[Was: rlm_mschap: Unknown expansion string] Segfault while sending Access-Accept
Luca Corti
cortez at tiscali.it
Tue Nov 15 17:33:35 CET 2005
On Tue, 2005-11-15 at 09:38 -0600, Michael Griego wrote:
> ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key
> --username=%{mschap:User-Name} --challenge=%{mschap:Challenge}
> --nt-response=%{mschap:NT-Response} --domain=%{mschap:NT-Domain}"
Thanks a lot, this makes ntlm_auth work. Unfotunately now freeradius
segfaults while sending Access-Accept:
modcall: entering group authorize for request 8
modcall[authorize]: module "preprocess" returns ok for request 8
modcall[authorize]: module "mschap" returns noop for request 8
rlm_realm: Looking up realm "MYDOMAIN" for User-Name = "MYDOMAIN
\myuser"
rlm_realm: Found realm "MYDOMAIN"
rlm_realm: Adding Stripped-User-Name = "myuser"
rlm_realm: Proxying request from user myuser to realm MYDOMAIN
rlm_realm: Adding Realm = "MYDOMAIN"
rlm_realm: Authentication realm is LOCAL.
modcall[authorize]: module "ntdomain" returns noop for request 8
rlm_eap: EAP packet type response id 8 length 38
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 8
modcall: leaving group authorize (returns updated) for request 8
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_peap: Received EAP-TLV response.
rlm_eap_peap: Tunneled data is valid.
rlm_eap_peap: Success
rlm_eap: Freeing handler
modcall[authenticate]: module "eap" returns ok for request 8
modcall: leaving group authenticate (returns ok) for request 8
Sending Access-Accept of id 8 to 172.16.1.250 port 1037
MS-MPPE-Recv-Key =
0x89fe613a15cbcbf6e9fa6d7b6f730db6c1a9c548c24c6ff3d67635d28caed390
Segmentation fault
thanks
Luca
--
Luca Corti
PGP Key ID 1F38C091
BOFH excuse of the moment:
need to wrap system in aluminum foil to fix problem
More information about the Freeradius-Users
mailing list