba233cf53022e910ab7cb77b62e8e508ee739db47cc844d5f00a6e95792dda8ed46008
52e5a8d3741304b3110203010001300d06092a864886f70d0101050500038181000c40ac1712
69e1329682dedffe00461c757886790d10da107d8f719c810f8244974859efdcbfa0a83645b9
2e069dd2b92ab5839786ad555893500fc46d61d3bd3519801fcabe048066189ea53131b6a1e9
f1c23e6bdf9b4dc97ccea591cbeb15460206c1b732c0fd1e2a00d6a1895569eb9d19cbd55530
dcea610bf14d8da233160301018d0c0001890080a4cc8a888c39
EAP-Message =
0xd932f9736364485a8a4f05da0076078f715322c76ef3051582dd449f484828a098c9eefd33
4501c12cde6e3471793ab92bdc3b39e765430532347d4a7d10fd58a56285e25bc1998ecf3fa3
a7b2b0f65f637e951315a3a0640fda0adbbfbd91663c79b34ca08989a3b3f62c0c49fdae0409
44c973a45a8c9557bb00010200800c9fb5f3617363c9ea77ecd84a286a29a623d3281f7b6e45
2d15d99e196204c9929f407c3dfeaab7690b20c34bad504ffbcf277caa82cb379bf1c28a5aa9
6c3f432201f5c715212e1bde165547d20fcf558af7581ed010669868defe48d88aa8bf889b96
835e0869be83b843810f65a1fe24a78594a884fd7b216f0e72bf
EAP-Message =
0x3af9008011ed2ced9838a73dd729b91d2012cef0d25c348dbc945cedf586399077cf16c6ae
f1204691f759daf8ba507d8405e573b3df86f886a118c0ba68e96b3b1ed6b24914ec333da4d0
3e93efff746a37b1bbfced477b0408b3f2bc568d90a1862f56fcb3719074c7c306f32e51423a
5edfee699c66c28df279bc4f94827b6c74a7a616030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3c19f5cd3e1aec363152d338edbf53e8
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.1.170 port 3074, id=4,
length=484
User-Name = "krijn"
NAS-Identifier = "00-0b-6b-4f-80-65:testap"
NAS-IP-Address = 192.168.1.170
NAS-Port = 5
NAS-Port-Id = "ath0"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Framed-MTU = 1400
Called-Station-Id = "00-0B-6B-4F-80-65:testap"
Calling-Station-Id = "00-0B-6B-D9-D0-14"
Event-Timestamp = "Oct  5 2010 08:59:07 CEST"
WISPr-Location-ID = "isocc=(null),cc=(null),ac=(null),network=(null)"
WISPr-Location-Name = "(null),(null)"
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message =
0x020300cc19001603010086100000820080318e590a5503e2ddf48b0e50d7f340dad2c95989
c507667565c59550b76aa16bf7d198ef91316fda591ee1b57c9f2c6eb882889ec7b9481cf0c9
a5ea2ea1be98a5d0ddc25b1edd561207be2d6e3b78d8b143d49dddfc47503475a9a7179f4795
923193c588e253b9785ca611a4fc2af00204363ea63cc48d2d810657c39a3468140301000101
1603010030dc3a4a1546859b9ddcf794712f0286d6d19c5a95567c6331add2bb3ca37f61cf6e
ced76a13ae6a803d7a881238ec1d28
State = 0x3c19f5cd3e1aec363152d338edbf53e8
Message-Authenticator = 0xa3d18fa48823e8ccf2c5815d6a02d0f1
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "krijn", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 3 length 204
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
[peap]     TLS_accept: SSLv3 read client key exchange A 
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]  
[peap] <<< TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 read finished A 
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]  
[peap]     TLS_accept: SSLv3 write change cipher spec A 
[peap] >>> TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 write finished A 
[peap]     TLS_accept: SSLv3 flush data 
[peap]     (other): SSL negotiation finished successfully 
SSL Connection Established 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 4 to 192.168.1.170 port 3074
EAP-Message =
0x0104004119001403010001011603010030d2ff0895d7bd3dbfb00c502ec0f31537846179e0
7565c8723b4c6a88009d5441159e8c2b99c402cc37a5f0b64dc423c6
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3c19f5cd3f1dec363152d338edbf53e8
Finished request 3.
Going to the next request
Waking up in 4.6 seconds.
rad_recv: Access-Request packet from host 192.168.1.170 port 3074, id=5,
length=286
User-Name = "krijn"
NAS-Identifier = "00-0b-6b-4f-80-65:testap"
NAS-IP-Address = 192.168.1.170
NAS-Port = 5
NAS-Port-Id = "ath0"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Framed-MTU = 1400
Called-Station-Id = "00-0B-6B-4F-80-65:testap"
Calling-Station-Id = "00-0B-6B-D9-D0-14"
Event-Timestamp = "Oct  5 2010 08:59:07 CEST"
WISPr-Location-ID = "isocc=(null),cc=(null),ac=(null),network=(null)"
WISPr-Location-Name = "(null),(null)"
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020400061900
State = 0x3c19f5cd3f1dec363152d338edbf53e8
Message-Authenticator = 0x9480a0249666b1883c1d8d21790ee596
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "krijn", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 4 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3 
[peap] eaptls_process returned 3 
[peap] EAPTLS_SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 5 to 192.168.1.170 port 3074
EAP-Message =
0x0105002b190017030100206eb3dd0c9c1e6680187097d6b6c76fc25af638d497b21010791e
b62e4379b828
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3c19f5cd381cec363152d338edbf53e8
Finished request 4.
Going to the next request
Waking up in 4.5 seconds.
rad_recv: Access-Request packet from host 192.168.1.170 port 3074, id=6,
length=360
User-Name = "krijn"
NAS-Identifier = "00-0b-6b-4f-80-65:testap"
NAS-IP-Address = 192.168.1.170
NAS-Port = 5
NAS-Port-Id = "ath0"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Framed-MTU = 1400
Called-Station-Id = "00-0B-6B-4F-80-65:testap"
Calling-Station-Id = "00-0B-6B-D9-D0-14"
Event-Timestamp = "Oct  5 2010 08:59:07 CEST"
WISPr-Location-ID = "isocc=(null),cc=(null),ac=(null),network=(null)"
WISPr-Location-Name = "(null),(null)"
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message =
0x0205005019001703010020ee4ae6ada5a1487568b96cacf7a321d4d5b139175b480b1b6ebf
00b1c60b400c1703010020c3bf8ea38d3341efbc2c626b0ec6bfb8969d1eeda7cf512f1f4df3
a0c8e9f653
State = 0x3c19f5cd381cec363152d338edbf53e8
Message-Authenticator = 0x65107b1e03cbdd968ac88ef37c9ca744
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "krijn", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 5 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Identity - krijn
[peap] Got tunneled request
EAP-Message = 0x0205000a016b72696a6e
server  {
  PEAP: Got tunneled identity of krijn
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to krijn
Sending tunneled request
EAP-Message = 0x0205000a016b72696a6e
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "krijn"
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "krijn", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 5 length 10
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
[sql] expand: %{User-Name} -> krijn
[sql] sql_set_user escaped user --> 'krijn'
rlm_sql (sql): Reserving sql socket id: 1
[sql] expand: SELECT id, username, attribute, value, op           FROM
radcheck           WHERE username = '%{SQL-User-Name}'           ORDER BY id
-> SELECT id, username, attribute, value, op           FROM radcheck
WHERE username = 'krijn'           ORDER BY id
[sql] expand: SELECT groupname           FROM radusergroup           WHERE
username = '%{SQL-User-Name}'           ORDER BY priority -> SELECT
groupname           FROM radusergroup           WHERE username = 'krijn'
ORDER BY priority
[sql] expand: SELECT id, groupname, attribute,           Value, op
FROM radgroupcheck           WHERE groupname = '%{Sql-Group}'
ORDER BY id -> SELECT id, groupname, attribute,           Value, op
FROM radgroupcheck           WHERE groupname = '1'           ORDER BY id
[sql] User found in group 1
[sql] expand: SELECT id, groupname, attribute,           value, op
FROM radgroupreply           WHERE groupname = '%{Sql-Group}'
ORDER BY id -> SELECT id, groupname, attribute,           value, op
FROM radgroupreply           WHERE groupname = '1'           ORDER BY id
rlm_sql (sql): Released sql socket id: 1
++[sql] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
WISPr-Bandwidth-Max-Down = 1024000
WISPr-Bandwidth-Max-Up = 256000
Acct-Interim-Interval = 600
Idle-Timeout = 2628000
EAP-Message =
0x0106001f1a0106001a104752aad57bdcf603b76fc7d381e3cbac6b72696a6e
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x10b696e910b08c0331cee5911baf4ebf
[peap] Got tunneled reply RADIUS code 11
WISPr-Bandwidth-Max-Down = 1024000
WISPr-Bandwidth-Max-Up = 256000
Acct-Interim-Interval = 600
Idle-Timeout = 2628000
EAP-Message =
0x0106001f1a0106001a104752aad57bdcf603b76fc7d381e3cbac6b72696a6e
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x10b696e910b08c0331cee5911baf4ebf
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 6 to 192.168.1.170 port 3074
EAP-Message =
0x0106003b19001703010030195145a7f72a64ee47341aebba21d21b357960da36d402cd5468
9637b0e5f0902010c3a810c109a03ae6ec2ac0ae1e48
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3c19f5cd391fec363152d338edbf53e8
Finished request 5.
Going to the next request
Waking up in 4.5 seconds.
rad_recv: Access-Request packet from host 192.168.1.170 port 3074, id=7,
length=424
User-Name = "krijn"
NAS-Identifier = "00-0b-6b-4f-80-65:testap"
NAS-IP-Address = 192.168.1.170
NAS-Port = 5
NAS-Port-Id = "ath0"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Framed-MTU = 1400
Called-Station-Id = "00-0B-6B-4F-80-65:testap"
Calling-Station-Id = "00-0B-6B-D9-D0-14"
Event-Timestamp = "Oct  5 2010 08:59:07 CEST"
WISPr-Location-ID = "isocc=(null),cc=(null),ac=(null),network=(null)"
WISPr-Location-Name = "(null),(null)"
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message =
0x0206009019001703010020ea062db644dea720958cbdc60e4c7115b480effb316048421dce
1216cbad9eb11703010060d1be7119d5dd8ad98bd310ab62689a8445e3ea4cc69c9224227b98
14f986b73ea3143a2a1d4b33663e79cec39119261fda39294f2afb89c5c79bc1c03999f19a25
0d7dd9e9da3ddab2774756f0d7e4feac639d40ae700bd31d00a9dbe88736ca
State = 0x3c19f5cd391fec363152d338edbf53e8
Message-Authenticator = 0x263cb5ad490289263be856060f09a796
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "krijn", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 6 length 144
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunneled request
EAP-Message =
0x020600401a0206003b311cbe232ecce24ed01afc751b15d832940000000000000000b346e2
afc1fb55e292226807a2f6b6219fb5adef860b91d6006b72696a6e
server  {
  PEAP: Setting User-Name to krijn
Sending tunneled request
EAP-Message =
0x020600401a0206003b311cbe232ecce24ed01afc751b15d832940000000000000000b346e2
afc1fb55e292226807a2f6b6219fb5adef860b91d6006b72696a6e
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "krijn"
State = 0x10b696e910b08c0331cee5911baf4ebf
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "krijn", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 6 length 64
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
[sql] expand: %{User-Name} -> krijn
[sql] sql_set_user escaped user --> 'krijn'
rlm_sql (sql): Reserving sql socket id: 0
[sql] expand: SELECT id, username, attribute, value, op           FROM
radcheck           WHERE username = '%{SQL-User-Name}'           ORDER BY id
-> SELECT id, username, attribute, value, op           FROM radcheck
WHERE username = 'krijn'           ORDER BY id
[sql] expand: SELECT groupname           FROM radusergroup           WHERE
username = '%{SQL-User-Name}'           ORDER BY priority -> SELECT
groupname           FROM radusergroup           WHERE username = 'krijn'
ORDER BY priority
[sql] expand: SELECT id, groupname, attribute,           Value, op
FROM radgroupcheck           WHERE groupname = '%{Sql-Group}'
ORDER BY id -> SELECT id, groupname, attribute,           Value, op
FROM radgroupcheck           WHERE groupname = '1'           ORDER BY id
[sql] User found in group 1
[sql] expand: SELECT id, groupname, attribute,           value, op
FROM radgroupreply           WHERE groupname = '%{Sql-Group}'
ORDER BY id -> SELECT id, groupname, attribute,           value, op
FROM radgroupreply           WHERE groupname = '1'           ORDER BY id
rlm_sql (sql): Released sql socket id: 0
++[sql] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] +- entering group MS-CHAP {...}
[mschap] No Cleartext-Password configured.  Cannot create LM-Password.
[mschap] No Cleartext-Password configured.  Cannot create NT-Password.
[mschap] Told to do MS-CHAPv2 for krijn with NT-Password
[mschap] FAILED: No NT/LM-Password.  Cannot perform authentication.
[mschap] FAILED: MS-CHAP2-Response is incorrect
++[mschap] returns reject
[eap] Freeing handler
++[eap] returns reject
Failed to authenticate the user.
} # server inner-tunnel
[peap] Got tunneled reply code 3
WISPr-Bandwidth-Max-Down = 1024000
WISPr-Bandwidth-Max-Up = 256000
Acct-Interim-Interval = 600
Idle-Timeout = 2628000
MS-CHAP-Error = "\006E=691 R=1"
EAP-Message = 0x04060004
Message-Authenticator = 0x00000000000000000000000000000000
[peap] Got tunneled reply RADIUS code 3
WISPr-Bandwidth-Max-Down = 1024000
WISPr-Bandwidth-Max-Up = 256000
Acct-Interim-Interval = 600
Idle-Timeout = 2628000
MS-CHAP-Error = "\006E=691 R=1"
EAP-Message = 0x04060004
Message-Authenticator = 0x00000000000000000000000000000000
[peap] Tunneled authentication was rejected.
[peap] FAILURE
++[eap] returns handled
Sending Access-Challenge of id 7 to 192.168.1.170 port 3074
EAP-Message =
0x0107002b190017030100205e533de7969e5baa6274637054e3f62cff457c0764a24e44a460
6e0336bca402
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3c19f5cd3a1eec363152d338edbf53e8
Finished request 6.
Going to the next request
Waking up in 4.5 seconds.
rad_recv: Access-Request packet from host 192.168.1.170 port 3074, id=8,
length=360
User-Name = "krijn"
NAS-Identifier = "00-0b-6b-4f-80-65:testap"
NAS-IP-Address = 192.168.1.170
NAS-Port = 5
NAS-Port-Id = "ath0"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Framed-MTU = 1400
Called-Station-Id = "00-0B-6B-4F-80-65:testap"
Calling-Station-Id = "00-0B-6B-D9-D0-14"
Event-Timestamp = "Oct  5 2010 08:59:07 CEST"
WISPr-Location-ID = "isocc=(null),cc=(null),ac=(null),network=(null)"
WISPr-Location-Name = "(null),(null)"
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message =
0x0207005019001703010020ce731a7886af7bb4012bb7ff88b77637f2cef3aa2c726aff851f
2203e2a2237d1703010020b4bbb54590801f14f26b8e1f5a3add5038eacf4c5cb528b3a7c2b4
eef7f48e3f
State = 0x3c19f5cd3a1eec363152d338edbf53e8
Message-Authenticator = 0xd90d51b254d2b36a1271fb2c22a94c03
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "krijn", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 7 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Received EAP-TLV response.
[peap]  Had sent TLV failure.  User was rejected earlier in this session.
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Using Post-Auth-Type Reject
+- entering group REJECT {...}
[attr_filter.access_reject] expand: %{User-Name} -> krijn
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 7 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 7
Sending Access-Reject of id 8 to 192.168.1.170 port 3074
EAP-Message = 0x04070004
Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.5 seconds.
Cleaning up request 0 ID 1 with timestamp +31
Cleaning up request 1 ID 2 with timestamp +31
Cleaning up request 2 ID 3 with timestamp +31
Waking up in 0.3 seconds.
Cleaning up request 3 ID 4 with timestamp +32
Cleaning up request 4 ID 5 with timestamp +32
Cleaning up request 5 ID 6 with timestamp +32
Cleaning up request 6 ID 7 with timestamp +32
Waking up in 1.0 seconds.
Cleaning up request 7 ID 8 with timestamp +32
Ready to process requests.
^C
root at testserver:/etc/freeradius/sites-enabled#

Kind regards,
 
Krijn Tanis
WiMood


-----Oorspronkelijk bericht-----
Van: Tim Sylvester [mailto:tim.sylvester.at.network.radius at gmail.com] Namens
Tim Sylvester
Verzonden: maandag 4 oktober 2010 20:51
Aan: 'Krijn Tanis | WiMood'; 'FreeRadius users mailing list'
Onderwerp: RE: Check multiple attributes for one user


> I ran Freeradius in debug mode already to check this:

Send the rest of the debug out so that we can see why the request was
rejected.

Tim



> rad_recv: Access-Request packet from host 192.168.1.170 port 3098,
> id=201,
> length=286
> User-Name = "krijn"
> NAS-Identifier = "00-0b-6b-4f-80-65:isiline"
> NAS-IP-Address = 192.168.1.170
> NAS-Port = 5
> NAS-Port-Id = "ath0"
> NAS-Port-Type = Wireless-802.11
> Service-Type = Framed-User
> Framed-MTU = 1400
> Called-Station-Id = "00-0B-6B-4F-80-65:isiline"
> Calling-Station-Id = "00-0B-6B-D9-D0-14"
> Event-Timestamp = "Oct  4 2010 19:10:41 CEST"
> WISPr-Location-ID = "isocc=(null),cc=(null),ac=(null),network=(null)"
> WISPr-Location-Name = "(null),(null)"
> Connect-Info = "CONNECT 11Mbps 802.11b"
> EAP-Message = 0x020100060319
> State = 0x697a4088697b55320faa946fa7f606af
> Message-Authenticator = 0x73ade7409a1c7def5027792de162bd0b
>
> Met vriendelijke groet/Kind regards,
>
> Krijn Tanis
> WiMood
> Kerkstraat 8/10
> 3252 AX  Goedereede
>
> Tel.: +31 (0) 187 82 0204
> Fax: +31 (0) 187 49 1596
> Mob.: +31 (0) 6 10923259
> Mail: info at wimood.nl
> Web: http://www.wimood.nl
>
>
> -----Oorspronkelijk bericht-----
> Van: freeradius-users-bounces+krijntanis=wimood.nl at lists.freeradius.org
> [mailto:freeradius-users-
> bounces+krijntanis=wimood.nl at lists.freeradius.org]
> Namens Tim Sylvester
> Verzonden: maandag 4 oktober 2010 20:16
> Aan: 'FreeRadius users mailing list'
> Onderwerp: RE: Check multiple attributes for one user
>
> Run the server in debug mode (radiusd -X) and check the attributes sent
> by
> the NAS. The NAS may not be sending the Calling-Station-Id or it may be
> in a
> different format. Either way, the debug output is going to give you
> more
> information.
>
> Tim
>
> > -----Original Message-----
> > From: freeradius-users-
> > bounces+tim.sylvester=networkradius.com at lists.freeradius.org
> > [mailto:freeradius-users-
> > bounces+tim.sylvester=networkradius.com at lists.freeradius.org] On
> > bounces+Behalf
> > Of Krijn Tanis | WiMood
> > Sent: Monday, October 04, 2010 10:59 AM
> > To: freeradius-users at lists.freeradius.org
> > Subject: Check multiple attributes for one user
> >
> > Hello all,
> >
> > For a project I am working on 802.1x WPA-EAP authentication and for
> > this I use a Freeradius server. This part of authentication works
> > perfect.
> >
> > Now I also want to check the Calling-Station-Id for the user, in this
> > case it is MAC address of the wireless client. I want this because I
> > want to allow the user to connect only from one MAC address (else
> user
> > is able to use a other device that is not in our control, I want to
> > prevent this. So I want to check the Password and Calling-Station-Id
> > in one and the same Access Request. If both match an Access-Accept is
> > sent, in all other cases (when password or Calling-Station-Id do not
> > match for the user) an Access-Reject.
> >
> > I tried to do this:
> >
> > +----+----------------+--------------------+------------------+------
> +
> > | id | UserName       | Attribute          | Value            | Op
> |
> > +----+----------------+--------------------+------------------+------
> +
> > |  1 | krijn          | Calling-Station-Id | 00-0B-6B-D9-D0-14| ==
> |
> > |  2 | krijn          | Cleartext-Password | test123          | :=
> |
> >
> > But this doesnt work, the user is rejected. Can somebody point me
> > into the right direction?
> >
> > Kind regards,
> >
> > Krijn Tanis
> > WiMood
> >
> >
> >
> >
> >
> > -
> > List info/subscribe/unsubscribe? See
> > http://www.freeradius.org/list/users.html
>
>







More information about the Freeradius-Users mailing list