<div>Hi,</div>
<div> </div>
<div> RADIUS log....</div>
<div>
<p><a href="mailto:root@ims-wifi-server:/usr/local/radius/sbin">root@ims-wifi-server:/usr/local/radius/sbin</a># ./runradius.sh <br>+ export LD_LIBRARY_PATH=/usr/local/openssl/lib/<br>+ ./radiusd -X -y -z -A -f -i <a href="http://10.89.49.12">
10.89.49.12</a><br>Starting - reading configuration files ...<br>read_config_files: reading dictionary<br>Config: including file: /usr/local/radius/etc/raddb/proxy.conf<br>Config: including file: /usr/local/radius/etc/raddb/clients.conf
<br>Config: including file: /usr/local/radius/etc/raddb/snmp.conf<br>Config: including file: /usr/local/radius/etc/raddb/eap.conf<br>Config: including file: /usr/local/radius/etc/raddb/sql.conf<br> main: prefix = "/usr/local/radius"
<br> main: localstatedir = "/usr/local/radius/var"<br> main: logdir = "/usr/local/radius/var/log/radius"<br> main: libdir = "/usr/local/radius/lib"<br> main: radacctdir = "/usr/local/radius/var/log/radius/radacct"
<br> main: hostname_lookups = no<br> main: max_request_time = 30<br> main: cleanup_delay = 5<br> main: max_requests = 1024<br> main: delete_blocked_requests = 0<br> main: allow_core_dumps = no<br> main: log_stripped_names = no
<br> main: log_file = "/usr/local/radius/var/log/radius/radius.log"<br> main: log_auth = no<br> main: log_auth_badpass = no<br> main: log_auth_goodpass = no<br> main: pidfile = "/usr/local/radius/var/run/radiusd/radiusd.pid"
<br> main: checkrad = "/usr/local/radius/sbin/checkrad"<br> main: debug_level = 0<br> main: proxy_requests = yes<br> log: syslog_facility = "daemon"<br> proxy: retry_delay = 5<br> proxy: retry_count = 3
<br> proxy: default_fallback = yes<br> proxy: dead_time = 120<br> proxy: wake_all_if_all_dead = no<br> security: max_attributes = 200<br> security: reject_delay = 1<br> security: status_server = no<br>read_config_files: reading realms
<br> main: port = 1812<br> client: secret = "testing123"<br> client: shortname = "localhost"<br> client: nastype = "other"<br> client: secret = "raghu123456"<br> client: shortname = "linksys"
<br> client: secret = "raghu123456"<br> client: shortname = "3com"<br>radiusd: entering modules setup<br>Module: Library search path is /usr/local/radius/lib<br>Module: Loaded exec <br> exec: wait = yes
<br> exec: input_pairs = "request"<br> exec: shell_escape = yes<br>rlm_exec: wait=yes but no output defined. Did you mean output=none?<br>Module: Instantiated exec (exec) <br>Module: Loaded expr <br>Module: Instantiated expr (expr)
<br>Module: Loaded expiration <br> expiration: reply-message = "Password Has Expired "<br>Module: Instantiated expiration (expiration) <br>Module: Loaded logintime <br> logintime: reply-message = "You are calling outside your allowed timespan "
<br> logintime: minimum-timeout = 60<br>Module: Instantiated logintime (logintime) <br>Module: Loaded PAP <br> pap: encryption_scheme = "auto"<br> pap: auto_header = no<br>Module: Instantiated pap (pap) <br>Module: Loaded CHAP
<br>Module: Instantiated chap (chap) <br>Module: Loaded MS-CHAP <br> mschap: use_mppe = yes<br> mschap: require_encryption = no<br> mschap: require_strong = no<br> mschap: with_ntdomain_hack = no<br> mschap: authtype = "MS-CHAP"
<br>Module: Instantiated mschap (mschap) <br>Module: Loaded System <br> unix: radwtmp = "/usr/local/radius/var/log/radius/radwtmp"<br>Module: Instantiated unix (unix) <br>Module: Loaded eap <br> eap: default_eap_type = "ttls"
<br> eap: timer_expire = 60<br> eap: ignore_unknown_eap_types = no<br> eap: cisco_accounting_username_bug = no<br>rlm_eap: Loaded and initialized type md5<br>rlm_eap: Loaded and initialized type leap<br> tls: rsa_key_exchange = no
<br> tls: dh_key_exchange = yes<br> tls: rsa_key_length = 512<br> tls: dh_key_length = 512<br> tls: verify_depth = 0<br> tls: pem_file_type = yes<br> tls: private_key_file = "/etc/certs/cert-srv.pem"<br> tls: certificate_file = "/etc/certs/cert-
srv.pem"<br> tls: CA_file = "/etc/certs/root.pem"<br> tls: private_key_password = "whatever"<br> tls: dh_file = "/etc/certs/dh"<br> tls: random_file = "/etc/certs/random"<br> tls: fragment_size = 1024
<br> tls: include_length = yes<br> tls: check_crl = no<br>rlm_eap_tls: Loading the certificate file as a chain<br>rlm_eap: Loaded and initialized type tls<br> ttls: default_eap_type = "md5"<br> ttls: copy_request_to_tunnel = no
<br> ttls: use_tunneled_reply = no<br>rlm_eap: Loaded and initialized type ttls<br> mschapv2: with_ntdomain_hack = no<br>rlm_eap: Loaded and initialized type mschapv2<br>Module: Instantiated eap (eap) <br>Module: Loaded preprocess
<br> preprocess: huntgroups = "/usr/local/radius/etc/raddb/huntgroups"<br> preprocess: hints = "/usr/local/radius/etc/raddb/hints"<br> preprocess: with_ascend_hack = no<br> preprocess: ascend_channels_per_line = 23
<br> preprocess: with_ntdomain_hack = no<br> preprocess: with_specialix_jetstream_hack = no<br> preprocess: with_cisco_vsa_hack = no<br>Module: Instantiated preprocess (preprocess) <br>Module: Loaded realm <br> realm: format = "suffix"
<br> realm: delimiter = "@"<br> realm: ignore_default = no<br> realm: ignore_null = no<br>Module: Instantiated realm (suffix) <br>Module: Loaded files <br> files: usersfile = "/usr/local/radius/etc/raddb/users"
<br> files: acctusersfile = "/usr/local/radius/etc/raddb/acct_users"<br> files: preproxy_usersfile = "/usr/local/radius/etc/raddb/preproxy_users"<br> files: compat = "no"<br>Module: Instantiated files (files)
<br>Module: Loaded Acct-Unique-Session-Id <br> acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"<br>Module: Instantiated acct_unique (acct_unique) <br>Module: Loaded detail
<br> detail: detailfile = "/usr/local/radius/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"<br> detail: header = "%t"<br> detail: detailperm = 384<br> detail: dirperm = 493<br> detail: locking = no
<br>Module: Instantiated detail (detail) <br>Module: Loaded radutmp <br> radutmp: filename = "/usr/local/radius/var/log/radius/radutmp"<br> radutmp: username = "%{User-Name}"<br> radutmp: case_sensitive = yes
<br> radutmp: check_with_nas = yes<br> radutmp: perm = 384<br> radutmp: callerid = yes<br>Module: Instantiated radutmp (radutmp) <br>Initializing the thread pool...<br>Listening on authentication address <a href="http://10.89.49.12">
10.89.49.12</a> port 1812<br>Listening on accounting address <a href="http://10.89.49.12">10.89.49.12</a> port 1813<br>Listening on proxy address <a href="http://10.89.49.12">10.89.49.12</a> port 1814<br>Ready to process requests.
<br>Nothing to do. Sleeping until we see a request.<br> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p>rad_recv: Access-Request packet from host <a href="http://10.89.49.1">10.89.49.1</a> port 1058, id=0, length=176<br> Message-Authenticator = 0xef3923bcefa2778f4a84e3c6834b6b9d<br> Service-Type = Framed-User
<br> User-Name = "jbibe"<br> Framed-MTU = 1488<br> Called-Station-Id = "00-0F-CB-FE-2F-5F:3Com"<br> Calling-Station-Id = "00-13-E0-9E-9B-2E"<br> NAS-Identifier = "AP11G"
<br> NAS-Port-Type = Wireless-802.11<br> Connect-Info = "CONNECT 54Mbps 802.11g"<br> EAP-Message = 0x0200000a016a62696265<br> NAS-IP-Address = <a href="http://10.89.49.1">10.89.49.1</a>
<br> NAS-Port = 1<br> NAS-Port-Id = "STA port # 1"<br> Processing the authorize section of radiusd.conf<br>modcall: entering group authorize for request 0<br> modcall[authorize]: module "preprocess" returns ok for request 0
<br> modcall[authorize]: module "chap" returns noop for request 0<br> modcall[authorize]: module "mschap" returns noop for request 0<br> modcall[authorize]: module "unix" returns notfound for request 0
<br> rlm_realm: No <a href="mailto:'@'">'@'</a> in User-Name = "jbibe", looking up realm NULL<br> rlm_realm: No such realm "NULL"<br> modcall[authorize]: module "suffix" returns noop for request 0
<br> rlm_eap: EAP packet type response id 0 length 10<br> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br> modcall[authorize]: module "eap" returns updated for request 0<br> users: Matched entry jbibe at line 93
<br> modcall[authorize]: module "files" returns ok for request 0<br> modcall[authorize]: module "expiration" returns noop for request 0<br> modcall[authorize]: module "logintime" returns noop for request 0
<br>rlm_pap: Found existing Auth-Type, not changing it.<br> modcall[authorize]: module "pap" returns noop for request 0<br>modcall: leaving group authorize (returns updated) for request 0<br> rad_check_password: Found Auth-Type EAP
<br>auth: type "EAP"<br> Processing the authenticate section of radiusd.conf<br>modcall: entering group authenticate for request 0<br> rlm_eap: EAP Identity<br> rlm_eap: processing type tls<br> rlm_eap_tls: Initiate
<br> rlm_eap_tls: Start returned 1<br> modcall[authenticate]: module "eap" returns handled for request 0<br>modcall: leaving group authenticate (returns handled) for request 0<br>Sending Access-Challenge of id 0 to
<a href="http://10.89.49.1">10.89.49.1</a> port 1058<br> EAP-Message = 0x010100061520<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0xb57b1868cae7102fc5220c50fcd079e9<br>Finished request 0
<br>Going to the next request<br>--- Walking the entire request list ---<br>Waking up in 5 seconds...<br>rad_recv: Access-Request packet from host <a href="http://10.89.49.1">10.89.49.1</a> port 1060, id=0, length=176<br>
Message-Authenticator = 0x3782e8f02c8699a3c42aca3f7ca282bd<br> Service-Type = Framed-User<br> User-Name = "jbibe"<br> Framed-MTU = 1488<br> Called-Station-Id = "00-0F-CB-FE-2F-5F:3Com"
<br> Calling-Station-Id = "00-13-E0-9E-9B-2E"<br> NAS-Identifier = "AP11G"<br> NAS-Port-Type = Wireless-802.11<br> Connect-Info = "CONNECT 54Mbps 802.11g"<br> EAP-Message = 0x0200000a016a62696265
<br> NAS-IP-Address = <a href="http://10.89.49.1">10.89.49.1</a><br> NAS-Port = 1<br> NAS-Port-Id = "STA port # 1"<br> Processing the authorize section of radiusd.conf<br>modcall: entering group authorize for request 1
<br> modcall[authorize]: module "preprocess" returns ok for request 1<br> modcall[authorize]: module "chap" returns noop for request 1<br> modcall[authorize]: module "mschap" returns noop for request 1
<br> modcall[authorize]: module "unix" returns notfound for request 1<br> rlm_realm: No <a href="mailto:'@'">'@'</a> in User-Name = "jbibe", looking up realm NULL<br> rlm_realm: No such realm "NULL"
<br> modcall[authorize]: module "suffix" returns noop for request 1<br> rlm_eap: EAP packet type response id 0 length 10<br> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br> modcall[authorize]: module "eap" returns updated for request 1
<br> users: Matched entry jbibe at line 93<br> modcall[authorize]: module "files" returns ok for request 1<br> modcall[authorize]: module "expiration" returns noop for request 1<br> modcall[authorize]: module "logintime" returns noop for request 1
<br>rlm_pap: Found existing Auth-Type, not changing it.<br> modcall[authorize]: module "pap" returns noop for request 1<br>modcall: leaving group authorize (returns updated) for request 1<br> rad_check_password: Found Auth-Type EAP
<br>auth: type "EAP"<br> Processing the authenticate section of radiusd.conf<br>modcall: entering group authenticate for request 1<br> rlm_eap: EAP Identity<br> rlm_eap: processing type tls<br> rlm_eap_tls: Initiate
<br> rlm_eap_tls: Start returned 1<br> modcall[authenticate]: module "eap" returns handled for request 1<br>modcall: leaving group authenticate (returns handled) for request 1<br>Sending Access-Challenge of id 0 to
<a href="http://10.89.49.1">10.89.49.1</a> port 1060<br> EAP-Message = 0x010100061520<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0x28269413248e97f17932076accdf7bf9<br>Finished request 1
<br>Going to the next request<br>--- Walking the entire request list ---<br>Cleaning up request 0 ID 0 with timestamp 4753fbf2<br>Waking up in 5 seconds...<br>rad_recv: Access-Request packet from host <a href="http://10.89.49.1">
10.89.49.1</a> port 1060, id=1, length=292<br> Message-Authenticator = 0x40a2937466327040c8dff7c302dfb2a1<br> Service-Type = Framed-User<br> User-Name = "jbibe"<br> Framed-MTU = 1488<br>
State = 0x28269413248e97f17932076accdf7bf9<br> Called-Station-Id = "00-0F-CB-FE-2F-5F:3Com"<br> Calling-Station-Id = "00-13-E0-9E-9B-2E"<br> NAS-Identifier = "AP11G"
<br> NAS-Port-Type = Wireless-802.11<br> Connect-Info = "CONNECT 54Mbps 802.11g"<br> EAP-Message = 0x0201006c150016030100610100005d0301475479af4fa14e56d54409683378930066355256926f9f730c13464cdc9d335900003600390038003500160013000a00330032002f0007006600050004006300620061001500120009006500640060001400110008000600030100
<br> NAS-IP-Address = <a href="http://10.89.49.1">10.89.49.1</a><br> NAS-Port = 1<br> NAS-Port-Id = "STA port # 1"<br> Processing the authorize section of radiusd.conf<br>modcall: entering group authorize for request 2
<br> modcall[authorize]: module "preprocess" returns ok for request 2<br> modcall[authorize]: module "chap" returns noop for request 2<br> modcall[authorize]: module "mschap" returns noop for request 2
<br> modcall[authorize]: module "unix" returns notfound for request 2<br> rlm_realm: No <a href="mailto:'@'">'@'</a> in User-Name = "jbibe", looking up realm NULL<br> rlm_realm: No such realm "NULL"
<br> modcall[authorize]: module "suffix" returns noop for request 2<br> rlm_eap: EAP packet type response id 1 length 108<br> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br> modcall[authorize]: module "eap" returns updated for request 2
<br> users: Matched entry jbibe at line 93<br> modcall[authorize]: module "files" returns ok for request 2<br> modcall[authorize]: module "expiration" returns noop for request 2<br> modcall[authorize]: module "logintime" returns noop for request 2
<br>rlm_pap: Found existing Auth-Type, not changing it.<br> modcall[authorize]: module "pap" returns noop for request 2<br>modcall: leaving group authorize (returns updated) for request 2<br> rad_check_password: Found Auth-Type EAP
<br>auth: type "EAP"<br> Processing the authenticate section of radiusd.conf<br>modcall: entering group authenticate for request 2<br> rlm_eap: Request found, released from the list<br> rlm_eap: EAP/ttls<br> rlm_eap: processing type ttls
<br> rlm_eap_ttls: Authenticate<br> rlm_eap_tls: processing TLS<br> eaptls_verify returned 7 <br> rlm_eap_tls: Done initial handshake<br> (other): before/accept initialization <br> TLS_accept: before/accept initialization
<br> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0061], ClientHello <br> TLS_accept: SSLv3 read client hello A <br> rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello <br> TLS_accept: SSLv3 write server hello A
<br> rlm_eap_tls: >>> TLS 1.0 Handshake [length 02af], Certificate <br> TLS_accept: SSLv3 write certificate A <br> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone <br> TLS_accept: SSLv3 write server done A
<br> TLS_accept: SSLv3 flush data <br> TLS_accept:error in SSLv3 read client certificate A <br>In SSL Handshake Phase <br>In SSL Accept mode <br> eaptls_process returned 13 <br> modcall[authenticate]: module "eap" returns handled for request 2
<br>modcall: leaving group authenticate (returns handled) for request 2<br>Sending Access-Challenge of id 1 to <a href="http://10.89.49.1">10.89.49.1</a> port 1060<br> EAP-Message = 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
<br> EAP-Message = 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
<br> EAP-Message = 0x8fecfcf9139b9d0180bdb88918b80236a89cc22b3dee55a092eb50f030d84d772f72e3e5fa6fbc37d8a63dc7df9a291731d7e9879e698eaeac2e2bb89fdef4b4733842ae56dddcdbfd05e0d4865328bbf2d7acb884da421e5dea11c84964fa591fdb0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d010104050003818100999d00ac8272163c5369bbd7d55002ff183856f23515e607972cfb7ea561717f9b8602831725b72b12ec049e140aea62f09e99d58ff510eac7fcd7e00f84e7ccba2d3940eaeee1d481d01390aef10c281e31bbc3eb66fb01af66b216fb1556e8ee6b3751df0fc6808d4f
<br> EAP-Message = 0x9fceedd9ecd8527a3a0eb778073cd4822e39c202083916030100040e000000<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0xc1445c5677d1b2e404d7b7a50a056150<br>Finished request 2
<br>Going to the next request<br>Waking up in 5 seconds...<br></p><br><br> </div>
<div><span class="gmail_quote">On 12/3/07, <b class="gmail_sendername"><a href="mailto:tnt@kalik.co.yu">tnt@kalik.co.yu</a></b> <<a href="mailto:tnt@kalik.co.yu">tnt@kalik.co.yu</a>> wrote:</span>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">1. That's normal. You don't have a client certificate in TTLS. Ignore<br>it.<br><br>2. Attach the debug output from radiusd -X.
<br><br>Ivan Kalik<br>Kalik Informatika ISP<br><br>-<br>List info/subscribe/unsubscribe? See <a href="http://www.freeradius.org/list/users.html">http://www.freeradius.org/list/users.html</a><br></blockquote></div><br><br clear="all">
<br>-- <br>Regards & Thanks<br>Raghavendra. S