<div dir="ltr"><div class="gmail_default" style="font-family:georgia,serif;font-size:small">hi Alan,</div><div class="gmail_default" style="font-family:georgia,serif;font-size:small"><br></div><div class="gmail_default" style="font-family:georgia,serif;font-size:small">
I'm sorry for the late response.<br><br></div><div class="gmail_default" style="font-family:georgia,serif;font-size:small"><div class="gmail_default" style="display:inline">> </div><span style="font-family:arial">hi,</span><br style="font-family:arial">
<span style="font-family:arial">> see all those WARNINGS and MUST messages in your debug output after the</span><br style="font-family:arial"><span style="font-family:arial">> "reading pairlist file /etc/freeradius/users" line?</span><br style="font-family:arial">
<br style="font-family:arial"><span style="font-family:arial">> fix them</span><br></div><div class="gmail_default" style="font-family:georgia,serif;font-size:small"><br></div><div class="gmail_default" style="font-family:georgia,serif;font-size:small">
I was tried to fix the reading pairlist as much as I can.</div><div class="gmail_default" style><font face="georgia, serif">in the user files, I made followed this format:</font><br><font color="#000000" face="Verdana, Geneva, Helvetica, Arial, sans-serif"><a href="mailto:1510101425520064@wlan.mnc101.mcc510.3gppnetwork.org">1510101425520064@wlan.mnc101.mcc510.3gppnetwork.org</a></font><font color="#000000" face="Verdana, Geneva, Helvetica, Arial, sans-serif"> EAP-Type :=SIM, EAP-Sim-Rand1 :=0x3FFA1C8555A04485841D99585B59FA04, EAP-Sim-SRES1 := 0x2A59e3a0, EAP-Sim-KC1 :=0x637f534f6375c400, EAP-Sim-Rand2 :=0xBA20E6E8BB359BD0843EBF34673D1541, EAP-Sim-SRES2 :=0xBDC5490D, EAP-Sim-KC2 :=0x8FE8D4E09E5BFC00, EAP-Sim-Rand3 :=0xB4C3D755C3C359E3EF6E928641CA59F1, EAP-Sim-SRES3 :=0x404A3DAA, EAP-Sim-KC3 :=0x83EF559E1B33A000 </font><br>
</div><div class="gmail_default" style><font color="#000000" face="Verdana, Geneva, Helvetica, Arial, sans-serif"><br></font></div><div class="gmail_default" style><font color="#000000" face="Verdana, Geneva, Helvetica, Arial, sans-serif">if I see the log that's different from before in the </font>"reading pairlist file /etc/freeradius/users" line,</div>
<div class="gmail_default" style>that's mean it has been fixed?</div><div class="gmail_default" style><br>> see all the EAP conversations going on? your server is trying to do MD5, that<br>> gets NAKs, then its trying another type...its now doing PEAP and failing due to<br>
> bad certs.... so, that makes me think your client isnt configured to actually be<br>> doing SIM-AKA anyway(!)<font color="#000000" face="Verdana, Geneva, Helvetica, Arial, sans-serif"><br></font></div><div class="gmail_extra">
<br><div class="gmail_default" style="font-family:georgia,serif;font-size:small">yes, I see the eap conversation after read it again,</div><div class="gmail_default" style="font-family:georgia,serif;font-size:small">but would you tell me how to configure so my client doing eap-sim?</div>
<div class="gmail_default" style="font-family:georgia,serif;font-size:small"><br></div><div class="gmail_default" style="font-family:georgia,serif;font-size:small">actually, I used Freeradius-server 2.2.0 on my virtual box, and my mine OS is windows 7</div>
<div class="gmail_default" style="font-family:georgia,serif;font-size:small">first I just want connect to my AP, when I was trying to connect the AP, for the network authentication I have to insert username & password,</div>
<div class="gmail_default" style="font-family:georgia,serif;font-size:small">in the username should I insert the IMSI? I just insert eap-sim for the username & password, so the log show the username is eap-sim.</div><br>
</div><div class="gmail_extra"><div class="gmail_default" style="font-family:georgia,serif;font-size:small">here's the log after I changed the users</div><p class=""><span style="font-family:'Courier New'">instantiate {<br>
Module: Linked to module rlm_exec<br>
Module: Instantiating module
"exec" from file /etc/freeradius/modules/exec<br>
exec {<br>
wait = no<br>
input_pairs =
"request"<br>
shell_escape = yes<br>
}<br>
Module: Linked to module rlm_expr<br>
Module: Instantiating module
"expr" from file /etc/freeradius/modules/expr<br>
Module: Linked to module
rlm_expiration<br>
Module: Instantiating module
"expiration" from file /etc/freeradius/modules/expiration<br>
expiration {<br>
reply-message = "Password Has
Expired "<br>
}<br>
Module: Linked to module
rlm_logintime<br>
Module: Instantiating module
"logintime" from file /etc/freeradius/modules/logintime<br>
logintime {<br>
reply-message = "You are
calling outside your allowed timespan
"<br>
minimum-timeout = 60<br>
}<br>
}<br>
radiusd: #### Loading Virtual Servers ####<br>
server { # from file /etc/freeradius/radiusd.conf<br>
modules {<br>
Module: Creating Auth-Type =
digest<br>
Module: Creating Post-Auth-Type =
REJECT<br>
Module: Checking authenticate {...} for
more modules to load<br>
Module: Linked to module rlm_pap<br>
Module: Instantiating module
"pap" from file /etc/freeradius/modules/pap<br>
pap {<br>
encryption_scheme =
"auto"<br>
auto_header = no<br>
}<br>
Module: Linked to module rlm_chap<br>
Module: Instantiating module
"chap" from file /etc/freeradius/modules/chap<br>
Module: Linked to module
rlm_mschap<br>
Module: Instantiating module
"mschap" from file /etc/freeradius/modules/mschap<br>
mschap {<br>
use_mppe = yes<br>
require_encryption = no<br>
require_strong = no<br>
with_ntdomain_hack = no<br>
allow_retry = yes<br>
}<br>
Module: Linked to module
rlm_digest<br>
Module: Instantiating module
"digest" from file /etc/freeradius/modules/digest<br>
Module: Linked to module rlm_unix<br>
Module: Instantiating module
"unix" from file /etc/freeradius/modules/unix<br>
unix {<br>
radwtmp =
"/var/log/freeradius/radwtmp"<br>
}<br>
Module: Linked to module rlm_eap<br>
Module: Instantiating module
"eap" from file /etc/freeradius/eap.conf<br>
eap {<br>
default_eap_type =
"md5"<br>
timer_expire = 60<br>
ignore_unknown_eap_types = no<br>
cisco_accounting_username_bug =
no<br>
max_sessions = 4096<br>
}<br>
Module: Linked to sub-module
rlm_eap_md5<br>
Module: Instantiating eap-md5<br>
Module: Linked to sub-module
rlm_eap_leap<br>
Module: Instantiating eap-leap<br>
Module: Linked to sub-module
rlm_eap_gtc<br>
Module: Instantiating eap-gtc<br>
gtc {<br>
challenge = "Password:
"<br>
auth_type = "PAP"<br>
}<br>
Module: Linked to sub-module
rlm_eap_tls<br>
Module: Instantiating eap-tls<br>
tls {<br>
rsa_key_exchange = no<br>
dh_key_exchange = yes<br>
rsa_key_length = 512<br>
dh_key_length = 512<br>
verify_depth = 0<br>
CA_path =
"/etc/freeradius/certs"<br>
pem_file_type = yes<br>
private_key_file =
"/etc/freeradius/certs/server.key"<br>
certificate_file =
"/etc/freeradius/certs/server.pem"<br>
CA_file =
"/etc/freeradius/certs/ca.pem"<br>
private_key_password =
"whatever"<br>
dh_file =
"/etc/freeradius/certs/dh"<br>
random_file =
"/dev/urandom"<br>
fragment_size = 1024<br>
include_length = yes<br>
check_crl = no<br>
cipher_list =
"DEFAULT"<br>
make_cert_command =
"/etc/freeradius/certs/bootstrap"<br>
ecdh_curve =
"prime256v1"<br>
cache {<br>
enable = no<br>
lifetime = 24<br>
max_entries = 255<br>
}<br>
verify {<br>
}<br>
ocsp {<br>
enable = no<br>
override_cert_url = yes<br>
url =
"<a href="http://127.0.0.1/ocsp/">http://127.0.0.1/ocsp/</a>"<br>
use_nonce = yes<br>
timeout = 0<br>
softfail = no<br>
}<br>
}<br>
Module: Linked to sub-module
rlm_eap_ttls<br>
Module: Instantiating eap-ttls<br>
ttls {<br>
default_eap_type =
"md5"<br>
copy_request_to_tunnel = no<br>
use_tunneled_reply = no<br>
virtual_server =
"inner-tunnel"<br>
include_length = yes<br>
}<br>
Module: Linked to sub-module
rlm_eap_peap<br>
Module: Instantiating eap-peap<br>
peap {<br>
default_eap_type =
"mschapv2"<br>
copy_request_to_tunnel = no<br>
use_tunneled_reply = no<br>
proxy_tunneled_request_as_eap =
yes<br>
virtual_server =
"inner-tunnel"<br>
soh = no<br>
}<br>
Module: Linked to sub-module
rlm_eap_mschapv2<br>
Module: Instantiating eap-mschapv2<br>
mschapv2 {<br>
with_ntdomain_hack = no<br>
send_error = no<br>
}<br>
Module: Linked to sub-module
rlm_eap_sim<br>
Module: Instantiating eap-sim<br>
Module: Checking authorize {...} for
more modules to load<br>
Module: Linked to module
rlm_preprocess<br>
Module: Instantiating module
"preprocess" from file /etc/freeradius/modules/preprocess<br>
preprocess {<br>
huntgroups =
"/etc/freeradius/huntgroups"<br>
hints =
"/etc/freeradius/hints"<br>
with_ascend_hack = no<br>
ascend_channels_per_line = 23<br>
with_ntdomain_hack = no<br>
with_specialix_jetstream_hack =
no<br>
with_cisco_vsa_hack = no<br>
with_alvarion_vsa_hack = no<br>
}<br>
reading pairlist file /etc/freeradius/huntgroups<br>
reading pairlist file /etc/freeradius/hints<br>
Module: Linked to module rlm_realm<br>
Module: Instantiating module
"suffix" from file /etc/freeradius/modules/realm<br>
realm suffix {<br>
format = "suffix"<br>
delimiter = "@"<br>
ignore_default = no<br>
ignore_null = no<br>
}<br>
Module: Linked to module
rlm_sim_files<br>
Module: Instantiating module
"sim_files" from file /etc/freeradius/modules/sim_files<br>
sim_files {<br>
simtriplets =
"/etc/freeradius/simtriplets.dat"<br>
}<br>
Module: Linked to module rlm_files<br>
Module: Instantiating module
"files" from file /etc/freeradius/modules/files<br>
files {<br>
usersfile =
"/etc/freeradius/users"<br>
acctusersfile =
"/etc/freeradius/acct_users"<br>
preproxy_usersfile =
"/etc/freeradius/preproxy_users"<br>
compat = "no"<br>
}<br>
reading pairlist file /etc/freeradius/users<br>
reading pairlist file /etc/freeradius/acct_users<br>
reading pairlist file /etc/freeradius/preproxy_users<br>
Module: Checking preacct {...} for more
modules to load<br>
Module: Linked to module
rlm_acct_unique<br>
Module: Instantiating module
"acct_unique" from file /etc/freeradius/modules/acct_unique<br>
acct_unique {<br>
key = "User-Name,
Acct-Session-Id, NAS-IP-Address, NAS-Identifier, NAS-Port"<br>
}<br>
Module: Checking accounting {...} for
more modules to load<br>
Module: Linked to module
rlm_detail<br>
Module: Instantiating module
"detail" from file /etc/freeradius/modules/detail<br>
detail {<br>
detailfile =
"/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"<br>
header = "%t"<br>
detailperm = 384<br>
dirperm = 493<br>
locking = no<br>
log_packet_header = no<br>
}<br>
Module: Linked to module
rlm_attr_filter<br>
Module: Instantiating module
"attr_filter.accounting_response" from file
/etc/freeradius/modules/attr_filter<br>
attr_filter
attr_filter.accounting_response {<br>
attrsfile =
"/etc/freeradius/attrs.accounting_response"<br>
key = "%{User-Name}"<br>
relaxed = no<br>
}<br>
reading pairlist file /etc/freeradius/attrs.accounting_response<br>
Module: Checking session {...} for more
modules to load<br>
Module: Linked to module rlm_radutmp<br>
Module: Instantiating module
"radutmp" from file /etc/freeradius/modules/radutmp<br>
radutmp {<br>
filename =
"/var/log/freeradius/radutmp"<br>
username =
"%{User-Name}"<br>
case_sensitive = yes<br>
check_with_nas = yes<br>
perm = 384<br>
callerid = yes<br>
}<br>
Module: Checking post-proxy {...} for
more modules to load<br>
Module: Checking post-auth {...} for
more modules to load<br>
Module: Instantiating module
"attr_filter.access_reject" from file
/etc/freeradius/modules/attr_filter<br>
attr_filter attr_filter.access_reject
{<br>
attrsfile =
"/etc/freeradius/attrs.access_reject"<br>
key = "%{User-Name}"<br>
relaxed = no<br>
}<br>
reading pairlist file /etc/freeradius/attrs.access_reject<br>
} # modules<br>
} # server<br>
server inner-tunnel { # from file
/etc/freeradius/sites-enabled/inner-tunnel<br>
modules {<br>
Module: Checking authenticate {...} for
more modules to load<br>
Module: Checking authorize {...} for
more modules to load<br>
Module: Checking session {...} for more
modules to load<br>
Module: Checking post-proxy {...} for
more modules to load<br>
Module: Checking post-auth {...} for
more modules to load<br>
} # modules<br>
} # server<br>
radiusd: #### Opening IP addresses and Ports ####<br>
listen {<br>
type = "auth"<br>
ipaddr = *<br>
port = 0<br>
}<br>
listen {<br>
type = "acct"<br>
ipaddr = *<br>
port = 0<br>
}<br>
listen {<br>
type = "auth"<br>
ipaddr = 127.0.0.1<br>
port = 18120<br>
}<br>
... adding new socket proxy address *
port 44396<br>
Listening on authentication address * port 1812<br>
Listening on accounting address * port 1813<br>
Listening on authentication address 127.0.0.1 port 18120 as server
inner-tunnel<br>
Listening on proxy address * port 1814<br>
Ready to process requests.<br>
rad_recv: Access-Request packet from host 192.168.1.1 port 2049, id=137,
length=171<br>
User-Name =
"eap-sim"<br>
NAS-IP-Address = 192.168.1.1<br>
NAS-Port = 0<br>
Called-Station-Id =
"004f62248f98"<br>
Calling-Station-Id = "742f68c46785"<br>
NAS-Identifier = "Realtek
Access Point. 8186"<br>
Framed-MTU = 1400<br>
NAS-Port-Type =
Wireless-802.11<br>
Service-Type = Framed-User<br>
Connect-Info = "CONNECT 11Mbps
802.11b"<br>
EAP-Message =
0x0200000c016561702d73696d<br>
Message-Authenticator = 0x6432f45d624c848645f3a543d5106874<br>
# Executing section authorize from file
/etc/freeradius/sites-enabled/default<br>
+- entering group authorize {...}<br>
++[preprocess] returns ok<br>
++[chap] returns noop<br>
++[mschap] returns noop<br>
++[digest] returns noop<br>
[suffix] No '@' in User-Name = "eap-sim", looking up realm NULL<br>
[suffix] No such realm "NULL"<br>
++[suffix] returns noop<br>
<font color="#000000">rlm_sim_files: insufficient number of challenges for
imsi eap-sim: 0 <br>
++[sim_files] returns notfound</font><br>
[eap] EAP packet type response id 0 length 12<br>
[eap] No EAP Start, assuming it's an on-going EAP conversation<br>
++[eap] returns updated<br>
++[files] returns noop<br>
++[expiration] returns noop<br>
++[logintime] returns noop<br>
<font color="#000000">[pap] WARNING! No "known good" password found
for the user. Authentication may fail
because of this.<br>
++[pap] returns noop</font><br>
Found Auth-Type = EAP<br>
# Executing group from file /etc/freeradius/sites-enabled/default<br>
+- entering group authenticate {...}<br>
[eap] EAP Identity<br>
[eap] processing type md5<br>
rlm_eap_md5: Issuing Challenge<br>
++[eap] returns handled<br>
Sending Access-Challenge of id 137 to 192.168.1.1 port 2049<br>
EAP-Message =
0x01010016041013eade1b3c80acaa0f32a0685071e09e<br>
Message-Authenticator =
0x00000000000000000000000000000000<br>
State =
0xdc94ac22dc95a819da67496a672facf3<br>
Finished request 0.<br>
Going to the next request<br>
Waking up in 4.9 seconds.<br>
rad_recv: Access-Request packet from host 192.168.1.1 port 2049, id=138,
length=177<br>
User-Name =
"eap-sim"<br>
NAS-IP-Address = 192.168.1.1<br>
NAS-Port = 0<br>
Called-Station-Id =
"004f62248f98"<br>
Calling-Station-Id =
"742f68c46785"<br>
NAS-Identifier = "Realtek
Access Point. 8186"<br>
NAS-Port-Type =
Wireless-802.11<br>
Service-Type = Framed-User<br>
Connect-Info = "CONNECT 11Mbps
802.11b"<br>
EAP-Message = 0x020100060319<br>
State =
0xdc94ac22dc95a819da67496a672facf3<br>
Message-Authenticator = 0xbafec0ba734fd199d3e98590e3e911a9<br>
# Executing section authorize from file
/etc/freeradius/sites-enabled/default<br>
+- entering group authorize {...}<br>
++[preprocess] returns ok<br>
++[chap] returns noop<br>
++[mschap] returns noop<br>
++[digest] returns noop<br>
[suffix] No '@' in User-Name = "eap-sim", looking up realm NULL<br>
[suffix] No such realm "NULL"<br>
++[suffix] returns noop<br>
rlm_sim_files: insufficient number of challenges for imsi eap-sim: 0 <br>
++[sim_files] returns notfound<br>
[eap] EAP packet type response id 1 length 6<br>
[eap] No EAP Start, assuming it's an on-going EAP conversation<br>
++[eap] returns updated<br>
++[files] returns noop<br>
++[expiration] returns noop<br>
++[logintime] returns noop<br>
[pap] WARNING! No "known good" password found for the user. Authentication may fail because of
this.<br>
++[pap] returns noop<br>
Found Auth-Type = EAP<br>
# Executing group from file /etc/freeradius/sites-enabled/default<br>
+- entering group authenticate {...}<br>
[eap] Request found, released from the list<br>
[eap] EAP NAK<br>
[eap] EAP-NAK asked for EAP-Type/peap<br>
[eap] processing type tls<br>
[tls] Initiate<br>
[tls] Start returned 1<br>
++[eap] returns handled<br>
Sending Access-Challenge of id 138 to 192.168.1.1 port 2049<br>
EAP-Message = 0x010200061920<br>
Message-Authenticator =
0x00000000000000000000000000000000<br>
State = 0xdc94ac22dd96b519da67496a672facf3<br>
Finished request 1.<br>
Going to the next request<br>
Waking up in 4.9 seconds.<br>
rad_recv: Access-Request packet from host 192.168.1.1 port 2049, id=139,
length=276<br>
User-Name =
"eap-sim"<br>
NAS-IP-Address = 192.168.1.1<br>
NAS-Port = 0<br>
Called-Station-Id = "004f62248f98"<br>
Calling-Station-Id =
"742f68c46785"<br>
NAS-Identifier = "Realtek
Access Point. 8186"<br>
NAS-Port-Type =
Wireless-802.11<br>
Service-Type = Framed-User<br>
Connect-Info = "CONNECT 11Mbps
802.11b"<br>
EAP-Message =
0x0202006919800000005f160301005a01000056030153b0f2e183da8dff7bf5fbd3d92391a1308391d7e7cd38c3ff700cfd36c76166000018002f00350005000ac013c014c009c00a003200380013000401000015ff01000100000a0006000400170018000b00020100<br>
State =
0xdc94ac22dd96b519da67496a672facf3<br>
Message-Authenticator =
0x9cf17efe2d2eec69fe2e8c37d9d752d1<br>
# Executing section authorize from file
/etc/freeradius/sites-enabled/default<br>
+- entering group authorize {...}<br>
++[preprocess] returns ok<br>
++[chap] returns noop<br>
++[mschap] returns noop<br>
++[digest] returns noop<br>
[suffix] No '@' in User-Name = "eap-sim", looking up realm NULL<br>
[suffix] No such realm "NULL"<br>
++[suffix] returns noop<br>
rlm_sim_files: insufficient number of challenges for imsi eap-sim: 0 <br>
++[sim_files] returns notfound<br>
[eap] EAP packet type response id 2 length 105<br>
[eap] Continuing tunnel setup.<br>
++[eap] returns ok<br>
Found Auth-Type = EAP<br>
# Executing group from file /etc/freeradius/sites-enabled/default<br>
+- entering group authenticate {...}<br>
[eap] Request found, released from the list<br>
[eap] EAP/peap<br>
[eap] processing type peap<br>
[peap] processing EAP-TLS<br>
TLS Length 95<br>
[peap] Length Included<br>
[peap] eaptls_verify returned 11 <br>
[peap] (other): before/accept
initialization<br>
[peap] TLS_accept: before/accept
initialization<br>
[peap] <<< TLS 1.0 Handshake [length 005a], ClientHello <br>
[peap] TLS_accept: SSLv3 read client
hello A<br>
[peap] >>> TLS 1.0 Handshake [length 0031], ServerHello <br>
[peap] TLS_accept: SSLv3 write server
hello A<br>
[peap] >>> TLS 1.0 Handshake [length 01a7], Certificate <br>
[peap] TLS_accept: SSLv3 write
certificate A<br>
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone <br>
[peap] TLS_accept: SSLv3 write server
done A<br>
[peap] TLS_accept: SSLv3 flush
data<br>
[peap] TLS_accept: Need to read more
data: SSLv3 read client certificate A<br>
In SSL Handshake Phase <br>
In SSL Accept mode <br>
[peap] eaptls_process returned 13 <br>
[peap] EAPTLS_HANDLED<br>
++[eap] returns handled<br>
Sending Access-Challenge of id 139 to 192.168.1.1 port 2049<br>
EAP-Message =
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<br>
EAP-Message =
0xd1608f21ed0adeeb17c1d6a6946c4fdd99876fc1fba94da1bbe1816ff176f1d46caa3fc5fb936f37fae2104213f40a87605b7ce29826aaceab75b9e91aeafa898c51252971bd690f700e5e509bfc4f0cbc51390203010001300d06092a864886f70d0101050500038181003a6ef824822c58464dcccacd831ab2cbe98a01f15f28e0047fbdf16fcf265a40ba086ca72e426e13e28e1e3f7df57ad6b87895651f888580feef1a11f84a74b55578d7e014d31eaeaa75c8d38fa0bfd0f5be3f80b7dbd5c8f0c07111d3ed7790338674c3ef6490db3ac40f20ddf2e6e011c0c4a0520c6d39fec268f451c6555716030100040e000000<br>
Message-Authenticator =
0x00000000000000000000000000000000<br>
State = 0xdc94ac22de97b519da67496a672facf3<br>
Finished request 2.<br>
Going to the next request<br>
Waking up in 4.9 seconds.<br>
rad_recv: Access-Request packet from host 192.168.1.1 port 2049, id=140,
length=188<br>
User-Name =
"eap-sim"<br>
NAS-IP-Address = 192.168.1.1<br>
NAS-Port = 0<br>
Called-Station-Id = "004f62248f98"<br>
Calling-Station-Id =
"742f68c46785"<br>
NAS-Identifier = "Realtek
Access Point. 8186"<br>
NAS-Port-Type =
Wireless-802.11<br>
Service-Type = Framed-User<br>
Connect-Info = "CONNECT 11Mbps
802.11b"<br>
EAP-Message =
0x0203001119800000000715030100020230<br>
State =
0xdc94ac22de97b519da67496a672facf3<br>
Message-Authenticator =
0xe21a6331f4d82016f61351043ccbe860<br>
# Executing section authorize from file
/etc/freeradius/sites-enabled/default<br>
+- entering group authorize {...}<br>
++[preprocess] returns ok<br>
++[chap] returns noop<br>
++[mschap] returns noop<br>
++[digest] returns noop<br>
[suffix] No '@' in User-Name = "eap-sim", looking up realm NULL<br>
[suffix] No such realm "NULL"<br>
++[suffix] returns noop<br>
rlm_sim_files: insufficient number of challenges for imsi eap-sim: 0 <br>
++[sim_files] returns notfound<br>
[eap] EAP packet type response id 3 length 17<br>
[eap] Continuing tunnel setup.<br>
++[eap] returns ok<br>
Found Auth-Type = EAP<br>
# Executing group from file /etc/freeradius/sites-enabled/default<br>
+- entering group authenticate {...}<br>
[eap] Request found, released from the list<br>
[eap] EAP/peap<br>
[eap] processing type peap<br>
[peap] processing EAP-TLS<br>
TLS Length 7<br>
[peap] Length Included<br>
[peap] eaptls_verify returned 11 <br>
[peap] <<< TLS 1.0 Alert [length 0002], fatal unknown_ca <br>
TLS Alert read:fatal:unknown CA<br>
TLS_accept: failed in SSLv3 read client certificate A<br>
rlm_eap: SSL error error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert
unknown ca<br>
SSL: SSL_read failed inside of TLS (-1), TLS session fails.<br>
TLS receive handshake failed during operation<br>
[peap] eaptls_process returned 4 <br>
[peap] EAPTLS_OTHERS<br>
[eap] Handler failed in EAP/peap<br>
[eap] Failed in EAP select<br>
++[eap] returns invalid<br>
Failed to authenticate the user.<br>
Using Post-Auth-Type REJECT<br>
# Executing group from file /etc/freeradius/sites-enabled/default<br>
+- entering group REJECT {...}<br>
[attr_filter.access_reject] expand:
%{User-Name} -> eap-sim<br>
attr_filter: Matched entry DEFAULT at line 11<br>
++[attr_filter.access_reject] returns updated<br>
Delaying reject of request 3 for 1 seconds<br>
Going to the next request<br>
Waking up in 0.9 seconds.<br>
Sending delayed reject for request 3<br>
Sending Access-Reject of id 140 to 192.168.1.1 port 2049<br>
EAP-Message = 0x04030004<br>
Message-Authenticator =
0x00000000000000000000000000000000<br>
Waking up in 3.9 seconds.<br>
Cleaning up request 0 ID 137 with timestamp +12<br>
Cleaning up request 1 ID 138 with timestamp +12<br>
Cleaning up request 2 ID 139 with timestamp +12<br>
Waking up in 1.0 seconds.<br>
Cleaning up request 3 ID 140 with timestamp +12<br>
Ready to process requests.<br>
<br></span></p><div class="gmail_default" style="font-family:georgia,serif;font-size:small"><br></div></div><div class="gmail_extra"><br></div><div class="gmail_extra"><div class="gmail_default" style="font-family:georgia,serif;font-size:small">
Best Regards</div><div class="gmail_default" style="font-family:georgia,serif;font-size:small">Alf</div><br></div></div>