<html><head><style type="text/css"><!-- DIV {margin:0px} --></style></head><body><div style="font-family:times new roman, new york, times, serif;font-size:12pt"><div style="font-family: times new roman,new york,times,serif; font-size: 12pt;">Just thought I'd let you know your email goes into my yahoo spam folder...<br><br><div style="font-family: times new roman,new york,times,serif; font-size: 12pt;">----- Original Message ----<br>From: Joel Lindsay <joel@waveteq.com><br>To: FreeRadius users mailing list <freeradius-users@lists.freeradius.org><br>Sent: Wednesday, June 7, 2006 2:59:05 PM<br>Subject: Segmentation Fault<br><br>
<style></style>
<div><font face="Arial" size="2">Hi,</font></div>
<div><font face="Arial" size="2"></font> </div>
<div><font face="Arial" size="2">I have been using free radius for months for
testing. Today, if just started giving me segmentation faults.
Nothing has changed on the NAS or in the configs for freeradius so I have no
idea why it suddenly is crashing. Is there some way to track down whats
causing the segmentation fault? My log follows: or at least part of
it</font></div>
<div><font face="Arial" size="2"></font> </div>
<div><font face="Arial" size="2">[root@localhost raddb]# radiusd -X<br>Starting -
reading configuration files ...<br>reread_config: reading
radiusd.conf<br>Config: including file:
/etc/raddb/proxy.conf<br>Config: including file:
/etc/raddb/clients.conf<br>Config: including file:
/etc/raddb/snmp.conf<br>Config: including file:
/etc/raddb/eap.conf<br>Config: including file:
/etc/raddb/sql.conf<br> main: prefix = "/usr"<br> main: localstatedir
= "/var"<br> main: logdir = "/var/log/radius"<br> main: libdir =
"/usr/lib"<br> main: radacctdir = "/var/log/radius/radacct"<br> main:
hostname_lookups = no<br> main: max_request_time = 30<br> main:
cleanup_delay = 5<br> main: max_requests = 1024<br> main:
delete_blocked_requests = 0<br> main: port = 0<br> main:
allow_core_dumps = no<br> main: log_stripped_names = no<br> main:
log_file = "/var/log/radius/radius.log"<br> main: log_auth =
no<br> main: log_auth_badpass = no<br> main: log_auth_goodpass =
no<br> main: pidfile = "/var/run/radiusd/radiusd.pid"<br> main: user =
"nobody"<br> main: group = "nobody"<br> main: usercollide =
no<br> main: lower_user = "no"<br> main: lower_pass =
"no"<br> main: nospace_user = "no"<br> main: nospace_pass =
"no"<br> main: checkrad = "/usr/sbin/checkrad"<br> main:
proxy_requests = yes<br> proxy: retry_delay = 5<br> proxy: retry_count
= 3<br> proxy: synchronous = no<br> proxy: default_fallback =
yes<br> proxy: dead_time = 120<br> proxy: post_proxy_authorize =
yes<br> proxy: wake_all_if_all_dead = no<br> security: max_attributes
= 200<br> security: reject_delay = 1<br> security: status_server =
no<br> main: debug_level = 0<br>read_config_files: reading
dictionary<br>read_config_files: reading naslist<br>Using deprecated
naslist file. Support for this will go away
soon.<br>read_config_files: reading clients<br>read_config_files:
reading realms<br>radiusd: entering modules setup<br>Module: Library
search path is /usr/lib<br>Module: Loaded exec<br> exec: wait =
yes<br> exec: program = "(null)"<br> exec: input_pairs =
"request"<br> exec: output_pairs = "(null)"<br> exec: packet_type =
"(null)"<br>rlm_exec: Wait=yes but no output defined. Did you mean
output=none?<br>Module: Instantiated exec (exec)<br>Module: Loaded
expr<br>Module: Instantiated expr (expr)<br>Module: Loaded PAP<br> pap:
encryption_scheme = "crypt"<br>Module: Instantiated pap (pap)<br>Module: Loaded
CHAP<br>Module: Instantiated chap (chap)<br>Module: Loaded
MS-CHAP<br> mschap: use_mppe = yes<br> mschap: require_encryption =
yes<br> mschap: require_strong = yes<br> mschap: with_ntdomain_hack =
no<br> mschap: passwd = "(null)"<br> mschap: authtype =
"MS-CHAP"<br> mschap: ntlm_auth = "(null)"<br>Module: Instantiated mschap
(mschap)<br>Module: Loaded eap<br> eap: default_eap_type =
"ttls"<br> eap: timer_expire = 60<br> eap: ignore_unknown_eap_types =
yes<br> eap: cisco_accounting_username_bug = no<br>rlm_eap: Loaded and
initialized type md5<br> tls: rsa_key_exchange = no<br> tls:
dh_key_exchange = yes<br> tls: rsa_key_length = 512<br> tls:
dh_key_length = 512<br> tls: verify_depth = 0<br> tls: CA_path =
"(null)"<br> tls: pem_file_type = yes<br> tls: private_key_file =
"/etc/raddb/certs/server_keycert.pem"<br> tls: certificate_file =
"/etc/raddb/certs/server_keycert.pem"<br> tls: CA_file =
"/etc/raddb/certs/cacert.pem"<br> tls: private_key_password =
"testing123"<br> tls: dh_file = "/etc/raddb/certs/dh"<br> tls:
random_file = "/etc/raddb/certs/random"<br> tls: fragment_size =
1024<br> tls: include_length = yes<br> tls: check_crl =
no<br> tls: check_cert_cn = "(null)"<br>rlm_eap: Loaded and initialized
type tls<br> ttls: default_eap_type = "mschapv2"<br> ttls:
copy_request_to_tunnel = no<br> ttls: use_tunneled_reply = no<br>rlm_eap:
Loaded and initialized type ttls<br> peap: default_eap_type =
"mschapv2"<br> peap: copy_request_to_tunnel = no<br> peap:
use_tunneled_reply = no<br> peap: proxy_tunneled_request_as_eap =
yes<br>rlm_eap: Loaded and initialized type peap<br> mschapv2:
with_ntdomain_hack = no<br>rlm_eap: Loaded and initialized type
mschapv2<br>Module: Instantiated eap (eap)<br>Module: Loaded
preprocess<br> preprocess: huntgroups =
"/etc/raddb/huntgroups"<br> preprocess: hints =
"/etc/raddb/hints"<br> preprocess: with_ascend_hack =
no<br> preprocess: ascend_channels_per_line = 23<br> preprocess:
with_ntdomain_hack = no<br> preprocess: with_specialix_jetstream_hack =
no<br> preprocess: with_cisco_vsa_hack = no<br>Module: Instantiated
preprocess (preprocess)<br>Module: Loaded realm<br> realm: format =
"suffix"<br> realm: delimiter = "@"<br> realm: ignore_default =
no<br> realm: ignore_null = no<br>Module: Instantiated realm
(suffix)<br>Module: Loaded files<br> files: usersfile =
"/etc/raddb/users"<br> files: acctusersfile =
"/etc/raddb/acct_users"<br> files: preproxy_usersfile =
"/etc/raddb/preproxy_users"<br> files: compat = "no"<br>Module:
Instantiated files (files)<br>Module: Loaded
Acct-Unique-Session-Id<br> acct_unique: key = "User-Name, Acct-Session-Id,
NAS-IP-Address, Client-IP-Address, NAS-Port"<br>Module: Instantiated acct_unique
(acct_unique)<br>Module: Loaded detail<br> detail: detailfile =
"/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"<br> detail:
detailperm = 384<br> detail: dirperm = 493<br> detail: locking =
no<br>Module: Instantiated detail (detail)<br>Module: Loaded
System<br> unix: cache = no<br> unix: passwd = "(null)"<br> unix:
shadow = "/etc/shadow"<br> unix: group = "(null)"<br> unix: radwtmp =
"/var/log/radius/radwtmp"<br> unix: usegroup = no<br> unix:
cache_reload = 600<br>Module: Instantiated unix (unix)<br>Module: Loaded
radutmp<br> radutmp: filename = "/var/log/radius/radutmp"<br> radutmp:
username = "%{User-Name}"<br> radutmp: case_sensitive =
yes<br> radutmp: check_with_nas = yes<br> radutmp: perm =
384<br> radutmp: callerid = yes<br>Module: Instantiated radutmp
(radutmp)<br>Listening on authentication *:1812<br>Listening on accounting
*:1813<br>Listening on proxy *:1814<br>Ready to process
requests.<br></font></div>
<div><font face="Arial" size="2"></font> </div>
<div><font face="Arial" size="2"></font> </div>
<div><font face="Arial" size="2"> users: Matched joel at
100<br> modcall[authorize]: module "files" returns ok for request
4<br>modcall: group authorize returns updated for request 4<br>
rad_check_password: Found Auth-Type EAP<br>auth: type "EAP"<br>
Processing the authenticate section of radiusd.conf<br>modcall: entering group
authenticate for request 4<br> rlm_eap: Request found, released from the
list<br> rlm_eap: EAP/peap<br> rlm_eap: processing type
peap<br> rlm_eap_peap: Authenticate<br> rlm_eap_tls: processing
TLS<br>rlm_eap_tls: Length Included<br> eaptls_verify returned
11<br> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086],
ClientKeyExchange<br> TLS_accept: SSLv3 read client key
exchange A<br> rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length
0001]<br> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010],
Finished<br> TLS_accept: SSLv3 read finished A<br>
rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length
0001]<br> TLS_accept: SSLv3 write change cipher spec
A<br> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010],
Finished<br> TLS_accept: SSLv3 write finished
A<br> TLS_accept: SSLv3 flush data<br>
(other): SSL negotiation finished successfully<br>SSL Connection
Established<br> eaptls_process returned 13<br> rlm_eap_peap:
EAPTLS_HANDLED<br> modcall[authenticate]: module "eap" returns handled for
request 4<br>modcall: group authenticate returns handled for request
4<br>Sending Access-Challenge of id 12 to
192.168.1.20:1026<br> EAP-Message =
0x0105003119001403010001011603010020e6000004531e574308c8d1<br>62bbdb2e2d17873d1dd2f4c7f2db72ba16e98ab3a1<br>
Message-Authenticator =
0x00000000000000000000000000000000<br>
State = 0xe44feceeea4d009ddd562d92d30ef3da<br>Finished request
4<br></font></div>
<div><font face="Arial" size="2">Going to the next request<br>Waking up in 6
seconds...<br>rad_recv: Access-Request packet from host 192.168.1.20:1026,
id=13, length=291<br> Attr-1 =
0x6a6f656c<br> NAS-Identifier =
"00-0b-6b-35-b4-4d:2_slimtest"<br>
NAS-IP-Address = 192.168.10.1<br>
NAS-Port = 10<br> NAS-Port-Id =
"ath0"<br> NAS-Port-Type =
Wireless-802.11<br> Service-Type =
Framed-User<br> Framed-MTU =
1400<br> Called-Station-Id =
"00-0B-6B-35-B4-4D:2_slimtest"<br>
Calling-Station-Id =
"00-C0-49-DD-38-5E"<br>
Event-Timestamp = "Dec 31 1969 16:03:20
PST"<br> WISPr-Location-ID =
"isocc=(null),cc=(null),ac=(null),network=(null)"<br>
WISPr-Location-Name =
"(null),(null)"<br> Connect-Info =
"CONNECT 11Mbps 802.11b"<br>
EAP-Message = 0x020500061900<br> State
=
0xe44feceeea4d009ddd562d92d30ef3da<br>
Message-Authenticator = 0xd60a5eb6fefb934983df741cbc97f918<br> Processing
the authorize section of radiusd.conf<br>modcall: entering group authorize for
request 5<br> modcall[authorize]: module "preprocess" returns ok for
request 5<br> modcall[authorize]: module "chap" returns noop for request
5<br> modcall[authorize]: module "mschap" returns noop for request
5<br> rlm_realm: No <a id="bodyLinks" rel="nofollow" target="_blank" href="mailto:%27@%27">'@'</a> in User-Name
= "joel", looking up realm NULL<br> rlm_realm: No such realm
"NULL"<br> modcall[authorize]: module "suffix" returns noop for request
5<br> rlm_eap: EAP packet type response id 5 length 6<br> rlm_eap:
No EAP Start, assuming it's an on-going EAP conversation<br>
modcall[authorize]: module "eap" returns updated for request
5<br> users: Matched joel at 100<br> modcall[authorize]:
module "files" returns ok for request 5<br>modcall: group authorize returns
updated for request 5<br> rad_check_password: Found Auth-Type
EAP<br>auth: type "EAP"<br> Processing the authenticate section of
radiusd.conf<br>modcall: entering group authenticate for request 5<br>
rlm_eap: Request found, released from the list<br> rlm_eap:
EAP/peap<br> rlm_eap: processing type peap<br> rlm_eap_peap:
Authenticate<br> rlm_eap_tls: processing TLS<br>rlm_eap_tls: Received
EAP-TLS ACK message<br> rlm_eap_tls: ack handshake is finished<br>
eaptls_verify returned 3<br> eaptls_process returned 3<br>
rlm_eap_peap: EAPTLS_SUCCESS<br> modcall[authenticate]: module "eap"
returns handled for request 5<br>modcall: group authenticate returns handled for
request 5<br>Sending Access-Challenge of id 13 to
192.168.1.20:1026<br> EAP-Message =
0x0106002019001703010015286774bcd384202cb08795f318c1a8d09f<br>9bbc5630<br>
Message-Authenticator =
0x00000000000000000000000000000000<br>
State = 0xe7ad12776ec2df387a2d37ff50563861<br>Finished request 5<br>Going to the
next request<br>--- Walking the entire request list ---<br>Waking up in 5
seconds...<br>--- Walking the entire request list ---<br>Cleaning up request 0
ID 8 with timestamp 44871f25<br>Cleaning up request 1 ID 9 with timestamp
44871f25<br>Cleaning up request 2 ID 10 with timestamp 44871f25<br></font><font face="Arial" size="2">Cleaning up request 3 ID 11 with timestamp
44871f25<br>Cleaning up request 4 ID 12 with timestamp 44871f25<br>Waking up in
1 seconds...<br>--- Walking the entire request list ---<br>Cleaning up request 5
ID 13 with timestamp 44871f26<br>Nothing to do. Sleeping until we see a
request.<br>rad_recv: Access-Request packet from host 192.168.1.20:1026, id=14,
length=317<br> Attr-1 =
0x6a6f656c<br> NAS-Identifier =
"00-0b-6b-35-b4-4d:2_slimtest"<br>
NAS-IP-Address = 192.168.10.1<br>
NAS-Port = 10<br> NAS-Port-Id =
"ath0"<br> NAS-Port-Type =
Wireless-802.11<br> Service-Type =
Framed-User<br> Framed-MTU =
1400<br> Called-Station-Id =
"00-0B-6B-35-B4-4D:2_slimtest"<br>
Calling-Station-Id =
"00-C0-49-DD-38-5E"<br>
Event-Timestamp = "Dec 31 1969 16:03:50
PST"<br> WISPr-Location-ID =
"isocc=(null),cc=(null),ac=(null),network=(null)"<br>
WISPr-Location-Name =
"(null),(null)"<br> Connect-Info =
"CONNECT 11Mbps 802.11b"<br>
EAP-Message =
0x02060020190017030100154f081afb2009c468364080c391ce67884e<br>8ba24f5d<br>
State =
0xe7ad12776ec2df387a2d37ff50563861<br>
Message-Authenticator = 0xf7b1be3d97c3f0d9d0f3bc42636be68b<br> Processing
the authorize section of radiusd.conf<br>modcall: entering group authorize for
request 6<br> modcall[authorize]: module "preprocess" returns ok for
request 6<br> modcall[authorize]: module "chap" returns noop for request
6<br> modcall[authorize]: module "mschap" returns noop for request
6<br> rlm_realm: No <a id="bodyLinks" rel="nofollow" target="_blank" href="mailto:%27@%27">'@'</a> in User-Name
= "joel", looking up realm NULL<br> rlm_realm: No such realm
"NULL"<br> modcall[authorize]: module "suffix" returns noop for request
6<br> rlm_eap: EAP packet type response id 6 length 32<br> rlm_eap:
No EAP Start, assuming it's an on-going EAP conversation<br>
modcall[authorize]: module "eap" returns updated for request
6<br> users: Matched joel at 100<br> modcall[authorize]:
module "files" returns ok for request 6<br>modcall: group authorize returns
updated for request 6<br> rad_check_password: Found Auth-Type
EAP<br>auth: type "EAP"<br> Processing the authenticate section of
radiusd.conf<br>modcall: entering group authenticate for request 6<br>
rlm_eap: Request found, released from the list<br> rlm_eap:
EAP/peap<br> rlm_eap: processing type peap<br> rlm_eap_peap:
Authenticate<br> rlm_eap_tls: processing TLS<br> eaptls_verify
returned 7<br> rlm_eap_tls: Done initial handshake<br>
eaptls_process returned 7<br> rlm_eap_peap: EAPTLS_OK<br>
rlm_eap_peap: Session established. Decoding tunneled attributes.<br>
rlm_eap_peap: Identity - joel<br> rlm_eap_peap: Tunneled data is
valid.<br> PEAP: Got tunneled
EAP-Message<br> EAP-Message =
0x02060009016a6f656c<br> PEAP: Got tunneled identity of joel<br>
PEAP: Setting default EAP type for tunneled EAP session.<br>Segmentation
fault</font></div><div>- <br>List info/subscribe/unsubscribe? See <a target="_blank" href="http://www.freeradius.org/list/users.html">http://www.freeradius.org/list/users.html</a></div></div><br></div></div></body></html>