Script started on Fri 08 Nov 2013 10:27:51 AM CET root@ferda:~# exitfreeradius -X freeradius: FreeRADIUS Version 3.0.0, for host x86_64-pc-linux-gnu, built on Nov 1 2013 at 21:39:01 Copyright (C) 1999-2013 The FreeRADIUS server project and contributors. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License. For more information about these matters, see the file named COPYRIGHT. Starting - reading configuration files ... including dictionary file /etc/freeradius/dictionary including configuration file /etc/freeradius/radiusd.conf including configuration file /etc/freeradius/proxy.conf including configuration file /etc/freeradius/clients.conf including files in directory /etc/freeradius/mods-enabled/ including configuration file /etc/freeradius/mods-enabled/sradutmp including configuration file /etc/freeradius/mods-enabled/passwd including configuration file /etc/freeradius/mods-enabled/logintime including configuration file /etc/freeradius/mods-enabled/digest including configuration file /etc/freeradius/mods-enabled/pap including configuration file /etc/freeradius/mods-enabled/dhcp including configuration file /etc/freeradius/mods-enabled/preprocess including configuration file /etc/freeradius/mods-enabled/linelog including configuration file /etc/freeradius/mods-enabled/utf8 including configuration file /etc/freeradius/mods-enabled/replicate including configuration file /etc/freeradius/mods-enabled/attr_filter including configuration file /etc/freeradius/mods-enabled/unix including configuration file /etc/freeradius/mods-enabled/files including configuration file /etc/freeradius/mods-enabled/exec including configuration file /etc/freeradius/mods-enabled/expr including configuration file /etc/freeradius/mods-enabled/detail.log including configuration file /etc/freeradius/mods-enabled/mschap including configuration file /etc/freeradius/mods-enabled/expiration including configuration file /etc/freeradius/mods-enabled/chap including configuration file /etc/freeradius/mods-enabled/realm including configuration file /etc/freeradius/mods-enabled/detail including configuration file /etc/freeradius/mods-enabled/radutmp including configuration file /etc/freeradius/mods-enabled/soh including configuration file /etc/freeradius/mods-enabled/cache_eap including configuration file /etc/freeradius/mods-enabled/dynamic_clients including configuration file /etc/freeradius/mods-enabled/always including configuration file /etc/freeradius/mods-enabled/echo including configuration file /etc/freeradius/mods-enabled/eap including configuration file /etc/freeradius/mods-enabled/ntlm_auth including files in directory /etc/freeradius/policy.d/ including configuration file /etc/freeradius/policy.d/control including configuration file /etc/freeradius/policy.d/dhcp including configuration file /etc/freeradius/policy.d/operator-name including configuration file /etc/freeradius/policy.d/canonicalization including configuration file /etc/freeradius/policy.d/filter including configuration file /etc/freeradius/policy.d/accounting including configuration file /etc/freeradius/policy.d/cui including configuration file /etc/freeradius/policy.d/eap including files in directory /etc/freeradius/sites-enabled/ including configuration file /etc/freeradius/sites-enabled/inner-tunnel including configuration file /etc/freeradius/sites-enabled/default main { security { user = "freerad" group = "freerad" allow_core_dumps = no } } main { name = "freeradius" prefix = "/usr" localstatedir = "/var" sbindir = "/usr/sbin" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" libdir = "/usr/lib/freeradius" radacctdir = "/var/log/freeradius/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 1024 pidfile = "/var/run/freeradius/freeradius.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = no auth_badpass = no auth_goodpass = no colourise = yes } security { max_attributes = 200 reject_delay = 1 status_server = yes } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = "testing123" response_window = 20 max_outstanding = 65536 zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 revive_interval = 120 status_check_timeout = 4 coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } } realm LOCAL { } realm NULL { } realm ujep.cz { } home_server_pool my_auth_failover { type = fail-over home_server = localhost } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = "testing123" nas_type = "other" proto = "*" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.136.62 { require_message_authenticator = no secret = "trouba61" shortname = "test" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } radiusd: #### Instantiating modules #### instantiate { } modules { # Loaded module rlm_radutmp # Instantiating module "sradutmp" from file /etc/freeradius/mods-enabled/sradutmp radutmp sradutmp { filename = "/var/log/freeradius/sradutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 420 caller_id = no } # Loaded module rlm_passwd # Instantiating module "etc_passwd" from file /etc/freeradius/mods-enabled/passwd passwd etc_passwd { filename = "/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":" ignore_nislike = no ignore_empty = yes allow_multiple_keys = no hash_size = 100 } rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no # Loaded module rlm_logintime # Instantiating module "logintime" from file /etc/freeradius/mods-enabled/logintime logintime { minimum_timeout = 60 } # Loaded module rlm_digest # Instantiating module "digest" from file /etc/freeradius/mods-enabled/digest # Loaded module rlm_pap # Instantiating module "pap" from file /etc/freeradius/mods-enabled/pap pap { auto_header = no normalise = yes } # Loaded module rlm_dhcp # Instantiating module "dhcp" from file /etc/freeradius/mods-enabled/dhcp # Loaded module rlm_preprocess # Instantiating module "preprocess" from file /etc/freeradius/mods-enabled/preprocess preprocess { huntgroups = "/etc/freeradius/mods-config/preprocess/huntgroups" hints = "/etc/freeradius/mods-config/preprocess/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } reading pairlist file /etc/freeradius/mods-config/preprocess/huntgroups reading pairlist file /etc/freeradius/mods-config/preprocess/hints # Loaded module rlm_linelog # Instantiating module "linelog" from file /etc/freeradius/mods-enabled/linelog linelog { filename = "/var/log/freeradius/linelog" permissions = 384 format = "This is a log message for %{User-Name}" reference = "%{%{Packet-Type}:-format}" } # Loaded module rlm_utf8 # Instantiating module "utf8" from file /etc/freeradius/mods-enabled/utf8 # Loaded module rlm_replicate # Instantiating module "replicate" from file /etc/freeradius/mods-enabled/replicate # Loaded module rlm_attr_filter # Instantiating module "attr_filter.post-proxy" from file /etc/freeradius/mods-enabled/attr_filter attr_filter attr_filter.post-proxy { filename = "/etc/freeradius/mods-config/attr_filter/post-proxy" key = "%{Realm}" relaxed = no } reading pairlist file /etc/freeradius/mods-config/attr_filter/post-proxy # Instantiating module "attr_filter.pre-proxy" from file /etc/freeradius/mods-enabled/attr_filter attr_filter attr_filter.pre-proxy { filename = "/etc/freeradius/mods-config/attr_filter/pre-proxy" key = "%{Realm}" relaxed = no } reading pairlist file /etc/freeradius/mods-config/attr_filter/pre-proxy # Instantiating module "attr_filter.access_reject" from file /etc/freeradius/mods-enabled/attr_filter attr_filter attr_filter.access_reject { filename = "/etc/freeradius/mods-config/attr_filter/access_reject" key = "%{User-Name}" relaxed = no } reading pairlist file /etc/freeradius/mods-config/attr_filter/access_reject # Instantiating module "attr_filter.access_challenge" from file /etc/freeradius/mods-enabled/attr_filter attr_filter attr_filter.access_challenge { filename = "/etc/freeradius/mods-config/attr_filter/access_challenge" key = "%{User-Name}" relaxed = no } reading pairlist file /etc/freeradius/mods-config/attr_filter/access_challenge # Instantiating module "attr_filter.accounting_response" from file /etc/freeradius/mods-enabled/attr_filter attr_filter attr_filter.accounting_response { filename = "/etc/freeradius/mods-config/attr_filter/accounting_response" key = "%{User-Name}" relaxed = no } reading pairlist file /etc/freeradius/mods-config/attr_filter/accounting_response # Loaded module rlm_unix # Instantiating module "unix" from file /etc/freeradius/mods-enabled/unix unix { radwtmp = "/var/log/freeradius/radwtmp" } # Loaded module rlm_files # Instantiating module "files" from file /etc/freeradius/mods-enabled/files files { filename = "/etc/freeradius/mods-config/files/authorize" usersfile = "/etc/freeradius/mods-config/files/authorize" acctusersfile = "/etc/freeradius/mods-config/files/accounting" preproxy_usersfile = "/etc/freeradius/mods-config/files/pre-proxy" compat = "no" } reading pairlist file /etc/freeradius/mods-config/files/authorize reading pairlist file /etc/freeradius/mods-config/files/authorize reading pairlist file /etc/freeradius/mods-config/files/accounting reading pairlist file /etc/freeradius/mods-config/files/pre-proxy # Loaded module rlm_exec # Instantiating module "exec" from file /etc/freeradius/mods-enabled/exec exec { wait = no input_pairs = "request" shell_escape = yes } # Loaded module rlm_expr # Instantiating module "expr" from file /etc/freeradius/mods-enabled/expr expr { safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /" } # Loaded module rlm_detail # Instantiating module "auth_log" from file /etc/freeradius/mods-enabled/detail.log detail auth_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d" header = "%t" permissions = 384 dir_permissions = 493 locking = no log_packet_header = no } # Instantiating module "reply_log" from file /etc/freeradius/mods-enabled/detail.log detail reply_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d" header = "%t" permissions = 384 dir_permissions = 493 locking = no log_packet_header = no } # Instantiating module "pre_proxy_log" from file /etc/freeradius/mods-enabled/detail.log detail pre_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d" header = "%t" permissions = 384 dir_permissions = 493 locking = no log_packet_header = no } # Instantiating module "post_proxy_log" from file /etc/freeradius/mods-enabled/detail.log detail post_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d" header = "%t" permissions = 384 dir_permissions = 493 locking = no log_packet_header = no } # Loaded module rlm_mschap # Instantiating module "mschap" from file /etc/freeradius/mods-enabled/mschap mschap { use_mppe = yes require_encryption = no require_strong = no with_ntdomain_hack = yes passchange { } allow_retry = yes } # Loaded module rlm_expiration # Instantiating module "expiration" from file /etc/freeradius/mods-enabled/expiration # Loaded module rlm_chap # Instantiating module "chap" from file /etc/freeradius/mods-enabled/chap # Loaded module rlm_realm # Instantiating module "IPASS" from file /etc/freeradius/mods-enabled/realm realm IPASS { format = "prefix" delimiter = "/" ignore_default = no ignore_null = no } # Instantiating module "suffix" from file /etc/freeradius/mods-enabled/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } # Instantiating module "realmpercent" from file /etc/freeradius/mods-enabled/realm realm realmpercent { format = "suffix" delimiter = "%" ignore_default = no ignore_null = no } # Instantiating module "ntdomain" from file /etc/freeradius/mods-enabled/realm realm ntdomain { format = "prefix" delimiter = "\" ignore_default = no ignore_null = no } # Instantiating module "detail" from file /etc/freeradius/mods-enabled/detail detail { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" permissions = 384 dir_permissions = 493 locking = no log_packet_header = no } # Instantiating module "radutmp" from file /etc/freeradius/mods-enabled/radutmp radutmp { filename = "/var/log/freeradius/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 384 caller_id = yes } # Loaded module rlm_soh # Instantiating module "soh" from file /etc/freeradius/mods-enabled/soh soh { dhcp = yes } # Loaded module rlm_cache # Instantiating module "cache_eap" from file /etc/freeradius/mods-enabled/cache_eap cache cache_eap { key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}" ttl = 15 max_entries = 16384 epoch = 0 add_stats = no } # Loaded module rlm_dynamic_clients # Instantiating module "dynamic_clients" from file /etc/freeradius/mods-enabled/dynamic_clients # Loaded module rlm_always # Instantiating module "fail" from file /etc/freeradius/mods-enabled/always always fail { rcode = "fail" simulcount = 0 mpp = no } # Instantiating module "reject" from file /etc/freeradius/mods-enabled/always always reject { rcode = "reject" simulcount = 0 mpp = no } # Instantiating module "noop" from file /etc/freeradius/mods-enabled/always always noop { rcode = "noop" simulcount = 0 mpp = no } # Instantiating module "handled" from file /etc/freeradius/mods-enabled/always always handled { rcode = "handled" simulcount = 0 mpp = no } # Instantiating module "updated" from file /etc/freeradius/mods-enabled/always always updated { rcode = "updated" simulcount = 0 mpp = no } # Instantiating module "notfound" from file /etc/freeradius/mods-enabled/always always notfound { rcode = "notfound" simulcount = 0 mpp = no } # Instantiating module "ok" from file /etc/freeradius/mods-enabled/always always ok { rcode = "ok" simulcount = 0 mpp = no } # Instantiating module "echo" from file /etc/freeradius/mods-enabled/echo exec echo { wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request" output_pairs = "reply" shell_escape = yes } # Loaded module rlm_eap # Instantiating module "eap" from file /etc/freeradius/mods-enabled/eap eap { default_eap_type = "peap" timer_expire = 60 ignore_unknown_eap_types = no mod_accounting_username_bug = no max_sessions = 4096 } # Linked to sub-module rlm_eap_md5 # Linked to sub-module rlm_eap_leap # Linked to sub-module rlm_eap_gtc gtc { challenge = "Password: " auth_type = "PAP" } # Linked to sub-module rlm_eap_tls tls { tls = "tls-common" } tls-config tls-common { rsa_key_exchange = no dh_key_exchange = yes rsa_key_length = 512 dh_key_length = 512 verify_depth = 0 ca_path = "/etc/freeradius/certs" pem_file_type = yes private_key_file = "/etc/freeradius/certs/server.pem" certificate_file = "/etc/freeradius/certs/server.pem" ca_file = "/etc/freeradius/certs/ca.pem" private_key_password = "whatever" dh_file = "/etc/freeradius/certs/dh" fragment_size = 1024 include_length = yes check_crl = no cipher_list = "DEFAULT" ecdh_curve = "prime256v1" cache { enable = yes lifetime = 24 max_entries = 255 } verify { } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = yes } } # Linked to sub-module rlm_eap_ttls ttls { tls = "tls-common" default_eap_type = "md5" copy_request_to_tunnel = no use_tunneled_reply = no virtual_server = "inner-tunnel" include_length = yes require_client_cert = no } Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_peap peap { tls = "tls-common" default_method = "mschapv2" copy_request_to_tunnel = no use_tunneled_reply = no proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel" soh = no require_client_cert = no } Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } # Instantiating module "ntlm_auth" from file /etc/freeradius/mods-enabled/ntlm_auth exec ntlm_auth { wait = yes program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}" shell_escape = yes } } # modules radiusd: #### Loading Virtual Servers #### server { # from file /etc/freeradius/radiusd.conf } # server server inner-tunnel { # from file /etc/freeradius/sites-enabled/inner-tunnel # Loading authenticate {...} # Loading authorize {...} WARNING: Ignoring "sql" (see raddb/mods-available/README.rst) WARNING: Ignoring "ldap" (see raddb/mods-available/README.rst) # Loading session {...} # Loading post-proxy {...} # Loading post-auth {...} WARNING: Ignoring "sql" (see raddb/mods-available/README.rst) } # server server default { # from file /etc/freeradius/sites-enabled/default # Creating Auth-Type = digest # Loading authenticate {...} # Loading authorize {...} # Loading virtual module filter_username WARNING: Ignoring "sql" (see raddb/mods-available/README.rst) WARNING: Ignoring "ldap" (see raddb/mods-available/README.rst) # Loading preacct {...} # Loading virtual module acct_unique # Loading accounting {...} WARNING: Ignoring "sql" (see raddb/mods-available/README.rst) # Loading post-proxy {...} # Loading post-auth {...} WARNING: Ignoring "sql" (see raddb/mods-available/README.rst) # Loading virtual module remove_reply_message_if_eap # Loading virtual module remove_reply_message_if_eap } # server radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" ipaddr = 127.0.0.1 port = 18120 } listen { type = "auth" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Listening on auth address 127.0.0.1 port 18120 as server inner-tunnel Listening on auth address * port 1812 as server default Listening on acct address * port 1813 as server default Opening new proxy address * port 1814 Listening on proxy address * port 1814 Ready to process requests. rad_recv: Access-Request packet from host 195.113.136.62 port 50597, id=69, length=108 User-Name = 'ferda' NAS-IP-Address = 127.0.0.1 Calling-Station-Id = '70-6F-6C-69-73-68' Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = 'rad_eap_test' EAP-Message = 0x0200000a016665726461 Message-Authenticator = 0xacc36253e6ea123b45bc0065e6f5306c (0) # Executing section authorize from file /etc/freeradius/sites-enabled/default (0) authorize { (0) filter_username filter_username { (0) ? if (User-Name != "%{tolower:%{User-Name}}") (0) expand: "%{tolower:%{User-Name}}" -> 'ferda' (0) ? if (User-Name != "%{tolower:%{User-Name}}") -> FALSE (0) ? if (User-Name =~ / /) (0) ? if (User-Name =~ / /) -> FALSE (0) ? if (User-Name =~ /@.*@/ ) (0) ? if (User-Name =~ /@.*@/ ) -> FALSE (0) ? if (User-Name =~ /\\.\\./ ) (0) ? if (User-Name =~ /\\.\\./ ) -> FALSE (0) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (0) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (0) ? if (User-Name =~ /\\.$/) (0) ? if (User-Name =~ /\\.$/) -> FALSE (0) ? if (User-Name =~ /@\\./) (0) ? if (User-Name =~ /@\\./) -> FALSE (0) } # filter_username filter_username = notfound (0) [preprocess] = ok (0) [chap] = noop (0) [mschap] = noop (0) [digest] = noop (0) suffix : No '@' in User-Name = "ferda", looking up realm NULL (0) suffix : Found realm "NULL" (0) suffix : Adding Stripped-User-Name = "ferda" (0) suffix : Adding Realm = "NULL" (0) suffix : Authentication realm is LOCAL. (0) [suffix] = ok (0) eap : EAP packet type response id 0 length 10 (0) eap : EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (0) [eap] = ok (0) } # authorize = ok (0) Found Auth-Type = EAP (0) # Executing group from file /etc/freeradius/sites-enabled/default (0) authenticate { (0) eap : Peer sent Identity (1) (0) eap : Calling eap_peap to process EAP data (0) eap_peap : Flushing SSL sessions (of #0) (0) eap_peap : Initiate (0) eap_peap : Start returned 1 (0) eap : New EAP session, adding 'State' attribute to reply 0x1906938319078a47 (0) [eap] = handled (0) } # authenticate = handled Sending Access-Challenge of id 69 from 195.113.137.174 port 1812 to 195.113.136.62 port 50597 EAP-Message = 0x010100061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x1906938319078a47f766355159f8bf93 (0) Finished request 0. Waking up in 0.3 seconds. rad_recv: Access-Request packet from host 195.113.136.62 port 50597, id=70, length=209 User-Name = 'ferda' NAS-IP-Address = 127.0.0.1 Calling-Station-Id = '70-6F-6C-69-73-68' Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = 'rad_eap_test' EAP-Message = 0x0201005d190016030100520100004e0301527caeb3204c07c975a773e6a19effb5becb30773d287e5ee7536b09f13fb7e900002600390038003500160013000a00330032002f0005000400150012000900140011000800060003020100 State = 0x1906938319078a47f766355159f8bf93 Message-Authenticator = 0x097c23f57003236d23c63fb83d38654c (1) # Executing section authorize from file /etc/freeradius/sites-enabled/default (1) authorize { (1) filter_username filter_username { (1) ? if (User-Name != "%{tolower:%{User-Name}}") (1) expand: "%{tolower:%{User-Name}}" -> 'ferda' (1) ? if (User-Name != "%{tolower:%{User-Name}}") -> FALSE (1) ? if (User-Name =~ / /) (1) ? if (User-Name =~ / /) -> FALSE (1) ? if (User-Name =~ /@.*@/ ) (1) ? if (User-Name =~ /@.*@/ ) -> FALSE (1) ? if (User-Name =~ /\\.\\./ ) (1) ? if (User-Name =~ /\\.\\./ ) -> FALSE (1) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (1) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (1) ? if (User-Name =~ /\\.$/) (1) ? if (User-Name =~ /\\.$/) -> FALSE (1) ? if (User-Name =~ /@\\./) (1) ? if (User-Name =~ /@\\./) -> FALSE (1) } # filter_username filter_username = notfound (1) [preprocess] = ok (1) [chap] = noop (1) [mschap] = noop (1) [digest] = noop (1) suffix : No '@' in User-Name = "ferda", looking up realm NULL (1) suffix : Found realm "NULL" (1) suffix : Adding Stripped-User-Name = "ferda" (1) suffix : Adding Realm = "NULL" (1) suffix : Authentication realm is LOCAL. (1) [suffix] = ok (1) eap : EAP packet type response id 1 length 93 (1) eap : Continuing tunnel setup. (1) [eap] = ok (1) } # authorize = ok (1) Found Auth-Type = EAP (1) # Executing group from file /etc/freeradius/sites-enabled/default (1) authenticate { (1) eap : Expiring EAP session with state 0x1906938319078a47 (1) eap : Finished EAP session with state 0x1906938319078a47 (1) eap : Previous EAP request found for state 0x1906938319078a47, released from the list (1) eap : Peer sent PEAP (25) (1) eap : EAP PEAP (25) (1) eap : Calling eap_peap to process EAP data (1) eap_peap : processing EAP-TLS (1) eap_peap : eaptls_verify returned 7 (1) eap_peap : Done initial handshake (1) eap_peap : (other): before/accept initialization (1) eap_peap : TLS_accept: before/accept initialization (1) eap_peap : <<< TLS 1.0 Handshake [length 0052], ClientHello (1) eap_peap : TLS_accept: SSLv3 read client hello A (1) eap_peap : >>> TLS 1.0 Handshake [length 004a], ServerHello (1) eap_peap : TLS_accept: SSLv3 write server hello A (1) eap_peap : >>> TLS 1.0 Handshake [length 08d0], Certificate (1) eap_peap : TLS_accept: SSLv3 write certificate A (1) eap_peap : >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange (1) eap_peap : TLS_accept: SSLv3 write key exchange A (1) eap_peap : >>> TLS 1.0 Handshake [length 0004], ServerHelloDone (1) eap_peap : TLS_accept: SSLv3 write server done A (1) eap_peap : TLS_accept: SSLv3 flush data (1) eap_peap : TLS_accept: Need to read more data: SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode (1) eap_peap : eaptls_process returned 13 (1) eap_peap : FR_TLS_HANDLED (1) eap : New EAP session, adding 'State' attribute to reply 0x1906938318048a47 (1) [eap] = handled (1) } # authenticate = handled Sending Access-Challenge of id 70 from 195.113.137.174 port 1812 to 195.113.136.62 port 50597 EAP-Message = Message-Authenticator = 0x00000000000000000000000000000000 State = 0x1906938318048a47f766355159f8bf93 (1) Finished request 1. Waking up in 0.3 seconds. rad_recv: Access-Request packet from host 195.113.136.62 port 50597, id=71, length=122 User-Name = 'ferda' NAS-IP-Address = 127.0.0.1 Calling-Station-Id = '70-6F-6C-69-73-68' Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = 'rad_eap_test' EAP-Message = 0x020200061900 State = 0x1906938318048a47f766355159f8bf93 Message-Authenticator = 0x7de39296c6a4dba85452a4e47c1e6afe (2) # Executing section authorize from file /etc/freeradius/sites-enabled/default (2) authorize { (2) filter_username filter_username { (2) ? if (User-Name != "%{tolower:%{User-Name}}") (2) expand: "%{tolower:%{User-Name}}" -> 'ferda' (2) ? if (User-Name != "%{tolower:%{User-Name}}") -> FALSE (2) ? if (User-Name =~ / /) (2) ? if (User-Name =~ / /) -> FALSE (2) ? if (User-Name =~ /@.*@/ ) (2) ? if (User-Name =~ /@.*@/ ) -> FALSE (2) ? if (User-Name =~ /\\.\\./ ) (2) ? if (User-Name =~ /\\.\\./ ) -> FALSE (2) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (2) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (2) ? if (User-Name =~ /\\.$/) (2) ? if (User-Name =~ /\\.$/) -> FALSE (2) ? if (User-Name =~ /@\\./) (2) ? if (User-Name =~ /@\\./) -> FALSE (2) } # filter_username filter_username = notfound (2) [preprocess] = ok (2) [chap] = noop (2) [mschap] = noop (2) [digest] = noop (2) suffix : No '@' in User-Name = "ferda", looking up realm NULL (2) suffix : Found realm "NULL" (2) suffix : Adding Stripped-User-Name = "ferda" (2) suffix : Adding Realm = "NULL" (2) suffix : Authentication realm is LOCAL. (2) [suffix] = ok (2) eap : EAP packet type response id 2 length 6 (2) eap : Continuing tunnel setup. (2) [eap] = ok (2) } # authorize = ok (2) Found Auth-Type = EAP (2) # Executing group from file /etc/freeradius/sites-enabled/default (2) authenticate { (2) eap : Expiring EAP session with state 0x1906938318048a47 (2) eap : Finished EAP session with state 0x1906938318048a47 (2) eap : Previous EAP request found for state 0x1906938318048a47, released from the list (2) eap : Peer sent PEAP (25) (2) eap : EAP PEAP (25) (2) eap : Calling eap_peap to process EAP data (2) eap_peap : processing EAP-TLS (2) eap_peap : Received TLS ACK (2) eap_peap : Received TLS ACK (2) eap_peap : ACK handshake fragment handler (2) eap_peap : eaptls_verify returned 1 (2) eap_peap : eaptls_process returned 13 (2) eap_peap : FR_TLS_HANDLED (2) eap : New EAP session, adding 'State' attribute to reply 0x190693831b058a47 (2) [eap] = handled (2) } # authenticate = handled Sending Access-Challenge of id 71 from 195.113.137.174 port 1812 to 195.113.136.62 port 50597 EAP-Message = Message-Authenticator = 0x00000000000000000000000000000000 State = 0x190693831b058a47f766355159f8bf93 (2) Finished request 2. Waking up in 0.3 seconds. rad_recv: Access-Request packet from host 195.113.136.62 port 50597, id=72, length=122 User-Name = 'ferda' NAS-IP-Address = 127.0.0.1 Calling-Station-Id = '70-6F-6C-69-73-68' Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = 'rad_eap_test' EAP-Message = 0x020300061900 State = 0x190693831b058a47f766355159f8bf93 Message-Authenticator = 0x2a6df78426ada5fd05020b0f06c0930f (3) # Executing section authorize from file /etc/freeradius/sites-enabled/default (3) authorize { (3) filter_username filter_username { (3) ? if (User-Name != "%{tolower:%{User-Name}}") (3) expand: "%{tolower:%{User-Name}}" -> 'ferda' (3) ? if (User-Name != "%{tolower:%{User-Name}}") -> FALSE (3) ? if (User-Name =~ / /) (3) ? if (User-Name =~ / /) -> FALSE (3) ? if (User-Name =~ /@.*@/ ) (3) ? if (User-Name =~ /@.*@/ ) -> FALSE (3) ? if (User-Name =~ /\\.\\./ ) (3) ? if (User-Name =~ /\\.\\./ ) -> FALSE (3) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (3) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (3) ? if (User-Name =~ /\\.$/) (3) ? if (User-Name =~ /\\.$/) -> FALSE (3) ? if (User-Name =~ /@\\./) (3) ? if (User-Name =~ /@\\./) -> FALSE (3) } # filter_username filter_username = notfound (3) [preprocess] = ok (3) [chap] = noop (3) [mschap] = noop (3) [digest] = noop (3) suffix : No '@' in User-Name = "ferda", looking up realm NULL (3) suffix : Found realm "NULL" (3) suffix : Adding Stripped-User-Name = "ferda" (3) suffix : Adding Realm = "NULL" (3) suffix : Authentication realm is LOCAL. (3) [suffix] = ok (3) eap : EAP packet type response id 3 length 6 (3) eap : Continuing tunnel setup. (3) [eap] = ok (3) } # authorize = ok (3) Found Auth-Type = EAP (3) # Executing group from file /etc/freeradius/sites-enabled/default (3) authenticate { (3) eap : Expiring EAP session with state 0x190693831b058a47 (3) eap : Finished EAP session with state 0x190693831b058a47 (3) eap : Previous EAP request found for state 0x190693831b058a47, released from the list (3) eap : Peer sent PEAP (25) (3) eap : EAP PEAP (25) (3) eap : Calling eap_peap to process EAP data (3) eap_peap : processing EAP-TLS (3) eap_peap : Received TLS ACK (3) eap_peap : Received TLS ACK (3) eap_peap : ACK handshake fragment handler (3) eap_peap : eaptls_verify returned 1 (3) eap_peap : eaptls_process returned 13 (3) eap_peap : FR_TLS_HANDLED (3) eap : New EAP session, adding 'State' attribute to reply 0x190693831a028a47 (3) [eap] = handled (3) } # authenticate = handled Sending Access-Challenge of id 72 from 195.113.137.174 port 1812 to 195.113.136.62 port 50597 EAP-Message = Message-Authenticator = 0x00000000000000000000000000000000 State = 0x190693831a028a47f766355159f8bf93 (3) Finished request 3. Waking up in 0.3 seconds. rad_recv: Access-Request packet from host 195.113.136.62 port 50597, id=73, length=320 User-Name = 'ferda' NAS-IP-Address = 127.0.0.1 Calling-Station-Id = '70-6F-6C-69-73-68' Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = 'rad_eap_test' EAP-Message = 0x020400cc1900160301008610000082008007ecc4fea054d6908d24897455686539db291cd10b0251d0367e0ba8d9b939a1a944415a1d347f495b9c71920c0756d31f267c538f00d3f7130dfc45229a73780869a7a156951a9dcd54622ed0595950c325a6956fc5217265129b70c6d89ce5a33071d3651844f1b8bfcf3fddd478181666db5b6f5aab7efe68484a31c3783e1403010001011603010030e91b2d78c4c1c8ef25438a727345733f256bfc8b97ad81bb929953e1282fba9ee0b93284a321326d77191c81191c416f State = 0x190693831a028a47f766355159f8bf93 Message-Authenticator = 0xeaa7b496224d0a0d389351e9d0094782 (4) # Executing section authorize from file /etc/freeradius/sites-enabled/default (4) authorize { (4) filter_username filter_username { (4) ? if (User-Name != "%{tolower:%{User-Name}}") (4) expand: "%{tolower:%{User-Name}}" -> 'ferda' (4) ? if (User-Name != "%{tolower:%{User-Name}}") -> FALSE (4) ? if (User-Name =~ / /) (4) ? if (User-Name =~ / /) -> FALSE (4) ? if (User-Name =~ /@.*@/ ) (4) ? if (User-Name =~ /@.*@/ ) -> FALSE (4) ? if (User-Name =~ /\\.\\./ ) (4) ? if (User-Name =~ /\\.\\./ ) -> FALSE (4) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (4) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (4) ? if (User-Name =~ /\\.$/) (4) ? if (User-Name =~ /\\.$/) -> FALSE (4) ? if (User-Name =~ /@\\./) (4) ? if (User-Name =~ /@\\./) -> FALSE (4) } # filter_username filter_username = notfound (4) [preprocess] = ok (4) [chap] = noop (4) [mschap] = noop (4) [digest] = noop (4) suffix : No '@' in User-Name = "ferda", looking up realm NULL (4) suffix : Found realm "NULL" (4) suffix : Adding Stripped-User-Name = "ferda" (4) suffix : Adding Realm = "NULL" (4) suffix : Authentication realm is LOCAL. (4) [suffix] = ok (4) eap : EAP packet type response id 4 length 204 (4) eap : Continuing tunnel setup. (4) [eap] = ok (4) } # authorize = ok (4) Found Auth-Type = EAP (4) # Executing group from file /etc/freeradius/sites-enabled/default (4) authenticate { (4) eap : Expiring EAP session with state 0x190693831a028a47 (4) eap : Finished EAP session with state 0x190693831a028a47 (4) eap : Previous EAP request found for state 0x190693831a028a47, released from the list (4) eap : Peer sent PEAP (25) (4) eap : EAP PEAP (25) (4) eap : Calling eap_peap to process EAP data (4) eap_peap : processing EAP-TLS (4) eap_peap : eaptls_verify returned 7 (4) eap_peap : Done initial handshake (4) eap_peap : <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange (4) eap_peap : TLS_accept: SSLv3 read client key exchange A (4) eap_peap : <<< TLS 1.0 ChangeCipherSpec [length 0001] (4) eap_peap : <<< TLS 1.0 Handshake [length 0010], Finished (4) eap_peap : TLS_accept: SSLv3 read finished A (4) eap_peap : >>> TLS 1.0 ChangeCipherSpec [length 0001] (4) eap_peap : TLS_accept: SSLv3 write change cipher spec A (4) eap_peap : >>> TLS 1.0 Handshake [length 0010], Finished (4) eap_peap : TLS_accept: SSLv3 write finished A (4) eap_peap : TLS_accept: SSLv3 flush data SSL: adding session f66fbbf7d3aaaf00a4c35c33805d8ee7625b7d5ba56bccca22c65ecdd1992637 to cache (4) eap_peap : (other): SSL negotiation finished successfully SSL Connection Established (4) eap_peap : eaptls_process returned 13 (4) eap_peap : FR_TLS_HANDLED (4) eap : New EAP session, adding 'State' attribute to reply 0x190693831d038a47 (4) [eap] = handled (4) } # authenticate = handled Sending Access-Challenge of id 73 from 195.113.137.174 port 1812 to 195.113.136.62 port 50597 EAP-Message = 0x010500411900140301000101160301003042b75561a00a5c2fc07a4786d3ba3f4228c3c9a67a1c7aa20473327dec6b57bc17032b9ff8e858dbb75a68d5dc57a508 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x190693831d038a47f766355159f8bf93 (4) Finished request 4. Waking up in 0.2 seconds. rad_recv: Access-Request packet from host 195.113.136.62 port 50597, id=74, length=122 User-Name = 'ferda' NAS-IP-Address = 127.0.0.1 Calling-Station-Id = '70-6F-6C-69-73-68' Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = 'rad_eap_test' EAP-Message = 0x020500061900 State = 0x190693831d038a47f766355159f8bf93 Message-Authenticator = 0x115da06618d17398d72abb67a2e472bf (5) # Executing section authorize from file /etc/freeradius/sites-enabled/default (5) authorize { (5) filter_username filter_username { (5) ? if (User-Name != "%{tolower:%{User-Name}}") (5) expand: "%{tolower:%{User-Name}}" -> 'ferda' (5) ? if (User-Name != "%{tolower:%{User-Name}}") -> FALSE (5) ? if (User-Name =~ / /) (5) ? if (User-Name =~ / /) -> FALSE (5) ? if (User-Name =~ /@.*@/ ) (5) ? if (User-Name =~ /@.*@/ ) -> FALSE (5) ? if (User-Name =~ /\\.\\./ ) (5) ? if (User-Name =~ /\\.\\./ ) -> FALSE (5) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (5) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (5) ? if (User-Name =~ /\\.$/) (5) ? if (User-Name =~ /\\.$/) -> FALSE (5) ? if (User-Name =~ /@\\./) (5) ? if (User-Name =~ /@\\./) -> FALSE (5) } # filter_username filter_username = notfound (5) [preprocess] = ok (5) [chap] = noop (5) [mschap] = noop (5) [digest] = noop (5) suffix : No '@' in User-Name = "ferda", looking up realm NULL (5) suffix : Found realm "NULL" (5) suffix : Adding Stripped-User-Name = "ferda" (5) suffix : Adding Realm = "NULL" (5) suffix : Authentication realm is LOCAL. (5) [suffix] = ok (5) eap : EAP packet type response id 5 length 6 (5) eap : Continuing tunnel setup. (5) [eap] = ok (5) } # authorize = ok (5) Found Auth-Type = EAP (5) # Executing group from file /etc/freeradius/sites-enabled/default (5) authenticate { (5) eap : Expiring EAP session with state 0x190693831d038a47 (5) eap : Finished EAP session with state 0x190693831d038a47 (5) eap : Previous EAP request found for state 0x190693831d038a47, released from the list (5) eap : Peer sent PEAP (25) (5) eap : EAP PEAP (25) (5) eap : Calling eap_peap to process EAP data (5) eap_peap : processing EAP-TLS (5) eap_peap : Received TLS ACK (5) eap_peap : Received TLS ACK (5) eap_peap : ACK handshake is finished (5) eap_peap : eaptls_verify returned 3 (5) eap_peap : eaptls_process returned 3 (5) eap_peap : FR_TLS_SUCCESS (5) eap_peap : Session established. Decoding tunneled attributes. (5) eap_peap : Peap state TUNNEL ESTABLISHED (5) eap : New EAP session, adding 'State' attribute to reply 0x190693831c008a47 (5) [eap] = handled (5) } # authenticate = handled Sending Access-Challenge of id 74 from 195.113.137.174 port 1812 to 195.113.136.62 port 50597 EAP-Message = 0x0106002b19001703010020da1fda9814fd5f3b421a6e9b662e94f4a6c9de1d8d18c8fe63d12111f30aa95b Message-Authenticator = 0x00000000000000000000000000000000 State = 0x190693831c008a47f766355159f8bf93 (5) Finished request 5. Waking up in 0.2 seconds. rad_recv: Access-Request packet from host 195.113.136.62 port 50597, id=75, length=212 User-Name = 'ferda' NAS-IP-Address = 127.0.0.1 Calling-Station-Id = '70-6F-6C-69-73-68' Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = 'rad_eap_test' EAP-Message = 0x02060060190017030100205e9ce679362ec415663fe0bea8b8616cc24f10c6d519bad173d9fed6e5b58ce21703010030c57c1bca68a3f1a072b7189f7d38326479ed52cca9a8674387337aed0b3cb47d55b0df97a4e1a44b1ca72c7267a38eee State = 0x190693831c008a47f766355159f8bf93 Message-Authenticator = 0x669db9f51969b6a46bafdf02306a42cf (6) # Executing section authorize from file /etc/freeradius/sites-enabled/default (6) authorize { (6) filter_username filter_username { (6) ? if (User-Name != "%{tolower:%{User-Name}}") (6) expand: "%{tolower:%{User-Name}}" -> 'ferda' (6) ? if (User-Name != "%{tolower:%{User-Name}}") -> FALSE (6) ? if (User-Name =~ / /) (6) ? if (User-Name =~ / /) -> FALSE (6) ? if (User-Name =~ /@.*@/ ) (6) ? if (User-Name =~ /@.*@/ ) -> FALSE (6) ? if (User-Name =~ /\\.\\./ ) (6) ? if (User-Name =~ /\\.\\./ ) -> FALSE (6) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (6) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (6) ? if (User-Name =~ /\\.$/) (6) ? if (User-Name =~ /\\.$/) -> FALSE (6) ? if (User-Name =~ /@\\./) (6) ? if (User-Name =~ /@\\./) -> FALSE (6) } # filter_username filter_username = notfound (6) [preprocess] = ok (6) [chap] = noop (6) [mschap] = noop (6) [digest] = noop (6) suffix : No '@' in User-Name = "ferda", looking up realm NULL (6) suffix : Found realm "NULL" (6) suffix : Adding Stripped-User-Name = "ferda" (6) suffix : Adding Realm = "NULL" (6) suffix : Authentication realm is LOCAL. (6) [suffix] = ok (6) eap : EAP packet type response id 6 length 96 (6) eap : Continuing tunnel setup. (6) [eap] = ok (6) } # authorize = ok (6) Found Auth-Type = EAP (6) # Executing group from file /etc/freeradius/sites-enabled/default (6) authenticate { (6) eap : Expiring EAP session with state 0x190693831c008a47 (6) eap : Finished EAP session with state 0x190693831c008a47 (6) eap : Previous EAP request found for state 0x190693831c008a47, released from the list (6) eap : Peer sent PEAP (25) (6) eap : EAP PEAP (25) (6) eap : Calling eap_peap to process EAP data (6) eap_peap : processing EAP-TLS (6) eap_peap : eaptls_verify returned 7 (6) eap_peap : Done initial handshake (6) eap_peap : eaptls_process returned 7 (6) eap_peap : FR_TLS_OK (6) eap_peap : Session established. Decoding tunneled attributes. (6) eap_peap : Peap state WAITING FOR INNER IDENTITY (6) eap_peap : Identity - ferda (6) eap_peap : Got inner identity 'ferda' (6) eap_peap : Setting default EAP type for tunneled EAP session. (6) eap_peap : Got tunneled request EAP-Message = 0x0206000a016665726461 server default { (6) eap_peap : Setting User-Name to ferda Sending tunneled request EAP-Message = 0x0206000a016665726461 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = 'ferda' server inner-tunnel { (6) # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel (6) authorize { (6) [chap] = noop (6) [mschap] = noop (6) suffix : No '@' in User-Name = "ferda", looking up realm NULL (6) suffix : Found realm "NULL" (6) suffix : Adding Stripped-User-Name = "ferda" (6) suffix : Adding Realm = "NULL" (6) suffix : Authentication realm is LOCAL. (6) [suffix] = ok (6) update control { (6) Proxy-To-Realm := 'LOCAL' (6) } # update control = noop (6) eap : EAP packet type response id 6 length 10 (6) eap : EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (6) [eap] = ok (6) } # authorize = ok (6) Found Auth-Type = EAP (6) # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel (6) authenticate { (6) eap : Peer sent Identity (1) (6) eap : Calling eap_mschapv2 to process EAP data (6) eap_mschapv2 : Issuing Challenge (6) eap : New EAP session, adding 'State' attribute to reply 0x61ab24c561ac3e3b (6) [eap] = handled (6) } # authenticate = handled } # server inner-tunnel (6) eap_peap : Got tunneled reply code 11 EAP-Message = 0x0107001f1a0107001a1068f94e18e422c769c373b71a204458ab6665726461 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x61ab24c561ac3e3b0c289baaa1c28790 (6) eap_peap : Got tunneled reply RADIUS code 11 EAP-Message = 0x0107001f1a0107001a1068f94e18e422c769c373b71a204458ab6665726461 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x61ab24c561ac3e3b0c289baaa1c28790 (6) eap_peap : Got tunneled Access-Challenge (6) eap : New EAP session, adding 'State' attribute to reply 0x190693831f018a47 (6) [eap] = handled (6) } # authenticate = handled Sending Access-Challenge of id 75 from 195.113.137.174 port 1812 to 195.113.136.62 port 50597 EAP-Message = 0x0107004b19001703010040bf92a9e9c5aeb2b5ae276e3210fb7607186df210bfffb8c82d3b47a894ef34ff5d9df24b932f84bc63c1a54f35dd8ad717aa78e1fc4c149be08ee517788968d2 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x190693831f018a47f766355159f8bf93 (6) Finished request 6. Waking up in 0.2 seconds. rad_recv: Access-Request packet from host 195.113.136.62 port 50597, id=76, length=244 User-Name = 'ferda' NAS-IP-Address = 127.0.0.1 Calling-Station-Id = '70-6F-6C-69-73-68' Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = 'rad_eap_test' EAP-Message = 0x0207008019001703010020f9ac04c4dd0887df676db40ef5bfe038296cb8e60575980be1d5732d4b6c179617030100506fc07ebc9a255db11dcee2595820b5fe56c659ba28e634c2c885a4190d354bb343b280ba69747dd063357e2627b2c3064a10bb0066678e72717b24c8aba9d54389bf8e4d8df882781661becb031c52e5 State = 0x190693831f018a47f766355159f8bf93 Message-Authenticator = 0xcb6fd52d4961f3ac4696db92730c3cca (7) # Executing section authorize from file /etc/freeradius/sites-enabled/default (7) authorize { (7) filter_username filter_username { (7) ? if (User-Name != "%{tolower:%{User-Name}}") (7) expand: "%{tolower:%{User-Name}}" -> 'ferda' (7) ? if (User-Name != "%{tolower:%{User-Name}}") -> FALSE (7) ? if (User-Name =~ / /) (7) ? if (User-Name =~ / /) -> FALSE (7) ? if (User-Name =~ /@.*@/ ) (7) ? if (User-Name =~ /@.*@/ ) -> FALSE (7) ? if (User-Name =~ /\\.\\./ ) (7) ? if (User-Name =~ /\\.\\./ ) -> FALSE (7) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (7) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (7) ? if (User-Name =~ /\\.$/) (7) ? if (User-Name =~ /\\.$/) -> FALSE (7) ? if (User-Name =~ /@\\./) (7) ? if (User-Name =~ /@\\./) -> FALSE (7) } # filter_username filter_username = notfound (7) [preprocess] = ok (7) [chap] = noop (7) [mschap] = noop (7) [digest] = noop (7) suffix : No '@' in User-Name = "ferda", looking up realm NULL (7) suffix : Found realm "NULL" (7) suffix : Adding Stripped-User-Name = "ferda" (7) suffix : Adding Realm = "NULL" (7) suffix : Authentication realm is LOCAL. (7) [suffix] = ok (7) eap : EAP packet type response id 7 length 128 (7) eap : Continuing tunnel setup. (7) [eap] = ok (7) } # authorize = ok (7) Found Auth-Type = EAP (7) # Executing group from file /etc/freeradius/sites-enabled/default (7) authenticate { (7) eap : Expiring EAP session with state 0x61ab24c561ac3e3b (7) eap : Finished EAP session with state 0x190693831f018a47 (7) eap : Previous EAP request found for state 0x190693831f018a47, released from the list (7) eap : Peer sent PEAP (25) (7) eap : EAP PEAP (25) (7) eap : Calling eap_peap to process EAP data (7) eap_peap : processing EAP-TLS (7) eap_peap : eaptls_verify returned 7 (7) eap_peap : Done initial handshake (7) eap_peap : eaptls_process returned 7 (7) eap_peap : FR_TLS_OK (7) eap_peap : Session established. Decoding tunneled attributes. (7) eap_peap : Peap state phase2 (7) eap_peap : EAP type MSCHAPv2 (26) (7) eap_peap : Got tunneled request EAP-Message = 0x020700401a0207003b315138e339bd6748e14aaf557e7aa52734000000000000000012cbd32e090866361b4537057879d140b64ac507ff3652ce006665726461 server default { (7) eap_peap : Setting User-Name to ferda Sending tunneled request EAP-Message = 0x020700401a0207003b315138e339bd6748e14aaf557e7aa52734000000000000000012cbd32e090866361b4537057879d140b64ac507ff3652ce006665726461 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = 'ferda' State = 0x61ab24c561ac3e3b0c289baaa1c28790 server inner-tunnel { (7) # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel (7) authorize { (7) [chap] = noop (7) [mschap] = noop (7) suffix : No '@' in User-Name = "ferda", looking up realm NULL (7) suffix : Found realm "NULL" (7) suffix : Adding Stripped-User-Name = "ferda" (7) suffix : Adding Realm = "NULL" (7) suffix : Authentication realm is LOCAL. (7) [suffix] = ok (7) update control { (7) Proxy-To-Realm := 'LOCAL' (7) } # update control = noop (7) eap : EAP packet type response id 7 length 64 (7) eap : No EAP Start, assuming it's an on-going EAP conversation (7) [eap] = updated (7) files : users: Matched entry ferda at line 91 (7) [files] = ok (7) [expiration] = noop (7) [logintime] = noop (7) WARNING: pap : Auth-Type already set. Not setting to PAP (7) [pap] = noop (7) } # authorize = updated (7) Found Auth-Type = EAP (7) # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel (7) authenticate { (7) eap : Expiring EAP session with state 0x61ab24c561ac3e3b (7) eap : Finished EAP session with state 0x61ab24c561ac3e3b (7) eap : Previous EAP request found for state 0x61ab24c561ac3e3b, released from the list (7) eap : Peer sent MSCHAPv2 (26) (7) eap : EAP MSCHAPv2 (26) (7) eap : Calling eap_mschapv2 to process EAP data (7) eap_mschapv2 : # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel (7) eap_mschapv2 : Auth-Type MS-CHAP { (7) mschap : Creating challenge hash with username: ferda (7) mschap : Client is using MS-CHAPv2 for ferda, we need NT-Password (7) mschap : adding MS-CHAPv2 MPPE keys (7) [mschap] = ok (7) } # Auth-Type MS-CHAP = ok MSCHAP Success (7) eap : New EAP session, adding 'State' attribute to reply 0x61ab24c560a33e3b (7) [eap] = handled (7) } # authenticate = handled } # server inner-tunnel (7) eap_peap : Got tunneled reply code 11 EAP-Message = 0x010800331a0307002e533d31373943353041384138463346314146334446333745374246324231394535333036314642424242 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x61ab24c560a33e3b0c289baaa1c28790 (7) eap_peap : Got tunneled reply RADIUS code 11 EAP-Message = 0x010800331a0307002e533d31373943353041384138463346314146334446333745374246324231394535333036314642424242 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x61ab24c560a33e3b0c289baaa1c28790 (7) eap_peap : Got tunneled Access-Challenge (7) eap : New EAP session, adding 'State' attribute to reply 0x190693831e0e8a47 (7) [eap] = handled (7) } # authenticate = handled Sending Access-Challenge of id 76 from 195.113.137.174 port 1812 to 195.113.136.62 port 50597 EAP-Message = 0x0108005b190017030100507c80c0d88abca0d9694193d2d5fb563c8b65f4426f14219770720fa217e19989f22bd0f681e21b80d3d93a279f459ace5d2a7c745f5c2d7ec379610dbc395a7efa76ff685db81335da18e4f127278731 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x190693831e0e8a47f766355159f8bf93 (7) Finished request 7. Waking up in 0.2 seconds. rad_recv: Access-Request packet from host 195.113.136.62 port 50597, id=77, length=196 User-Name = 'ferda' NAS-IP-Address = 127.0.0.1 Calling-Station-Id = '70-6F-6C-69-73-68' Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = 'rad_eap_test' EAP-Message = 0x0208005019001703010020afb56e0b2e151d26791dc9650a9d43a654d80bd6fe7ad3ce3cdd3461d9b5e5261703010020751296a26ca8952079f2fc6c1598d373a46457b4e20e62f43311b6f68a836e78 State = 0x190693831e0e8a47f766355159f8bf93 Message-Authenticator = 0x25184b6ff95ee102d0687f4736f75446 (8) # Executing section authorize from file /etc/freeradius/sites-enabled/default (8) authorize { (8) filter_username filter_username { (8) ? if (User-Name != "%{tolower:%{User-Name}}") (8) expand: "%{tolower:%{User-Name}}" -> 'ferda' (8) ? if (User-Name != "%{tolower:%{User-Name}}") -> FALSE (8) ? if (User-Name =~ / /) (8) ? if (User-Name =~ / /) -> FALSE (8) ? if (User-Name =~ /@.*@/ ) (8) ? if (User-Name =~ /@.*@/ ) -> FALSE (8) ? if (User-Name =~ /\\.\\./ ) (8) ? if (User-Name =~ /\\.\\./ ) -> FALSE (8) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (8) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (8) ? if (User-Name =~ /\\.$/) (8) ? if (User-Name =~ /\\.$/) -> FALSE (8) ? if (User-Name =~ /@\\./) (8) ? if (User-Name =~ /@\\./) -> FALSE (8) } # filter_username filter_username = notfound (8) [preprocess] = ok (8) [chap] = noop (8) [mschap] = noop (8) [digest] = noop (8) suffix : No '@' in User-Name = "ferda", looking up realm NULL (8) suffix : Found realm "NULL" (8) suffix : Adding Stripped-User-Name = "ferda" (8) suffix : Adding Realm = "NULL" (8) suffix : Authentication realm is LOCAL. (8) [suffix] = ok (8) eap : EAP packet type response id 8 length 80 (8) eap : Continuing tunnel setup. (8) [eap] = ok (8) } # authorize = ok (8) Found Auth-Type = EAP (8) # Executing group from file /etc/freeradius/sites-enabled/default (8) authenticate { (8) eap : Expiring EAP session with state 0x61ab24c560a33e3b (8) eap : Finished EAP session with state 0x190693831e0e8a47 (8) eap : Previous EAP request found for state 0x190693831e0e8a47, released from the list (8) eap : Peer sent PEAP (25) (8) eap : EAP PEAP (25) (8) eap : Calling eap_peap to process EAP data (8) eap_peap : processing EAP-TLS (8) eap_peap : eaptls_verify returned 7 (8) eap_peap : Done initial handshake (8) eap_peap : eaptls_process returned 7 (8) eap_peap : FR_TLS_OK (8) eap_peap : Session established. Decoding tunneled attributes. (8) eap_peap : Peap state phase2 (8) eap_peap : EAP type MSCHAPv2 (26) (8) eap_peap : Got tunneled request EAP-Message = 0x020800061a03 server default { (8) eap_peap : Setting User-Name to ferda Sending tunneled request EAP-Message = 0x020800061a03 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = 'ferda' State = 0x61ab24c560a33e3b0c289baaa1c28790 server inner-tunnel { (8) # Executing section authorize from file /etc/freeradius/sites-enabled/inner-tunnel (8) authorize { (8) [chap] = noop (8) [mschap] = noop (8) suffix : No '@' in User-Name = "ferda", looking up realm NULL (8) suffix : Found realm "NULL" (8) suffix : Adding Stripped-User-Name = "ferda" (8) suffix : Adding Realm = "NULL" (8) suffix : Authentication realm is LOCAL. (8) [suffix] = ok (8) update control { (8) Proxy-To-Realm := 'LOCAL' (8) } # update control = noop (8) eap : EAP packet type response id 8 length 6 (8) eap : EAP-MSCHAPV2 success, returning short-circuit ok (8) [eap] = ok (8) } # authorize = ok (8) Found Auth-Type = EAP (8) # Executing group from file /etc/freeradius/sites-enabled/inner-tunnel (8) authenticate { (8) eap : Expiring EAP session with state 0x61ab24c560a33e3b (8) eap : Finished EAP session with state 0x61ab24c560a33e3b (8) eap : Previous EAP request found for state 0x61ab24c560a33e3b, released from the list (8) eap : Peer sent MSCHAPv2 (26) (8) eap : EAP MSCHAPv2 (26) (8) eap : Calling eap_mschapv2 to process EAP data (8) eap : Freeing handler (8) [eap] = ok (8) } # authenticate = ok (8) WARNING: Empty post-auth section. Using default return values. (8) # Executing section post-auth from file /etc/freeradius/sites-enabled/inner-tunnel } # server inner-tunnel (8) eap_peap : Got tunneled reply code 2 MS-MPPE-Encryption-Policy = Encryption-Allowed MS-MPPE-Encryption-Types = RC4-40or128-bit-Allowed MS-MPPE-Send-Key = 0x19c04f5d8f294f58ae4f7d87e1695714 MS-MPPE-Recv-Key = 0xae5673d4d5e2fd1ece5332d67832e584 EAP-Message = 0x03080004 Message-Authenticator = 0x00000000000000000000000000000000 Stripped-User-Name = 'ferda' (8) eap_peap : Got tunneled reply RADIUS code 2 MS-MPPE-Encryption-Policy = Encryption-Allowed MS-MPPE-Encryption-Types = RC4-40or128-bit-Allowed MS-MPPE-Send-Key = 0x19c04f5d8f294f58ae4f7d87e1695714 MS-MPPE-Recv-Key = 0xae5673d4d5e2fd1ece5332d67832e584 EAP-Message = 0x03080004 Message-Authenticator = 0x00000000000000000000000000000000 Stripped-User-Name = 'ferda' (8) eap_peap : Tunneled authentication was successful. (8) eap_peap : SUCCESS (8) eap : New EAP session, adding 'State' attribute to reply 0x19069383110f8a47 (8) [eap] = handled (8) } # authenticate = handled Sending Access-Challenge of id 77 from 195.113.137.174 port 1812 to 195.113.136.62 port 50597 EAP-Message = 0x0109003b1900170301003034a3ab39d9aac474b6bd7f2755974f1bdc58832fd4436e5b5b471f6147263734e1b2f5f95538cbf80eeb2bbe35163631 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x19069383110f8a47f766355159f8bf93 (8) Finished request 8. Waking up in 0.2 seconds. rad_recv: Access-Request packet from host 195.113.136.62 port 50597, id=78, length=196 User-Name = 'ferda' NAS-IP-Address = 127.0.0.1 Calling-Station-Id = '70-6F-6C-69-73-68' Framed-MTU = 1400 NAS-Port-Type = Wireless-802.11 Connect-Info = 'rad_eap_test' EAP-Message = 0x0209005019001703010020ec41146958d2f7225c389fa5ff730cfd45356a3c56d907a45689e16aec004aa617030100200ebd370e05057507f5e7a8a042535c9a8f20e24d4c020ac1b4384fb3fc595803 State = 0x19069383110f8a47f766355159f8bf93 Message-Authenticator = 0xeff60d9b830a3c20e9a5ab83790f385e (9) # Executing section authorize from file /etc/freeradius/sites-enabled/default (9) authorize { (9) filter_username filter_username { (9) ? if (User-Name != "%{tolower:%{User-Name}}") (9) expand: "%{tolower:%{User-Name}}" -> 'ferda' (9) ? if (User-Name != "%{tolower:%{User-Name}}") -> FALSE (9) ? if (User-Name =~ / /) (9) ? if (User-Name =~ / /) -> FALSE (9) ? if (User-Name =~ /@.*@/ ) (9) ? if (User-Name =~ /@.*@/ ) -> FALSE (9) ? if (User-Name =~ /\\.\\./ ) (9) ? if (User-Name =~ /\\.\\./ ) -> FALSE (9) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) (9) ? if ((User-Name =~ /@/) && (User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (9) ? if (User-Name =~ /\\.$/) (9) ? if (User-Name =~ /\\.$/) -> FALSE (9) ? if (User-Name =~ /@\\./) (9) ? if (User-Name =~ /@\\./) -> FALSE (9) } # filter_username filter_username = notfound (9) [preprocess] = ok (9) [chap] = noop (9) [mschap] = noop (9) [digest] = noop (9) suffix : No '@' in User-Name = "ferda", looking up realm NULL (9) suffix : Found realm "NULL" (9) suffix : Adding Stripped-User-Name = "ferda" (9) suffix : Adding Realm = "NULL" (9) suffix : Authentication realm is LOCAL. (9) [suffix] = ok (9) eap : EAP packet type response id 9 length 80 (9) eap : Continuing tunnel setup. (9) [eap] = ok (9) } # authorize = ok (9) Found Auth-Type = EAP (9) # Executing group from file /etc/freeradius/sites-enabled/default (9) authenticate { (9) eap : Expiring EAP session with state 0x19069383110f8a47 (9) eap : Finished EAP session with state 0x19069383110f8a47 (9) eap : Previous EAP request found for state 0x19069383110f8a47, released from the list (9) eap : Peer sent PEAP (25) (9) eap : EAP PEAP (25) (9) eap : Calling eap_peap to process EAP data (9) eap_peap : processing EAP-TLS (9) eap_peap : eaptls_verify returned 7 (9) eap_peap : Done initial handshake (9) eap_peap : eaptls_process returned 7 (9) eap_peap : FR_TLS_OK (9) eap_peap : Session established. Decoding tunneled attributes. (9) eap_peap : Peap state send tlv success (9) eap_peap : EAP type NAK (3) (9) eap_peap : We sent a success, but received something weird in return. SSL: Removing session f66fbbf7d3aaaf00a4c35c33805d8ee7625b7d5ba56bccca22c65ecdd1992637 from the cache (9) ERROR: eap : Failed continuing EAP PEAP (25) session. EAP sub-module failed (9) eap : Failed in EAP select (9) [eap] = invalid (9) } # authenticate = invalid (9) Failed to authenticate the user. (9) Using Post-Auth-Type Reject (9) # Executing group from file /etc/freeradius/sites-enabled/default (9) Post-Auth-Type REJECT { (9) attr_filter.access_reject : expand: "%{User-Name}" -> 'ferda' (9) attr_filter.access_reject : Matched entry DEFAULT at line 11 (9) [attr_filter.access_reject] = updated (9) eap : Reply already contained an EAP-Message, not inserting EAP-Failure (9) [eap] = noop (9) remove_reply_message_if_eap remove_reply_message_if_eap { (9) ? if (reply:EAP-Message && reply:Reply-Message) (9) ? if (reply:EAP-Message && reply:Reply-Message) -> FALSE (9) else else { (9) [noop] = noop (9) } # else else = noop (9) } # remove_reply_message_if_eap remove_reply_message_if_eap = noop (9) } # Post-Auth-Type REJECT = updated (9) Finished request 9. Waking up in 0.2 seconds. Waking up in 0.6 seconds. (9) Sending delayed reject Sending Access-Reject of id 78 from 195.113.137.174 port 1812 to 195.113.136.62 port 50597 EAP-Message = 0x04090004 Message-Authenticator = 0x00000000000000000000000000000000 Waking up in 3.9 seconds. (0) Cleaning up request packet ID 69 with timestamp +12 (1) Cleaning up request packet ID 70 with timestamp +12 (2) Cleaning up request packet ID 71 with timestamp +12 (3) Cleaning up request packet ID 72 with timestamp +12 (4) Cleaning up request packet ID 73 with timestamp +12 (5) Cleaning up request packet ID 74 with timestamp +12 (6) Cleaning up request packet ID 75 with timestamp +12 (7) Cleaning up request packet ID 76 with timestamp +12 (8) Cleaning up request packet ID 77 with timestamp +12 Waking up in 1.0 seconds. (9) Cleaning up request packet ID 78 with timestamp +12 Ready to process requests. ^C root@ferda:~# exit exit Script done on Fri 08 Nov 2013 10:28:31 AM CET