EAP Testing - Newbie

Tim Sylvester tim.sylvester at networkradius.com
Mon Oct 17 03:23:15 CEST 2011


> Thanks for your prompt response. eapol_test has been built with all EAP
> modules. See log below:
> 
> Do you know what the problem can be? I've tried almost everything now!

It's hard to tell what's going on with only a portion of the log. Send the
logs for both eapol_test and FreeRADIUS in debug mode.

Send it to the list. It's better to have multiple people look at the
problem.

Tim

> 
> Thanks again.
> 
> Sergio.
> 
> 
> --- o ---
> 
> eapol_test -c md5.conf -s testing123
> 
> 
> Reading configuration file 'md5.conf'
> Line: 1 - start of a new network block
> ssid - hexdump_ascii(len=7):
>      45 78 61 6d 70 6c 65                              Example
> eap methods - hexdump(len=16): 00 00 00 00 0d 00 00 00 00 00 00 00 00 00
00
> 00
> eapol_flags=0 (0x0)
> key_mgmt: 0x1
> identity - hexdump_ascii(len=8):
>      74 65 73 74 75 73 65 72                           testuser
> password - hexdump_ascii(len=6):
>      74 65 73 74 70 77                                 testpw
> ca_cert - hexdump_ascii(len=40):
>      63 3a 2f 46 72 65 65 52 41 44 49 55 53 2f 65 74   c:/FreeRADIUS/et
>      63 2f 72 61 64 64 62 2f 63 65 72 74 73 2f 52 6f   c/raddb/certs/Ro
>      6f 74 43 41 2e 70 65 6d                           otCA.pem
> client_cert - hexdump_ascii(len=38):
>      63 3a 2f 46 72 65 65 52 41 44 49 55 53 2f 65 74   c:/FreeRADIUS/et
>      63 2f 72 61 64 64 62 2f 63 65 72 74 73 2f 75 73   c/raddb/certs/us
>      65 72 2e 64 65 72                                 er.der
> private_key - hexdump_ascii(len=42):
>      63 3a 2f 46 72 65 65 52 41 44 49 55 53 2f 65 74   c:/FreeRADIUS/et
>      63 2f 72 61 64 64 62 2f 63 65 72 74 73 2f 75 73   c/raddb/certs/us
>      65 72 2d 6b 65 79 2e 64 65 72                     er-key.der
> phase2 - hexdump_ascii(len=11):
>      61 75 74 68 65 61 70 3d 4d 44 35                  autheap=MD5
> anonymous_identity - hexdump_ascii(len=9):
>      61 6e 6f 6e 79 6d 6f 75 73                        anonymous
> Priority group 0
>    id=0 ssid='Example'
> Authentication server 127.0.0.1:1812
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portValid=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: SUPP_BE entering state IDLE
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> CTRL_IFACE - test - wait for monitor
> Sending fake EAP-Request-Identity
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_PAE entering state RESTART
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
> EAP: EAP entering state IDENTITY
> CTRL-EVENT-EAP-STARTED EAP authentication started
> EAP: EAP-Request Identity data - hexdump_ascii(len=0):
> EAP: using anonymous identity - hexdump_ascii(len=9):
>      61 6e 6f 6e 79 6d 6f 75 73                        anonymous
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> WPA: eapol_test_eapol_send(type=0 len=14) TX EAP -> RADIUS -
> hexdump(len=14): 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 Encapsulating
EAP
> message into a RADIUS packet Learned identity from EAP-Response-Identity
> - hexdump(len=9): 61 6e 6f 6e 79 6d 6f 75 73 Sending RADIUS message to
> authentication server RADIUS message: code=1 (Access-Request)
> identifier=0 length=126
>    Attribute 1 (User-Name) length=11
>       Value: 'anonymous'
>    Attribute 4 (NAS-IP-Address) length=6
>       Value: 127.0.0.1
>    Attribute 31 (Calling-Station-Id) length=19
>       Value: '02-00-00-00-00-01'
>    Attribute 12 (Framed-MTU) length=6
>       Value: 1400
>    Attribute 61 (NAS-Port-Type) length=6
>       Value: 19
>    Attribute 77 (Connect-Info) length=24
>       Value: 'CONNECT 11Mbps 802.11b'
>    Attribute 79 (EAP-Message) length=16
>       Value: 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73
>    Attribute 80 (Message-Authenticator) length=18
>       Value: 29 8c 2f d2 bc e7 e4 4f 38 ff 02 28 4f 38 f5 61 Next RADIUS
client
> retransmit in 3 seconds
> 
> EAPOL: SUPP_BE entering state RECEIVE
> Received 64 bytes from RADIUS server
> Received RADIUS message
> RADIUS message: code=11 (Access-Challenge) identifier=0 length=64
>    Attribute 79 (EAP-Message) length=8
>       Value: 01 01 00 06 0d 20
>    Attribute 80 (Message-Authenticator) length=18
>       Value: ca c5 9f c8 7c a3 4f 44 0a ab b1 3b f2 7c 1f 17
>    Attribute 24 (State) length=18
>       Value: 6d 9b 65 d3 6d 9a 68 84 2b 53 ce 97 ac 1c e2 81 STA
02:00:00:00:00:01:
> Received RADIUS packet matched with a pending request, round trip time
> 0.00 sec
> 
> RADIUS packet matching with station
> decapsulated EAP packet (code=1 id=1 len=6) from RADIUS server: EAP-
> Request-TLS (13)
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request id=1 method=13 vendor=0 vendorMethod=0
> EAP: EAP entering state GET_METHOD
> CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13
> EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)
> TLS: using phase1 config options
> TLS: Trusted root certificate(s) loaded
> OpenSSL: SSL_use_certificate_file (DER) --> OK
> OpenSSL: SSL_use_PrivateKey_File (DER) --> OK
> SSL: Private key loaded successfully
> CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
> EAP: EAP entering state METHOD
> SSL: Received packet(len=6) - Flags 0x20
> EAP-TLS: Start
> SSL: (where=0x10 ret=0x1)
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:before/connect initialization
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 write client hello A
> SSL: (where=0x1002 ret=0xffffffff)
> SSL: SSL_connect:error in SSLv3 read server hello A
> SSL: SSL_connect - want more data
> SSL: 210 bytes pending from ssl_out
> SSL: 210 bytes left to be sent out (of total 210 bytes)
> EAP: method process -> ignore=FALSE methodState=MAY_CONT
> decision=FAIL
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> WPA: eapol_test_eapol_send(type=0 len=216) TX EAP -> RADIUS -
> hexdump(len=216): 02 01 00 d8 0d 00 16 03 01 00 cd 01 00 00 c9 03 01 4e 9b
60
> 82 ce 26 51 18 1a 0f fd 61 c0 4c 56 44 2e a2 ed da d9 cd 0b a9 3f f4 97 dd
76 0a
> 58 be 00 00 5c c0 14 c0 0a 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84
c0 12 c0
> 08 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 00 33 00 32 00 9a 00 99 00 45
00 44 c0
> 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15
00 12 00
> 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 44 00 0b 00 04 03 00 01 02
00 0a 00
> 34 00 32 00 01 00 02 00 03 00 04 00 05 00 06 00 07 00 08 00 09 00 0a 00 0b
00 0c
> 00 0d 00 0e 00 0f 00 10 00 11 00 12 00 13 00 14 00 15 00 16 00 17 00 18 00
19 00
> 23 00 00 Encapsulating EAP message into a RADIUS packet
>   Copied RADIUS State Attribute
> Sending RADIUS message to authentication server RADIUS message: code=1
> (Access-Request) identifier=1 length=346
>    Attribute 1 (User-Name) length=11
>       Value: 'anonymous'
>    Attribute 4 (NAS-IP-Address) length=6
>       Value: 127.0.0.1
>    Attribute 31 (Calling-Station-Id) length=19
>       Value: '02-00-00-00-00-01'
>    Attribute 12 (Framed-MTU) length=6
>       Value: 1400
>    Attribute 61 (NAS-Port-Type) length=6
>       Value: 19
>    Attribute 77 (Connect-Info) length=24
>       Value: 'CONNECT 11Mbps 802.11b'
>    Attribute 79 (EAP-Message) length=218
>       Value: 02 01 00 d8 0d 00 16 03 01 00 cd 01 00 00 c9 03 01 4e 9b 60
82 ce 26 51
> 18 1a 0f fd 61 c0 4c 56 44 2e a2 ed da d9 cd 0b a9 3f f4 97 dd 76 0a 58 be
00 00
> 5c c0 14 c0 0a 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08
00 16 00
> 13 c0 0d c0 03 00 0a c0 13 c0 09 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e
c0 04 00
> 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09
00 14 00
> 11 00 08 00 06 00 03 00 ff 01 00 00 44 00 0b 00 04 03 00 01 02 00 0a 00 34
00 32 00
> 01 00 02 00 03 00 04 00 05 00 06 00 07 00 08 00 09 00 0a 00 0b 00 0c 00 0d
00 0e
> 00 0f 00 10 00 11 00 12 00 13 00 14 00 15 00 16 00 17 00 18 00 19 00 23 00
00
>    Attribute 24 (State) length=18
>       Value: 6d 9b 65 d3 6d 9a 68 84 2b 53 ce 97 ac 1c e2 81
>    Attribute 80 (Message-Authenticator) length=18
>       Value: 9e c4 a4 f0 55 8c 2a 18 4e 44 ee 10 2d 97 5d 0d Next RADIUS
client
> retransmit in 3 seconds
> 
> EAPOL: SUPP_BE entering state RECEIVE
> Received 1090 bytes from RADIUS server
> Received RADIUS message
> RADIUS message: code=11 (Access-Challenge) identifier=1 length=1090
>    Attribute 79 (EAP-Message) length=255
>       Value: 01 02 04 00 0d c0 00 00 0e af 16 03 01 00 31 02 00 00 2d 03
01 4e 9b 60
> 82 70 e6 76 5a ef e2 e5 37 6c d6 08 dd ee 9f b6 70 66 d2 df a8 0e 1f 2c e8
33 f3
> 07 f5 00 00 39 00 00 05 ff 01 00 01 00 16 03 01 0b eb 0b 00 0b e7 00 0b e4
00 06
> 5f 30 82 06 5b 30 82 05 43 a0 03 02 01 02 02 01 02 30 0d 06 09 2a 86 48 86
f7 0d
> 01 01 05 05 00 30 81 dd 31 0b 30 09 06 03 55 04 06 13 02 47 42 31 0f 30 0d
06 03
> 55 04 08 13 06 4c 6f 6e 64 6f 6e 31 14 30 12 06 03 55 04 07 13 0b 57 65 73
74 6d
> 69 6e 73 74 65 72 31 1c 30 1a 06 03 55 04 0a 13 13 4d 61 74 65 41 52 20 49
54 20
> 53 6f 6c 75 74 69 6f 6e 73 31 17 30 15 06 03 55 04 0b 13 0e 50 4b 49 20 44
65 70
> 61 72 74 6d 65 6e 74 31 22 30 20 06 03 55 04 03 13 19 54 65 73 74 20 52 6f
6f 74
> 20 43 41 20 28 46 72 65 65 52 41 44 49
>    Attribute 79 (EAP-Message) length=255
>       Value: 55 53 29 31 20 30 1e 06 03 55 04 0d 13 17 54 65 73 74 20 52
6f 6f 74 43
> 41 20 43 65 72 74 69 66 69 63 61 74 65 31 1d 30 1b 06 09 2a 86 48 86 f7 0d
01 09
> 01 16 0e 69 6e 66 6f 40 6d 61 74 65 61 72 2e 65 75 31 0b 30 09 06 03 55 04
05 13
> 02 30 31 30 1e 17 0d 31 31 31 30 31 36 31 34 32 37 35 32 5a 17 0d 31 32 31
30 31
> 35 31 34 32 37 35 32 5a 30 81 f2 31 23 30 21 06 03 55 04 03 13 1a 55 4b 57
49 4e
> 32 30 30 38 52 32 2e 63 6f 72 70 2e 6d 61 74 65 61 72 2e 65 75 31 12 30 10
06 0a
> 09 92 26 89 93 f2 2c 64 01 19 16 02 45 55 31 1d 30 1b 06 09 2a 86 48 86 f7
0d 01
> 09 01 16 0e 69 6e 66 6f 40 6d 61 74 65 61 72 2e 65 75 31 0b 30 09 06 03 55
04 06
> 13 02 47 42 31 0f 30 0d 06 03 55 04 08 13 06 4c 6f 6e 64 6f 6e 31 14 30 12
06 03 55
> 04 07 13 0b 57 65 73 74 6d 69 6e 73
>    Attribute 79 (EAP-Message) length=255
>       Value: 74 65 72 31 16 30 14 06 03 55 04 0b 13 0d 49 54 20 44 65 70
61 72 74 6d
> 65 6e 74 31 16 30 14 06 03 55 04 05 13 0d 55 4b 4c 4f 4e 44 4f 4e 53 52 56
30 31
> 31 34 30 32 06 03 55 04 0d 13 2b 54 65 73 74 20 53 65 72 76 65 72 20 43 65
72 74
> 69 66 69 63 61 74 65 20 28 50 45 41 50 20 2d 20 46 72 65 65 52 41 44 49 55
53 29
> 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89
02 81
> 81 00 d0 91 2b e9 29 81 af 2f 9e e8 e1 c8 27 c3 0b 70 a9 71 04 63 fb e0 52
bd e4
> 1c 7a 96 af 52 bc 77 0a 83 da a7 bb c2 86 da 3b ef f1 f7 f7 13 94 c8 06 f0
21 4b 2b
> 1f ae 41 aa fb 04 5e fc 1e 49 b5 a7 00 82 fd 2e ac e9 f7 c0 98 db ea 77 7b
6b d8
> d6 d8 0c 99 d4 2a 2a 61 84 f7 63 75 68 38 fa ff 97 04 87 37 f9 2b db c4 1c
d8 03 e1
> 2e d1 7c c4 cf ed 29 57 97 d6 f6
>    Attribute 79 (EAP-Message) length=255
>       Value: db 79 9f 5b bc 4b 53 ce 81 02 03 01 00 01 a3 82 02 91 30 82
02 8d 30 0f
> 06 03 55 1d 13 01 01 ff 04 05 30 03 02 01 00 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03
> 02 03 f8 30 1d 06 03 55 1d 0e 04 16 04 14 c7 c5 14 ad 16 23 77 01 f6 29 bf
2c 1d 18
> c2 4c 81 86 18 8f 30 82 01 0b 06 03 55 1d 23 04 82 01 02 30 81 ff 80 14 8c
04 28 72
> c8 60 3f 29 a5 8a c1 4f db 9a 62 ff 9a ad c3 fa a1 81 e3 a4 81 e0 30 81 dd
31 0b 30
> 09 06 03 55 04 06 13 02 47 42 31 0f 30 0d 06 03 55 04 08 13 06 4c 6f 6e 64
6f 6e 31
> 14 30 12 06 03 55 04 07 13 0b 57 65 73 74 6d 69 6e 73 74 65 72 31 1c 30 1a
06 03
> 55 04 0a 13 13 4d 61 74 65 41 52 20 49 54 20 53 6f 6c 75 74 69 6f 6e 73 31
17 30 15
> 06 03 55 04 0b 13 0e 50 4b 49 20 44 65 70 61 72 74 6d 65 6e 74 31 22 30 20
06 03
> 55 04 03 13 19 54 65
>    Attribute 79 (EAP-Message) length=14
>       Value: 73 74 20 52 6f 6f 74 20 43 41 20 28
>    Attribute 80 (Message-Authenticator) length=18
>       Value: eb 77 c8 8e ab 89 28 65 cf 6b ea d1 ce 32 b6 2e
>    Attribute 24 (State) length=18
>       Value: 6d 9b 65 d3 6c 99 68 84 2b 53 ce 97 ac 1c e2 81 STA
02:00:00:00:00:01:
> Received RADIUS packet matched with a pending request, round trip time
> 0.00 sec
> 
> RADIUS packet matching with station
> decapsulated EAP packet (code=1 id=2 len=1024) from RADIUS server: EAP-
> Request-TLS (13)
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request id=2 method=13 vendor=0 vendorMethod=0
> EAP: EAP entering state METHOD
> SSL: Received packet(len=1024) - Flags 0xc0
> SSL: TLS Message Length: 3759
> SSL: Need 2745 bytes more input data
> SSL: Building ACK (type=13 id=2 ver=0)
> EAP: method process -> ignore=FALSE methodState=MAY_CONT
> decision=FAIL
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> WPA: eapol_test_eapol_send(type=0 len=6) TX EAP -> RADIUS -
> hexdump(len=6): 02 02 00 06 0d 00 Encapsulating EAP message into a RADIUS
> packet
>   Copied RADIUS State Attribute
> Sending RADIUS message to authentication server RADIUS message: code=1
> (Access-Request) identifier=2 length=136
>    Attribute 1 (User-Name) length=11
>       Value: 'anonymous'
>    Attribute 4 (NAS-IP-Address) length=6
>       Value: 127.0.0.1
>    Attribute 31 (Calling-Station-Id) length=19
>       Value: '02-00-00-00-00-01'
>    Attribute 12 (Framed-MTU) length=6
>       Value: 1400
>    Attribute 61 (NAS-Port-Type) length=6
>       Value: 19
>    Attribute 77 (Connect-Info) length=24
>       Value: 'CONNECT 11Mbps 802.11b'
>    Attribute 79 (EAP-Message) length=8
>       Value: 02 02 00 06 0d 00
>    Attribute 24 (State) length=18
>       Value: 6d 9b 65 d3 6c 99 68 84 2b 53 ce 97 ac 1c e2 81
>    Attribute 80 (Message-Authenticator) length=18
>       Value: a9 7e 43 1c 85 51 4b 08 e5 45 69 b9 85 a6 a6 16 Next RADIUS
client
> retransmit in 3 seconds
> 
> EAPOL: SUPP_BE entering state RECEIVE
> EAPOL: startWhen --> 0
> STA 02:00:00:00:00:01: Resending RADIUS message (id=2)
> 
> Next RADIUS client retransmit in 6 seconds STA 02:00:00:00:00:01:
Resending
> RADIUS message (id=2)
> 
> Next RADIUS client retransmit in 12 seconds STA 02:00:00:00:00:01:
> Resending RADIUS message (id=2)
> 
> Next RADIUS client retransmit in 24 seconds EAPOL test timed out
> EAPOL: EAP key not available
> EAP: deinitialize previously used EAP method (13, TLS) at EAP deinit
> ENGINE: engine deinit
> MPPE keys OK: 0  mismatch: 0
> FAILURE
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> > From: tim.sylvester at networkradius.com
> > To: freeradius-users at lists.freeradius.org
> > Subject: RE: EAP Testing - Newbie
> > Date: Sun, 16 Oct 2011 12:37:20 -0700
> >
> > > I'm in the process of testing FreeRADIUS 2.1.11, just basic/standard
> > setup.
> > > I've been following the following user guide:
> > > http://deployingradius.com/documents/configuration/pap.html. Very
> > > useful, by the way.
> > >
> > > PAP, MSCHAP and MSCHAPv2 work ok, but I'm unable to get any EAP
> > > tests to pass. I've tries almost everything, including:
> > > http://deployingradius.com/documents/configuration/eap-
> problems.html
> > >
> > > radtest -t eap-md5 ....... (it works ok)
> > >
> >
> > OK. The means the eap-md5 worked for radtest and FreeRADIUS.
> >
> > > --------- EAP-MD5 test ---------
> > >
> > > http://deployingradius.com/scripts/eapol_test/
> > >
> > >
> > > eapol_test.exe -c md5.conf -s testing123 ( it doesn't
> > work!)
> >
> > OK. Since eap-md5 worked for FreeRADIUS and radeaptest above, but not
> > for eapol_test and FreeRADIUS, this is most likely a problem with
> > eapol_test not supporting eap-md5.
> >
> > > EAPOL: SUPP_BE entering state RECEIVE Received 80 bytes from RADIUS
> > > server Received RADIUS message RADIUS message: code=11
> > > (Access-Challenge) identifier=0 length=80 Attribute 79 (EAP-Message)
> > > length=24
> > > Value: 01 01 00 16 04 10 2d 5a 5e ca fd 46 31 37 33 67 ef 5f ec 14
> > 64 c3
> > > Attribute 80 (Message-Authenticator) length=18
> > > Value: 37 83 06 12 9c 7b 2d 98 9a e8 6b 81 79 03 ce 63 Attribute 24
> > > (State) length=18
> > > Value: cb 7a ce 96 cb 7b ca 0b 07 a3 2c 75 4a 0c c4 c6 STA
> > 02:00:00:00:00:01:
> > > Received RADIUS packet matched with a pending request, round trip
> > > time
> > > 0.00 sec
> > >
> > > RADIUS packet matching with station
> > > decapsulated EAP packet (code=1 id=1 len=22) from RADIUS server:
> > > EAP-
> > > Request-MD5 (4)
> >
> > RADIUS Server proposed using eap-md5.
> >
> >
> > > EAPOL: Received EAP-Packet frame
> > > EAPOL: SUPP_BE entering state REQUEST
> > > EAPOL: getSuppRsp
> > > EAP: EAP entering state RECEIVED
> > > EAP: Received EAP-Request id=1 method=4 vendor=0 vendorMethod=0
> > > EAP: EAP entering state GET_METHOD
> > > EAP: configuration does not allow: vendor 0 method 4
> > > EAP: vendor 0 method 4 not allowed
> >
> > eapol_test said it's configuration does not support "method 4" (aka
> > eap-md5).
> >
> >
> > > CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
> > > EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not
> > > allowed)
> > > EAP: allowed methods - hexdump(len=1): 15
> > > EAP: EAP entering state SEND_RESPONSE
> >
> > eapol_test sends a NAK back to the FreeRADIUS because it does not
> > support
> > eap-md5 (or any other eap method sent back by FR).
> >
> > Verify that eapol_test was successfully built with support for
> > eap-md5. Look for error messages during the build process. You will
> > probably see error messages saying that it could not find the OpenSSL
> libraries and/or headers.
> >
> > Tim
> >
> > -
> > List info/subscribe/unsubscribe? See
> > http://www.freeradius.org/list/users.html





More information about the Freeradius-Users mailing list