FreeRADIUS Version 3.2.7 Copyright (C) 1999-2023 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ... including dictionary file /usr/share/freeradius/dictionary including dictionary file /usr/share/freeradius/dictionary.dhcp including dictionary file /usr/share/freeradius/dictionary.vqp including dictionary file /etc/freeradius/3.0/dictionary including configuration file /etc/freeradius/3.0/radiusd.conf including configuration file /etc/freeradius/3.0/clients.conf including files in directory /etc/freeradius/3.0/mods-enabled/ including configuration file /etc/freeradius/3.0/mods-enabled/radutmp including configuration file /etc/freeradius/3.0/mods-enabled/eap including configuration file /etc/freeradius/3.0/mods-enabled/realm including configuration file /etc/freeradius/3.0/mods-enabled/attr_filter including configuration file /etc/freeradius/3.0/mods-enabled/unix including configuration file /etc/freeradius/3.0/mods-enabled/dynamic_clients including configuration file /etc/freeradius/3.0/mods-enabled/detail including configuration file /etc/freeradius/3.0/mods-enabled/echo including configuration file /etc/freeradius/3.0/mods-enabled/always including configuration file /etc/freeradius/3.0/mods-enabled/replicate including configuration file /etc/freeradius/3.0/mods-enabled/exec including configuration file /etc/freeradius/3.0/mods-enabled/unpack including configuration file /etc/freeradius/3.0/mods-enabled/logintime including configuration file /etc/freeradius/3.0/mods-enabled/passwd including configuration file /etc/freeradius/3.0/mods-enabled/soh including configuration file /etc/freeradius/3.0/mods-enabled/linelog including configuration file /etc/freeradius/3.0/mods-enabled/sradutmp including configuration file /etc/freeradius/3.0/mods-enabled/detail.log including configuration file /etc/freeradius/3.0/mods-enabled/files including configuration file /etc/freeradius/3.0/mods-enabled/utf8 including configuration file /etc/freeradius/3.0/mods-enabled/expr including configuration file /etc/freeradius/3.0/mods-enabled/expiration including configuration file /etc/freeradius/3.0/mods-enabled/preprocess including files in directory /etc/freeradius/3.0/policy.d/ including configuration file /etc/freeradius/3.0/policy.d/abfab-tr including configuration file /etc/freeradius/3.0/policy.d/canonicalization including configuration file /etc/freeradius/3.0/policy.d/eap including configuration file /etc/freeradius/3.0/policy.d/rfc7542 including configuration file /etc/freeradius/3.0/policy.d/debug including configuration file /etc/freeradius/3.0/policy.d/operator-name including configuration file /etc/freeradius/3.0/policy.d/moonshot-targeted-ids including configuration file /etc/freeradius/3.0/policy.d/accounting including configuration file /etc/freeradius/3.0/policy.d/dhcp including configuration file /etc/freeradius/3.0/policy.d/control including configuration file /etc/freeradius/3.0/policy.d/cui including configuration file /etc/freeradius/3.0/policy.d/filter including files in directory /etc/freeradius/3.0/sites-enabled/ including configuration file /etc/freeradius/3.0/sites-enabled/default main { security { user = "freerad" group = "freerad" allow_core_dumps = no } name = "freeradius" prefix = "/usr" localstatedir = "/var" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" } main { name = "freeradius" prefix = "/usr" localstatedir = "/var" sbindir = "/usr/sbin" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" libdir = "/usr/lib/freeradius" radacctdir = "/var/log/freeradius/radacct" hostname_lookups = no max_request_time = 30 proxy_dedup_window = 1 cleanup_delay = 5 max_requests = 16384 max_fds = 512 postauth_client_lost = no pidfile = "/var/run/freeradius/freeradius.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = no log { stripped_names = no auth = no auth_badpass = no auth_goodpass = no colourise = yes msg_denied = "You are already logged in - access denied" } resources { } security { max_attributes = 200 reject_delay = 1.000000 status_server = yes require_message_authenticator = "auto" limit_proxy_state = "auto" } unlang { group_stop_return = no policy_stop_return = no } } radiusd: #### Loading Realms and Home Servers #### radiusd: #### Loading Clients #### client Ubiquiti-Router { ipaddr = 192.168.10.1 secret = <<< secret >>> shortname = "Defense-Router" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Shared secret for client Defense-Router is short, and likely can be broken by an attacker. Debugger not attached Configuration version: c793-a2a6-88e3-c244 systemd watchdog is disabled # Creating Auth-Type = eap # Creating Autz-Type = New-TLS-Connection radiusd: #### Instantiating modules #### modules { # Loaded module rlm_radutmp # Loading module "radutmp" from file /etc/freeradius/3.0/mods-enabled/radutmp radutmp { filename = "/var/log/freeradius/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 384 caller_id = yes } # Loaded module rlm_eap # Loading module "eap" from file /etc/freeradius/3.0/mods-enabled/eap eap { default_eap_type = "tls" timer_expire = 60 max_eap_type = 52 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 16384 dedup_key = "" } # Loaded module rlm_realm # Loading module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm realm IPASS { format = "prefix" delimiter = "/" ignore_default = no ignore_null = no } # Loading module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } # Loading module "bangpath" from file /etc/freeradius/3.0/mods-enabled/realm realm bangpath { format = "prefix" delimiter = "!" ignore_default = no ignore_null = no } # Loading module "realmpercent" from file /etc/freeradius/3.0/mods-enabled/realm realm realmpercent { format = "suffix" delimiter = "%" ignore_default = no ignore_null = no } # Loading module "ntdomain" from file /etc/freeradius/3.0/mods-enabled/realm realm ntdomain { format = "prefix" delimiter = "\" ignore_default = no ignore_null = no } # Loaded module rlm_attr_filter # Loading module "attr_filter.post-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.post-proxy { filename = "/etc/freeradius/3.0/mods-config/attr_filter/post-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.pre-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.pre-proxy { filename = "/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.access_reject" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.access_reject { filename = "/etc/freeradius/3.0/mods-config/attr_filter/access_reject" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.access_challenge" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.access_challenge { filename = "/etc/freeradius/3.0/mods-config/attr_filter/access_challenge" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.accounting_response" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.accounting_response { filename = "/etc/freeradius/3.0/mods-config/attr_filter/accounting_response" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.coa" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.coa { filename = "/etc/freeradius/3.0/mods-config/attr_filter/coa" key = "%{User-Name}" relaxed = no } # Loaded module rlm_unix # Loading module "unix" from file /etc/freeradius/3.0/mods-enabled/unix unix { radwtmp = "/var/log/freeradius/radwtmp" } Creating attribute Unix-Group # Loaded module rlm_dynamic_clients # Loading module "dynamic_clients" from file /etc/freeradius/3.0/mods-enabled/dynamic_clients # Loaded module rlm_detail # Loading module "detail" from file /etc/freeradius/3.0/mods-enabled/detail detail { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" permissions = 384 locking = no dates_as_integer = no escape_filenames = no log_packet_header = no } # Loaded module rlm_exec # Loading module "echo" from file /etc/freeradius/3.0/mods-enabled/echo exec echo { wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request" output_pairs = "reply" shell_escape = yes } # Loaded module rlm_always # Loading module "reject" from file /etc/freeradius/3.0/mods-enabled/always always reject { rcode = "reject" simulcount = 0 mpp = no } # Loading module "fail" from file /etc/freeradius/3.0/mods-enabled/always always fail { rcode = "fail" simulcount = 0 mpp = no } # Loading module "ok" from file /etc/freeradius/3.0/mods-enabled/always always ok { rcode = "ok" simulcount = 0 mpp = no } # Loading module "handled" from file /etc/freeradius/3.0/mods-enabled/always always handled { rcode = "handled" simulcount = 0 mpp = no } # Loading module "invalid" from file /etc/freeradius/3.0/mods-enabled/always always invalid { rcode = "invalid" simulcount = 0 mpp = no } # Loading module "userlock" from file /etc/freeradius/3.0/mods-enabled/always always userlock { rcode = "userlock" simulcount = 0 mpp = no } # Loading module "notfound" from file /etc/freeradius/3.0/mods-enabled/always always notfound { rcode = "notfound" simulcount = 0 mpp = no } # Loading module "noop" from file /etc/freeradius/3.0/mods-enabled/always always noop { rcode = "noop" simulcount = 0 mpp = no } # Loading module "updated" from file /etc/freeradius/3.0/mods-enabled/always always updated { rcode = "updated" simulcount = 0 mpp = no } # Loaded module rlm_replicate # Loading module "replicate" from file /etc/freeradius/3.0/mods-enabled/replicate # Loading module "exec" from file /etc/freeradius/3.0/mods-enabled/exec exec { wait = no input_pairs = "request" shell_escape = yes timeout = 10 } # Loaded module rlm_unpack # Loading module "unpack" from file /etc/freeradius/3.0/mods-enabled/unpack # Loaded module rlm_logintime # Loading module "logintime" from file /etc/freeradius/3.0/mods-enabled/logintime logintime { minimum_timeout = 60 } # Loaded module rlm_passwd # Loading module "etc_passwd" from file /etc/freeradius/3.0/mods-enabled/passwd passwd etc_passwd { filename = "/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":" ignore_nislike = no ignore_empty = yes allow_multiple_keys = no hash_size = 100 } # Loaded module rlm_soh # Loading module "soh" from file /etc/freeradius/3.0/mods-enabled/soh soh { dhcp = yes } # Loaded module rlm_linelog # Loading module "linelog" from file /etc/freeradius/3.0/mods-enabled/linelog linelog { filename = "/var/log/freeradius/linelog" escape_filenames = no syslog_severity = "info" permissions = 384 format = "This is a log message for %{User-Name}" reference = "messages.%{%{reply:Packet-Type}:-default}" } # Loading module "log_accounting" from file /etc/freeradius/3.0/mods-enabled/linelog linelog log_accounting { filename = "/var/log/freeradius/linelog-accounting" escape_filenames = no syslog_severity = "info" permissions = 384 format = "" reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loading module "sradutmp" from file /etc/freeradius/3.0/mods-enabled/sradutmp radutmp sradutmp { filename = "/var/log/freeradius/sradutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 420 caller_id = no } # Loading module "auth_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail auth_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d" header = "%t" permissions = 384 locking = no dates_as_integer = no escape_filenames = no log_packet_header = no } # Loading module "reply_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail reply_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d" header = "%t" permissions = 384 locking = no dates_as_integer = no escape_filenames = no log_packet_header = no } # Loading module "pre_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail pre_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no dates_as_integer = no escape_filenames = no log_packet_header = no } # Loading module "post_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail post_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no dates_as_integer = no escape_filenames = no log_packet_header = no } # Loaded module rlm_files # Loading module "files" from file /etc/freeradius/3.0/mods-enabled/files files { filename = "/etc/freeradius/3.0/mods-config/files/authorize" acctusersfile = "/etc/freeradius/3.0/mods-config/files/accounting" preproxy_usersfile = "/etc/freeradius/3.0/mods-config/files/pre-proxy" } # Loaded module rlm_utf8 # Loading module "utf8" from file /etc/freeradius/3.0/mods-enabled/utf8 # Loaded module rlm_expr # Loading module "expr" from file /etc/freeradius/3.0/mods-enabled/expr expr { safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" } # Loaded module rlm_expiration # Loading module "expiration" from file /etc/freeradius/3.0/mods-enabled/expiration # Loaded module rlm_preprocess # Loading module "preprocess" from file /etc/freeradius/3.0/mods-enabled/preprocess preprocess { huntgroups = "/etc/freeradius/3.0/mods-config/preprocess/huntgroups" hints = "/etc/freeradius/3.0/mods-config/preprocess/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } instantiate { } # Instantiating module "eap" from file /etc/freeradius/3.0/mods-enabled/eap # Linked to sub-module rlm_eap_tls tls { tls = "tls-common" } tls-config tls-common { verify_depth = 0 ca_path = "/etc/freeradius/3.0/certs" pem_file_type = yes private_key_file = "/etc/freeradius/3.0/certs/Little_PKI/Raspberry_RADIUS/private/Raspberry-RADIUS-Server.key" certificate_file = "/etc/freeradius/3.0/certs/Little_PKI/Raspberry_RADIUS/cert/Raspberry-RADIUS-Server.crt" ca_file = "/etc/freeradius/3.0/certs/Little_PKI/Root_CA/certs/Root-CA.crt" fragment_size = 1024 include_length = yes auto_chain = no check_crl = no check_all_crl = no ca_path_reload_interval = 0 cipher_server_preference = yes reject_unknown_intermediate_ca = no ecdh_curve = "secp384r1" tls_max_version = "1.3" tls_min_version = "1.3" cache { enable = no lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = no } } # Instantiating module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "bangpath" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "realmpercent" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "ntdomain" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "attr_filter.post-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/post-proxy # Instantiating module "attr_filter.pre-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/pre-proxy # Instantiating module "attr_filter.access_reject" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/access_reject # Instantiating module "attr_filter.access_challenge" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/access_challenge # Instantiating module "attr_filter.accounting_response" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/accounting_response # Instantiating module "attr_filter.coa" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/coa # Instantiating module "detail" from file /etc/freeradius/3.0/mods-enabled/detail # Instantiating module "reject" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "fail" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "ok" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "handled" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "invalid" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "userlock" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "notfound" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "noop" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "updated" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "logintime" from file /etc/freeradius/3.0/mods-enabled/logintime # Instantiating module "etc_passwd" from file /etc/freeradius/3.0/mods-enabled/passwd rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no # Instantiating module "linelog" from file /etc/freeradius/3.0/mods-enabled/linelog # Instantiating module "log_accounting" from file /etc/freeradius/3.0/mods-enabled/linelog # Instantiating module "auth_log" from file /etc/freeradius/3.0/mods-enabled/detail.log rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output # Instantiating module "reply_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "pre_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "post_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "files" from file /etc/freeradius/3.0/mods-enabled/files reading pairlist file /etc/freeradius/3.0/mods-config/files/authorize reading pairlist file /etc/freeradius/3.0/mods-config/files/accounting reading pairlist file /etc/freeradius/3.0/mods-config/files/pre-proxy # Instantiating module "expiration" from file /etc/freeradius/3.0/mods-enabled/expiration # Instantiating module "preprocess" from file /etc/freeradius/3.0/mods-enabled/preprocess reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/huntgroups reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/hints } # modules radiusd: #### Loading Virtual Servers #### server { # from file /etc/freeradius/3.0/radiusd.conf } # server server default { # from file /etc/freeradius/3.0/sites-enabled/default # Loading authenticate {...} # Loading authorize {...} Compiling Autz-Type New-TLS-Connection for attr Autz-Type # Loading preacct {...} # Loading accounting {...} # Loading post-auth {...} Compiling Post-Auth-Type REJECT for attr Post-Auth-Type Compiling Post-Auth-Type Challenge for attr Post-Auth-Type Compiling Post-Auth-Type Client-Lost for attr Post-Auth-Type } # server default radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 900 } } listen { type = "acct" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Listening on auth address * port 1812 bound to server default Listening on acct address * port 1813 bound to server default Ready to process requests (0) Received Access-Request Id 78 from 192.168.10.1:33893 to 192.168.10.238:1812 length 269 (0) User-Name = "TEST_PC_P384" (0) NAS-IP-Address = 192.168.10.1 (0) NAS-Identifier = "1c0b8b4c3175" (0) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (0) NAS-Port-Type = Wireless-802.11 (0) Service-Type = Framed-User (0) NAS-Port = 1 (0) Calling-Station-Id = "84-7B-57-58-14-F7" (0) Connect-Info = "CONNECT 54Mbps 802.11a" (0) Acct-Session-Id = "A6DE29D9F4C32F7A" (0) Acct-Multi-Session-Id = "8460CA8D459507EB" (0) WLAN-Pairwise-Cipher = 1027076 (0) WLAN-Group-Cipher = 1027076 (0) WLAN-AKM-Suite = 1027077 (0) WLAN-Group-Mgmt-Cipher = 1027078 (0) Filter-Id = "wpa-eap" (0) Framed-MTU = 1002 (0) EAP-Message = 0x0236001101544553545f50435f50333834 (0) Chargeable-User-Identity = 0x00 (0) Message-Authenticator = 0x9a418d89988a1b37ee7223b01a18ed31 (0) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (0) authorize { (0) [preprocess] = ok (0) eap: Peer sent EAP Response (code 2) ID 54 length 17 (0) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (0) [eap] = ok (0) } # authorize = ok (0) Found Auth-Type = eap (0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (0) authenticate { (0) eap: Peer sent packet with method EAP Identity (1) (0) eap: Using default_eap_type = TLS (0) eap: Calling submodule eap_tls to process data (0) eap_tls: (TLS) TLS -Initiating new session (0) eap_tls: (TLS) TLS - Setting verify mode to require certificate from client (0) eap: Sending EAP Request (code 1) ID 55 length 6 (0) eap: EAP session adding &reply:State = 0xc44351cfc4745c8d (0) [eap] = handled (0) } # authenticate = handled (0) Using Post-Auth-Type Challenge (0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (0) Challenge { ... } # empty sub-section is ignored (0) session-state: Saving cached attributes (0) Framed-MTU = 1002 (0) Sent Access-Challenge Id 78 from 192.168.10.238:1812 to 192.168.10.1:33893 length 64 (0) EAP-Message = 0x013700060d20 (0) Message-Authenticator = 0x00000000000000000000000000000000 (0) State = 0xc44351cfc4745c8d564c5318522caa71 (0) Finished request Waking up in 4.9 seconds. (1) Received Access-Request Id 79 from 192.168.10.1:33893 to 192.168.10.238:1812 length 709 (1) User-Name = "TEST_PC_P384" (1) NAS-IP-Address = 192.168.10.1 (1) NAS-Identifier = "1c0b8b4c3175" (1) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (1) NAS-Port-Type = Wireless-802.11 (1) Service-Type = Framed-User (1) NAS-Port = 1 (1) Calling-Station-Id = "84-7B-57-58-14-F7" (1) Connect-Info = "CONNECT 54Mbps 802.11a" (1) Acct-Session-Id = "A6DE29D9F4C32F7A" (1) Acct-Multi-Session-Id = "8460CA8D459507EB" (1) WLAN-Pairwise-Cipher = 1027076 (1) WLAN-Group-Cipher = 1027076 (1) WLAN-AKM-Suite = 1027077 (1) WLAN-Group-Mgmt-Cipher = 1027078 (1) Filter-Id = "wpa-eap" (1) Framed-MTU = 1002 (1) EAP-Message = 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 (1) State = 0xc44351cfc4745c8d564c5318522caa71 (1) Chargeable-User-Identity = 0x00 (1) Message-Authenticator = 0x5bf6269954954b78817f2bccc5d3a6a0 (1) Restoring &session-state (1) &session-state:Framed-MTU = 1002 (1) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (1) authorize { (1) [preprocess] = ok (1) eap: Peer sent EAP Response (code 2) ID 55 length 437 (1) eap: No EAP Start, assuming it's an on-going EAP conversation (1) [eap] = updated (1) [files] = noop (1) [expiration] = noop (1) [logintime] = noop (1) } # authorize = updated (1) Found Auth-Type = eap (1) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (1) authenticate { (1) eap: Removing EAP session with state 0xc44351cfc4745c8d (1) eap: Previous EAP request found for state 0xc44351cfc4745c8d, released from the list (1) eap: Peer sent packet with method EAP TLS (13) (1) eap: Calling submodule eap_tls to process data (1) eap_tls: (TLS) EAP Peer says that the final record size will be 427 bytes (1) eap_tls: (TLS) EAP Got all data (427 bytes) (1) eap_tls: (TLS) TLS - Handshake state - before SSL initialization (1) eap_tls: (TLS) TLS - Handshake state - Server before SSL initialization (1) eap_tls: (TLS) TLS - Handshake state - Server before SSL initialization (1) eap_tls: (TLS) TLS - recv TLS 1.3 Handshake, ClientHello (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS read client hello (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, ServerHello (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS write server hello (1) eap_tls: (TLS) TLS - send TLS 1.3 ChangeCipherSpec (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS write change cipher spec (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions (1) eap_tls: (TLS) TLS - Handshake state - Server TLSv1.3 write encrypted extensions (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, CertificateRequest (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS write certificate request (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, Certificate (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS write certificate (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, CertificateVerify (1) eap_tls: (TLS) TLS - Handshake state - Server TLSv1.3 write server certificate verify (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, Finished (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS write finished (1) eap_tls: (TLS) TLS - Handshake state - Server TLSv1.3 early data (1) eap_tls: (TLS) TLS - Server : Need to read more data: TLSv1.3 early data (1) eap_tls: (TLS) TLS - In Handshake Phase (1) eap: Sending EAP Request (code 1) ID 56 length 1008 (1) eap: EAP session adding &reply:State = 0xc44351cfc57b5c8d (1) [eap] = handled (1) } # authenticate = handled (1) Using Post-Auth-Type Challenge (1) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (1) Challenge { ... } # empty sub-section is ignored (1) session-state: Saving cached attributes (1) Framed-MTU = 1002 (1) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (1) Sent Access-Challenge Id 79 from 192.168.10.238:1812 to 192.168.10.1:33893 length 1072 (1) EAP-Message = 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 (1) Message-Authenticator = 0x00000000000000000000000000000000 (1) State = 0xc44351cfc57b5c8d564c5318522caa71 (1) Finished request Waking up in 4.9 seconds. (2) Received Access-Request Id 80 from 192.168.10.1:33893 to 192.168.10.238:1812 length 276 (2) User-Name = "TEST_PC_P384" (2) NAS-IP-Address = 192.168.10.1 (2) NAS-Identifier = "1c0b8b4c3175" (2) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (2) NAS-Port-Type = Wireless-802.11 (2) Service-Type = Framed-User (2) NAS-Port = 1 (2) Calling-Station-Id = "84-7B-57-58-14-F7" (2) Connect-Info = "CONNECT 54Mbps 802.11a" (2) Acct-Session-Id = "A6DE29D9F4C32F7A" (2) Acct-Multi-Session-Id = "8460CA8D459507EB" (2) WLAN-Pairwise-Cipher = 1027076 (2) WLAN-Group-Cipher = 1027076 (2) WLAN-AKM-Suite = 1027077 (2) WLAN-Group-Mgmt-Cipher = 1027078 (2) Filter-Id = "wpa-eap" (2) Framed-MTU = 1002 (2) EAP-Message = 0x023800060d00 (2) State = 0xc44351cfc57b5c8d564c5318522caa71 (2) Chargeable-User-Identity = 0x00 (2) Message-Authenticator = 0xea9cee5ef48e3753e24ac87de4893f27 (2) Restoring &session-state (2) &session-state:Framed-MTU = 1002 (2) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (2) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (2) authorize { (2) [preprocess] = ok (2) eap: Peer sent EAP Response (code 2) ID 56 length 6 (2) eap: No EAP Start, assuming it's an on-going EAP conversation (2) [eap] = updated (2) [files] = noop (2) [expiration] = noop (2) [logintime] = noop (2) } # authorize = updated (2) Found Auth-Type = eap (2) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (2) authenticate { (2) eap: Removing EAP session with state 0xc44351cfc57b5c8d (2) eap: Previous EAP request found for state 0xc44351cfc57b5c8d, released from the list (2) eap: Peer sent packet with method EAP TLS (13) (2) eap: Calling submodule eap_tls to process data (2) eap_tls: (TLS) Peer ACKed our handshake fragment (2) eap: Sending EAP Request (code 1) ID 57 length 331 (2) eap: EAP session adding &reply:State = 0xc44351cfc67a5c8d (2) [eap] = handled (2) } # authenticate = handled (2) Using Post-Auth-Type Challenge (2) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (2) Challenge { ... } # empty sub-section is ignored (2) session-state: Saving cached attributes (2) Framed-MTU = 1002 (2) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (2) Sent Access-Challenge Id 80 from 192.168.10.238:1812 to 192.168.10.1:33893 length 391 (2) EAP-Message = 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 (2) Message-Authenticator = 0x00000000000000000000000000000000 (2) State = 0xc44351cfc67a5c8d564c5318522caa71 (2) Finished request Waking up in 4.9 seconds. (3) Received Access-Request Id 81 from 192.168.10.1:33893 to 192.168.10.238:1812 length 1106 (3) User-Name = "TEST_PC_P384" (3) NAS-IP-Address = 192.168.10.1 (3) NAS-Identifier = "1c0b8b4c3175" (3) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (3) NAS-Port-Type = Wireless-802.11 (3) Service-Type = Framed-User (3) NAS-Port = 1 (3) Calling-Station-Id = "84-7B-57-58-14-F7" (3) Connect-Info = "CONNECT 54Mbps 802.11a" (3) Acct-Session-Id = "A6DE29D9F4C32F7A" (3) Acct-Multi-Session-Id = "8460CA8D459507EB" (3) WLAN-Pairwise-Cipher = 1027076 (3) WLAN-Group-Cipher = 1027076 (3) WLAN-AKM-Suite = 1027077 (3) WLAN-Group-Mgmt-Cipher = 1027078 (3) Filter-Id = "wpa-eap" (3) Framed-MTU = 1002 (3) EAP-Message = 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 (3) State = 0xc44351cfc67a5c8d564c5318522caa71 (3) Chargeable-User-Identity = 0x00 (3) Message-Authenticator = 0xac6f1621e519c3fa2611b34484989da5 (3) Restoring &session-state (3) &session-state:Framed-MTU = 1002 (3) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (3) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (3) authorize { (3) [preprocess] = ok (3) eap: Peer sent EAP Response (code 2) ID 57 length 830 (3) eap: No EAP Start, assuming it's an on-going EAP conversation (3) [eap] = updated (3) [files] = noop (3) [expiration] = noop (3) [logintime] = noop (3) } # authorize = updated (3) Found Auth-Type = eap (3) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (3) authenticate { (3) eap: Removing EAP session with state 0xc44351cfc67a5c8d (3) eap: Previous EAP request found for state 0xc44351cfc67a5c8d, released from the list (3) eap: Peer sent packet with method EAP TLS (13) (3) eap: Calling submodule eap_tls to process data (3) eap_tls: (TLS) EAP Peer says that the final record size will be 820 bytes (3) eap_tls: (TLS) EAP Got all data (820 bytes) (3) eap_tls: (TLS) TLS - recv TLS 1.3 ChangeCipherSpec (3) eap_tls: (TLS) TLS - Handshake state - Server TLSv1.3 early data (3) eap_tls: (TLS) TLS - recv TLS 1.3 Handshake, Certificate (3) eap_tls: (TLS) TLS - Creating attributes from 2 certificate in chain (3) eap_tls: TLS-Cert-Serial := "bb2bfa6c64bb624f341dd67b26de3283" (3) eap_tls: TLS-Cert-Expiration := "351210170749Z" (3) eap_tls: TLS-Cert-Valid-Since := "251212170749Z" (3) eap_tls: TLS-Cert-Subject := "/C=US/ST=California/O=Silicon Valley/OU=Defense/CN=Root CA" (3) eap_tls: TLS-Cert-Issuer := "/C=US/ST=California/O=Silicon Valley/OU=Defense/CN=Root CA" (3) eap_tls: TLS-Cert-Common-Name := "Root CA" (3) eap_tls: (TLS) TLS - Creating attributes from 1 certificate in chain (3) eap_tls: TLS-Client-Cert-Serial := "e9ad5b5ba8d765c6551f41dcc5b57c1d" (3) eap_tls: TLS-Client-Cert-Expiration := "351210170752Z" (3) eap_tls: TLS-Client-Cert-Valid-Since := "251212170752Z" (3) eap_tls: TLS-Client-Cert-Subject := "/C=US/ST=California/O=Silicon Valley/OU=Defense/CN=TEST_PC_P384" (3) eap_tls: TLS-Client-Cert-Issuer := "/C=US/ST=California/O=Silicon Valley/OU=Defense/CN=Root CA" (3) eap_tls: TLS-Client-Cert-Common-Name := "TEST_PC_P384" (3) eap_tls: TLS-Client-Cert-X509v3-Subject-Key-Identifier += "BF:BD:7E:52:DE:18:3A:67:9B:69:FB:B0:18:92:D4:F6:E5:FA:30:02" (3) eap_tls: TLS-Client-Cert-X509v3-Authority-Key-Identifier += "53:1A:4E:65:FB:95:D3:30:CC:20:B9:47:ED:E0:1F:6F:D4:C7:B2:7A" (3) eap_tls: TLS-Client-Cert-X509v3-Basic-Constraints += "CA:FALSE" (3) eap_tls: TLS-Client-Cert-X509v3-Extended-Key-Usage += "TLS Web Client Authentication" (3) eap_tls: TLS-Client-Cert-X509v3-Extended-Key-Usage-OID += "1.3.6.1.5.5.7.3.2" (3) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS read client certificate (3) eap_tls: (TLS) TLS - recv TLS 1.3 Handshake, CertificateVerify (3) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS read certificate verify (3) eap_tls: (TLS) TLS - recv TLS 1.3 Handshake, Finished (3) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS read finished (3) eap_tls: (TLS) TLS - Handshake state - SSL negotiation finished successfully (3) eap_tls: (TLS) TLS - Connection Established (3) eap_tls: TLS-Session-Cipher-Suite = "TLS_AES_256_GCM_SHA384" (3) eap_tls: TLS-Session-Version = "TLS 1.3" (3) eap_tls: (TLS) TLS - Application data. (3) eap_tls: (TLS) EAP Sending final Commitment Message. (3) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, Finished (3) eap: Sending EAP Request (code 1) ID 58 length 33 (3) eap: EAP session adding &reply:State = 0xc44351cfc7795c8d (3) [eap] = handled (3) } # authenticate = handled (3) Using Post-Auth-Type Challenge (3) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (3) Challenge { ... } # empty sub-section is ignored (3) session-state: Saving cached attributes (3) Framed-MTU = 1002 (3) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (3) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 ChangeCipherSpec" (3) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, Certificate" (3) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, CertificateVerify" (3) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, Finished" (3) TLS-Session-Cipher-Suite = "TLS_AES_256_GCM_SHA384" (3) TLS-Session-Version = "TLS 1.3" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (3) Sent Access-Challenge Id 81 from 192.168.10.238:1812 to 192.168.10.1:33893 length 91 (3) EAP-Message = 0x013a00210d800000001717030300121949f70c014bc102dd553dc384779ebdfb0b (3) Message-Authenticator = 0x00000000000000000000000000000000 (3) State = 0xc44351cfc7795c8d564c5318522caa71 (3) Finished request Waking up in 4.8 seconds. (4) Received Access-Request Id 82 from 192.168.10.1:33893 to 192.168.10.238:1812 length 304 (4) User-Name = "TEST_PC_P384" (4) NAS-IP-Address = 192.168.10.1 (4) NAS-Identifier = "1c0b8b4c3175" (4) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (4) NAS-Port-Type = Wireless-802.11 (4) Service-Type = Framed-User (4) NAS-Port = 1 (4) Calling-Station-Id = "84-7B-57-58-14-F7" (4) Connect-Info = "CONNECT 54Mbps 802.11a" (4) Acct-Session-Id = "A6DE29D9F4C32F7A" (4) Acct-Multi-Session-Id = "8460CA8D459507EB" (4) WLAN-Pairwise-Cipher = 1027076 (4) WLAN-Group-Cipher = 1027076 (4) WLAN-AKM-Suite = 1027077 (4) WLAN-Group-Mgmt-Cipher = 1027078 (4) Filter-Id = "wpa-eap" (4) Framed-MTU = 1002 (4) EAP-Message = 0x023a00220d80000000181703030013879468b89dde96f347e6d3fa9a7c6cde9688b5 (4) State = 0xc44351cfc7795c8d564c5318522caa71 (4) Chargeable-User-Identity = 0x00 (4) Message-Authenticator = 0xdb722f103db148ce34ecd2e75d3aa84a (4) Restoring &session-state (4) &session-state:Framed-MTU = 1002 (4) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (4) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 ChangeCipherSpec" (4) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, Certificate" (4) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, CertificateVerify" (4) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, Finished" (4) &session-state:TLS-Session-Cipher-Suite = "TLS_AES_256_GCM_SHA384" (4) &session-state:TLS-Session-Version = "TLS 1.3" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (4) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (4) authorize { (4) [preprocess] = ok (4) eap: Peer sent EAP Response (code 2) ID 58 length 34 (4) eap: No EAP Start, assuming it's an on-going EAP conversation (4) [eap] = updated (4) [files] = noop (4) [expiration] = noop (4) [logintime] = noop (4) } # authorize = updated (4) Found Auth-Type = eap (4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (4) authenticate { (4) eap: Removing EAP session with state 0xc44351cfc7795c8d (4) eap: Previous EAP request found for state 0xc44351cfc7795c8d, released from the list (4) eap: Peer sent packet with method EAP TLS (13) (4) eap: Calling submodule eap_tls to process data (4) eap_tls: (TLS) EAP Peer says that the final record size will be 24 bytes (4) eap_tls: (TLS) EAP Got all data (24 bytes) (4) eap_tls: (TLS) TLS - recv TLS 1.3 Alert, fatal unknown_ca (4) eap_tls: (TLS) TLS - The client is informing us that it does not recognize the CA used to issue the server certificate. Please update the client so that it knows about the CA. (4) eap_tls: ERROR: (TLS) TLS - Alert read:fatal:unknown CA (4) eap_tls: ERROR: (TLS) Error in fragmentation logic - code 1 (4) eap_tls: ERROR: (TLS) Failed reading application data from OpenSSL: error:0A000418:SSL routines::tlsv1 alert unknown ca (4) eap_tls: ERROR: [eaptls process] = fail (4) eap: ERROR: Failed continuing EAP TLS (13) session. EAP sub-module failed (4) eap: Sending EAP Failure (code 4) ID 58 length 4 (4) eap: Failed in EAP select (4) [eap] = invalid (4) } # authenticate = invalid (4) Failed to authenticate the user (4) Using Post-Auth-Type Reject (4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (4) Post-Auth-Type REJECT { (4) attr_filter.access_reject: EXPAND %{User-Name} (4) attr_filter.access_reject: --> TEST_PC_P384 (4) attr_filter.access_reject: Matched entry DEFAULT at line 11 (4) [attr_filter.access_reject] = updated (4) [eap] = noop (4) policy remove_reply_message_if_eap { (4) if (&reply:EAP-Message && &reply:Reply-Message) { (4) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE (4) else { (4) [noop] = noop (4) } # else = noop (4) } # policy remove_reply_message_if_eap = noop (4) } # Post-Auth-Type REJECT = updated (4) Delaying response for 1.000000 seconds Waking up in 0.6 seconds. Waking up in 0.3 seconds. (4) Sending delayed response (4) Sent Access-Reject Id 82 from 192.168.10.238:1812 to 192.168.10.1:33893 length 44 (4) EAP-Message = 0x043a0004 (4) Message-Authenticator = 0x00000000000000000000000000000000 Waking up in 3.8 seconds. (0) Cleaning up request packet ID 78 with timestamp +17 due to cleanup_delay was reached (1) Cleaning up request packet ID 79 with timestamp +18 due to cleanup_delay was reached (2) Cleaning up request packet ID 80 with timestamp +18 due to cleanup_delay was reached (3) Cleaning up request packet ID 81 with timestamp +18 due to cleanup_delay was reached (4) Cleaning up request packet ID 82 with timestamp +18 due to cleanup_delay was reached Ready to process requests