<br>Dear All,<br>I am a newbee in freeRADIUS and unable to setting up PEAP in freeRADIUS with winXp supplicant.On the client side it always show attempting to authenticate.I am getting the following lines at the last of the log file of
freeRADIUS.Help me to sort out<br>the problem please.<br><br>**************************log file*************************<br> modcall[authorize]: module "files" returns ok for request 4<br>rlm_pap: Found existing Auth-Type, not changing it.
<br> modcall[authorize]: module "pap" returns noop for request 4<br>modcall: leaving group authorize (returns updated) for request 4<br> rad_check_password: Found Auth-Type EAP<br>auth: type "EAP"<br>
Processing the authenticate section of radiusd.conf<br>modcall: entering group authenticate for request 4<br> rlm_eap: Request found, released from the list<br> rlm_eap: EAP/peap<br> rlm_eap: processing type peap<br>
rlm_eap_peap: Authenticate<br> rlm_eap_tls: processing TLS<br>rlm_eap_tls: Received EAP-TLS ACK message<br> rlm_eap_tls: ack handshake is finished<br> eaptls_verify returned 3 <br> eaptls_process returned 3 <br> rlm_eap_peap: EAPTLS_SUCCESS
<br> modcall[authenticate]: module "eap" returns handled for request 4<br>modcall: leaving group authenticate (returns handled) for request 4<br>Sending Access-Challenge of id 0 to <a href="http://192.168.6.14">
192.168.6.14</a> port 2049<br> EAP-Message = 0x0105002019001703010015c37ca76db66f6a97fcfcf85e65a7e03d3e70fcf43d<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0x5142c99b4f3e278d5f71af41f06e1e96
<br>Finished request 4<br>Going to the next request<br>Waking up in 6 seconds...<br>rad_recv: Access-Request packet from host <a href="http://192.168.6.14:2049">192.168.6.14:2049</a>, id=0, length=180<br> User-Name = "administrator"
<br> NAS-IP-Address = <a href="http://192.168.6.14">192.168.6.14</a><br> Called-Station-Id = "0012172a3da3"<br> Calling-Station-Id = "00131008616c"<br> NAS-Identifier = "0012172a3da3"
<br> NAS-Port = 5<br> Framed-MTU = 1400<br> State = 0x5142c99b4f3e278d5f71af41f06e1e96<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x020500291900170301001e103d6d5ce7a04c446824e451f6b169ff53a8f48d18f614092295e6e1cdb6
<br> Message-Authenticator = 0x45a325b094cfed83fdb2aad638a9fb12<br> Processing the authorize section of radiusd.conf<br>modcall: entering group authorize for request 5<br> modcall[authorize]: module "preprocess" returns ok for request 5
<br> modcall[authorize]: module "mschap" returns noop for request 5<br> rlm_realm: No '@' in User-Name = "administrator", looking up realm NULL<br> rlm_realm: No such realm "NULL"
<br> modcall[authorize]: module "suffix" returns noop for request 5<br> rlm_eap: EAP packet type response id 5 length 41<br> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br> modcall[authorize]: module "eap" returns updated for request 5
<br> users: Matched entry DEFAULT at line 152<br> users: Matched entry administrator at line 215<br> modcall[authorize]: module "files" returns ok for request 5<br>rlm_pap: Found existing Auth-Type, not changing it.
<br> modcall[authorize]: module "pap" returns noop for request 5<br>modcall: leaving group authorize (returns updated) for request 5<br> rad_check_password: Found Auth-Type EAP<br>auth: type "EAP"<br>
Processing the authenticate section of radiusd.conf<br>modcall: entering group authenticate for request 5<br> rlm_eap: Request found, released from the list<br> rlm_eap: EAP/peap<br> rlm_eap: processing type peap<br>
rlm_eap_peap: Authenticate<br> rlm_eap_tls: processing TLS<br> eaptls_verify returned 7 <br> rlm_eap_tls: Done initial handshake<br> eaptls_process returned 7 <br> rlm_eap_peap: EAPTLS_OK<br> rlm_eap_peap: Session established. Decoding tunneled attributes.
<br> rlm_eap_peap: Identity - administrator<br> rlm_eap_peap: Tunneled data is valid.<br> PEAP: Got tunneled identity of administrator<br> PEAP: Setting default EAP type for tunneled EAP session.<br> PEAP: Setting User-Name to administrator
<br> Processing the authorize section of radiusd.conf<br>modcall: entering group authorize for request 5<br> modcall[authorize]: module "preprocess" returns ok for request 5<br> modcall[authorize]: module "mschap" returns noop for request 5
<br> rlm_realm: No '@' in User-Name = "administrator", looking up realm NULL<br> rlm_realm: No such realm "NULL"<br> modcall[authorize]: module "suffix" returns noop for request 5
<br> rlm_eap: EAP packet type response id 5 length 18<br> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br> modcall[authorize]: module "eap" returns updated for request 5<br> users: Matched entry DEFAULT at line 152
<br> users: Matched entry administrator at line 215<br> modcall[authorize]: module "files" returns ok for request 5<br>rlm_pap: Found existing Auth-Type, not changing it.<br> modcall[authorize]: module "pap" returns noop for request 5
<br>modcall: leaving group authorize (returns updated) for request 5<br> rad_check_password: Found Auth-Type EAP<br>auth: type "EAP"<br> Processing the authenticate section of radiusd.conf<br>modcall: entering group authenticate for request 5
<br> rlm_eap: EAP Identity<br> rlm_eap: No such EAP type mschapv2<br> rlm_eap: Failed in EAP select<br> modcall[authenticate]: module "eap" returns invalid for request 5<br>modcall: leaving group authenticate (returns invalid) for request 5
<br>auth: Failed to validate the user.<br> PEAP: Tunneled authentication was rejected.<br> rlm_eap_peap: FAILURE<br> modcall[authenticate]: module "eap" returns handled for request 5<br>modcall: leaving group authenticate (returns handled) for request 5
<br>Sending Access-Challenge of id 0 to <a href="http://192.168.6.14">192.168.6.14</a> port 2049<br> EAP-Message = 0x010600261900170301001b91727baee5568c72883984a71242056b8f336171f797c3646a85de<br> Message-Authenticator = 0x00000000000000000000000000000000
<br> State = 0x1654be07c4122f438449a5f35981dd27<br>Finished request 5<br>Going to the next request<br>Waking up in 6 seconds...<br>rad_recv: Access-Request packet from host <a href="http://192.168.6.14:2049">192.168.6.14:2049
</a>, id=0, length=177<br> User-Name = "administrator"<br> NAS-IP-Address = <a href="http://192.168.6.14">192.168.6.14</a><br> Called-Station-Id = "0012172a3da3"<br> Calling-Station-Id = "00131008616c"
<br> NAS-Identifier = "0012172a3da3"<br> NAS-Port = 5<br> Framed-MTU = 1400<br> State = 0x1654be07c4122f438449a5f35981dd27<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x020600261900170301001bdbac43bc04a3b2686dc05fc44cdb0a3922e36e0156ea45c11c188e
<br> Message-Authenticator = 0x0150585836af2d8127b88cf51a3efbfd<br> Processing the authorize section of radiusd.conf<br>modcall: entering group authorize for request 6<br> modcall[authorize]: module "preprocess" returns ok for request 6
<br> modcall[authorize]: module "mschap" returns noop for request 6<br> rlm_realm: No '@' in User-Name = "administrator", looking up realm NULL<br> rlm_realm: No such realm "NULL"
<br> modcall[authorize]: module "suffix" returns noop for request 6<br> rlm_eap: EAP packet type response id 6 length 38<br> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br> modcall[authorize]: module "eap" returns updated for request 6
<br> users: Matched entry DEFAULT at line 152<br> users: Matched entry administrator at line 215<br> modcall[authorize]: module "files" returns ok for request 6<br>rlm_pap: Found existing Auth-Type, not changing it.
<br> modcall[authorize]: module "pap" returns noop for request 6<br>modcall: leaving group authorize (returns updated) for request 6<br> rad_check_password: Found Auth-Type EAP<br>auth: type "EAP"<br>
Processing the authenticate section of radiusd.conf<br>modcall: entering group authenticate for request 6<br> rlm_eap: Request found, released from the list<br> rlm_eap: EAP/peap<br> rlm_eap: processing type peap<br>
rlm_eap_peap: Authenticate<br> rlm_eap_tls: processing TLS<br> eaptls_verify returned 7 <br> rlm_eap_tls: Done initial handshake<br> eaptls_process returned 7 <br> rlm_eap_peap: EAPTLS_OK<br> rlm_eap_peap: Session established. Decoding tunneled attributes.
<br> rlm_eap_peap: Received EAP-TLV response.<br> rlm_eap_peap: Tunneled data is valid.<br> rlm_eap_peap: Had sent TLV failure. User was rejcted rejected earlier in this session.<br> rlm_eap: Handler failed in EAP/peap
<br> rlm_eap: Failed in EAP select<br> modcall[authenticate]: module "eap" returns invalid for request 6<br>modcall: leaving group authenticate (returns invalid) for request 6<br>auth: Failed to validate the user.
<br>Delaying request 6 for 1 seconds<br>Finished request 6<br>Going to the next request<br>Waking up in 6 seconds...<br>--- Walking the entire request list ---<br>Sending Access-Reject of id 0 to <a href="http://192.168.6.14">
192.168.6.14</a> port 2049<br> EAP-Message = 0x04060004<br> Message-Authenticator = 0x00000000000000000000000000000000<br>Cleaning up request 6 ID 0 with timestamp 466d3f35<br>Nothing to do. Sleeping until we see a request.
<br>***********************log file*************************************<br><br>please help.<br><br>with regards...<br>apangshu<br><br><br>