<html>
<head>
<style>
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
FONT-SIZE: 10pt;
FONT-FAMILY:Tahoma
}
</style>
</head>
<body class='hmmessage'>Hi..<IMG title="Font Size" style="LEFT: -238px; POSITION: relative; TOP: 0px" height=96 alt="Font Size" src="http://gfx2.hotmail.com/mail/w2/MSNPlatform/en-us/images/rte_tb.gif?v=4" width=815 border=0><BR>
<BR>
I am receiving this "Access-Challenge " message.I dont know what I do.Please help me. Thanks...<BR>
<BR>
<BR>
<BR>
<BR>------------------------------------------------------------------------------------------------------------<BR>> rad_recv: Access-Request packet from host 10.1.254.38 port 49155, id=0, <BR>> length=73<BR>> Threads: total/active/spare threads = 5/0/5<BR>> Thread 2 got semaphore<BR>> Thread 2 handling request 0, (1 handled so far)<BR>> NAS-IP-Address = 10.1.254.38<BR>> NAS-Port-Type = Ethernet<BR>> NAS-Port = 17<BR>> User-Name = "test"<BR>> EAP-Message = 0x020100090174657374<BR>> Message-Authenticator = 0x40b01c65697a037c2aec79069d28d709<BR>> +- entering group authorize<BR>> ++[preprocess] returns ok<BR>> ++[chap] returns noop<BR>> ++[mschap] returns noop<BR>> Waking up in 0.9 seconds.<BR>> ++[unix] returns notfound<BR>> rlm_realm: No <A href="mailto:'@'">'@'</A> in User-Name = "test", looking up realm NULL<BR>> rlm_realm: No such realm "NULL"<BR>> ++[suffix] returns noop<BR>> rlm_eap: EAP packet type response id 1 length 9<BR>> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<BR>> ++[eap] returns updated<BR>> users: Matched entry test at line 93<BR>> expand: Hello, %{User-Name} -> Hello, test<BR>> ++[files] returns ok<BR>> ++[expiration] returns noop<BR>> ++[logintime] returns noop<BR>> rlm_pap: Found existing Auth-Type, not changing it.<BR>> ++[pap] returns noop<BR>> rad_check_password: Found Auth-Type EAP<BR>> auth: type "EAP"<BR>> +- entering group authenticate<BR>> rlm_eap: EAP Identity<BR>> rlm_eap: processing type tls<BR>> rlm_eap_tls: Initiate<BR>> rlm_eap_tls: Start returned 1<BR>> ++[eap] returns handled<BR>> Sending Access-Challenge of id 0 to 10.1.254.38 port 49155<BR>> Reply-Message = "Hello, test"<BR>> EAP-Message = 0x010200061920<BR>> Message-Authenticator = 0x00000000000000000000000000000000<BR>> State = 0xf779e639f77bff0d3d2c202f1c7a8b9c<BR>> Finished request 0.<BR>> Going to the next request<BR>> Thread 2 waiting to be assigned a request<BR>> rad_recv: Access-Request packet from host 10.1.254.38 port 49155, id=0, <BR>> length=162<BR>> Cleaning up request 0 ID 0 with timestamp +553<BR>> Waking up in 0.9 seconds.<BR>> Thread 3 got semaphore<BR>> Thread 3 handling request 1, (1 handled so far)<BR>> NAS-IP-Address = 10.1.254.38<BR>> NAS-Port-Type = Ethernet<BR>> NAS-Port = 17<BR>> User-Name = "test"<BR>> State = 0xf779e639f77bff0d3d2c202f1c7a8b9c<BR>> EAP-Message =<BR>> 0x0202005019800000004616030100410100003d030147ac558d77684de77a5d4e927a0c8abbd79d3e8c289aa3006aa63ea402fae95c00001600040005000a000900640062000300060013001200630100<BR>> Message-Authenticator = 0xb38e6c9574648ff3b9b43230ab24f470<BR>> +- entering group authorize<BR>> ++[preprocess] returns ok<BR>> ++[chap] returns noop<BR>> ++[mschap] returns noop<BR>> ++[unix] returns notfound<BR>> rlm_realm: No <A href="mailto:'@'">'@'</A> in User-Name = "test", looking up realm NULL<BR>> rlm_realm: No such realm "NULL"<BR>> ++[suffix] returns noop<BR>> rlm_eap: EAP packet type response id 2 length 80<BR>> rlm_eap: Continuing tunnel setup.<BR>> ++[eap] returns ok<BR>> rad_check_password: Found Auth-Type EAP<BR>> auth: type "EAP"<BR>> +- entering group authenticate<BR>> rlm_eap: Request found, released from the list<BR>> rlm_eap: EAP/peap<BR>> rlm_eap: processing type peap<BR>> rlm_eap_peap: Authenticate<BR>> rlm_eap_tls: processing TLS<BR>> TLS Length 70<BR>> rlm_eap_tls: Length Included<BR>> eaptls_verify returned 11<BR>> (other): before/accept initialization<BR>> TLS_accept: before/accept initialization<BR>> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello<BR>> TLS_accept: SSLv3 read client hello A<BR>> rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello<BR>> TLS_accept: SSLv3 write server hello A<BR>> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0589], Certificate<BR>> TLS_accept: SSLv3 write certificate A<BR>> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone<BR>> TLS_accept: SSLv3 write server done A<BR>> TLS_accept: SSLv3 flush data<BR>> TLS_accept: Need to read more data: SSLv3 read client certificate A<BR>> In SSL Handshake Phase<BR>> In SSL Accept mode<BR>> eaptls_process returned 13<BR>> rlm_eap_peap: EAPTLS_HANDLED<BR>> ++[eap] returns handled<BR>> Sending Access-Challenge of id 0 to 10.1.254.38 port 49155<BR>> EAP-Message =<BR>> 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<BR>> EAP-Message =<BR>> 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<BR>> EAP-Message =<BR>> 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<BR>> EAP-Message =<BR>> 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<BR>> EAP-Message = 0x060355040b130342494d3110<BR>> Message-Authenticator = 0x00000000000000000000000000000000<BR>> State = 0xf779e639f67aff0d3d2c202f1c7a8b9c<BR>> Finished request 1.<BR>> Going to the next request<BR>> Thread 3 waiting to be assigned a request<BR>> rad_recv: Access-Request packet from host 10.1.254.38 port 49155, id=0, <BR>> length=88<BR>> Cleaning up request 1 ID 0 with timestamp +553<BR>> Waking up in 0.9 seconds.<BR>> Thread 5 got semaphore<BR>> Thread 5 handling request 2, (1 handled so far)<BR>> NAS-IP-Address = 10.1.254.38<BR>> NAS-Port-Type = Ethernet<BR>> NAS-Port = 17<BR>> User-Name = "test"<BR>> State = 0xf779e639f67aff0d3d2c202f1c7a8b9c<BR>> EAP-Message = 0x020300061900<BR>> Message-Authenticator = 0xf30dca65a4d02ac05f72f49a8c603c32<BR>> +- entering group authorize<BR>> ++[preprocess] returns ok<BR>> ++[chap] returns noop<BR>> ++[mschap] returns noop<BR>> ++[unix] returns notfound<BR>> rlm_realm: No <A href="mailto:'@'">'@'</A> in User-Name = "test", looking up realm NULL<BR>> rlm_realm: No such realm "NULL"<BR>> ++[suffix] returns noop<BR>> rlm_eap: EAP packet type response id 3 length 6<BR>> rlm_eap: Continuing tunnel setup.<BR>> ++[eap] returns ok<BR>> rad_check_password: Found Auth-Type EAP<BR>> auth: type "EAP"<BR>> +- entering group authenticate<BR>> rlm_eap: Request found, released from the list<BR>> rlm_eap: EAP/peap<BR>> rlm_eap: processing type peap<BR>> rlm_eap_peap: Authenticate<BR>> rlm_eap_tls: processing TLS<BR>> rlm_eap_tls: Received EAP-TLS ACK message<BR>> rlm_eap_tls: ack handshake fragment handler<BR>> eaptls_verify returned 1<BR>> eaptls_process returned 13<BR>> rlm_eap_peap: EAPTLS_HANDLED<BR>> ++[eap] returns handled<BR>> Sending Access-Challenge of id 0 to 10.1.254.38 port 49155<BR>> EAP-Message =<BR>> 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<BR>> EAP-Message =<BR>> 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<BR>> Message-Authenticator = 0x00000000000000000000000000000000<BR>> State = 0xf779e639f57dff0d3d2c202f1c7a8b9c<BR>> Finished request 2.<BR>> Going to the next request<BR>> Thread 5 waiting to be assigned a request<BR>> rad_recv: Access-Request packet from host 10.1.254.38 port 49155, id=0, <BR>> length=88<BR>> Cleaning up request 2 ID 0 with timestamp +553<BR>> Waking up in 0.9 seconds.<BR>> Thread 4 got semaphore<BR>> Thread 4 handling request 3, (1 handled so far)<BR>> NAS-IP-Address = 10.1.254.38<BR>> NAS-Port-Type = Ethernet<BR>> NAS-Port = 17<BR>> User-Name = "test"<BR>> State = 0xf779e639f57dff0d3d2c202f1c7a8b9c<BR>> EAP-Message = 0x020400061900<BR>> Message-Authenticator = 0x7011b465e9976763874b73745ac1d791<BR>> +- entering group authorize<BR>> ++[preprocess] returns ok<BR>> ++[chap] returns noop<BR>> ++[mschap] returns noop<BR>> ++[unix] returns notfound<BR>> rlm_realm: No <A href="mailto:'@'">'@'</A> in User-Name = "test", looking up realm NULL<BR>> rlm_realm: No such realm "NULL"<BR>> ++[suffix] returns noop<BR>> rlm_eap: EAP packet type response id 4 length 6<BR>> rlm_eap: Continuing tunnel setup.<BR>> ++[eap] returns ok<BR>> rad_check_password: Found Auth-Type EAP<BR>> auth: type "EAP"<BR>> +- entering group authenticate<BR>> rlm_eap: Request found, released from the list<BR>> rlm_eap: EAP/peap<BR>> rlm_eap: processing type peap<BR>> rlm_eap_peap: Authenticate<BR>> rlm_eap_tls: processing TLS<BR>> rlm_eap_tls: Received EAP-TLS ACK message<BR>> rlm_eap_tls: ack handshake fragment handler<BR>> eaptls_verify returned 1<BR>> eaptls_process returned 13<BR>> rlm_eap_peap: EAPTLS_HANDLED<BR>> ++[eap] returns handled<BR>> Sending Access-Challenge of id 0 to 10.1.254.38 port 49155<BR>> EAP-Message = 0x010500061900<BR>> Message-Authenticator = 0x00000000000000000000000000000000<BR>> State = 0xf779e639f47cff0d3d2c202f1c7a8b9c<BR>> Finished request 3.<BR>> Going to the next request<BR>> Thread 4 waiting to be assigned a request<BR>> Waking up in 4.0 seconds.<BR><BR><br /><hr />Need to know the score, the latest news, or you need your HotmailŪ-get your "fix". <a href='http://www.msnmobilefix.com/Default.aspx' target='_new'>Check it out.</a></body>
</html>