Hello<br><br>I want to set up a radius server with freeradius and am running into some problems.<br>I have setup the certificates like described in certs/README (configuring the .cnf files and then doing 'make ca.der' 'make server.pem" and 'make client.pem') <br>
and have imported ca.der, server.crt and client.crt on a notebook running Windows XP SP3.<br><br><br>Here is the output of freeradius -X<br><br>freeradius -X<br>FreeRADIUS Version 2.1.5, for host i486-pc-linux-gnu, built on Apr 6 2009 at 16:27:46<br>
Copyright (C) 1999-2008 The FreeRADIUS server project and contributors.<br>There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A<br>PARTICULAR PURPOSE.<br>You may redistribute copies of FreeRADIUS under the terms of the<br>
GNU General Public License v2.<br>Starting - reading configuration files ...<br>including configuration file /etc/freeradius/radiusd.conf<br>including configuration file /etc/freeradius/proxy.conf<br>including configuration file /etc/freeradius/clients.conf<br>
including files in directory /etc/freeradius/modules/<br>including configuration file /etc/freeradius/modules/<a href="http://detail.example.com">detail.example.com</a><br>including configuration file /etc/freeradius/modules/digest<br>
including configuration file /etc/freeradius/modules/chap<br>including configuration file /etc/freeradius/modules/exec<br>including configuration file /etc/freeradius/modules/expiration<br>including configuration file /etc/freeradius/modules/realm<br>
including configuration file /etc/freeradius/modules/smbpasswd<br>including configuration file /etc/freeradius/modules/checkval<br>including configuration file /etc/freeradius/modules/mac2ip<br>including configuration file /etc/freeradius/modules/mac2vlan<br>
including configuration file /etc/freeradius/modules/policy<br>including configuration file /etc/freeradius/modules/attr_filter<br>including configuration file /etc/freeradius/modules/inner-eap<br>including configuration file /etc/freeradius/modules/detail.log<br>
including configuration file /etc/freeradius/modules/echo<br>including configuration file /etc/freeradius/modules/sqlcounter_expire_on_login<br>including configuration file /etc/freeradius/modules/linelog<br>including configuration file /etc/freeradius/modules/acct_unique<br>
including configuration file /etc/freeradius/modules/expr<br>including configuration file /etc/freeradius/modules/logintime<br>including configuration file /etc/freeradius/modules/ippool<br>including configuration file /etc/freeradius/modules/unix<br>
including configuration file /etc/freeradius/modules/counter<br>including configuration file /etc/freeradius/modules/radutmp<br>including configuration file /etc/freeradius/modules/etc_group<br>including configuration file /etc/freeradius/modules/mschap<br>
including configuration file /etc/freeradius/modules/ldap<br>including configuration file /etc/freeradius/modules/wimax<br>including configuration file /etc/freeradius/modules/pap<br>including configuration file /etc/freeradius/modules/attr_rewrite<br>
including configuration file /etc/freeradius/modules/preprocess<br>including configuration file /etc/freeradius/modules/smsotp<br>including configuration file /etc/freeradius/modules/files<br>including configuration file /etc/freeradius/modules/krb5<br>
including configuration file /etc/freeradius/modules/otp<br>including configuration file /etc/freeradius/modules/detail<br>including configuration file /etc/freeradius/modules/always<br>including configuration file /etc/freeradius/modules/passwd<br>
including configuration file /etc/freeradius/modules/sradutmp<br>including configuration file /etc/freeradius/modules/perl<br>including configuration file /etc/freeradius/modules/pam<br>including configuration file /etc/freeradius/modules/sql_log<br>
including configuration file /etc/freeradius/eap.conf<br>including configuration file /etc/freeradius/policy.conf<br>including files in directory /etc/freeradius/sites-enabled/<br>including configuration file /etc/freeradius/sites-enabled/control-socket<br>
including configuration file /etc/freeradius/sites-enabled/inner-tunnel<br>including configuration file /etc/freeradius/sites-enabled/default<br>group = freerad<br>user = freerad<br>including dictionary file /etc/freeradius/dictionary<br>
main {<br> prefix = "/usr"<br> localstatedir = "/var"<br> logdir = "/var/log/freeradius"<br> libdir = "/usr/lib/freeradius"<br> radacctdir = "/var/log/freeradius/radacct"<br>
hostname_lookups = no<br> max_request_time = 30<br> cleanup_delay = 5<br> max_requests = 1024<br> allow_core_dumps = no<br> pidfile = "/var/run/freeradius/freeradius.pid"<br>
checkrad = "/usr/sbin/checkrad"<br> debug_level = 0<br> proxy_requests = yes<br> log {<br> stripped_names = no<br> auth = no<br> auth_badpass = no<br> auth_goodpass = no<br>
}<br> security {<br> max_attributes = 200<br> reject_delay = 1<br> status_server = yes<br> }<br>}<br>radiusd: #### Loading Realms and Home Servers ####<br> proxy server {<br> retry_delay = 5<br>
retry_count = 3<br> default_fallback = no<br> dead_time = 120<br> wake_all_if_all_dead = no<br> }<br> home_server localhost {<br> ipaddr = 127.0.0.1<br> port = 1812<br> type = "auth"<br>
secret = "testing123"<br> response_window = 20<br> max_outstanding = 65536<br> require_message_authenticator = no<br> zombie_period = 40<br> status_check = "status-server"<br>
ping_interval = 30<br> check_interval = 30<br> num_answers_to_alive = 3<br> num_pings_to_alive = 3<br> revive_interval = 120<br> status_check_timeout = 4<br> irt = 2<br> mrt = 16<br>
mrc = 5<br> mrd = 30<br> }<br> home_server_pool my_auth_failover {<br> type = fail-over<br> home_server = localhost<br> }<br> realm <a href="http://example.com">example.com</a> {<br> auth_pool = my_auth_failover<br>
}<br> realm LOCAL {<br> }<br>radiusd: #### Loading Clients ####<br> client localhost {<br> ipaddr = 127.0.0.1<br> require_message_authenticator = no<br> secret = "testing123"<br> nastype = "other"<br>
}<br> client <a href="http://192.168.224.100/24">192.168.224.100/24</a> {<br> require_message_authenticator = no<br> secret = "mypasswordishere"<br> shortname = "lancomtest"<br> }<br>
radiusd: #### Instantiating modules ####<br> instantiate {<br> Module: Linked to module rlm_exec<br> Module: Instantiating exec<br> exec {<br> wait = no<br> input_pairs = "request"<br> shell_escape = yes<br>
}<br> Module: Linked to module rlm_expr<br> Module: Instantiating expr<br> Module: Linked to module rlm_expiration<br> Module: Instantiating expiration<br> expiration {<br> reply-message = "Password Has Expired "<br>
}<br> Module: Linked to module rlm_logintime<br> Module: Instantiating logintime<br> logintime {<br> reply-message = "You are calling outside your allowed timespan "<br> minimum-timeout = 60<br>
}<br> }<br>radiusd: #### Loading Virtual Servers ####<br>server inner-tunnel {<br> modules {<br> Module: Checking authenticate {...} for more modules to load<br> Module: Linked to module rlm_pap<br> Module: Instantiating pap<br>
pap {<br> encryption_scheme = "auto"<br> auto_header = no<br> }<br> Module: Linked to module rlm_chap<br> Module: Instantiating chap<br> Module: Linked to module rlm_mschap<br> Module: Instantiating mschap<br>
mschap {<br> use_mppe = yes<br> require_encryption = no<br> require_strong = no<br> with_ntdomain_hack = no<br> }<br> Module: Linked to module rlm_unix<br> Module: Instantiating unix<br> unix {<br>
radwtmp = "/var/log/freeradius/radwtmp"<br> }<br> Module: Linked to module rlm_eap<br> Module: Instantiating eap<br> eap {<br> default_eap_type = "tls"<br> timer_expire = 60<br>
ignore_unknown_eap_types = no<br> cisco_accounting_username_bug = no<br> max_sessions = 2048<br> }<br> Module: Linked to sub-module rlm_eap_md5<br> Module: Instantiating eap-md5<br> Module: Linked to sub-module rlm_eap_leap<br>
Module: Instantiating eap-leap<br> Module: Linked to sub-module rlm_eap_gtc<br> Module: Instantiating eap-gtc<br> gtc {<br> challenge = "Password: "<br> auth_type = "PAP"<br> }<br> Module: Linked to sub-module rlm_eap_tls<br>
Module: Instantiating eap-tls<br> tls {<br> rsa_key_exchange = no<br> dh_key_exchange = yes<br> rsa_key_length = 512<br> dh_key_length = 512<br> verify_depth = 0<br> pem_file_type = yes<br>
private_key_file = "/etc/freeradius/certs/server.key"<br> certificate_file = "/etc/freeradius/certs/server.pem"<br> CA_file = "/etc/freeradius/certs/ca.pem"<br> private_key_password = "key to server cert is here"<br>
dh_file = "/etc/freeradius/certs/dh"<br> random_file = "/etc/freeradius/certs/random"<br> fragment_size = 1024<br> include_length = yes<br> check_crl = no<br> cipher_list = "DEFAULT"<br>
make_cert_command = "/etc/freeradius/certs/bootstrap"<br> cache {<br> enable = no<br> lifetime = 24<br> max_entries = 255<br> }<br> }<br> Module: Linked to sub-module rlm_eap_ttls<br>
Module: Instantiating eap-ttls<br> ttls {<br> default_eap_type = "md5"<br> copy_request_to_tunnel = no<br> use_tunneled_reply = no<br> virtual_server = "inner-tunnel"<br>
}<br> Module: Linked to sub-module rlm_eap_peap<br> Module: Instantiating eap-peap<br> peap {<br> default_eap_type = "mschapv2"<br> copy_request_to_tunnel = no<br> use_tunneled_reply = no<br>
proxy_tunneled_request_as_eap = yes<br> virtual_server = "inner-tunnel"<br> }<br> Module: Linked to sub-module rlm_eap_mschapv2<br> Module: Instantiating eap-mschapv2<br> mschapv2 {<br> with_ntdomain_hack = no<br>
}<br> Module: Checking authorize {...} for more modules to load<br> Module: Linked to module rlm_realm<br> Module: Instantiating suffix<br> realm suffix {<br> format = "suffix"<br> delimiter = "@"<br>
ignore_default = no<br> ignore_null = no<br> }<br> Module: Linked to module rlm_files<br> Module: Instantiating files<br> files {<br> usersfile = "/etc/freeradius/users"<br> acctusersfile = "/etc/freeradius/acct_users"<br>
preproxy_usersfile = "/etc/freeradius/preproxy_users"<br> compat = "no"<br> }<br> Module: Checking session {...} for more modules to load<br> Module: Linked to module rlm_radutmp<br> Module: Instantiating radutmp<br>
radutmp {<br> filename = "/var/log/freeradius/radutmp"<br> username = "%{User-Name}"<br> case_sensitive = yes<br> check_with_nas = yes<br> perm = 384<br> callerid = yes<br>
}<br> Module: Checking post-proxy {...} for more modules to load<br> Module: Checking post-auth {...} for more modules to load<br> Module: Linked to module rlm_attr_filter<br> Module: Instantiating attr_filter.access_reject<br>
attr_filter attr_filter.access_reject {<br> attrsfile = "/etc/freeradius/attrs.access_reject"<br> key = "%{User-Name}"<br> }<br> }<br>}<br> modules {<br> Module: Checking authenticate {...} for more modules to load<br>
Module: Checking authorize {...} for more modules to load<br> Module: Linked to module rlm_preprocess<br> Module: Instantiating preprocess<br> preprocess {<br> huntgroups = "/etc/freeradius/huntgroups"<br>
hints = "/etc/freeradius/hints"<br> with_ascend_hack = no<br> ascend_channels_per_line = 23<br> with_ntdomain_hack = no<br> with_specialix_jetstream_hack = no<br> with_cisco_vsa_hack = no<br>
with_alvarion_vsa_hack = no<br> }<br> Module: Checking preacct {...} for more modules to load<br> Module: Linked to module rlm_acct_unique<br> Module: Instantiating acct_unique<br> acct_unique {<br> key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"<br>
}<br> Module: Checking accounting {...} for more modules to load<br> Module: Linked to module rlm_detail<br> Module: Instantiating detail<br> detail {<br> detailfile = "/var/log/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"<br>
header = "%t"<br> detailperm = 384<br> dirperm = 493<br> locking = no<br> log_packet_header = no<br> }<br> Module: Instantiating attr_filter.accounting_response<br> attr_filter attr_filter.accounting_response {<br>
attrsfile = "/etc/freeradius/attrs.accounting_response"<br> key = "%{User-Name}"<br> }<br> Module: Checking session {...} for more modules to load<br> Module: Checking post-proxy {...} for more modules to load<br>
Module: Checking post-auth {...} for more modules to load<br> }<br>radiusd: #### Opening IP addresses and Ports ####<br>listen {<br> type = "auth"<br> ipaddr = *<br> port = 0<br>}<br>listen {<br>
type = "acct"<br> ipaddr = *<br> port = 0<br>}<br>listen {<br> type = "control"<br> listen {<br> socket = "/var/run/freeradius/freeradius.sock"<br> }<br>}<br>
Listening on authentication address * port 1812<br>Listening on accounting address * port 1813<br>Listening on command file /var/run/freeradius/freeradius.sock<br>Listening on proxy address * port 1814<br>Ready to process requests.<br>
rad_recv: Access-Request packet from host 192.168.224.100 port 3072, id=94, length=180<br> User-Name = "NTB-KTM-01\\Administrator"<br> Service-Type = Framed-User<br> NAS-IP-Address = 192.168.224.100<br>
NAS-Port = 1<br> NAS-Port-Id = "1"<br> Called-Station-Id = "00-0B-6B-30-31-56:LANCOM"<br> Calling-Station-Id = "00-21-6B-2A-72-AA"<br> NAS-Identifier = "LANCOML-54g"<br>
NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x0201001d014e54422d4b544d2d30315c41646d696e6973747261746f72<br> Message-Authenticator = 0xad489223ce9bdd57116a69b80d04a0cc<br>+- entering group authorize {...}<br>
++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "NTB-KTM-01\Administrator", looking up realm NULL<br>[suffix] No such realm "NULL"<br>
++[suffix] returns noop<br>[eap] EAP packet type response id 1 length 29<br>[eap] No EAP Start, assuming it's an on-going EAP conversation<br>++[eap] returns updated<br>++[unix] returns notfound<br>++[files] returns noop<br>
++[expiration] returns noop<br>++[logintime] returns noop<br>[pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.<br>++[pap] returns noop<br>Found Auth-Type = EAP<br>
+- entering group authenticate {...}<br>[eap] EAP Identity<br>[eap] processing type tls<br>[tls] Requiring client certificate<br>[tls] Initiate<br>[tls] Start returned 1<br>++[eap] returns handled<br>Sending Access-Challenge of id 94 to 192.168.224.100 port 3072<br>
EAP-Message = 0x010200060d20<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0x09b1011d09b30c50d61b870248979c7b<br>Finished request 0.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>
rad_recv: Access-Request packet from host 192.168.224.100 port 3072, id=100, length=175<br> User-Name = "NTB-KTM-01\\Administrator"<br> Service-Type = Framed-User<br> NAS-IP-Address = 192.168.224.100<br>
NAS-Port = 1<br> NAS-Port-Id = "1"<br> State = 0x09b1011d09b30c50d61b870248979c7b<br> Called-Station-Id = "00-0B-6B-30-31-56:LANCOM"<br> Calling-Station-Id = "00-21-6B-2A-72-AA"<br>
NAS-Identifier = "LANCOML-54g"<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x020200060319<br> Message-Authenticator = 0xbd1c68bdf127aee5ad8bbf8674a71914<br>+- entering group authorize {...}<br>
++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "NTB-KTM-01\Administrator", looking up realm NULL<br>[suffix] No such realm "NULL"<br>
++[suffix] returns noop<br>[eap] EAP packet type response id 2 length 6<br>[eap] No EAP Start, assuming it's an on-going EAP conversation<br>++[eap] returns updated<br>++[unix] returns notfound<br>++[files] returns noop<br>
++[expiration] returns noop<br>++[logintime] returns noop<br>[pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.<br>++[pap] returns noop<br>Found Auth-Type = EAP<br>
+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>[eap] EAP NAK<br>[eap] EAP-NAK asked for EAP-Type/peap<br>[eap] processing type tls<br>[tls] Initiate<br>[tls] Start returned 1<br>++[eap] returns handled<br>
Sending Access-Challenge of id 100 to 192.168.224.100 port 3072<br> EAP-Message = 0x010300061920<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0x09b1011d08b21850d61b870248979c7b<br>
Finished request 1.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>rad_recv: Access-Request packet from host 192.168.224.100 port 3072, id=52, length=249<br> User-Name = "NTB-KTM-01\\Administrator"<br>
Service-Type = Framed-User<br> NAS-IP-Address = 192.168.224.100<br> NAS-Port = 1<br> NAS-Port-Id = "1"<br> State = 0x09b1011d08b21850d61b870248979c7b<br> Called-Station-Id = "00-0B-6B-30-31-56:LANCOM"<br>
Calling-Station-Id = "00-21-6B-2A-72-AA"<br> NAS-Identifier = "LANCOML-54g"<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x0203005019800000004616030100410100003d030149dc65059309f2c91ab12b1481406b0c3f660db2dea70dfe1ad2601328ddbf5800001600040005000a000900640062000300060013001200630100<br>
Message-Authenticator = 0x77384e41c923602ef44928acde1df80e<br>+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "NTB-KTM-01\Administrator", looking up realm NULL<br>
[suffix] No such realm "NULL"<br>++[suffix] returns noop<br>[eap] EAP packet type response id 3 length 80<br>[eap] Continuing tunnel setup.<br>++[eap] returns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>
[eap] Request found, released from the list<br>[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br> TLS Length 70<br>[peap] Length Included<br>[peap] eaptls_verify returned 11<br>[peap] (other): before/accept initialization<br>
[peap] TLS_accept: before/accept initialization<br>[peap] <<< TLS 1.0 Handshake [length 0041], ClientHello<br>[peap] TLS_accept: SSLv3 read client hello A<br>[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello<br>
[peap] TLS_accept: SSLv3 write server hello A<br>[peap] >>> TLS 1.0 Handshake [length 0813], Certificate<br>[peap] TLS_accept: SSLv3 write certificate A<br>[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone<br>
[peap] TLS_accept: SSLv3 write server done A<br>[peap] TLS_accept: SSLv3 flush data<br>[peap] TLS_accept: Need to read more data: SSLv3 read client certificate A<br>In SSL Handshake Phase<br>In SSL Accept mode<br>
[peap] eaptls_process returned 13<br>[peap] EAPTLS_HANDLED<br>++[eap] returns handled<br>Sending Access-Challenge of id 52 to 192.168.224.100 port 3072<br> EAP-Message = 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<br>
EAP-Message = 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<br>
EAP-Message = 0x4cea2c36b7231b84fce023a1bd49f24888acb9db7709457c8e52e8ad04f509d5711acfc03ca61f9ee05f83229624688f3d4f47938ac00006576f675c2cbb11561f0d654ab3c42eb35b1ccee9eb04f39c2d194270895f38543ea9210c15f03ed31094ac4ea2f9493b0cf4b1e365002e6ac16dec2dd90a89ddf59f236dd5f0e7adca3358c6ba8910b5a0e187b6d72f8199ec5596a8c886306428e65384c64c9d8448899b135a6b475511b70203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d010104050003820101008d78b0409b38f13e5247e8bfa2ec875b0b3aa8b078c93499685a329dd5db172edd<br>
EAP-Message = 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<br>
EAP-Message = 0x092a864886f70d0101050500<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0x09b1011d0bb51850d61b870248979c7b<br>Finished request 2.<br>Going to the next request<br>
Waking up in 4.9 seconds.<br>rad_recv: Access-Request packet from host 192.168.224.100 port 3072, id=134, length=175<br> User-Name = "NTB-KTM-01\\Administrator"<br> Service-Type = Framed-User<br> NAS-IP-Address = 192.168.224.100<br>
NAS-Port = 1<br> NAS-Port-Id = "1"<br> State = 0x09b1011d0bb51850d61b870248979c7b<br> Called-Station-Id = "00-0B-6B-30-31-56:LANCOM"<br> Calling-Station-Id = "00-21-6B-2A-72-AA"<br>
NAS-Identifier = "LANCOML-54g"<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x020400061900<br> Message-Authenticator = 0xb1b616b078da871a9cfa265c77bca404<br>+- entering group authorize {...}<br>
++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "NTB-KTM-01\Administrator", looking up realm NULL<br>[suffix] No such realm "NULL"<br>
++[suffix] returns noop<br>[eap] EAP packet type response id 4 length 6<br>[eap] Continuing tunnel setup.<br>++[eap] returns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>
[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br>[peap] Received TLS ACK<br>[peap] ACK handshake fragment handler<br>[peap] eaptls_verify returned 1<br>[peap] eaptls_process returned 13<br>[peap] EAPTLS_HANDLED<br>
++[eap] returns handled<br>Sending Access-Challenge of id 134 to 192.168.224.100 port 3072<br> EAP-Message = 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<br>
EAP-Message = 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<br>
EAP-Message = 0xe157aa7327f6a3777bf8af781f1def2b3a1a958856c19f7ef9b998262ec290c985ad622a3fd7f2868e73e1c28d93e83c19a2c92980ec23ec09f3a5e3cc3fe973544434ec7b0da8d6feef9cf2c0f52382edc777ee81c1c50203010001a381ea3081e7301d0603551d0e04160414aacc35075d5a53fb5a8e743785787f36d2b43c213081b70603551d230481af3081ac8014aacc35075d5a53fb5a8e743785787f36d2b43c21a18188a48185308182310b3009060355040613024445311630140603550408130d4e69656465727361636873656e310f300d060355040713064c4b4c656572310f300d060355040a13064c4b4c6565723126302406092a86<br>
EAP-Message = 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<br>
EAP-Message = 0xc0bf137a048e16c5<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0x09b1011d0ab41850d61b870248979c7b<br>Finished request 3.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>
rad_recv: Access-Request packet from host 192.168.224.100 port 3072, id=170, length=175<br> User-Name = "NTB-KTM-01\\Administrator"<br> Service-Type = Framed-User<br> NAS-IP-Address = 192.168.224.100<br>
NAS-Port = 1<br> NAS-Port-Id = "1"<br> State = 0x09b1011d0ab41850d61b870248979c7b<br> Called-Station-Id = "00-0B-6B-30-31-56:LANCOM"<br> Calling-Station-Id = "00-21-6B-2A-72-AA"<br>
NAS-Identifier = "LANCOML-54g"<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x020500061900<br> Message-Authenticator = 0x4a35aa0f4dd5c701c749d472b76bcfe2<br>+- entering group authorize {...}<br>
++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "NTB-KTM-01\Administrator", looking up realm NULL<br>[suffix] No such realm "NULL"<br>
++[suffix] returns noop<br>[eap] EAP packet type response id 5 length 6<br>[eap] Continuing tunnel setup.<br>++[eap] returns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>
[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br>[peap] Received TLS ACK<br>[peap] ACK handshake fragment handler<br>[peap] eaptls_verify returned 1<br>[peap] eaptls_process returned 13<br>[peap] EAPTLS_HANDLED<br>
++[eap] returns handled<br>Sending Access-Challenge of id 170 to 192.168.224.100 port 3072<br> EAP-Message = 0x0106006a1900d8f29ce2f96793d198e4346cbdc1ad31a5896f1407adade2d006cafdef4925eccb0d6a86abbd2fef7cca9910f2c67f9a213298110190b9e48e58d644465df8b7523705aeb6cd2ccf98754ab520aa87fa08f5a6292d4b6dfce7922616030100040e000000<br>
Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0x09b1011d0db71850d61b870248979c7b<br>Finished request 4.<br>Going to the next request<br>Waking up in 4.9 seconds.<br>rad_recv: Access-Request packet from host 192.168.224.100 port 3072, id=211, length=491<br>
User-Name = "NTB-KTM-01\\Administrator"<br> Service-Type = Framed-User<br> NAS-IP-Address = 192.168.224.100<br> NAS-Port = 1<br> NAS-Port-Id = "1"<br> State = 0x09b1011d0db71850d61b870248979c7b<br>
Called-Station-Id = "00-0B-6B-30-31-56:LANCOM"<br> Calling-Station-Id = "00-21-6B-2A-72-AA"<br> NAS-Identifier = "LANCOML-54g"<br> NAS-Port-Type = Wireless-802.11<br>
EAP-Message = 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<br>
EAP-Message = 0x965e211b8e065d4a472778ae3a88efaf50d6193c62790a021403010001011603010020282065075d35d042dbb9f894d4773611edd9bc35b034d6fd2c216c60398fcb57<br> Message-Authenticator = 0x36cb41a6a8775c88e1e443b7d3c46a97<br>
+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "NTB-KTM-01\Administrator", looking up realm NULL<br>[suffix] No such realm "NULL"<br>
++[suffix] returns noop<br>[eap] EAP packet type response id 6 length 253<br>[eap] Continuing tunnel setup.<br>++[eap] returns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>
[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br> TLS Length 310<br>[peap] Length Included<br>[peap] eaptls_verify returned 11<br>[peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange<br>
[peap] TLS_accept: SSLv3 read client key exchange A<br>[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]<br>[peap] <<< TLS 1.0 Handshake [length 0010], Finished<br>[peap] TLS_accept: SSLv3 read finished A<br>
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]<br>[peap] TLS_accept: SSLv3 write change cipher spec A<br>[peap] >>> TLS 1.0 Handshake [length 0010], Finished<br>[peap] TLS_accept: SSLv3 write finished A<br>
[peap] TLS_accept: SSLv3 flush data<br>[peap] (other): SSL negotiation finished successfully<br>SSL Connection Established<br>[peap] eaptls_process returned 13<br>[peap] EAPTLS_HANDLED<br>++[eap] returns handled<br>
Sending Access-Challenge of id 211 to 192.168.224.100 port 3072<br> EAP-Message = 0x0107003119001403010001011603010020bfc854b14959d8369186ec615304b1f082d3d77bcc479f59c9efde6dc5e9b766<br> Message-Authenticator = 0x00000000000000000000000000000000<br>
State = 0x09b1011d0cb61850d61b870248979c7b<br>Finished request 5.<br>Going to the next request<br>Waking up in 4.8 seconds.<br>Cleaning up request 0 ID 94 with timestamp +10<br>Cleaning up request 1 ID 100 with timestamp +10<br>
Cleaning up request 2 ID 52 with timestamp +10<br>Cleaning up request 3 ID 134 with timestamp +10<br>Cleaning up request 4 ID 170 with timestamp +10<br>Cleaning up request 5 ID 211 with timestamp +10<br>Ready to process requests.<br>
rad_recv: Access-Request packet from host 192.168.224.100 port 3072, id=166, length=175<br><br><br><br>I hope I have included sufficient information of the problem.<br>Thanks for your help.<br><br>Best Regards<br>Marten<br>