<html><head><style type="text/css"><!-- DIV {margin:0px;} --></style></head><body><div style="font-family:times new roman, new york, times, serif;font-size:12pt">well....<br>the entire output is so so long.... i guess it will be bounced!!<br>---------------------------------------------------------------------------------------<br><br>rad_recv: Access-Request packet from host 10.10.44.246 port 1031, id=36, length=168<br>        User-Name = "PLUTON\\glouglou"<br>        NAS-IP-Address = 10.10.44.246<br>        NAS-Port = 1<br>        Called-Station-Id = "00-1C-F0-08-FB-FA:PEAP"<br>        Calling-Station-Id = "00-12-F0-0C-97-61"<br>        Framed-MTU = 1400<br>        NAS-Port-Type =
 Wireless-802.11<br>        Connect-Info = "CONNECT 54Mbps 802.11g"<br>        EAP-Message = 0x0200001401504c55544f4e5c676c6f75676c6f75<br>        Message-Authenticator = 0xcbb528f5292b11d67c080cc387f843bc<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 0 length 20<br>  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br>++[eap] returns updated<br>++[unix] returns notfound<br>++[files] returns noop<br>        expand: %{User-Name} -> PLUTON\glouglou<br>rlm_sql (sql): sql_set_user escaped user -->
 'PLUTON\glouglou'<br>rlm_sql (sql): Reserving sql socket id: 3<br>        expand: SELECT id, username, attribute, value, op           FROM radcheck           WHERE username = '%{SQL-User-Name}'           ORDER BY id -> SELECT id, username, attribute, value, op           FROM radcheck           WHERE username = 'PLUTON=5Cglouglou'           ORDER BY id<br>        expand: SELECT groupname           FROM radusergroup           WHERE username =
 '%{SQL-User-Name}'           ORDER BY priority -> SELECT groupname           FROM radusergroup           WHERE username = 'PLUTON=5Cglouglou'           ORDER BY priority<br>rlm_sql (sql): Released sql socket id: 3<br>rlm_sql (sql): User PLUTON\glouglou not found<br>++[sql] returns notfound<br>++[expiration] returns noop<br>++[logintime] returns noop<br>rlm_pap: WARNING! No "known good" password found for the user.  Authentication may fail because of this.<br>++[pap] returns noop<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: EAP Identity<br>  rlm_eap: processing type tls<br>  rlm_eap_tls: Initiate<br>  rlm_eap_tls: Start returned 1<br>++[eap] returns
 handled<br>Sending Access-Challenge of id 36 to 10.10.44.246 port 1031<br>        EAP-Message = 0x010100061920<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0x83d5d79483d4ce1dada70e42703d8db9<br>Finished request 0.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>rad_recv: Access-Request packet from host 10.10.44.246 port 1031, id=37, length=246<br>        User-Name = "PLUTON\\glouglou"<br>        NAS-IP-Address = 10.10.44.246<br>        NAS-Port = 1<br>        Called-Station-Id = "00-1C-F0-08-FB-FA:PEAP"<br>        Calling-Station-Id = "00-12-F0-0C-97-61"<br>        Framed-MTU =
 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 54Mbps 802.11g"<br>        EAP-Message = 0x0201005019800000004616030100410100003d030148813744665ecdbe63b302d853648f2eee8bae6b5453ef683054af22f5caa22800001600040005000a000900640062000300060013001200630100<br>        State = 0x83d5d79483d4ce1dada70e42703d8db9<br>        Message-Authenticator = 0x7f20d5424c08d0debb4c7e3342fb34d9<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 1 length 80<br>  rlm_eap: Continuing
 tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>  TLS Length 70<br>rlm_eap_tls:  Length Included<br>  eaptls_verify returned 11<br>    (other): before/accept initialization<br>    TLS_accept: before/accept initialization<br>  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello<br>    TLS_accept: SSLv3 read client hello A<br>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello<br>    TLS_accept: SSLv3 write server hello A<br>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 081b], Certificate<br>    TLS_accept:
 SSLv3 write certificate A<br>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone<br>    TLS_accept: SSLv3 write server done A<br>    TLS_accept: SSLv3 flush data<br>    TLS_accept: Need to read more data: SSLv3 read client certificate A<br>In SSL Handshake Phase<br>In SSL Accept mode<br>  eaptls_process returned 13<br>  rlm_eap_peap: EAPTLS_HANDLED<br>++[eap] returns handled<br>Sending Access-Challenge of id 37 to 10.10.44.246 port 1031<br>        EAP-Message =
 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<br>        EAP-Message =
 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<br>        EAP-Message =
 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<br>        EAP-Message =
 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<br>        EAP-Message = 0x616261743110300e06035504<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0x83d5d79482d7ce1dada70e42703d8db9<br>Finished request 1.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>rad_recv: Access-Request packet from host 10.10.44.246 port 1031, id=38,
 length=172<br>        User-Name = "PLUTON\\glouglou"<br>        NAS-IP-Address = 10.10.44.246<br>        NAS-Port = 1<br>        Called-Station-Id = "00-1C-F0-08-FB-FA:PEAP"<br>        Calling-Station-Id = "00-12-F0-0C-97-61"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 54Mbps 802.11g"<br>        EAP-Message = 0x020200061900<br>        State = 0x83d5d79482d7ce1dada70e42703d8db9<br>        Message-Authenticator = 0x7732bf9fad90dd26b294e9d7a9d3dcdf<br>+- entering group authorize<br>++[preprocess] returns
 ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 2 length 6<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>rlm_eap_tls: Received EAP-TLS ACK message<br>  rlm_eap_tls: ack handshake fragment handler<br>  eaptls_verify returned 1<br>  eaptls_process returned 13<br>  rlm_eap_peap: EAPTLS_HANDLED<br>++[eap] returns handled<br>Sending Access-Challenge of id 38 to 10.10.44.246 port
 1031<br>        EAP-Message = 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<br>        EAP-Message =
 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<br>        EAP-Message =
 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<br>        EAP-Message =
 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<br>        EAP-Message = 0x287d5f0755b00fed<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0x83d5d79481d6ce1dada70e42703d8db9<br>Finished request 2.<br>Going to the next request<br>Waking up in 4.8 seconds.<br>rad_recv: Access-Request packet from host 10.10.44.246 port 1031, id=39,
 length=172<br>        User-Name = "PLUTON\\glouglou"<br>        NAS-IP-Address = 10.10.44.246<br>        NAS-Port = 1<br>        Called-Station-Id = "00-1C-F0-08-FB-FA:PEAP"<br>        Calling-Station-Id = "00-12-F0-0C-97-61"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 54Mbps 802.11g"<br>        EAP-Message = 0x020300061900<br>        State = 0x83d5d79481d6ce1dada70e42703d8db9<br>        Message-Authenticator = 0x0fe93834b2916e179db32a4a4e30c313<br>+- entering group authorize<br>++[preprocess] returns
 ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 3 length 6<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>rlm_eap_tls: Received EAP-TLS ACK message<br>  rlm_eap_tls: ack handshake fragment handler<br>  eaptls_verify returned 1<br>  eaptls_process returned 13<br>  rlm_eap_peap: EAPTLS_HANDLED<br>++[eap] returns handled<br>Sending Access-Challenge of id 39 to 10.10.44.246 port
 1031<br>        EAP-Message = 0x010400921900095073db63e65f0ab28178db3958c7113b9733a22a8b2a88fa045dc87b44d2b3b6e185637aa474de4281c0a67db8311af9c449169c06852467d7fbcc6ad90bf7d94485afdc559d0bedf973b713003b7f64bf8adfe5ab2b62aee86a630eb0d2a19d4c73cd73f8e74f727366c28e71679a191f5928b58406159ab8eb2bd5624051481c1816030100040e000000<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0x83d5d79480d1ce1dada70e42703d8db9<br>Finished request 3.<br>Going to the next request<br>Waking up in 4.7 seconds.<br>rad_recv: Access-Request packet from host 10.10.44.246 port 1031, id=40, length=358<br>        User-Name = "PLUTON\\glouglou"<br>        NAS-IP-Address = 10.10.44.246<br>        NAS-Port =
 1<br>        Called-Station-Id = "00-1C-F0-08-FB-FA:PEAP"<br>        Calling-Station-Id = "00-12-F0-0C-97-61"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 54Mbps 802.11g"<br>        EAP-Message = 0x020400c01980000000b6160301008610000082008012e599c1dd65207a3e9ce50d8996f74ba03b6b2833f240610e877ffe3f99d554514a7a1e11ba5599978d3b12cad9e79f592ff16e78d0adc47d6688a2cb24d4eb5206249677e1ef4608a986e9f3532ca498f7f97bdcd2d3693aea0eefe6de02907ecfba98f4cf5b13d8d9de1384c62e869fc4dde32db5263bb925d3dd5f9dbd64140301000101160301002014688001ba47c255120cf9919f1f508f8a60ee01751ce9039f2f78a6fcd7dc45<br>        State =
 0x83d5d79480d1ce1dada70e42703d8db9<br>        Message-Authenticator = 0xdc6a35211c08eac1516e2faf3a4103d0<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 4 length 192<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>  TLS Length 182<br>rlm_eap_tls:  Length Included<br>  eaptls_verify returned
 11<br>  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange<br>    TLS_accept: SSLv3 read client key exchange A<br>  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]<br>  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished<br>    TLS_accept: SSLv3 read finished A<br>  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]<br>    TLS_accept: SSLv3 write change cipher spec A<br>  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished<br>    TLS_accept: SSLv3 write finished A<br>    TLS_accept: SSLv3 flush data<br>    (other): SSL negotiation finished successfully<br>SSL Connection Established<br>  eaptls_process returned 13<br>  rlm_eap_peap: EAPTLS_HANDLED<br>++[eap] returns handled<br>Sending Access-Challenge of id 40 to 10.10.44.246 port
 1031<br>        EAP-Message = 0x01050031190014030100010116030100202208f053e9a7b313afddf279d90493751e93be50d2edef23bf6194a7aada78cf<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0x83d5d79487d0ce1dada70e42703d8db9<br>Finished request 4.<br>Going to the next request<br>Waking up in 4.7 seconds.<br>rad_recv: Access-Request packet from host 10.10.44.246 port 1031, id=41, length=172<br>        User-Name = "PLUTON\\glouglou"<br>        NAS-IP-Address = 10.10.44.246<br>        NAS-Port = 1<br>        Called-Station-Id = "00-1C-F0-08-FB-FA:PEAP"<br>        Calling-Station-Id = "00-12-F0-0C-97-61"<br>       
 Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 54Mbps 802.11g"<br>        EAP-Message = 0x020500061900<br>        State = 0x83d5d79487d0ce1dada70e42703d8db9<br>        Message-Authenticator = 0xbac34e6b081e86a4b4a3af08c425a353<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 5 length 6<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group
 authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>rlm_eap_tls: Received EAP-TLS ACK message<br>  rlm_eap_tls: ack handshake is finished<br>  eaptls_verify returned 3<br>  eaptls_process returned 3<br>  rlm_eap_peap: EAPTLS_SUCCESS<br>++[eap] returns handled<br>Sending Access-Challenge of id 41 to 10.10.44.246 port 1031<br>        EAP-Message = 0x0106002019001703010015ae3bbf7b20f836fdbe2fba94d4adcab00f30c19d8a<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0x83d5d79486d3ce1dada70e42703d8db9<br>Finished request 5.<br>Going to the next request<br>Waking up in 4.7 seconds.<br>rad_recv: Access-Request packet from host 10.10.44.246
 port 1031, id=42, length=209<br>        User-Name = "PLUTON\\glouglou"<br>        NAS-IP-Address = 10.10.44.246<br>        NAS-Port = 1<br>        Called-Station-Id = "00-1C-F0-08-FB-FA:PEAP"<br>        Calling-Station-Id = "00-12-F0-0C-97-61"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 54Mbps 802.11g"<br>        EAP-Message = 0x0206002b1900170301002073de0b4508a37d44acb522cff78dd1c87acb6b0cf362bf9d5f54becdc6c47701<br>        State = 0x83d5d79486d3ce1dada70e42703d8db9<br>        Message-Authenticator =
 0xb10bf08e6aa8e978b875c4cc5b9eaf47<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 6 length 43<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>  eaptls_verify returned 7<br>  rlm_eap_tls: Done initial handshake<br>  eaptls_process returned 7<br>  rlm_eap_peap: EAPTLS_OK<br>  rlm_eap_peap: Session established. 
 Decoding tunneled attributes.<br>  rlm_eap_peap: Identity - PLUTON\glouglou<br>  PEAP: Got tunneled EAP-Message<br>        EAP-Message = 0x0206001401504c55544f4e5c676c6f75676c6f75<br>  PEAP: Got tunneled identity of PLUTON\glouglou<br>  PEAP: Setting default EAP type for tunneled EAP session.<br>  PEAP: Setting User-Name to PLUTON\glouglou<br>  PEAP: Sending tunneled request<br>        EAP-Message = 0x0206001401504c55544f4e5c676c6f75676c6f75<br>        FreeRADIUS-Proxied-To = 127.0.0.1<br>        User-Name = "PLUTON\\glouglou"<br>server (null) {<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No
 such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 6 length 20<br>  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br>++[eap] returns updated<br>++[unix] returns notfound<br>++[files] returns noop<br>        expand: %{User-Name} -> PLUTON\glouglou<br>rlm_sql (sql): sql_set_user escaped user --> 'PLUTON\glouglou'<br>rlm_sql (sql): Reserving sql socket id: 2<br>        expand: SELECT id, username, attribute, value, op           FROM radcheck           WHERE username = '%{SQL-User-Name}'           ORDER BY id -> SELECT id, username, attribute, value, op           FROM
 radcheck           WHERE username = 'PLUTON=5Cglouglou'           ORDER BY id<br>        expand: SELECT groupname           FROM radusergroup           WHERE username = '%{SQL-User-Name}'           ORDER BY priority -> SELECT groupname           FROM radusergroup           WHERE username = 'PLUTON=5Cglouglou'           ORDER BY priority<br>rlm_sql (sql): Released sql socket id: 2<br>rlm_sql (sql): User PLUTON\glouglou not found<br>++[sql] returns notfound<br>++[expiration] returns noop<br>++[logintime] returns
 noop<br>rlm_pap: WARNING! No "known good" password found for the user.  Authentication may fail because of this.<br>++[pap] returns noop<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: EAP Identity<br>  rlm_eap: processing type mschapv2<br>rlm_eap_mschapv2: Issuing Challenge<br>++[eap] returns handled<br>} # server (null)<br>  PEAP: Got tunneled reply RADIUS code 11<br>        EAP-Message = 0x010700291a0107002410143a5b03364fd869b4023ba4684793ae504c55544f4e5c676c6f75676c6f75<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0x0082521f0085488ca5623cd1d98000f3<br>  PEAP: Processing from tunneled session code 0x81d6eb8 11<br>        EAP-Message =
 0x010700291a0107002410143a5b03364fd869b4023ba4684793ae504c55544f4e5c676c6f75676c6f75<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0x0082521f0085488ca5623cd1d98000f3<br>  PEAP: Got tunneled Access-Challenge<br>++[eap] returns handled<br>Sending Access-Challenge of id 42 to 10.10.44.246 port 1031<br>        EAP-Message = 0x010700401900170301003502eef878156b04a5701a286b125da5076e11baa135cd31da9c211836dc928e7221e2999df9ca197ffb848df97c76437b47181fdc20<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0x83d5d79485d2ce1dada70e42703d8db9<br>Finished request 6.<br>Going to the next request<br>Waking up in 4.7 seconds.<br>rad_recv: Access-Request packet from host 10.10.44.246 port 1031, id=43,
 length=263<br>        User-Name = "PLUTON\\glouglou"<br>        NAS-IP-Address = 10.10.44.246<br>        NAS-Port = 1<br>        Called-Station-Id = "00-1C-F0-08-FB-FA:PEAP"<br>        Calling-Station-Id = "00-12-F0-0C-97-61"<br>        Framed-MTU = 1400<br>        NAS-Port-Type = Wireless-802.11<br>        Connect-Info = "CONNECT 54Mbps 802.11g"<br>        EAP-Message = 0x02070061190017030100561cbc6e123c503a093fd6a673cbf7360f4e24bf73ba51460c1569983acc8c5108f97ab88d184e863b30ceabfe474b5eaa1cd03694078357040411d8b6ad42ac7b71344f92795d4fe103ea54ca25e8a7d03bc079a9d617<br>        State =
 0x83d5d79485d2ce1dada70e42703d8db9<br>        Message-Authenticator = 0xb362d572e672ba6a8e839ac0ccad74b5<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 7 length 97<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>  eaptls_verify returned 7<br>  rlm_eap_tls: Done initial handshake<br> 
 eaptls_process returned 7<br>  rlm_eap_peap: EAPTLS_OK<br>  rlm_eap_peap: Session established.  Decoding tunneled attributes.<br>  rlm_eap_peap: EAP type mschapv2<br>  PEAP: Got tunneled EAP-Message<br>        EAP-Message = 0x0207004a1a020700453172c46d596461e157d2b122da27332a3c0000000000000000f3dd3327fd3672e1e3922e61ccfa5146ced3e82a830f157c00504c55544f4e5c676c6f75676c6f75<br>  PEAP: Setting User-Name to PLUTON\glouglou<br>  PEAP: Sending tunneled request<br>        EAP-Message = 0x0207004a1a020700453172c46d596461e157d2b122da27332a3c0000000000000000f3dd3327fd3672e1e3922e61ccfa5146ced3e82a830f157c00504c55544f4e5c676c6f75676c6f75<br>        FreeRADIUS-Proxied-To = 127.0.0.1<br>        User-Name = "PLUTON\\glouglou"<br>        State =
 0x0082521f0085488ca5623cd1d98000f3<br>server (null) {<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 7 length 74<br>  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation<br>++[eap] returns updated<br>++[unix] returns notfound<br>++[files] returns noop<br>        expand: %{User-Name} -> PLUTON\glouglou<br>rlm_sql (sql): sql_set_user escaped user --> 'PLUTON\glouglou'<br>rlm_sql (sql): Reserving sql socket id: 1<br>        expand: SELECT id, username, attribute, value, op           FROM
 radcheck           WHERE username = '%{SQL-User-Name}'           ORDER BY id -> SELECT id, username, attribute, value, op           FROM radcheck           WHERE username = 'PLUTON=5Cglouglou'           ORDER BY id<br>        expand: SELECT groupname           FROM radusergroup           WHERE username = '%{SQL-User-Name}'           ORDER BY priority -> SELECT groupname           FROM radusergroup           WHERE username
 = 'PLUTON=5Cglouglou'           ORDER BY priority<br>rlm_sql (sql): Released sql socket id: 1<br>rlm_sql (sql): User PLUTON\glouglou not found<br>++[sql] returns notfound<br>++[expiration] returns noop<br>++[logintime] returns noop<br>rlm_pap: WARNING! No "known good" password found for the user.  Authentication may fail because of this.<br>++[pap] returns noop<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/mschapv2<br>  rlm_eap: processing type mschapv2<br>+- entering group MS-CHAP<br>  rlm_mschap: No Cleartext-Password configured.  Cannot create LM-Password.<br>  rlm_mschap: No Cleartext-Password configured.  Cannot create NT-Password.<br>  rlm_mschap: Told to do MS-CHAPv2 for glouglou with
 NT-Password<br>        expand: --username=%{mschap:User-Name} -> --username=glouglou<br> mschap2: 14<br>        expand: --challenge=%{mschap:Challenge:-00} -> --challenge=91426d1805c9df8e<br>        expand: --nt-response=%{mschap:NT-Response:-00} -> --nt-response=f3dd3327fd3672e1e3922e61ccfa5146ced3e82a830f157c<br>[2008/07/18 00:45:25,  0] utils/ntlm_auth.c:get_winbind_domain(173)<br>  could not obtain winbind domain name!<br>Exec-Program output: Reading winbind reply failed! (0xc0000001)<br>Exec-Program-Wait: plaintext: Reading winbind reply failed! (0xc0000001)<br>Exec-Program: returned: 1<br>  rlm_mschap: External script failed.<br>  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect<br>++[mschap] returns reject<br>  rlm_eap: Freeing handler<br>++[eap] returns reject<br>auth: Failed to validate the user.<br>}
 # server (null)<br>  PEAP: Got tunneled reply RADIUS code 3<br>        MS-CHAP-Error = "\007E=691 R=1"<br>        EAP-Message = 0x04070004<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>  PEAP: Processing from tunneled session code 0x81db090 3<br>        MS-CHAP-Error = "\007E=691 R=1"<br>        EAP-Message = 0x04070004<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>  PEAP: Tunneled authentication was rejected.<br>  rlm_eap_peap: FAILURE<br>++[eap] returns handled<br>Sending Access-Challenge of id 43 to 10.10.44.246 port 1031<br>        EAP-Message =
 0x010800261900170301001b1cb26351afcada6fa00681d513a98baa4adc04a92d662a5e7d5801<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>        State = 0x83d5d79484ddce1dada70e42703d8db9<br>Finished request 7.<br>Going to the next request<br>Waking up in 4.6 seconds.<br>rad_recv: Access-Request packet from host 10.10.44.246 port 1031, id=44, length=204<br>        User-Name = "PLUTON\\glouglou"<br>        NAS-IP-Address = 10.10.44.246<br>        NAS-Port = 1<br>        Called-Station-Id = "00-1C-F0-08-FB-FA:PEAP"<br>        Calling-Station-Id = "00-12-F0-0C-97-61"<br>        Framed-MTU = 1400<br>        NAS-Port-Type =
 Wireless-802.11<br>        Connect-Info = "CONNECT 54Mbps 802.11g"<br>        EAP-Message = 0x020800261900170301001bed50b902c220b64b1ad0983260196e80d5b6c8f60cd080fa9537eb<br>        State = 0x83d5d79484ddce1dada70e42703d8db9<br>        Message-Authenticator = 0xbd133e03130add066fe0cdb5f7eead95<br>+- entering group authorize<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>    rlm_realm: No '@' in User-Name = "PLUTON\glouglou", looking up realm NULL<br>    rlm_realm: No such realm "NULL"<br>++[suffix] returns noop<br>  rlm_eap: EAP packet type response id 8 length 38<br>  rlm_eap: Continuing tunnel setup.<br>++[eap] returns ok<br>  rad_check_password:  Found Auth-Type EAP<br>auth: type "EAP"<br>+- entering group
 authenticate<br>  rlm_eap: Request found, released from the list<br>  rlm_eap: EAP/peap<br>  rlm_eap: processing type peap<br>  rlm_eap_peap: Authenticate<br>  rlm_eap_tls: processing TLS<br>  eaptls_verify returned 7<br>  rlm_eap_tls: Done initial handshake<br>  eaptls_process returned 7<br>  rlm_eap_peap: EAPTLS_OK<br>  rlm_eap_peap: Session established.  Decoding tunneled attributes.<br>  rlm_eap_peap: Received EAP-TLV response.<br>  rlm_eap_peap:  Had sent TLV failure.  User was rejected earlier in this session.<br> rlm_eap: Handler failed in EAP/peap<br>  rlm_eap: Failed in EAP select<br>++[eap] returns invalid<br>auth: Failed to validate the user.<br>  Found Post-Auth-Type Reject<br>+- entering group REJECT<br>        expand: %{User-Name} -> PLUTON\glouglou<br> attr_filter: Matched entry DEFAULT at line
 11<br>++[attr_filter.access_reject] returns updated<br>Sending Access-Reject of id 44 to 10.10.44.246 port 1031<br>        EAP-Message = 0x04080004<br>        Message-Authenticator = 0x00000000000000000000000000000000<br>Finished request 8.<br>Going to the next request<br>Waking up in 4.6 seconds.<br>Cleaning up request 0 ID 36 with timestamp +39<br>Cleaning up request 1 ID 37 with timestamp +39<br>Waking up in 0.1 seconds.<br>Cleaning up request 2 ID 38 with timestamp +40<br>Cleaning up request 3 ID 39 with timestamp +40<br>Cleaning up request 4 ID 40 with timestamp +40<br>Cleaning up request 5 ID 41 with timestamp +40<br>Cleaning up request 6 ID 42 with timestamp +40<br>Cleaning up request 7 ID 43 with timestamp +40<br>Cleaning up request 8 ID 44 with timestamp +40<br>Ready to process requests.<br></div><br>


      <hr size="1"> 
Envoyé avec <a href="http://us.rd.yahoo.com/mailuk/taglines/isp/control/*http://us.rd.yahoo.com/evt=52423/*http://fr.docs.yahoo.com/mail/overview/index.html">Yahoo! Mail</a>.<br>Une boite mail plus intelligente. </a></body></html>