hi, all!<br><br>Now I want to record the user access history in the radius.log file. I use fr 2.19 and ttls-mschapv2.<br><br> I notice that it now only records the user/password log in the radius.log file. <br><br>for example,<br><br>when I use a correct password for user "test", <br>Tue Jul 13 12:03:49 2010 : Auth: Login OK: [test/<via Auth-Type = EAP>] (from client localhost port 0 via TLS tunnel)<br>Tue Jul 13 12:03:49 2010 : Auth: Login OK: [anonymous_identity/<via Auth-Type = EAP>] (from client localhost port 0 cli 02-00-00-00-00-01)<br><br><br>
when I use a wrong password for user "test", <br>Tue Jul 13 12:04:09 2010 : Auth: Login incorrect: [test/<via Auth-Type = EAP>] (from client localhost port 0 via TLS tunnel)<br>Tue Jul 13 12:04:09 2010 : Auth: Login incorrect: [anonymous_identity/<via Auth-Type = EAP>] (from client localhost port 0 cli 02-00-00-00-00-01)<br><br>But no log is recorded if the certificates is wrong (which is possible in real scenarios). <br><br>I have noticed that if the certificates is wrong, the "radiusd -Xxxxx" will output things like that:<br><br>Fri Jul 16 17:23:30 2010 : Info: [eap] EAP NAK<br>Fri Jul 16 17:23:30 2010 : Info: [eap] EAP-NAK asked for EAP-Type/ttls<br>Fri Jul 16 17:23:30 2010 : Info: [eap] processing type askedtls<br><br>If this notifys the wrong certificate? Then maybe I can put a "radlog" in the following part of eap.c?:<br><br> case PW_EAP_NAK:<br> /*<br> * The NAK data is the preferred EAP type(s) of<br> * the client.<br> *<br> * RFC 3748 says to list one or more proposed<br> * alternative types, one per octet, or to use<br> * 0 for no alternative.<br> */<br> RDEBUG2("EAP NAK");<br><br><br><br>thanks a lot!<br><br><br><span title="neteasefooter"/><hr/>
<a href="http://mail.163.com/?from=fe1" target="_blank">网易邮箱,没有垃圾邮件的邮箱。</a>
</span>