FreeRADIUS Version 3.2.7 Copyright (C) 1999-2023 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ... including dictionary file /usr/share/freeradius/dictionary including dictionary file /usr/share/freeradius/dictionary.dhcp including dictionary file /usr/share/freeradius/dictionary.vqp including dictionary file /etc/freeradius/3.0/dictionary including configuration file /etc/freeradius/3.0/radiusd.conf including configuration file /etc/freeradius/3.0/clients.conf including files in directory /etc/freeradius/3.0/mods-enabled/ including configuration file /etc/freeradius/3.0/mods-enabled/radutmp including configuration file /etc/freeradius/3.0/mods-enabled/eap including configuration file /etc/freeradius/3.0/mods-enabled/realm including configuration file /etc/freeradius/3.0/mods-enabled/attr_filter including configuration file /etc/freeradius/3.0/mods-enabled/unix including configuration file /etc/freeradius/3.0/mods-enabled/dynamic_clients including configuration file /etc/freeradius/3.0/mods-enabled/detail including configuration file /etc/freeradius/3.0/mods-enabled/echo including configuration file /etc/freeradius/3.0/mods-enabled/always including configuration file /etc/freeradius/3.0/mods-enabled/replicate including configuration file /etc/freeradius/3.0/mods-enabled/exec including configuration file /etc/freeradius/3.0/mods-enabled/unpack including configuration file /etc/freeradius/3.0/mods-enabled/logintime including configuration file /etc/freeradius/3.0/mods-enabled/passwd including configuration file /etc/freeradius/3.0/mods-enabled/soh including configuration file /etc/freeradius/3.0/mods-enabled/linelog including configuration file /etc/freeradius/3.0/mods-enabled/sradutmp including configuration file /etc/freeradius/3.0/mods-enabled/detail.log including configuration file /etc/freeradius/3.0/mods-enabled/files including configuration file /etc/freeradius/3.0/mods-enabled/utf8 including configuration file /etc/freeradius/3.0/mods-enabled/expr including configuration file /etc/freeradius/3.0/mods-enabled/expiration including configuration file /etc/freeradius/3.0/mods-enabled/preprocess including files in directory /etc/freeradius/3.0/policy.d/ including configuration file /etc/freeradius/3.0/policy.d/abfab-tr including configuration file /etc/freeradius/3.0/policy.d/canonicalization including configuration file /etc/freeradius/3.0/policy.d/eap including configuration file /etc/freeradius/3.0/policy.d/rfc7542 including configuration file /etc/freeradius/3.0/policy.d/debug including configuration file /etc/freeradius/3.0/policy.d/operator-name including configuration file /etc/freeradius/3.0/policy.d/moonshot-targeted-ids including configuration file /etc/freeradius/3.0/policy.d/accounting including configuration file /etc/freeradius/3.0/policy.d/dhcp including configuration file /etc/freeradius/3.0/policy.d/control including configuration file /etc/freeradius/3.0/policy.d/cui including configuration file /etc/freeradius/3.0/policy.d/filter including files in directory /etc/freeradius/3.0/sites-enabled/ including configuration file /etc/freeradius/3.0/sites-enabled/default main { security { user = "freerad" group = "freerad" allow_core_dumps = no } name = "freeradius" prefix = "/usr" localstatedir = "/var" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" } main { name = "freeradius" prefix = "/usr" localstatedir = "/var" sbindir = "/usr/sbin" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" libdir = "/usr/lib/freeradius" radacctdir = "/var/log/freeradius/radacct" hostname_lookups = no max_request_time = 30 proxy_dedup_window = 1 cleanup_delay = 5 max_requests = 16384 max_fds = 512 postauth_client_lost = no pidfile = "/var/run/freeradius/freeradius.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = no log { stripped_names = no auth = no auth_badpass = no auth_goodpass = no colourise = yes msg_denied = "You are already logged in - access denied" } resources { } security { max_attributes = 200 reject_delay = 1.000000 status_server = yes require_message_authenticator = "auto" limit_proxy_state = "auto" } unlang { group_stop_return = no policy_stop_return = no } } radiusd: #### Loading Realms and Home Servers #### radiusd: #### Loading Clients #### client Ubiquiti-Router { ipaddr = 192.168.10.1 secret = <<< secret >>> shortname = "Defense-Router" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Shared secret for client Defense-Router is short, and likely can be broken by an attacker. Debugger not attached Configuration version: 0a05-bdaf-88ff-1853 systemd watchdog is disabled # Creating Auth-Type = eap # Creating Autz-Type = New-TLS-Connection radiusd: #### Instantiating modules #### modules { # Loaded module rlm_radutmp # Loading module "radutmp" from file /etc/freeradius/3.0/mods-enabled/radutmp radutmp { filename = "/var/log/freeradius/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 384 caller_id = yes } # Loaded module rlm_eap # Loading module "eap" from file /etc/freeradius/3.0/mods-enabled/eap eap { default_eap_type = "tls" timer_expire = 60 max_eap_type = 52 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 16384 dedup_key = "" } # Loaded module rlm_realm # Loading module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm realm IPASS { format = "prefix" delimiter = "/" ignore_default = no ignore_null = no } # Loading module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } # Loading module "bangpath" from file /etc/freeradius/3.0/mods-enabled/realm realm bangpath { format = "prefix" delimiter = "!" ignore_default = no ignore_null = no } # Loading module "realmpercent" from file /etc/freeradius/3.0/mods-enabled/realm realm realmpercent { format = "suffix" delimiter = "%" ignore_default = no ignore_null = no } # Loading module "ntdomain" from file /etc/freeradius/3.0/mods-enabled/realm realm ntdomain { format = "prefix" delimiter = "\" ignore_default = no ignore_null = no } # Loaded module rlm_attr_filter # Loading module "attr_filter.post-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.post-proxy { filename = "/etc/freeradius/3.0/mods-config/attr_filter/post-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.pre-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.pre-proxy { filename = "/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.access_reject" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.access_reject { filename = "/etc/freeradius/3.0/mods-config/attr_filter/access_reject" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.access_challenge" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.access_challenge { filename = "/etc/freeradius/3.0/mods-config/attr_filter/access_challenge" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.accounting_response" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.accounting_response { filename = "/etc/freeradius/3.0/mods-config/attr_filter/accounting_response" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.coa" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.coa { filename = "/etc/freeradius/3.0/mods-config/attr_filter/coa" key = "%{User-Name}" relaxed = no } # Loaded module rlm_unix # Loading module "unix" from file /etc/freeradius/3.0/mods-enabled/unix unix { radwtmp = "/var/log/freeradius/radwtmp" } Creating attribute Unix-Group # Loaded module rlm_dynamic_clients # Loading module "dynamic_clients" from file /etc/freeradius/3.0/mods-enabled/dynamic_clients # Loaded module rlm_detail # Loading module "detail" from file /etc/freeradius/3.0/mods-enabled/detail detail { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" permissions = 384 locking = no dates_as_integer = no escape_filenames = no log_packet_header = no } # Loaded module rlm_exec # Loading module "echo" from file /etc/freeradius/3.0/mods-enabled/echo exec echo { wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request" output_pairs = "reply" shell_escape = yes } # Loaded module rlm_always # Loading module "reject" from file /etc/freeradius/3.0/mods-enabled/always always reject { rcode = "reject" simulcount = 0 mpp = no } # Loading module "fail" from file /etc/freeradius/3.0/mods-enabled/always always fail { rcode = "fail" simulcount = 0 mpp = no } # Loading module "ok" from file /etc/freeradius/3.0/mods-enabled/always always ok { rcode = "ok" simulcount = 0 mpp = no } # Loading module "handled" from file /etc/freeradius/3.0/mods-enabled/always always handled { rcode = "handled" simulcount = 0 mpp = no } # Loading module "invalid" from file /etc/freeradius/3.0/mods-enabled/always always invalid { rcode = "invalid" simulcount = 0 mpp = no } # Loading module "userlock" from file /etc/freeradius/3.0/mods-enabled/always always userlock { rcode = "userlock" simulcount = 0 mpp = no } # Loading module "notfound" from file /etc/freeradius/3.0/mods-enabled/always always notfound { rcode = "notfound" simulcount = 0 mpp = no } # Loading module "noop" from file /etc/freeradius/3.0/mods-enabled/always always noop { rcode = "noop" simulcount = 0 mpp = no } # Loading module "updated" from file /etc/freeradius/3.0/mods-enabled/always always updated { rcode = "updated" simulcount = 0 mpp = no } # Loaded module rlm_replicate # Loading module "replicate" from file /etc/freeradius/3.0/mods-enabled/replicate # Loading module "exec" from file /etc/freeradius/3.0/mods-enabled/exec exec { wait = no input_pairs = "request" shell_escape = yes timeout = 10 } # Loaded module rlm_unpack # Loading module "unpack" from file /etc/freeradius/3.0/mods-enabled/unpack # Loaded module rlm_logintime # Loading module "logintime" from file /etc/freeradius/3.0/mods-enabled/logintime logintime { minimum_timeout = 60 } # Loaded module rlm_passwd # Loading module "etc_passwd" from file /etc/freeradius/3.0/mods-enabled/passwd passwd etc_passwd { filename = "/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":" ignore_nislike = no ignore_empty = yes allow_multiple_keys = no hash_size = 100 } # Loaded module rlm_soh # Loading module "soh" from file /etc/freeradius/3.0/mods-enabled/soh soh { dhcp = yes } # Loaded module rlm_linelog # Loading module "linelog" from file /etc/freeradius/3.0/mods-enabled/linelog linelog { filename = "/var/log/freeradius/linelog" escape_filenames = no syslog_severity = "info" permissions = 384 format = "This is a log message for %{User-Name}" reference = "messages.%{%{reply:Packet-Type}:-default}" } # Loading module "log_accounting" from file /etc/freeradius/3.0/mods-enabled/linelog linelog log_accounting { filename = "/var/log/freeradius/linelog-accounting" escape_filenames = no syslog_severity = "info" permissions = 384 format = "" reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loading module "sradutmp" from file /etc/freeradius/3.0/mods-enabled/sradutmp radutmp sradutmp { filename = "/var/log/freeradius/sradutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 420 caller_id = no } # Loading module "auth_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail auth_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d" header = "%t" permissions = 384 locking = no dates_as_integer = no escape_filenames = no log_packet_header = no } # Loading module "reply_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail reply_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d" header = "%t" permissions = 384 locking = no dates_as_integer = no escape_filenames = no log_packet_header = no } # Loading module "pre_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail pre_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no dates_as_integer = no escape_filenames = no log_packet_header = no } # Loading module "post_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail post_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no dates_as_integer = no escape_filenames = no log_packet_header = no } # Loaded module rlm_files # Loading module "files" from file /etc/freeradius/3.0/mods-enabled/files files { filename = "/etc/freeradius/3.0/mods-config/files/authorize" acctusersfile = "/etc/freeradius/3.0/mods-config/files/accounting" preproxy_usersfile = "/etc/freeradius/3.0/mods-config/files/pre-proxy" } # Loaded module rlm_utf8 # Loading module "utf8" from file /etc/freeradius/3.0/mods-enabled/utf8 # Loaded module rlm_expr # Loading module "expr" from file /etc/freeradius/3.0/mods-enabled/expr expr { safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" } # Loaded module rlm_expiration # Loading module "expiration" from file /etc/freeradius/3.0/mods-enabled/expiration # Loaded module rlm_preprocess # Loading module "preprocess" from file /etc/freeradius/3.0/mods-enabled/preprocess preprocess { huntgroups = "/etc/freeradius/3.0/mods-config/preprocess/huntgroups" hints = "/etc/freeradius/3.0/mods-config/preprocess/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } instantiate { } # Instantiating module "eap" from file /etc/freeradius/3.0/mods-enabled/eap # Linked to sub-module rlm_eap_tls tls { tls = "tls-common" } tls-config tls-common { verify_depth = 0 ca_path = "/etc/freeradius/3.0/certs" pem_file_type = yes private_key_file = "/etc/freeradius/3.0/certs/server.key" certificate_file = "/etc/freeradius/3.0/certs/server.crt" ca_file = "/etc/freeradius/3.0/certs/ca.pem" private_key_password = <<< secret >>> fragment_size = 1024 include_length = yes auto_chain = no check_crl = no check_all_crl = no ca_path_reload_interval = 0 cipher_server_preference = yes reject_unknown_intermediate_ca = no ecdh_curve = "secp384r1" tls_max_version = "1.3" tls_min_version = "1.3" cache { enable = no lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = no } } # Instantiating module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "bangpath" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "realmpercent" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "ntdomain" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "attr_filter.post-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/post-proxy # Instantiating module "attr_filter.pre-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/pre-proxy # Instantiating module "attr_filter.access_reject" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/access_reject # Instantiating module "attr_filter.access_challenge" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/access_challenge # Instantiating module "attr_filter.accounting_response" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/accounting_response # Instantiating module "attr_filter.coa" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/coa # Instantiating module "detail" from file /etc/freeradius/3.0/mods-enabled/detail # Instantiating module "reject" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "fail" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "ok" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "handled" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "invalid" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "userlock" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "notfound" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "noop" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "updated" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "logintime" from file /etc/freeradius/3.0/mods-enabled/logintime # Instantiating module "etc_passwd" from file /etc/freeradius/3.0/mods-enabled/passwd rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no # Instantiating module "linelog" from file /etc/freeradius/3.0/mods-enabled/linelog # Instantiating module "log_accounting" from file /etc/freeradius/3.0/mods-enabled/linelog # Instantiating module "auth_log" from file /etc/freeradius/3.0/mods-enabled/detail.log rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output # Instantiating module "reply_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "pre_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "post_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "files" from file /etc/freeradius/3.0/mods-enabled/files reading pairlist file /etc/freeradius/3.0/mods-config/files/authorize reading pairlist file /etc/freeradius/3.0/mods-config/files/accounting reading pairlist file /etc/freeradius/3.0/mods-config/files/pre-proxy # Instantiating module "expiration" from file /etc/freeradius/3.0/mods-enabled/expiration # Instantiating module "preprocess" from file /etc/freeradius/3.0/mods-enabled/preprocess reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/huntgroups reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/hints } # modules radiusd: #### Loading Virtual Servers #### server { # from file /etc/freeradius/3.0/radiusd.conf } # server server default { # from file /etc/freeradius/3.0/sites-enabled/default # Loading authenticate {...} # Loading authorize {...} Compiling Autz-Type New-TLS-Connection for attr Autz-Type # Loading preacct {...} # Loading accounting {...} # Loading post-auth {...} Compiling Post-Auth-Type REJECT for attr Post-Auth-Type Compiling Post-Auth-Type Challenge for attr Post-Auth-Type Compiling Post-Auth-Type Client-Lost for attr Post-Auth-Type } # server default radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 900 } } listen { type = "acct" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Listening on auth address * port 1812 bound to server default Listening on acct address * port 1813 bound to server default Ready to process requests (0) Received Access-Request Id 83 from 192.168.10.1:33893 to 192.168.10.238:1812 length 277 (0) User-Name = "user@example.org" (0) NAS-IP-Address = 192.168.10.1 (0) NAS-Identifier = "1c0b8b4c3175" (0) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (0) NAS-Port-Type = Wireless-802.11 (0) Service-Type = Framed-User (0) NAS-Port = 1 (0) Calling-Station-Id = "84-7B-57-58-14-F7" (0) Connect-Info = "CONNECT 54Mbps 802.11a" (0) Acct-Session-Id = "8AC5112ACAAAE529" (0) Acct-Multi-Session-Id = "48CF054151EB65EA" (0) WLAN-Pairwise-Cipher = 1027076 (0) WLAN-Group-Cipher = 1027076 (0) WLAN-AKM-Suite = 1027077 (0) WLAN-Group-Mgmt-Cipher = 1027078 (0) Filter-Id = "wpa-eap" (0) Framed-MTU = 1002 (0) EAP-Message = 0x023a00150175736572406578616d706c652e6f7267 (0) Chargeable-User-Identity = 0x00 (0) Message-Authenticator = 0x85b420c3f780dfd1ed1b94ab77ae8d13 (0) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (0) authorize { (0) [preprocess] = ok (0) eap: Peer sent EAP Response (code 2) ID 58 length 21 (0) eap: EAP-Identity reply, returning 'ok' so we can short-circuit the rest of authorize (0) [eap] = ok (0) } # authorize = ok (0) Found Auth-Type = eap (0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (0) authenticate { (0) eap: Peer sent packet with method EAP Identity (1) (0) eap: Using default_eap_type = TLS (0) eap: Calling submodule eap_tls to process data (0) eap_tls: (TLS) TLS -Initiating new session (0) eap_tls: (TLS) TLS - Setting verify mode to require certificate from client (0) eap: Sending EAP Request (code 1) ID 59 length 6 (0) eap: EAP session adding &reply:State = 0x91136d2791286041 (0) [eap] = handled (0) } # authenticate = handled (0) Using Post-Auth-Type Challenge (0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (0) Challenge { ... } # empty sub-section is ignored (0) session-state: Saving cached attributes (0) Framed-MTU = 1002 (0) Sent Access-Challenge Id 83 from 192.168.10.238:1812 to 192.168.10.1:33893 length 64 (0) EAP-Message = 0x013b00060d20 (0) Message-Authenticator = 0x00000000000000000000000000000000 (0) State = 0x91136d27912860416a7a6f836eeb5acf (0) Finished request Waking up in 4.9 seconds. (1) Received Access-Request Id 84 from 192.168.10.1:33893 to 192.168.10.238:1812 length 713 (1) User-Name = "user@example.org" (1) NAS-IP-Address = 192.168.10.1 (1) NAS-Identifier = "1c0b8b4c3175" (1) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (1) NAS-Port-Type = Wireless-802.11 (1) Service-Type = Framed-User (1) NAS-Port = 1 (1) Calling-Station-Id = "84-7B-57-58-14-F7" (1) Connect-Info = "CONNECT 54Mbps 802.11a" (1) Acct-Session-Id = "8AC5112ACAAAE529" (1) Acct-Multi-Session-Id = "48CF054151EB65EA" (1) WLAN-Pairwise-Cipher = 1027076 (1) WLAN-Group-Cipher = 1027076 (1) WLAN-AKM-Suite = 1027077 (1) WLAN-Group-Mgmt-Cipher = 1027078 (1) Filter-Id = "wpa-eap" (1) Framed-MTU = 1002 (1) EAP-Message = 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 (1) State = 0x91136d27912860416a7a6f836eeb5acf (1) Chargeable-User-Identity = 0x00 (1) Message-Authenticator = 0x6d9fbf159a53b3a475e94f2d8c4ea905 (1) Restoring &session-state (1) &session-state:Framed-MTU = 1002 (1) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (1) authorize { (1) [preprocess] = ok (1) eap: Peer sent EAP Response (code 2) ID 59 length 437 (1) eap: No EAP Start, assuming it's an on-going EAP conversation (1) [eap] = updated (1) [files] = noop (1) [expiration] = noop (1) [logintime] = noop (1) } # authorize = updated (1) Found Auth-Type = eap (1) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (1) authenticate { (1) eap: Removing EAP session with state 0x91136d2791286041 (1) eap: Previous EAP request found for state 0x91136d2791286041, released from the list (1) eap: Peer sent packet with method EAP TLS (13) (1) eap: Calling submodule eap_tls to process data (1) eap_tls: (TLS) EAP Peer says that the final record size will be 427 bytes (1) eap_tls: (TLS) EAP Got all data (427 bytes) (1) eap_tls: (TLS) TLS - Handshake state - before SSL initialization (1) eap_tls: (TLS) TLS - Handshake state - Server before SSL initialization (1) eap_tls: (TLS) TLS - Handshake state - Server before SSL initialization (1) eap_tls: (TLS) TLS - recv TLS 1.3 Handshake, ClientHello (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS read client hello (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, ServerHello (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS write server hello (1) eap_tls: (TLS) TLS - send TLS 1.3 ChangeCipherSpec (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS write change cipher spec (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions (1) eap_tls: (TLS) TLS - Handshake state - Server TLSv1.3 write encrypted extensions (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, CertificateRequest (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS write certificate request (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, Certificate (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS write certificate (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, CertificateVerify (1) eap_tls: (TLS) TLS - Handshake state - Server TLSv1.3 write server certificate verify (1) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, Finished (1) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS write finished (1) eap_tls: (TLS) TLS - Handshake state - Server TLSv1.3 early data (1) eap_tls: (TLS) TLS - Server : Need to read more data: TLSv1.3 early data (1) eap_tls: (TLS) TLS - In Handshake Phase (1) eap: Sending EAP Request (code 1) ID 60 length 1008 (1) eap: EAP session adding &reply:State = 0x91136d27902f6041 (1) [eap] = handled (1) } # authenticate = handled (1) Using Post-Auth-Type Challenge (1) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (1) Challenge { ... } # empty sub-section is ignored (1) session-state: Saving cached attributes (1) Framed-MTU = 1002 (1) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (1) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (1) Sent Access-Challenge Id 84 from 192.168.10.238:1812 to 192.168.10.1:33893 length 1072 (1) EAP-Message = 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 (1) Message-Authenticator = 0x00000000000000000000000000000000 (1) State = 0x91136d27902f60416a7a6f836eeb5acf (1) Finished request Waking up in 4.9 seconds. (2) Received Access-Request Id 85 from 192.168.10.1:33893 to 192.168.10.238:1812 length 280 (2) User-Name = "user@example.org" (2) NAS-IP-Address = 192.168.10.1 (2) NAS-Identifier = "1c0b8b4c3175" (2) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (2) NAS-Port-Type = Wireless-802.11 (2) Service-Type = Framed-User (2) NAS-Port = 1 (2) Calling-Station-Id = "84-7B-57-58-14-F7" (2) Connect-Info = "CONNECT 54Mbps 802.11a" (2) Acct-Session-Id = "8AC5112ACAAAE529" (2) Acct-Multi-Session-Id = "48CF054151EB65EA" (2) WLAN-Pairwise-Cipher = 1027076 (2) WLAN-Group-Cipher = 1027076 (2) WLAN-AKM-Suite = 1027077 (2) WLAN-Group-Mgmt-Cipher = 1027078 (2) Filter-Id = "wpa-eap" (2) Framed-MTU = 1002 (2) EAP-Message = 0x023c00060d00 (2) State = 0x91136d27902f60416a7a6f836eeb5acf (2) Chargeable-User-Identity = 0x00 (2) Message-Authenticator = 0xb5e613370d127572d486eeefc661bb41 (2) Restoring &session-state (2) &session-state:Framed-MTU = 1002 (2) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (2) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (2) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (2) authorize { (2) [preprocess] = ok (2) eap: Peer sent EAP Response (code 2) ID 60 length 6 (2) eap: No EAP Start, assuming it's an on-going EAP conversation (2) [eap] = updated (2) [files] = noop (2) [expiration] = noop (2) [logintime] = noop (2) } # authorize = updated (2) Found Auth-Type = eap (2) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (2) authenticate { (2) eap: Removing EAP session with state 0x91136d27902f6041 (2) eap: Previous EAP request found for state 0x91136d27902f6041, released from the list (2) eap: Peer sent packet with method EAP TLS (13) (2) eap: Calling submodule eap_tls to process data (2) eap_tls: (TLS) Peer ACKed our handshake fragment (2) eap: Sending EAP Request (code 1) ID 61 length 957 (2) eap: EAP session adding &reply:State = 0x91136d27932e6041 (2) [eap] = handled (2) } # authenticate = handled (2) Using Post-Auth-Type Challenge (2) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (2) Challenge { ... } # empty sub-section is ignored (2) session-state: Saving cached attributes (2) Framed-MTU = 1002 (2) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (2) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (2) Sent Access-Challenge Id 85 from 192.168.10.238:1812 to 192.168.10.1:33893 length 1021 (2) EAP-Message = 0x013d03bd0d800000079946f7909d5d45186cb4baac486c10ed5327480a1a4ecc575b68ce3a89b9fc3b1309a813becd5ecada9c64940900de003dc131a11918c2f7937625c01f2adaab9bd97d0b829a1a624a9912bbdbe75615a06b0b7f5b6e5f29091e77aaedf3a42a0c351c8ed24c02f532f7118d0aa25c6e48c0c58e0ccb751cebefd7b191fc5662571f93afb38e43f802d3e1f2abda6b43c5a7bc7745d841aeae5cc50a8ca6ec4e25421ef6aac82bf5a070253e73ed359b2685b5401e5d1baf93f4226663f4322e7b11e993937f57c72619348e02f48237c665d9091c23e3abedd6abce07ddc5d936723f6a21f7f914211207ff742697d477d5f74c7b7f716e2120ed15e273a8fdd6bef19678f01601f852733b15b0b25500a883e7c28ba29b902883fdacbcbc04261fedf2652f1df0a6ef73a69893302fb0d7686f576f6755831046138c9c1c04e697af0e2e23366375271e84a3ffc0fe2ed5f6a4e60bc22eabd7ab5cfca9d705d3bfa3419e99ca6da723ecda19e4 (2) Message-Authenticator = 0x00000000000000000000000000000000 (2) State = 0x91136d27932e60416a7a6f836eeb5acf (2) Finished request Waking up in 4.8 seconds. (3) Received Access-Request Id 86 from 192.168.10.1:33893 to 192.168.10.238:1812 length 1696 (3) User-Name = "user@example.org" (3) NAS-IP-Address = 192.168.10.1 (3) NAS-Identifier = "1c0b8b4c3175" (3) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (3) NAS-Port-Type = Wireless-802.11 (3) Service-Type = Framed-User (3) NAS-Port = 1 (3) Calling-Station-Id = "84-7B-57-58-14-F7" (3) Connect-Info = "CONNECT 54Mbps 802.11a" (3) Acct-Session-Id = "8AC5112ACAAAE529" (3) Acct-Multi-Session-Id = "48CF054151EB65EA" (3) WLAN-Pairwise-Cipher = 1027076 (3) WLAN-Group-Cipher = 1027076 (3) WLAN-AKM-Suite = 1027077 (3) WLAN-Group-Mgmt-Cipher = 1027078 (3) Filter-Id = "wpa-eap" (3) Framed-MTU = 1002 (3) EAP-Message = 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 (3) State = 0x91136d27932e60416a7a6f836eeb5acf (3) Chargeable-User-Identity = 0x00 (3) Message-Authenticator = 0xc0b7e21c1836c2d2c72fcdf1704d0bd7 (3) Restoring &session-state (3) &session-state:Framed-MTU = 1002 (3) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (3) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (3) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (3) authorize { (3) [preprocess] = ok (3) eap: Peer sent EAP Response (code 2) ID 61 length 1412 (3) eap: No EAP Start, assuming it's an on-going EAP conversation (3) [eap] = updated (3) [files] = noop (3) [expiration] = noop (3) [logintime] = noop (3) } # authorize = updated (3) Found Auth-Type = eap (3) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (3) authenticate { (3) eap: Removing EAP session with state 0x91136d27932e6041 (3) eap: Previous EAP request found for state 0x91136d27932e6041, released from the list (3) eap: Peer sent packet with method EAP TLS (13) (3) eap: Calling submodule eap_tls to process data (3) eap_tls: (TLS) EAP Peer says that the final record size will be 1402 bytes (3) eap_tls: (TLS) EAP Got all data (1402 bytes) (3) eap_tls: (TLS) TLS - recv TLS 1.3 ChangeCipherSpec (3) eap_tls: (TLS) TLS - Handshake state - Server TLSv1.3 early data (3) eap_tls: (TLS) TLS - recv TLS 1.3 Handshake, Certificate (3) eap_tls: (TLS) TLS - Creating attributes from 2 certificate in chain (3) eap_tls: TLS-Cert-Serial := "58d0840aff3fede6d9ad196a81041a40f1fe6e65" (3) eap_tls: TLS-Cert-Expiration := "260127090125Z" (3) eap_tls: TLS-Cert-Valid-Since := "251128090125Z" (3) eap_tls: TLS-Cert-Subject := "/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.org/CN=Example Certificate Authority" (3) eap_tls: TLS-Cert-Issuer := "/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.org/CN=Example Certificate Authority" (3) eap_tls: TLS-Cert-Common-Name := "Example Certificate Authority" (3) eap_tls: TLS-Cert-CRL-Distribution-Points += "http://www.example.org/example_ca.crl" (3) eap_tls: (TLS) TLS - Creating attributes from 1 certificate in chain (3) eap_tls: TLS-Client-Cert-Serial := "02" (3) eap_tls: TLS-Client-Cert-Expiration := "260127090128Z" (3) eap_tls: TLS-Client-Cert-Valid-Since := "251128090128Z" (3) eap_tls: TLS-Client-Cert-Subject := "/C=FR/ST=Radius/O=Example Inc./CN=user@example.org/emailAddress=user@example.org" (3) eap_tls: TLS-Client-Cert-Issuer := "/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.org/CN=Example Certificate Authority" (3) eap_tls: TLS-Client-Cert-Common-Name := "user@example.org" (3) eap_tls: TLS-Client-Cert-CRL-Distribution-Points += "http://www.example.com/example_ca.crl" (3) eap_tls: TLS-Client-Cert-X509v3-Extended-Key-Usage += "TLS Web Client Authentication" (3) eap_tls: TLS-Client-Cert-X509v3-Subject-Key-Identifier += "8B:BE:A8:CB:05:9E:0D:BD:BD:F2:54:00:34:6F:3F:9A:6A:E5:55:BF" (3) eap_tls: TLS-Client-Cert-X509v3-Authority-Key-Identifier += "0E:C4:67:C5:57:FF:E6:45:1B:C9:4D:7A:DE:85:3E:24:65:DE:22:ED" (3) eap_tls: TLS-Client-Cert-X509v3-Extended-Key-Usage-OID += "1.3.6.1.5.5.7.3.2" (3) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS read client certificate (3) eap_tls: (TLS) TLS - recv TLS 1.3 Handshake, CertificateVerify (3) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS read certificate verify (3) eap_tls: (TLS) TLS - recv TLS 1.3 Handshake, Finished (3) eap_tls: (TLS) TLS - Handshake state - Server SSLv3/TLS read finished (3) eap_tls: (TLS) TLS - Handshake state - SSL negotiation finished successfully (3) eap_tls: (TLS) TLS - Connection Established (3) eap_tls: TLS-Session-Cipher-Suite = "TLS_AES_256_GCM_SHA384" (3) eap_tls: TLS-Session-Version = "TLS 1.3" (3) eap_tls: (TLS) TLS - Application data. (3) eap_tls: (TLS) EAP Sending final Commitment Message. (3) eap_tls: (TLS) TLS - send TLS 1.3 Handshake, Finished (3) eap: Sending EAP Request (code 1) ID 62 length 33 (3) eap: EAP session adding &reply:State = 0x91136d27922d6041 (3) [eap] = handled (3) } # authenticate = handled (3) Using Post-Auth-Type Challenge (3) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (3) Challenge { ... } # empty sub-section is ignored (3) session-state: Saving cached attributes (3) Framed-MTU = 1002 (3) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (3) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 ChangeCipherSpec" (3) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, Certificate" (3) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, CertificateVerify" (3) TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, Finished" (3) TLS-Session-Cipher-Suite = "TLS_AES_256_GCM_SHA384" (3) TLS-Session-Version = "TLS 1.3" (3) TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (3) Sent Access-Challenge Id 86 from 192.168.10.238:1812 to 192.168.10.1:33893 length 91 (3) EAP-Message = 0x013e00210d800000001717030300127485da6b50886e12bde1d9cca35fb5727fdb (3) Message-Authenticator = 0x00000000000000000000000000000000 (3) State = 0x91136d27922d60416a7a6f836eeb5acf (3) Finished request Waking up in 4.8 seconds. (4) Received Access-Request Id 87 from 192.168.10.1:33893 to 192.168.10.238:1812 length 280 (4) User-Name = "user@example.org" (4) NAS-IP-Address = 192.168.10.1 (4) NAS-Identifier = "1c0b8b4c3175" (4) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (4) NAS-Port-Type = Wireless-802.11 (4) Service-Type = Framed-User (4) NAS-Port = 1 (4) Calling-Station-Id = "84-7B-57-58-14-F7" (4) Connect-Info = "CONNECT 54Mbps 802.11a" (4) Acct-Session-Id = "8AC5112ACAAAE529" (4) Acct-Multi-Session-Id = "48CF054151EB65EA" (4) WLAN-Pairwise-Cipher = 1027076 (4) WLAN-Group-Cipher = 1027076 (4) WLAN-AKM-Suite = 1027077 (4) WLAN-Group-Mgmt-Cipher = 1027078 (4) Filter-Id = "wpa-eap" (4) Framed-MTU = 1002 (4) EAP-Message = 0x023e00060d00 (4) State = 0x91136d27922d60416a7a6f836eeb5acf (4) Chargeable-User-Identity = 0x00 (4) Message-Authenticator = 0x09fd839e70a5f32f3401dfd7dadccb81 (4) Restoring &session-state (4) &session-state:Framed-MTU = 1002 (4) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, ClientHello" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, ServerHello" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 ChangeCipherSpec" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Certificate" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (4) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 ChangeCipherSpec" (4) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, Certificate" (4) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, CertificateVerify" (4) &session-state:TLS-Session-Information = "(TLS) TLS - recv TLS 1.3 Handshake, Finished" (4) &session-state:TLS-Session-Cipher-Suite = "TLS_AES_256_GCM_SHA384" (4) &session-state:TLS-Session-Version = "TLS 1.3" (4) &session-state:TLS-Session-Information = "(TLS) TLS - send TLS 1.3 Handshake, Finished" (4) # Executing section authorize from file /etc/freeradius/3.0/sites-enabled/default (4) authorize { (4) [preprocess] = ok (4) eap: Peer sent EAP Response (code 2) ID 62 length 6 (4) eap: No EAP Start, assuming it's an on-going EAP conversation (4) [eap] = updated (4) [files] = noop (4) [expiration] = noop (4) [logintime] = noop (4) } # authorize = updated (4) Found Auth-Type = eap (4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (4) authenticate { (4) eap: Removing EAP session with state 0x91136d27922d6041 (4) eap: Previous EAP request found for state 0x91136d27922d6041, released from the list (4) eap: Peer sent packet with method EAP TLS (13) (4) eap: Calling submodule eap_tls to process data (4) eap_tls: (TLS) Peer ACKed our handshake fragment. handshake is finished (4) eap: Sending EAP Success (code 3) ID 62 length 4 (4) eap: Freeing handler (4) [eap] = ok (4) } # authenticate = ok (4) # Executing section post-auth from file /etc/freeradius/3.0/sites-enabled/default (4) post-auth { (4) if (session-state:User-Name && reply:User-Name && request:User-Name && (reply:User-Name == request:User-Name)) { (4) if (session-state:User-Name && reply:User-Name && request:User-Name && (reply:User-Name == request:User-Name)) -> FALSE (4) update { (4) &reply::Framed-MTU += &session-state:Framed-MTU[*] -> 1002 (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - recv TLS 1.3 Handshake, ClientHello' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - send TLS 1.3 Handshake, ServerHello' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - send TLS 1.3 ChangeCipherSpec' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - send TLS 1.3 Handshake, EncryptedExtensions' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - send TLS 1.3 Handshake, CertificateRequest' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - send TLS 1.3 Handshake, Certificate' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - send TLS 1.3 Handshake, CertificateVerify' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - send TLS 1.3 Handshake, Finished' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - recv TLS 1.3 ChangeCipherSpec' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - recv TLS 1.3 Handshake, Certificate' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - recv TLS 1.3 Handshake, CertificateVerify' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - recv TLS 1.3 Handshake, Finished' (4) &reply::TLS-Session-Cipher-Suite += &session-state:TLS-Session-Cipher-Suite[*] -> 'TLS_AES_256_GCM_SHA384' (4) &reply::TLS-Session-Version += &session-state:TLS-Session-Version[*] -> 'TLS 1.3' (4) &reply::TLS-Session-Information += &session-state:TLS-Session-Information[*] -> '(TLS) TLS - send TLS 1.3 Handshake, Finished' (4) } # update = noop (4) [exec] = noop (4) policy remove_reply_message_if_eap { (4) if (&reply:EAP-Message && &reply:Reply-Message) { (4) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE (4) else { (4) [noop] = noop (4) } # else = noop (4) } # policy remove_reply_message_if_eap = noop (4) if (EAP-Key-Name && &reply:EAP-Session-Id) { (4) if (EAP-Key-Name && &reply:EAP-Session-Id) -> FALSE (4) } # post-auth = noop (4) Sent Access-Accept Id 87 from 192.168.10.238:1812 to 192.168.10.1:33893 length 184 (4) MS-MPPE-Recv-Key = 0x5962dcdd2e8e65d6871acf22617a51e14daebe4fc4418cf6c70d146dc029cedb (4) MS-MPPE-Send-Key = 0xd5f1b14882888572fc9f05036f7dabaf6bfb4704aecfe3143e79bcc3c4a81cc8 (4) EAP-Message = 0x033e0004 (4) Message-Authenticator = 0x00000000000000000000000000000000 (4) User-Name = "user@example.org" (4) Framed-MTU += 1002 (4) Finished request Waking up in 4.8 seconds. (5) Received Accounting-Request Id 88 from 192.168.10.1:51414 to 192.168.10.238:1813 length 242 (5) Acct-Status-Type = Start (5) Acct-Authentic = RADIUS (5) User-Name = "user@example.org" (5) NAS-IP-Address = 192.168.10.1 (5) NAS-Identifier = "1c0b8b4c3175" (5) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (5) NAS-Port-Type = Wireless-802.11 (5) Service-Type = Framed-User (5) NAS-Port = 1 (5) Calling-Station-Id = "84-7B-57-58-14-F7" (5) Connect-Info = "CONNECT 54Mbps 802.11a" (5) Acct-Session-Id = "8AC5112ACAAAE529" (5) Acct-Multi-Session-Id = "48CF054151EB65EA" (5) WLAN-Pairwise-Cipher = 1027076 (5) WLAN-Group-Cipher = 1027076 (5) WLAN-AKM-Suite = 1027077 (5) WLAN-Group-Mgmt-Cipher = 1027078 (5) Event-Timestamp = "Dec 15 2025 18:07:48 CET" (5) Acct-Delay-Time = 0 (5) # Executing section preacct from file /etc/freeradius/3.0/sites-enabled/default (5) preacct { (5) [preprocess] = ok (5) policy acct_unique { (5) update request { (5) &Tmp-String-9 := "ai:" (5) } # update request = noop (5) if (("%{hex:&Class}" =~ /^%{hex:&Tmp-String-9}/) && ("%{string:&Class}" =~ /^ai:([0-9a-f]{32})/i)) { (5) EXPAND %{hex:&Class} (5) --> (5) EXPAND ^%{hex:&Tmp-String-9} (5) --> ^61693a (5) if (("%{hex:&Class}" =~ /^%{hex:&Tmp-String-9}/) && ("%{string:&Class}" =~ /^ai:([0-9a-f]{32})/i)) -> FALSE (5) else { (5) update request { (5) EXPAND %{md5:%{User-Name},%{Acct-Session-ID},%{%{NAS-IPv6-Address}:-%{NAS-IP-Address}},%{NAS-Identifier},%{NAS-Port-ID},%{NAS-Port}} (5) --> e51d0faa18e5d3aee3ba34ac14d53894 (5) &Acct-Unique-Session-Id := e51d0faa18e5d3aee3ba34ac14d53894 (5) } # update request = noop (5) } # else = noop (5) update request { (5) &Tmp-String-9 !* ANY (5) } # update request = noop (5) } # policy acct_unique = noop (5) [files] = noop (5) } # preacct = ok (5) # Executing section accounting from file /etc/freeradius/3.0/sites-enabled/default (5) accounting { (5) detail: EXPAND /var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d (5) detail: --> /var/log/freeradius/radacct/192.168.10.1/detail-20251215 (5) detail: /var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d expands to /var/log/freeradius/radacct/192.168.10.1/detail-20251215 (5) detail: EXPAND %t (5) detail: --> Mon Dec 15 18:07:48 2025 (5) [detail] = ok (5) [exec] = noop (5) attr_filter.accounting_response: EXPAND %{User-Name} (5) attr_filter.accounting_response: --> user@example.org (5) attr_filter.accounting_response: Matched entry DEFAULT at line 12 (5) [attr_filter.accounting_response] = updated (5) } # accounting = updated (5) Sent Accounting-Response Id 88 from 192.168.10.238:1813 to 192.168.10.1:51414 length 20 (5) Finished request (5) Cleaning up request packet ID 88 with timestamp +11 due to done Waking up in 4.7 seconds. (6) Received Accounting-Request Id 89 from 192.168.10.1:51414 to 192.168.10.238:1813 length 290 (6) Acct-Status-Type = Interim-Update (6) Acct-Authentic = RADIUS (6) User-Name = "user@example.org" (6) NAS-IP-Address = 192.168.10.1 (6) Framed-IP-Address = 192.168.10.54 (6) NAS-Identifier = "1c0b8b4c3175" (6) Called-Station-Id = "1C-0B-8B-4C-31-75:Test-Router-MARPORT" (6) NAS-Port-Type = Wireless-802.11 (6) Service-Type = Framed-User (6) NAS-Port = 1 (6) Calling-Station-Id = "84-7B-57-58-14-F7" (6) Connect-Info = "CONNECT 54Mbps 802.11a" (6) Acct-Session-Id = "8AC5112ACAAAE529" (6) Acct-Multi-Session-Id = "48CF054151EB65EA" (6) WLAN-Pairwise-Cipher = 1027076 (6) WLAN-Group-Cipher = 1027076 (6) WLAN-AKM-Suite = 1027077 (6) WLAN-Group-Mgmt-Cipher = 1027078 (6) Event-Timestamp = "Dec 15 2025 18:07:48 CET" (6) Acct-Delay-Time = 0 (6) Acct-Session-Time = 0 (6) Acct-Input-Packets = 9 (6) Acct-Output-Packets = 9 (6) Acct-Input-Octets = 2609 (6) Acct-Input-Gigawords = 0 (6) Acct-Output-Octets = 2480 (6) Acct-Output-Gigawords = 0 (6) # Executing section preacct from file /etc/freeradius/3.0/sites-enabled/default (6) preacct { (6) [preprocess] = ok (6) policy acct_unique { (6) update request { (6) &Tmp-String-9 := "ai:" (6) } # update request = noop (6) if (("%{hex:&Class}" =~ /^%{hex:&Tmp-String-9}/) && ("%{string:&Class}" =~ /^ai:([0-9a-f]{32})/i)) { (6) EXPAND %{hex:&Class} (6) --> (6) EXPAND ^%{hex:&Tmp-String-9} (6) --> ^61693a (6) if (("%{hex:&Class}" =~ /^%{hex:&Tmp-String-9}/) && ("%{string:&Class}" =~ /^ai:([0-9a-f]{32})/i)) -> FALSE (6) else { (6) update request { (6) EXPAND %{md5:%{User-Name},%{Acct-Session-ID},%{%{NAS-IPv6-Address}:-%{NAS-IP-Address}},%{NAS-Identifier},%{NAS-Port-ID},%{NAS-Port}} (6) --> e51d0faa18e5d3aee3ba34ac14d53894 (6) &Acct-Unique-Session-Id := e51d0faa18e5d3aee3ba34ac14d53894 (6) } # update request = noop (6) } # else = noop (6) update request { (6) &Tmp-String-9 !* ANY (6) } # update request = noop (6) } # policy acct_unique = noop (6) [files] = noop (6) } # preacct = ok (6) # Executing section accounting from file /etc/freeradius/3.0/sites-enabled/default (6) accounting { (6) detail: EXPAND /var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d (6) detail: --> /var/log/freeradius/radacct/192.168.10.1/detail-20251215 (6) detail: /var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d expands to /var/log/freeradius/radacct/192.168.10.1/detail-20251215 (6) detail: EXPAND %t (6) detail: --> Mon Dec 15 18:07:48 2025 (6) [detail] = ok (6) [exec] = noop (6) attr_filter.accounting_response: EXPAND %{User-Name} (6) attr_filter.accounting_response: --> user@example.org (6) attr_filter.accounting_response: Matched entry DEFAULT at line 12 (6) [attr_filter.accounting_response] = updated (6) } # accounting = updated (6) Sent Accounting-Response Id 89 from 192.168.10.238:1813 to 192.168.10.1:51414 length 20 (6) Finished request (6) Cleaning up request packet ID 89 with timestamp +11 due to done Waking up in 4.7 seconds. (0) Cleaning up request packet ID 83 with timestamp +11 due to cleanup_delay was reached (1) Cleaning up request packet ID 84 with timestamp +11 due to cleanup_delay was reached (2) Cleaning up request packet ID 85 with timestamp +11 due to cleanup_delay was reached (3) Cleaning up request packet ID 86 with timestamp +11 due to cleanup_delay was reached (4) Cleaning up request packet ID 87 with timestamp +11 due to cleanup_delay was reached Ready to process requests