FreeRADIUS Version 3.0.17 Copyright (C) 1999-2017 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ... including dictionary file /usr/share/freeradius/dictionary including dictionary file /usr/share/freeradius/dictionary.dhcp including dictionary file /usr/share/freeradius/dictionary.vqp including dictionary file /etc/raddb/dictionary including configuration file /etc/raddb/radiusd.conf including configuration file /etc/raddb/proxy.conf including configuration file /etc/raddb/clients.conf including files in directory /etc/raddb/mods-enabled/ including configuration file /etc/raddb/mods-enabled/always including configuration file /etc/raddb/mods-enabled/attr_filter including configuration file /etc/raddb/mods-enabled/cache_eap including configuration file /etc/raddb/mods-enabled/chap including configuration file /etc/raddb/mods-enabled/date including configuration file /etc/raddb/mods-enabled/detail including configuration file /etc/raddb/mods-enabled/detail.log including configuration file /etc/raddb/mods-enabled/digest including configuration file /etc/raddb/mods-enabled/dynamic_clients including configuration file /etc/raddb/mods-enabled/eap including configuration file /etc/raddb/mods-enabled/echo including configuration file /etc/raddb/mods-enabled/exec including configuration file /etc/raddb/mods-enabled/expiration including configuration file /etc/raddb/mods-enabled/expr including configuration file /etc/raddb/mods-enabled/files including configuration file /etc/raddb/mods-enabled/linelog including configuration file /etc/raddb/mods-enabled/logintime including configuration file /etc/raddb/mods-enabled/mschap including configuration file /etc/raddb/mods-enabled/ntlm_auth including configuration file /etc/raddb/mods-enabled/pap including configuration file /etc/raddb/mods-enabled/passwd including configuration file /etc/raddb/mods-enabled/preprocess including configuration file /etc/raddb/mods-enabled/radutmp including configuration file /etc/raddb/mods-enabled/realm including configuration file /etc/raddb/mods-enabled/replicate including configuration file /etc/raddb/mods-enabled/soh including configuration file /etc/raddb/mods-enabled/sradutmp including configuration file /etc/raddb/mods-enabled/unix including configuration file /etc/raddb/mods-enabled/unpack including configuration file /etc/raddb/mods-enabled/utf8 including configuration file /etc/raddb/mods-enabled/ldap including files in directory /etc/raddb/policy.d/ including configuration file /etc/raddb/policy.d/accounting including configuration file /etc/raddb/policy.d/canonicalization including configuration file /etc/raddb/policy.d/control including configuration file /etc/raddb/policy.d/cui including configuration file /etc/raddb/policy.d/debug including configuration file /etc/raddb/policy.d/dhcp including configuration file /etc/raddb/policy.d/eap including configuration file /etc/raddb/policy.d/filter including configuration file /etc/raddb/policy.d/operator-name including files in directory /etc/raddb/sites-enabled/ including configuration file /etc/raddb/sites-enabled/default including configuration file /etc/raddb/sites-enabled/inner-tunnel main { security { user = "radiusd" group = "radiusd" allow_core_dumps = no } name = "radiusd" prefix = "/usr" localstatedir = "/var" logdir = "/var/log/radius" run_dir = "/var/run/radiusd" } main { name = "radiusd" prefix = "/usr" localstatedir = "/var" sbindir = "/usr/sbin" logdir = "/var/log/radius" run_dir = "/var/run/radiusd" libdir = "/usr/lib64/freeradius" radacctdir = "/var/log/radius/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 16384 pidfile = "/var/run/radiusd/radiusd.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = no auth_badpass = no auth_goodpass = no colourise = yes msg_denied = "You are already logged in - access denied" } resources { } security { max_attributes = 200 reject_delay = 1.000000 status_server = yes } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = <<< secret >>> response_window = 20.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 120 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server_pool my_auth_failover { type = fail-over home_server = localhost } realm example.com { auth_pool = my_auth_failover } realm LOCAL { } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = <<< secret >>> nas_type = "other" proto = "*" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client apebs1 { ipaddr = 10.6.0.6 require_message_authenticator = no secret = <<< secret >>> limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client apoverkanthal1 { ipaddr = 10.6.0.7 require_message_authenticator = no secret = <<< secret >>> limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client apwebruimte1 { ipaddr = 10.6.0.5 require_message_authenticator = no secret = <<< secret >>> limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client localhost_ipv6 { ipv6addr = ::1 require_message_authenticator = no secret = <<< secret >>> limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Debugger not attached # Creating Auth-Type = mschap # Creating Auth-Type = digest # Creating Auth-Type = eap # Creating Auth-Type = PAP # Creating Auth-Type = CHAP # Creating Auth-Type = MS-CHAP radiusd: #### Instantiating modules #### modules { # Loaded module rlm_always # Loading module "reject" from file /etc/raddb/mods-enabled/always always reject { rcode = "reject" simulcount = 0 mpp = no } # Loading module "fail" from file /etc/raddb/mods-enabled/always always fail { rcode = "fail" simulcount = 0 mpp = no } # Loading module "ok" from file /etc/raddb/mods-enabled/always always ok { rcode = "ok" simulcount = 0 mpp = no } # Loading module "handled" from file /etc/raddb/mods-enabled/always always handled { rcode = "handled" simulcount = 0 mpp = no } # Loading module "invalid" from file /etc/raddb/mods-enabled/always always invalid { rcode = "invalid" simulcount = 0 mpp = no } # Loading module "userlock" from file /etc/raddb/mods-enabled/always always userlock { rcode = "userlock" simulcount = 0 mpp = no } # Loading module "notfound" from file /etc/raddb/mods-enabled/always always notfound { rcode = "notfound" simulcount = 0 mpp = no } # Loading module "noop" from file /etc/raddb/mods-enabled/always always noop { rcode = "noop" simulcount = 0 mpp = no } # Loading module "updated" from file /etc/raddb/mods-enabled/always always updated { rcode = "updated" simulcount = 0 mpp = no } # Loaded module rlm_attr_filter # Loading module "attr_filter.post-proxy" from file /etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.post-proxy { filename = "/etc/raddb/mods-config/attr_filter/post-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.pre-proxy" from file /etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.pre-proxy { filename = "/etc/raddb/mods-config/attr_filter/pre-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.access_reject" from file /etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.access_reject { filename = "/etc/raddb/mods-config/attr_filter/access_reject" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.access_challenge" from file /etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.access_challenge { filename = "/etc/raddb/mods-config/attr_filter/access_challenge" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.accounting_response" from file /etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.accounting_response { filename = "/etc/raddb/mods-config/attr_filter/accounting_response" key = "%{User-Name}" relaxed = no } # Loaded module rlm_cache # Loading module "cache_eap" from file /etc/raddb/mods-enabled/cache_eap cache cache_eap { driver = "rlm_cache_rbtree" key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}" ttl = 15 max_entries = 0 epoch = 0 add_stats = no } # Loaded module rlm_chap # Loading module "chap" from file /etc/raddb/mods-enabled/chap # Loaded module rlm_date # Loading module "date" from file /etc/raddb/mods-enabled/date date { format = "%b %e %Y %H:%M:%S %Z" utc = no } # Loaded module rlm_detail # Loading module "detail" from file /etc/raddb/mods-enabled/detail detail { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "auth_log" from file /etc/raddb/mods-enabled/detail.log detail auth_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "reply_log" from file /etc/raddb/mods-enabled/detail.log detail reply_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "pre_proxy_log" from file /etc/raddb/mods-enabled/detail.log detail pre_proxy_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "post_proxy_log" from file /etc/raddb/mods-enabled/detail.log detail post_proxy_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loaded module rlm_digest # Loading module "digest" from file /etc/raddb/mods-enabled/digest # Loaded module rlm_dynamic_clients # Loading module "dynamic_clients" from file /etc/raddb/mods-enabled/dynamic_clients # Loaded module rlm_eap # Loading module "eap" from file /etc/raddb/mods-enabled/eap eap { default_eap_type = "md5" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 16384 } # Loaded module rlm_exec # Loading module "echo" from file /etc/raddb/mods-enabled/echo exec echo { wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request" output_pairs = "reply" shell_escape = yes } # Loading module "exec" from file /etc/raddb/mods-enabled/exec exec { wait = no input_pairs = "request" shell_escape = yes timeout = 10 } # Loaded module rlm_expiration # Loading module "expiration" from file /etc/raddb/mods-enabled/expiration # Loaded module rlm_expr # Loading module "expr" from file /etc/raddb/mods-enabled/expr expr { safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" } # Loaded module rlm_files # Loading module "files" from file /etc/raddb/mods-enabled/files files { filename = "/etc/raddb/mods-config/files/authorize" acctusersfile = "/etc/raddb/mods-config/files/accounting" preproxy_usersfile = "/etc/raddb/mods-config/files/pre-proxy" } # Loaded module rlm_linelog # Loading module "linelog" from file /etc/raddb/mods-enabled/linelog linelog { filename = "/var/log/radius/linelog" escape_filenames = no syslog_severity = "info" permissions = 384 format = "This is a log message for %{User-Name}" reference = "messages.%{%{reply:Packet-Type}:-default}" } # Loading module "log_accounting" from file /etc/raddb/mods-enabled/linelog linelog log_accounting { filename = "/var/log/radius/linelog-accounting" escape_filenames = no syslog_severity = "info" permissions = 384 format = "" reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loaded module rlm_logintime # Loading module "logintime" from file /etc/raddb/mods-enabled/logintime logintime { minimum_timeout = 60 } # Loaded module rlm_mschap # Loading module "mschap" from file /etc/raddb/mods-enabled/mschap mschap { use_mppe = yes require_encryption = no require_strong = no with_ntdomain_hack = yes passchange { } allow_retry = yes winbind_retry_with_normalised_username = no } # Loading module "ntlm_auth" from file /etc/raddb/mods-enabled/ntlm_auth exec ntlm_auth { wait = yes program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}" shell_escape = yes } # Loaded module rlm_pap # Loading module "pap" from file /etc/raddb/mods-enabled/pap pap { normalise = yes } # Loaded module rlm_passwd # Loading module "etc_passwd" from file /etc/raddb/mods-enabled/passwd passwd etc_passwd { filename = "/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":" ignore_nislike = no ignore_empty = yes allow_multiple_keys = no hash_size = 100 } # Loaded module rlm_preprocess # Loading module "preprocess" from file /etc/raddb/mods-enabled/preprocess preprocess { huntgroups = "/etc/raddb/mods-config/preprocess/huntgroups" hints = "/etc/raddb/mods-config/preprocess/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } # Loaded module rlm_radutmp # Loading module "radutmp" from file /etc/raddb/mods-enabled/radutmp radutmp { filename = "/var/log/radius/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 384 caller_id = yes } # Loaded module rlm_realm # Loading module "IPASS" from file /etc/raddb/mods-enabled/realm realm IPASS { format = "prefix" delimiter = "/" ignore_default = no ignore_null = no } # Loading module "suffix" from file /etc/raddb/mods-enabled/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } # Loading module "realmpercent" from file /etc/raddb/mods-enabled/realm realm realmpercent { format = "suffix" delimiter = "%" ignore_default = no ignore_null = no } # Loading module "ntdomain" from file /etc/raddb/mods-enabled/realm realm ntdomain { format = "prefix" delimiter = "\\" ignore_default = no ignore_null = no } # Loaded module rlm_replicate # Loading module "replicate" from file /etc/raddb/mods-enabled/replicate # Loaded module rlm_soh # Loading module "soh" from file /etc/raddb/mods-enabled/soh soh { dhcp = yes } # Loading module "sradutmp" from file /etc/raddb/mods-enabled/sradutmp radutmp sradutmp { filename = "/var/log/radius/sradutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 420 caller_id = no } # Loaded module rlm_unix # Loading module "unix" from file /etc/raddb/mods-enabled/unix unix { radwtmp = "/var/log/radius/radwtmp" } Creating attribute Unix-Group # Loaded module rlm_unpack # Loading module "unpack" from file /etc/raddb/mods-enabled/unpack # Loaded module rlm_utf8 # Loading module "utf8" from file /etc/raddb/mods-enabled/utf8 # Loaded module rlm_ldap # Loading module "ldap" from file /etc/raddb/mods-enabled/ldap ldap { server = "ldap.enshore.local" identity = "uid=admin,cn=users,cn=accounts,dc=enshore,dc=local" password = <<< secret >>> sasl { } user { scope = "sub" access_positive = yes sasl { } } group { filter = "memberOf=cn=wir_dev,cn=groups,cn=accounts,dc=enshore,dc=local" scope = "sub" name_attribute = "cn" membership_attribute = "memberOf" cacheable_name = no cacheable_dn = no } client { filter = "(objectClass=radiusClient)" scope = "sub" base_dn = "dc=enshore,dc=local" } profile { } options { ldap_debug = 40 chase_referrals = yes rebind = yes net_timeout = 1 res_timeout = 10 srv_timelimit = 3 idle = 60 probes = 3 interval = 3 } tls { start_tls = no } } Creating attribute LDAP-Group instantiate { } # Instantiating module "reject" from file /etc/raddb/mods-enabled/always # Instantiating module "fail" from file /etc/raddb/mods-enabled/always # Instantiating module "ok" from file /etc/raddb/mods-enabled/always # Instantiating module "handled" from file /etc/raddb/mods-enabled/always # Instantiating module "invalid" from file /etc/raddb/mods-enabled/always # Instantiating module "userlock" from file /etc/raddb/mods-enabled/always # Instantiating module "notfound" from file /etc/raddb/mods-enabled/always # Instantiating module "noop" from file /etc/raddb/mods-enabled/always # Instantiating module "updated" from file /etc/raddb/mods-enabled/always # Instantiating module "attr_filter.post-proxy" from file /etc/raddb/mods-enabled/attr_filter reading pairlist file /etc/raddb/mods-config/attr_filter/post-proxy # Instantiating module "attr_filter.pre-proxy" from file /etc/raddb/mods-enabled/attr_filter reading pairlist file /etc/raddb/mods-config/attr_filter/pre-proxy # Instantiating module "attr_filter.access_reject" from file /etc/raddb/mods-enabled/attr_filter reading pairlist file /etc/raddb/mods-config/attr_filter/access_reject [/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay" found in filter list for realm "DEFAULT". [/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec" found in filter list for realm "DEFAULT". # Instantiating module "attr_filter.access_challenge" from file /etc/raddb/mods-enabled/attr_filter reading pairlist file /etc/raddb/mods-config/attr_filter/access_challenge # Instantiating module "attr_filter.accounting_response" from file /etc/raddb/mods-enabled/attr_filter reading pairlist file /etc/raddb/mods-config/attr_filter/accounting_response # Instantiating module "cache_eap" from file /etc/raddb/mods-enabled/cache_eap rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked # Instantiating module "detail" from file /etc/raddb/mods-enabled/detail # Instantiating module "auth_log" from file /etc/raddb/mods-enabled/detail.log rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output # Instantiating module "reply_log" from file /etc/raddb/mods-enabled/detail.log # Instantiating module "pre_proxy_log" from file /etc/raddb/mods-enabled/detail.log # Instantiating module "post_proxy_log" from file /etc/raddb/mods-enabled/detail.log # Instantiating module "eap" from file /etc/raddb/mods-enabled/eap # Linked to sub-module rlm_eap_md5 # Linked to sub-module rlm_eap_leap # Linked to sub-module rlm_eap_gtc gtc { challenge = "Password: " auth_type = "PAP" } # Linked to sub-module rlm_eap_tls tls { tls = "tls-common" } tls-config tls-common { verify_depth = 0 ca_path = "/etc/raddb/certs" pem_file_type = yes private_key_file = "/etc/raddb/certs/server.pem" certificate_file = "/etc/raddb/certs/server.pem" ca_file = "/etc/raddb/certs/ca.pem" private_key_password = <<< secret >>> dh_file = "/etc/raddb/certs/dh" fragment_size = 1024 include_length = yes auto_chain = yes check_crl = no check_all_crl = no cipher_list = "PROFILE=SYSTEM" cipher_server_preference = no ecdh_curve = "prime256v1" tls_max_version = "" tls_min_version = "1.0" cache { enable = no lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = no } } # Linked to sub-module rlm_eap_ttls ttls { tls = "tls-common" default_eap_type = "md5" copy_request_to_tunnel = no use_tunneled_reply = no virtual_server = "inner-tunnel" include_length = yes require_client_cert = no } tls: Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_peap peap { tls = "tls-common" default_eap_type = "mschapv2" copy_request_to_tunnel = no use_tunneled_reply = no proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel" soh = no require_client_cert = no } tls: Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } # Instantiating module "expiration" from file /etc/raddb/mods-enabled/expiration # Instantiating module "files" from file /etc/raddb/mods-enabled/files reading pairlist file /etc/raddb/mods-config/files/authorize reading pairlist file /etc/raddb/mods-config/files/accounting reading pairlist file /etc/raddb/mods-config/files/pre-proxy # Instantiating module "linelog" from file /etc/raddb/mods-enabled/linelog # Instantiating module "log_accounting" from file /etc/raddb/mods-enabled/linelog # Instantiating module "logintime" from file /etc/raddb/mods-enabled/logintime # Instantiating module "mschap" from file /etc/raddb/mods-enabled/mschap rlm_mschap (mschap): using internal authentication # Instantiating module "pap" from file /etc/raddb/mods-enabled/pap # Instantiating module "etc_passwd" from file /etc/raddb/mods-enabled/passwd rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no # Instantiating module "preprocess" from file /etc/raddb/mods-enabled/preprocess reading pairlist file /etc/raddb/mods-config/preprocess/huntgroups reading pairlist file /etc/raddb/mods-config/preprocess/hints # Instantiating module "IPASS" from file /etc/raddb/mods-enabled/realm # Instantiating module "suffix" from file /etc/raddb/mods-enabled/realm # Instantiating module "realmpercent" from file /etc/raddb/mods-enabled/realm # Instantiating module "ntdomain" from file /etc/raddb/mods-enabled/realm # Instantiating module "ldap" from file /etc/raddb/mods-enabled/ldap rlm_ldap: libldap vendor: OpenLDAP, version: 20446 accounting { reference = "%{tolower:type.%{Acct-Status-Type}}" } post-auth { reference = "." } rlm_ldap (ldap): Initialising connection pool pool { start = 5 min = 3 max = 32 spare = 10 uses = 0 lifetime = 0 cleanup_interval = 30 idle_timeout = 60 retry_delay = 30 spread = no } rlm_ldap (ldap): Opening additional connection (0), 1 of 32 pending slots used rlm_ldap (ldap): Connecting to ldap://ldap.enshore.local:389 rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful rlm_ldap (ldap): Opening additional connection (1), 1 of 31 pending slots used rlm_ldap (ldap): Connecting to ldap://ldap.enshore.local:389 rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful rlm_ldap (ldap): Opening additional connection (2), 1 of 30 pending slots used rlm_ldap (ldap): Connecting to ldap://ldap.enshore.local:389 rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful rlm_ldap (ldap): Opening additional connection (3), 1 of 29 pending slots used rlm_ldap (ldap): Connecting to ldap://ldap.enshore.local:389 rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful rlm_ldap (ldap): Opening additional connection (4), 1 of 28 pending slots used rlm_ldap (ldap): Connecting to ldap://ldap.enshore.local:389 rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful } # modules radiusd: #### Loading Virtual Servers #### server { # from file /etc/raddb/radiusd.conf } # server server default { # from file /etc/raddb/sites-enabled/default # Loading authenticate {...} # Loading authorize {...} Ignoring "sql" (see raddb/mods-available/README.rst) # Loading preacct {...} # Loading accounting {...} # Loading post-proxy {...} # Loading post-auth {...} } # server default server inner-tunnel { # from file /etc/raddb/sites-enabled/inner-tunnel # Loading authenticate {...} # Loading authorize {...} # Loading session {...} # Loading post-proxy {...} # Loading post-auth {...} # Skipping contents of 'if' as it is always 'false' -- /etc/raddb/sites-enabled/inner-tunnel:331 } # server inner-tunnel radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "auth" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "auth" ipaddr = 127.0.0.1 port = 18120 } Listening on auth address * port 1812 bound to server default Listening on acct address * port 1813 bound to server default Listening on auth address :: port 1812 bound to server default Listening on acct address :: port 1813 bound to server default Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel Listening on proxy address * port 38174 Listening on proxy address :: port 38390 (0) Received Access-Request Id 7 from 10.6.0.7:40008 to 10.6.0.55:1812 length 214 (0) User-Name = "testuser" (0) NAS-IP-Address = 10.6.0.7 (0) NAS-Identifier = "1eecdafa66fa" (0) Called-Station-Id = "1E-EC-DA-FA-66-FA:Enshore_devices" (0) NAS-Port-Type = Wireless-802.11 (0) Service-Type = Framed-User (0) Calling-Station-Id = "00-C0-CA-A8-86-B8" (0) Connect-Info = "CONNECT 0Mbps 802.11b" (0) Acct-Session-Id = "9B4368E812FDD014" (0) WLAN-Pairwise-Cipher = 1027076 (0) WLAN-Group-Cipher = 1027076 (0) WLAN-AKM-Suite = 1027073 (0) Framed-MTU = 1400 (0) EAP-Message = 0x02ff000d017465737475736572 (0) Message-Authenticator = 0x596f3f7b644cb7b8575bb5954b2212e9 (0) # Executing section authorize from file /etc/raddb/sites-enabled/default (0) authorize { (0) policy filter_username { (0) if (&User-Name) { (0) if (&User-Name) -> TRUE (0) if (&User-Name) { (0) if (&User-Name =~ / /) { (0) if (&User-Name =~ / /) -> FALSE (0) if (&User-Name =~ /@[^@]*@/ ) { (0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (0) if (&User-Name =~ /\.\./ ) { (0) if (&User-Name =~ /\.\./ ) -> FALSE (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (0) if (&User-Name =~ /\.$/) { (0) if (&User-Name =~ /\.$/) -> FALSE (0) if (&User-Name =~ /@\./) { (0) if (&User-Name =~ /@\./) -> FALSE (0) } # if (&User-Name) = notfound (0) } # policy filter_username = notfound (0) [preprocess] = ok (0) [chap] = noop (0) [mschap] = noop (0) [digest] = noop (0) suffix: Checking for suffix after "@" (0) suffix: No '@' in User-Name = "testuser", looking up realm NULL (0) suffix: No such realm "NULL" (0) [suffix] = noop (0) eap: Peer sent EAP Response (code 2) ID 255 length 13 (0) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (0) [eap] = ok (0) } # authorize = ok (0) Found Auth-Type = eap (0) # Executing group from file /etc/raddb/sites-enabled/default (0) authenticate { (0) eap: Peer sent packet with method EAP Identity (1) (0) eap: Calling submodule eap_md5 to process data (0) eap_md5: Issuing MD5 Challenge (0) eap: Sending EAP Request (code 1) ID 0 length 22 (0) eap: EAP session adding &reply:State = 0x92c3d0d092c3d4a5 (0) [eap] = handled (0) } # authenticate = handled (0) Using Post-Auth-Type Challenge (0) # Executing group from file /etc/raddb/sites-enabled/default (0) Challenge { ... } # empty sub-section is ignored (0) Sent Access-Challenge Id 7 from 10.6.0.55:1812 to 10.6.0.7:40008 length 0 (0) EAP-Message = 0x01000016041090e49c186f01e4be11c494bd0bb2917d (0) Message-Authenticator = 0x00000000000000000000000000000000 (0) State = 0x92c3d0d092c3d4a525434af7d2954666 (0) Finished request Waking up in 4.9 seconds. (1) Received Access-Request Id 8 from 10.6.0.7:40008 to 10.6.0.55:1812 length 226 (1) User-Name = "testuser" (1) NAS-IP-Address = 10.6.0.7 (1) NAS-Identifier = "1eecdafa66fa" (1) Called-Station-Id = "1E-EC-DA-FA-66-FA:Enshore_devices" (1) NAS-Port-Type = Wireless-802.11 (1) Service-Type = Framed-User (1) Calling-Station-Id = "00-C0-CA-A8-86-B8" (1) Connect-Info = "CONNECT 0Mbps 802.11b" (1) Acct-Session-Id = "9B4368E812FDD014" (1) WLAN-Pairwise-Cipher = 1027076 (1) WLAN-Group-Cipher = 1027076 (1) WLAN-AKM-Suite = 1027073 (1) Framed-MTU = 1400 (1) EAP-Message = 0x02000007031915 (1) State = 0x92c3d0d092c3d4a525434af7d2954666 (1) Message-Authenticator = 0x133b94b00e8b52bc8a025443ee75fb0d (1) session-state: No cached attributes (1) # Executing section authorize from file /etc/raddb/sites-enabled/default (1) authorize { (1) policy filter_username { (1) if (&User-Name) { (1) if (&User-Name) -> TRUE (1) if (&User-Name) { (1) if (&User-Name =~ / /) { (1) if (&User-Name =~ / /) -> FALSE (1) if (&User-Name =~ /@[^@]*@/ ) { (1) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (1) if (&User-Name =~ /\.\./ ) { (1) if (&User-Name =~ /\.\./ ) -> FALSE (1) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (1) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (1) if (&User-Name =~ /\.$/) { (1) if (&User-Name =~ /\.$/) -> FALSE (1) if (&User-Name =~ /@\./) { (1) if (&User-Name =~ /@\./) -> FALSE (1) } # if (&User-Name) = notfound (1) } # policy filter_username = notfound (1) [preprocess] = ok (1) [chap] = noop (1) [mschap] = noop (1) [digest] = noop (1) suffix: Checking for suffix after "@" (1) suffix: No '@' in User-Name = "testuser", looking up realm NULL (1) suffix: No such realm "NULL" (1) [suffix] = noop (1) eap: Peer sent EAP Response (code 2) ID 0 length 7 (1) eap: No EAP Start, assuming it's an on-going EAP conversation (1) [eap] = updated (1) [files] = noop rlm_ldap (ldap): Closing connection (0): Hit idle_timeout, was idle for 2902 seconds rlm_ldap (ldap): Closing connection (1): Hit idle_timeout, was idle for 2902 seconds rlm_ldap (ldap): Closing connection (2): Hit idle_timeout, was idle for 2902 seconds rlm_ldap (ldap): You probably need to lower "min" rlm_ldap (ldap): Closing connection (3): Hit idle_timeout, was idle for 2902 seconds rlm_ldap (ldap): You probably need to lower "min" rlm_ldap (ldap): Closing connection (4): Hit idle_timeout, was idle for 2902 seconds rlm_ldap (ldap): You probably need to lower "min" rlm_ldap (ldap): 0 of 0 connections in use. You may need to increase "spare" rlm_ldap (ldap): Opening additional connection (5), 1 of 32 pending slots used rlm_ldap (ldap): Connecting to ldap://ldap.enshore.local:389 rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful rlm_ldap (ldap): Reserved connection (5) (1) ldap: EXPAND (uid=%{User-Name}) (1) ldap: --> (uid=testuser) (1) ldap: Performing search in "cn=users,cn=accounts,dc=enshore,dc=local" with filter "(uid=testuser)", scope "sub" (1) ldap: Waiting for search result... (1) ldap: User object found at DN "uid=testuser,cn=users,cn=accounts,dc=enshore,dc=local" (1) ldap: Processing user attributes (1) ldap: WARNING: No "known good" password added. Ensure the admin user has permission to read the password attribute (1) ldap: WARNING: PAP authentication will *NOT* work with Active Directory (if that is what you were trying to configure) rlm_ldap (ldap): Released connection (5) Need 2 more connections to reach min connections (3) rlm_ldap (ldap): Opening additional connection (6), 1 of 31 pending slots used rlm_ldap (ldap): Connecting to ldap://ldap.enshore.local:389 rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful (1) [ldap] = ok (1) [expiration] = noop (1) [logintime] = noop (1) pap: WARNING: No "known good" password found for the user. Not setting Auth-Type (1) pap: WARNING: Authentication will fail unless a "known good" password is available (1) [pap] = noop (1) } # authorize = updated (1) Found Auth-Type = eap (1) # Executing group from file /etc/raddb/sites-enabled/default (1) authenticate { (1) eap: Expiring EAP session with state 0x92c3d0d092c3d4a5 (1) eap: Finished EAP session with state 0x92c3d0d092c3d4a5 (1) eap: Previous EAP request found for state 0x92c3d0d092c3d4a5, released from the list (1) eap: Peer sent packet with method EAP NAK (3) (1) eap: Found mutually acceptable type PEAP (25) (1) eap: Calling submodule eap_peap to process data (1) eap_peap: Initiating new EAP-TLS session (1) eap_peap: [eaptls start] = request (1) eap: Sending EAP Request (code 1) ID 1 length 6 (1) eap: EAP session adding &reply:State = 0x92c3d0d093c2c9a5 (1) [eap] = handled (1) } # authenticate = handled (1) Using Post-Auth-Type Challenge (1) # Executing group from file /etc/raddb/sites-enabled/default (1) Challenge { ... } # empty sub-section is ignored (1) Sent Access-Challenge Id 8 from 10.6.0.55:1812 to 10.6.0.7:40008 length 0 (1) EAP-Message = 0x010100061920 (1) Message-Authenticator = 0x00000000000000000000000000000000 (1) State = 0x92c3d0d093c2c9a525434af7d2954666 (1) Finished request Waking up in 4.8 seconds. (2) Received Access-Request Id 9 from 10.6.0.7:40008 to 10.6.0.55:1812 length 391 (2) User-Name = "testuser" (2) NAS-IP-Address = 10.6.0.7 (2) NAS-Identifier = "1eecdafa66fa" (2) Called-Station-Id = "1E-EC-DA-FA-66-FA:Enshore_devices" (2) NAS-Port-Type = Wireless-802.11 (2) Service-Type = Framed-User (2) Calling-Station-Id = "00-C0-CA-A8-86-B8" (2) Connect-Info = "CONNECT 0Mbps 802.11b" (2) Acct-Session-Id = "9B4368E812FDD014" (2) WLAN-Pairwise-Cipher = 1027076 (2) WLAN-Group-Cipher = 1027076 (2) WLAN-AKM-Suite = 1027073 (2) Framed-MTU = 1400 (2) EAP-Message = 0x020100ac1980000000a2160303009d0100009903035fb26f8872809d7cd2da6e65e0e117a7dc90641c26ea76374253005615eb062f00002ac02cc02bc030c02f009f009ec024c023c028c027c00ac009c014c013009d009c003d003c0035002f000a01000046000500050100000000000a00080006001d (2) State = 0x92c3d0d093c2c9a525434af7d2954666 (2) Message-Authenticator = 0x2b506628ac7239efcfe4aea4da612de9 (2) session-state: No cached attributes (2) # Executing section authorize from file /etc/raddb/sites-enabled/default (2) authorize { (2) policy filter_username { (2) if (&User-Name) { (2) if (&User-Name) -> TRUE (2) if (&User-Name) { (2) if (&User-Name =~ / /) { (2) if (&User-Name =~ / /) -> FALSE (2) if (&User-Name =~ /@[^@]*@/ ) { (2) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (2) if (&User-Name =~ /\.\./ ) { (2) if (&User-Name =~ /\.\./ ) -> FALSE (2) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (2) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (2) if (&User-Name =~ /\.$/) { (2) if (&User-Name =~ /\.$/) -> FALSE (2) if (&User-Name =~ /@\./) { (2) if (&User-Name =~ /@\./) -> FALSE (2) } # if (&User-Name) = notfound (2) } # policy filter_username = notfound (2) [preprocess] = ok (2) [chap] = noop (2) [mschap] = noop (2) [digest] = noop (2) suffix: Checking for suffix after "@" (2) suffix: No '@' in User-Name = "testuser", looking up realm NULL (2) suffix: No such realm "NULL" (2) [suffix] = noop (2) eap: Peer sent EAP Response (code 2) ID 1 length 172 (2) eap: Continuing tunnel setup (2) [eap] = ok (2) } # authorize = ok (2) Found Auth-Type = eap (2) # Executing group from file /etc/raddb/sites-enabled/default (2) authenticate { (2) eap: Expiring EAP session with state 0x92c3d0d093c2c9a5 (2) eap: Finished EAP session with state 0x92c3d0d093c2c9a5 (2) eap: Previous EAP request found for state 0x92c3d0d093c2c9a5, released from the list (2) eap: Peer sent packet with method EAP PEAP (25) (2) eap: Calling submodule eap_peap to process data (2) eap_peap: Continuing EAP-TLS (2) eap_peap: Peer indicated complete TLS record size will be 162 bytes (2) eap_peap: Got complete TLS record (162 bytes) (2) eap_peap: [eaptls verify] = length included (2) eap_peap: (other): before SSL initialization (2) eap_peap: TLS_accept: before SSL initialization (2) eap_peap: TLS_accept: before SSL initialization (2) eap_peap: <<< recv UNKNOWN TLS VERSION ?0304? [length 009d] (2) eap_peap: TLS_accept: SSLv3/TLS read client hello (2) eap_peap: >>> send TLS 1.2 [length 003d] (2) eap_peap: TLS_accept: SSLv3/TLS write server hello (2) eap_peap: >>> send TLS 1.2 [length 08e9] (2) eap_peap: TLS_accept: SSLv3/TLS write certificate (2) eap_peap: >>> send TLS 1.2 [length 014d] (2) eap_peap: TLS_accept: SSLv3/TLS write key exchange (2) eap_peap: >>> send TLS 1.2 [length 0004] (2) eap_peap: TLS_accept: SSLv3/TLS write server done (2) eap_peap: TLS_accept: Need to read more data: SSLv3/TLS write server done (2) eap_peap: In SSL Handshake Phase (2) eap_peap: In SSL Accept mode (2) eap_peap: [eaptls process] = handled (2) eap: Sending EAP Request (code 1) ID 2 length 1004 (2) eap: EAP session adding &reply:State = 0x92c3d0d090c1c9a5 (2) [eap] = handled (2) } # authenticate = handled (2) Using Post-Auth-Type Challenge (2) # Executing group from file /etc/raddb/sites-enabled/default (2) Challenge { ... } # empty sub-section is ignored (2) Sent Access-Challenge Id 9 from 10.6.0.55:1812 to 10.6.0.7:40008 length 0 (2) EAP-Message = 0x010203ec19c000000a8b160303003d020000390303d1cebf6528c862706bbed1c0ebf75912a8aa5716dbcf4a2f444f574e4752440100c030000011ff01000100000b0004030001020017000016030308e90b0008e50008e20003de308203da308202c2a003020102020101300d06092a864886f70d0101 (2) Message-Authenticator = 0x00000000000000000000000000000000 (2) State = 0x92c3d0d090c1c9a525434af7d2954666 (2) Finished request Waking up in 4.8 seconds. (3) Received Access-Request Id 10 from 10.6.0.7:40008 to 10.6.0.55:1812 length 225 (3) User-Name = "testuser" (3) NAS-IP-Address = 10.6.0.7 (3) NAS-Identifier = "1eecdafa66fa" (3) Called-Station-Id = "1E-EC-DA-FA-66-FA:Enshore_devices" (3) NAS-Port-Type = Wireless-802.11 (3) Service-Type = Framed-User (3) Calling-Station-Id = "00-C0-CA-A8-86-B8" (3) Connect-Info = "CONNECT 0Mbps 802.11b" (3) Acct-Session-Id = "9B4368E812FDD014" (3) WLAN-Pairwise-Cipher = 1027076 (3) WLAN-Group-Cipher = 1027076 (3) WLAN-AKM-Suite = 1027073 (3) Framed-MTU = 1400 (3) EAP-Message = 0x020200061900 (3) State = 0x92c3d0d090c1c9a525434af7d2954666 (3) Message-Authenticator = 0x56b23e0de05074fe8aadb57a5fd9a861 (3) session-state: No cached attributes (3) # Executing section authorize from file /etc/raddb/sites-enabled/default (3) authorize { (3) policy filter_username { (3) if (&User-Name) { (3) if (&User-Name) -> TRUE (3) if (&User-Name) { (3) if (&User-Name =~ / /) { (3) if (&User-Name =~ / /) -> FALSE (3) if (&User-Name =~ /@[^@]*@/ ) { (3) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (3) if (&User-Name =~ /\.\./ ) { (3) if (&User-Name =~ /\.\./ ) -> FALSE (3) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (3) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (3) if (&User-Name =~ /\.$/) { (3) if (&User-Name =~ /\.$/) -> FALSE (3) if (&User-Name =~ /@\./) { (3) if (&User-Name =~ /@\./) -> FALSE (3) } # if (&User-Name) = notfound (3) } # policy filter_username = notfound (3) [preprocess] = ok (3) [chap] = noop (3) [mschap] = noop (3) [digest] = noop (3) suffix: Checking for suffix after "@" (3) suffix: No '@' in User-Name = "testuser", looking up realm NULL (3) suffix: No such realm "NULL" (3) [suffix] = noop (3) eap: Peer sent EAP Response (code 2) ID 2 length 6 (3) eap: Continuing tunnel setup (3) [eap] = ok (3) } # authorize = ok (3) Found Auth-Type = eap (3) # Executing group from file /etc/raddb/sites-enabled/default (3) authenticate { (3) eap: Expiring EAP session with state 0x92c3d0d090c1c9a5 (3) eap: Finished EAP session with state 0x92c3d0d090c1c9a5 (3) eap: Previous EAP request found for state 0x92c3d0d090c1c9a5, released from the list (3) eap: Peer sent packet with method EAP PEAP (25) (3) eap: Calling submodule eap_peap to process data (3) eap_peap: Continuing EAP-TLS (3) eap_peap: Peer ACKed our handshake fragment (3) eap_peap: [eaptls verify] = request (3) eap_peap: [eaptls process] = handled (3) eap: Sending EAP Request (code 1) ID 3 length 1000 (3) eap: EAP session adding &reply:State = 0x92c3d0d091c0c9a5 (3) [eap] = handled (3) } # authenticate = handled (3) Using Post-Auth-Type Challenge (3) # Executing group from file /etc/raddb/sites-enabled/default (3) Challenge { ... } # empty sub-section is ignored (3) Sent Access-Challenge Id 10 from 10.6.0.55:1812 to 10.6.0.7:40008 length 0 (3) EAP-Message = 0x010303e81940e4b43f6dab55e3fc84e4fc6c578ed989a26c5889a9f864453cab2dd0f70196e30d53b93c59d3ce2fd3b08ab827cb45956fbfc11581b7f1a8c49e622fe3e7de263b5d79131cb72b78a5f38651b80004fe308204fa308203e2a0030201020214223191f52cde63cc77cb3e16630e5ab466f2 (3) Message-Authenticator = 0x00000000000000000000000000000000 (3) State = 0x92c3d0d091c0c9a525434af7d2954666 (3) Finished request Waking up in 4.8 seconds. (4) Received Access-Request Id 11 from 10.6.0.7:40008 to 10.6.0.55:1812 length 225 (4) User-Name = "testuser" (4) NAS-IP-Address = 10.6.0.7 (4) NAS-Identifier = "1eecdafa66fa" (4) Called-Station-Id = "1E-EC-DA-FA-66-FA:Enshore_devices" (4) NAS-Port-Type = Wireless-802.11 (4) Service-Type = Framed-User (4) Calling-Station-Id = "00-C0-CA-A8-86-B8" (4) Connect-Info = "CONNECT 0Mbps 802.11b" (4) Acct-Session-Id = "9B4368E812FDD014" (4) WLAN-Pairwise-Cipher = 1027076 (4) WLAN-Group-Cipher = 1027076 (4) WLAN-AKM-Suite = 1027073 (4) Framed-MTU = 1400 (4) EAP-Message = 0x020300061900 (4) State = 0x92c3d0d091c0c9a525434af7d2954666 (4) Message-Authenticator = 0x63cba1cada85053ab19227f32f164123 (4) session-state: No cached attributes (4) # Executing section authorize from file /etc/raddb/sites-enabled/default (4) authorize { (4) policy filter_username { (4) if (&User-Name) { (4) if (&User-Name) -> TRUE (4) if (&User-Name) { (4) if (&User-Name =~ / /) { (4) if (&User-Name =~ / /) -> FALSE (4) if (&User-Name =~ /@[^@]*@/ ) { (4) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (4) if (&User-Name =~ /\.\./ ) { (4) if (&User-Name =~ /\.\./ ) -> FALSE (4) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (4) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (4) if (&User-Name =~ /\.$/) { (4) if (&User-Name =~ /\.$/) -> FALSE (4) if (&User-Name =~ /@\./) { (4) if (&User-Name =~ /@\./) -> FALSE (4) } # if (&User-Name) = notfound (4) } # policy filter_username = notfound (4) [preprocess] = ok (4) [chap] = noop (4) [mschap] = noop (4) [digest] = noop (4) suffix: Checking for suffix after "@" (4) suffix: No '@' in User-Name = "testuser", looking up realm NULL (4) suffix: No such realm "NULL" (4) [suffix] = noop (4) eap: Peer sent EAP Response (code 2) ID 3 length 6 (4) eap: Continuing tunnel setup (4) [eap] = ok (4) } # authorize = ok (4) Found Auth-Type = eap (4) # Executing group from file /etc/raddb/sites-enabled/default (4) authenticate { (4) eap: Expiring EAP session with state 0x92c3d0d091c0c9a5 (4) eap: Finished EAP session with state 0x92c3d0d091c0c9a5 (4) eap: Previous EAP request found for state 0x92c3d0d091c0c9a5, released from the list (4) eap: Peer sent packet with method EAP PEAP (25) (4) eap: Calling submodule eap_peap to process data (4) eap_peap: Continuing EAP-TLS (4) eap_peap: Peer ACKed our handshake fragment (4) eap_peap: [eaptls verify] = request (4) eap_peap: [eaptls process] = handled (4) eap: Sending EAP Request (code 1) ID 4 length 717 (4) eap: EAP session adding &reply:State = 0x92c3d0d096c7c9a5 (4) [eap] = handled (4) } # authenticate = handled (4) Using Post-Auth-Type Challenge (4) # Executing group from file /etc/raddb/sites-enabled/default (4) Challenge { ... } # empty sub-section is ignored (4) Sent Access-Challenge Id 11 from 10.6.0.55:1812 to 10.6.0.7:40008 length 0 (4) EAP-Message = 0x010402cd1900de63cc77cb3e16630e5ab466f2e3a1300f0603551d130101ff040530030101ff30360603551d1f042f302d302ba029a0278625687474703a2f2f7777772e6578616d706c652e6f72672f6578616d706c655f63612e63726c300d06092a864886f70d01010b050003820101002ef0f49026 (4) Message-Authenticator = 0x00000000000000000000000000000000 (4) State = 0x92c3d0d096c7c9a525434af7d2954666 (4) Finished request Waking up in 4.8 seconds. (5) Received Access-Request Id 12 from 10.6.0.7:40008 to 10.6.0.55:1812 length 355 (5) User-Name = "testuser" (5) NAS-IP-Address = 10.6.0.7 (5) NAS-Identifier = "1eecdafa66fa" (5) Called-Station-Id = "1E-EC-DA-FA-66-FA:Enshore_devices" (5) NAS-Port-Type = Wireless-802.11 (5) Service-Type = Framed-User (5) Calling-Station-Id = "00-C0-CA-A8-86-B8" (5) Connect-Info = "CONNECT 0Mbps 802.11b" (5) Acct-Session-Id = "9B4368E812FDD014" (5) WLAN-Pairwise-Cipher = 1027076 (5) WLAN-Group-Cipher = 1027076 (5) WLAN-AKM-Suite = 1027073 (5) Framed-MTU = 1400 (5) EAP-Message = 0x0204008819800000007e1603030046100000424104085bfc7c8266b86dfb5d76f528d574232b49622dce74bf853508973d680f17e0f5f21966dcad1e5ae873515122b9326cfe93dfc48fd90a2897c7f0e9fb3e9e2c14030300010116030300280000000000000000751eb8090c275324806a011f6b91b9 (5) State = 0x92c3d0d096c7c9a525434af7d2954666 (5) Message-Authenticator = 0xeb17bc3cc5900403724665b9d9345c26 (5) session-state: No cached attributes (5) # Executing section authorize from file /etc/raddb/sites-enabled/default (5) authorize { (5) policy filter_username { (5) if (&User-Name) { (5) if (&User-Name) -> TRUE (5) if (&User-Name) { (5) if (&User-Name =~ / /) { (5) if (&User-Name =~ / /) -> FALSE (5) if (&User-Name =~ /@[^@]*@/ ) { (5) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (5) if (&User-Name =~ /\.\./ ) { (5) if (&User-Name =~ /\.\./ ) -> FALSE (5) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (5) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (5) if (&User-Name =~ /\.$/) { (5) if (&User-Name =~ /\.$/) -> FALSE (5) if (&User-Name =~ /@\./) { (5) if (&User-Name =~ /@\./) -> FALSE (5) } # if (&User-Name) = notfound (5) } # policy filter_username = notfound (5) [preprocess] = ok (5) [chap] = noop (5) [mschap] = noop (5) [digest] = noop (5) suffix: Checking for suffix after "@" (5) suffix: No '@' in User-Name = "testuser", looking up realm NULL (5) suffix: No such realm "NULL" (5) [suffix] = noop (5) eap: Peer sent EAP Response (code 2) ID 4 length 136 (5) eap: Continuing tunnel setup (5) [eap] = ok (5) } # authorize = ok (5) Found Auth-Type = eap (5) # Executing group from file /etc/raddb/sites-enabled/default (5) authenticate { (5) eap: Expiring EAP session with state 0x92c3d0d096c7c9a5 (5) eap: Finished EAP session with state 0x92c3d0d096c7c9a5 (5) eap: Previous EAP request found for state 0x92c3d0d096c7c9a5, released from the list (5) eap: Peer sent packet with method EAP PEAP (25) (5) eap: Calling submodule eap_peap to process data (5) eap_peap: Continuing EAP-TLS (5) eap_peap: Peer indicated complete TLS record size will be 126 bytes (5) eap_peap: Got complete TLS record (126 bytes) (5) eap_peap: [eaptls verify] = length included (5) eap_peap: TLS_accept: SSLv3/TLS write server done (5) eap_peap: <<< recv TLS 1.2 [length 0046] (5) eap_peap: TLS_accept: SSLv3/TLS read client key exchange (5) eap_peap: TLS_accept: SSLv3/TLS read change cipher spec (5) eap_peap: <<< recv TLS 1.2 [length 0010] (5) eap_peap: TLS_accept: SSLv3/TLS read finished (5) eap_peap: >>> send TLS 1.2 [length 0001] (5) eap_peap: TLS_accept: SSLv3/TLS write change cipher spec (5) eap_peap: >>> send TLS 1.2 [length 0010] (5) eap_peap: TLS_accept: SSLv3/TLS write finished (5) eap_peap: (other): SSL negotiation finished successfully (5) eap_peap: SSL Connection Established (5) eap_peap: [eaptls process] = handled (5) eap: Sending EAP Request (code 1) ID 5 length 57 (5) eap: EAP session adding &reply:State = 0x92c3d0d097c6c9a5 (5) [eap] = handled (5) } # authenticate = handled (5) Using Post-Auth-Type Challenge (5) # Executing group from file /etc/raddb/sites-enabled/default (5) Challenge { ... } # empty sub-section is ignored (5) Sent Access-Challenge Id 12 from 10.6.0.55:1812 to 10.6.0.7:40008 length 0 (5) EAP-Message = 0x0105003919001403030001011603030028ddfc57d7d1261818672b485b7449aa39843091bdc9bda07e1ccf35d72b1ebe428fb8d7c6acedd3c3 (5) Message-Authenticator = 0x00000000000000000000000000000000 (5) State = 0x92c3d0d097c6c9a525434af7d2954666 (5) Finished request Waking up in 4.7 seconds. (0) Cleaning up request packet ID 7 with timestamp +2902 Waking up in 0.1 seconds. (1) Cleaning up request packet ID 8 with timestamp +2902 (2) Cleaning up request packet ID 9 with timestamp +2903 (3) Cleaning up request packet ID 10 with timestamp +2903 (4) Cleaning up request packet ID 11 with timestamp +2903 (5) Cleaning up request packet ID 12 with timestamp +2903 Ready to process requests (6) Received Access-Request Id 13 from 10.6.0.7:40008 to 10.6.0.55:1812 length 225 (6) User-Name = "testuser" (6) NAS-IP-Address = 10.6.0.7 (6) NAS-Identifier = "1eecdafa66fa" (6) Called-Station-Id = "1E-EC-DA-FA-66-FA:Enshore_devices" (6) NAS-Port-Type = Wireless-802.11 (6) Service-Type = Framed-User (6) Calling-Station-Id = "00-C0-CA-A8-86-B8" (6) Connect-Info = "CONNECT 0Mbps 802.11b" (6) Acct-Session-Id = "9B4368E812FDD014" (6) WLAN-Pairwise-Cipher = 1027076 (6) WLAN-Group-Cipher = 1027076 (6) WLAN-AKM-Suite = 1027073 (6) Framed-MTU = 1400 (6) EAP-Message = 0x020500061900 (6) State = 0x92c3d0d097c6c9a525434af7d2954666 (6) Message-Authenticator = 0x955e15103cdbb71c24368b63b67c31ce (6) session-state: No cached attributes (6) # Executing section authorize from file /etc/raddb/sites-enabled/default (6) authorize { (6) policy filter_username { (6) if (&User-Name) { (6) if (&User-Name) -> TRUE (6) if (&User-Name) { (6) if (&User-Name =~ / /) { (6) if (&User-Name =~ / /) -> FALSE (6) if (&User-Name =~ /@[^@]*@/ ) { (6) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (6) if (&User-Name =~ /\.\./ ) { (6) if (&User-Name =~ /\.\./ ) -> FALSE (6) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (6) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (6) if (&User-Name =~ /\.$/) { (6) if (&User-Name =~ /\.$/) -> FALSE (6) if (&User-Name =~ /@\./) { (6) if (&User-Name =~ /@\./) -> FALSE (6) } # if (&User-Name) = notfound (6) } # policy filter_username = notfound (6) [preprocess] = ok (6) [chap] = noop (6) [mschap] = noop (6) [digest] = noop (6) suffix: Checking for suffix after "@" (6) suffix: No '@' in User-Name = "testuser", looking up realm NULL (6) suffix: No such realm "NULL" (6) [suffix] = noop (6) eap: Peer sent EAP Response (code 2) ID 5 length 6 (6) eap: Continuing tunnel setup (6) [eap] = ok (6) } # authorize = ok (6) Found Auth-Type = eap (6) # Executing group from file /etc/raddb/sites-enabled/default (6) authenticate { (6) eap: Expiring EAP session with state 0x92c3d0d097c6c9a5 (6) eap: Finished EAP session with state 0x92c3d0d097c6c9a5 (6) eap: Previous EAP request found for state 0x92c3d0d097c6c9a5, released from the list (6) eap: Peer sent packet with method EAP PEAP (25) (6) eap: Calling submodule eap_peap to process data (6) eap_peap: Continuing EAP-TLS (6) eap_peap: Peer ACKed our handshake fragment. handshake is finished (6) eap_peap: [eaptls verify] = success (6) eap_peap: [eaptls process] = success (6) eap_peap: Session established. Decoding tunneled attributes (6) eap_peap: PEAP state TUNNEL ESTABLISHED (6) eap: Sending EAP Request (code 1) ID 6 length 40 (6) eap: EAP session adding &reply:State = 0x92c3d0d094c5c9a5 (6) [eap] = handled (6) } # authenticate = handled (6) Using Post-Auth-Type Challenge (6) # Executing group from file /etc/raddb/sites-enabled/default (6) Challenge { ... } # empty sub-section is ignored (6) Sent Access-Challenge Id 13 from 10.6.0.55:1812 to 10.6.0.7:40008 length 0 (6) EAP-Message = 0x010600281900170303001dddfc57d7d12618190d68d65aeac205380b1dfd2f9d587c0afe9113c7c5 (6) Message-Authenticator = 0x00000000000000000000000000000000 (6) State = 0x92c3d0d094c5c9a525434af7d2954666 (6) Finished request Waking up in 4.9 seconds. (7) Received Access-Request Id 14 from 10.6.0.7:40008 to 10.6.0.55:1812 length 263 (7) User-Name = "testuser" (7) NAS-IP-Address = 10.6.0.7 (7) NAS-Identifier = "1eecdafa66fa" (7) Called-Station-Id = "1E-EC-DA-FA-66-FA:Enshore_devices" (7) NAS-Port-Type = Wireless-802.11 (7) Service-Type = Framed-User (7) Calling-Station-Id = "00-C0-CA-A8-86-B8" (7) Connect-Info = "CONNECT 0Mbps 802.11b" (7) Acct-Session-Id = "9B4368E812FDD014" (7) WLAN-Pairwise-Cipher = 1027076 (7) WLAN-Group-Cipher = 1027076 (7) WLAN-AKM-Suite = 1027073 (7) Framed-MTU = 1400 (7) EAP-Message = 0x0206002c190017030300210000000000000001e11f6e17247860da9f97e3a4c793f871687b601a9937201a06 (7) State = 0x92c3d0d094c5c9a525434af7d2954666 (7) Message-Authenticator = 0x47a64658f1a4a57d558176fb57ef2127 (7) session-state: No cached attributes (7) # Executing section authorize from file /etc/raddb/sites-enabled/default (7) authorize { (7) policy filter_username { (7) if (&User-Name) { (7) if (&User-Name) -> TRUE (7) if (&User-Name) { (7) if (&User-Name =~ / /) { (7) if (&User-Name =~ / /) -> FALSE (7) if (&User-Name =~ /@[^@]*@/ ) { (7) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (7) if (&User-Name =~ /\.\./ ) { (7) if (&User-Name =~ /\.\./ ) -> FALSE (7) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (7) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (7) if (&User-Name =~ /\.$/) { (7) if (&User-Name =~ /\.$/) -> FALSE (7) if (&User-Name =~ /@\./) { (7) if (&User-Name =~ /@\./) -> FALSE (7) } # if (&User-Name) = notfound (7) } # policy filter_username = notfound (7) [preprocess] = ok (7) [chap] = noop (7) [mschap] = noop (7) [digest] = noop (7) suffix: Checking for suffix after "@" (7) suffix: No '@' in User-Name = "testuser", looking up realm NULL (7) suffix: No such realm "NULL" (7) [suffix] = noop (7) eap: Peer sent EAP Response (code 2) ID 6 length 44 (7) eap: Continuing tunnel setup (7) [eap] = ok (7) } # authorize = ok (7) Found Auth-Type = eap (7) # Executing group from file /etc/raddb/sites-enabled/default (7) authenticate { (7) eap: Expiring EAP session with state 0x92c3d0d094c5c9a5 (7) eap: Finished EAP session with state 0x92c3d0d094c5c9a5 (7) eap: Previous EAP request found for state 0x92c3d0d094c5c9a5, released from the list (7) eap: Peer sent packet with method EAP PEAP (25) (7) eap: Calling submodule eap_peap to process data (7) eap_peap: Continuing EAP-TLS (7) eap_peap: [eaptls verify] = ok (7) eap_peap: Done initial handshake (7) eap_peap: [eaptls process] = ok (7) eap_peap: Session established. Decoding tunneled attributes (7) eap_peap: PEAP state WAITING FOR INNER IDENTITY (7) eap_peap: Identity - testuser (7) eap_peap: Got inner identity 'testuser' (7) eap_peap: Setting default EAP type for tunneled EAP session (7) eap_peap: Got tunneled request (7) eap_peap: EAP-Message = 0x0206000d017465737475736572 (7) eap_peap: Setting User-Name to testuser (7) eap_peap: Sending tunneled request to inner-tunnel (7) eap_peap: EAP-Message = 0x0206000d017465737475736572 (7) eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1 (7) eap_peap: User-Name = "testuser" (7) Virtual server inner-tunnel received request (7) EAP-Message = 0x0206000d017465737475736572 (7) FreeRADIUS-Proxied-To = 127.0.0.1 (7) User-Name = "testuser" (7) WARNING: Outer and inner identities are the same. User privacy is compromised. (7) server inner-tunnel { (7) # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel (7) authorize { (7) policy filter_username { (7) if (&User-Name) { (7) if (&User-Name) -> TRUE (7) if (&User-Name) { (7) if (&User-Name =~ / /) { (7) if (&User-Name =~ / /) -> FALSE (7) if (&User-Name =~ /@[^@]*@/ ) { (7) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (7) if (&User-Name =~ /\.\./ ) { (7) if (&User-Name =~ /\.\./ ) -> FALSE (7) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (7) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (7) if (&User-Name =~ /\.$/) { (7) if (&User-Name =~ /\.$/) -> FALSE (7) if (&User-Name =~ /@\./) { (7) if (&User-Name =~ /@\./) -> FALSE (7) } # if (&User-Name) = notfound (7) } # policy filter_username = notfound (7) [chap] = noop (7) [mschap] = noop (7) suffix: Checking for suffix after "@" (7) suffix: No '@' in User-Name = "testuser", looking up realm NULL (7) suffix: No such realm "NULL" (7) [suffix] = noop (7) update control { (7) &Proxy-To-Realm := LOCAL (7) } # update control = noop (7) eap: Peer sent EAP Response (code 2) ID 6 length 13 (7) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (7) [eap] = ok (7) } # authorize = ok (7) Found Auth-Type = eap (7) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (7) authenticate { (7) eap: Peer sent packet with method EAP Identity (1) (7) eap: Calling submodule eap_mschapv2 to process data (7) eap_mschapv2: Issuing Challenge (7) eap: Sending EAP Request (code 1) ID 7 length 43 (7) eap: EAP session adding &reply:State = 0x24cfe19d24c8fb3e (7) [eap] = handled (7) } # authenticate = handled (7) } # server inner-tunnel (7) Virtual server sending reply (7) EAP-Message = 0x0107002b1a0107002610d6212fed1f816228f19f0b693faa346a667265657261646975732d332e302e3137 (7) Message-Authenticator = 0x00000000000000000000000000000000 (7) State = 0x24cfe19d24c8fb3ecc4639231f9f13d1 (7) eap_peap: Got tunneled reply code 11 (7) eap_peap: EAP-Message = 0x0107002b1a0107002610d6212fed1f816228f19f0b693faa346a667265657261646975732d332e302e3137 (7) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (7) eap_peap: State = 0x24cfe19d24c8fb3ecc4639231f9f13d1 (7) eap_peap: Got tunneled reply RADIUS code 11 (7) eap_peap: EAP-Message = 0x0107002b1a0107002610d6212fed1f816228f19f0b693faa346a667265657261646975732d332e302e3137 (7) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (7) eap_peap: State = 0x24cfe19d24c8fb3ecc4639231f9f13d1 (7) eap_peap: Got tunneled Access-Challenge (7) eap: Sending EAP Request (code 1) ID 7 length 74 (7) eap: EAP session adding &reply:State = 0x92c3d0d095c4c9a5 (7) [eap] = handled (7) } # authenticate = handled (7) Using Post-Auth-Type Challenge (7) # Executing group from file /etc/raddb/sites-enabled/default (7) Challenge { ... } # empty sub-section is ignored (7) Sent Access-Challenge Id 14 from 10.6.0.55:1812 to 10.6.0.7:40008 length 0 (7) EAP-Message = 0x0107004a1900170303003fddfc57d7d126181afde47b07d25a0465204a7d0d8c3e707099c53f063cf8b936808059c9d1bdcae78882142d1b220d29aaec866f4505c0b1e410437451b47d (7) Message-Authenticator = 0x00000000000000000000000000000000 (7) State = 0x92c3d0d095c4c9a525434af7d2954666 (7) Finished request Waking up in 4.9 seconds. (8) Received Access-Request Id 15 from 10.6.0.7:40008 to 10.6.0.55:1812 length 317 (8) User-Name = "testuser" (8) NAS-IP-Address = 10.6.0.7 (8) NAS-Identifier = "1eecdafa66fa" (8) Called-Station-Id = "1E-EC-DA-FA-66-FA:Enshore_devices" (8) NAS-Port-Type = Wireless-802.11 (8) Service-Type = Framed-User (8) Calling-Station-Id = "00-C0-CA-A8-86-B8" (8) Connect-Info = "CONNECT 0Mbps 802.11b" (8) Acct-Session-Id = "9B4368E812FDD014" (8) WLAN-Pairwise-Cipher = 1027076 (8) WLAN-Group-Cipher = 1027076 (8) WLAN-AKM-Suite = 1027073 (8) Framed-MTU = 1400 (8) EAP-Message = 0x02070062190017030300570000000000000002f8039045318cf6303285f028bc1d49f0873ec6a5e6498484f235c11417baab94bafaf7ca4e07ae1edf13044969d0545997a4e3be5687e34508ea81ae60218b86859c0d795838f89a3b79e559ea8442 (8) State = 0x92c3d0d095c4c9a525434af7d2954666 (8) Message-Authenticator = 0xa268408e4015c142c9ad8d9a4c418b1a (8) session-state: No cached attributes (8) # Executing section authorize from file /etc/raddb/sites-enabled/default (8) authorize { (8) policy filter_username { (8) if (&User-Name) { (8) if (&User-Name) -> TRUE (8) if (&User-Name) { (8) if (&User-Name =~ / /) { (8) if (&User-Name =~ / /) -> FALSE (8) if (&User-Name =~ /@[^@]*@/ ) { (8) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (8) if (&User-Name =~ /\.\./ ) { (8) if (&User-Name =~ /\.\./ ) -> FALSE (8) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (8) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (8) if (&User-Name =~ /\.$/) { (8) if (&User-Name =~ /\.$/) -> FALSE (8) if (&User-Name =~ /@\./) { (8) if (&User-Name =~ /@\./) -> FALSE (8) } # if (&User-Name) = notfound (8) } # policy filter_username = notfound (8) [preprocess] = ok (8) [chap] = noop (8) [mschap] = noop (8) [digest] = noop (8) suffix: Checking for suffix after "@" (8) suffix: No '@' in User-Name = "testuser", looking up realm NULL (8) suffix: No such realm "NULL" (8) [suffix] = noop (8) eap: Peer sent EAP Response (code 2) ID 7 length 98 (8) eap: Continuing tunnel setup (8) [eap] = ok (8) } # authorize = ok (8) Found Auth-Type = eap (8) # Executing group from file /etc/raddb/sites-enabled/default (8) authenticate { (8) eap: Expiring EAP session with state 0x24cfe19d24c8fb3e (8) eap: Finished EAP session with state 0x92c3d0d095c4c9a5 (8) eap: Previous EAP request found for state 0x92c3d0d095c4c9a5, released from the list (8) eap: Peer sent packet with method EAP PEAP (25) (8) eap: Calling submodule eap_peap to process data (8) eap_peap: Continuing EAP-TLS (8) eap_peap: [eaptls verify] = ok (8) eap_peap: Done initial handshake (8) eap_peap: [eaptls process] = ok (8) eap_peap: Session established. Decoding tunneled attributes (8) eap_peap: PEAP state phase2 (8) eap_peap: EAP method MSCHAPv2 (26) (8) eap_peap: Got tunneled request (8) eap_peap: EAP-Message = 0x020700431a0207003e310aa4521f7380e37bb9ce69f7348f33a20000000000000000338e33cb3e3bcfc5ea40324aa7a24d6dd2f1c94ad582bba0007465737475736572 (8) eap_peap: Setting User-Name to testuser (8) eap_peap: Sending tunneled request to inner-tunnel (8) eap_peap: EAP-Message = 0x020700431a0207003e310aa4521f7380e37bb9ce69f7348f33a20000000000000000338e33cb3e3bcfc5ea40324aa7a24d6dd2f1c94ad582bba0007465737475736572 (8) eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1 (8) eap_peap: User-Name = "testuser" (8) eap_peap: State = 0x24cfe19d24c8fb3ecc4639231f9f13d1 (8) Virtual server inner-tunnel received request (8) EAP-Message = 0x020700431a0207003e310aa4521f7380e37bb9ce69f7348f33a20000000000000000338e33cb3e3bcfc5ea40324aa7a24d6dd2f1c94ad582bba0007465737475736572 (8) FreeRADIUS-Proxied-To = 127.0.0.1 (8) User-Name = "testuser" (8) State = 0x24cfe19d24c8fb3ecc4639231f9f13d1 (8) WARNING: Outer and inner identities are the same. User privacy is compromised. (8) server inner-tunnel { (8) session-state: No cached attributes (8) # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel (8) authorize { (8) policy filter_username { (8) if (&User-Name) { (8) if (&User-Name) -> TRUE (8) if (&User-Name) { (8) if (&User-Name =~ / /) { (8) if (&User-Name =~ / /) -> FALSE (8) if (&User-Name =~ /@[^@]*@/ ) { (8) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (8) if (&User-Name =~ /\.\./ ) { (8) if (&User-Name =~ /\.\./ ) -> FALSE (8) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (8) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (8) if (&User-Name =~ /\.$/) { (8) if (&User-Name =~ /\.$/) -> FALSE (8) if (&User-Name =~ /@\./) { (8) if (&User-Name =~ /@\./) -> FALSE (8) } # if (&User-Name) = notfound (8) } # policy filter_username = notfound (8) [chap] = noop (8) [mschap] = noop (8) suffix: Checking for suffix after "@" (8) suffix: No '@' in User-Name = "testuser", looking up realm NULL (8) suffix: No such realm "NULL" (8) [suffix] = noop (8) update control { (8) &Proxy-To-Realm := LOCAL (8) } # update control = noop (8) eap: Peer sent EAP Response (code 2) ID 7 length 67 (8) eap: No EAP Start, assuming it's an on-going EAP conversation (8) [eap] = updated (8) [files] = noop rlm_ldap (ldap): Reserved connection (5) (8) ldap: EXPAND (uid=%{User-Name}) (8) ldap: --> (uid=testuser) (8) ldap: Performing search in "cn=users,cn=accounts,dc=enshore,dc=local" with filter "(uid=testuser)", scope "sub" (8) ldap: Waiting for search result... (8) ldap: User object found at DN "uid=testuser,cn=users,cn=accounts,dc=enshore,dc=local" (8) ldap: Processing user attributes (8) ldap: WARNING: No "known good" password added. Ensure the admin user has permission to read the password attribute (8) ldap: WARNING: PAP authentication will *NOT* work with Active Directory (if that is what you were trying to configure) rlm_ldap (ldap): Released connection (5) Need 1 more connections to reach min connections (3) rlm_ldap (ldap): Opening additional connection (7), 1 of 30 pending slots used rlm_ldap (ldap): Connecting to ldap://ldap.enshore.local:389 rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful (8) [ldap] = ok (8) [expiration] = noop (8) [logintime] = noop (8) [pap] = noop (8) } # authorize = updated (8) Found Auth-Type = eap (8) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (8) authenticate { (8) eap: Expiring EAP session with state 0x24cfe19d24c8fb3e (8) eap: Finished EAP session with state 0x24cfe19d24c8fb3e (8) eap: Previous EAP request found for state 0x24cfe19d24c8fb3e, released from the list (8) eap: Peer sent packet with method EAP MSCHAPv2 (26) (8) eap: Calling submodule eap_mschapv2 to process data (8) eap_mschapv2: # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (8) eap_mschapv2: authenticate { (8) mschap: WARNING: No Cleartext-Password configured. Cannot create NT-Password (8) mschap: WARNING: No Cleartext-Password configured. Cannot create LM-Password (8) mschap: Creating challenge hash with username: testuser (8) mschap: Client is using MS-CHAPv2 (8) mschap: ERROR: FAILED: No NT/LM-Password. Cannot perform authentication (8) mschap: ERROR: MS-CHAP2-Response is incorrect (8) [mschap] = reject (8) } # authenticate = reject (8) eap: Sending EAP Failure (code 4) ID 7 length 4 (8) eap: Freeing handler (8) [eap] = reject (8) } # authenticate = reject (8) Failed to authenticate the user (8) Using Post-Auth-Type Reject (8) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (8) Post-Auth-Type REJECT { (8) attr_filter.access_reject: EXPAND %{User-Name} (8) attr_filter.access_reject: --> testuser (8) attr_filter.access_reject: Matched entry DEFAULT at line 11 (8) [attr_filter.access_reject] = updated (8) update outer.session-state { (8) &Module-Failure-Message := &request:Module-Failure-Message -> 'mschap: FAILED: No NT/LM-Password. Cannot perform authentication' (8) } # update outer.session-state = noop (8) } # Post-Auth-Type REJECT = updated (8) } # server inner-tunnel (8) Virtual server sending reply (8) MS-CHAP-Error = "\007E=691 R=1 C=6a10e7778ba28c87db4965f4aab356fa V=3 M=Authentication rejected" (8) EAP-Message = 0x04070004 (8) Message-Authenticator = 0x00000000000000000000000000000000 (8) eap_peap: Got tunneled reply code 3 (8) eap_peap: MS-CHAP-Error = "\007E=691 R=1 C=6a10e7778ba28c87db4965f4aab356fa V=3 M=Authentication rejected" (8) eap_peap: EAP-Message = 0x04070004 (8) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (8) eap_peap: Got tunneled reply RADIUS code 3 (8) eap_peap: MS-CHAP-Error = "\007E=691 R=1 C=6a10e7778ba28c87db4965f4aab356fa V=3 M=Authentication rejected" (8) eap_peap: EAP-Message = 0x04070004 (8) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (8) eap_peap: Tunneled authentication was rejected (8) eap_peap: FAILURE (8) eap: Sending EAP Request (code 1) ID 8 length 46 (8) eap: EAP session adding &reply:State = 0x92c3d0d09acbc9a5 (8) [eap] = handled (8) } # authenticate = handled (8) Using Post-Auth-Type Challenge (8) # Executing group from file /etc/raddb/sites-enabled/default (8) Challenge { ... } # empty sub-section is ignored (8) session-state: Saving cached attributes (8) Module-Failure-Message := "mschap: FAILED: No NT/LM-Password. Cannot perform authentication" (8) Sent Access-Challenge Id 15 from 10.6.0.55:1812 to 10.6.0.7:40008 length 0 (8) EAP-Message = 0x0108002e19001703030023ddfc57d7d126181b30febe6a5eacb34adb7c8b88b67d20c92865fc6ad46595069f4a4c (8) Message-Authenticator = 0x00000000000000000000000000000000 (8) State = 0x92c3d0d09acbc9a525434af7d2954666 (8) Finished request Waking up in 4.8 seconds. (9) Received Access-Request Id 16 from 10.6.0.7:40008 to 10.6.0.55:1812 length 265 (9) User-Name = "testuser" (9) NAS-IP-Address = 10.6.0.7 (9) NAS-Identifier = "1eecdafa66fa" (9) Called-Station-Id = "1E-EC-DA-FA-66-FA:Enshore_devices" (9) NAS-Port-Type = Wireless-802.11 (9) Service-Type = Framed-User (9) Calling-Station-Id = "00-C0-CA-A8-86-B8" (9) Connect-Info = "CONNECT 0Mbps 802.11b" (9) Acct-Session-Id = "9B4368E812FDD014" (9) WLAN-Pairwise-Cipher = 1027076 (9) WLAN-Group-Cipher = 1027076 (9) WLAN-AKM-Suite = 1027073 (9) Framed-MTU = 1400 (9) EAP-Message = 0x0208002e190017030300230000000000000003fa973714b24ef48d3c15423ff5552e9fae84d05c186835ecb343ba (9) State = 0x92c3d0d09acbc9a525434af7d2954666 (9) Message-Authenticator = 0xafe70738e6525b066914d4420f77edc3 (9) Restoring &session-state (9) &session-state:Module-Failure-Message := "mschap: FAILED: No NT/LM-Password. Cannot perform authentication" (9) # Executing section authorize from file /etc/raddb/sites-enabled/default (9) authorize { (9) policy filter_username { (9) if (&User-Name) { (9) if (&User-Name) -> TRUE (9) if (&User-Name) { (9) if (&User-Name =~ / /) { (9) if (&User-Name =~ / /) -> FALSE (9) if (&User-Name =~ /@[^@]*@/ ) { (9) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (9) if (&User-Name =~ /\.\./ ) { (9) if (&User-Name =~ /\.\./ ) -> FALSE (9) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (9) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (9) if (&User-Name =~ /\.$/) { (9) if (&User-Name =~ /\.$/) -> FALSE (9) if (&User-Name =~ /@\./) { (9) if (&User-Name =~ /@\./) -> FALSE (9) } # if (&User-Name) = notfound (9) } # policy filter_username = notfound (9) [preprocess] = ok (9) [chap] = noop (9) [mschap] = noop (9) [digest] = noop (9) suffix: Checking for suffix after "@" (9) suffix: No '@' in User-Name = "testuser", looking up realm NULL (9) suffix: No such realm "NULL" (9) [suffix] = noop (9) eap: Peer sent EAP Response (code 2) ID 8 length 46 (9) eap: Continuing tunnel setup (9) [eap] = ok (9) } # authorize = ok (9) Found Auth-Type = eap (9) # Executing group from file /etc/raddb/sites-enabled/default (9) authenticate { (9) eap: Expiring EAP session with state 0x92c3d0d09acbc9a5 (9) eap: Finished EAP session with state 0x92c3d0d09acbc9a5 (9) eap: Previous EAP request found for state 0x92c3d0d09acbc9a5, released from the list (9) eap: Peer sent packet with method EAP PEAP (25) (9) eap: Calling submodule eap_peap to process data (9) eap_peap: Continuing EAP-TLS (9) eap_peap: [eaptls verify] = ok (9) eap_peap: Done initial handshake (9) eap_peap: [eaptls process] = ok (9) eap_peap: Session established. Decoding tunneled attributes (9) eap_peap: PEAP state send tlv failure (9) eap_peap: Received EAP-TLV response (9) eap_peap: ERROR: The users session was previously rejected: returning reject (again.) (9) eap_peap: This means you need to read the PREVIOUS messages in the debug output (9) eap_peap: to find out the reason why the user was rejected (9) eap_peap: Look for "reject" or "fail". Those earlier messages will tell you (9) eap_peap: what went wrong, and how to fix the problem (9) eap: ERROR: Failed continuing EAP PEAP (25) session. EAP sub-module failed (9) eap: Sending EAP Failure (code 4) ID 8 length 4 (9) eap: Failed in EAP select (9) [eap] = invalid (9) } # authenticate = invalid (9) Failed to authenticate the user (9) Using Post-Auth-Type Reject (9) # Executing group from file /etc/raddb/sites-enabled/default (9) Post-Auth-Type REJECT { (9) attr_filter.access_reject: EXPAND %{User-Name} (9) attr_filter.access_reject: --> testuser (9) attr_filter.access_reject: Matched entry DEFAULT at line 11 (9) [attr_filter.access_reject] = updated (9) [eap] = noop (9) policy remove_reply_message_if_eap { (9) if (&reply:EAP-Message && &reply:Reply-Message) { (9) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE (9) else { (9) [noop] = noop (9) } # else = noop (9) } # policy remove_reply_message_if_eap = noop (9) } # Post-Auth-Type REJECT = updated (9) Delaying response for 1.000000 seconds Waking up in 0.3 seconds. Waking up in 0.6 seconds. (9) Sending delayed response (9) Sent Access-Reject Id 16 from 10.6.0.55:1812 to 10.6.0.7:40008 length 44 (9) EAP-Message = 0x04080004 (9) Message-Authenticator = 0x00000000000000000000000000000000 Waking up in 3.8 seconds. (6) Cleaning up request packet ID 13 with timestamp +2924 (7) Cleaning up request packet ID 14 with timestamp +2924 Waking up in 0.1 seconds. (8) Cleaning up request packet ID 15 with timestamp +2924 (9) Cleaning up request packet ID 16 with timestamp +2924 Ready to process requests (10) Received Access-Request Id 5 from 10.6.0.7:35698 to 10.6.0.55:1812 length 214 (10) User-Name = "testuser" (10) NAS-IP-Address = 10.6.0.7 (10) NAS-Identifier = "1eecdafb66fa" (10) Called-Station-Id = "1E-EC-DA-FB-66-FA:Enshore_devices" (10) NAS-Port-Type = Wireless-802.11 (10) Service-Type = Framed-User (10) Calling-Station-Id = "00-C0-CA-A8-86-B8" (10) Connect-Info = "CONNECT 0Mbps 802.11b" (10) Acct-Session-Id = "AACC40B5C11DF06A" (10) WLAN-Pairwise-Cipher = 1027076 (10) WLAN-Group-Cipher = 1027076 (10) WLAN-AKM-Suite = 1027073 (10) Framed-MTU = 1400 (10) EAP-Message = 0x0234000d017465737475736572 (10) Message-Authenticator = 0x9adc7b8118afb5a5c0424df620214bd7 (10) # Executing section authorize from file /etc/raddb/sites-enabled/default (10) authorize { (10) policy filter_username { (10) if (&User-Name) { (10) if (&User-Name) -> TRUE (10) if (&User-Name) { (10) if (&User-Name =~ / /) { (10) if (&User-Name =~ / /) -> FALSE (10) if (&User-Name =~ /@[^@]*@/ ) { (10) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (10) if (&User-Name =~ /\.\./ ) { (10) if (&User-Name =~ /\.\./ ) -> FALSE (10) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (10) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (10) if (&User-Name =~ /\.$/) { (10) if (&User-Name =~ /\.$/) -> FALSE (10) if (&User-Name =~ /@\./) { (10) if (&User-Name =~ /@\./) -> FALSE (10) } # if (&User-Name) = notfound (10) } # policy filter_username = notfound (10) [preprocess] = ok (10) [chap] = noop (10) [mschap] = noop (10) [digest] = noop (10) suffix: Checking for suffix after "@" (10) suffix: No '@' in User-Name = "testuser", looking up realm NULL (10) suffix: No such realm "NULL" (10) [suffix] = noop (10) eap: Peer sent EAP Response (code 2) ID 52 length 13 (10) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (10) [eap] = ok (10) } # authorize = ok (10) Found Auth-Type = eap (10) # Executing group from file /etc/raddb/sites-enabled/default (10) authenticate { (10) eap: Peer sent packet with method EAP Identity (1) (10) eap: Calling submodule eap_md5 to process data (10) eap_md5: Issuing MD5 Challenge (10) eap: Sending EAP Request (code 1) ID 53 length 22 (10) eap: EAP session adding &reply:State = 0x27384e6d270d4a73 (10) [eap] = handled (10) } # authenticate = handled (10) Using Post-Auth-Type Challenge (10) # Executing group from file /etc/raddb/sites-enabled/default (10) Challenge { ... } # empty sub-section is ignored (10) Sent Access-Challenge Id 5 from 10.6.0.55:1812 to 10.6.0.7:35698 length 0 (10) EAP-Message = 0x0135001604102731771622348d945ef2b9a704fcbe74 (10) Message-Authenticator = 0x00000000000000000000000000000000 (10) State = 0x27384e6d270d4a73605267ef2b8ea50d (10) Finished request Waking up in 4.9 seconds. (11) Received Access-Request Id 6 from 10.6.0.7:35698 to 10.6.0.55:1812 length 226 (11) User-Name = "testuser" (11) NAS-IP-Address = 10.6.0.7 (11) NAS-Identifier = "1eecdafb66fa" (11) Called-Station-Id = "1E-EC-DA-FB-66-FA:Enshore_devices" (11) NAS-Port-Type = Wireless-802.11 (11) Service-Type = Framed-User (11) Calling-Station-Id = "00-C0-CA-A8-86-B8" (11) Connect-Info = "CONNECT 0Mbps 802.11b" (11) Acct-Session-Id = "AACC40B5C11DF06A" (11) WLAN-Pairwise-Cipher = 1027076 (11) WLAN-Group-Cipher = 1027076 (11) WLAN-AKM-Suite = 1027073 (11) Framed-MTU = 1400 (11) EAP-Message = 0x02350007031915 (11) State = 0x27384e6d270d4a73605267ef2b8ea50d (11) Message-Authenticator = 0x7aaefd717708882f047fd0a6c1f6db81 (11) session-state: No cached attributes (11) # Executing section authorize from file /etc/raddb/sites-enabled/default (11) authorize { (11) policy filter_username { (11) if (&User-Name) { (11) if (&User-Name) -> TRUE (11) if (&User-Name) { (11) if (&User-Name =~ / /) { (11) if (&User-Name =~ / /) -> FALSE (11) if (&User-Name =~ /@[^@]*@/ ) { (11) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (11) if (&User-Name =~ /\.\./ ) { (11) if (&User-Name =~ /\.\./ ) -> FALSE (11) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (11) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (11) if (&User-Name =~ /\.$/) { (11) if (&User-Name =~ /\.$/) -> FALSE (11) if (&User-Name =~ /@\./) { (11) if (&User-Name =~ /@\./) -> FALSE (11) } # if (&User-Name) = notfound (11) } # policy filter_username = notfound (11) [preprocess] = ok (11) [chap] = noop (11) [mschap] = noop (11) [digest] = noop (11) suffix: Checking for suffix after "@" (11) suffix: No '@' in User-Name = "testuser", looking up realm NULL (11) suffix: No such realm "NULL" (11) [suffix] = noop (11) eap: Peer sent EAP Response (code 2) ID 53 length 7 (11) eap: No EAP Start, assuming it's an on-going EAP conversation (11) [eap] = updated (11) [files] = noop rlm_ldap (ldap): Reserved connection (6) (11) ldap: EXPAND (uid=%{User-Name}) (11) ldap: --> (uid=testuser) (11) ldap: Performing search in "cn=users,cn=accounts,dc=enshore,dc=local" with filter "(uid=testuser)", scope "sub" (11) ldap: Waiting for search result... (11) ldap: User object found at DN "uid=testuser,cn=users,cn=accounts,dc=enshore,dc=local" (11) ldap: Processing user attributes (11) ldap: WARNING: No "known good" password added. Ensure the admin user has permission to read the password attribute (11) ldap: WARNING: PAP authentication will *NOT* work with Active Directory (if that is what you were trying to configure) rlm_ldap (ldap): Released connection (6) Need 7 more connections to reach 10 spares rlm_ldap (ldap): Opening additional connection (8), 1 of 29 pending slots used rlm_ldap (ldap): Connecting to ldap://ldap.enshore.local:389 rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful (11) [ldap] = ok (11) [expiration] = noop (11) [logintime] = noop (11) pap: WARNING: No "known good" password found for the user. Not setting Auth-Type (11) pap: WARNING: Authentication will fail unless a "known good" password is available (11) [pap] = noop (11) } # authorize = updated (11) Found Auth-Type = eap (11) # Executing group from file /etc/raddb/sites-enabled/default (11) authenticate { (11) eap: Expiring EAP session with state 0x27384e6d270d4a73 (11) eap: Finished EAP session with state 0x27384e6d270d4a73 (11) eap: Previous EAP request found for state 0x27384e6d270d4a73, released from the list (11) eap: Peer sent packet with method EAP NAK (3) (11) eap: Found mutually acceptable type PEAP (25) (11) eap: Calling submodule eap_peap to process data (11) eap_peap: Initiating new EAP-TLS session (11) eap_peap: [eaptls start] = request (11) eap: Sending EAP Request (code 1) ID 54 length 6 (11) eap: EAP session adding &reply:State = 0x27384e6d260e5773 (11) [eap] = handled (11) } # authenticate = handled (11) Using Post-Auth-Type Challenge (11) # Executing group from file /etc/raddb/sites-enabled/default (11) Challenge { ... } # empty sub-section is ignored (11) Sent Access-Challenge Id 6 from 10.6.0.55:1812 to 10.6.0.7:35698 length 0 (11) EAP-Message = 0x013600061920 (11) Message-Authenticator = 0x00000000000000000000000000000000 (11) State = 0x27384e6d260e5773605267ef2b8ea50d (11) Finished request Waking up in 4.9 seconds. (12) Received Access-Request Id 7 from 10.6.0.7:35698 to 10.6.0.55:1812 length 391 (12) User-Name = "testuser" (12) NAS-IP-Address = 10.6.0.7 (12) NAS-Identifier = "1eecdafb66fa" (12) Called-Station-Id = "1E-EC-DA-FB-66-FA:Enshore_devices" (12) NAS-Port-Type = Wireless-802.11 (12) Service-Type = Framed-User (12) Calling-Station-Id = "00-C0-CA-A8-86-B8" (12) Connect-Info = "CONNECT 0Mbps 802.11b" (12) Acct-Session-Id = "AACC40B5C11DF06A" (12) WLAN-Pairwise-Cipher = 1027076 (12) WLAN-Group-Cipher = 1027076 (12) WLAN-AKM-Suite = 1027073 (12) Framed-MTU = 1400 (12) EAP-Message = 0x023600ac1980000000a2160303009d0100009903035fb26fae9da97e40bdeef4ffe7cbdd99149272cbbedb281cd22bfe97c3416c8400002ac02cc02bc030c02f009f009ec024c023c028c027c00ac009c014c013009d009c003d003c0035002f000a01000046000500050100000000000a00080006001d (12) State = 0x27384e6d260e5773605267ef2b8ea50d (12) Message-Authenticator = 0x851e78a73d7de8d5cdfbd3de16cab32e (12) session-state: No cached attributes (12) # Executing section authorize from file /etc/raddb/sites-enabled/default (12) authorize { (12) policy filter_username { (12) if (&User-Name) { (12) if (&User-Name) -> TRUE (12) if (&User-Name) { (12) if (&User-Name =~ / /) { (12) if (&User-Name =~ / /) -> FALSE (12) if (&User-Name =~ /@[^@]*@/ ) { (12) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (12) if (&User-Name =~ /\.\./ ) { (12) if (&User-Name =~ /\.\./ ) -> FALSE (12) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (12) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (12) if (&User-Name =~ /\.$/) { (12) if (&User-Name =~ /\.$/) -> FALSE (12) if (&User-Name =~ /@\./) { (12) if (&User-Name =~ /@\./) -> FALSE (12) } # if (&User-Name) = notfound (12) } # policy filter_username = notfound (12) [preprocess] = ok (12) [chap] = noop (12) [mschap] = noop (12) [digest] = noop (12) suffix: Checking for suffix after "@" (12) suffix: No '@' in User-Name = "testuser", looking up realm NULL (12) suffix: No such realm "NULL" (12) [suffix] = noop (12) eap: Peer sent EAP Response (code 2) ID 54 length 172 (12) eap: Continuing tunnel setup (12) [eap] = ok (12) } # authorize = ok (12) Found Auth-Type = eap (12) # Executing group from file /etc/raddb/sites-enabled/default (12) authenticate { (12) eap: Expiring EAP session with state 0x27384e6d260e5773 (12) eap: Finished EAP session with state 0x27384e6d260e5773 (12) eap: Previous EAP request found for state 0x27384e6d260e5773, released from the list (12) eap: Peer sent packet with method EAP PEAP (25) (12) eap: Calling submodule eap_peap to process data (12) eap_peap: Continuing EAP-TLS (12) eap_peap: Peer indicated complete TLS record size will be 162 bytes (12) eap_peap: Got complete TLS record (162 bytes) (12) eap_peap: [eaptls verify] = length included (12) eap_peap: (other): before SSL initialization (12) eap_peap: TLS_accept: before SSL initialization (12) eap_peap: TLS_accept: before SSL initialization (12) eap_peap: <<< recv UNKNOWN TLS VERSION ?0304? [length 009d] (12) eap_peap: TLS_accept: SSLv3/TLS read client hello (12) eap_peap: >>> send TLS 1.2 [length 003d] (12) eap_peap: TLS_accept: SSLv3/TLS write server hello (12) eap_peap: >>> send TLS 1.2 [length 08e9] (12) eap_peap: TLS_accept: SSLv3/TLS write certificate (12) eap_peap: >>> send TLS 1.2 [length 014d] (12) eap_peap: TLS_accept: SSLv3/TLS write key exchange (12) eap_peap: >>> send TLS 1.2 [length 0004] (12) eap_peap: TLS_accept: SSLv3/TLS write server done (12) eap_peap: TLS_accept: Need to read more data: SSLv3/TLS write server done (12) eap_peap: In SSL Handshake Phase (12) eap_peap: In SSL Accept mode (12) eap_peap: [eaptls process] = handled (12) eap: Sending EAP Request (code 1) ID 55 length 1004 (12) eap: EAP session adding &reply:State = 0x27384e6d250f5773 (12) [eap] = handled (12) } # authenticate = handled (12) Using Post-Auth-Type Challenge (12) # Executing group from file /etc/raddb/sites-enabled/default (12) Challenge { ... } # empty sub-section is ignored (12) Sent Access-Challenge Id 7 from 10.6.0.55:1812 to 10.6.0.7:35698 length 0 (12) EAP-Message = 0x013703ec19c000000a8b160303003d020000390303fb662f10187cd43f68793849145f8f13f59715e0640a6598444f574e4752440100c030000011ff01000100000b0004030001020017000016030308e90b0008e50008e20003de308203da308202c2a003020102020101300d06092a864886f70d0101 (12) Message-Authenticator = 0x00000000000000000000000000000000 (12) State = 0x27384e6d250f5773605267ef2b8ea50d (12) Finished request Waking up in 4.9 seconds. (13) Received Access-Request Id 8 from 10.6.0.7:35698 to 10.6.0.55:1812 length 225 (13) User-Name = "testuser" (13) NAS-IP-Address = 10.6.0.7 (13) NAS-Identifier = "1eecdafb66fa" (13) Called-Station-Id = "1E-EC-DA-FB-66-FA:Enshore_devices" (13) NAS-Port-Type = Wireless-802.11 (13) Service-Type = Framed-User (13) Calling-Station-Id = "00-C0-CA-A8-86-B8" (13) Connect-Info = "CONNECT 0Mbps 802.11b" (13) Acct-Session-Id = "AACC40B5C11DF06A" (13) WLAN-Pairwise-Cipher = 1027076 (13) WLAN-Group-Cipher = 1027076 (13) WLAN-AKM-Suite = 1027073 (13) Framed-MTU = 1400 (13) EAP-Message = 0x023700061900 (13) State = 0x27384e6d250f5773605267ef2b8ea50d (13) Message-Authenticator = 0xa665d18872cffbad182293150c9c6682 (13) session-state: No cached attributes (13) # Executing section authorize from file /etc/raddb/sites-enabled/default (13) authorize { (13) policy filter_username { (13) if (&User-Name) { (13) if (&User-Name) -> TRUE (13) if (&User-Name) { (13) if (&User-Name =~ / /) { (13) if (&User-Name =~ / /) -> FALSE (13) if (&User-Name =~ /@[^@]*@/ ) { (13) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (13) if (&User-Name =~ /\.\./ ) { (13) if (&User-Name =~ /\.\./ ) -> FALSE (13) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (13) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (13) if (&User-Name =~ /\.$/) { (13) if (&User-Name =~ /\.$/) -> FALSE (13) if (&User-Name =~ /@\./) { (13) if (&User-Name =~ /@\./) -> FALSE (13) } # if (&User-Name) = notfound (13) } # policy filter_username = notfound (13) [preprocess] = ok (13) [chap] = noop (13) [mschap] = noop (13) [digest] = noop (13) suffix: Checking for suffix after "@" (13) suffix: No '@' in User-Name = "testuser", looking up realm NULL (13) suffix: No such realm "NULL" (13) [suffix] = noop (13) eap: Peer sent EAP Response (code 2) ID 55 length 6 (13) eap: Continuing tunnel setup (13) [eap] = ok (13) } # authorize = ok (13) Found Auth-Type = eap (13) # Executing group from file /etc/raddb/sites-enabled/default (13) authenticate { (13) eap: Expiring EAP session with state 0x27384e6d250f5773 (13) eap: Finished EAP session with state 0x27384e6d250f5773 (13) eap: Previous EAP request found for state 0x27384e6d250f5773, released from the list (13) eap: Peer sent packet with method EAP PEAP (25) (13) eap: Calling submodule eap_peap to process data (13) eap_peap: Continuing EAP-TLS (13) eap_peap: Peer ACKed our handshake fragment (13) eap_peap: [eaptls verify] = request (13) eap_peap: [eaptls process] = handled (13) eap: Sending EAP Request (code 1) ID 56 length 1000 (13) eap: EAP session adding &reply:State = 0x27384e6d24005773 (13) [eap] = handled (13) } # authenticate = handled (13) Using Post-Auth-Type Challenge (13) # Executing group from file /etc/raddb/sites-enabled/default (13) Challenge { ... } # empty sub-section is ignored (13) Sent Access-Challenge Id 8 from 10.6.0.55:1812 to 10.6.0.7:35698 length 0 (13) EAP-Message = 0x013803e81940e4b43f6dab55e3fc84e4fc6c578ed989a26c5889a9f864453cab2dd0f70196e30d53b93c59d3ce2fd3b08ab827cb45956fbfc11581b7f1a8c49e622fe3e7de263b5d79131cb72b78a5f38651b80004fe308204fa308203e2a0030201020214223191f52cde63cc77cb3e16630e5ab466f2 (13) Message-Authenticator = 0x00000000000000000000000000000000 (13) State = 0x27384e6d24005773605267ef2b8ea50d (13) Finished request Waking up in 4.9 seconds. (14) Received Access-Request Id 9 from 10.6.0.7:35698 to 10.6.0.55:1812 length 225 (14) User-Name = "testuser" (14) NAS-IP-Address = 10.6.0.7 (14) NAS-Identifier = "1eecdafb66fa" (14) Called-Station-Id = "1E-EC-DA-FB-66-FA:Enshore_devices" (14) NAS-Port-Type = Wireless-802.11 (14) Service-Type = Framed-User (14) Calling-Station-Id = "00-C0-CA-A8-86-B8" (14) Connect-Info = "CONNECT 0Mbps 802.11b" (14) Acct-Session-Id = "AACC40B5C11DF06A" (14) WLAN-Pairwise-Cipher = 1027076 (14) WLAN-Group-Cipher = 1027076 (14) WLAN-AKM-Suite = 1027073 (14) Framed-MTU = 1400 (14) EAP-Message = 0x023800061900 (14) State = 0x27384e6d24005773605267ef2b8ea50d (14) Message-Authenticator = 0x2d3679b002474aa9715aa8745f69237f (14) session-state: No cached attributes (14) # Executing section authorize from file /etc/raddb/sites-enabled/default (14) authorize { (14) policy filter_username { (14) if (&User-Name) { (14) if (&User-Name) -> TRUE (14) if (&User-Name) { (14) if (&User-Name =~ / /) { (14) if (&User-Name =~ / /) -> FALSE (14) if (&User-Name =~ /@[^@]*@/ ) { (14) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (14) if (&User-Name =~ /\.\./ ) { (14) if (&User-Name =~ /\.\./ ) -> FALSE (14) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (14) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (14) if (&User-Name =~ /\.$/) { (14) if (&User-Name =~ /\.$/) -> FALSE (14) if (&User-Name =~ /@\./) { (14) if (&User-Name =~ /@\./) -> FALSE (14) } # if (&User-Name) = notfound (14) } # policy filter_username = notfound (14) [preprocess] = ok (14) [chap] = noop (14) [mschap] = noop (14) [digest] = noop (14) suffix: Checking for suffix after "@" (14) suffix: No '@' in User-Name = "testuser", looking up realm NULL (14) suffix: No such realm "NULL" (14) [suffix] = noop (14) eap: Peer sent EAP Response (code 2) ID 56 length 6 (14) eap: Continuing tunnel setup (14) [eap] = ok (14) } # authorize = ok (14) Found Auth-Type = eap (14) # Executing group from file /etc/raddb/sites-enabled/default (14) authenticate { (14) eap: Expiring EAP session with state 0x27384e6d24005773 (14) eap: Finished EAP session with state 0x27384e6d24005773 (14) eap: Previous EAP request found for state 0x27384e6d24005773, released from the list (14) eap: Peer sent packet with method EAP PEAP (25) (14) eap: Calling submodule eap_peap to process data (14) eap_peap: Continuing EAP-TLS (14) eap_peap: Peer ACKed our handshake fragment (14) eap_peap: [eaptls verify] = request (14) eap_peap: [eaptls process] = handled (14) eap: Sending EAP Request (code 1) ID 57 length 717 (14) eap: EAP session adding &reply:State = 0x27384e6d23015773 (14) [eap] = handled (14) } # authenticate = handled (14) Using Post-Auth-Type Challenge (14) # Executing group from file /etc/raddb/sites-enabled/default (14) Challenge { ... } # empty sub-section is ignored (14) Sent Access-Challenge Id 9 from 10.6.0.55:1812 to 10.6.0.7:35698 length 0 (14) EAP-Message = 0x013902cd1900de63cc77cb3e16630e5ab466f2e3a1300f0603551d130101ff040530030101ff30360603551d1f042f302d302ba029a0278625687474703a2f2f7777772e6578616d706c652e6f72672f6578616d706c655f63612e63726c300d06092a864886f70d01010b050003820101002ef0f49026 (14) Message-Authenticator = 0x00000000000000000000000000000000 (14) State = 0x27384e6d23015773605267ef2b8ea50d (14) Finished request Waking up in 4.9 seconds. (15) Received Access-Request Id 10 from 10.6.0.7:35698 to 10.6.0.55:1812 length 355 (15) User-Name = "testuser" (15) NAS-IP-Address = 10.6.0.7 (15) NAS-Identifier = "1eecdafb66fa" (15) Called-Station-Id = "1E-EC-DA-FB-66-FA:Enshore_devices" (15) NAS-Port-Type = Wireless-802.11 (15) Service-Type = Framed-User (15) Calling-Station-Id = "00-C0-CA-A8-86-B8" (15) Connect-Info = "CONNECT 0Mbps 802.11b" (15) Acct-Session-Id = "AACC40B5C11DF06A" (15) WLAN-Pairwise-Cipher = 1027076 (15) WLAN-Group-Cipher = 1027076 (15) WLAN-AKM-Suite = 1027073 (15) Framed-MTU = 1400 (15) EAP-Message = 0x0239008819800000007e160303004610000042410445deb2926a17c7cc1663d7d928f755b3be3286ea047233d0aa85fee663dfca449f4b8a43767f23934cdea0f61dbd72f9bcd42198b90b6cb245613497d87b8f5814030300010116030300280000000000000000f5419fc4702c7b8d5904783bc746b1 (15) State = 0x27384e6d23015773605267ef2b8ea50d (15) Message-Authenticator = 0xd5b2c08341d29d0eaddccdc81a1dea9b (15) session-state: No cached attributes (15) # Executing section authorize from file /etc/raddb/sites-enabled/default (15) authorize { (15) policy filter_username { (15) if (&User-Name) { (15) if (&User-Name) -> TRUE (15) if (&User-Name) { (15) if (&User-Name =~ / /) { (15) if (&User-Name =~ / /) -> FALSE (15) if (&User-Name =~ /@[^@]*@/ ) { (15) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (15) if (&User-Name =~ /\.\./ ) { (15) if (&User-Name =~ /\.\./ ) -> FALSE (15) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (15) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (15) if (&User-Name =~ /\.$/) { (15) if (&User-Name =~ /\.$/) -> FALSE (15) if (&User-Name =~ /@\./) { (15) if (&User-Name =~ /@\./) -> FALSE (15) } # if (&User-Name) = notfound (15) } # policy filter_username = notfound (15) [preprocess] = ok (15) [chap] = noop (15) [mschap] = noop (15) [digest] = noop (15) suffix: Checking for suffix after "@" (15) suffix: No '@' in User-Name = "testuser", looking up realm NULL (15) suffix: No such realm "NULL" (15) [suffix] = noop (15) eap: Peer sent EAP Response (code 2) ID 57 length 136 (15) eap: Continuing tunnel setup (15) [eap] = ok (15) } # authorize = ok (15) Found Auth-Type = eap (15) # Executing group from file /etc/raddb/sites-enabled/default (15) authenticate { (15) eap: Expiring EAP session with state 0x27384e6d23015773 (15) eap: Finished EAP session with state 0x27384e6d23015773 (15) eap: Previous EAP request found for state 0x27384e6d23015773, released from the list (15) eap: Peer sent packet with method EAP PEAP (25) (15) eap: Calling submodule eap_peap to process data (15) eap_peap: Continuing EAP-TLS (15) eap_peap: Peer indicated complete TLS record size will be 126 bytes (15) eap_peap: Got complete TLS record (126 bytes) (15) eap_peap: [eaptls verify] = length included (15) eap_peap: TLS_accept: SSLv3/TLS write server done (15) eap_peap: <<< recv TLS 1.2 [length 0046] (15) eap_peap: TLS_accept: SSLv3/TLS read client key exchange (15) eap_peap: TLS_accept: SSLv3/TLS read change cipher spec (15) eap_peap: <<< recv TLS 1.2 [length 0010] (15) eap_peap: TLS_accept: SSLv3/TLS read finished (15) eap_peap: >>> send TLS 1.2 [length 0001] (15) eap_peap: TLS_accept: SSLv3/TLS write change cipher spec (15) eap_peap: >>> send TLS 1.2 [length 0010] (15) eap_peap: TLS_accept: SSLv3/TLS write finished (15) eap_peap: (other): SSL negotiation finished successfully (15) eap_peap: SSL Connection Established (15) eap_peap: [eaptls process] = handled (15) eap: Sending EAP Request (code 1) ID 58 length 57 (15) eap: EAP session adding &reply:State = 0x27384e6d22025773 (15) [eap] = handled (15) } # authenticate = handled (15) Using Post-Auth-Type Challenge (15) # Executing group from file /etc/raddb/sites-enabled/default (15) Challenge { ... } # empty sub-section is ignored (15) Sent Access-Challenge Id 10 from 10.6.0.55:1812 to 10.6.0.7:35698 length 0 (15) EAP-Message = 0x013a003919001403030001011603030028b32be0081af977050a706cdede17e666188e40b989082b03f538ece81d3e2a2f026d372672130bb2 (15) Message-Authenticator = 0x00000000000000000000000000000000 (15) State = 0x27384e6d22025773605267ef2b8ea50d (15) Finished request Waking up in 4.9 seconds. (16) Received Access-Request Id 11 from 10.6.0.7:35698 to 10.6.0.55:1812 length 225 (16) User-Name = "testuser" (16) NAS-IP-Address = 10.6.0.7 (16) NAS-Identifier = "1eecdafb66fa" (16) Called-Station-Id = "1E-EC-DA-FB-66-FA:Enshore_devices" (16) NAS-Port-Type = Wireless-802.11 (16) Service-Type = Framed-User (16) Calling-Station-Id = "00-C0-CA-A8-86-B8" (16) Connect-Info = "CONNECT 0Mbps 802.11b" (16) Acct-Session-Id = "AACC40B5C11DF06A" (16) WLAN-Pairwise-Cipher = 1027076 (16) WLAN-Group-Cipher = 1027076 (16) WLAN-AKM-Suite = 1027073 (16) Framed-MTU = 1400 (16) EAP-Message = 0x023a00061900 (16) State = 0x27384e6d22025773605267ef2b8ea50d (16) Message-Authenticator = 0x3b3bf3875b2467d5f7961d353135c630 (16) session-state: No cached attributes (16) # Executing section authorize from file /etc/raddb/sites-enabled/default (16) authorize { (16) policy filter_username { (16) if (&User-Name) { (16) if (&User-Name) -> TRUE (16) if (&User-Name) { (16) if (&User-Name =~ / /) { (16) if (&User-Name =~ / /) -> FALSE (16) if (&User-Name =~ /@[^@]*@/ ) { (16) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (16) if (&User-Name =~ /\.\./ ) { (16) if (&User-Name =~ /\.\./ ) -> FALSE (16) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (16) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (16) if (&User-Name =~ /\.$/) { (16) if (&User-Name =~ /\.$/) -> FALSE (16) if (&User-Name =~ /@\./) { (16) if (&User-Name =~ /@\./) -> FALSE (16) } # if (&User-Name) = notfound (16) } # policy filter_username = notfound (16) [preprocess] = ok (16) [chap] = noop (16) [mschap] = noop (16) [digest] = noop (16) suffix: Checking for suffix after "@" (16) suffix: No '@' in User-Name = "testuser", looking up realm NULL (16) suffix: No such realm "NULL" (16) [suffix] = noop (16) eap: Peer sent EAP Response (code 2) ID 58 length 6 (16) eap: Continuing tunnel setup (16) [eap] = ok (16) } # authorize = ok (16) Found Auth-Type = eap (16) # Executing group from file /etc/raddb/sites-enabled/default (16) authenticate { (16) eap: Expiring EAP session with state 0x27384e6d22025773 (16) eap: Finished EAP session with state 0x27384e6d22025773 (16) eap: Previous EAP request found for state 0x27384e6d22025773, released from the list (16) eap: Peer sent packet with method EAP PEAP (25) (16) eap: Calling submodule eap_peap to process data (16) eap_peap: Continuing EAP-TLS (16) eap_peap: Peer ACKed our handshake fragment. handshake is finished (16) eap_peap: [eaptls verify] = success (16) eap_peap: [eaptls process] = success (16) eap_peap: Session established. Decoding tunneled attributes (16) eap_peap: PEAP state TUNNEL ESTABLISHED (16) eap: Sending EAP Request (code 1) ID 59 length 40 (16) eap: EAP session adding &reply:State = 0x27384e6d21035773 (16) [eap] = handled (16) } # authenticate = handled (16) Using Post-Auth-Type Challenge (16) # Executing group from file /etc/raddb/sites-enabled/default (16) Challenge { ... } # empty sub-section is ignored (16) Sent Access-Challenge Id 11 from 10.6.0.55:1812 to 10.6.0.7:35698 length 0 (16) EAP-Message = 0x013b00281900170303001db32be0081af977061f928fb736e74fb49bbf3f92e5c8cd5b4a21f57d47 (16) Message-Authenticator = 0x00000000000000000000000000000000 (16) State = 0x27384e6d21035773605267ef2b8ea50d (16) Finished request Waking up in 3.5 seconds. (17) Received Access-Request Id 12 from 10.6.0.7:35698 to 10.6.0.55:1812 length 263 (17) User-Name = "testuser" (17) NAS-IP-Address = 10.6.0.7 (17) NAS-Identifier = "1eecdafb66fa" (17) Called-Station-Id = "1E-EC-DA-FB-66-FA:Enshore_devices" (17) NAS-Port-Type = Wireless-802.11 (17) Service-Type = Framed-User (17) Calling-Station-Id = "00-C0-CA-A8-86-B8" (17) Connect-Info = "CONNECT 0Mbps 802.11b" (17) Acct-Session-Id = "AACC40B5C11DF06A" (17) WLAN-Pairwise-Cipher = 1027076 (17) WLAN-Group-Cipher = 1027076 (17) WLAN-AKM-Suite = 1027073 (17) Framed-MTU = 1400 (17) EAP-Message = 0x023b002c1900170303002100000000000000012d23e47aab5883857e5d518c3d612edcc009c92a04a2fb6cc3 (17) State = 0x27384e6d21035773605267ef2b8ea50d (17) Message-Authenticator = 0x7b7dcf2902ad6e8b0c6be32ce52a4022 (17) session-state: No cached attributes (17) # Executing section authorize from file /etc/raddb/sites-enabled/default (17) authorize { (17) policy filter_username { (17) if (&User-Name) { (17) if (&User-Name) -> TRUE (17) if (&User-Name) { (17) if (&User-Name =~ / /) { (17) if (&User-Name =~ / /) -> FALSE (17) if (&User-Name =~ /@[^@]*@/ ) { (17) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (17) if (&User-Name =~ /\.\./ ) { (17) if (&User-Name =~ /\.\./ ) -> FALSE (17) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (17) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (17) if (&User-Name =~ /\.$/) { (17) if (&User-Name =~ /\.$/) -> FALSE (17) if (&User-Name =~ /@\./) { (17) if (&User-Name =~ /@\./) -> FALSE (17) } # if (&User-Name) = notfound (17) } # policy filter_username = notfound (17) [preprocess] = ok (17) [chap] = noop (17) [mschap] = noop (17) [digest] = noop (17) suffix: Checking for suffix after "@" (17) suffix: No '@' in User-Name = "testuser", looking up realm NULL (17) suffix: No such realm "NULL" (17) [suffix] = noop (17) eap: Peer sent EAP Response (code 2) ID 59 length 44 (17) eap: Continuing tunnel setup (17) [eap] = ok (17) } # authorize = ok (17) Found Auth-Type = eap (17) # Executing group from file /etc/raddb/sites-enabled/default (17) authenticate { (17) eap: Expiring EAP session with state 0x27384e6d21035773 (17) eap: Finished EAP session with state 0x27384e6d21035773 (17) eap: Previous EAP request found for state 0x27384e6d21035773, released from the list (17) eap: Peer sent packet with method EAP PEAP (25) (17) eap: Calling submodule eap_peap to process data (17) eap_peap: Continuing EAP-TLS (17) eap_peap: [eaptls verify] = ok (17) eap_peap: Done initial handshake (17) eap_peap: [eaptls process] = ok (17) eap_peap: Session established. Decoding tunneled attributes (17) eap_peap: PEAP state WAITING FOR INNER IDENTITY (17) eap_peap: Identity - testuser (17) eap_peap: Got inner identity 'testuser' (17) eap_peap: Setting default EAP type for tunneled EAP session (17) eap_peap: Got tunneled request (17) eap_peap: EAP-Message = 0x023b000d017465737475736572 (17) eap_peap: Setting User-Name to testuser (17) eap_peap: Sending tunneled request to inner-tunnel (17) eap_peap: EAP-Message = 0x023b000d017465737475736572 (17) eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1 (17) eap_peap: User-Name = "testuser" (17) Virtual server inner-tunnel received request (17) EAP-Message = 0x023b000d017465737475736572 (17) FreeRADIUS-Proxied-To = 127.0.0.1 (17) User-Name = "testuser" (17) WARNING: Outer and inner identities are the same. User privacy is compromised. (17) server inner-tunnel { (17) # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel (17) authorize { (17) policy filter_username { (17) if (&User-Name) { (17) if (&User-Name) -> TRUE (17) if (&User-Name) { (17) if (&User-Name =~ / /) { (17) if (&User-Name =~ / /) -> FALSE (17) if (&User-Name =~ /@[^@]*@/ ) { (17) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (17) if (&User-Name =~ /\.\./ ) { (17) if (&User-Name =~ /\.\./ ) -> FALSE (17) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (17) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (17) if (&User-Name =~ /\.$/) { (17) if (&User-Name =~ /\.$/) -> FALSE (17) if (&User-Name =~ /@\./) { (17) if (&User-Name =~ /@\./) -> FALSE (17) } # if (&User-Name) = notfound (17) } # policy filter_username = notfound (17) [chap] = noop (17) [mschap] = noop (17) suffix: Checking for suffix after "@" (17) suffix: No '@' in User-Name = "testuser", looking up realm NULL (17) suffix: No such realm "NULL" (17) [suffix] = noop (17) update control { (17) &Proxy-To-Realm := LOCAL (17) } # update control = noop (17) eap: Peer sent EAP Response (code 2) ID 59 length 13 (17) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (17) [eap] = ok (17) } # authorize = ok (17) Found Auth-Type = eap (17) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (17) authenticate { (17) eap: Peer sent packet with method EAP Identity (1) (17) eap: Calling submodule eap_mschapv2 to process data (17) eap_mschapv2: Issuing Challenge (17) eap: Sending EAP Request (code 1) ID 60 length 43 (17) eap: EAP session adding &reply:State = 0x2f44ab012f78b128 (17) [eap] = handled (17) } # authenticate = handled (17) } # server inner-tunnel (17) Virtual server sending reply (17) EAP-Message = 0x013c002b1a013c002610bfeea46c0029bfd93857150997c1282e667265657261646975732d332e302e3137 (17) Message-Authenticator = 0x00000000000000000000000000000000 (17) State = 0x2f44ab012f78b12801cca2ab0bcbcbed (17) eap_peap: Got tunneled reply code 11 (17) eap_peap: EAP-Message = 0x013c002b1a013c002610bfeea46c0029bfd93857150997c1282e667265657261646975732d332e302e3137 (17) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (17) eap_peap: State = 0x2f44ab012f78b12801cca2ab0bcbcbed (17) eap_peap: Got tunneled reply RADIUS code 11 (17) eap_peap: EAP-Message = 0x013c002b1a013c002610bfeea46c0029bfd93857150997c1282e667265657261646975732d332e302e3137 (17) eap_peap: Message-Authenticator = 0x00000000000000000000000000000000 (17) eap_peap: State = 0x2f44ab012f78b12801cca2ab0bcbcbed (17) eap_peap: Got tunneled Access-Challenge (17) eap: Sending EAP Request (code 1) ID 60 length 74 (17) eap: EAP session adding &reply:State = 0x27384e6d20045773 (17) [eap] = handled (17) } # authenticate = handled (17) Using Post-Auth-Type Challenge (17) # Executing group from file /etc/raddb/sites-enabled/default (17) Challenge { ... } # empty sub-section is ignored (17) Sent Access-Challenge Id 12 from 10.6.0.55:1812 to 10.6.0.7:35698 length 0 (17) EAP-Message = 0x013c004a1900170303003fb32be0081af977076ec568366554367a477b23ef17a4daad7ac78d475338c7e4d64c516e797383528e94281765989ca6f5e66622f07ba2b1f381382be15486 (17) Message-Authenticator = 0x00000000000000000000000000000000 (17) State = 0x27384e6d20045773605267ef2b8ea50d (17) Finished request Waking up in 3.4 seconds. (18) Received Access-Request Id 13 from 10.6.0.7:35698 to 10.6.0.55:1812 length 317 (18) User-Name = "testuser" (18) NAS-IP-Address = 10.6.0.7 (18) NAS-Identifier = "1eecdafb66fa" (18) Called-Station-Id = "1E-EC-DA-FB-66-FA:Enshore_devices" (18) NAS-Port-Type = Wireless-802.11 (18) Service-Type = Framed-User (18) Calling-Station-Id = "00-C0-CA-A8-86-B8" (18) Connect-Info = "CONNECT 0Mbps 802.11b" (18) Acct-Session-Id = "AACC40B5C11DF06A" (18) WLAN-Pairwise-Cipher = 1027076 (18) WLAN-Group-Cipher = 1027076 (18) WLAN-AKM-Suite = 1027073 (18) Framed-MTU = 1400 (18) EAP-Message = 0x023c0062190017030300570000000000000002b456de67ce775afe65b127db6a31dc2728c6b25bca1fb1aef6c54ed300d886ab000312bc69cff79eec25a821430ede80c99698500101fe974f2d0e8fce5bf8a092ab3f99bbc6b12044a9d1e4655da5 (18) State = 0x27384e6d20045773605267ef2b8ea50d (18) Message-Authenticator = 0xa02665b51266bb5efbf2d6ecc6327b7b (18) session-state: No cached attributes (18) # Executing section authorize from file /etc/raddb/sites-enabled/default (18) authorize { (18) policy filter_username { (18) if (&User-Name) { (18) if (&User-Name) -> TRUE (18) if (&User-Name) { (18) if (&User-Name =~ / /) { (18) if (&User-Name =~ / /) -> FALSE (18) if (&User-Name =~ /@[^@]*@/ ) { (18) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (18) if (&User-Name =~ /\.\./ ) { (18) if (&User-Name =~ /\.\./ ) -> FALSE (18) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (18) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (18) if (&User-Name =~ /\.$/) { (18) if (&User-Name =~ /\.$/) -> FALSE (18) if (&User-Name =~ /@\./) { (18) if (&User-Name =~ /@\./) -> FALSE (18) } # if (&User-Name) = notfound (18) } # policy filter_username = notfound (18) [preprocess] = ok (18) [chap] = noop (18) [mschap] = noop (18) [digest] = noop (18) suffix: Checking for suffix after "@" (18) suffix: No '@' in User-Name = "testuser", looking up realm NULL (18) suffix: No such realm "NULL" (18) [suffix] = noop (18) eap: Peer sent EAP Response (code 2) ID 60 length 98 (18) eap: Continuing tunnel setup (18) [eap] = ok (18) } # authorize = ok (18) Found Auth-Type = eap (18) # Executing group from file /etc/raddb/sites-enabled/default (18) authenticate { (18) eap: Expiring EAP session with state 0x2f44ab012f78b128 (18) eap: Finished EAP session with state 0x27384e6d20045773 (18) eap: Previous EAP request found for state 0x27384e6d20045773, released from the list (18) eap: Peer sent packet with method EAP PEAP (25) (18) eap: Calling submodule eap_peap to process data (18) eap_peap: Continuing EAP-TLS (18) eap_peap: [eaptls verify] = ok (18) eap_peap: Done initial handshake (18) eap_peap: [eaptls process] = ok (18) eap_peap: Session established. Decoding tunneled attributes (18) eap_peap: PEAP state phase2 (18) eap_peap: EAP method MSCHAPv2 (26) (18) eap_peap: Got tunneled request (18) eap_peap: EAP-Message = 0x023c00431a023c003e3143930d84efdf37e72ec8532a297dd55d0000000000000000eedd97a9da505865b963d1f19f56a29dcc006665dcc0648e007465737475736572 (18) eap_peap: Setting User-Name to testuser (18) eap_peap: Sending tunneled request to inner-tunnel (18) eap_peap: EAP-Message = 0x023c00431a023c003e3143930d84efdf37e72ec8532a297dd55d0000000000000000eedd97a9da505865b963d1f19f56a29dcc006665dcc0648e007465737475736572 (18) eap_peap: FreeRADIUS-Proxied-To = 127.0.0.1 (18) eap_peap: User-Name = "testuser" (18) eap_peap: State = 0x2f44ab012f78b12801cca2ab0bcbcbed (18) Virtual server inner-tunnel received request (18) EAP-Message = 0x023c00431a023c003e3143930d84efdf37e72ec8532a297dd55d0000000000000000eedd97a9da505865b963d1f19f56a29dcc006665dcc0648e007465737475736572 (18) FreeRADIUS-Proxied-To = 127.0.0.1 (18) User-Name = "testuser" (18) State = 0x2f44ab012f78b12801cca2ab0bcbcbed (18) WARNING: Outer and inner identities are the same. User privacy is compromised. (18) server inner-tunnel { (18) session-state: No cached attributes (18) # Executing section authorize from file /etc/raddb/sites-enabled/inner-tunnel (18) authorize { (18) policy filter_username { (18) if (&User-Name) { (18) if (&User-Name) -> TRUE (18) if (&User-Name) { (18) if (&User-Name =~ / /) { (18) if (&User-Name =~ / /) -> FALSE (18) if (&User-Name =~ /@[^@]*@/ ) { (18) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (18) if (&User-Name =~ /\.\./ ) { (18) if (&User-Name =~ /\.\./ ) -> FALSE (18) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (18) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (18) if (&User-Name =~ /\.$/) { (18) if (&User-Name =~ /\.$/) -> FALSE (18) if (&User-Name =~ /@\./) { (18) if (&User-Name =~ /@\./) -> FALSE (18) } # if (&User-Name) = notfound (18) } # policy filter_username = notfound (18) [chap] = noop (18) [mschap] = noop (18) suffix: Checking for suffix after "@" (18) suffix: No '@' in User-Name = "testuser", looking up realm NULL (18) suffix: No such realm "NULL" (18) [suffix] = noop (18) update control { (18) &Proxy-To-Realm := LOCAL (18) } # update control = noop (18) eap: Peer sent EAP Response (code 2) ID 60 length 67 (18) eap: No EAP Start, assuming it's an on-going EAP conversation (18) [eap] = updated (18) [files] = noop rlm_ldap (ldap): Reserved connection (5) (18) ldap: EXPAND (uid=%{User-Name}) (18) ldap: --> (uid=testuser) (18) ldap: Performing search in "cn=users,cn=accounts,dc=enshore,dc=local" with filter "(uid=testuser)", scope "sub" (18) ldap: Waiting for search result... (18) ldap: User object found at DN "uid=testuser,cn=users,cn=accounts,dc=enshore,dc=local" (18) ldap: Processing user attributes (18) ldap: WARNING: No "known good" password added. Ensure the admin user has permission to read the password attribute (18) ldap: WARNING: PAP authentication will *NOT* work with Active Directory (if that is what you were trying to configure) rlm_ldap (ldap): Released connection (5) Need 6 more connections to reach 10 spares rlm_ldap (ldap): Opening additional connection (9), 1 of 28 pending slots used rlm_ldap (ldap): Connecting to ldap://ldap.enshore.local:389 rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful (18) [ldap] = ok (18) [expiration] = noop (18) [logintime] = noop (18) [pap] = noop (18) } # authorize = updated (18) Found Auth-Type = eap (18) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (18) authenticate { (18) eap: Expiring EAP session with state 0x2f44ab012f78b128 (18) eap: Finished EAP session with state 0x2f44ab012f78b128 (18) eap: Previous EAP request found for state 0x2f44ab012f78b128, released from the list (18) eap: Peer sent packet with method EAP MSCHAPv2 (26) (18) eap: Calling submodule eap_mschapv2 to process data (18) eap_mschapv2: # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (18) eap_mschapv2: authenticate { (18) mschap: WARNING: No Cleartext-Password configured. Cannot create NT-Password (18) mschap: WARNING: No Cleartext-Password configured. Cannot create LM-Password (18) mschap: Creating challenge hash with username: testuser (18) mschap: Client is using MS-CHAPv2 (18) mschap: ERROR: FAILED: No NT/LM-Password. Cannot perform authentication (18) mschap: ERROR: MS-CHAP2-Response is incorrect (18) [mschap] = reject (18) } # authenticate = reject (18) eap: Sending EAP Failure (code 4) ID 60 length 4 (18) eap: Freeing handler (18) [eap] = reject (18) } # authenticate = reject (18) Failed to authenticate the user (18) Using Post-Auth-Type Reject (18) # Executing group from file /etc/raddb/sites-enabled/inner-tunnel (18) Post-Auth-Type REJECT { (18) attr_filter.access_reject: EXPAND %{User-Name} (18) attr_filter.access_reject: --> testuser (18) attr_filter.access_reject: Matched entry DEFAULT at line 11 (18) [attr_filter.access_reject] = updated (18) update outer.session-state { (18) &Module-Failure-Message := &request:Module-Failure-Message -> 'mschap: FAILED: No NT/LM-Password. Cannot perform authentication' (18) } # update outer.session-state = noop (18) } # Post-Auth-Type REJECT = updated (18) } # server inner-tunnel (18) Virtual server sending reply (18) MS-CHAP-Error = " TRUE (19) if (&User-Name) { (19) if (&User-Name =~ / /) { (19) if (&User-Name =~ / /) -> FALSE (19) if (&User-Name =~ /@[^@]*@/ ) { (19) if (&User-Name =~ /@[^@]*@/ ) -> FALSE (19) if (&User-Name =~ /\.\./ ) { (19) if (&User-Name =~ /\.\./ ) -> FALSE (19) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) { (19) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) -> FALSE (19) if (&User-Name =~ /\.$/) { (19) if (&User-Name =~ /\.$/) -> FALSE (19) if (&User-Name =~ /@\./) { (19) if (&User-Name =~ /@\./) -> FALSE (19) } # if (&User-Name) = notfound (19) } # policy filter_username = notfound (19) [preprocess] = ok (19) [chap] = noop (19) [mschap] = noop (19) [digest] = noop (19) suffix: Checking for suffix after "@" (19) suffix: No '@' in User-Name = "testuser", looking up realm NULL (19) suffix: No such realm "NULL" (19) [suffix] = noop (19) eap: Peer sent EAP Response (code 2) ID 61 length 46 (19) eap: Continuing tunnel setup (19) [eap] = ok (19) } # authorize = ok (19) Found Auth-Type = eap (19) # Executing group from file /etc/raddb/sites-enabled/default (19) authenticate { (19) eap: Expiring EAP session with state 0x27384e6d2f055773 (19) eap: Finished EAP session with state 0x27384e6d2f055773 (19) eap: Previous EAP request found for state 0x27384e6d2f055773, released from the list (19) eap: Peer sent packet with method EAP PEAP (25) (19) eap: Calling submodule eap_peap to process data (19) eap_peap: Continuing EAP-TLS (19) eap_peap: [eaptls verify] = ok (19) eap_peap: Done initial handshake (19) eap_peap: [eaptls process] = ok (19) eap_peap: Session established. Decoding tunneled attributes (19) eap_peap: PEAP state send tlv failure (19) eap_peap: Received EAP-TLV response (19) eap_peap: ERROR: The users session was previously rejected: returning reject (again.) (19) eap_peap: This means you need to read the PREVIOUS messages in the debug output (19) eap_peap: to find out the reason why the user was rejected (19) eap_peap: Look for "reject" or "fail". Those earlier messages will tell you (19) eap_peap: what went wrong, and how to fix the problem (19) eap: ERROR: Failed continuing EAP PEAP (25) session. EAP sub-module failed (19) eap: Sending EAP Failure (code 4) ID 61 length 4 (19) eap: Failed in EAP select (19) [eap] = invalid (19) } # authenticate = invalid (19) Failed to authenticate the user (19) Using Post-Auth-Type Reject (19) # Executing group from file /etc/raddb/sites-enabled/default (19) Post-Auth-Type REJECT { (19) attr_filter.access_reject: EXPAND %{User-Name} (19) attr_filter.access_reject: --> testuser (19) attr_filter.access_reject: Matched entry DEFAULT at line 11 (19) [attr_filter.access_reject] = updated (19) [eap] = noop (19) policy remove_reply_message_if_eap { (19) if (&reply:EAP-Message && &reply:Reply-Message) { (19) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE (19) else { (19) [noop] = noop (19) } # else = noop (19) } # policy remove_reply_message_if_eap = noop (19) } # Post-Auth-Type REJECT = updated (19) Delaying response for 1.000000 seconds Waking up in 0.3 seconds. Waking up in 0.6 seconds. (19) Sending delayed response (19) Sent Access-Reject Id 14 from 10.6.0.55:1812 to 10.6.0.7:35698 length 44 (19) EAP-Message = 0x043d0004 (19) Message-Authenticator = 0x00000000000000000000000000000000 Waking up in 2.4 seconds. (10) Cleaning up request packet ID 5 with timestamp +2940 (11) Cleaning up request packet ID 6 with timestamp +2940 (12) Cleaning up request packet ID 7 with timestamp +2940 (13) Cleaning up request packet ID 8 with timestamp +2940 (14) Cleaning up request packet ID 9 with timestamp +2940 (15) Cleaning up request packet ID 10 with timestamp +2940 Waking up in 1.3 seconds. (16) Cleaning up request packet ID 11 with timestamp +2941 (17) Cleaning up request packet ID 12 with timestamp +2941 (18) Cleaning up request packet ID 13 with timestamp +2941 (19) Cleaning up request packet ID 14 with timestamp +2941 Ready to process requests