<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Verdana
}
--></style>
</head>
<body class='hmmessage'>
<br>> Aziz YÜCELEN wrote:<br>> > I am setup freeradius again and not edit default configuration, I am<br>> > trying configure inner-tunnel but result didn't change. How to configure<br>> > inner-tunnel file for ttls thanks.<br>> <br>> You don't configure it. The default installation of the server<br>> configures it.<br>> <br>> The debug log shows that it's loading and using the inner-tunnel<br>> virtual server. It also shows that the inner-tunnel virtual server is<br>> *empty*.<br>> <br>> The *only* way for it to be empty is if you deleted the contents.<br><br>Hi <br><br> I am setup again and dont configure defaullts.Run radiusd -X and receive user reject, output is below. Thanks for all.<br><br><br>Waking up in 3.4 seconds.<br>rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=228, length=229<br> User-Name = "deneme"<br> NAS-IP-Address = 10.1.1.252<br>  !
; NAS-Port = 0<br> Called-Station-Id = "00-30-4F-44-3D-C1"<br> Calling-Station-Id = "00-18-DE-88-62-77"<br> NAS-Identifier = "WirelessAccessPoint"<br> Framed-MTU = 1380<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x020c005019800000004616030100410100003d03014c3589c63051541afb7d63785038b2b416e66676504baf594c8d48c83b74954500001600040005000a000900640062000300060013001200630100<br> State = 0xeccff048edc3e9d4d10018a42bd2d5e3<br> Message-Authenticator = 0x243675fbd3453868f365dda2997fab4f<br>+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "deneme", looking up realm NULL<br>[suffix] No such realm "NULL"<br>++[suffix] returns noop<br>[eap] EAP packet type response id 12 length 80<br>[eap] Continuing tunnel setup.<br>++[eap] ret!
urns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {..
.}<br>[eap] Request found, released from the list<br>[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br> TLS Length 70<br>[peap] Length Included<br>[peap] eaptls_verify returned 11 <br>[peap] (other): before/accept initialization <br>[peap] TLS_accept: before/accept initialization <br>[peap] <<< TLS 1.0 Handshake [length 0041], ClientHello <br>[peap] TLS_accept: SSLv3 read client hello A <br>[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello <br>[peap] TLS_accept: SSLv3 write server hello A <br>[peap] >>> TLS 1.0 Handshake [length 0945], Certificate <br>[peap] TLS_accept: SSLv3 write certificate A <br>[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone <br>[peap] TLS_accept: SSLv3 write server done A <br>[peap] &n!
bsp; TLS_accept: SSLv3 flush data <br>[peap] TLS_accept: Need to read more data: SSLv3 read client certificate A<br>In SSL Handshake Phase <br>In SSL Accept mode <br>[peap] eaptls_process returned 13 <br>[peap] EAPTLS_HANDLED<br>++[eap] returns handled<br>Sending Access-Challenge of id 228 to 10.1.1.252 port 1206<br> EAP-Message = 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<br> EAP-Message = 0x63656c656e20556e6976657273697479206f66204469636c652043657274!
696669636174655f417574686f72697479301e170d3130303631363139333834355a17
0d3133303631353139333834355a3081a4310b3009060355040613025452311330110603550408130a446979617262616b69723121301f060355040a1318417a697a20595543454c454e2042696c67692049736c656d313c303a06035504031433417a697a5f597563656c656e20556e6976657273697479206f66204469636c6520536572766572204365727469666963617465311f301d06092a864886f70d010901161061797563656c656e406d736e2e636f6d30820122300d06<br> EAP-Message = 0x092a864886f70d01010105000382010f003082010a0282010100c63199d29c527300be3f6ec9f11d5aaf01239eaeb9ad9226307110ab54d8c705b9a8e43c3ef7c2dfcef7a2d27cc1a0a4022e6ca2af557ae7607e164460829c9683d0ff8dc4b143c01d8fb2d58f118ca6e5076fc69294732ad932a033fd9e572780590234ab0325219e671b088ea3bd634ebacba09a38adf1348c748846d74cebf3a8e83e3668c6a81ff06da756974e3716a97bb98f610a7ea34c514e4949f343522fef0e0041fd67c0f2b349353d30e7def4d479251d654c16ea8934f9af6443b28d1469e81136e326f8eb18f06bdeed031eb37877c8eba0537690edc78b7a79a0260c<br> EAP-Message = 0x94ecee826b7aa51ec23669bcd1204!
fe4af7415c5ac53b8819658b9de330203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101040500038201010082a4c652c54459e8401c492909980d70aea665fa3aa6fff95d411ec44c0635275a3a4e949405671dc9c910212f55820ccb1ecc67676a4945ac073b02c00971036905a098c27bf7de0e269e8dde5a8edfeb139f0c3cb3f2600b521c677d2eb6e39ceaddcb851a0520824bb5c2ab878c0c48e6a990dc8d130790df56cd6aa4b2f8b441e4bbd71ab38056a812b57dcd90b52b27d7d5bcda44f0b18bd80bca7d2b7cbca476b9692e89f0848d288f0ef1<br> EAP-Message = 0xb020c38e936b9e9a04df30ee<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0xeccff048eec2e9d4d10018a42bd2d5e3<br>Finished request 11.<br>Going to the next request<br>Waking up in 2.8 seconds.<br>rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=229, length=155<br> User-Name = "deneme"<br> NAS-IP-Address = 10.1.1.252<br> NAS-Port = 0<br>&n!
bsp; Called-Station-Id = "00-30-4F-44-3D-C1"<br> &nbs
p; Calling-Station-Id = "00-18-DE-88-62-77"<br> NAS-Identifier = "WirelessAccessPoint"<br> Framed-MTU = 1380<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x020d00061900<br> State = 0xeccff048eec2e9d4d10018a42bd2d5e3<br> Message-Authenticator = 0x49ed19f32e533c2e2e6212cbefba06ea<br>+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "deneme", looking up realm NULL<br>[suffix] No such realm "NULL"<br>++[suffix] returns noop<br>[eap] EAP packet type response id 13 length 6<br>[eap] Continuing tunnel setup.<br>++[eap] returns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br>[peap] Received TLS ACK<br>[peap] ACK handshak!
e fragment handler<br>[peap] eaptls_verify returned 1 <br>[peap] eaptls_process returned 13 <br>[peap] EAPTLS_HANDLED<br>++[eap] returns handled<br>Sending Access-Challenge of id 229 to 10.1.1.252 port 1206<br> EAP-Message = 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<br> EAP-Message = 0x3d06035504031436617a697a5f797563656c656e20556e6976657273697479206f66204469636c652043657274696669636174655f417574686f72697479301e170d3130303631363139333834355a170d3130303731363139333834355a3081c2310b!
3009060355040613025452311330110603550408130a446979617262616b6972311930
17060355040713104469636c6520556e69766572736974793121301f060355040a1318417a697a20595543454c454e2042696c67692049736c656d311f301d06092a864886f70d010901161061797563656c656e406d736e2e636f6d313f303d06035504031436617a697a5f797563656c656e20556e69<br> EAP-Message = 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<br> EAP-Message = 0x34e53975224d0785bb81094c2386919ebb4346de7fbfc60a2d2e76aec8d99fb1c3336eb5a4d57934bbec1dc044f25bc5727700f85484689547d1ce79d0db49a3837e893584eb8d4886870203010001a382012b3!
0820127301d0603551d0e04160414d7e039b49da64df4a94fbc3cd32dc97ccbfb64bd3081f70603551d230481ef3081ec8014d7e039b49da64df4a94fbc3cd32dc97ccbfb64bda181c8a481c53081c2310b3009060355040613025452311330110603550408130a446979617262616b697231193017060355040713104469636c6520556e69766572736974793121301f060355040a1318417a697a20595543454c454e2042696c6769<br> EAP-Message = 0x2049736c656d311f<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0xeccff048efc1e9d4d10018a42bd2d5e3<br>Finished request 12.<br>Going to the next request<br>Waking up in 0.8 seconds.<br>Cleaning up request 9 ID 226 with timestamp +38<br>Cleaning up request 10 ID 227 with timestamp +38<br>Waking up in 2.1 seconds.<br>rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=230, length=155<br> User-Name = "deneme"<br> NAS-IP-Address = 10.1.1.252<br> NAS-Port = 0<br> &nbs!
p; Called-Station-Id = "00-30-4F-44-3D-C1"<br> Calli
ng-Station-Id = "00-18-DE-88-62-77"<br> NAS-Identifier = "WirelessAccessPoint"<br> Framed-MTU = 1380<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x020e00061900<br> State = 0xeccff048efc1e9d4d10018a42bd2d5e3<br> Message-Authenticator = 0x2a1aed16f39db7a2c6ff51380ae5b702<br>+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "deneme", looking up realm NULL<br>[suffix] No such realm "NULL"<br>++[suffix] returns noop<br>[eap] EAP packet type response id 14 length 6<br>[eap] Continuing tunnel setup.<br>++[eap] returns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br>[peap] Received TLS ACK<br>[peap] ACK handshake fragment han!
dler<br>[peap] eaptls_verify returned 1 <br>[peap] eaptls_process returned 13 <br>[peap] EAPTLS_HANDLED<br>++[eap] returns handled<br>Sending Access-Challenge of id 230 to 10.1.1.252 port 1206<br> EAP-Message = 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<br> EAP-Message = 0x70c350ca71cd31a2cb47886bd8cb17551ed454271f457402946307396ac5d2bcc0ae40f920447cd8b7fd06d90118e3f64110cadabd454dfea392b75ebeb229719b4f3f344b2aa44a8694c8140de515a8aa11c80befb98b7f3992094520e5c91cde62ddc42a466d5e3761!
e2153d6ea34d061eef597e0584d29870b35488e7f9f2a17f00c70e641d2b4aaf0202e0
7225eea1c8b9fbe65416030100040e000000<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0xeccff048e8c0e9d4d10018a42bd2d5e3<br>Finished request 13.<br>Going to the next request<br>Waking up in 1.0 seconds.<br>Cleaning up request 11 ID 228 with timestamp +40<br>Waking up in 1.9 seconds.<br>rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=231, length=471<br> User-Name = "deneme"<br> NAS-IP-Address = 10.1.1.252<br> NAS-Port = 0<br> Called-Station-Id = "00-30-4F-44-3D-C1"<br> Calling-Station-Id = "00-18-DE-88-62-77"<br> NAS-Identifier = "WirelessAccessPoint"<br> Framed-MTU = 1380<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x020f0140198000000136160301010610000102010058e134ee813c5df2c7aec907357c4d11170d5592531bf2e5d142b27648f54c720588d!
2b17831ee0d8b163c500245c9ca58ab0a18177d0289ba51af9ae442ae4f824f06a624970d9beeea7691826c11eb41741375eaabd72b0f023c45c3433056fb4adfbded6bbf18278e0f670f52eb1a793849d1e0b0f5de6dfd5f2417fec5f6d3b4b6390693bf3bb75f29de46d24b0ec882174b6fbbdf8bc3c842d9fb452addcb616cc1b38e8208adf8e02f487e15a641bdebd1b87823aff1f872fc7d41678ea6d727a6400493b1d6da55cef0cafc29cfee74a6e38f81ef295a04529afe66ca79ecb0f754d90960<br> EAP-Message = 0xf0afc29d9bb8b7d1ec48f850e8300dcad9c77b1d47498ebb1403010001011603010020ac341fafef579e9fbb39c8442996ebcd927065bcd3cee79a61d41a9d87cc9c6f<br> State = 0xeccff048e8c0e9d4d10018a42bd2d5e3<br> Message-Authenticator = 0xd1383f8c741d2eee900c243621c0f38c<br>+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "deneme", looking up realm NULL<br>[suffix] No such realm "NULL"<br>++[suffix] returns noop<br>[eap] EAP packet type resp!
onse id 15 length 253<br>[eap] Continuing tunnel setup.<br>++[eap] ret
urns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br> TLS Length 310<br>[peap] Length Included<br>[peap] eaptls_verify returned 11 <br>[peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange <br>[peap] TLS_accept: SSLv3 read client key exchange A <br>[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001] <br>[peap] <<< TLS 1.0 Handshake [length 0010], Finished <br>[peap] TLS_accept: SSLv3 read finished A <br>[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001] <br>[peap] TLS_accept: SSLv3 write change cipher spec A <br>[peap] >>> TLS 1.0 Handshake [length 0010], Finished <br>[peap] TLS_accept: SSLv3 write finished A <br>[peap] TLS_acce!
pt: SSLv3 flush data <br>[peap] (other): SSL negotiation finished successfully <br>SSL Connection Established <br>[peap] eaptls_process returned 13 <br>[peap] EAPTLS_HANDLED<br>++[eap] returns handled<br>Sending Access-Challenge of id 231 to 10.1.1.252 port 1206<br> EAP-Message = 0x0110003119001403010001011603010020946ea9a56d5a8869d64c550c5ec39e505de969b8abcdb94ef288f5981910b1b5<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0xeccff048e9dfe9d4d10018a42bd2d5e3<br>Finished request 14.<br>Going to the next request<br>Waking up in 1.0 seconds.<br>Cleaning up request 12 ID 229 with timestamp +42<br>Waking up in 1.9 seconds.<br>rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=232, length=155<br> User-Name = "deneme"<br> NAS-IP-Address = 10.1.1.252<br> NAS-Port = 0<br> Called-Station-Id =!
"00-30-4F-44-3D-C1"<br> Calling-Station-Id = "00-18
-DE-88-62-77"<br> NAS-Identifier = "WirelessAccessPoint"<br> Framed-MTU = 1380<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x021000061900<br> State = 0xeccff048e9dfe9d4d10018a42bd2d5e3<br> Message-Authenticator = 0x1e040ebf6b6f48cb08b525fac4f2f46c<br>+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "deneme", looking up realm NULL<br>[suffix] No such realm "NULL"<br>++[suffix] returns noop<br>[eap] EAP packet type response id 16 length 6<br>[eap] Continuing tunnel setup.<br>++[eap] returns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br>[peap] Received TLS ACK<br>[peap] ACK handshake is finished<br>[peap] eaptls_verif!
y returned 3 <br>[peap] eaptls_process returned 3 <br>[peap] EAPTLS_SUCCESS<br>++[eap] returns handled<br>Sending Access-Challenge of id 232 to 10.1.1.252 port 1206<br> EAP-Message = 0x01110020190017030100157296c0b71e3823192738b1788c4fe0467dec236310<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0xeccff048eadee9d4d10018a42bd2d5e3<br>Finished request 15.<br>Going to the next request<br>Waking up in 1.0 seconds.<br>Cleaning up request 13 ID 230 with timestamp +44<br>Waking up in 2.0 seconds.<br>rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=233, length=183<br> User-Name = "deneme"<br> NAS-IP-Address = 10.1.1.252<br> NAS-Port = 0<br> Called-Station-Id = "00-30-4F-44-3D-C1"<br> Calling-Station-Id = "00-18-DE-88-62-77"<br> NAS-Identifier = "WirelessAccessPoint"<br> &n!
bsp; Framed-MTU = 1380<br> NAS-Port-Type = Wir
eless-802.11<br> EAP-Message = 0x0211002219001703010017e6bc773d8860f3b0fbab0544be27f962e06f2e53070cf6<br> State = 0xeccff048eadee9d4d10018a42bd2d5e3<br> Message-Authenticator = 0xb6519fa20a989d07f8aef6ebf8f8c0c1<br>+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "deneme", looking up realm NULL<br>[suffix] No such realm "NULL"<br>++[suffix] returns noop<br>[eap] EAP packet type response id 17 length 34<br>[eap] Continuing tunnel setup.<br>++[eap] returns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br>[peap] eaptls_verify returned 7 <br>[peap] Done initial handshake<br>[peap] eaptls_process returned 7 <br>[peap] EAPTLS_OK<br>[peap] Session established. Decoding tunneled att!
ributes.<br>[peap] Identity - deneme<br>[peap] Got tunneled request<br> EAP-Message = 0x0211000b0164656e656d65<br>server {<br> PEAP: Got tunneled identity of deneme<br> PEAP: Setting default EAP type for tunneled EAP session.<br> PEAP: Setting User-Name to deneme<br>Sending tunneled request<br> EAP-Message = 0x0211000b0164656e656d65<br> FreeRADIUS-Proxied-To = 127.0.0.1<br> User-Name = "deneme"<br>server inner-tunnel {<br>No authenticate method (Auth-Type) configuration found for the request: Rejecting the user<br>Failed to authenticate the user.<br>} # server inner-tunnel<br>[peap] Got tunneled reply code 3<br>[peap] Got tunneled reply RADIUS code 3<br>[peap] Tunneled authentication was rejected.<br>[peap] FAILURE<br>++[eap] returns handled<br>Sending Access-Challenge of id 233 to 10.1.1.252 port 1206<br> EAP-Message = 0x011200261900170301001be3df65e7ef7891a373!
fd7d2794b88bd42ad9d6e7f59c7b1a517a52<br> Message-Aut
henticator = 0x00000000000000000000000000000000<br> State = 0xeccff048ebdde9d4d10018a42bd2d5e3<br>Finished request 16.<br>Going to the next request<br>Waking up in 1.0 seconds.<br>Cleaning up request 14 ID 231 with timestamp +46<br>Waking up in 1.9 seconds.<br>rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=234, length=187<br> User-Name = "deneme"<br> NAS-IP-Address = 10.1.1.252<br> NAS-Port = 0<br> Called-Station-Id = "00-30-4F-44-3D-C1"<br> Calling-Station-Id = "00-18-DE-88-62-77"<br> NAS-Identifier = "WirelessAccessPoint"<br> Framed-MTU = 1380<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x021200261900170301001b93c4b2b3423ed61a39a34d66343fdf250f095be821d8f8286720c3<br> State = 0xeccff048ebdde9d4d10018a42bd2d5e3<br> Message-Authentic!
ator = 0x899e7167d55a08b8fe446be283c442b3<br>+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "deneme", looking up realm NULL<br>[suffix] No such realm "NULL"<br>++[suffix] returns noop<br>[eap] EAP packet type response id 18 length 38<br>[eap] Continuing tunnel setup.<br>++[eap] returns ok<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>[eap] EAP/peap<br>[eap] processing type peap<br>[peap] processing EAP-TLS<br>[peap] eaptls_verify returned 7 <br>[peap] Done initial handshake<br>[peap] eaptls_process returned 7 <br>[peap] EAPTLS_OK<br>[peap] Session established. Decoding tunneled attributes.<br>[peap] Received EAP-TLV response.<br>[peap] Had sent TLV failure. User was rejected earlier in this session.<br>[eap] Handler failed in EAP/peap<br>[eap] Failed in EAP select<br>++[eap] returns inval!
id<br>Failed to authenticate the user.<br>Using Post-Auth-Type Reject<
br>+- entering group REJECT {...}<br>[attr_filter.access_reject] expand: %{User-Name} -> deneme<br> attr_filter: Matched entry DEFAULT at line 11<br>++[attr_filter.access_reject] returns updated<br>Delaying reject of request 17 for 1 seconds<br>Going to the next request<br>Waking up in 0.9 seconds.<br>Sending delayed reject for request 17<br>Sending Access-Reject of id 234 to 10.1.1.252 port 1206<br> EAP-Message = 0x04120004<br> Message-Authenticator = 0x00000000000000000000000000000000<br>Cleaning up request 15 ID 232 with timestamp +48<br>Waking up in 2.0 seconds.<br>Cleaning up request 16 ID 233 with timestamp +50<br>Waking up in 2.9 seconds.<br>rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=235, length=142<br> User-Name = "deneme"<br> NAS-IP-Address = 10.1.1.252<br> NAS-Port = 0<br> Called-Station-Id = "00-30-4F-44-3D-!
C1"<br> Calling-Station-Id = "00-18-DE-88-62-77"<br> NAS-Identifier = "WirelessAccessPoint"<br> Framed-MTU = 1380<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x0213000b0164656e656d65<br> Message-Authenticator = 0xa423f6547bd5227868a4c6c352b61371<br>+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "deneme", looking up realm NULL<br>[suffix] No such realm "NULL"<br>++[suffix] returns noop<br>[eap] EAP packet type response id 19 length 11<br>[eap] No EAP Start, assuming it's an on-going EAP conversation<br>++[eap] returns updated<br>++[unix] returns notfound<br>[files] users: Matched entry deneme at line 1<br>[files] expand: MERHABA DOSTUM , %{User-Name} -> MERHABA DOSTUM , deneme<br>++[files] returns ok<br>++[expiration] returns noop<br>++[!
logintime] returns noop<br>[pap] Found existing Auth-Type, not changin
g it.<br>++[pap] returns noop<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] EAP Identity<br>[eap] processing type md5<br>rlm_eap_md5: Issuing Challenge<br>++[eap] returns handled<br>Sending Access-Challenge of id 235 to 10.1.1.252 port 1206<br> Reply-Message = "MERHABA DOSTUM , deneme"<br> EAP-Message = 0x011400160410af2b28a6d3df0c45072b82f0a142941b<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0xf4615f8cf4755bc39cf766e7435b4d60<br>Finished request 18.<br>Going to the next request<br>Waking up in 1.0 seconds.<br>rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=236, length=155<br> User-Name = "deneme"<br> NAS-IP-Address = 10.1.1.252<br> NAS-Port = 0<br> Called-Station-Id = "00-30-4F-44-3D-C1"<br> Calling-Station-Id = "00-18-DE-88-62-77"<br>&nb!
sp; NAS-Identifier = "WirelessAccessPoint"<br> Framed-MTU = 1380<br> NAS-Port-Type = Wireless-802.11<br> EAP-Message = 0x021400060319<br> State = 0xf4615f8cf4755bc39cf766e7435b4d60<br> Message-Authenticator = 0x0376988d55b546c2ce24d98616953f3d<br>+- entering group authorize {...}<br>++[preprocess] returns ok<br>++[chap] returns noop<br>++[mschap] returns noop<br>[suffix] No '@' in User-Name = "deneme", looking up realm NULL<br>[suffix] No such realm "NULL"<br>++[suffix] returns noop<br>[eap] EAP packet type response id 20 length 6<br>[eap] No EAP Start, assuming it's an on-going EAP conversation<br>++[eap] returns updated<br>++[unix] returns notfound<br>[files] users: Matched entry deneme at line 1<br>[files] expand: MERHABA DOSTUM , %{User-Name} -> MERHABA DOSTUM , deneme<br>++[files] returns ok<br>++[expiration] returns noop<br>++[logintime] returns !
noop<br>[pap] Found existing Auth-Type, not changing it.<br>++[pap] re
turns noop<br>Found Auth-Type = EAP<br>+- entering group authenticate {...}<br>[eap] Request found, released from the list<br>[eap] EAP NAK<br>[eap] EAP-NAK asked for EAP-Type/peap<br>[eap] processing type tls<br>[tls] Initiate<br>[tls] Start returned 1<br>++[eap] returns handled<br>Sending Access-Challenge of id 236 to 10.1.1.252 port 1206<br> Reply-Message = "MERHABA DOSTUM , deneme"<br> EAP-Message = 0x011500061920<br> Message-Authenticator = 0x00000000000000000000000000000000<br> State = 0xf4615f8cf57446c39cf766e7435b4d60<br>Finished request 19.<br>Going to the next request<br> <br /><hr />Yeni Windows 7: Size en uygun bilgisayarı bulun. <a href='http://windows.microsoft.com/shop' target='_new'>Daha fazla bilgi edinin.</a></body>
</html>