<br>Hi all,<br><br>I have succeed in configuring the server again with correct openssl libraries and development headers, the eapol_test is halfway successful, the tunnel was established, but i dont know why its didnt succeed after that, can you give me an hint please.<br><br>Thank you all for helping me out.<br><br>Br,<br>Jreubens<br><br>HERE IS MY RADIUSD OUTPUT<br><br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 11Mbps 802.11b"<br>        EAP-Message = 0x0200000e01616e6f6e796d6f7573<br>        Message-Authenticator = 0x7a6034cf7717a391ed27b2009f6183e6<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL<br>    rlm_realm: No such realm
 "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 0 length 14<br>  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br>++[eap] returns updated<br>++[unix] returns notfound<br>++[files] returns noop<br>++[expiration] returns noop<br>++[logintime] returns noop<br>rlm_pap: WARNING! No "known good" password found for the user.  Authentication may fail because of this.<br>++[pap] returns noop<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: EAP Identity<br>  rlm_eap: processing type md5<br>rlm_eap_md5: Issuing Challenge<br>++[eap] returns handled<br>        EAP-Message = 0x010100160410b08675566bb4374960f4ad3d016012d5<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State =
 0xd60df96dd60cfd7fbb716c33077b06cd<br>Finished request 0.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>        User-Name = "anonymous"<br>        NAS-IP-Address = 127.0.0.1<br>        Calling-Station-Id = "02-00-00-00-00-01"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 11Mbps 802.11b"<br>        EAP-Message = 0x020100060319<br>        State = 0xd60df96dd60cfd7fbb716c33077b06cd<br>        Message-Authenticator = 0x9ceebff3658f100773d5a1128d1eef4b<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm:
 No '@' in User-Name = "anonymous", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 1 length 6<br>  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br>++[eap] returns updated<br>++[unix] returns notfound<br>++[files] returns noop<br>++[expiration] returns noop<br>++[logintime] returns noop<br>rlm_pap: WARNING! No "known good" password found for the user.  Authentication may fail because of this.<br>++[pap] returns noop<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP NAK<br> rlm_eap: EAP-NAK asked for EAP-Type/peap<br>  rlm_eap: processing type tls<br>  rlm_eap_tls: Initiate<br>  rlm_eap_tls: Start returned 1<br>++[eap] returns handled<br>       
 EAP-Message = 0x010200061920<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0xd60df96dd70fe07fbb716c33077b06cd<br>Finished request 1.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>        User-Name = "anonymous"<br>        NAS-IP-Address = 127.0.0.1<br>        Calling-Station-Id = "02-00-00-00-00-01"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 11Mbps 802.11b"<br>        EAP-Message =
 0x0202005e190016030100530100004f0301481576fea1a0e81ff55753b5a3d70b37d5fb619e00eda78395931584ff53904400002800390038003500160013000a00330032002f000700050004001500120009001400110008000600030100<br>        State = 0xd60df96dd70fe07fbb716c33077b06cd<br>        Message-Authenticator = 0x6e3b249941b1fb3f187b9e295b1aab5a<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 2 length 94<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap:
 EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>  eaptls_verify returned 7 <br>  rlm_eap_tls: Done initial handshake<br>    (other): before/accept initialization <br>    TLS_accept: before/accept initialization <br>  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0053], ClientHello  <br>    TLS_accept: SSLv3 read client hello A <br>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  <br>    TLS_accept: SSLv3 write server hello A <br>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 085e], Certificate  <br>    TLS_accept: SSLv3 write certificate A <br>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange  <br>    TLS_accept: SSLv3 write key exchange A <br>  rlm_eap_tls: >>> TLS 1.0
 Handshake [length 0004], ServerHelloDone  <br>    TLS_accept: SSLv3 write server done A <br>    TLS_accept: SSLv3 flush data <br>    TLS_accept: Need to read more data: SSLv3 read client certificate A<br>In SSL Handshake Phase <br>In SSL Accept mode  <br>  eaptls_process returned 13 <br>  rlm_eap_peap: EAPTLS_HANDLED<br>++[eap] returns handled<br>        EAP-Message =
 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<br>        EAP-Message =
 0x03131d4578616d706c6520436572746966696361746520417574686f72697479301e170d3038303432383036333831395a170d3039303432383036333831395a307c310b3009060355040613024652310f300d0603550408130652616469757331153013060355040a130c4578616d706c6520496e632e312330210603550403131a4578616d706c65205365727665722043657274696669636174653120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d30820122300d06092a864886f70d01010105000382010f003082010a0282010100b73f813e1c4513114fd57681f95a589ec71dd5233fec6d297528e304db12<br>        EAP-Message =
 0x3f97e2744e67126ac3d1d18e73526ba0a6e98d5596a5faeaa60121d447647eac0980fb58a1c5983326ff17733356544a06d0caffeff712135a1662c2cc874c957d9696d138cee915e016f070141988f94b5999c4ac313322a77c8ded2f1710a6c423c0b65654e580a5a933e8bfd10eb94232e6dffd3b780f8c7252940c17abe16e787c5bcc1bceace399fe891b0f3b60bb42b6e02ab0c0a2f55d6e3770d13ef70d43f580f6d28d8a16f9e63d781778f2788f07c01cd47382a63d2efdbecb37302f6dd12990bf1173366c48ffade5af186ee0682a8e6c27e649c30bf36ac1c1b471dd0203010001a317301530130603551d25040c300a06082b06010505<br>        EAP-Message =
 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<br>        EAP-Message = 0x6f0bc4e9c50fdfa906951ba1<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0xd60df96dd40ee07fbb716c33077b06cd<br>Finished request 2.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>        User-Name = "anonymous"<br>       
 NAS-IP-Address = 127.0.0.1<br>        Calling-Station-Id = "02-00-00-00-00-01"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 11Mbps 802.11b"<br>        EAP-Message = 0x020300061900<br>        State = 0xd60df96dd40ee07fbb716c33077b06cd<br>        Message-Authenticator = 0x8cbd5dacf77784d94a31d5221b737d9f<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 3 length 6<br>  rlm_eap: Continuing
 tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>rlm_eap_tls: Received EAP-TLS ACK message<br>  rlm_eap_tls: ack handshake fragment handler<br>  eaptls_verify returned 1 <br>  eaptls_process returned 13 <br>  rlm_eap_peap: EAPTLS_HANDLED<br>++[eap] returns handled<br>        EAP-Message =
 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<br>        EAP-Message =
 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<br>        EAP-Message =
 0xd72c8f64d7f42d397aafdef1b90ccc11ce02d388630b0308d9f6200664d20abdeaf4df7ec118715cc3e5cf0a5a478a0b67c27835f0ca73da36623c585ae92e199e3185ad82d96e44228fa9a3c946d8d393b6960a878685c93c5275cd2bb8a33ed8bdfc38b01100dc589a170838d6a91e73e555661588e3d0bc113bfd4e4a1ba508ad7dba6d7000dae88da8f1790caca76143917681aeaeb5007425ef62a472d5782d8051c3b3af4a39a3f98dc04065d2830203010001a381fb3081f8301d0603551d0e04160414a5239e4e47a510e04397abcc5ef2805e8b7013923081c80603551d230481c03081bd8014a5239e4e47a510e04397abcc5ef2805e8b70<br>        EAP-Message =
 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<br>        EAP-Message = 0x05bb4ff107d513af<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0xd60df96dd509e07fbb716c33077b06cd<br>Finished request 3.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>        User-Name = "anonymous"<br>       
 NAS-IP-Address = 127.0.0.1<br>        Calling-Station-Id = "02-00-00-00-00-01"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 11Mbps 802.11b"<br>        EAP-Message = 0x020400061900<br>        State = 0xd60df96dd509e07fbb716c33077b06cd<br>        Message-Authenticator = 0x66db1b3ebb30646425959e855b852f33<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 4 length 6<br>  rlm_eap: Continuing
 tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>rlm_eap_tls: Received EAP-TLS ACK message<br>  rlm_eap_tls: ack handshake fragment handler<br>  eaptls_verify returned 1 <br>  eaptls_process returned 13 <br>  rlm_eap_peap: EAPTLS_HANDLED<br>++[eap] returns handled<br>        EAP-Message =
 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<br>        EAP-Message =
 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<br>        EAP-Message =
 0x584f2e693e8db16a2e821ea87e12f2bbda45bda0cde2bb00fec3d22b4154202d018484c0745a20b1a58453f3a6144af2d6983f406e4841627daca4017fbafaedeb27bbc69ec3bd8831b0fa60106fa754fca1af63e3208ba1c3642cc6000efcb062730633c164d421c50eeafd78b73273ff2433362473d5d676b25e651f30daf7967ccd80c2a45efd2f7b2929ce4a9ff371d4f72d671958f60db52f7b0ff564848510141ddd6af08fac70e7e3cc7c803d7373645255e30a091e8bcb2db0bffeb8775cc81842afa24f20a5b178cc52f4957ef5eb32c7852aa0b077f4a81da001e1377a816716030100040e000000<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0xd60df96dd208e07fbb716c33077b06cd<br>Finished request 4.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>        User-Name = "anonymous"<br>        NAS-IP-Address = 127.0.0.1<br>        Calling-Station-Id =
 "02-00-00-00-00-01"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 11Mbps 802.11b"<br>        EAP-Message = 0x020500cc1900160301008610000082008088a0c83ed9fff3d6c1cd3387dc6fcaccd44290777eb6eedd45e55c77171a709d8b22224f12e88b763daf1d5a5759ded7e3213da767a2ddb251105985b1594cacf74e80d5b638d765ee5d6b04323d0e4674e9c7d2c0a768ba70597484d81747e369be44cfe95e3d0d8145d1331b813c2629ea68cc6ad66d2c0124f46c6a72aea61403010001011603010030d00fd85fa77486333f9d28409d029b72081bdc7ab031d26b82a5eaf4f79307f6c7e6f52f9acae6f54e2c74338731ec9e<br>        State = 0xd60df96dd208e07fbb716c33077b06cd<br>        Message-Authenticator = 0x3d3b5ab6c6eff675275c9be53d1962bb<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap]
 returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 5 length 204<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>  eaptls_verify returned 7 <br>  rlm_eap_tls: Done initial handshake<br>  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  <br>    TLS_accept: SSLv3 read client key exchange A <br>  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]  <br> 
 rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished  <br>    TLS_accept: SSLv3 read finished A <br>  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]  <br>    TLS_accept: SSLv3 write change cipher spec A <br>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished  <br>    TLS_accept: SSLv3 write finished A <br>    TLS_accept: SSLv3 flush data <br>    (other): SSL negotiation finished successfully <br>SSL Connection Established <br>  eaptls_process returned 13 <br>  rlm_eap_peap: EAPTLS_HANDLED<br>++[eap] returns handled<br>        EAP-Message = 0x010600411900140301000101160301003085527844557527b77fe0ec6a25eb0afcb093f067e3db28fead4a48eec10face50f0da001f236cf4950d82995f676b544<br>        Message-Authenticator =
 0x00000000000000000000000000000000<br>        State = 0xd60df96dd30be07fbb716c33077b06cd<br>Finished request 5.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>        User-Name = "anonymous"<br>        NAS-IP-Address = 127.0.0.1<br>        Calling-Station-Id = "02-00-00-00-00-01"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 11Mbps 802.11b"<br>        EAP-Message = 0x020600061900<br>        State = 0xd60df96dd30be07fbb716c33077b06cd<br>        Message-Authenticator = 0x07f8b9d3f401d0c77b4f4915d71e0cc5<br>+- entering group authorize<br>++[preprocess]
 returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 6 length 6<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>rlm_eap_tls: Received EAP-TLS ACK message<br>  rlm_eap_tls: ack handshake is finished<br>  eaptls_verify returned 3 <br>  eaptls_process returned 3 <br>  rlm_eap_peap: EAPTLS_SUCCESS<br>++[eap] returns handled<br>        EAP-Message =
 0x0107002b190017030100202b0249c2f447cef8bda6f3224fa8fe081f2c3f7023634612e1ebb286a0d24f66<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0xd60df96dd00ae07fbb716c33077b06cd<br>Finished request 6.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>        User-Name = "anonymous"<br>        NAS-IP-Address = 127.0.0.1<br>        Calling-Station-Id = "02-00-00-00-00-01"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 11Mbps 802.11b"<br>        EAP-Message =
 0x0207005019001703010020a3c24219d2d7538038cf9b5b6d7074617a8a27b72a997ffb9222bbc99a926acf1703010020e42a4ec295bb3220f5cf014ba10eaccb4d66d36049fcf540c2edcfee58b254fe<br>        State = 0xd60df96dd00ae07fbb716c33077b06cd<br>        Message-Authenticator = 0x193fe8df30309c4c39fdf59c84b0ed77<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 7 length 80<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap:
 processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>  eaptls_verify returned 7 <br>  rlm_eap_tls: Done initial handshake<br>  eaptls_process returned 7 <br>  rlm_eap_peap: EAPTLS_OK<br>  rlm_eap_peap: Session established.  Decoding tunneled attributes.<br>  rlm_eap_peap: Identity - testuser<br>  PEAP: Got tunneled identity of testuser<br>  PEAP: Setting default EAP type for tunneled EAP session.<br>  PEAP: Setting User-Name to testuser<br>auth: No authenticate method (Auth-Type) configuration found for the request: Rejecting the user<br>auth: Failed to validate the user.<br>Login incorrect: [testuser/<no User-Password attribute>] (from client localhost port 0)<br>  PEAP: Tunneled authentication was rejected.<br>  rlm_eap_peap: FAILURE<br>++[eap] returns handled<br>        EAP-Message =
 0x0108002b19001703010020780d7d621e66a7b28ed554db2b02d0f6148e695d4e72e2cb21e5d2d9f1861fa1<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0xd60df96dd105e07fbb716c33077b06cd<br>Finished request 7.<br>Going to the next request<br>Waking up in 4.8 seconds.<br>        User-Name = "anonymous"<br>        NAS-IP-Address = 127.0.0.1<br>        Calling-Station-Id = "02-00-00-00-00-01"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 11Mbps 802.11b"<br>        EAP-Message =
 0x02080050190017030100208e89b5ad71f59acce21781ba90062f7b2eae1d2dde31e725035fa48bba1a087b170301002009b75048e477fab4d8cba9d8da02baa314106bce519ebcbb1c196f22e964ca83<br>        State = 0xd60df96dd105e07fbb716c33077b06cd<br>        Message-Authenticator = 0xbd49953b548d48fc48da3e10aa48ddf1<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 8 length 80<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap:
 processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>  eaptls_verify returned 7 <br>  rlm_eap_tls: Done initial handshake<br>  eaptls_process returned 7 <br>  rlm_eap_peap: EAPTLS_OK<br>  rlm_eap_peap: Session established.  Decoding tunneled attributes.<br>  rlm_eap_peap: Received EAP-TLV response.<br>  rlm_eap_peap:  Had sent TLV failure.  User was rejected earlier in this session.<br> rlm_eap: Handler failed in EAP/peap<br>  rlm_eap: Failed in EAP select<br>++[eap] returns invalid<br>auth: Failed to validate the user.<br>Login incorrect: [anonymous/<via Auth-Type = EAP>] (from client localhost port 0 cli 02-00-00-00-00-01)<br>  Found Post-Auth-Type Reject<br>+- entering group REJECT<br>        expand: %{User-Name} -> anonymous<br> attr_filter: Matched entry DEFAULT at line 11<br>++[attr_filter.access_reject]
 returns updated<br>Delaying reject of request 8 for 1 seconds<br>Going to the next request<br>Waking up in 0.9 seconds.<br>Sending delayed reject for request 8<br>        EAP-Message = 0x04080004<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>Waking up in 3.8 seconds.<br>Cleaning up request 0 ID 0 with timestamp +58<br>Cleaning up request 1 ID 1 with timestamp +58<br>Cleaning up request 2 ID 2 with timestamp +58<br>Cleaning up request 3 ID 3 with timestamp +58<br>Cleaning up request 4 ID 4 with timestamp +58<br>Cleaning up request 5 ID 5 with timestamp +58<br>Cleaning up request 6 ID 6 with timestamp +58<br>Cleaning up request 7 ID 7 with timestamp +58<br>Waking up in 1.0 seconds.<br>Cleaning up request 8 ID 8 with timestamp +58<br>Ready to process requests.<br>Ready to process requests.<br>Exiting...<br><br><br><b><i>Alan DeKok <aland@deployingradius.com></i></b>
 wrote:<blockquote class="replbq" style="border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"> jreubens wrote:<br>> I am newbie trying to test free radius for my master thesis, i installed<br>> free radius two days ago and did some initial testing, the initial test was<br>> through so the radius server is running properly, before i move on i wanted<br>> to test the eap modules, so i tried to test with the help of eapol_test tool<br>> that comes with the wpasupplicant, i cannot succeed i get failure message.<br>...<br>>  rlm_eap: NAK asked for unsupported type 25<br><br>  The system does not have the proper OpenSSL libraries installed.<br><br>  Install OpenSSL, and the development headers.  Then re-build the<br>server, and PEAP will work.<br><br>  Alan DeKok.<br>-<br>List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html<br></blockquote><br><p>

      <hr size=1>Be a better friend, newshound, and 
know-it-all with Yahoo! Mobile. <a href="http://us.rd.yahoo.com/evt=51733/*http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ "> Try it now.</a>