<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.2900.2873" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>Hi,</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>I have been using free radius for months for
testing. Today, if just started giving me segmentation faults.
Nothing has changed on the NAS or in the configs for freeradius so I have no
idea why it suddenly is crashing. Is there some way to track down whats
causing the segmentation fault? My log follows: or at least part of
it</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>[root@localhost raddb]# radiusd -X<BR>Starting -
reading configuration files ...<BR>reread_config: reading
radiusd.conf<BR>Config: including file:
/etc/raddb/proxy.conf<BR>Config: including file:
/etc/raddb/clients.conf<BR>Config: including file:
/etc/raddb/snmp.conf<BR>Config: including file:
/etc/raddb/eap.conf<BR>Config: including file:
/etc/raddb/sql.conf<BR> main: prefix = "/usr"<BR> main: localstatedir
= "/var"<BR> main: logdir = "/var/log/radius"<BR> main: libdir =
"/usr/lib"<BR> main: radacctdir = "/var/log/radius/radacct"<BR> main:
hostname_lookups = no<BR> main: max_request_time = 30<BR> main:
cleanup_delay = 5<BR> main: max_requests = 1024<BR> main:
delete_blocked_requests = 0<BR> main: port = 0<BR> main:
allow_core_dumps = no<BR> main: log_stripped_names = no<BR> main:
log_file = "/var/log/radius/radius.log"<BR> main: log_auth =
no<BR> main: log_auth_badpass = no<BR> main: log_auth_goodpass =
no<BR> main: pidfile = "/var/run/radiusd/radiusd.pid"<BR> main: user =
"nobody"<BR> main: group = "nobody"<BR> main: usercollide =
no<BR> main: lower_user = "no"<BR> main: lower_pass =
"no"<BR> main: nospace_user = "no"<BR> main: nospace_pass =
"no"<BR> main: checkrad = "/usr/sbin/checkrad"<BR> main:
proxy_requests = yes<BR> proxy: retry_delay = 5<BR> proxy: retry_count
= 3<BR> proxy: synchronous = no<BR> proxy: default_fallback =
yes<BR> proxy: dead_time = 120<BR> proxy: post_proxy_authorize =
yes<BR> proxy: wake_all_if_all_dead = no<BR> security: max_attributes
= 200<BR> security: reject_delay = 1<BR> security: status_server =
no<BR> main: debug_level = 0<BR>read_config_files: reading
dictionary<BR>read_config_files: reading naslist<BR>Using deprecated
naslist file. Support for this will go away
soon.<BR>read_config_files: reading clients<BR>read_config_files:
reading realms<BR>radiusd: entering modules setup<BR>Module: Library
search path is /usr/lib<BR>Module: Loaded exec<BR> exec: wait =
yes<BR> exec: program = "(null)"<BR> exec: input_pairs =
"request"<BR> exec: output_pairs = "(null)"<BR> exec: packet_type =
"(null)"<BR>rlm_exec: Wait=yes but no output defined. Did you mean
output=none?<BR>Module: Instantiated exec (exec)<BR>Module: Loaded
expr<BR>Module: Instantiated expr (expr)<BR>Module: Loaded PAP<BR> pap:
encryption_scheme = "crypt"<BR>Module: Instantiated pap (pap)<BR>Module: Loaded
CHAP<BR>Module: Instantiated chap (chap)<BR>Module: Loaded
MS-CHAP<BR> mschap: use_mppe = yes<BR> mschap: require_encryption =
yes<BR> mschap: require_strong = yes<BR> mschap: with_ntdomain_hack =
no<BR> mschap: passwd = "(null)"<BR> mschap: authtype =
"MS-CHAP"<BR> mschap: ntlm_auth = "(null)"<BR>Module: Instantiated mschap
(mschap)<BR>Module: Loaded eap<BR> eap: default_eap_type =
"ttls"<BR> eap: timer_expire = 60<BR> eap: ignore_unknown_eap_types =
yes<BR> eap: cisco_accounting_username_bug = no<BR>rlm_eap: Loaded and
initialized type md5<BR> tls: rsa_key_exchange = no<BR> tls:
dh_key_exchange = yes<BR> tls: rsa_key_length = 512<BR> tls:
dh_key_length = 512<BR> tls: verify_depth = 0<BR> tls: CA_path =
"(null)"<BR> tls: pem_file_type = yes<BR> tls: private_key_file =
"/etc/raddb/certs/server_keycert.pem"<BR> tls: certificate_file =
"/etc/raddb/certs/server_keycert.pem"<BR> tls: CA_file =
"/etc/raddb/certs/cacert.pem"<BR> tls: private_key_password =
"testing123"<BR> tls: dh_file = "/etc/raddb/certs/dh"<BR> tls:
random_file = "/etc/raddb/certs/random"<BR> tls: fragment_size =
1024<BR> tls: include_length = yes<BR> tls: check_crl =
no<BR> tls: check_cert_cn = "(null)"<BR>rlm_eap: Loaded and initialized
type tls<BR> ttls: default_eap_type = "mschapv2"<BR> ttls:
copy_request_to_tunnel = no<BR> ttls: use_tunneled_reply = no<BR>rlm_eap:
Loaded and initialized type ttls<BR> peap: default_eap_type =
"mschapv2"<BR> peap: copy_request_to_tunnel = no<BR> peap:
use_tunneled_reply = no<BR> peap: proxy_tunneled_request_as_eap =
yes<BR>rlm_eap: Loaded and initialized type peap<BR> mschapv2:
with_ntdomain_hack = no<BR>rlm_eap: Loaded and initialized type
mschapv2<BR>Module: Instantiated eap (eap)<BR>Module: Loaded
preprocess<BR> preprocess: huntgroups =
"/etc/raddb/huntgroups"<BR> preprocess: hints =
"/etc/raddb/hints"<BR> preprocess: with_ascend_hack =
no<BR> preprocess: ascend_channels_per_line = 23<BR> preprocess:
with_ntdomain_hack = no<BR> preprocess: with_specialix_jetstream_hack =
no<BR> preprocess: with_cisco_vsa_hack = no<BR>Module: Instantiated
preprocess (preprocess)<BR>Module: Loaded realm<BR> realm: format =
"suffix"<BR> realm: delimiter = "@"<BR> realm: ignore_default =
no<BR> realm: ignore_null = no<BR>Module: Instantiated realm
(suffix)<BR>Module: Loaded files<BR> files: usersfile =
"/etc/raddb/users"<BR> files: acctusersfile =
"/etc/raddb/acct_users"<BR> files: preproxy_usersfile =
"/etc/raddb/preproxy_users"<BR> files: compat = "no"<BR>Module:
Instantiated files (files)<BR>Module: Loaded
Acct-Unique-Session-Id<BR> acct_unique: key = "User-Name, Acct-Session-Id,
NAS-IP-Address, Client-IP-Address, NAS-Port"<BR>Module: Instantiated acct_unique
(acct_unique)<BR>Module: Loaded detail<BR> detail: detailfile =
"/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"<BR> detail:
detailperm = 384<BR> detail: dirperm = 493<BR> detail: locking =
no<BR>Module: Instantiated detail (detail)<BR>Module: Loaded
System<BR> unix: cache = no<BR> unix: passwd = "(null)"<BR> unix:
shadow = "/etc/shadow"<BR> unix: group = "(null)"<BR> unix: radwtmp =
"/var/log/radius/radwtmp"<BR> unix: usegroup = no<BR> unix:
cache_reload = 600<BR>Module: Instantiated unix (unix)<BR>Module: Loaded
radutmp<BR> radutmp: filename = "/var/log/radius/radutmp"<BR> radutmp:
username = "%{User-Name}"<BR> radutmp: case_sensitive =
yes<BR> radutmp: check_with_nas = yes<BR> radutmp: perm =
384<BR> radutmp: callerid = yes<BR>Module: Instantiated radutmp
(radutmp)<BR>Listening on authentication *:1812<BR>Listening on accounting
*:1813<BR>Listening on proxy *:1814<BR>Ready to process
requests.<BR></FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2> users: Matched joel at
100<BR> modcall[authorize]: module "files" returns ok for request
4<BR>modcall: group authorize returns updated for request 4<BR>
rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR>
Processing the authenticate section of radiusd.conf<BR>modcall: entering group
authenticate for request 4<BR> rlm_eap: Request found, released from the
list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type
peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing
TLS<BR>rlm_eap_tls: Length Included<BR> eaptls_verify returned
11<BR> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086],
ClientKeyExchange<BR> TLS_accept: SSLv3 read client key
exchange A<BR> rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length
0001]<BR> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010],
Finished<BR> TLS_accept: SSLv3 read finished A<BR>
rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length
0001]<BR> TLS_accept: SSLv3 write change cipher spec
A<BR> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010],
Finished<BR> TLS_accept: SSLv3 write finished
A<BR> TLS_accept: SSLv3 flush data<BR>
(other): SSL negotiation finished successfully<BR>SSL Connection
Established<BR> eaptls_process returned 13<BR> rlm_eap_peap:
EAPTLS_HANDLED<BR> modcall[authenticate]: module "eap" returns handled for
request 4<BR>modcall: group authenticate returns handled for request
4<BR>Sending Access-Challenge of id 12 to
192.168.1.20:1026<BR> EAP-Message =
0x0105003119001403010001011603010020e6000004531e574308c8d1<BR>62bbdb2e2d17873d1dd2f4c7f2db72ba16e98ab3a1<BR>
Message-Authenticator =
0x00000000000000000000000000000000<BR>
State = 0xe44feceeea4d009ddd562d92d30ef3da<BR>Finished request
4<BR></FONT></DIV>
<DIV><FONT face=Arial size=2>Going to the next request<BR>Waking up in 6
seconds...<BR>rad_recv: Access-Request packet from host 192.168.1.20:1026,
id=13, length=291<BR> Attr-1 =
0x6a6f656c<BR> NAS-Identifier =
"00-0b-6b-35-b4-4d:2_slimtest"<BR>
NAS-IP-Address = 192.168.10.1<BR>
NAS-Port = 10<BR> NAS-Port-Id =
"ath0"<BR> NAS-Port-Type =
Wireless-802.11<BR> Service-Type =
Framed-User<BR> Framed-MTU =
1400<BR> Called-Station-Id =
"00-0B-6B-35-B4-4D:2_slimtest"<BR>
Calling-Station-Id =
"00-C0-49-DD-38-5E"<BR>
Event-Timestamp = "Dec 31 1969 16:03:20
PST"<BR> WISPr-Location-ID =
"isocc=(null),cc=(null),ac=(null),network=(null)"<BR>
WISPr-Location-Name =
"(null),(null)"<BR> Connect-Info =
"CONNECT 11Mbps 802.11b"<BR>
EAP-Message = 0x020500061900<BR> State
=
0xe44feceeea4d009ddd562d92d30ef3da<BR>
Message-Authenticator = 0xd60a5eb6fefb934983df741cbc97f918<BR> Processing
the authorize section of radiusd.conf<BR>modcall: entering group authorize for
request 5<BR> modcall[authorize]: module "preprocess" returns ok for
request 5<BR> modcall[authorize]: module "chap" returns noop for request
5<BR> modcall[authorize]: module "mschap" returns noop for request
5<BR> rlm_realm: No <A href="mailto:'@'">'@'</A> in User-Name
= "joel", looking up realm NULL<BR> rlm_realm: No such realm
"NULL"<BR> modcall[authorize]: module "suffix" returns noop for request
5<BR> rlm_eap: EAP packet type response id 5 length 6<BR> rlm_eap:
No EAP Start, assuming it's an on-going EAP conversation<BR>
modcall[authorize]: module "eap" returns updated for request
5<BR> users: Matched joel at 100<BR> modcall[authorize]:
module "files" returns ok for request 5<BR>modcall: group authorize returns
updated for request 5<BR> rad_check_password: Found Auth-Type
EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of
radiusd.conf<BR>modcall: entering group authenticate for request 5<BR>
rlm_eap: Request found, released from the list<BR> rlm_eap:
EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap:
Authenticate<BR> rlm_eap_tls: processing TLS<BR>rlm_eap_tls: Received
EAP-TLS ACK message<BR> rlm_eap_tls: ack handshake is finished<BR>
eaptls_verify returned 3<BR> eaptls_process returned 3<BR>
rlm_eap_peap: EAPTLS_SUCCESS<BR> modcall[authenticate]: module "eap"
returns handled for request 5<BR>modcall: group authenticate returns handled for
request 5<BR>Sending Access-Challenge of id 13 to
192.168.1.20:1026<BR> EAP-Message =
0x0106002019001703010015286774bcd384202cb08795f318c1a8d09f<BR>9bbc5630<BR>
Message-Authenticator =
0x00000000000000000000000000000000<BR>
State = 0xe7ad12776ec2df387a2d37ff50563861<BR>Finished request 5<BR>Going to the
next request<BR>--- Walking the entire request list ---<BR>Waking up in 5
seconds...<BR>--- Walking the entire request list ---<BR>Cleaning up request 0
ID 8 with timestamp 44871f25<BR>Cleaning up request 1 ID 9 with timestamp
44871f25<BR>Cleaning up request 2 ID 10 with timestamp 44871f25<BR></FONT><FONT
face=Arial size=2>Cleaning up request 3 ID 11 with timestamp
44871f25<BR>Cleaning up request 4 ID 12 with timestamp 44871f25<BR>Waking up in
1 seconds...<BR>--- Walking the entire request list ---<BR>Cleaning up request 5
ID 13 with timestamp 44871f26<BR>Nothing to do. Sleeping until we see a
request.<BR>rad_recv: Access-Request packet from host 192.168.1.20:1026, id=14,
length=317<BR> Attr-1 =
0x6a6f656c<BR> NAS-Identifier =
"00-0b-6b-35-b4-4d:2_slimtest"<BR>
NAS-IP-Address = 192.168.10.1<BR>
NAS-Port = 10<BR> NAS-Port-Id =
"ath0"<BR> NAS-Port-Type =
Wireless-802.11<BR> Service-Type =
Framed-User<BR> Framed-MTU =
1400<BR> Called-Station-Id =
"00-0B-6B-35-B4-4D:2_slimtest"<BR>
Calling-Station-Id =
"00-C0-49-DD-38-5E"<BR>
Event-Timestamp = "Dec 31 1969 16:03:50
PST"<BR> WISPr-Location-ID =
"isocc=(null),cc=(null),ac=(null),network=(null)"<BR>
WISPr-Location-Name =
"(null),(null)"<BR> Connect-Info =
"CONNECT 11Mbps 802.11b"<BR>
EAP-Message =
0x02060020190017030100154f081afb2009c468364080c391ce67884e<BR>8ba24f5d<BR>
State =
0xe7ad12776ec2df387a2d37ff50563861<BR>
Message-Authenticator = 0xf7b1be3d97c3f0d9d0f3bc42636be68b<BR> Processing
the authorize section of radiusd.conf<BR>modcall: entering group authorize for
request 6<BR> modcall[authorize]: module "preprocess" returns ok for
request 6<BR> modcall[authorize]: module "chap" returns noop for request
6<BR> modcall[authorize]: module "mschap" returns noop for request
6<BR> rlm_realm: No <A href="mailto:'@'">'@'</A> in User-Name
= "joel", looking up realm NULL<BR> rlm_realm: No such realm
"NULL"<BR> modcall[authorize]: module "suffix" returns noop for request
6<BR> rlm_eap: EAP packet type response id 6 length 32<BR> rlm_eap:
No EAP Start, assuming it's an on-going EAP conversation<BR>
modcall[authorize]: module "eap" returns updated for request
6<BR> users: Matched joel at 100<BR> modcall[authorize]:
module "files" returns ok for request 6<BR>modcall: group authorize returns
updated for request 6<BR> rad_check_password: Found Auth-Type
EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of
radiusd.conf<BR>modcall: entering group authenticate for request 6<BR>
rlm_eap: Request found, released from the list<BR> rlm_eap:
EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap:
Authenticate<BR> rlm_eap_tls: processing TLS<BR> eaptls_verify
returned 7<BR> rlm_eap_tls: Done initial handshake<BR>
eaptls_process returned 7<BR> rlm_eap_peap: EAPTLS_OK<BR>
rlm_eap_peap: Session established. Decoding tunneled attributes.<BR>
rlm_eap_peap: Identity - joel<BR> rlm_eap_peap: Tunneled data is
valid.<BR> PEAP: Got tunneled
EAP-Message<BR> EAP-Message =
0x02060009016a6f656c<BR> PEAP: Got tunneled identity of joel<BR>
PEAP: Setting default EAP type for tunneled EAP session.<BR>Segmentation
fault</FONT></DIV></BODY></HTML>