<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.6000.16414" name=GENERATOR></HEAD>
<BODY style="MARGIN: 4px 4px 1px; FONT: 10pt Tahoma">
<DIV>Hi all,</DIV>
<DIV> </DIV>
<DIV>I have tried everything recommended to me by Novell (as far as Microsoft patches) that may address an issue with their new (beta) Client 4.91 SP4. This client allows you to select 802.1x authentication and it's suppose to pass the login credentials to the Windows XP supplicant. Once 802.1x authentication is done, the Novell Client is supposed to continue it's login process. Based on the RADIUSD logs, I'm not getting a proper PEAP authentication at the Novell login prompt stage. Once this stage times out and I log in locally to the WinXP workstation, the PEAP authentication works fine.</DIV>
<DIV> </DIV>
<DIV>The timeout error is:</DIV>
<DIV>802.1x Authentication Failed. Timeout waiting for authentication to finish. Logging to workstation only. <OK></DIV>
<DIV> </DIV>
<DIV>FYI, Once the Novell 802.1x is enabled, the only thing I see that changes with WinXP supplicant's configuration (under PEAP) is that the Authentication Method is now listed as "Novell (EAP-MSCHAP v2)" instead of "Secured password (EAP-MSCHAP v2)".</DIV>
<DIV> </DIV>
<DIV>I'm wondering if the issue is related to something with my FreeRADIUS configuration? I've inculded the logs for when my pure Windows XP workstation authenticates and included the logs for what's going on while waiting for the Novell 802.1x client to timeout.</DIV>
<DIV> </DIV>
<DIV>I'm hoping a trained eye can spot something or anything that would lead me to a solution.</DIV>
<DIV> </DIV>
<DIV>Thanks for any help.</DIV>
<DIV>Marc</DIV>
<DIV> </DIV>
<DIV>
<DIV>
<DIV>
<DIV><FONT color=#ff0000>--------------------------------—------------------------------------—--------</FONT></DIV></DIV>
<DIV><FONT color=#ff0000>--------------------------------Novell 802.1x—-------------------------------</FONT></DIV>
<DIV><FONT color=#ff0000>--------------------------------—------------------------------------—--------</FONT></DIV>
<DIV>Nothing to do. Sleeping until we see a request.<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=156, length=184<BR> User-Name = "UOHI-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x0202000f01554f48492d3430363236<BR> Message-Authenticator = 0xf173e2f693b6439540056725af55c9a5<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 5046<BR> modcall[authorize]: module "preprocess" returns ok for request 5046<BR> modcall[authorize]: module "chap" returns noop for request 5046<BR> modcall[authorize]: module "mschap" returns noop for request 5046<BR> rlm_realm: No <A href="mailto:'@'">'@'</A> in User-Name = "UOHI-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 5046<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for UOHI-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=UOHI-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=UOHI-40626))<BR>rlm_ldap: checking if remote access for UOHI-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user UOHI-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 5046<BR> rlm_eap: EAP packet type response id 2 length 15<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 5046<BR>modcall: group authorize returns updated for request 5046<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 5046<BR> rlm_eap: EAP Identity<BR> rlm_eap: processing type tls<BR> rlm_eap_tls: Initiate<BR> rlm_eap_tls: Start returned 1<BR> modcall[authenticate]: module "eap" returns handled for request 5046<BR>modcall: group authenticate returns handled for request 5046<BR>Sending Access-Challenge of id 156 to 192.168.242.4:32768<BR> EAP-Message = 0x010300061920<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0x236c181e57c0ea83025c9e57460d53fb<BR>Finished request 5046<BR>Going to the next request<BR>--- Walking the entire request list ---<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=157, length=267<BR> User-Name = "UOHI-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x0203005019800000004616030100410100003d0301463a53cad2f596a4d17f6cdba65ae68141b95a139ae441539224f3830ecfbd2d00001600040005000a000900640062000300060013001200630100<BR> State = 0x236c181e57c0ea83025c9e57460d53fb<BR> Message-Authenticator = 0x3c69468e56b4da685f74f2ee77b5b65f<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 5047<BR> modcall[authorize]: module "preprocess" returns ok for request 5047<BR> modcall[authorize]: module "chap" returns noop for request 5047<BR> modcall[authorize]: module "mschap" returns noop for request 5047<BR> rlm_realm: No <A href="mailto:'@'">'@'</A> in User-Name = "UOHI-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 5047<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for UOHI-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=UOHI-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=UOHI-40626))<BR>rlm_ldap: checking if remote access for UOHI-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user UOHI-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 5047<BR> rlm_eap: EAP packet type response id 3 length 80<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 5047<BR>modcall: group authorize returns updated for request 5047<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 5047<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR>rlm_eap_tls: Length Included<BR> eaptls_verify returned 11<BR> (other): before/accept initialization<BR> TLS_accept: before/accept initialization<BR> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello<BR> TLS_accept: SSLv3 read client hello A<BR> rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello<BR> TLS_accept: SSLv3 write server hello A<BR> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0af4], Certificate<BR> TLS_accept: SSLv3 write certificate A<BR> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone<BR> TLS_accept: SSLv3 write server done A<BR> TLS_accept: SSLv3 flush data<BR> TLS_accept:error in SSLv3 read client certificate A<BR>In SSL Handshake Phase<BR>In SSL Accept mode<BR> eaptls_process returned 13<BR> rlm_eap_peap: EAPTLS_HANDLED<BR> modcall[authenticate]: module "eap" returns handled for request 5047<BR>modcall: group authenticate returns handled for request 5047<BR>Sending Access-Challenge of id 157 to 192.168.242.4:32768<BR> EAP-Message = 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<BR> EAP-Message = 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<BR> EAP-Message = 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<BR> EAP-Message = 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<BR> EAP-Message = 0x657274456e726f6c6c2f756f68692d63612e63726c30<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0x50ae1445bfa19e9199ff676e0527a36d<BR>Finished request 5047<BR>Going to the next request<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=158, length=193<BR> User-Name = "UOHI-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x020400061900<BR> State = 0x50ae1445bfa19e9199ff676e0527a36d<BR> Message-Authenticator = 0xe439288adf4546ea77fd4b41db6d415f<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 5048<BR> modcall[authorize]: module "preprocess" returns ok for request 5048<BR> modcall[authorize]: module "chap" returns noop for request 5048<BR> modcall[authorize]: module "mschap" returns noop for request 5048<BR> rlm_realm: No <A href="mailto:'@'">'@'</A> in User-Name = "UOHI-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 5048<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for UOHI-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=UOHI-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=UOHI-40626))<BR>rlm_ldap: checking if remote access for UOHI-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user UOHI-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 5048<BR> rlm_eap: EAP packet type response id 4 length 6<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 5048<BR>modcall: group authorize returns updated for request 5048<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 5048<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR>rlm_eap_tls: Received EAP-TLS ACK message<BR> rlm_eap_tls: ack handshake fragment handler<BR> eaptls_verify returned 1<BR> eaptls_process returned 13<BR> rlm_eap_peap: EAPTLS_HANDLED<BR> modcall[authenticate]: module "eap" returns handled for request 5048<BR>modcall: group authenticate returns handled for request 5048<BR>Sending Access-Challenge of id 158 to 192.168.242.4:32768<BR> EAP-Message = 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<BR> EAP-Message = 0x6c6f63616c2f43657274456e726f6c6c2f6f686961707033302e6f747461776168656172742e63612e6c6f63616c5f756f68692d63612e637274302106092b060104018237140204141e12005700650062005300650072007600650072300c0603551d130101ff04023000300b0603551d0f0404030205a030130603551d25040c300a06082b06010505070301300d06092a864886f70d0101050500038201010075b204baebe82901036bb830065f26844a0f213df174c9b4af8dd92b5a8c5290cced2f2ab28d6eda45c659fe6a331c117b0c761b590d7323f6f7bdd5b863c31bbb56085e97f0f2b0830777fab6c6760b19accb2ae195e9b5f9858bc3<BR> EAP-Message = 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<BR> EAP-Message = 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<BR> EAP-Message = 0xf4af9701ecd685f783c48b6db282334729fb<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0x76bc89cb174520f20da1729de7efd20f<BR>Finished request 5048<BR>Going to the next request<BR>Waking up in 6 seconds...</DIV>
<DIV>.................truncated log...................<BR><FONT color=#ff0000>--------------------------------—------------------------------------—--------</FONT></DIV>
<DIV>
<DIV><FONT color=#ff0000>--------------------------------WinXP 802.1x—------------------------------</FONT></DIV>
<DIV>
<DIV><FONT color=#ff0000>--------------------------------—------------------------------------—--------</FONT></DIV>
<DIV><FONT color=#0000ff>Ready to process requests.<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=121, length=184<BR> User-Name = "uohi-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x0202000f01756f68692d3430363236<BR> Message-Authenticator = 0x922f46002d917363694f9fc6ad5d7f1a<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 0<BR> modcall[authorize]: module "preprocess" returns ok for request 0<BR> modcall[authorize]: module "chap" returns noop for request 0<BR> modcall[authorize]: module "mschap" returns noop for request 0<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 0<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: attempting LDAP reconnection<BR>rlm_ldap: (re)connect to ohiapp2.ottawaheart.ca:636, authentication 0<BR>rlm_ldap: setting TLS mode to 1<BR>rlm_ldap: setting TLS CACert File to /etc/raddb/certs/ohicoca.b64<BR>rlm_ldap: setting TLS Require Cert to demand<BR>rlm_ldap: bind as cn=radiusadmin,o=ohico/password1 to ohiapp2.ottawaheart.ca:636<BR>rlm_ldap: waiting for bind result ...<BR>rlm_ldap: Bind was successful<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 0<BR> rlm_eap: EAP packet type response id 2 length 15<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 0<BR>modcall: group authorize returns updated for request 0<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 0<BR> rlm_eap: EAP Identity<BR> rlm_eap: processing type tls<BR> rlm_eap_tls: Initiate<BR> rlm_eap_tls: Start returned 1<BR> modcall[authenticate]: module "eap" returns handled for request 0<BR>modcall: group authenticate returns handled for request 0<BR>Sending Access-Challenge of id 121 to 192.168.242.4:32768<BR> EAP-Message = 0x010300061920<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0x93caaa863ff5038129193abee584d46a<BR>Finished request 0<BR>Going to the next request<BR>--- Walking the entire request list ---<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=122, length=267<BR> User-Name = "uohi-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x0203005019800000004616030100410100003d03014635f7be7c178a486bb5cdd268f67d2bc9a27eb1210f2f1317767e0c6d6a262b00001600040005000a000900640062000300060013001200630100<BR> State = 0x93caaa863ff5038129193abee584d46a<BR> Message-Authenticator = 0x5df9412836f4c9c11614a2656d7c27bd<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 1<BR> modcall[authorize]: module "preprocess" returns ok for request 1<BR> modcall[authorize]: module "chap" returns noop for request 1<BR> modcall[authorize]: module "mschap" returns noop for request 1<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 1<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 1<BR> rlm_eap: EAP packet type response id 3 length 80<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 1<BR>modcall: group authorize returns updated for request 1<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 1<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR>rlm_eap_tls: Length Included<BR> eaptls_verify returned 11<BR> (other): before/accept initialization<BR> TLS_accept: before/accept initialization<BR> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello<BR> TLS_accept: SSLv3 read client hello A<BR> rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello<BR> TLS_accept: SSLv3 write server hello A<BR> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0af4], Certificate<BR> TLS_accept: SSLv3 write certificate A<BR> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone<BR> TLS_accept: SSLv3 write server done A<BR> TLS_accept: SSLv3 flush data<BR> TLS_accept:error in SSLv3 read client certificate A<BR>In SSL Handshake Phase<BR>In SSL Accept mode<BR> eaptls_process returned 13<BR> rlm_eap_peap: EAPTLS_HANDLED<BR> modcall[authenticate]: module "eap" returns handled for request 1<BR>modcall: group authenticate returns handled for request 1<BR>Sending Access-Challenge of id 122 to 192.168.242.4:32768<BR> EAP-Message = 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<BR> EAP-Message = 0x170d3039303432363139343330325a3077310b30090603550406130243413110300e060355040813074f6e746172696f310f300d060355040713064f7474617761310d300b060355040a1304554f48493111300f060355040313084f4849534c4553313123302106092a864886f70d010901161461646d696e406f747461776168656172742e636130820122300d06092a864886f70d01010105000382010f003082010a02820101009c62aac4b4d7c2a0a3b074bc3a9922f6eade8be2b126ef833e55f97b61f8ddc0b90d016c0f0bdc12c94ba162085969a2ea5348e6ecdd88dbbd2a24723fb099730e01ae6f3b7bd7eafcdb69f847ced1b09a04eed9<BR> EAP-Message = 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<BR> EAP-Message = 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<BR> EAP-Message = 0x657274456e726f6c6c2f756f68692d63612e63726c30<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0x73d34a88bd2fee7201ae7e9423c0051b<BR>Finished request 1<BR>Going to the next request<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=123, length=193<BR> User-Name = "uohi-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x020400061900<BR> State = 0x73d34a88bd2fee7201ae7e9423c0051b<BR> Message-Authenticator = 0x873d1087cee6ef4613cdd6fe29b02f26<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 2<BR> modcall[authorize]: module "preprocess" returns ok for request 2<BR> modcall[authorize]: module "chap" returns noop for request 2<BR> modcall[authorize]: module "mschap" returns noop for request 2<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 2<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 2<BR> rlm_eap: EAP packet type response id 4 length 6<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 2<BR>modcall: group authorize returns updated for request 2<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 2<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR>rlm_eap_tls: Received EAP-TLS ACK message<BR> rlm_eap_tls: ack handshake fragment handler<BR> eaptls_verify returned 1<BR> eaptls_process returned 13<BR> rlm_eap_peap: EAPTLS_HANDLED<BR> modcall[authenticate]: module "eap" returns handled for request 2<BR>modcall: group authenticate returns handled for request 2<BR>Sending Access-Challenge of id 123 to 192.168.242.4:32768<BR> EAP-Message = 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<BR> EAP-Message = 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<BR> EAP-Message = 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<BR> EAP-Message = 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<BR> EAP-Message = 0xf4af9701ecd685f783c48b6db282334729fb<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0x3a7b1fb590325e8310f18983c83b7950<BR>Finished request 2<BR>Going to the next request<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=124, length=193<BR> User-Name = "uohi-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x020500061900<BR> State = 0x3a7b1fb590325e8310f18983c83b7950<BR> Message-Authenticator = 0xcb369d29c669fca8b35927b6a1c7fee0<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 3<BR> modcall[authorize]: module "preprocess" returns ok for request 3<BR> modcall[authorize]: module "chap" returns noop for request 3<BR> modcall[authorize]: module "mschap" returns noop for request 3<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 3<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 3<BR> rlm_eap: EAP packet type response id 5 length 6<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 3<BR>modcall: group authorize returns updated for request 3<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 3<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR>rlm_eap_tls: Received EAP-TLS ACK message<BR> rlm_eap_tls: ack handshake fragment handler<BR> eaptls_verify returned 1<BR> eaptls_process returned 13<BR> rlm_eap_peap: EAPTLS_HANDLED<BR> modcall[authenticate]: module "eap" returns handled for request 3<BR>modcall: group authenticate returns handled for request 3<BR>Sending Access-Challenge of id 124 to 192.168.242.4:32768<BR> EAP-Message = 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<BR> EAP-Message = 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<BR> EAP-Message = 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<BR> EAP-Message = 0x683acaee9aa90766a60226065015dd876f17096ec0c2f0895af9208207742d9760c2195c8044511e279f772f9cda8300facba05aab206f608931126fa901aef3d1e6fbe3658c1dd407b01430e259a178311890491a788016030100040e000000<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0xc6193d66721bb21321cafdba2ba576bd<BR>Finished request 3<BR>Going to the next request<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=125, length=509<BR> User-Name = "uohi-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 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<BR> EAP-Message = 0x047c94bf868ebe856f1839dbc1b8bdacb6d94939a1fd624114030100010116030100209c589e35c929e5938470268e8dcd4b76f57d0843298218371888d909c214c787<BR> State = 0xc6193d66721bb21321cafdba2ba576bd<BR> Message-Authenticator = 0xd1fb50325cce41df140ddebc97a130db<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 4<BR> modcall[authorize]: module "preprocess" returns ok for request 4<BR> modcall[authorize]: module "chap" returns noop for request 4<BR> modcall[authorize]: module "mschap" returns noop for request 4<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 4<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 4<BR> rlm_eap: EAP packet type response id 6 length 253<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 4<BR>modcall: group authorize returns updated for request 4<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 4<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR>rlm_eap_tls: Length Included<BR> eaptls_verify returned 11<BR> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange<BR> TLS_accept: SSLv3 read client key exchange A<BR> rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]<BR> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished<BR> TLS_accept: SSLv3 read finished A<BR> rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]<BR> TLS_accept: SSLv3 write change cipher spec A<BR> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished<BR> TLS_accept: SSLv3 write finished A<BR> TLS_accept: SSLv3 flush data<BR> (other): SSL negotiation finished successfully<BR>SSL Connection Established<BR> eaptls_process returned 13<BR> rlm_eap_peap: EAPTLS_HANDLED<BR> modcall[authenticate]: module "eap" returns handled for request 4<BR>modcall: group authenticate returns handled for request 4<BR>Sending Access-Challenge of id 125 to 192.168.242.4:32768<BR> EAP-Message = 0x01070031190014030100010116030100207423e74c3f5fbe12320ded15ad9624297dbf09ae12e14e6953251012f973ef8f<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0x1a6362a241390686a531c97e4822ac6a<BR>Finished request 4<BR>Going to the next request<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=126, length=193<BR> User-Name = "uohi-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x020700061900<BR> State = 0x1a6362a241390686a531c97e4822ac6a<BR> Message-Authenticator = 0x12c2e3615f01218fbcf0824dd8d499df<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 5<BR> modcall[authorize]: module "preprocess" returns ok for request 5<BR> modcall[authorize]: module "chap" returns noop for request 5<BR> modcall[authorize]: module "mschap" returns noop for request 5<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 5<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 5<BR> rlm_eap: EAP packet type response id 7 length 6<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 5<BR>modcall: group authorize returns updated for request 5<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 5<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR>rlm_eap_tls: Received EAP-TLS ACK message<BR> rlm_eap_tls: ack handshake is finished<BR> eaptls_verify returned 3<BR> eaptls_process returned 3<BR> rlm_eap_peap: EAPTLS_SUCCESS<BR> modcall[authenticate]: module "eap" returns handled for request 5<BR>modcall: group authenticate returns handled for request 5<BR>Sending Access-Challenge of id 126 to 192.168.242.4:32768<BR> EAP-Message = 0x01080020190017030100155172ae0c6a9ac80c0e0adf84b24ea89afeb99aa2af<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0x54c4681f47b5df4693283a92f13bfda2<BR>Finished request 5<BR>Going to the next request<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=127, length=225<BR> User-Name = "uohi-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x020800261900170301001b86f3a61bb93a623816c16d2a7a5f95dd42bc4f6e340c077931a826<BR> State = 0x54c4681f47b5df4693283a92f13bfda2<BR> Message-Authenticator = 0xdcc049150e20bdb1460cf21739f4a7ec<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 6<BR> modcall[authorize]: module "preprocess" returns ok for request 6<BR> modcall[authorize]: module "chap" returns noop for request 6<BR> modcall[authorize]: module "mschap" returns noop for request 6<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 6<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 6<BR> rlm_eap: EAP packet type response id 8 length 38<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 6<BR>modcall: group authorize returns updated for request 6<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 6<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR> eaptls_verify returned 7<BR> rlm_eap_tls: Done initial handshake<BR> eaptls_process returned 7<BR> rlm_eap_peap: EAPTLS_OK<BR> rlm_eap_peap: Session established. Decoding tunneled attributes.<BR> rlm_eap_peap: Identity - uohi-40626<BR> rlm_eap_peap: Tunneled data is valid.<BR> PEAP: Got tunneled identity of uohi-40626<BR> PEAP: Setting default EAP type for tunneled EAP session.<BR> PEAP: Setting User-Name to uohi-40626<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 6<BR> modcall[authorize]: module "preprocess" returns ok for request 6<BR> modcall[authorize]: module "chap" returns noop for request 6<BR> modcall[authorize]: module "mschap" returns noop for request 6<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 6<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 6<BR> rlm_eap: EAP packet type response id 8 length 15<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 6<BR>modcall: group authorize returns updated for request 6<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 6<BR> rlm_eap: EAP Identity<BR> rlm_eap: processing type mschapv2<BR>rlm_eap_mschapv2: Issuing Challenge<BR> modcall[authenticate]: module "eap" returns handled for request 6<BR>modcall: group authenticate returns handled for request 6<BR> PEAP: Got tunneled Access-Challenge<BR> modcall[authenticate]: module "eap" returns handled for request 6<BR>modcall: group authenticate returns handled for request 6<BR>Sending Access-Challenge of id 127 to 192.168.242.4:32768<BR> EAP-Message = 0x0109003b1900170301003036ad300c881a4781ecfe5ad36ade6a796398a4b00b94695210ea1e3092118b139dbdd36fc8006070f21b2b035edcccf4<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0xeeb519ae4be3301c72a83c0a865a0b9e<BR>Finished request 6<BR>Going to the next request<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=128, length=279<BR> User-Name = "uohi-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x0209005c19001703010051002aba019889bb3dd8e8987e14e20f70a638c87d9a37d2d6d5802211abd4851e0be4664a3bbbdff2bed3852df00845cf79b1cf5da49e4860c4d53b834c8fd7c8f097fb6637a56e19bfeff26de69345c891<BR> State = 0xeeb519ae4be3301c72a83c0a865a0b9e<BR> Message-Authenticator = 0x730a8e143fde3e5003b869d70473a51e<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 7<BR> modcall[authorize]: module "preprocess" returns ok for request 7<BR> modcall[authorize]: module "chap" returns noop for request 7<BR> modcall[authorize]: module "mschap" returns noop for request 7<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 7<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 7<BR> rlm_eap: EAP packet type response id 9 length 92<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 7<BR>modcall: group authorize returns updated for request 7<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 7<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR> eaptls_verify returned 7<BR> rlm_eap_tls: Done initial handshake<BR> eaptls_process returned 7<BR> rlm_eap_peap: EAPTLS_OK<BR> rlm_eap_peap: Session established. Decoding tunneled attributes.<BR> rlm_eap_peap: EAP type mschapv2<BR> rlm_eap_peap: Tunneled data is valid.<BR> PEAP: Setting User-Name to uohi-40626<BR> PEAP: Adding old state with 2f c0<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 7<BR> modcall[authorize]: module "preprocess" returns ok for request 7<BR> modcall[authorize]: module "chap" returns noop for request 7<BR> modcall[authorize]: module "mschap" returns noop for request 7<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 7<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 7<BR> rlm_eap: EAP packet type response id 9 length 69<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 7<BR>modcall: group authorize returns updated for request 7<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 7<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/mschapv2<BR> rlm_eap: processing type mschapv2<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group Auth-Type for request 7<BR> rlm_mschap: Told to do MS-CHAPv2 for uohi-40626 with NT-Password<BR>rlm_mschap: adding MS-CHAPv2 MPPE keys<BR> modcall[authenticate]: module "mschap" returns ok for request 7<BR>modcall: group Auth-Type returns ok for request 7<BR>MSCHAP Success<BR> modcall[authenticate]: module "eap" returns handled for request 7<BR>modcall: group authenticate returns handled for request 7<BR> PEAP: Got tunneled Access-Challenge<BR> modcall[authenticate]: module "eap" returns handled for request 7<BR>modcall: group authenticate returns handled for request 7<BR>Sending Access-Challenge of id 128 to 192.168.242.4:32768<BR> EAP-Message = 0x010a004a1900170301003fb293ead741078cd1f5c27b03b405e84ba15177c2e7241c9c1f57ae42183f7630849057c63a18fc894f0c671c5b12e9555f4334ce4b975a1f2003fcf9a245e5<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0x1af67523335f413f76a767e458ea1974<BR>Finished request 7<BR>Going to the next request<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=129, length=216<BR> User-Name = "uohi-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x020a001d19001703010012b32aa3fa1907ff8182cdcf1968335c5721d3<BR> State = 0x1af67523335f413f76a767e458ea1974<BR> Message-Authenticator = 0x1e17c361ebbcfba0af678a976a9ddd1d<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 8<BR> modcall[authorize]: module "preprocess" returns ok for request 8<BR> modcall[authorize]: module "chap" returns noop for request 8<BR> modcall[authorize]: module "mschap" returns noop for request 8<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 8<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 8<BR> rlm_eap: EAP packet type response id 10 length 29<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 8<BR>modcall: group authorize returns updated for request 8<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 8<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR> eaptls_verify returned 7<BR> rlm_eap_tls: Done initial handshake<BR> eaptls_process returned 7<BR> rlm_eap_peap: EAPTLS_OK<BR> rlm_eap_peap: Session established. Decoding tunneled attributes.<BR> rlm_eap_peap: EAP type mschapv2<BR> rlm_eap_peap: Tunneled data is valid.<BR> PEAP: Setting User-Name to uohi-40626<BR> PEAP: Adding old state with 88 ca<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 8<BR> modcall[authorize]: module "preprocess" returns ok for request 8<BR> modcall[authorize]: module "chap" returns noop for request 8<BR> modcall[authorize]: module "mschap" returns noop for request 8<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 8<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 8<BR> rlm_eap: EAP packet type response id 10 length 6<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 8<BR>modcall: group authorize returns updated for request 8<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 8<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/mschapv2<BR> rlm_eap: processing type mschapv2<BR> rlm_eap: Freeing handler<BR> modcall[authenticate]: module "eap" returns ok for request 8<BR>modcall: group authenticate returns ok for request 8<BR> Processing the post-auth section of radiusd.conf<BR>modcall: entering group post-auth for request 8<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: attempting LDAP reconnection<BR>rlm_ldap: (re)connect to ohiapp2.ottawaheart.ca:636, authentication 0<BR>rlm_ldap: setting TLS mode to 1<BR>rlm_ldap: setting TLS CACert File to /etc/raddb/certs/ohicoca.b64<BR>rlm_ldap: setting TLS Require Cert to demand<BR>rlm_ldap: bind as cn=UOHI-40626,o=OHICO/password2 to ohiapp2.ottawaheart.ca:636<BR>rlm_ldap: waiting for bind result ...<BR>rlm_ldap: Bind was successful<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[post-auth]: module "ldap" returns ok for request 8<BR>modcall: group post-auth returns ok for request 8<BR> PEAP: Tunneled authentication was successful.<BR> rlm_eap_peap: SUCCESS<BR> modcall[authenticate]: module "eap" returns handled for request 8<BR>modcall: group authenticate returns handled for request 8<BR>Sending Access-Challenge of id 129 to 192.168.242.4:32768<BR> EAP-Message = 0x010b00261900170301001b6bde06f01acb27007249f0493cb64acff16eeba41cd83dbb4f5ddb<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> State = 0xf516529c2c3333a596134f029731c2a7<BR>Finished request 8<BR>Going to the next request<BR>Waking up in 6 seconds...<BR>rad_recv: Access-Request packet from host 192.168.242.4:32768, id=130, length=225<BR> User-Name = "uohi-40626"<BR> Calling-Station-Id = "00-40-96-B1-43-A8"<BR> Called-Station-Id = "00-15-2C-49-E0-B0:UOHISSID2"<BR> NAS-Port = 1<BR> NAS-IP-Address = 192.168.242.4<BR> NAS-Identifier = "UOHIWLAN2"<BR> Vendor-14179-Attr-1 = 0x00000002<BR> Service-Type = Framed-User<BR> Framed-MTU = 1300<BR> NAS-Port-Type = Wireless-802.11<BR> Tunnel-Type:0 = VLAN<BR> Tunnel-Medium-Type:0 = IEEE-802<BR> Tunnel-Private-Group-Id:0 = "23"<BR> EAP-Message = 0x020b00261900170301001b2837b2cb0b17764f86a6aee15f787a9ca580712ce1ec00399958cd<BR> State = 0xf516529c2c3333a596134f029731c2a7<BR> Message-Authenticator = 0x8b75e059d8b1ed44aacbe651b633ba8d<BR> Processing the authorize section of radiusd.conf<BR>modcall: entering group authorize for request 9<BR> modcall[authorize]: module "preprocess" returns ok for request 9<BR> modcall[authorize]: module "chap" returns noop for request 9<BR> modcall[authorize]: module "mschap" returns noop for request 9<BR> rlm_realm: No </FONT><A href="mailto:'@'">'@'</A><FONT color=#0000ff> in User-Name = "uohi-40626", looking up realm NULL<BR> rlm_realm: No such realm "NULL"<BR> modcall[authorize]: module "suffix" returns noop for request 9<BR>rlm_ldap: - authorize<BR>rlm_ldap: performing user authorization for uohi-40626<BR>radius_xlat: '(&(objectClass=inetOrgPerson)(cn=uohi-40626))'<BR>radius_xlat: 'o=OHICO'<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: performing search in o=OHICO, with filter (&(objectClass=inetOrgPerson)(cn=uohi-40626))<BR>rlm_ldap: checking if remote access for uohi-40626 is allowed by dialupAccess<BR>rlm_ldap: Added the eDirectory password in check items<BR>rlm_ldap: looking for check items in directory...<BR>rlm_ldap: looking for reply items in directory...<BR>rlm_ldap: user uohi-40626 authorized to use remote access<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[authorize]: module "ldap" returns ok for request 9<BR> rlm_eap: EAP packet type response id 11 length 38<BR> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR> modcall[authorize]: module "eap" returns updated for request 9<BR>modcall: group authorize returns updated for request 9<BR> rad_check_password: Found Auth-Type EAP<BR>auth: type "EAP"<BR> Processing the authenticate section of radiusd.conf<BR>modcall: entering group authenticate for request 9<BR> rlm_eap: Request found, released from the list<BR> rlm_eap: EAP/peap<BR> rlm_eap: processing type peap<BR> rlm_eap_peap: Authenticate<BR> rlm_eap_tls: processing TLS<BR> eaptls_verify returned 7<BR> rlm_eap_tls: Done initial handshake<BR> eaptls_process returned 7<BR> rlm_eap_peap: EAPTLS_OK<BR> rlm_eap_peap: Session established. Decoding tunneled attributes.<BR> rlm_eap_peap: Received EAP-TLV response.<BR> rlm_eap_peap: Tunneled data is valid.<BR> rlm_eap_peap: Success<BR> rlm_eap: Freeing handler<BR> modcall[authenticate]: module "eap" returns ok for request 9<BR>modcall: group authenticate returns ok for request 9<BR> Processing the post-auth section of radiusd.conf<BR>modcall: entering group post-auth for request 9<BR>rlm_ldap: ldap_get_conn: Checking Id: 0<BR>rlm_ldap: ldap_get_conn: Got Id: 0<BR>rlm_ldap: ldap_release_conn: Release Id: 0<BR> modcall[post-auth]: module "ldap" returns ok for request 9<BR>modcall: group post-auth returns ok for request 9<BR>Sending Access-Accept of id 130 to 192.168.242.4:32768<BR> MS-MPPE-Recv-Key = 0xc570abcce451a67a5d65b7532fca28a5dead13f23057ad89e61e94c8a0cd40bb<BR> MS-MPPE-Send-Key = 0xe15ee990baea038e9f4bfa56e225e4f2aa26b047a2d56976396f5dbbca3cacdd<BR> EAP-Message = 0x030b0004<BR> Message-Authenticator = 0x00000000000000000000000000000000<BR> User-Name = "uohi-40626"<BR>Finished request 9<BR>Going to the next request</FONT></DIV></DIV></DIV></DIV></DIV></BODY></HTML>