Loop in sites-enabled/default

Carlo Musante carlo at wayne.edu
Thu May 4 01:51:33 CEST 2017


Hello,

Working on a new server and trying to get wireless authentication working with LDAP. Radtest works from the server using PAP, so the LDAP lookup is working.  When the authethentication request comes from the wireless client, it does not look like the password is being checked against LDAP.  Authentication gets rejected here.  Struggling to find the problem.

  eap : Freeing handler
   [eap] = reject
  } #  authenticate = reject
 Failed to authenticate the user
 Using Post-Auth-Type Reject
 # Executing group from file /etc/raddb/sites-enabled/inner-tunnel
  Post-Auth-Type REJECT {
  attr_filter.access_reject : EXPAND %{User-Name}
  attr_filter.access_reject :    --> zz9930
  attr_filter.access_reject : Matched entry DEFAULT at line 11
   [attr_filter.access_reject] = updated
  } # Post-Auth-Type REJECT = updated

Any help would be very much appreciated.

Radiusd -X startup output and subsequent log included below.

Carlo


radtest zz9930 -t pap ********  localhost 10 testing123
Sending Access-Request Id 209 from 0.0.0.0:46670 to 127.0.0.1:1812
        User-Name = 'zz9930'
        User-Password = '********'
        NAS-IP-Address = 141.217.0.164
        NAS-Port = 10
        Message-Authenticator = 0x00
Received Access-Accept Id 209 from 127.0.0.1:1812 to 127.0.0.1:46670 length 20

Received Access-Request Id 209 from 127.0.0.1:46670 to 127.0.0.1:1812 length 76
        User-Name = 'zz9930'
        User-Password = '********'
        NAS-IP-Address = 141.217.0.164
        NAS-Port = 10
        Message-Authenticator = 0x288132b2444fb169ac902f52169603f6
(0) Received Access-Request packet from host 127.0.0.1 port 46670, id=209, length=76
(0)     User-Name = 'zz9930'
(0)     User-Password = '********'
(0)     NAS-IP-Address = 141.217.0.164
(0)     NAS-Port = 10
(0)     Message-Authenticator = 0x288132b2444fb169ac902f52169603f6
(0) # Executing section authorize from file /etc/raddb/sites-enabled/default
(0)   authorize {
(0)   filter_username filter_username {
(0)     if (!&User-Name)
(0)     if (!&User-Name)  -> FALSE
(0)     if (&User-Name =~ / /)
(0)     if (&User-Name =~ / /)  -> FALSE
(0)     if (&User-Name =~ /@.*@/ )
(0)     if (&User-Name =~ /@.*@/ )  -> FALSE
(0)     if (&User-Name =~ /\\.\\./ )
(0)     if (&User-Name =~ /\\.\\./ )  -> FALSE
(0)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))
(0)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))   -> FALSE
(0)     if (&User-Name =~ /\\.$/)
(0)     if (&User-Name =~ /\\.$/)   -> FALSE
(0)     if (&User-Name =~ /@\\./)
(0)     if (&User-Name =~ /@\\./)   -> FALSE
(0)   } # filter_username filter_username = notfound
(0)   [preprocess] = ok
(0)   operator-name.authorize operator-name.authorize {
(0)     if ("%{client:Operator-Name}")
(0) Client does not contain config item "Operator-Name"
(0) EXPAND %{client:Operator-Name}
(0)    -->
(0)     if ("%{client:Operator-Name}")  -> FALSE
(0)   } # operator-name.authorize operator-name.authorize = ok
(0)   [chap] = noop
(0)   [mschap] = noop
(0)  suffix : Checking for suffix after "@"
(0)  suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(0)  suffix : No such realm "NULL"
(0)   [suffix] = noop
(0)  eap : No EAP-Message, not doing EAP
(0)   [eap] = noop
rlm_ldap (ldap): Reserved connection (4)
(0)  ldap : EXPAND (uid=%{%{Stripped-User-Name}:-%{User-Name}})
(0)  ldap :    --> (uid=zz9930)
(0)  ldap : EXPAND dc=wayne,dc=edu
(0)  ldap :    --> dc=wayne,dc=edu
(0)  ldap : Performing search in 'dc=wayne,dc=edu' with filter '(uid=zz9930)', scope 'sub'
(0)  ldap : Waiting for search result...
(0)  ldap : User object found at DN "uid=zz9930,ou=People,dc=wayne,dc=edu"
(0)  ldap : Processing user attributes
(0)  ldap :     control:Password-With-Header += '{SSHA}US4ZGbcPi1X61YzS9qQX1cmjDLXdV1I8yiqWbw=='
rlm_ldap (ldap): Released connection (4)
(0)   [ldap] = ok
(0)   [expiration] = noop
(0)   [logintime] = noop
(0)   [pap] = updated
(0)  } #  authorize = updated
(0) Found Auth-Type = PAP
(0) # Executing group from file /etc/raddb/sites-enabled/default
(0)  Auth-Type PAP {
(0)  pap : Login attempt with password
(0)  pap : Comparing with "known-good" SSHA-Password
(0)  pap : Normalizing SSHA1-Password from base64 encoding, 40 bytes -> 28 bytes
(0)  pap : User authenticated successfully
(0)   [pap] = ok
(0)  } # Auth-Type PAP = ok
(0) # Executing section post-auth from file /etc/raddb/sites-enabled/default
(0)   post-auth {
(0)   [exec] = noop
(0)   remove_reply_message_if_eap remove_reply_message_if_eap {
(0)     if (&reply:EAP-Message && &reply:Reply-Message)
(0)     if (&reply:EAP-Message && &reply:Reply-Message)  -> FALSE
(0)    else else {
(0)     [noop] = noop
(0)    } # else else = noop
(0)   } # remove_reply_message_if_eap remove_reply_message_if_eap = noop
(0)  } #  post-auth = noop
(0) Sending Access-Accept packet to host 127.0.0.1 port 46670, id=209, length=0
Sending Access-Accept Id 209 from 127.0.0.1:1812 to 127.0.0.1:46670
(0) Finished request
Waking up in 0.3 seconds.
Waking up in 4.6 seconds.
(0) Cleaning up request packet ID 209 with timestamp +9
Ready to process requests

Running on RHEL 7.

radiusd: FreeRADIUS Version 3.0.4, for host x86_64-redhat-linux-gnu, built on Jan 17 2017 at 10:28:38
Copyright (C) 1999-2014 The FreeRADIUS server project and contributors

radius3 raddb]$ grep -v \# sites-available/default | grep -v ^$
server default {
listen {
        type = auth
        ipaddr = *
        port = 0
        limit {
              max_connections = 16
              lifetime = 0
              idle_timeout = 30
        }
}
listen {
        ipaddr = *
        port = 0
        type = acct
        limit {
        }
}
listen {
        type = auth
        port = 0
        limit {
              max_connections = 16
              lifetime = 0
              idle_timeout = 30
        }
}
listen {
        ipv6addr = ::
        port = 0
        type = acct
        limit {
        }
}
authorize {
        filter_username
        preprocess
        operator-name
        chap
        mschap
        suffix
        eap {
                ok = return
        }
        -sql
        ldap
        expiration
        logintime
        pap
}
authenticate {
        Auth-Type PAP {
                pap
        }
        eap
}
preacct {
        preprocess
        acct_unique
        suffix
        files
}
accounting {
        detail
        -sql
        exec
        attr_filter.accounting_response
}
session {
}
post-auth {
        -sql
        exec
        remove_reply_message_if_eap
        Post-Auth-Type REJECT {
                -sql
                attr_filter.access_reject
                eap
                remove_reply_message_if_eap
        }
}
pre-proxy {
}
post-proxy {
        eap
}
}

sudo radiusd -X
radiusd: FreeRADIUS Version 3.0.4, for host x86_64-redhat-linux-gnu, built on Jan 17 2017 at 10:28:38
Copyright (C) 1999-2014 The FreeRADIUS server project and contributors
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License
For more information about these matters, see the file named COPYRIGHT
Starting - reading configuration files ...
including dictionary file /usr/share/freeradius/dictionary
including dictionary file /usr/share/freeradius/dictionary.dhcp
including dictionary file /usr/share/freeradius/dictionary.vqp
including dictionary file /etc/raddb/dictionary
including configuration file /etc/raddb/radiusd.conf
including configuration file /etc/raddb/proxy.conf
including configuration file /etc/raddb/clients.conf
including files in directory /etc/raddb/mods-enabled/
including configuration file /etc/raddb/mods-enabled/always
including configuration file /etc/raddb/mods-enabled/attr_filter
including configuration file /etc/raddb/mods-enabled/cache_eap
including configuration file /etc/raddb/mods-enabled/chap
including configuration file /etc/raddb/mods-enabled/detail
including configuration file /etc/raddb/mods-enabled/detail.log
including configuration file /etc/raddb/mods-enabled/dhcp
including configuration file /etc/raddb/mods-enabled/digest
including configuration file /etc/raddb/mods-enabled/dynamic_clients
including configuration file /etc/raddb/mods-enabled/eap
including configuration file /etc/raddb/mods-enabled/echo
including configuration file /etc/raddb/mods-enabled/exec
including configuration file /etc/raddb/mods-enabled/expiration
including configuration file /etc/raddb/mods-enabled/expr
including configuration file /etc/raddb/mods-enabled/files
including configuration file /etc/raddb/mods-enabled/linelog
including configuration file /etc/raddb/mods-enabled/logintime
including configuration file /etc/raddb/mods-enabled/mschap
including configuration file /etc/raddb/mods-enabled/ntlm_auth
including configuration file /etc/raddb/mods-enabled/pap
including configuration file /etc/raddb/mods-enabled/passwd
including configuration file /etc/raddb/mods-enabled/preprocess
including configuration file /etc/raddb/mods-enabled/radutmp
including configuration file /etc/raddb/mods-enabled/realm
including configuration file /etc/raddb/mods-enabled/replicate
including configuration file /etc/raddb/mods-enabled/soh
including configuration file /etc/raddb/mods-enabled/sradutmp
including configuration file /etc/raddb/mods-enabled/unix
including configuration file /etc/raddb/mods-enabled/unpack
including configuration file /etc/raddb/mods-enabled/utf8
including configuration file /etc/raddb/mods-enabled/ldap
including files in directory /etc/raddb/policy.d/
including configuration file /etc/raddb/policy.d/accounting
including configuration file /etc/raddb/policy.d/canonicalization
including configuration file /etc/raddb/policy.d/control
including configuration file /etc/raddb/policy.d/cui
including configuration file /etc/raddb/policy.d/debug
including configuration file /etc/raddb/policy.d/dhcp
including configuration file /etc/raddb/policy.d/eap
including configuration file /etc/raddb/policy.d/operator-name
including configuration file /etc/raddb/policy.d/filter
including files in directory /etc/raddb/sites-enabled/
including configuration file /etc/raddb/sites-enabled/default
including configuration file /etc/raddb/sites-enabled/inner-tunnel
including configuration file /etc/raddb/sites-enabled/eduroam
main {
security {
        user = "radiusd"
        group = "radiusd"
        allow_core_dumps = no
}
}
main {
        name = "freeradius3"
        prefix = "/usr"
        localstatedir = "/var"
        sbindir = "/usr/sbin"
        logdir = "/var/log/radius"
        run_dir = "/var/run/freeradius3"
        libdir = "/usr/lib"
        radacctdir = "/var/log/radius/radacct"
        hostname_lookups = no
        max_request_time = 30
        cleanup_delay = 5
        max_requests = 16384
        pidfile = "/var/run/freeradius3/freeradius3.pid"
        checkrad = "/usr/sbin/checkrad"
        debug_level = 0
        proxy_requests = yes
log {
        stripped_names = no
        auth = no
        auth_badpass = no
        auth_goodpass = no
        colourise = yes
        msg_denied = "You are already logged in - access denied"
}
security {
        max_attributes = 200
        reject_delay = 1
        status_server = yes
}
}
radiusd: #### Loading Realms and Home Servers ####
proxy server {
        retry_delay = 5
        retry_count = 3
        default_fallback = no
        dead_time = 120
        wake_all_if_all_dead = no
}
home_server localhost {
        ipaddr = 127.0.0.1
        port = 1812
        type = "auth"
        secret = <<< secret >>>
        response_window = 20.000000
        response_timeouts = 1
        max_outstanding = 65536
        zombie_period = 40
        status_check = "status-server"
        ping_interval = 30
        check_interval = 30
        check_timeout = 4
        num_answers_to_alive = 3
        revive_interval = 120
  coa {
        irt = 2
        mrt = 16
        mrc = 5
        mrd = 30
  }
  limit {
        max_connections = 16
        max_requests = 0
        lifetime = 0
        idle_timeout = 0
  }
}
home_server tlrs1.eduroam.us {
        ipaddr = 64.57.22.74
        port = 1812
        type = "auth+acct"
        secret = <<< secret >>>
        response_window = 20.000000
        response_timeouts = 1
        max_outstanding = 65536
        zombie_period = 60
        status_check = "status-server"
        ping_interval = 30
        check_interval = 30
        check_timeout = 4
        num_answers_to_alive = 3
        revive_interval = 300
  coa {
        irt = 2
        mrt = 16
        mrc = 5
        mrd = 30
  }
  limit {
        max_connections = 16
        max_requests = 0
        lifetime = 0
        idle_timeout = 0
  }
}
home_server tlrs2.eduroam.us {
        ipaddr = 64.57.22.78
        port = 1812
        type = "auth+acct"
        secret = <<< secret >>>
        response_window = 20.000000
        response_timeouts = 1
        max_outstanding = 65536
        zombie_period = 60
        status_check = "status-server"
        ping_interval = 30
        check_interval = 30
        check_timeout = 4
        num_answers_to_alive = 3
        revive_interval = 300
  coa {
        irt = 2
        mrt = 16
        mrc = 5
        mrd = 30
  }
  limit {
        max_connections = 16
        max_requests = 0
        lifetime = 0
        idle_timeout = 0
  }
}
home_server_pool my_auth_failover {
        type = fail-over
        home_server = localhost
}
realm wayne.edu {
        auth_pool = my_auth_failover
Ignoring old-style configuration entry "authhost" in realm "wayne.edu"
}
realm LOCAL {
}
realm med.wayne.edu {
        authhost = rsa.med.wayne.edu:1738
        secret = AhnEAF6XgjkS28
}
realm EDUROAM {
}
home_server_pool EDUROAM_POOL {
        type = fail-over
        home_server = tlrs1.eduroam.us
        home_server = tlrs2.eduroam.us
}
radiusd: #### Loading Clients ####
client localhost {
        ipaddr = 127.0.0.1
        require_message_authenticator = no
        secret = <<< secret >>>
        nas_type = "other"
        proto = "*"
  limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
  }
}
client 141.217.4.0/24 {
        ipaddr = 141.217.4.0/24
        require_message_authenticator = no
        secret = <<< secret >>>
        shortname = "wayne-313"
  limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
  }
}
client 141.217.152.122 {
        ipaddr = 141.217.152.122
        require_message_authenticator = no
        secret = <<< secret >>>
        shortname = "wlan9.infra-w"
  limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
  }
}
client 64.57.22.74 {
        ipaddr = 64.57.22.74
        netmask = 32
        require_message_authenticator = no
        secret = <<< secret >>>
        shortname = "tlrs1.eduroam.us"
        virtual_server = "eduroam"
  limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
  }
}
'netmask' field found in client 64.57.22.74 is deprecated, use CIDR notation instead.  Please fix your configuration
Support for 'netmask' will be removed in a future release
client 64.57.22.78 {
        ipaddr = 64.57.22.78
        netmask = 32
        require_message_authenticator = no
        secret = <<< secret >>>
        shortname = "tlrs2.eduroam.us"
        virtual_server = "eduroam"
  limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
  }
}
'netmask' field found in client 64.57.22.78 is deprecated, use CIDR notation instead.  Please fix your configuration
Support for 'netmask' will be removed in a future release
radiusd: #### Instantiating modules ####
instantiate {
}
modules {
  # Loaded module rlm_always
  # Instantiating module "reject" from file /etc/raddb/mods-enabled/always
  always reject {
        rcode = "reject"
        simulcount = 0
        mpp = no
  }
  # Instantiating module "fail" from file /etc/raddb/mods-enabled/always
  always fail {
        rcode = "fail"
        simulcount = 0
        mpp = no
  }
  # Instantiating module "ok" from file /etc/raddb/mods-enabled/always
  always ok {
        rcode = "ok"
        simulcount = 0
        mpp = no
  }
  # Instantiating module "handled" from file /etc/raddb/mods-enabled/always
  always handled {
        rcode = "handled"
        simulcount = 0
        mpp = no
  }
  # Instantiating module "invalid" from file /etc/raddb/mods-enabled/always
  always invalid {
        rcode = "invalid"
        simulcount = 0
       mpp = no
  }
  # Instantiating module "userlock" from file /etc/raddb/mods-enabled/always
  always userlock {
        rcode = "userlock"
        simulcount = 0
        mpp = no
  }
  # Instantiating module "notfound" from file /etc/raddb/mods-enabled/always
  always notfound {
        rcode = "notfound"
        simulcount = 0
        mpp = no
  }
  # Instantiating module "noop" from file /etc/raddb/mods-enabled/always
  always noop {
        rcode = "noop"
        simulcount = 0
        mpp = no
  }
  # Instantiating module "updated" from file /etc/raddb/mods-enabled/always
  always updated {
        rcode = "updated"
        simulcount = 0
        mpp = no
  }
  # Loaded module rlm_attr_filter
  # Instantiating module "attr_filter.post-proxy" from file /etc/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.post-proxy {
        filename = "/etc/raddb/mods-config/attr_filter/post-proxy"
        key = "%{Realm}"
        relaxed = no
  }
reading pairlist file /etc/raddb/mods-config/attr_filter/post-proxy
  # Instantiating module "attr_filter.pre-proxy" from file /etc/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.pre-proxy {
        filename = "/etc/raddb/mods-config/attr_filter/pre-proxy"
        key = "%{Realm}"
        relaxed = no
  }
reading pairlist file /etc/raddb/mods-config/attr_filter/pre-proxy
  # Instantiating module "attr_filter.access_reject" from file /etc/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.access_reject {
        filename = "/etc/raddb/mods-config/attr_filter/access_reject"
        key = "%{User-Name}"
        relaxed = no
  }
reading pairlist file /etc/raddb/mods-config/attr_filter/access_reject
  # Instantiating module "attr_filter.access_challenge" from file /etc/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.access_challenge {
        filename = "/etc/raddb/mods-config/attr_filter/access_challenge"
        key = "%{User-Name}"
        relaxed = no
  }
reading pairlist file /etc/raddb/mods-config/attr_filter/access_challenge
  # Instantiating module "attr_filter.accounting_response" from file /etc/raddb/mods-enabled/attr_filter
  attr_filter attr_filter.accounting_response {
        filename = "/etc/raddb/mods-config/attr_filter/accounting_response"
        key = "%{User-Name}"
        relaxed = no
  }
reading pairlist file /etc/raddb/mods-config/attr_filter/accounting_response
  # Loaded module rlm_cache
  # Instantiating module "cache_eap" from file /etc/raddb/mods-enabled/cache_eap
  cache cache_eap {
        key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
        ttl = 15
        max_entries = 16384
        epoch = 0
        add_stats = no
  }
  # Loaded module rlm_chap
  # Instantiating module "chap" from file /etc/raddb/mods-enabled/chap
  # Loaded module rlm_detail
  # Instantiating module "detail" from file /etc/raddb/mods-enabled/detail
  detail {
        filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
        header = "%t"
        permissions = 384
        locking = no
        log_packet_header = no
  }
  # Instantiating module "auth_log" from file /etc/raddb/mods-enabled/detail.log
  detail auth_log {
        filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
        header = "%t"
        permissions = 384
        locking = no
        log_packet_header = no
  }
rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output
  # Instantiating module "reply_log" from file /etc/raddb/mods-enabled/detail.log
  detail reply_log {
        filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
        header = "%t"
        permissions = 384
        locking = no
        log_packet_header = no
  }
  # Instantiating module "pre_proxy_log" from file /etc/raddb/mods-enabled/detail.log
  detail pre_proxy_log {
        filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
        header = "%t"
        permissions = 384
        locking = no
        log_packet_header = no
  }
  # Instantiating module "post_proxy_log" from file /etc/raddb/mods-enabled/detail.log
  detail post_proxy_log {
        filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
        header = "%t"
        permissions = 384
        locking = no
        log_packet_header = no
  }
  # Loaded module rlm_dhcp
  # Instantiating module "dhcp" from file /etc/raddb/mods-enabled/dhcp
  # Loaded module rlm_digest
  # Instantiating module "digest" from file /etc/raddb/mods-enabled/digest
  # Loaded module rlm_dynamic_clients
  # Instantiating module "dynamic_clients" from file /etc/raddb/mods-enabled/dynamic_clients
  # Loaded module rlm_eap
  # Instantiating module "eap" from file /etc/raddb/mods-enabled/eap
  eap {
        default_eap_type = "peap"
        timer_expire = 60
        ignore_unknown_eap_types = no
        mod_accounting_username_bug = no
        max_sessions = 16384
  }
   # Linked to sub-module rlm_eap_md5
   # Linked to sub-module rlm_eap_leap
   # Linked to sub-module rlm_eap_gtc
   gtc {
        challenge = "Password: "
        auth_type = "PAP"
   }
   # Linked to sub-module rlm_eap_tls
   tls {
        tls = "tls-common"
   }
   tls-config tls-common {
        rsa_key_exchange = no
        dh_key_exchange = yes
        rsa_key_length = 512
        dh_key_length = 512
        verify_depth = 0
        ca_path = "/etc/raddb/certs"
        pem_file_type = yes
        private_key_file = "/etc/raddb/certs/server.pem"
        certificate_file = "/etc/raddb/certs/server.pem"
        ca_file = "/etc/raddb/certs/ca.pem"
        private_key_password = <<< secret >>>
        dh_file = "/etc/raddb/certs/dh"
        fragment_size = 1024
        include_length = yes
        check_crl = no
        cipher_list = "DEFAULT"
        ecdh_curve = "prime256v1"
    cache {
        enable = yes
        lifetime = 24
        max_entries = 255
    }
    verify {
    }
    ocsp {
        enable = no
        override_cert_url = yes
        url = "http://127.0.0.1/ocsp/"
        use_nonce = yes
        timeout = 0
        softfail = yes
    }
   }
  # Linked to sub-module rlm_eap_ttls
   ttls {
        tls = "tls-common"
        default_eap_type = "mschapv2"
        copy_request_to_tunnel = yes
        use_tunneled_reply = no
        virtual_server = "inner-tunnel"
        include_length = yes
        require_client_cert = no
   }
Using cached TLS configuration from previous invocation
   # Linked to sub-module rlm_eap_peap
   peap {
        tls = "tls-common"
        default_method = "mschapv2"
        copy_request_to_tunnel = yes
        use_tunneled_reply = yes
        proxy_tunneled_request_as_eap = yes
        virtual_server = "inner-tunnel"
        soh = no
        require_client_cert = no
   }
Using cached TLS configuration from previous invocation
   # Linked to sub-module rlm_eap_mschapv2
   mschapv2 {
        with_ntdomain_hack = no
        send_error = no
   }
  # Loaded module rlm_exec
  # Instantiating module "echo" from file /etc/raddb/mods-enabled/echo
  exec echo {
        wait = yes
        program = "/bin/echo %{User-Name}"
        input_pairs = "request"
        output_pairs = "reply"
        shell_escape = yes
  }
  # Instantiating module "exec" from file /etc/raddb/mods-enabled/exec
  exec {
        wait = no
        input_pairs = "request"
        shell_escape = yes
        timeout = 10
  }
  # Loaded module rlm_expiration
  # Instantiating module "expiration" from file /etc/raddb/mods-enabled/expiration
  # Loaded module rlm_expr
# Instantiating module "expr" from file /etc/raddb/mods-enabled/expr
  expr {
        safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  }
  # Loaded module rlm_files
  # Instantiating module "files" from file /etc/raddb/mods-enabled/files
  files {
        filename = "/etc/raddb/mods-config/files/authorize"
        usersfile = "/etc/raddb/mods-config/files/authorize"
        acctusersfile = "/etc/raddb/mods-config/files/accounting"
        preproxy_usersfile = "/etc/raddb/mods-config/files/pre-proxy"
        compat = "cistron"
  }
reading pairlist file /etc/raddb/mods-config/files/authorize
[/etc/raddb/mods-config/files/authorize]:87 Cistron compatibility checks for entry bob ...
[/etc/raddb/mods-config/files/authorize]:181 Cistron compatibility checks for entry DEFAULT ...
[/etc/raddb/mods-config/files/authorize]:188 Cistron compatibility checks for entry DEFAULT ...
[/etc/raddb/mods-config/files/authorize]:195 Cistron compatibility checks for entry DEFAULT ...
reading pairlist file /etc/raddb/mods-config/files/authorize
[/etc/raddb/mods-config/files/authorize]:87 Cistron compatibility checks for entry bob ...
[/etc/raddb/mods-config/files/authorize]:181 Cistron compatibility checks for entry DEFAULT ...
[/etc/raddb/mods-config/files/authorize]:188 Cistron compatibility checks for entry DEFAULT ...
[/etc/raddb/mods-config/files/authorize]:195 Cistron compatibility checks for entry DEFAULT ...
reading pairlist file /etc/raddb/mods-config/files/accounting
reading pairlist file /etc/raddb/mods-config/files/pre-proxy
  # Loaded module rlm_linelog
  # Instantiating module "linelog" from file /etc/raddb/mods-enabled/linelog
  linelog {
        filename = "/var/log/radius/linelog"
        permissions = 384
        format = "This is a log message for %{User-Name}"
        reference = "messages.%{%{Packet-Type}:-default}"
  }
  # Instantiating module "log_accounting" from file /etc/raddb/mods-enabled/linelog
  linelog log_accounting {
        filename = "/var/log/radius/linelog-accounting"
        permissions = 384
        format = ""
        reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
  }
  # Loaded module rlm_logintime
  # Instantiating module "logintime" from file /etc/raddb/mods-enabled/logintime
  logintime {
        minimum_timeout = 60
  }
  # Loaded module rlm_mschap
  # Instantiating module "mschap" from file /etc/raddb/mods-enabled/mschap
  mschap {
        use_mppe = yes
        require_encryption = no
        require_strong = no
        with_ntdomain_hack = yes
   passchange {
   }
        allow_retry = yes
  }
  # Instantiating module "ntlm_auth" from file /etc/raddb/mods-enabled/ntlm_auth
  exec ntlm_auth {
        wait = yes
       program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}"
        shell_escape = yes
  }
  # Loaded module rlm_pap
  # Instantiating module "pap" from file /etc/raddb/mods-enabled/pap
  pap {
        normalise = yes
  }
  # Loaded module rlm_passwd
  # Instantiating module "etc_passwd" from file /etc/raddb/mods-enabled/passwd
  passwd etc_passwd {
        filename = "/etc/passwd"
        format = "*User-Name:Crypt-Password:"
        delimiter = ":"
        ignore_nislike = no
        ignore_empty = yes
        allow_multiple_keys = no
        hash_size = 100
  }
rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
  # Loaded module rlm_preprocess
  # Instantiating module "preprocess" from file /etc/raddb/mods-enabled/preprocess
  preprocess {
        huntgroups = "/etc/raddb/mods-config/preprocess/huntgroups"
        hints = "/etc/raddb/mods-config/preprocess/hints"
        with_ascend_hack = no
        ascend_channels_per_line = 23
        with_ntdomain_hack = no
        with_specialix_jetstream_hack = no
        with_cisco_vsa_hack = no
       with_alvarion_vsa_hack = no
  }
reading pairlist file /etc/raddb/mods-config/preprocess/huntgroups
reading pairlist file /etc/raddb/mods-config/preprocess/hints
  # Loaded module rlm_radutmp
  # Instantiating module "radutmp" from file /etc/raddb/mods-enabled/radutmp
  radutmp {
        filename = "/var/log/radius/radutmp"
        username = "%{User-Name}"
        case_sensitive = yes
        check_with_nas = yes
        permissions = 384
        caller_id = yes
  }
  # Loaded module rlm_realm
  # Instantiating module "IPASS" from file /etc/raddb/mods-enabled/realm
  realm IPASS {
        format = "prefix"
        delimiter = "/"
        ignore_default = no
        ignore_null = no
  }
  # Instantiating module "suffix" from file /etc/raddb/mods-enabled/realm
  realm suffix {
        format = "suffix"
        delimiter = "@"
        ignore_default = no
        ignore_null = no
  }
  # Instantiating module "realmpercent" from file /etc/raddb/mods-enabled/realm
  realm realmpercent {
        format = "suffix"
        delimiter = "%"
        ignore_default = no
        ignore_null = no
  }
  # Instantiating module "ntdomain" from file /etc/raddb/mods-enabled/realm
  realm ntdomain {
        format = "prefix"
        delimiter = "\"
        ignore_default = no
        ignore_null = no
}
  # Loaded module rlm_replicate
  # Instantiating module "replicate" from file /etc/raddb/mods-enabled/replicate
  # Loaded module rlm_soh
  # Instantiating module "soh" from file /etc/raddb/mods-enabled/soh
  soh {
        dhcp = yes
  }
  # Instantiating module "sradutmp" from file /etc/raddb/mods-enabled/sradutmp
  radutmp sradutmp {
        filename = "/var/log/radius/sradutmp"
        username = "%{User-Name}"
        case_sensitive = yes
        check_with_nas = yes
        permissions = 420
        caller_id = no
  }
  # Loaded module rlm_unix
  # Instantiating module "unix" from file /etc/raddb/mods-enabled/unix
  unix {
        radwtmp = "/var/log/radius/radwtmp"
  }
  # Loaded module rlm_unpack
  # Instantiating module "unpack" from file /etc/raddb/mods-enabled/unpack
  # Loaded module rlm_utf8
  # Instantiating module "utf8" from file /etc/raddb/mods-enabled/utf8
  # Loaded module rlm_ldap
  # Instantiating module "ldap" from file /etc/raddb/mods-enabled/ldap
  ldap {
        server = "ldap.wayne.edu"
        port = 389
        password = <<< secret >>>
        identity = "cn=Script Manager,ou=System Groups,ou=Groups,dc=wayne,dc=edu"
   user {
        filter = "(uid=%{%{Stripped-User-Name}:-%{User-Name}})"
        scope = "sub"
        base_dn = "dc=wayne,dc=edu"
        access_positive = yes
   }
   group {
        filter = "(objectClass=posixGroup)"
        scope = "sub"
        base_dn = "dc=wayne,dc=edu"
        name_attribute = "cn"
        membership_attribute = "memberOf"
        cacheable_name = no
        cacheable_dn = no
   }
   client {
        filter = "(objectClass=frClient)"
        scope = "sub"
        base_dn = "dc=wayne,dc=edu"
    attribute {
        identifier = "radiusClientIdentifier"
        shortname = "cn"
        secret = "radiusClientSecret"
    }
   }
   profile {
        filter = "(&)"
   }
   options {
        ldap_debug = 40
        chase_referrals = yes
        rebind = yes
        net_timeout = 1
        res_timeout = 20
        srv_timelimit = 20
        idle = 60
        probes = 3
        interval = 3
   }
   tls {
        start_tls = no
   }
  }
rlm_ldap: Falling back to build time libldap version info.  Query for LDAP_OPT_API_INFO returned: -1
rlm_ldap: libldap vendor: OpenLDAP version: 20440
   accounting {
        reference = "%{tolower:type.%{Acct-Status-Type}}"
   }
   post-auth {
        reference = "."
   }
rlm_ldap (ldap): Initialising connection pool
   pool {
        start = 5
        min = 4
        max = 32
        spare = 3
        uses = 0
        lifetime = 0
        cleanup_interval = 30
        idle_timeout = 60
        retry_delay = 1
        spread = no
   }
rlm_ldap (ldap): Opening additional connection (0)
rlm_ldap (ldap): Connecting to ldap.wayne.edu:389
rlm_ldap (ldap): Waiting for bind result...
rlm_ldap (ldap): Bind successful
rlm_ldap (ldap): Opening additional connection (1)
rlm_ldap (ldap): Connecting to ldap.wayne.edu:389
rlm_ldap (ldap): Waiting for bind result...
rlm_ldap (ldap): Bind successful
rlm_ldap (ldap): Opening additional connection (2)
rlm_ldap (ldap): Connecting to ldap.wayne.edu:389
rlm_ldap (ldap): Waiting for bind result...
rlm_ldap (ldap): Bind successful
rlm_ldap (ldap): Opening additional connection (3)
rlm_ldap (ldap): Connecting to ldap.wayne.edu:389
rlm_ldap (ldap): Waiting for bind result...
rlm_ldap (ldap): Bind successful
rlm_ldap (ldap): Opening additional connection (4)
rlm_ldap (ldap): Connecting to ldap.wayne.edu:389
rlm_ldap (ldap): Waiting for bind result...
rlm_ldap (ldap): Bind successful
} # modules
radiusd: #### Loading Virtual Servers ####
server { # from file /etc/raddb/radiusd.conf
} # server
server default { # from file /etc/raddb/sites-enabled/default
# Loading authenticate {...}
# Loading authorize {...}
Ignoring "sql" (see raddb/mods-available/README.rst)
# Loading preacct {...}
# Loading accounting {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server default
server inner-tunnel { # from file /etc/raddb/sites-enabled/inner-tunnel
# Loading authenticate {...}
# Loading authorize {...}
# Loading session {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server inner-tunnel
server eduroam { # from file /etc/raddb/sites-enabled/eduroam
# Creating Auth-Type = digest
# Loading authenticate {...}
# Loading authorize {...}
# Loading preacct {...}
# Loading accounting {...}
# Loading post-auth {...}
} # server eduroam
radiusd: #### Opening IP addresses and Ports ####
listen {
        type = "auth"
        ipaddr = *
        port = 0
   limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
   }
}
listen {
        type = "acct"
        ipaddr = *
        port = 0
   limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
   }
}
listen {
        type = "auth"
        ipv6addr = ::
        port = 0
   limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
   }
}
listen {
        type = "acct"
        ipv6addr = ::
        port = 0
   limit {
        max_connections = 16
        lifetime = 0
        idle_timeout = 30
   }
}
listen {
        type = "auth"
        ipaddr = 127.0.0.1
        port = 18120
}
Listening on auth address * port 1812 as server default
Listening on acct address * port 1813 as server default
Listening on auth address :: port 1812 as server default
Listening on acct address :: port 1813 as server default
Listening on auth address 127.0.0.1 port 18120 as server inner-tunnel
Opening new proxy socket 'proxy address * port 0'
Listening on proxy address * port 60291
Ready to process requests









Received Access-Request Id 248 from 141.217.152.122:53954 to 141.217.0.164:1812 length 157
        User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        EAP-Message = 0x0201000b017a7a39393330
        Message-Authenticator = 0x4af7ae30469b98ebfd106d14fe0f10da
(0) Received Access-Request packet from host 141.217.152.122 port 53954, id=248, length=157
(0)     User-Name = 'zz9930'
(0)     NAS-IP-Address = 141.217.152.122
(0)     NAS-Port = 18433
(0)     Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
(0)     Calling-Station-Id = '00-22-5F-40-98-BA'
(0)     Framed-MTU = 1250
(0)     NAS-Port-Type = Wireless-802.11
(0)     Framed-Compression = None
(0)     Connect-Info = 'CONNECT 802.11b/g'
(0)     Chargeable-User-Identity = 0x00
(0)     EAP-Message = 0x0201000b017a7a39393330
(0)     Message-Authenticator = 0x4af7ae30469b98ebfd106d14fe0f10da
(0) # Executing section authorize from file /etc/raddb/sites-enabled/default
(0)   authorize {
(0)   filter_username filter_username {
(0)     if (!&User-Name)
(0)     if (!&User-Name)  -> FALSE
(0)     if (&User-Name =~ / /)
(0)     if (&User-Name =~ / /)  -> FALSE
(0)     if (&User-Name =~ /@.*@/ )
(0)     if (&User-Name =~ /@.*@/ )  -> FALSE
(0)     if (&User-Name =~ /\\.\\./ )
(0)     if (&User-Name =~ /\\.\\./ )  -> FALSE
(0)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))
(0)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))   -> FALSE
(0)     if (&User-Name =~ /\\.$/)
(0)     if (&User-Name =~ /\\.$/)   -> FALSE
(0)     if (&User-Name =~ /@\\./)
(0)     if (&User-Name =~ /@\\./)   -> FALSE
(0)   } # filter_username filter_username = notfound
(0)   [preprocess] = ok
(0)   operator-name.authorize operator-name.authorize {
(0)     if ("%{client:Operator-Name}")
(0) Client does not contain config item "Operator-Name"
(0) EXPAND %{client:Operator-Name}
(0)    -->
(0)     if ("%{client:Operator-Name}")  -> FALSE
(0)   } # operator-name.authorize operator-name.authorize = ok
(0)   [chap] = noop
(0)   [mschap] = noop
(0)  suffix : Checking for suffix after "@"
(0)  suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(0)  suffix : No such realm "NULL"
(0)   [suffix] = noop
(0)  eap : Peer sent code Response (2) ID 1 length 11
(0)  eap : EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
(0)   [eap] = ok
(0)  } #  authorize = ok
(0) Found Auth-Type = EAP
(0) # Executing group from file /etc/raddb/sites-enabled/default
(0)   authenticate {
(0)  eap : Peer sent method Identity (1)
(0)  eap : Calling eap_peap to process EAP data
(0)  eap_peap : Flushing SSL sessions (of #0)
(0)  eap_peap : Initiate
(0)  eap_peap : Start returned 1
(0)  eap : New EAP session, adding 'State' attribute to reply 0xa7933f27a7912648
(0)   [eap] = handled
(0)  } #  authenticate = handled
(0) Sending Access-Challenge packet to host 141.217.152.122 port 53954, id=248, length=0
(0)     EAP-Message = 0x010200061920
(0)     Message-Authenticator = 0x00000000000000000000000000000000
(0)     State = 0xa7933f27a79126486172f883c9cea508
Sending Access-Challenge Id 248 from 141.217.0.164:1812 to 141.217.152.122:53954
        EAP-Message = 0x010200061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xa7933f27a79126486172f883c9cea508
(0) Finished request
Waking up in 0.3 seconds.
Received Access-Request Id 249 from 141.217.152.122:53954 to 141.217.0.164:1812 length 273
        User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        EAP-Message = 0x0202006d198000000063160301005e0100005a0301590a60529d8e36c76692ebfa6a46b2e1efb66cc8299ba112b6c9f410c9384ed3000018c014c0130035002fc00ac00900380032000a00130005000401000019000a0006000400170018000b0002010000170000ff01000100
        State = 0xa7933f27a79126486172f883c9cea508
        Message-Authenticator = 0xe42d476f007c2144fba80895748be48c
(1) Received Access-Request packet from host 141.217.152.122 port 53954, id=249, length=273
(1)     User-Name = 'zz9930'
(1)     NAS-IP-Address = 141.217.152.122
(1)     NAS-Port = 18433
(1)     Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
(1)     Calling-Station-Id = '00-22-5F-40-98-BA'
(1)     Framed-MTU = 1250
(1)     NAS-Port-Type = Wireless-802.11
(1)     Framed-Compression = None
(1)     Connect-Info = 'CONNECT 802.11b/g'
(1)     Chargeable-User-Identity = 0x00
(1)     EAP-Message = 0x0202006d198000000063160301005e0100005a0301590a60529d8e36c76692ebfa6a46b2e1efb66cc8299ba112b6c9f410c9384ed3000018c014c0130035002fc00ac00900380032000a00130005000401000019000a0006000400170018000b0002010000170000ff01000100
(1)     State = 0xa7933f27a79126486172f883c9cea508
(1)     Message-Authenticator = 0xe42d476f007c2144fba80895748be48c
(1) # Executing section authorize from file /etc/raddb/sites-enabled/default
(1)   authorize {
(1)   filter_username filter_username {
(1)     if (!&User-Name)
(1)     if (!&User-Name)  -> FALSE
(1)     if (&User-Name =~ / /)
(1)     if (&User-Name =~ / /)  -> FALSE
(1)     if (&User-Name =~ /@.*@/ )
(1)     if (&User-Name =~ /@.*@/ )  -> FALSE
(1)     if (&User-Name =~ /\\.\\./ )
(1)     if (&User-Name =~ /\\.\\./ )  -> FALSE
(1)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))
(1)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))   -> FALSE
(1)     if (&User-Name =~ /\\.$/)
(1)     if (&User-Name =~ /\\.$/)   -> FALSE
(1)     if (&User-Name =~ /@\\./)
(1)     if (&User-Name =~ /@\\./)   -> FALSE
(1)   } # filter_username filter_username = notfound
(1)   [preprocess] = ok
(1)   operator-name.authorize operator-name.authorize {
(1)     if ("%{client:Operator-Name}")
(1) Client does not contain config item "Operator-Name"
(1) EXPAND %{client:Operator-Name}
(1)    -->
(1)     if ("%{client:Operator-Name}")  -> FALSE
(1)   } # operator-name.authorize operator-name.authorize = ok
(1)   [chap] = noop
(1)   [mschap] = noop
(1)  suffix : Checking for suffix after "@"
(1)  suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(1)  suffix : No such realm "NULL"
(1)   [suffix] = noop
(1)  eap : Peer sent code Response (2) ID 2 length 109
(1)  eap : Continuing tunnel setup
(1)   [eap] = ok
(1)  } #  authorize = ok
(1) Found Auth-Type = EAP
(1) # Executing group from file /etc/raddb/sites-enabled/default
(1)   authenticate {
(1)  eap : Expiring EAP session with state 0xa7933f27a7912648
(1)  eap : Finished EAP session with state 0xa7933f27a7912648
(1)  eap : Previous EAP request found for state 0xa7933f27a7912648, released from the list
(1)  eap : Peer sent method PEAP (25)
(1)  eap : EAP PEAP (25)
(1)  eap : Calling eap_peap to process EAP data
(1)  eap_peap : processing EAP-TLS
  TLS Length 99
(1)  eap_peap : Length Included
(1)  eap_peap : eaptls_verify returned 11
(1)  eap_peap : (other): before/accept initialization
(1)  eap_peap : TLS_accept: before/accept initialization
(1)  eap_peap : <<< TLS 1.0 Handshake [length 005e], ClientHello
(1)  eap_peap : TLS_accept: SSLv3 read client hello A
(1)  eap_peap : >>> TLS 1.0 Handshake [length 0059], ServerHello
(1)  eap_peap : TLS_accept: SSLv3 write server hello A
(1)  eap_peap : >>> TLS 1.0 Handshake [length 08d0], Certificate
(1)  eap_peap : TLS_accept: SSLv3 write certificate A
(1)  eap_peap : >>> TLS 1.0 Handshake [length 014b], ServerKeyExchange
(1)  eap_peap : TLS_accept: SSLv3 write key exchange A
(1)  eap_peap : >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
(1)  eap_peap : TLS_accept: SSLv3 write server done A
(1)  eap_peap : TLS_accept: SSLv3 flush data
(1)  eap_peap : TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
(1)  eap_peap : eaptls_process returned 13
(1)  eap_peap : FR_TLS_HANDLED
(1)  eap : New EAP session, adding 'State' attribute to reply 0xa7933f27a6902648
(1)   [eap] = handled
(1)  } #  authenticate = handled
(1) Sending Access-Challenge packet to host 141.217.152.122 port 53954, id=249, length=0
(1)     EAP-Message = 0x010303ec19c000000a8c1603010059020000550301590a604d08c5041bea710c56b17e3d8ca211b86752fd78123b6c653d24685e99201d69cd59382c1a906f18f235954d3f197e12772ac9e6f0d322e9ef69ea577c87c01400000dff01000100000b00040300010216030108d00b0008cc0008c90003de308203da308202c2a003020102020101300d06092a864886f70d01010b0500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f72697479301e170d3137303432303132353530325a170d3137303631393132353530325a307c310b3009060355040613024652310f300d0603550408130652616469757331153013060355040a130c4578616d706c6520496e632e312330210603550403131a4578616d706c65205365727665722043657274696669636174653120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d30820122300d06092a864886f70d01010105000382010f003082010a0282010100ad1a6e0b69866ab9f349b649
(1)     Message-Authenticator = 0x00000000000000000000000000000000
(1)     State = 0xa7933f27a69026486172f883c9cea508
Sending Access-Challenge Id 249 from 141.217.0.164:1812 to 141.217.152.122:53954
        EAP-Message = 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
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xa7933f27a69026486172f883c9cea508
(1) Finished request
Waking up in 0.2 seconds.
Received Access-Request Id 250 from 141.217.152.122:53954 to 141.217.0.164:1812 length 170
        User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        EAP-Message = 0x020300061900
       State = 0xa7933f27a69026486172f883c9cea508
        Message-Authenticator = 0x74eb735f68854de96428bfbcc4f37892
(2) Received Access-Request packet from host 141.217.152.122 port 53954, id=250, length=170
(2)     User-Name = 'zz9930'
(2)     NAS-IP-Address = 141.217.152.122
(2)     NAS-Port = 18433
(2)     Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
(2)     Calling-Station-Id = '00-22-5F-40-98-BA'
(2)     Framed-MTU = 1250
(2)     NAS-Port-Type = Wireless-802.11
(2)     Framed-Compression = None
(2)     Connect-Info = 'CONNECT 802.11b/g'
(2)     Chargeable-User-Identity = 0x00
(2)     EAP-Message = 0x020300061900
(2)     State = 0xa7933f27a69026486172f883c9cea508
(2)     Message-Authenticator = 0x74eb735f68854de96428bfbcc4f37892
(2) # Executing section authorize from file /etc/raddb/sites-enabled/default
(2)   authorize {
(2)   filter_username filter_username {
(2)     if (!&User-Name)
(2)     if (!&User-Name)  -> FALSE
(2)     if (&User-Name =~ / /)
(2)     if (&User-Name =~ / /)  -> FALSE
(2)     if (&User-Name =~ /@.*@/ )
(2)     if (&User-Name =~ /@.*@/ )  -> FALSE
(2)     if (&User-Name =~ /\\.\\./ )
(2)     if (&User-Name =~ /\\.\\./ )  -> FALSE
(2)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))
(2)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))   -> FALSE
(2)     if (&User-Name =~ /\\.$/)
(2)     if (&User-Name =~ /\\.$/)   -> FALSE
(2)     if (&User-Name =~ /@\\./)
(2)     if (&User-Name =~ /@\\./)   -> FALSE
(2)   } # filter_username filter_username = notfound
(2)   [preprocess] = ok
(2)   operator-name.authorize operator-name.authorize {
(2)     if ("%{client:Operator-Name}")
(2) Client does not contain config item "Operator-Name"
(2) EXPAND %{client:Operator-Name}
(2)    -->
(2)     if ("%{client:Operator-Name}")  -> FALSE
(2)   } # operator-name.authorize operator-name.authorize = ok
(2)   [chap] = noop
(2)   [mschap] = noop
(2)  suffix : Checking for suffix after "@"
(2)  suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(2)  suffix : No such realm "NULL"
(2)   [suffix] = noop
(2)  eap : Peer sent code Response (2) ID 3 length 6
(2)  eap : Continuing tunnel setup
(2)   [eap] = ok
(2)  } #  authorize = ok
(2) Found Auth-Type = EAP
(2) # Executing group from file /etc/raddb/sites-enabled/default
(2)   authenticate {
(2)  eap : Expiring EAP session with state 0xa7933f27a6902648
(2)  eap : Finished EAP session with state 0xa7933f27a6902648
(2)  eap : Previous EAP request found for state 0xa7933f27a6902648, released from the list
(2)  eap : Peer sent method PEAP (25)
(2)  eap : EAP PEAP (25)
(2)  eap : Calling eap_peap to process EAP data
(2)  eap_peap : processing EAP-TLS
(2)  eap_peap : Received TLS ACK
(2)  eap_peap : Received TLS ACK
(2)  eap_peap : ACK handshake fragment handler
(2)  eap_peap : eaptls_verify returned 1
(2)  eap_peap : eaptls_process returned 13
(2)  eap_peap : FR_TLS_HANDLED
(2)  eap : New EAP session, adding 'State' attribute to reply 0xa7933f27a5972648
(2)   [eap] = handled
(2)  } #  authenticate = handled
(2) Sending Access-Challenge packet to host 141.217.152.122 port 53954, id=250, length=0
(2)     EAP-Message = 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
(2)     Message-Authenticator = 0x00000000000000000000000000000000
(2)     State = 0xa7933f27a59726486172f883c9cea508
Sending Access-Challenge Id 250 from 141.217.0.164:1812 to 141.217.152.122:53954
        EAP-Message = 0x010403e819409846d3ac50ad5228e05c2004c7dfbdeaa014f525d76d1dd0307f64fd4be8a49daf8089551b7ca2591c872815385c0a92946bb34a72dfd837e983c53e3743a57947e94f67adabe5cc6759298cd282f297562ee81b6a341ac67dd2690be2656b2af7b84f9dc23896c8a00004e5308204e1308203c9a003020102020900f47a975a719121d1300d06092a864886f70d0101050500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f72697479301e170d3137303432303132353530325a170d3137303631393132353530325a308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f7269747930820122300d06092a864886f70d0101010
       Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xa7933f27a59726486172f883c9cea508
(2) Finished request
Waking up in 0.2 seconds.
Received Access-Request Id 251 from 141.217.152.122:53954 to 141.217.0.164:1812 length 170
       User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        EAP-Message = 0x020400061900
        State = 0xa7933f27a59726486172f883c9cea508
        Message-Authenticator = 0xafbca4b22ce24d0364825cfb90817336
(3) Received Access-Request packet from host 141.217.152.122 port 53954, id=251, length=170
(3)     User-Name = 'zz9930'
(3)     NAS-IP-Address = 141.217.152.122
(3)     NAS-Port = 18433
(3)     Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
(3)     Calling-Station-Id = '00-22-5F-40-98-BA'
(3)     Framed-MTU = 1250
(3)     NAS-Port-Type = Wireless-802.11
(3)     Framed-Compression = None
(3)     Connect-Info = 'CONNECT 802.11b/g'
(3)     Chargeable-User-Identity = 0x00
(3)     EAP-Message = 0x020400061900
(3)     State = 0xa7933f27a59726486172f883c9cea508
(3)     Message-Authenticator = 0xafbca4b22ce24d0364825cfb90817336
(3) # Executing section authorize from file /etc/raddb/sites-enabled/default
(3)   authorize {
(3)   filter_username filter_username {
(3)     if (!&User-Name)
(3)     if (!&User-Name)  -> FALSE
(3)     if (&User-Name =~ / /)
(3)     if (&User-Name =~ / /)  -> FALSE
(3)     if (&User-Name =~ /@.*@/ )
(3)     if (&User-Name =~ /@.*@/ )  -> FALSE
(3)     if (&User-Name =~ /\\.\\./ )
(3)     if (&User-Name =~ /\\.\\./ )  -> FALSE
(3)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))
(3)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))   -> FALSE
(3)     if (&User-Name =~ /\\.$/)
(3)     if (&User-Name =~ /\\.$/)   -> FALSE
(3)     if (&User-Name =~ /@\\./)
(3)     if (&User-Name =~ /@\\./)   -> FALSE
(3)   } # filter_username filter_username = notfound
(3)   [preprocess] = ok
(3)   operator-name.authorize operator-name.authorize {
(3)     if ("%{client:Operator-Name}")
(3) Client does not contain config item "Operator-Name"
(3) EXPAND %{client:Operator-Name}
(3)    -->
(3)     if ("%{client:Operator-Name}")  -> FALSE
(3)   } # operator-name.authorize operator-name.authorize = ok
(3)   [chap] = noop
(3)   [mschap] = noop
(3)  suffix : Checking for suffix after "@"
(3)  suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(3)  suffix : No such realm "NULL"
(3)   [suffix] = noop
(3)  eap : Peer sent code Response (2) ID 4 length 6
(3)  eap : Continuing tunnel setup
(3)   [eap] = ok
(3)  } #  authorize = ok
(3) Found Auth-Type = EAP
(3) # Executing group from file /etc/raddb/sites-enabled/default
(3)   authenticate {
(3)  eap : Expiring EAP session with state 0xa7933f27a5972648
(3)  eap : Finished EAP session with state 0xa7933f27a5972648
(3)  eap : Previous EAP request found for state 0xa7933f27a5972648, released from the list
(3)  eap : Peer sent method PEAP (25)
(3)  eap : EAP PEAP (25)
(3)  eap : Calling eap_peap to process EAP data
(3)  eap_peap : processing EAP-TLS
(3)  eap_peap : Received TLS ACK
(3)  eap_peap : Received TLS ACK
(3)  eap_peap : ACK handshake fragment handler
(3)  eap_peap : eaptls_verify returned 1
(3)  eap_peap : eaptls_process returned 13
(3)  eap_peap : FR_TLS_HANDLED
(3)  eap : New EAP session, adding 'State' attribute to reply 0xa7933f27a4962648
(3)   [eap] = handled
(3)  } #  authenticate = handled
(3) Sending Access-Challenge packet to host 141.217.152.122 port 53954, id=251, length=0
(3)     EAP-Message = 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
(3)     Message-Authenticator = 0x00000000000000000000000000000000
(3)     State = 0xa7933f27a49626486172f883c9cea508
Sending Access-Challenge Id 251 from 141.217.0.164:1812 to 141.217.152.122:53954
        EAP-Message = 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
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xa7933f27a49626486172f883c9cea508
(3) Finished request
Waking up in 0.2 seconds.
Received Access-Request Id 252 from 141.217.152.122:53954 to 141.217.0.164:1812 length 308
        User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        EAP-Message = 0x02050090198000000086160301004610000042410499eea29feacdfdd0ca9bd381141ed49629fbde40954f1e75cc17fdc9d5ffd7c6d431f2c743feb20057c07a5821f3b4abe4cba156a387a38397d74b1c1a0d502b14030100010116030100301221a05db58de5e73e5385b2a253efc91da869175fe9f2aa2d1b2e3237e3c712d2df1077d30534f2351e8034b0aa8f2b
        State = 0xa7933f27a49626486172f883c9cea508
        Message-Authenticator = 0xbb8deb078409de6add57bd6b0074acc3
(4) Received Access-Request packet from host 141.217.152.122 port 53954, id=252, length=308
(4)     User-Name = 'zz9930'
(4)     NAS-IP-Address = 141.217.152.122
(4)     NAS-Port = 18433
(4)     Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
(4)     Calling-Station-Id = '00-22-5F-40-98-BA'
(4)     Framed-MTU = 1250
(4)     NAS-Port-Type = Wireless-802.11
(4)     Framed-Compression = None
(4)     Connect-Info = 'CONNECT 802.11b/g'
(4)     Chargeable-User-Identity = 0x00
(4)     EAP-Message = 0x02050090198000000086160301004610000042410499eea29feacdfdd0ca9bd381141ed49629fbde40954f1e75cc17fdc9d5ffd7c6d431f2c743feb20057c07a5821f3b4abe4cba156a387a38397d74b1c1a0d502b14030100010116030100301221a05db58de5e73e5385b2a253efc91da869175fe9f2aa2d1b2e3237e3c712d2df1077d30534f2351e8034b0aa8f2b
(4)     State = 0xa7933f27a49626486172f883c9cea508
(4)     Message-Authenticator = 0xbb8deb078409de6add57bd6b0074acc3
(4) # Executing section authorize from file /etc/raddb/sites-enabled/default
(4)   authorize {
(4)   filter_username filter_username {
(4)     if (!&User-Name)
(4)     if (!&User-Name)  -> FALSE
(4)     if (&User-Name =~ / /)
(4)     if (&User-Name =~ / /)  -> FALSE
(4)     if (&User-Name =~ /@.*@/ )
(4)     if (&User-Name =~ /@.*@/ )  -> FALSE
(4)     if (&User-Name =~ /\\.\\./ )
(4)     if (&User-Name =~ /\\.\\./ )  -> FALSE
(4)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))
(4)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))   -> FALSE
(4)     if (&User-Name =~ /\\.$/)
(4)     if (&User-Name =~ /\\.$/)   -> FALSE
(4)     if (&User-Name =~ /@\\./)
(4)     if (&User-Name =~ /@\\./)   -> FALSE
(4)   } # filter_username filter_username = notfound
(4)   [preprocess] = ok
(4)   operator-name.authorize operator-name.authorize {
(4)     if ("%{client:Operator-Name}")
(4) Client does not contain config item "Operator-Name"
(4) EXPAND %{client:Operator-Name}
(4)    -->
(4)     if ("%{client:Operator-Name}")  -> FALSE
(4)   } # operator-name.authorize operator-name.authorize = ok
(4)   [chap] = noop
(4)   [mschap] = noop
(4)  suffix : Checking for suffix after "@"
(4)  suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(4)  suffix : No such realm "NULL"
(4)   [suffix] = noop
(4)  eap : Peer sent code Response (2) ID 5 length 144
(4)  eap : Continuing tunnel setup
(4)   [eap] = ok
(4)  } #  authorize = ok
(4) Found Auth-Type = EAP
(4) # Executing group from file /etc/raddb/sites-enabled/default
(4)   authenticate {
(4)  eap : Expiring EAP session with state 0xa7933f27a4962648
(4)  eap : Finished EAP session with state 0xa7933f27a4962648
(4)  eap : Previous EAP request found for state 0xa7933f27a4962648, released from the list
(4)  eap : Peer sent method PEAP (25)
(4)  eap : EAP PEAP (25)
(4)  eap : Calling eap_peap to process EAP data
(4)  eap_peap : processing EAP-TLS
  TLS Length 134
(4)  eap_peap : Length Included
(4)  eap_peap : eaptls_verify returned 11
(4)  eap_peap : <<< TLS 1.0 Handshake [length 0046], ClientKeyExchange
(4)  eap_peap : TLS_accept: SSLv3 read client key exchange A
(4)  eap_peap : <<< TLS 1.0 ChangeCipherSpec [length 0001]
(4)  eap_peap : <<< TLS 1.0 Handshake [length 0010], Finished
(4)  eap_peap : TLS_accept: SSLv3 read finished A
(4)  eap_peap : >>> TLS 1.0 ChangeCipherSpec [length 0001]
(4)  eap_peap : TLS_accept: SSLv3 write change cipher spec A
(4)  eap_peap : >>> TLS 1.0 Handshake [length 0010], Finished
(4)  eap_peap : TLS_accept: SSLv3 write finished A
(4)  eap_peap : TLS_accept: SSLv3 flush data
  SSL: adding session 1d69cd59382c1a906f18f235954d3f197e12772ac9e6f0d322e9ef69ea577c87 to cache
(4)  eap_peap : (other): SSL negotiation finished successfully
SSL Connection Established
(4)  eap_peap : eaptls_process returned 13
(4)  eap_peap : FR_TLS_HANDLED
(4)  eap : New EAP session, adding 'State' attribute to reply 0xa7933f27a3952648
(4)   [eap] = handled
(4)  } #  authenticate = handled
(4) Sending Access-Challenge packet to host 141.217.152.122 port 53954, id=252, length=0
(4)     EAP-Message = 0x010600411900140301000101160301003097a7683d2e358052cec282d0c8d85b7d7f05c147c9e65214bca51c7057343c09e5c7e9b0d1abceb8e5cea1ed1718015a
(4)     Message-Authenticator = 0x00000000000000000000000000000000
(4)     State = 0xa7933f27a39526486172f883c9cea508
Sending Access-Challenge Id 252 from 141.217.0.164:1812 to 141.217.152.122:53954
        EAP-Message = 0x010600411900140301000101160301003097a7683d2e358052cec282d0c8d85b7d7f05c147c9e65214bca51c7057343c09e5c7e9b0d1abceb8e5cea1ed1718015a
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xa7933f27a39526486172f883c9cea508
(4) Finished request
Waking up in 0.1 seconds.
Received Access-Request Id 253 from 141.217.152.122:53954 to 141.217.0.164:1812 length 170
        User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        EAP-Message = 0x020600061900
        State = 0xa7933f27a39526486172f883c9cea508
        Message-Authenticator = 0x1194a95cbc44bbe03dc430beccdea9e4
(5) Received Access-Request packet from host 141.217.152.122 port 53954, id=253, length=170
(5)     User-Name = 'zz9930'
(5)     NAS-IP-Address = 141.217.152.122
(5)     NAS-Port = 18433
(5)     Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
(5)     Calling-Station-Id = '00-22-5F-40-98-BA'
(5)     Framed-MTU = 1250
(5)     NAS-Port-Type = Wireless-802.11
(5)     Framed-Compression = None
(5)     Connect-Info = 'CONNECT 802.11b/g'
(5)     Chargeable-User-Identity = 0x00
(5)     EAP-Message = 0x020600061900
(5)     State = 0xa7933f27a39526486172f883c9cea508
(5)     Message-Authenticator = 0x1194a95cbc44bbe03dc430beccdea9e4
(5) # Executing section authorize from file /etc/raddb/sites-enabled/default
(5)   authorize {
(5)   filter_username filter_username {
(5)     if (!&User-Name)
(5)     if (!&User-Name)  -> FALSE
(5)     if (&User-Name =~ / /)
(5)     if (&User-Name =~ / /)  -> FALSE
(5)     if (&User-Name =~ /@.*@/ )
(5)     if (&User-Name =~ /@.*@/ )  -> FALSE
(5)     if (&User-Name =~ /\\.\\./ )
(5)     if (&User-Name =~ /\\.\\./ )  -> FALSE
(5)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))
(5)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))   -> FALSE
(5)     if (&User-Name =~ /\\.$/)
(5)     if (&User-Name =~ /\\.$/)   -> FALSE
(5)     if (&User-Name =~ /@\\./)
(5)     if (&User-Name =~ /@\\./)   -> FALSE
(5)   } # filter_username filter_username = notfound
(5)   [preprocess] = ok
(5)   operator-name.authorize operator-name.authorize {
(5)     if ("%{client:Operator-Name}")
(5) Client does not contain config item "Operator-Name"
(5) EXPAND %{client:Operator-Name}
(5)    -->
(5)     if ("%{client:Operator-Name}")  -> FALSE
(5)   } # operator-name.authorize operator-name.authorize = ok
(5)   [chap] = noop
(5)   [mschap] = noop
(5)  suffix : Checking for suffix after "@"
(5)  suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(5)  suffix : No such realm "NULL"
(5)   [suffix] = noop
(5)  eap : Peer sent code Response (2) ID 6 length 6
(5)  eap : Continuing tunnel setup
(5)   [eap] = ok
(5)  } #  authorize = ok
(5) Found Auth-Type = EAP
(5) # Executing group from file /etc/raddb/sites-enabled/default
(5)   authenticate {
(5)  eap : Expiring EAP session with state 0xa7933f27a3952648
(5)  eap : Finished EAP session with state 0xa7933f27a3952648
(5)  eap : Previous EAP request found for state 0xa7933f27a3952648, released from the list
(5)  eap : Peer sent method PEAP (25)
(5)  eap : EAP PEAP (25)
(5)  eap : Calling eap_peap to process EAP data
(5)  eap_peap : processing EAP-TLS
(5)  eap_peap : Received TLS ACK
(5)  eap_peap : Received TLS ACK
(5)  eap_peap : ACK handshake is finished
(5)  eap_peap : eaptls_verify returned 3
(5)  eap_peap : eaptls_process returned 3
(5)  eap_peap : FR_TLS_SUCCESS
(5)  eap_peap : Session established.  Decoding tunneled attributes
(5)  eap_peap : Peap state TUNNEL ESTABLISHED
(5)  eap : New EAP session, adding 'State' attribute to reply 0xa7933f27a2942648
(5)   [eap] = handled
(5)  } #  authenticate = handled
(5) Sending Access-Challenge packet to host 141.217.152.122 port 53954, id=253, length=0
(5)     EAP-Message = 0x0107002b1900170301002095a9aec63043a97bed432db7e3fe794bf88f0f6ca530337c1373d29e10c1b954
(5)     Message-Authenticator = 0x00000000000000000000000000000000
(5)     State = 0xa7933f27a29426486172f883c9cea508
Sending Access-Challenge Id 253 from 141.217.0.164:1812 to 141.217.152.122:53954
        EAP-Message = 0x0107002b1900170301002095a9aec63043a97bed432db7e3fe794bf88f0f6ca530337c1373d29e10c1b954
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xa7933f27a29426486172f883c9cea508
(5) Finished request
Waking up in 0.1 seconds.
Received Access-Request Id 254 from 141.217.152.122:53954 to 141.217.0.164:1812 length 207
        User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        EAP-Message = 0x0207002b190017030100206cb5837bb9a948ee44aa1c6de88133ac876f640907da876c2ec9d62d3d0de711
        State = 0xa7933f27a29426486172f883c9cea508
        Message-Authenticator = 0xc471b6d269ce0c46db09346dafead567
(6) Received Access-Request packet from host 141.217.152.122 port 53954, id=254, length=207
(6)     User-Name = 'zz9930'
(6)     NAS-IP-Address = 141.217.152.122
(6)     NAS-Port = 18433
(6)     Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
(6)     Calling-Station-Id = '00-22-5F-40-98-BA'
(6)     Framed-MTU = 1250
(6)     NAS-Port-Type = Wireless-802.11
(6)     Framed-Compression = None
(6)     Connect-Info = 'CONNECT 802.11b/g'
(6)     Chargeable-User-Identity = 0x00
(6)     EAP-Message = 0x0207002b190017030100206cb5837bb9a948ee44aa1c6de88133ac876f640907da876c2ec9d62d3d0de711
(6)     State = 0xa7933f27a29426486172f883c9cea508
(6)     Message-Authenticator = 0xc471b6d269ce0c46db09346dafead567
(6) # Executing section authorize from file /etc/raddb/sites-enabled/default
(6)   authorize {
(6)   filter_username filter_username {
(6)     if (!&User-Name)
(6)     if (!&User-Name)  -> FALSE
(6)     if (&User-Name =~ / /)
(6)     if (&User-Name =~ / /)  -> FALSE
(6)     if (&User-Name =~ /@.*@/ )
(6)     if (&User-Name =~ /@.*@/ )  -> FALSE
(6)     if (&User-Name =~ /\\.\\./ )
(6)     if (&User-Name =~ /\\.\\./ )  -> FALSE
(6)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))
(6)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))   -> FALSE
(6)     if (&User-Name =~ /\\.$/)
(6)     if (&User-Name =~ /\\.$/)   -> FALSE
(6)     if (&User-Name =~ /@\\./)
(6)     if (&User-Name =~ /@\\./)   -> FALSE
(6)   } # filter_username filter_username = notfound
(6)   [preprocess] = ok
(6)   operator-name.authorize operator-name.authorize {
(6)     if ("%{client:Operator-Name}")
(6) Client does not contain config item "Operator-Name"
(6) EXPAND %{client:Operator-Name}
(6)    -->
(6)     if ("%{client:Operator-Name}")  -> FALSE
(6)   } # operator-name.authorize operator-name.authorize = ok
(6)   [chap] = noop
(6)   [mschap] = noop
(6)  suffix : Checking for suffix after "@"
(6)  suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(6)  suffix : No such realm "NULL"
(6)   [suffix] = noop
(6)  eap : Peer sent code Response (2) ID 7 length 43
(6)  eap : Continuing tunnel setup
(6)   [eap] = ok
(6)  } #  authorize = ok
(6) Found Auth-Type = EAP
(6) # Executing group from file /etc/raddb/sites-enabled/default
(6)   authenticate {
(6)  eap : Expiring EAP session with state 0xa7933f27a2942648
(6)  eap : Finished EAP session with state 0xa7933f27a2942648
(6)  eap : Previous EAP request found for state 0xa7933f27a2942648, released from the list
(6)  eap : Peer sent method PEAP (25)
(6)  eap : EAP PEAP (25)
(6)  eap : Calling eap_peap to process EAP data
(6)  eap_peap : processing EAP-TLS
(6)  eap_peap : eaptls_verify returned 7
(6)  eap_peap : Done initial handshake
(6)  eap_peap : eaptls_process returned 7
(6)  eap_peap : FR_TLS_OK
(6)  eap_peap : Session established.  Decoding tunneled attributes
(6)  eap_peap : Peap state WAITING FOR INNER IDENTITY
(6)  eap_peap : Identity - zz9930
(6)  eap_peap : Got inner identity 'zz9930'
(6)  eap_peap : Setting default EAP type for tunneled EAP session
(6)  eap_peap : Got tunneled request
        EAP-Message = 0x0207000b017a7a39393330
server default {
(6)  eap_peap : Setting User-Name to zz9930
Sending tunneled request
        EAP-Message = 0x0207000b017a7a39393330
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        Event-Timestamp = 'May  3 2017 18:57:17 EDT'
server inner-tunnel {
(6)  server inner-tunnel {
(6)    Request:
        EAP-Message = 0x0207000b017a7a39393330
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        Event-Timestamp = 'May  3 2017 18:57:17 EDT'
(6)  # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel
(6)    authorize {
(6)   suffix : Checking for suffix after "@"
(6)   suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(6)   suffix : No such realm "NULL"
(6)    [suffix] = noop
(6)    update control {
(6)     Proxy-To-Realm := 'LOCAL'
(6)    } # update control = noop
(6)   eap : Peer sent code Response (2) ID 7 length 11
(6)   eap : EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize
(6)    [eap] = ok
(6)   } #  authorize = ok
(6)  Found Auth-Type = EAP
(6)  # Executing group from file /etc/raddb/sites-enabled/inner-tunnel
(6)    authenticate {
(6)   eap : Peer sent method Identity (1)
(6)   eap : Calling eap_mschapv2 to process EAP data
(6)   eap_mschapv2 : Issuing Challenge
(6)   eap : New EAP session, adding 'State' attribute to reply 0x1dbb3f611db32526
(6)    [eap] = handled
(6)   } #  authenticate = handled
(6)    Reply:
        EAP-Message = 0x010800201a0108001b1017be22841cd532ad5de1b2a095c735587a7a39393330
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x1dbb3f611db325265f8bb63a7b5a1416
(6)  } # server inner-tunnel
} # server inner-tunnel
(6)  eap_peap : Got tunneled reply code 11
        EAP-Message = 0x010800201a0108001b1017be22841cd532ad5de1b2a095c735587a7a39393330
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x1dbb3f611db325265f8bb63a7b5a1416
(6)  eap_peap : Got tunneled reply RADIUS code 11
        EAP-Message = 0x010800201a0108001b1017be22841cd532ad5de1b2a095c735587a7a39393330
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x1dbb3f611db325265f8bb63a7b5a1416
(6)  eap_peap : Got tunneled Access-Challenge
(6)  eap : New EAP session, adding 'State' attribute to reply 0xa7933f27a19b2648
(6)   [eap] = handled
(6)  } #  authenticate = handled
(6) Sending Access-Challenge packet to host 141.217.152.122 port 53954, id=254, length=0
(6)     EAP-Message = 0x0108004b190017030100408fcefbce566104a3980136c63ab6695b06e56354c8af9893b15cf2b0bbe8edb3c86ad7c200714f711192fb755756a5294edcf70696f7d67d43994e54ca079c65
(6)     Message-Authenticator = 0x00000000000000000000000000000000
(6)     State = 0xa7933f27a19b26486172f883c9cea508
Sending Access-Challenge Id 254 from 141.217.0.164:1812 to 141.217.152.122:53954
        EAP-Message = 0x0108004b190017030100408fcefbce566104a3980136c63ab6695b06e56354c8af9893b15cf2b0bbe8edb3c86ad7c200714f711192fb755756a5294edcf70696f7d67d43994e54ca079c65
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xa7933f27a19b26486172f883c9cea508
(6) Finished request
Waking up in 0.1 seconds.
Received Access-Request Id 255 from 141.217.152.122:53954 to 141.217.0.164:1812 length 271
        User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        EAP-Message = 0x0208006b1900170301006029f3037acf1c46040c117e12cc7c96aefb99fdf2c15aa4a9c17985a370a00f801e217f5d03caf8871b86c4a8dcedd881c769974a48c27e7905c8c64bcc04aa00a368734d143fe67e81d4e0bff407c9cb1bff44d29672798852d840f442634561
        State = 0xa7933f27a19b26486172f883c9cea508
        Message-Authenticator = 0x5191a7ea109a39422d39790b4c40cd96
(7) Received Access-Request packet from host 141.217.152.122 port 53954, id=255, length=271
(7)     User-Name = 'zz9930'
(7)     NAS-IP-Address = 141.217.152.122
(7)     NAS-Port = 18433
(7)     Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
(7)     Calling-Station-Id = '00-22-5F-40-98-BA'
(7)     Framed-MTU = 1250
(7)     NAS-Port-Type = Wireless-802.11
(7)     Framed-Compression = None
(7)     Connect-Info = 'CONNECT 802.11b/g'
(7)     Chargeable-User-Identity = 0x00
(7)     EAP-Message = 0x0208006b1900170301006029f3037acf1c46040c117e12cc7c96aefb99fdf2c15aa4a9c17985a370a00f801e217f5d03caf8871b86c4a8dcedd881c769974a48c27e7905c8c64bcc04aa00a368734d143fe67e81d4e0bff407c9cb1bff44d29672798852d840f442634561
(7)     State = 0xa7933f27a19b26486172f883c9cea508
(7)     Message-Authenticator = 0x5191a7ea109a39422d39790b4c40cd96
(7) # Executing section authorize from file /etc/raddb/sites-enabled/default
(7)   authorize {
(7)   filter_username filter_username {
(7)     if (!&User-Name)
(7)     if (!&User-Name)  -> FALSE
(7)     if (&User-Name =~ / /)
(7)     if (&User-Name =~ / /)  -> FALSE
(7)     if (&User-Name =~ /@.*@/ )
(7)     if (&User-Name =~ /@.*@/ )  -> FALSE
(7)     if (&User-Name =~ /\\.\\./ )
(7)     if (&User-Name =~ /\\.\\./ )  -> FALSE
(7)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))
(7)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))   -> FALSE
(7)     if (&User-Name =~ /\\.$/)
(7)     if (&User-Name =~ /\\.$/)   -> FALSE
(7)     if (&User-Name =~ /@\\./)
(7)     if (&User-Name =~ /@\\./)   -> FALSE
(7)   } # filter_username filter_username = notfound
(7)   [preprocess] = ok
(7)   operator-name.authorize operator-name.authorize {
(7)     if ("%{client:Operator-Name}")
(7) Client does not contain config item "Operator-Name"
(7) EXPAND %{client:Operator-Name}
(7)    -->
(7)     if ("%{client:Operator-Name}")  -> FALSE
(7)   } # operator-name.authorize operator-name.authorize = ok
(7)   [chap] = noop
(7)   [mschap] = noop
(7)  suffix : Checking for suffix after "@"
(7)  suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(7)  suffix : No such realm "NULL"
(7)   [suffix] = noop
(7)  eap : Peer sent code Response (2) ID 8 length 107
(7)  eap : Continuing tunnel setup
(7)   [eap] = ok
(7)  } #  authorize = ok
(7) Found Auth-Type = EAP
(7) # Executing group from file /etc/raddb/sites-enabled/default
(7)   authenticate {
(7)  eap : Expiring EAP session with state 0x1dbb3f611db32526
(7)  eap : Finished EAP session with state 0xa7933f27a19b2648
(7)  eap : Previous EAP request found for state 0xa7933f27a19b2648, released from the list
(7)  eap : Peer sent method PEAP (25)
(7)  eap : EAP PEAP (25)
(7)  eap : Calling eap_peap to process EAP data
(7)  eap_peap : processing EAP-TLS
(7)  eap_peap : eaptls_verify returned 7
(7)  eap_peap : Done initial handshake
(7)  eap_peap : eaptls_process returned 7
(7)  eap_peap : FR_TLS_OK
(7)  eap_peap : Session established.  Decoding tunneled attributes
(7)  eap_peap : Peap state phase2
(7)  eap_peap : EAP type MSCHAPv2 (26)
(7)  eap_peap : Got tunneled request
        EAP-Message = 0x020800411a0208003c314fa8d1b469a2f31e0b92ca0a454711c90000000000000000ef748549b6f1f9131e7db72fa686acd4e834400cb184c7ed007a7a39393330
server default {
(7)  eap_peap : Setting User-Name to zz9930
Sending tunneled request
        EAP-Message = 0x020800411a0208003c314fa8d1b469a2f31e0b92ca0a454711c90000000000000000ef748549b6f1f9131e7db72fa686acd4e834400cb184c7ed007a7a39393330
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = 'zz9930'
        State = 0x1dbb3f611db325265f8bb63a7b5a1416
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        Event-Timestamp = 'May  3 2017 18:57:17 EDT'
server inner-tunnel {
(7)  server inner-tunnel {
(7)    Request:
        EAP-Message = 0x020800411a0208003c314fa8d1b469a2f31e0b92ca0a454711c90000000000000000ef748549b6f1f9131e7db72fa686acd4e834400cb184c7ed007a7a39393330
        FreeRADIUS-Proxied-To = 127.0.0.1
        User-Name = 'zz9930'
        State = 0x1dbb3f611db325265f8bb63a7b5a1416
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        Event-Timestamp = 'May  3 2017 18:57:17 EDT'
(7)  # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel
(7)    authorize {
(7)   suffix : Checking for suffix after "@"
(7)   suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(7)   suffix : No such realm "NULL"
(7)    [suffix] = noop
(7)    update control {
(7)     Proxy-To-Realm := 'LOCAL'
(7)    } # update control = noop
(7)   eap : Peer sent code Response (2) ID 8 length 65
(7)   eap : No EAP Start, assuming it's an on-going EAP conversation
(7)    [eap] = updated
(7)    [expiration] = noop
(7)    [logintime] = noop
(7)    [pap] = noop
(7)   } #  authorize = updated
(7)  Found Auth-Type = EAP
(7)  # Executing group from file /etc/raddb/sites-enabled/inner-tunnel
(7)    authenticate {
(7)   eap : Expiring EAP session with state 0x1dbb3f611db32526
(7)   eap : Finished EAP session with state 0x1dbb3f611db32526
(7)   eap : Previous EAP request found for state 0x1dbb3f611db32526, released from the list
(7)   eap : Peer sent method MSCHAPv2 (26)
(7)   eap : EAP MSCHAPv2 (26)
(7)   eap : Calling eap_mschapv2 to process EAP data
(7)   eap_mschapv2 : # Executing group from file /etc/raddb/sites-enabled/inner-tunnel
(7)   eap : Freeing handler
(7)    [eap] = reject
(7)   } #  authenticate = reject
(7)  Failed to authenticate the user
(7)  Using Post-Auth-Type Reject
(7)  # Executing group from file /etc/raddb/sites-enabled/inner-tunnel
(7)   Post-Auth-Type REJECT {
(7)   attr_filter.access_reject : EXPAND %{User-Name}
(7)   attr_filter.access_reject :    --> zz9930
(7)   attr_filter.access_reject : Matched entry DEFAULT at line 11
(7)    [attr_filter.access_reject] = updated
(7)   } # Post-Auth-Type REJECT = updated
(7)    Reply:
        EAP-Message = 0x04080004
        Message-Authenticator = 0x00000000000000000000000000000000
(7)  } # server inner-tunnel
} # server inner-tunnel
(7)  eap_peap : Got tunneled reply code 3
        EAP-Message = 0x04080004
        Message-Authenticator = 0x00000000000000000000000000000000
(7)  eap_peap : Got tunneled reply RADIUS code 3
        EAP-Message = 0x04080004
        Message-Authenticator = 0x00000000000000000000000000000000
(7)  eap_peap : Tunneled authentication was rejected
(7)  eap_peap : FAILURE
(7)  eap : New EAP session, adding 'State' attribute to reply 0xa7933f27a09a2648
(7)   [eap] = handled
(7)  } #  authenticate = handled
(7) Sending Access-Challenge packet to host 141.217.152.122 port 53954, id=255, length=0
(7)     EAP-Message = 0x0109002b190017030100209a97f58e0dfbf3e65962a6a2440c35255bc1a5e9b6e4f950d4eb8546a47c420c
(7)     Message-Authenticator = 0x00000000000000000000000000000000
(7)     State = 0xa7933f27a09a26486172f883c9cea508
Sending Access-Challenge Id 255 from 141.217.0.164:1812 to 141.217.152.122:53954
        EAP-Message = 0x0109002b190017030100209a97f58e0dfbf3e65962a6a2440c35255bc1a5e9b6e4f950d4eb8546a47c420c
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xa7933f27a09a26486172f883c9cea508
(7) Finished request
Received Access-Request Id 0 from 141.217.152.122:53954 to 141.217.0.164:1812 length 207
        User-Name = 'zz9930'
        NAS-IP-Address = 141.217.152.122
        NAS-Port = 18433
        Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
        Calling-Station-Id = '00-22-5F-40-98-BA'
        Framed-MTU = 1250
        NAS-Port-Type = Wireless-802.11
        Framed-Compression = None
        Connect-Info = 'CONNECT 802.11b/g'
        Chargeable-User-Identity = 0x00
        EAP-Message = 0x0209002b19001703010020d6a41b5d552fc8ce1d5d7a417bbad3e02e1cc86f3762effb71e106e6b413029f
        State = 0xa7933f27a09a26486172f883c9cea508
        Message-Authenticator = 0x6c02a9d61f9d534f23789253c7f1d531
(8) Received Access-Request packet from host 141.217.152.122 port 53954, id=0, length=207
(8)     User-Name = 'zz9930'
(8)     NAS-IP-Address = 141.217.152.122
(8)     NAS-Port = 18433
(8)     Called-Station-Id = '00:90:0b:2c:94:fd:eduroam'
(8)     Calling-Station-Id = '00-22-5F-40-98-BA'
(8)     Framed-MTU = 1250
(8)     NAS-Port-Type = Wireless-802.11
(8)     Framed-Compression = None
(8)     Connect-Info = 'CONNECT 802.11b/g'
(8)     Chargeable-User-Identity = 0x00
(8)     EAP-Message = 0x0209002b19001703010020d6a41b5d552fc8ce1d5d7a417bbad3e02e1cc86f3762effb71e106e6b413029f
(8)     State = 0xa7933f27a09a26486172f883c9cea508
(8)     Message-Authenticator = 0x6c02a9d61f9d534f23789253c7f1d531
(8) # Executing section authorize from file /etc/raddb/sites-enabled/default
(8)   authorize {
(8)   filter_username filter_username {
(8)     if (!&User-Name)
(8)     if (!&User-Name)  -> FALSE
(8)     if (&User-Name =~ / /)
(8)     if (&User-Name =~ / /)  -> FALSE
(8)     if (&User-Name =~ /@.*@/ )
(8)     if (&User-Name =~ /@.*@/ )  -> FALSE
(8)     if (&User-Name =~ /\\.\\./ )
(8)     if (&User-Name =~ /\\.\\./ )  -> FALSE
(8)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))
(8)     if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/))   -> FALSE
(8)     if (&User-Name =~ /\\.$/)
(8)     if (&User-Name =~ /\\.$/)   -> FALSE
(8)     if (&User-Name =~ /@\\./)
(8)     if (&User-Name =~ /@\\./)   -> FALSE
(8)   } # filter_username filter_username = notfound
(8)   [preprocess] = ok
(8)   operator-name.authorize operator-name.authorize {
(8)     if ("%{client:Operator-Name}")
(8) Client does not contain config item "Operator-Name"
(8) EXPAND %{client:Operator-Name}
(8)    -->
(8)     if ("%{client:Operator-Name}")  -> FALSE
(8)   } # operator-name.authorize operator-name.authorize = ok
(8)   [chap] = noop
(8)   [mschap] = noop
(8)  suffix : Checking for suffix after "@"
(8)  suffix : No '@' in User-Name = "zz9930", looking up realm NULL
(8)  suffix : No such realm "NULL"
(8)   [suffix] = noop
(8)  eap : Peer sent code Response (2) ID 9 length 43
(8)  eap : Continuing tunnel setup
(8)   [eap] = ok
(8)  } #  authorize = ok
(8) Found Auth-Type = EAP
(8) # Executing group from file /etc/raddb/sites-enabled/default
(8)   authenticate {
(8)  eap : Expiring EAP session with state 0xa7933f27a09a2648
(8)  eap : Finished EAP session with state 0xa7933f27a09a2648
(8)  eap : Previous EAP request found for state 0xa7933f27a09a2648, released from the list
(8)  eap : Peer sent method PEAP (25)
(8)  eap : EAP PEAP (25)
(8)  eap : Calling eap_peap to process EAP data
(8)  eap_peap : processing EAP-TLS
(8)  eap_peap : eaptls_verify returned 7
(8)  eap_peap : Done initial handshake
(8)  eap_peap : eaptls_process returned 7
(8)  eap_peap : FR_TLS_OK
(8)  eap_peap : Session established.  Decoding tunneled attributes
(8)  eap_peap : Peap state send tlv failure
(8)  eap_peap : Received EAP-TLV response
(8)   eap_peap : The users session was previously rejected: returning reject (again.)
(8)   eap_peap : *** This means you need to read the PREVIOUS messages in the debug output
(8)   eap_peap : *** to find out the reason why the user was rejected
(8)   eap_peap : *** Look for "reject" or "fail".  Those earlier messages will tell you
(8)   eap_peap : *** what went wrong, and how to fix the problem
  SSL: Removing session 1d69cd59382c1a906f18f235954d3f197e12772ac9e6f0d322e9ef69ea577c87 from the cache
(8)  ERROR: eap : Failed continuing EAP PEAP (25) session. EAP sub-module failed
(8)  eap : Failed in EAP select
(8)   [eap] = invalid
(8)  } #  authenticate = invalid
(8) Failed to authenticate the user
(8) Using Post-Auth-Type Reject
(8) # Executing group from file /etc/raddb/sites-enabled/default
(8)  Post-Auth-Type REJECT {
(8)  attr_filter.access_reject : EXPAND %{User-Name}
(8)  attr_filter.access_reject :    --> zz9930
(8)  attr_filter.access_reject : Matched entry DEFAULT at line 11
(8)   [attr_filter.access_reject] = updated
(8)  eap : Reply already contained an EAP-Message, not inserting EAP-Failure
(8)   [eap] = noop
(8)   remove_reply_message_if_eap remove_reply_message_if_eap {
(8)     if (&reply:EAP-Message && &reply:Reply-Message)
(8)     if (&reply:EAP-Message && &reply:Reply-Message)  -> FALSE
(8)    else else {
(8)     [noop] = noop
(8)    } # else else = noop
(8)   } # remove_reply_message_if_eap remove_reply_message_if_eap = noop
(8)  } # Post-Auth-Type REJECT = updated
(8) Delaying response for 1 seconds
Waking up in 0.6 seconds.
(8) Sending delayed response
(8) Sending Access-Reject packet to host 141.217.152.122 port 53954, id=0, length=0
(8)     EAP-Message = 0x04090004
(8)     Message-Authenticator = 0x00000000000000000000000000000000
Sending Access-Reject Id 0 from 141.217.0.164:1812 to 141.217.152.122:53954
        EAP-Message = 0x04090004
        Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.7 seconds.
(0) Cleaning up request packet ID 248 with timestamp +751
(1) Cleaning up request packet ID 249 with timestamp +751
(2) Cleaning up request packet ID 250 with timestamp +751
(3) Cleaning up request packet ID 251 with timestamp +751
(4) Cleaning up request packet ID 252 with timestamp +751
(5) Cleaning up request packet ID 253 with timestamp +751
(6) Cleaning up request packet ID 254 with timestamp +751
(7) Cleaning up request packet ID 255 with timestamp +751
(8) Cleaning up request packet ID 0 with timestamp +751
Ready to process requests



More information about the Freeradius-Users mailing list