FreeRADIUS Version 2.2.0, for host x86_64-unknown-linux-gnu, built on Oct 18 2012 at 13:58:38 Copyright (C) 1999-2012 The FreeRADIUS server project and contributors. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License v2. Starting - reading configuration files ... including configuration file /usr/local/pf/raddb//radiusd.conf including configuration file /usr/local/pf/raddb//proxy.conf including configuration file /usr/local/pf/raddb//clients.conf including files in directory /usr/local/pf/raddb//modules/ including configuration file /usr/local/pf/raddb//modules/ldap including configuration file /usr/local/pf/raddb//modules/inner-eap including configuration file /usr/local/pf/raddb//modules/otp including configuration file /usr/local/pf/raddb//modules/replicate including configuration file /usr/local/pf/raddb//modules/pam including configuration file /usr/local/pf/raddb//modules/radutmp including configuration file /usr/local/pf/raddb//modules/soh including configuration file /usr/local/pf/raddb//modules/always including configuration file /usr/local/pf/raddb//modules/realm including configuration file /usr/local/pf/raddb//modules/linelog including configuration file /usr/local/pf/raddb//modules/detail.log including configuration file /usr/local/pf/raddb//modules/logintime including configuration file /usr/local/pf/raddb//modules/mschap including configuration file /usr/local/pf/raddb//modules/detail.example.com including configuration file /usr/local/pf/raddb//modules/smsotp including configuration file /usr/local/pf/raddb//modules/mac2vlan including configuration file /usr/local/pf/raddb//modules/exec including configuration file /usr/local/pf/raddb//modules/policy including configuration file /usr/local/pf/raddb//modules/chap including configuration file /usr/local/pf/raddb//modules/acct_unique including configuration file /usr/local/pf/raddb//modules/ntlm_auth including configuration file /usr/local/pf/raddb//modules/sradutmp including configuration file /usr/local/pf/raddb//modules/attr_rewrite including configuration file /usr/local/pf/raddb//modules/passwd including configuration file /usr/local/pf/raddb//modules/digest including configuration file /usr/local/pf/raddb//modules/sqlcounter_expire_on_login including configuration file /usr/local/pf/raddb//modules/unix including configuration file /usr/local/pf/raddb//modules/echo including configuration file /usr/local/pf/raddb//modules/redis including configuration file /usr/local/pf/raddb//modules/expiration including configuration file /usr/local/pf/raddb//modules/detail including configuration file /usr/local/pf/raddb//modules/pap including configuration file /usr/local/pf/raddb//modules/wimax including configuration file /usr/local/pf/raddb//modules/perl including configuration file /usr/local/pf/raddb//modules/dynamic_clients including configuration file /usr/local/pf/raddb//modules/files including configuration file /usr/local/pf/raddb//modules/counter including configuration file /usr/local/pf/raddb//modules/etc_group including configuration file /usr/local/pf/raddb//modules/expr including configuration file /usr/local/pf/raddb//modules/checkval including configuration file /usr/local/pf/raddb//modules/mac2ip including configuration file /usr/local/pf/raddb//modules/ippool including configuration file /usr/local/pf/raddb//modules/preprocess including configuration file /usr/local/pf/raddb//modules/opendirectory including configuration file /usr/local/pf/raddb//modules/attr_filter including configuration file /usr/local/pf/raddb//modules/sql_log including configuration file /usr/local/pf/raddb//modules/smbpasswd including configuration file /usr/local/pf/raddb//modules/rediswho including configuration file /usr/local/pf/raddb//modules/cui including configuration file /usr/local/pf/raddb//eap.conf including configuration file /usr/local/pf/raddb//sql.conf including configuration file /usr/local/pf/raddb//sql/mysql/packetfence.conf including configuration file /usr/local/pf/raddb//policy.conf including files in directory /usr/local/pf/raddb//sites-enabled/ including configuration file /usr/local/pf/raddb//sites-enabled/default including configuration file /usr/local/pf/raddb//sites-enabled/control-socket including configuration file /usr/local/pf/raddb//sites-enabled/packetfence-soh including configuration file /usr/local/pf/raddb//sites-enabled/packetfence including configuration file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel including configuration file /usr/local/pf/raddb//sites-enabled/inner-tunnel main { user = "pf" group = "pf" allow_core_dumps = no } including dictionary file /usr/local/pf/raddb//dictionary main { name = "radiusd" prefix = "/usr" localstatedir = "/usr/local/pf/var" sbindir = "/usr/sbin" logdir = "/usr/local/pf/logs" run_dir = "/usr/local/pf/var/run" libdir = "/usr/lib/freeradius" radacctdir = "/usr/local/pf/logs/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 1024 pidfile = "/usr/local/pf/var/run/radiusd.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = yes auth_badpass = no auth_goodpass = no } security { max_attributes = 200 reject_delay = 1 status_server = yes } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = "testing123" response_window = 20 max_outstanding = 65536 require_message_authenticator = yes zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 num_pings_to_alive = 3 revive_interval = 120 status_check_timeout = 4 coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server orps01.uwic.ac.uk { ipaddr = 193.62.96.41 port = 1812 type = "auth" secret = "testtest123" response_window = 30 max_outstanding = 65536 require_message_authenticator = yes zombie_period = 40 status_check = "none" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 num_pings_to_alive = 3 revive_interval = 300 status_check_timeout = 4 } home_server orps02.uwic.ac.uk { ipaddr = 193.62.96.42 port = 1812 type = "auth" secret = "testtest123" response_window = 30 max_outstanding = 65536 require_message_authenticator = yes zombie_period = 40 status_check = "none" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 num_pings_to_alive = 3 revive_interval = 300 status_check_timeout = 4 } home_server_pool my_auth_failover { type = fail-over home_server = localhost } realm example.com { auth_pool = my_auth_failover } realm NULL { authhost = LOCAL accthost = LOCAL } realm cardiffmet.ac.uk { authhost = LOCAL accthost = LOCAL } realm uwic.ac.uk { authhost = LOCAL accthost = LOCAL } home_server_pool eduroam { type = fail-over home_server = orps01.uwic.ac.uk home_server = orps02.uwic.ac.uk } realm DEFAULT { auth_pool = eduroam nostrip } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = "testing123" nastype = "other" } radiusd: #### Instantiating modules #### instantiate { Module: Linked to module rlm_exec Module: Instantiating module "exec" from file /usr/local/pf/raddb//modules/exec exec { wait = no input_pairs = "request" shell_escape = yes } Module: Linked to module rlm_expr Module: Instantiating module "expr" from file /usr/local/pf/raddb//modules/expr Module: Linked to module rlm_expiration Module: Instantiating module "expiration" from file /usr/local/pf/raddb//modules/expiration expiration { reply-message = "Password Has Expired " } Module: Linked to module rlm_logintime Module: Instantiating module "logintime" from file /usr/local/pf/raddb//modules/logintime logintime { reply-message = "You are calling outside your allowed timespan " minimum-timeout = 60 } } radiusd: #### Loading Virtual Servers #### server { # from file /usr/local/pf/raddb//radiusd.conf modules { Module: Creating Auth-Type = digest Module: Creating Post-Auth-Type = REJECT Module: Checking authenticate {...} for more modules to load Module: Linked to module rlm_pap Module: Instantiating module "pap" from file /usr/local/pf/raddb//modules/pap pap { encryption_scheme = "auto" auto_header = no } Module: Linked to module rlm_chap Module: Instantiating module "chap" from file /usr/local/pf/raddb//modules/chap Module: Linked to module rlm_mschap Module: Instantiating module "mschap" from file /usr/local/pf/raddb//modules/mschap mschap { use_mppe = yes require_encryption = yes require_strong = yes with_ntdomain_hack = yes ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}" allow_retry = yes } Module: Linked to module rlm_digest Module: Instantiating module "digest" from file /usr/local/pf/raddb//modules/digest Module: Linked to module rlm_unix Module: Instantiating module "unix" from file /usr/local/pf/raddb//modules/unix unix { radwtmp = "/usr/local/pf/logs/radwtmp" } Module: Linked to module rlm_eap Module: Instantiating module "eap" from file /usr/local/pf/raddb//eap.conf eap { default_eap_type = "peap" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 2048 } Module: Linked to sub-module rlm_eap_md5 Module: Instantiating eap-md5 Module: Linked to sub-module rlm_eap_tls Module: Instantiating eap-tls tls { rsa_key_exchange = no dh_key_exchange = yes rsa_key_length = 512 dh_key_length = 512 verify_depth = 0 pem_file_type = yes private_key_file = "/usr/local/pf/conf/ssl/server.key" certificate_file = "/usr/local/pf/conf/ssl/server.crt" dh_file = "/usr/local/pf/raddb//certs/dh" random_file = "/dev/urandom" fragment_size = 1024 include_length = yes check_crl = no cipher_list = "DEFAULT" make_cert_command = "/usr/local/pf/raddb//certs/bootstrap" cache { enable = no lifetime = 24 max_entries = 255 } verify { } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = no } } Module: Linked to sub-module rlm_eap_ttls Module: Instantiating eap-ttls ttls { default_eap_type = "md5" copy_request_to_tunnel = yes use_tunneled_reply = yes virtual_server = "packetfence-tunnel" include_length = yes } Module: Linked to sub-module rlm_eap_peap Module: Instantiating eap-peap peap { default_eap_type = "mschapv2" copy_request_to_tunnel = yes use_tunneled_reply = yes proxy_tunneled_request_as_eap = yes virtual_server = "packetfence-tunnel" soh = no } Module: Linked to sub-module rlm_eap_mschapv2 Module: Instantiating eap-mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } Module: Checking authorize {...} for more modules to load Module: Linked to module rlm_preprocess Module: Instantiating module "preprocess" from file /usr/local/pf/raddb//modules/preprocess preprocess { huntgroups = "/usr/local/pf/raddb//huntgroups" hints = "/usr/local/pf/raddb//hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } reading pairlist file /usr/local/pf/raddb//huntgroups reading pairlist file /usr/local/pf/raddb//hints Module: Linked to module rlm_realm Module: Instantiating module "suffix" from file /usr/local/pf/raddb//modules/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = yes } Module: Linked to module rlm_files Module: Instantiating module "files" from file /usr/local/pf/raddb//modules/files files { usersfile = "/usr/local/pf/raddb//users" acctusersfile = "/usr/local/pf/raddb//acct_users" preproxy_usersfile = "/usr/local/pf/raddb//preproxy_users" compat = "no" } reading pairlist file /usr/local/pf/raddb//users reading pairlist file /usr/local/pf/raddb//acct_users reading pairlist file /usr/local/pf/raddb//preproxy_users Module: Checking preacct {...} for more modules to load Module: Linked to module rlm_acct_unique Module: Instantiating module "acct_unique" from file /usr/local/pf/raddb//modules/acct_unique acct_unique { key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" } Module: Checking accounting {...} for more modules to load Module: Linked to module rlm_detail Module: Instantiating module "detail" from file /usr/local/pf/raddb//modules/detail detail { detailfile = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" detailperm = 384 dirperm = 493 locking = no log_packet_header = no } Module: Linked to module rlm_radutmp Module: Instantiating module "radutmp" from file /usr/local/pf/raddb//modules/radutmp radutmp { filename = "/usr/local/pf/logs/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes perm = 384 callerid = yes } Module: Linked to module rlm_attr_filter Module: Instantiating module "attr_filter.accounting_response" from file /usr/local/pf/raddb//modules/attr_filter attr_filter attr_filter.accounting_response { attrsfile = "/usr/local/pf/raddb//attrs.accounting_response" key = "%{User-Name}" relaxed = no } reading pairlist file /usr/local/pf/raddb//attrs.accounting_response Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load Module: Instantiating module "attr_filter.access_reject" from file /usr/local/pf/raddb//modules/attr_filter attr_filter attr_filter.access_reject { attrsfile = "/usr/local/pf/raddb//attrs.access_reject" key = "%{User-Name}" relaxed = no } reading pairlist file /usr/local/pf/raddb//attrs.access_reject } # modules } # server server soh-server { # from file /usr/local/pf/raddb//sites-enabled/packetfence-soh modules { Module: Checking authorize {...} for more modules to load Module: Linked to module rlm_perl Module: Instantiating module "packetfence-soh" from file /usr/local/pf/raddb//modules/perl perl packetfence-soh { module = "/usr/local/pf/raddb//packetfence-soh.pm" func_authorize = "authorize" func_authenticate = "authenticate" func_accounting = "accounting" func_preacct = "preacct" func_checksimul = "checksimul" func_detach = "detach" func_xlat = "xlat" func_pre_proxy = "pre_proxy" func_post_proxy = "post_proxy" func_post_auth = "post_auth" func_recv_coa = "recv_coa" func_send_coa = "send_coa" } } # modules } # server server packetfence { # from file /usr/local/pf/raddb//sites-enabled/packetfence modules { Module: Checking authenticate {...} for more modules to load Module: Checking authorize {...} for more modules to load Module: Instantiating module "packetfence" from file /usr/local/pf/raddb//modules/perl perl packetfence { module = "/usr/local/pf/raddb//packetfence.pm" func_authorize = "authorize" func_authenticate = "authenticate" func_accounting = "accounting" func_preacct = "preacct" func_checksimul = "checksimul" func_detach = "detach" func_xlat = "xlat" func_pre_proxy = "pre_proxy" func_post_proxy = "post_proxy" func_post_auth = "post_auth" func_recv_coa = "recv_coa" func_send_coa = "send_coa" } Module: Checking preacct {...} for more modules to load Module: Checking accounting {...} for more modules to load Module: Linked to module rlm_sql Module: Instantiating module "sql" from file /usr/local/pf/raddb//sql.conf sql { driver = "rlm_sql_mysql" server = "localhost" port = "3306" login = "pf" password = "testtesttest" radius_db = "pf" read_groups = yes sqltrace = no sqltracefile = "/usr/local/pf/logs/sqltrace.sql" readclients = yes deletestalesessions = yes num_sql_socks = 5 lifetime = 0 max_queries = 0 sql_user_name = "%{User-Name}" default_user_profile = "" nas_query = "SELECT id, nasname, shortname, type, secret FROM radius_nas" authorize_check_query = "SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id" authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id" authorize_group_check_query = "SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{Sql-Group}' ORDER BY id" authorize_group_reply_query = "SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{Sql-Group}' ORDER BY id" accounting_onoff_query = " UPDATE radacct SET acctstoptime = '%S', acctsessiontime = unix_timestamp('%S') - unix_timestamp(acctstarttime), acctterminatecause = '%{Acct-Terminate-Cause}', acctstopdelay = %{%{Acct-Delay-Time}:-0} WHERE acctstoptime IS NULL AND nasipaddress = '%{NAS-IP-Address}' AND acctstarttime <= '%S'" accounting_update_query = " CALL acct_update ( '%S', '%{Acct-Session-Time}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{NAS-IP-Address}', '%{Framed-IP-Address}', '%{Acct-Status-Type}')" accounting_update_query_alt = " INSERT INTO radacct (acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctsessiontime, acctauthentic, connectinfo_start, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, servicetype, framedprotocol, framedipaddress, acctstartdelay, xascendsessionsvrkey) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S', INTERVAL (%{%{Acct-Session-Time}:-0} + %{%{Acct-Delay-Time}:-0}) SECOND), '%{Acct-Session-Time}', '%{Acct-Authentic}', '', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''), REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0', '%{X-Ascend-Session-Svr-Key}')" accounting_start_query = " CALL acct_start ( '%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', '%S', NULL, '0', '%{Acct-Authentic}', '%{Connect-Info}', '', '0', '0', REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''), REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '%{%{Acct-Delay-Time}:-0}', '0', '%{X-Ascend-Session-Svr-Key}', '%{Acct-Status-Type}')" accounting_start_query_alt = " UPDATE radacct SET acctstarttime = '%S', acctstartdelay = '%{%{Acct-Delay-Time}:-0}', connectinfo_start = '%{Connect-Info}' WHERE acctsessionid = '%{Acct-Session-Id}' AND username = '%{SQL-User-Name}' AND nasipaddress = '%{NAS-IP-Address}'" accounting_stop_query = " CALL acct_stop ( '%S', '%{Acct-Session-Time}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Terminate-Cause}', '%{%{Acct-Delay-Time}:-0}', '%{Connect-Info}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{NAS-IP-Address}', '%{Acct-Status-Type}')" accounting_stop_query_alt = " INSERT INTO radacct (acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctstoptime, acctsessiontime, acctauthentic, connectinfo_start, connectinfo_stop, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, acctterminatecause, servicetype, framedprotocol, framedipaddress, acctstartdelay, acctstopdelay) VALUES ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}', '%{NAS-Port-Type}', DATE_SUB('%S', INTERVAL (%{%{Acct-Session-Time}:-0} + %{%{Acct-Delay-Time}:-0}) SECOND), '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '', '%{Connect-Info}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''), REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '%{Acct-Terminate-Cause}', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '0', '%{%{Acct-Delay-Time}:-0}')" group_membership_query = "SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority" connect_failure_retry_delay = 60 simul_count_query = "" simul_verify_query = "SELECT radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS NULL" postauth_query = "INSERT INTO radpostauth (username, pass, reply, authdate) VALUES ( '%{User-Name}', '%{%{User-Password}:-%{Chap-Password}}', '%{reply:Packet-Type}', '%S')" safe-characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /" } rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked rlm_sql (sql): Attempting to connect to pf@localhost:3306/pf rlm_sql (sql): starting 0 rlm_sql (sql): Attempting to connect rlm_sql_mysql #0 rlm_sql_mysql: Starting connect to MySQL server for #0 rlm_sql (sql): Connected new DB handle, #0 rlm_sql (sql): starting 1 rlm_sql (sql): Attempting to connect rlm_sql_mysql #1 rlm_sql_mysql: Starting connect to MySQL server for #1 rlm_sql (sql): Connected new DB handle, #1 rlm_sql (sql): starting 2 rlm_sql (sql): Attempting to connect rlm_sql_mysql #2 rlm_sql_mysql: Starting connect to MySQL server for #2 rlm_sql (sql): Connected new DB handle, #2 rlm_sql (sql): starting 3 rlm_sql (sql): Attempting to connect rlm_sql_mysql #3 rlm_sql_mysql: Starting connect to MySQL server for #3 rlm_sql (sql): Connected new DB handle, #3 rlm_sql (sql): starting 4 rlm_sql (sql): Attempting to connect rlm_sql_mysql #4 rlm_sql_mysql: Starting connect to MySQL server for #4 rlm_sql (sql): Connected new DB handle, #4 rlm_sql (sql): Processing generate_sql_clients rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname, shortname, type, secret FROM radius_nas rlm_sql (sql): Reserving sql socket id: 4 rlm_sql (sql): Read entry nasname=192.168.1.3,shortname=192.168.1.3,secret=testtesttest rlm_sql (sql): Adding client 192.168.1.3 (192.168.1.3, server=) to clients list rlm_sql (sql): Released sql socket id: 4 Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load } # modules } # server server packetfence-tunnel { # from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel modules { Module: Checking authenticate {...} for more modules to load Module: Checking authorize {...} for more modules to load Module: Instantiating module "ntdomain" from file /usr/local/pf/raddb//modules/realm realm ntdomain { format = "prefix" delimiter = "\" ignore_default = no ignore_null = yes } Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load } # modules } # server server inner-tunnel { # from file /usr/local/pf/raddb//sites-enabled/inner-tunnel modules { Module: Checking authenticate {...} for more modules to load Module: Checking authorize {...} for more modules to load Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load } # modules } # server radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" virtual_server = "packetfence" ipaddr = 192.168.1.2 port = 0 } listen { type = "acct" virtual_server = "packetfence" ipaddr = 192.168.1.2 port = 0 } listen { type = "control" listen { socket = "/usr/local/pf/var/run/radiusd.sock" mode = "rw" } } listen { type = "auth" ipaddr = 127.0.0.1 port = 18120 } ... adding new socket proxy address * port 44693 ... adding new socket proxy address * port 45585 ... adding new socket proxy address * port 59416 Listening on authentication address 192.168.1.2 port 1812 as server packetfence Listening on accounting address 192.168.1.2 port 1813 as server packetfence Listening on command file /usr/local/pf/var/run/radiusd.sock Listening on authentication address 127.0.0.1 port 18120 as server inner-tunnel Listening on proxy address 192.168.1.2 port 1814 Ready to process requests. rad_recv: Access-Request packet from host 192.168.1.3 port 32769, id=114, length=263 User-Name = "staffuser@cardiffmet.ac.uk" Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" EAP-Message = 0x0202001d01736d313838313840636172646966666d65742e61632e756b Message-Authenticator = 0x1772b6d878be4bc41398b1a0b3eacaca server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 2 length 29 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated ++[files] returns noop ++[expiration] returns noop ++[logintime] returns noop rlm_perl: Added pair NAS-Port-Type = Wireless-802.11 rlm_perl: Added pair Service-Type = Framed-User rlm_perl: Added pair Tunnel-Type = VLAN rlm_perl: Added pair Called-Station-Id = 34-a8-4e-1e-44-a0:eduroam_dev rlm_perl: Added pair Message-Authenticator = 0x1772b6d878be4bc41398b1a0b3eacaca rlm_perl: Added pair Airespace-Wlan-Id = 9 rlm_perl: Added pair Realm = cardiffmet.ac.uk rlm_perl: Added pair EAP-Type = Identity rlm_perl: Added pair NAS-IP-Address = 192.168.1.3 rlm_perl: Added pair Tunnel-Private-Group-Id = 62 rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802 rlm_perl: Added pair Calling-Station-Id = 00-26-b6-da-18-42 rlm_perl: Added pair Cisco-AVPair = audit-session-id=c0a88e0d000d011f53185832 rlm_perl: Added pair User-Name = staffuser@cardiffmet.ac.uk rlm_perl: Added pair NAS-Identifier = llWAC5505 rlm_perl: Added pair EAP-Message = 0x0202001d01736d313838313840636172646966666d65742e61632e756b rlm_perl: Added pair Stripped-User-Name = staffuser rlm_perl: Added pair NAS-Port = 13 rlm_perl: Added pair Framed-MTU = 1300 rlm_perl: Added pair Auth-Type = EAP ++[packetfence] returns noop Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] EAP Identity [eap] processing type tls [tls] Initiate [tls] Start returned 1 ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 114 to 192.168.1.3 port 32769 EAP-Message = 0x010300061920 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa188e073a18bf94ab80897fd8cea0b6a Finished request 0. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.1.3 port 32769, id=115, length=357 User-Name = "staffuser@cardiffmet.ac.uk" Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" EAP-Message = 0x0203006919800000005f160301005a01000056030153185a477e824c493d7d3d0c83e121ff485a18cff17cfa05ff5bc84eec687531000018002f00350005000ac013c014c009c00a003200380013000401000015ff01000100000a0006000400170018000b00020100 State = 0xa188e073a18bf94ab80897fd8cea0b6a Message-Authenticator = 0xf8b64263a7f65aac961a79cec179e76e server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 3 length 105 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS TLS Length 95 [peap] Length Included [peap] eaptls_verify returned 11 [peap] (other): before/accept initialization [peap] TLS_accept: before/accept initialization [peap] <<< TLS 1.0 Handshake [length 005a], ClientHello [peap] TLS_accept: SSLv3 read client hello A [peap] >>> TLS 1.0 Handshake [length 0031], ServerHello [peap] TLS_accept: SSLv3 write server hello A [peap] >>> TLS 1.0 Handshake [length 049b], Certificate [peap] TLS_accept: SSLv3 write certificate A [peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone [peap] TLS_accept: SSLv3 write server done A [peap] TLS_accept: SSLv3 flush data [peap] TLS_accept: Need to read more data: SSLv3 read client certificate A In SSL Handshake Phase In SSL Accept mode [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 115 to 192.168.1.3 port 32769 EAP-Message = 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 EAP-Message = 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 EAP-Message = 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 EAP-Message = 0xa17aa4783076310b3009060355040613024341310b30090603550408130251433111300f060355040713084d6f6e747265616c3110300e060355040a1307496e766572736531123010060355040313093132372e302e302e313121301f06092a864886f70d0109011612737570706f727440696e76657273652e6361820900aa97c0d647c6ad93300c0603551d130101ff0402300030090603551d1204023000300b0603551d0f0404030205e030130603551d25040c300a06082b06010505070301301106096086480186f8420101040403020640300d06092a864886f70d01010505000382010100670082ad96a59480bd7accb0bee96e9cf49e7228 EAP-Message = 0x5e81df6e826736bdc28e43a7 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa188e073a08cf94ab80897fd8cea0b6a Finished request 1. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.1.3 port 32769, id=116, length=258 User-Name = "staffuser@cardiffmet.ac.uk" Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" EAP-Message = 0x020400061900 State = 0xa188e073a08cf94ab80897fd8cea0b6a Message-Authenticator = 0xa21988167cb39d0ef17f2d8fb3ddbed6 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 4 length 6 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] Received TLS ACK [peap] ACK handshake fragment handler [peap] eaptls_verify returned 1 [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 116 to 192.168.1.3 port 32769 EAP-Message = 0x010500ef1900f586c13f164a2af9f37e7bb769cfc77e1758ca968650dd6deba26d3da363e8eb13ad3aa766a78e022e9484f96c64f6a066d06ec71292899f0966ffd8b727c82c577f189359e000f5d57877fed1f85bc7fa9279a42e1df7ad7fb2f8cbfa0dd79a7660b03a5c0d220216f81082b820c00f380c6c4f58768939fd8598b4fc9fc7f758048b9ef544269b5e66794ae585a59d5c6c690ad8549f62b6d91b9ff8cabd6226e0b8c2fcfdbea0b29384c69cdc1719dbd08ecd54113df7a8e997dea3b76779aeb1bf4f7bacdada1402df28572d569e1a5a470632b5da6a7574f3ce503d868a16030100040e000000 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa188e073a38df94ab80897fd8cea0b6a Finished request 2. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.1.3 port 32769, id=117, length=590 User-Name = "staffuser@cardiffmet.ac.uk" Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" EAP-Message = 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 EAP-Message = 0x87758a6050c4c8ce71bc21887f65d302f3d811edf1566c0f14030100010116030100305272f6eec9acbd118b4caede9f33dbe71bd98bf96a86785eac3839f24c7b60da803453357a759e98d06fa1ac5b3e6014 State = 0xa188e073a38df94ab80897fd8cea0b6a Message-Authenticator = 0xd9f33e94587c503f9b6d45a3a5b7608c server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 5 length 253 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS TLS Length 326 [peap] Length Included [peap] eaptls_verify returned 11 [peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange [peap] TLS_accept: SSLv3 read client key exchange A [peap] <<< TLS 1.0 ChangeCipherSpec [length 0001] [peap] <<< TLS 1.0 Handshake [length 0010], Finished [peap] TLS_accept: SSLv3 read finished A [peap] >>> TLS 1.0 ChangeCipherSpec [length 0001] [peap] TLS_accept: SSLv3 write change cipher spec A [peap] >>> TLS 1.0 Handshake [length 0010], Finished [peap] TLS_accept: SSLv3 write finished A [peap] TLS_accept: SSLv3 flush data [peap] (other): SSL negotiation finished successfully SSL Connection Established [peap] eaptls_process returned 13 [peap] EAPTLS_HANDLED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 117 to 192.168.1.3 port 32769 EAP-Message = 0x010600411900140301000101160301003017735ff2cd98baf09d30d6bfdb900bb019870b2c07922bf804ed991285ebe6e4141e448558e32fae0ddff1f30fa69198 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa188e073a28ef94ab80897fd8cea0b6a Finished request 3. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.1.3 port 32769, id=118, length=258 User-Name = "staffuser@cardiffmet.ac.uk" Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" EAP-Message = 0x020600061900 State = 0xa188e073a28ef94ab80897fd8cea0b6a Message-Authenticator = 0x770231a42b60bbe08fa39695fcd063b8 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 6 length 6 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] Received TLS ACK [peap] ACK handshake is finished [peap] eaptls_verify returned 3 [peap] eaptls_process returned 3 [peap] EAPTLS_SUCCESS [peap] Session established. Decoding tunneled attributes. [peap] Peap state TUNNEL ESTABLISHED ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 118 to 192.168.1.3 port 32769 EAP-Message = 0x0107002b190017030100207e31605ed7b06d24d24f20cf88fef76ddfd6b7fde428e877c5b177e575d4a43c Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa188e073a58ff94ab80897fd8cea0b6a Finished request 4. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.1.3 port 32769, id=119, length=311 User-Name = "staffuser@cardiffmet.ac.uk" Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" EAP-Message = 0x0207003b190017030100300e972487aee308da9f4e7be7f8942cf93f2ccb26bd886e4cb28a3b4f35ca453dfc329760529155a57cf333755d88ac9d State = 0xa188e073a58ff94ab80897fd8cea0b6a Message-Authenticator = 0x80e1f1b105e2a3434852398fb3d23e8f server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 7 length 59 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state WAITING FOR INNER IDENTITY [peap] Identity - staffuser@cardiffmet.ac.uk [peap] Got inner identity 'staffuser@cardiffmet.ac.uk' [peap] Setting default EAP type for tunneled EAP session. [peap] Got tunneled request EAP-Message = 0x0207001d01736d313838313840636172646966666d65742e61632e756b server packetfence { [peap] Setting User-Name to staffuser@cardiffmet.ac.uk Sending tunneled request EAP-Message = 0x0207001d01736d313838313840636172646966666d65742e61632e756b FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "staffuser@cardiffmet.ac.uk" Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" server packetfence-tunnel { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok [ntdomain] Request already proxied. Ignoring. ++[ntdomain] returns ok [eap] EAP packet type response id 7 length 29 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated ++[files] returns noop ++[expiration] returns noop ++[logintime] returns noop Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authenticate {...} [eap] EAP Identity [eap] processing type mschapv2 rlm_eap_mschapv2: Issuing Challenge ++[eap] returns handled } # server packetfence-tunnel [peap] Got tunneled reply code 11 EAP-Message = 0x010800321a0108002d10ae1a492c9d4ca62c89dfcb1e552e4e9b736d313838313840636172646966666d65742e61632e756b Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4d0fc2b84d07d862c6700d94dd5286be [peap] Got tunneled reply RADIUS code 11 EAP-Message = 0x010800321a0108002d10ae1a492c9d4ca62c89dfcb1e552e4e9b736d313838313840636172646966666d65742e61632e756b Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4d0fc2b84d07d862c6700d94dd5286be [peap] Got tunneled Access-Challenge ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 119 to 192.168.1.3 port 32769 EAP-Message = 0x0108005b190017030100501f31362b0e54d43bc6bd3dfbcd67b38d57f03f835c35573ce50e0008964df3517b9781c0e1105bbae2b2a8e22f8776041034ca7417038b9f9677471df02a2ab3b8e05d0ca2040c27a82166e1aeafb176 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa188e073a480f94ab80897fd8cea0b6a Finished request 5. Going to the next request Waking up in 4.9 seconds. rad_recv: Access-Request packet from host 192.168.1.3 port 32769, id=120, length=375 User-Name = "staffuser@cardiffmet.ac.uk" Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" EAP-Message = 0x0208007b190017030100709e5fa90dedfd5c9849786ef257032bdad876b84240e85e44be4ef1ce578ec7552a5dc844b00c0b94cc777d40d40884c134ae715f791d0c1cea67f5e4409ea6ce98669bc68326c02d6d9f6545849cdc980f8f338757959bbc66b10a3dcf9f2fc8040b6a6244d134041f311af92a67bcdb State = 0xa188e073a480f94ab80897fd8cea0b6a Message-Authenticator = 0x0711db3434940a8b768d38803715cc1d server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 8 length 123 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state phase2 [peap] EAP type mschapv2 [peap] Got tunneled request EAP-Message = 0x020800531a0208004e3178ac95f5a3654f9100ac49159ca19ce20000000000000000a2d2112c8a389123067945619b00cd1fe8de3d3bcff9cbf400736d313838313840636172646966666d65742e61632e756b server packetfence { [peap] Setting User-Name to staffuser@cardiffmet.ac.uk Sending tunneled request EAP-Message = 0x020800531a0208004e3178ac95f5a3654f9100ac49159ca19ce20000000000000000a2d2112c8a389123067945619b00cd1fe8de3d3bcff9cbf400736d313838313840636172646966666d65742e61632e756b FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "staffuser@cardiffmet.ac.uk" State = 0x4d0fc2b84d07d862c6700d94dd5286be Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" server packetfence-tunnel { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok [ntdomain] Request already proxied. Ignoring. ++[ntdomain] returns ok [eap] EAP packet type response id 8 length 83 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated ++[files] returns noop ++[expiration] returns noop ++[logintime] returns noop Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/mschapv2 [eap] processing type mschapv2 [mschapv2] # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel [mschapv2] +- entering group MS-CHAP {...} [mschap] Creating challenge hash with username: staffuser@cardiffmet.ac.uk [mschap] Client is using MS-CHAPv2 for staffuser@cardiffmet.ac.uk, we need NT-Password [mschap] expand: %{Stripped-User-Name} -> staffuser [mschap] expand: --username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}} -> --username=staffuser [mschap] Creating challenge hash with username: staffuser@cardiffmet.ac.uk [mschap] expand: --challenge=%{mschap:Challenge:-00} -> --challenge=0ae0f074853cb838 [mschap] expand: --nt-response=%{mschap:NT-Response:-00} -> --nt-response=a2d2112c8a389123067945619b00cd1fe8de3d3bcff9cbf4 Exec-Program output: NT_KEY: 4E824924DC59E6FE2CAD89A10B0657E2 Exec-Program-Wait: plaintext: NT_KEY: 4E824924DC59E6FE2CAD89A10B0657E2 Exec-Program: returned: 0 [mschap] adding MS-CHAPv2 MPPE keys ++[mschap] returns ok MSCHAP Success ++[eap] returns handled } # server packetfence-tunnel [peap] Got tunneled reply code 11 EAP-Message = 0x010900331a0308002e533d35343835364444423243353039463030353546443434384444303432393633364244364133413744 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4d0fc2b84c06d862c6700d94dd5286be [peap] Got tunneled reply RADIUS code 11 EAP-Message = 0x010900331a0308002e533d35343835364444423243353039463030353546443434384444303432393633364244364133413744 Message-Authenticator = 0x00000000000000000000000000000000 State = 0x4d0fc2b84c06d862c6700d94dd5286be [peap] Got tunneled Access-Challenge ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 120 to 192.168.1.3 port 32769 EAP-Message = 0x0109005b190017030100502d9ddbd1d7ac1f0e16e709ad5efc9a8a551dffe26b60d48c163adf54fbe2a787dca48cbe99a0fb807c7bfe1bac17703c5e6755ceb7bb99f544ed634597736e3e8aa83ce68c99631d553bb6aeb2e1a606 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa188e073a781f94ab80897fd8cea0b6a Finished request 6. Going to the next request Waking up in 4.8 seconds. rad_recv: Access-Request packet from host 192.168.1.3 port 32769, id=121, length=295 User-Name = "staffuser@cardiffmet.ac.uk" Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" EAP-Message = 0x0209002b1900170301002057b1c4e3641ab5f5ae54b77e95774b0079e01b04815842423938da5cf4872524 State = 0xa188e073a781f94ab80897fd8cea0b6a Message-Authenticator = 0x70378b197da39af559b4f23b7c9ff8d5 server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 9 length 43 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state phase2 [peap] EAP type mschapv2 [peap] Got tunneled request EAP-Message = 0x020900061a03 server packetfence { [peap] Setting User-Name to staffuser@cardiffmet.ac.uk Sending tunneled request EAP-Message = 0x020900061a03 FreeRADIUS-Proxied-To = 127.0.0.1 User-Name = "staffuser@cardiffmet.ac.uk" State = 0x4d0fc2b84c06d862c6700d94dd5286be Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" server packetfence-tunnel { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok [ntdomain] Request already proxied. Ignoring. ++[ntdomain] returns ok [eap] EAP packet type response id 9 length 6 [eap] No EAP Start, assuming it's an on-going EAP conversation ++[eap] returns updated ++[files] returns noop ++[expiration] returns noop ++[logintime] returns noop Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/mschapv2 [eap] processing type mschapv2 [eap] Freeing handler ++[eap] returns ok Login OK: [staffuser@cardiffmet.ac.uk] (from client 192.168.1.3 port 13 cli 00-26-b6-da-18-42 via TLS tunnel) # Executing section post-auth from file /usr/local/pf/raddb//sites-enabled/packetfence-tunnel +- entering group post-auth {...} ++[exec] returns noop rlm_perl: Returning vlan 62 to request from 00:26:b6:da:18:42 port 13 rlm_perl: PacketFence RESULT RESPONSE CODE: 2 (2 means OK) rlm_perl: Added pair NAS-Port-Type = Wireless-802.11 rlm_perl: Added pair Service-Type = Framed-User rlm_perl: Added pair Tunnel-Type = VLAN rlm_perl: Added pair Called-Station-Id = 34-a8-4e-1e-44-a0:eduroam_dev rlm_perl: Added pair State = 0x4d0fc2b84c06d862c6700d94dd5286be rlm_perl: Added pair Airespace-Wlan-Id = 9 rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1 rlm_perl: Added pair Realm = cardiffmet.ac.uk rlm_perl: Added pair EAP-Type = MS-CHAP-V2 rlm_perl: Added pair NAS-IP-Address = 192.168.1.3 rlm_perl: Added pair Tunnel-Private-Group-Id = 62 rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802 rlm_perl: Added pair Calling-Station-Id = 00-26-b6-da-18-42 rlm_perl: Added pair Cisco-AVPair = audit-session-id=c0a88e0d000d011f53185832 rlm_perl: Added pair User-Name = staffuser@cardiffmet.ac.uk rlm_perl: Added pair NAS-Identifier = llWAC5505 rlm_perl: Added pair EAP-Message = 0x020900061a03 rlm_perl: Added pair Stripped-User-Name = staffuser rlm_perl: Added pair NAS-Port = 13 rlm_perl: Added pair Framed-MTU = 1300 rlm_perl: Added pair MS-MPPE-Send-Key = 0x4ccbfccce22fdb2843127a341f526cc6 rlm_perl: Added pair MS-MPPE-Encryption-Types = 0x00000004 rlm_perl: Added pair Tunnel-Type = 13 rlm_perl: Added pair Tunnel-Medium-Type = 6 rlm_perl: Added pair MS-MPPE-Encryption-Policy = 0x00000002 rlm_perl: Added pair Message-Authenticator = 0x00000000000000000000000000000000 rlm_perl: Added pair Tunnel-Private-Group-ID = 62 rlm_perl: Added pair User-Name = staffuser rlm_perl: Added pair MS-MPPE-Recv-Key = 0x7e276f89a5b3fc5efd230901df139b54 rlm_perl: Added pair EAP-Message = 0x03090004 rlm_perl: Added pair Auth-Type = EAP ++[packetfence] returns ok } # server packetfence-tunnel [peap] Got tunneled reply code 2 MS-MPPE-Send-Key = 0x4ccbfccce22fdb2843127a341f526cc6 MS-MPPE-Encryption-Types = 0x00000004 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 MS-MPPE-Encryption-Policy = 0x00000002 Message-Authenticator = 0x00000000000000000000000000000000 Tunnel-Private-Group-Id:0 = "62" User-Name = "staffuser" MS-MPPE-Recv-Key = 0x7e276f89a5b3fc5efd230901df139b54 EAP-Message = 0x03090004 [peap] Got tunneled reply RADIUS code 2 MS-MPPE-Send-Key = 0x4ccbfccce22fdb2843127a341f526cc6 MS-MPPE-Encryption-Types = 0x00000004 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 MS-MPPE-Encryption-Policy = 0x00000002 Message-Authenticator = 0x00000000000000000000000000000000 Tunnel-Private-Group-Id:0 = "62" User-Name = "staffuser" MS-MPPE-Recv-Key = 0x7e276f89a5b3fc5efd230901df139b54 EAP-Message = 0x03090004 [peap] Tunneled authentication was successful. [peap] SUCCESS [peap] Saving tunneled attributes for later ++[eap] returns handled } # server packetfence Sending Access-Challenge of id 121 to 192.168.1.3 port 32769 EAP-Message = 0x010a002b19001703010020325fd0215acec447a5ce59581f2a989140fe12719f9bfb31de914956487ae870 Message-Authenticator = 0x00000000000000000000000000000000 State = 0xa188e073a682f94ab80897fd8cea0b6a Finished request 7. Going to the next request Waking up in 4.2 seconds. rad_recv: Access-Request packet from host 192.168.1.3 port 32769, id=122, length=295 User-Name = "staffuser@cardiffmet.ac.uk" Calling-Station-Id = "00-26-b6-da-18-42" Called-Station-Id = "34-a8-4e-1e-44-a0:eduroam_dev" NAS-Port = 13 Cisco-AVPair = "audit-session-id=c0a88e0d000d011f53185832" NAS-IP-Address = 192.168.1.3 NAS-Identifier = "llWAC5505" Airespace-Wlan-Id = 9 Service-Type = Framed-User Framed-MTU = 1300 NAS-Port-Type = Wireless-802.11 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" EAP-Message = 0x020a002b19001703010020595fc5baf354590b1a392d8f4e65a57b78fb2364afdd22e1695496c7a703b3fb State = 0xa188e073a682f94ab80897fd8cea0b6a Message-Authenticator = 0x73f4afe276795b5b3fc3cf3e4014a27a server packetfence { # Executing section authorize from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authorize {...} [suffix] Looking up realm "cardiffmet.ac.uk" for User-Name = "staffuser@cardiffmet.ac.uk" [suffix] Found realm "cardiffmet.ac.uk" [suffix] Adding Stripped-User-Name = "staffuser" [suffix] Adding Realm = "cardiffmet.ac.uk" [suffix] Authentication realm is LOCAL. ++[suffix] returns ok ++[preprocess] returns ok [eap] EAP packet type response id 10 length 43 [eap] Continuing tunnel setup. ++[eap] returns ok Found Auth-Type = EAP # Executing group from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group authenticate {...} [eap] Request found, released from the list [eap] EAP/peap [eap] processing type peap [peap] processing EAP-TLS [peap] eaptls_verify returned 7 [peap] Done initial handshake [peap] eaptls_process returned 7 [peap] EAPTLS_OK [peap] Session established. Decoding tunneled attributes. [peap] Peap state send tlv success [peap] Received EAP-TLV response. [peap] Success [peap] Using saved attributes from the original Access-Accept Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" User-Name = "staffuser" [eap] Freeing handler ++[eap] returns ok Login OK: [staffuser@cardiffmet.ac.uk] (from client 192.168.1.3 port 13 cli 00-26-b6-da-18-42) # Executing section post-auth from file /usr/local/pf/raddb//sites-enabled/packetfence +- entering group post-auth {...} ++[exec] returns noop ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)|| (User-Name =~ /^.*\@.+/ && User-Name !~ /^.*\@cardiffmet.ac.uk/)) ? Evaluating !(EAP-Type ) -> FALSE ?? Evaluating (EAP-Type != 21 ) -> TRUE ?? Evaluating (EAP-Type != 25) -> FALSE ?? Evaluating (User-Name =~ /^.*\@.+/) -> TRUE ?? Evaluating (User-Name !~ /^.*\@cardiffmet.ac.uk/) -> FALSE ++? if (!EAP-Type || (EAP-Type != 21 && EAP-Type != 25)|| (User-Name =~ /^.*\@.+/ && User-Name !~ /^.*\@cardiffmet.ac.uk/)) -> FALSE } # server packetfence Sending Access-Accept of id 122 to 192.168.1.3 port 32769 Tunnel-Type:0 = VLAN Tunnel-Medium-Type:0 = IEEE-802 Tunnel-Private-Group-Id:0 = "62" User-Name = "staffuser" MS-MPPE-Recv-Key = 0x338b376f327b6bb822a8a4bef735f0ffc56a25d252ad09ae0a51e179d29d469a MS-MPPE-Send-Key = 0xc4e0bfbd935b8bd8baf796ea0de3c961a42bfa80ce00b871d4a360d416304c80 EAP-Message = 0x030a0004 Message-Authenticator = 0x00000000000000000000000000000000 Finished request 8. Going to the next request Waking up in 4.2 seconds. Cleaning up request 0 ID 114 with timestamp +27 Cleaning up request 1 ID 115 with timestamp +27 Cleaning up request 2 ID 116 with timestamp +27 Cleaning up request 3 ID 117 with timestamp +27 Cleaning up request 4 ID 118 with timestamp +27 Cleaning up request 5 ID 119 with timestamp +27 Cleaning up request 6 ID 120 with timestamp +27 Waking up in 0.6 seconds. Cleaning up request 7 ID 121 with timestamp +27 Cleaning up request 8 ID 122 with timestamp +28 Ready to process requests.