What is this "group authentication"?

Gary Algier gaa at ulticom.com
Mon Jan 9 19:27:12 CET 2006



Alan DeKok wrote:
> Gary Algier <gaa at ulticom.com> wrote:
> 
>>I am trying to use the WinXP supplied supplicant and I am getting:
>>    modcall: group authenticate returns invalid for request 41
>>
>>Can someone give me a hint as to what this means?
> 
> 
>   Read the *rest* of the debug log above that to see what's going on.
I did and it I did not understand it (see below for the log).  I thought
that perhaps there was some sort of groups I needed to setup.

> 
> 
>>When I use the WinXP bulitin supplicant in "Automatically use my
>>Windows login..." mode, Freeradius fails with the group
>>authentication message.
> 
> 
>   It's not "group authentication", it's the "authentication" section
> of "radiusd.conf".
> 
> 
>>If I uncheck that and type a login
>>and password (but not a domain), it works fine.  It never does
>>any sort of group check.  If I supply a domain, it does the group
>>check (and fails).  When does it check groups?  What is it
>>checking?
> 
> 
>   Read the *rest* of the debug log.
Here's the logs (when is fails with a domain supplied):
-------------------------------------------------------------------
Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /etc/ulcmit/raddb/clients.conf
Config:   including file: /etc/ulcmit/raddb/snmp.conf
Config:   including file: /etc/ulcmit/raddb/eap.conf
  main: prefix = "/usr"
  main: localstatedir = "/var"
  main: logdir = "/var/log/radius"
  main: libdir = "/usr/lib"
  main: radacctdir = "/var/log/radius/radacct"
  main: hostname_lookups = no
  main: max_request_time = 30
  main: cleanup_delay = 5
  main: max_requests = 1024
  main: delete_blocked_requests = 0
  main: port = 0
  main: allow_core_dumps = no
  main: log_stripped_names = no
  main: log_file = "/var/log/radius/radius.log"
  main: log_auth = no
  main: log_auth_badpass = no
  main: log_auth_goodpass = no
  main: pidfile = "/var/run/radiusd/radiusd.pid"
  main: user = "radiusd"
  main: group = "radiusd"
  main: usercollide = no
  main: lower_user = "no"
  main: lower_pass = "no"
  main: nospace_user = "no"
  main: nospace_pass = "no"
  main: checkrad = "/usr/sbin/checkrad"
  main: proxy_requests = no
  security: max_attributes = 200
  security: reject_delay = 1
  security: status_server = no
  main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
Using deprecated naslist file.  Support for this will go away soon.
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Library search path is /usr/lib
Module: Loaded exec
  exec: wait = yes
  exec: program = "(null)"
  exec: input_pairs = "request"
  exec: output_pairs = "(null)"
  exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded PAP
  pap: encryption_scheme = "clear"
Module: Instantiated pap (pap)
Module: Loaded CHAP
Module: Instantiated chap (chap)
Module: Loaded MS-CHAP
  mschap: use_mppe = yes
  mschap: require_encryption = no
  mschap: require_strong = no
  mschap: with_ntdomain_hack = no
  mschap: passwd = "(null)"
  mschap: authtype = "MS-CHAP"
  mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap)
Module: Loaded Pam
  pam: pam_auth = "radiusd"
Module: Instantiated pam (pam)
Module: Loaded System
  unix: cache = no
  unix: passwd = "(null)"
  unix: shadow = "(null)"
  unix: group = "(null)"
  unix: radwtmp = "/var/log/radius/radwtmp"
  unix: usegroup = no
  unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
  eap: default_eap_type = "mschapv2"
  eap: timer_expire = 60
  eap: ignore_unknown_eap_types = no
  eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
rlm_eap: Loaded and initialized type leap
  tls: rsa_key_exchange = no
  tls: dh_key_exchange = yes
  tls: rsa_key_length = 512
  tls: dh_key_length = 512
  tls: verify_depth = 0
  tls: CA_path = "(null)"
  tls: pem_file_type = yes
  tls: private_key_file = "/etc/ulcmit/raddb/certs/pyrope.ulticom.com.key"
  tls: certificate_file = "/etc/ulcmit/raddb/certs/pyrope.ulticom.com.crt"
  tls: CA_file = "/etc/ulcmit/raddb/certs/ca.pem"
  tls: private_key_password = "(null)"
  tls: dh_file = "/etc/ulcmit/raddb/certs/dh"
  tls: random_file = "/dev/urandom"
  tls: fragment_size = 1024
  tls: include_length = yes
  tls: check_crl = no
  tls: check_cert_cn = "(null)"
rlm_eap: Loaded and initialized type tls
  ttls: default_eap_type = "md5"
  ttls: copy_request_to_tunnel = no
  ttls: use_tunneled_reply = no
rlm_eap: Loaded and initialized type ttls
  peap: default_eap_type = "mschapv2"
  peap: copy_request_to_tunnel = no
  peap: use_tunneled_reply = no
  peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
  mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
  preprocess: huntgroups = "/etc/ulcmit/raddb/huntgroups"
  preprocess: hints = "/etc/ulcmit/raddb/hints"
  preprocess: with_ascend_hack = no
  preprocess: ascend_channels_per_line = 23
  preprocess: with_ntdomain_hack = no
  preprocess: with_specialix_jetstream_hack = no
  preprocess: with_cisco_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded LDAP
  ldap: server = "ldap.ulticom.com"
  ldap: port = 389
  ldap: net_timeout = 1
  ldap: timeout = 4
  ldap: timelimit = 3
  ldap: identity = ""
  ldap: tls_mode = no
  ldap: start_tls = no
  ldap: tls_cacertfile = "(null)"
  ldap: tls_cacertdir = "(null)"
  ldap: tls_certfile = "(null)"
  ldap: tls_keyfile = "(null)"
  ldap: tls_randfile = "(null)"
  ldap: tls_require_cert = "allow"
  ldap: password = ""
  ldap: basedn = "dc=ulticom,dc=com"
  ldap: filter = "(&(objectclass=person)(uid=%{exec:/etc/ulcmit/raddb/nodomain %{User-Name}}))"
  ldap: base_filter = "(objectclass=*)"
  ldap: default_profile = "(null)"
  ldap: profile_attribute = "(null)"
  ldap: password_header = "(null)"
  ldap: password_attribute = "(null)"
  ldap: access_attr = "uid"
  ldap: groupname_attribute = "cn"
  ldap: groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniq
ueNames)(uniquemember=%{Ldap-UserDn})))"
  ldap: groupmembership_attribute = "(null)"
  ldap: dictionary_mapping = "/etc/ulcmit/raddb/ldap.attrmap"
  ldap: ldap_debug = 0
  ldap: ldap_connections_number = 5
  ldap: compare_check_items = no
  ldap: access_attr_used_for_allow = yes
  ldap: do_xlat = yes
lm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap
rlm_ldap: reading ldap<->radius mappings from file /etc/ulcmit/raddb/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusAuthType mapped to RADIUS Auth-Type
rlm_ldap: LDAP radiusSimultaneousUse mapped to RADIUS Simultaneous-Use
rlm_ldap: LDAP radiusCalledStationId mapped to RADIUS Called-Station-Id
rlm_ldap: LDAP radiusCallingStationId mapped to RADIUS Calling-Station-Id
rlm_ldap: LDAP sambaLMPassword mapped to RADIUS LM-Password
rlm_ldap: LDAP sambaNTPassword mapped to RADIUS NT-Password
rlm_ldap: LDAP sambaAcctFlags mapped to RADIUS SMB-Account-CTRL-TEXT
rlm_ldap: LDAP radiusExpiration mapped to RADIUS Expiration
rlm_ldap: LDAP radiusServiceType mapped to RADIUS Service-Type
rlm_ldap: LDAP radiusFramedProtocol mapped to RADIUS Framed-Protocol
rlm_ldap: LDAP radiusFramedIPAddress mapped to RADIUS Framed-IP-Address
rlm_ldap: LDAP radiusFramedIPNetmask mapped to RADIUS Framed-IP-Netmask
rlm_ldap: LDAP radiusFramedRoute mapped to RADIUS Framed-Route
rlm_ldap: LDAP radiusFramedRouting mapped to RADIUS Framed-Routing
rlm_ldap: LDAP radiusFilterId mapped to RADIUS Filter-Id
rlm_ldap: LDAP radiusFramedMTU mapped to RADIUS Framed-MTU
rlm_ldap: LDAP radiusFramedCompression mapped to RADIUS Framed-Compression
rlm_ldap: LDAP radiusLoginIPHost mapped to RADIUS Login-IP-Host
rlm_ldap: LDAP radiusLoginService mapped to RADIUS Login-Service
rlm_ldap: LDAP radiusLoginTCPPort mapped to RADIUS Login-TCP-Port
rlm_ldap: LDAP radiusCallbackNumber mapped to RADIUS Callback-Number
rlm_ldap: LDAP radiusCallbackId mapped to RADIUS Callback-Id
rlm_ldap: LDAP radiusFramedIPXNetwork mapped to RADIUS Framed-IPX-Network
rlm_ldap: LDAP radiusClass mapped to RADIUS Class
rlm_ldap: LDAP radiusSessionTimeout mapped to RADIUS Session-Timeout
rlm_ldap: LDAP radiusIdleTimeout mapped to RADIUS Idle-Timeout
rlm_ldap: LDAP radiusTerminationAction mapped to RADIUS Termination-Action
rlm_ldap: LDAP radiusLoginLATService mapped to RADIUS Login-LAT-Service
rlm_ldap: LDAP radiusLoginLATNode mapped to RADIUS Login-LAT-Node
rlm_ldap: LDAP radiusLoginLATGroup mapped to RADIUS Login-LAT-Group
rlm_ldap: LDAP radiusFramedAppleTalkLink mapped to RADIUS Framed-AppleTalk-Link
rlm_ldap: LDAP radiusFramedAppleTalkNetwork mapped to RADIUS Framed-AppleTalk-Network
rlm_ldap: LDAP radiusFramedAppleTalkZone mapped to RADIUS Framed-AppleTalk-Zone
rlm_ldap: LDAP radiusPortLimit mapped to RADIUS Port-Limit
rlm_ldap: LDAP radiusLoginLATPort mapped to RADIUS Login-LAT-Port
conns: 126510
Module: Instantiated ldap (ldap)
Module: Loaded files
  files: usersfile = "/etc/ulcmit/raddb/users"
  files: acctusersfile = "/etc/ulcmit/raddb/acct_users"
  files: preproxy_usersfile = "/etc/ulcmit/raddb/preproxy_users"
  files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
  acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
  detail: detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
  detail: detailperm = 384
  detail: dirperm = 493
  detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
  radutmp: filename = "/var/log/radius/radutmp"
  radutmp: username = "%{User-Name}"
  radutmp: case_sensitive = yes
  radutmp: check_with_nas = yes
  radutmp: perm = 384
  radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
rad_recv: Access-Request packet from host 172.25.16.9:1230, id=85, length=213
         Framed-MTU = 1480
         NAS-IP-Address = 172.25.16.9
         NAS-Identifier = "hp-50-9"
         User-Name = "MALACHITE\\gaa"
         Service-Type = Framed-User
         Framed-Protocol = PPP
         NAS-Port = 1
         NAS-Port-Type = Ethernet
         NAS-Port-Id = "1"
         Called-Station-Id = "00-11-85-40-71-ff"
         Calling-Station-Id = "00-14-22-dc-9b-16"
         Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
         Tunnel-Type:0 = VLAN
         Tunnel-Medium-Type:0 = IEEE-802
         Tunnel-Private-Group-Id:0 = "50"
         EAP-Message = 0x02010012014d414c4143484954455c676161
         Message-Authenticator = 0x9fe6191e75699a28156146fa98342f4d
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
   modcall[authorize]: module "preprocess" returns ok for request 0
   modcall[authorize]: module "chap" returns noop for request 0
   modcall[authorize]: module "mschap" returns noop for request 0
rlm_ldap: - authorize
rlm_ldap: performing user authorization for MALACHITE\gaa
radius_xlat: Running registered xlat function of module exec for string '/etc/ulcmit/raddb/nodomain %{User-Name}'
rlm_exec (exec): Executing /etc/ulcmit/raddb/nodomain %{User-Name}
radius_xlat:  '/etc/ulcmit/raddb/nodomain MALACHITE\\gaa'
Exec-Program: /etc/ulcmit/raddb/nodomain MALACHITE\\gaa
Exec-Program output: gaa
Exec-Program-Wait: plaintext: gaa
Exec-Program: returned: 0
rlm_exec (exec): result 0
radius_xlat:  '(&(objectclass=person)(uid=gaa))'
radius_xlat:  'dc=ulticom,dc=com'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: attempting LDAP reconnection
rlm_ldap: (re)connect to ldap.ulticom.com:389, authentication 0
rlm_ldap: bind as / to ldap.ulticom.com:389
rlm_ldap: waiting for bind result ...
rlm_ldap: Bind was successful
rlm_ldap: performing search in dc=ulticom,dc=com, with filter (&(objectclass=person)(uid=gaa))
rlm_ldap: checking if remote access for MALACHITE\gaa is allowed by uid
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaAcctFlags as SMB-Account-CTRL-TEXT, value [U & op=21
rlm_ldap: Adding sambaNTPassword as NT-Password, value E6DEABE732705BC462E2195793EDAF37 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value D388721E3CDDC12DAAD3B435B51404EE & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user MALACHITE\gaa authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns ok for request 0
   rlm_eap: EAP packet type response id 1 length 18
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 0
     users: Matched entry DEFAULT at line 153
     users: Matched entry DEFAULT at line 176
     users: Matched entry DEFAULT at line 188
   modcall[authorize]: module "files" returns ok for request 0
modcall: group authorize returns updated for request 0
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
   rlm_eap: EAP Identity
   rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
   modcall[authenticate]: module "eap" returns handled for request 0
modcall: group authenticate returns handled for request 0
Sending Access-Challenge of id 85 to 172.25.16.9:1230
         Framed-IP-Address = 255.255.255.254
         Framed-MTU = 576
         Service-Type = Framed-User
         Framed-Protocol = PPP
         Framed-Compression = Van-Jacobson-TCP-IP
         EAP-Message = 0x010200271a010200221010130293c1f011fcd0e66b5d6118d2344d414c4143484954455c676161
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0xd78143c9277890d881701cfb419ad903
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 172.25.16.9:1230, id=86, length=219
         Framed-MTU = 1480
         NAS-IP-Address = 172.25.16.9
         NAS-Identifier = "hp-50-9"
         User-Name = "MALACHITE\\gaa"
         Service-Type = Framed-User
         Framed-Protocol = PPP
         NAS-Port = 1
         NAS-Port-Type = Ethernet
         NAS-Port-Id = "1"
         Called-Station-Id = "00-11-85-40-71-ff"
         Calling-Station-Id = "00-14-22-dc-9b-16"
         Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
         Tunnel-Type:0 = VLAN
         Tunnel-Medium-Type:0 = IEEE-802
         Tunnel-Private-Group-Id:0 = "50"
         State = 0xd78143c9277890d881701cfb419ad903
         EAP-Message = 0x020200060319
         Message-Authenticator = 0xd461ecf0394aed21f586e3620dd34b0a
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
   modcall[authorize]: module "preprocess" returns ok for request 1
   modcall[authorize]: module "chap" returns noop for request 1
   modcall[authorize]: module "mschap" returns noop for request 1
rlm_ldap: - authorize
rlm_ldap: performing user authorization for MALACHITE\gaa
radius_xlat: Running registered xlat function of module exec for string '/etc/ulcmit/raddb/nodomain %{User-Name}'
rlm_exec (exec): Executing /etc/ulcmit/raddb/nodomain %{User-Name}
radius_xlat:  '/etc/ulcmit/raddb/nodomain MALACHITE\\gaa'
Exec-Program: /etc/ulcmit/raddb/nodomain MALACHITE\\gaa
Exec-Program output: gaa
Exec-Program-Wait: plaintext: gaa
Exec-Program: returned: 0
rlm_exec (exec): result 0
radius_xlat:  '(&(objectclass=person)(uid=gaa))'
radius_xlat:  'dc=ulticom,dc=com'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=ulticom,dc=com, with filter (&(objectclass=person)(uid=gaa))
rlm_ldap: checking if remote access for MALACHITE\gaa is allowed by uid
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaAcctFlags as SMB-Account-CTRL-TEXT, value [U & op=21
rlm_ldap: Adding sambaNTPassword as NT-Password, value E6DEABE732705BC462E2195793EDAF37 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value D388721E3CDDC12DAAD3B435B51404EE & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user MALACHITE\gaa authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns ok for request 1
   rlm_eap: EAP packet type response id 2 length 6
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 1
     users: Matched entry DEFAULT at line 153
     users: Matched entry DEFAULT at line 176
     users: Matched entry DEFAULT at line 188
   modcall[authorize]: module "files" returns ok for request 1
modcall: group authorize returns updated for request 1
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
   rlm_eap: Request found, released from the list
   rlm_eap: EAP NAK
  rlm_eap: EAP-NAK asked for EAP-Type/peap
   rlm_eap: processing type tls
   rlm_eap_tls: Initiate
   rlm_eap_tls: Start returned 1
   modcall[authenticate]: module "eap" returns handled for request 1
modcall: group authenticate returns handled for request 1
Sending Access-Challenge of id 86 to 172.25.16.9:1230
         Framed-IP-Address = 255.255.255.254
         Framed-MTU = 576
         Service-Type = Framed-User
         Framed-Protocol = PPP
         Framed-Compression = Van-Jacobson-TCP-IP
         EAP-Message = 0x010300061920
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0xd5b41d44d5a957756e939fddd080ca71
Finished request 1
Going to the next request
--- Walking the entire request list ---
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 172.25.16.9:1230, id=87, length=293
         Framed-MTU = 1480
         NAS-IP-Address = 172.25.16.9
         NAS-Identifier = "hp-50-9"
         User-Name = "MALACHITE\\gaa"
         Service-Type = Framed-User
         Framed-Protocol = PPP
         NAS-Port = 1
         NAS-Port-Type = Ethernet
         NAS-Port-Id = "1"
         Called-Station-Id = "00-11-85-40-71-ff"
         Calling-Station-Id = "00-14-22-dc-9b-16"
         Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
         Tunnel-Type:0 = VLAN
         Tunnel-Medium-Type:0 = IEEE-802
         Tunnel-Private-Group-Id:0 = "50"
         State = 0xd5b41d44d5a957756e939fddd080ca71
         EAP-Message = 0x0203005019800000004616030100410100003d030143c2a6d3a3ef3f81f7b63ab1c666ff6a16bd9a8cf8dcb4c
2f89bc1ebe8949b5e00001600040005000a000900640062000300060013001200630100
         Message-Authenticator = 0x2f00f7f94a7e8773822061af30b65184
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
   modcall[authorize]: module "preprocess" returns ok for request 2
   modcall[authorize]: module "chap" returns noop for request 2
   modcall[authorize]: module "mschap" returns noop for request 2
rlm_ldap: - authorize
rlm_ldap: performing user authorization for MALACHITE\gaa
radius_xlat: Running registered xlat function of module exec for string '/etc/ulcmit/raddb/nodomain %{User-Name}'
rlm_exec (exec): Executing /etc/ulcmit/raddb/nodomain %{User-Name}
radius_xlat:  '/etc/ulcmit/raddb/nodomain MALACHITE\\gaa'
Exec-Program: /etc/ulcmit/raddb/nodomain MALACHITE\\gaa
Exec-Program output: gaa
Exec-Program-Wait: plaintext: gaa
Exec-Program: returned: 0
rlm_exec (exec): result 0
radius_xlat:  '(&(objectclass=person)(uid=gaa))'
radius_xlat:  'dc=ulticom,dc=com'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=ulticom,dc=com, with filter (&(objectclass=person)(uid=gaa))
rlm_ldap: checking if remote access for MALACHITE\gaa is allowed by uid
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaAcctFlags as SMB-Account-CTRL-TEXT, value [U & op=21
rlm_ldap: Adding sambaNTPassword as NT-Password, value E6DEABE732705BC462E2195793EDAF37 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value D388721E3CDDC12DAAD3B435B51404EE & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user MALACHITE\gaa authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns ok for request 2
   rlm_eap: EAP packet type response id 3 length 80
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 2
     users: Matched entry DEFAULT at line 153
     users: Matched entry DEFAULT at line 176
     users: Matched entry DEFAULT at line 188
   modcall[authorize]: module "files" returns ok for request 2
modcall: group authorize returns updated for request 2
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
   eaptls_verify returned 11
     (other): before/accept initialization
     TLS_accept: before/accept initialization
   rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
     TLS_accept: SSLv3 read client hello A
   rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
     TLS_accept: SSLv3 write server hello A
   rlm_eap_tls: >>> TLS 1.0 Handshake [length 02b0], Certificate
     TLS_accept: SSLv3 write certificate A
   rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
     TLS_accept: SSLv3 write server done A
     TLS_accept: SSLv3 flush data
     TLS_accept:error in SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
   eaptls_process returned 13
   rlm_eap_peap: EAPTLS_HANDLED
   modcall[authenticate]: module "eap" returns handled for request 2
modcall: group authenticate returns handled for request 2
Sending Access-Challenge of id 87 to 172.25.16.9:1230
         Framed-IP-Address = 255.255.255.254
         Framed-MTU = 576
         Service-Type = Framed-User
         Framed-Protocol = PPP
         Framed-Compression = Van-Jacobson-TCP-IP
         EAP-Message = 0x010403131900160301004a02000046030143c2a6d9dde76b5c1689d53cd6a956ed1e0867963fba2ef75e39da4
21beaf4352054ca69f97e0231c3c45b9e911063b13aef76e71ebbb3bee335c185ba5419474f00040016030102b00b0002ac0002a90002a630
8202a23082020b020104300d06092a864886f70d01010405003081a6310b3009060355040613025553311330110603550408130a4e6577204
a6572736579311330110603550407130a4d742e204c617572656c31143012060355040a130b556c7469636f6d20496e633121301f06035504
0b1318496e666f726d6174696f6e20546563686e6f6c6f67696573311330110603550403130a55
         EAP-Message = 0x6c7469636f6d204954311f301d06092a864886f70d0109011610726f6f7440756c7469636f6d2e636f6d301e1
70d3035313231353138353031365a170d3039313231353138353031365a30818b310b3009060355040613025553311330110603550408130a
4e6577204a6572736579311330110603550407130a4d742e204c617572656c31143012060355040a130b556c7469636f6d20496e63311b301
9060355040313127079726f70652e756c7469636f6d2e636f6d311f301d06092a864886f70d01090116106365727440756c7469636f6d2e63
6f6d30819f300d06092a864886f70d010101050003818d0030818902818100bcef4f9735a4fe70
         EAP-Message = 0xc7b49e61554ceca88f896391f54840e9b045c7bc1d2d8172729a93ea6a3caf74689b1d5a94502bfd80fb536a4
3ee57c997e498b7068b18517d6a7aa3b7c69e7a8716317b0658697e218d78a36048a0222cc82e0085d058c49a137b476ef1365a0b02482baf
be65244841d9468d8ac0d82e07b35d99b379e90203010001300d06092a864886f70d010104050003818100be1b22a1d77b5eee2cd1f7d6966
034b778a81596cc6e7e40963d67df46951b36f435103da62babcbba99f22ecc5f13e1097e6f843f587ed9f539ca0c2a7a5bed4e86b1c8d669
927373d3553717a312a35df8f562841ebd1dffcf66e51e8682b7eb47851a2737bf327bc2b1a8e0
         EAP-Message = 0x3ac5b28fb2e6fd549c30cb4c1e7e0a37a7208a16030100040e000000
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0x28abe2f9101132c971a07e16302eaca7
Finished request 2
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 172.25.16.9:1230, id=88, length=405
         Framed-MTU = 1480
         NAS-IP-Address = 172.25.16.9
         NAS-Identifier = "hp-50-9"
         User-Name = "MALACHITE\\gaa"
         Service-Type = Framed-User
         Framed-Protocol = PPP
         NAS-Port = 1
         NAS-Port-Type = Ethernet
         NAS-Port-Id = "1"
         Called-Station-Id = "00-11-85-40-71-ff"
         Calling-Station-Id = "00-14-22-dc-9b-16"
         Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
         Tunnel-Type:0 = VLAN
         Tunnel-Medium-Type:0 = IEEE-802
         Tunnel-Private-Group-Id:0 = "50"
         State = 0x28abe2f9101132c971a07e16302eaca7
         EAP-Message = 0x020400c01980000000b616030100861000008200803af0872cb540732a24029c8e11a6bd34fac1a865f5394d0
b135090e3852e522c2bade22fa4a6e57b25c84ee69236b5b9d38d068f0a198c5c8c69e17d8e27a52ab1763c047ab8f9c7300b1456735a7c92
b666a56341317ea5cd903d6aa3cf162d64c2d7e9c880721fcbe264fac1ac82beb50ac5de3269dc5bd9a6c0092b46c95314030100010116030
10020b343d463f4df0f2defd061db0cab5226e4c130fd52f1960dc217ede867b1defb
         Message-Authenticator = 0x389c6d2df6ebcbc16c53d91c4ae3b280
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
   modcall[authorize]: module "preprocess" returns ok for request 3
   modcall[authorize]: module "chap" returns noop for request 3
   modcall[authorize]: module "mschap" returns noop for request 3
rlm_ldap: - authorize
rlm_ldap: performing user authorization for MALACHITE\gaa
radius_xlat: Running registered xlat function of module exec for string '/etc/ulcmit/raddb/nodomain %{User-Name}'
rlm_exec (exec): Executing /etc/ulcmit/raddb/nodomain %{User-Name}
radius_xlat:  '/etc/ulcmit/raddb/nodomain MALACHITE\\gaa'
Exec-Program: /etc/ulcmit/raddb/nodomain MALACHITE\\gaa
Exec-Program output: gaa
Exec-Program-Wait: plaintext: gaa
Exec-Program: returned: 0
rlm_exec (exec): result 0
radius_xlat:  '(&(objectclass=person)(uid=gaa))'
radius_xlat:  'dc=ulticom,dc=com'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=ulticom,dc=com, with filter (&(objectclass=person)(uid=gaa))
rlm_ldap: checking if remote access for MALACHITE\gaa is allowed by uid
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaAcctFlags as SMB-Account-CTRL-TEXT, value [U & op=21
rlm_ldap: Adding sambaNTPassword as NT-Password, value E6DEABE732705BC462E2195793EDAF37 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value D388721E3CDDC12DAAD3B435B51404EE & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user MALACHITE\gaa authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns ok for request 3
   rlm_eap: EAP packet type response id 4 length 192
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 3
     users: Matched entry DEFAULT at line 153
     users: Matched entry DEFAULT at line 176
     users: Matched entry DEFAULT at line 188
   modcall[authorize]: module "files" returns ok for request 3
modcall: group authorize returns updated for request 3
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
   eaptls_verify returned 11
   rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
     TLS_accept: SSLv3 read client key exchange A
   rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
   rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
     TLS_accept: SSLv3 read finished A
   rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
     TLS_accept: SSLv3 write change cipher spec A
   rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
     TLS_accept: SSLv3 write finished A
     TLS_accept: SSLv3 flush data
     (other): SSL negotiation finished successfully
SSL Connection Established
   eaptls_process returned 13
   rlm_eap_peap: EAPTLS_HANDLED
   modcall[authenticate]: module "eap" returns handled for request 3
modcall: group authenticate returns handled for request 3
Sending Access-Challenge of id 88 to 172.25.16.9:1230
         Framed-IP-Address = 255.255.255.254
         Framed-MTU = 576
         Service-Type = Framed-User
         Framed-Protocol = PPP
         Framed-Compression = Van-Jacobson-TCP-IP
         EAP-Message = 0x0105003119001403010001011603010020450d43f8fe77d406da967e25cb20130b9138134590d30600839dbca
a90009313
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0x41ecdb8ff87e2ebb8bd9d9ab845414ad
Finished request 3
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 172.25.16.9:1230, id=89, length=219
         Framed-MTU = 1480
         NAS-IP-Address = 172.25.16.9
         NAS-Identifier = "hp-50-9"
         User-Name = "MALACHITE\\gaa"
         Service-Type = Framed-User
         Framed-Protocol = PPP
         NAS-Port = 1
         NAS-Port-Type = Ethernet
         NAS-Port-Id = "1"
         Called-Station-Id = "00-11-85-40-71-ff"
         Calling-Station-Id = "00-14-22-dc-9b-16"
         Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
         Tunnel-Type:0 = VLAN
         Tunnel-Medium-Type:0 = IEEE-802
         Tunnel-Private-Group-Id:0 = "50"
         State = 0x41ecdb8ff87e2ebb8bd9d9ab845414ad
         EAP-Message = 0x020500061900
         Message-Authenticator = 0x82d48fdee79673d1b2d6e19af9262a62
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
   modcall[authorize]: module "preprocess" returns ok for request 4
   modcall[authorize]: module "chap" returns noop for request 4
   modcall[authorize]: module "mschap" returns noop for request 4
rlm_ldap: - authorize
rlm_ldap: performing user authorization for MALACHITE\gaa
radius_xlat: Running registered xlat function of module exec for string '/etc/ulcmit/raddb/nodomain %{User-Name}'
rlm_exec (exec): Executing /etc/ulcmit/raddb/nodomain %{User-Name}
radius_xlat:  '/etc/ulcmit/raddb/nodomain MALACHITE\\gaa'
Exec-Program: /etc/ulcmit/raddb/nodomain MALACHITE\\gaa
Exec-Program output: gaa
Exec-Program-Wait: plaintext: gaa
Exec-Program: returned: 0
rlm_exec (exec): result 0
radius_xlat:  '(&(objectclass=person)(uid=gaa))'
radius_xlat:  'dc=ulticom,dc=com'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=ulticom,dc=com, with filter (&(objectclass=person)(uid=gaa))
rlm_ldap: checking if remote access for MALACHITE\gaa is allowed by uid
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaAcctFlags as SMB-Account-CTRL-TEXT, value [U & op=21
rlm_ldap: Adding sambaNTPassword as NT-Password, value E6DEABE732705BC462E2195793EDAF37 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value D388721E3CDDC12DAAD3B435B51404EE & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user MALACHITE\gaa authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns ok for request 4
   rlm_eap: EAP packet type response id 5 length 6
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 4
     users: Matched entry DEFAULT at line 153
     users: Matched entry DEFAULT at line 176
     users: Matched entry DEFAULT at line 188
   modcall[authorize]: module "files" returns ok for request 4
modcall: group authorize returns updated for request 4
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
   rlm_eap_tls: ack handshake is finished
   eaptls_verify returned 3
   eaptls_process returned 3
   rlm_eap_peap: EAPTLS_SUCCESS
   modcall[authenticate]: module "eap" returns handled for request 4
modcall: group authenticate returns handled for request 4
Sending Access-Challenge of id 89 to 172.25.16.9:1230
         Framed-IP-Address = 255.255.255.254
         Framed-MTU = 576
         Service-Type = Framed-User
         Framed-Protocol = PPP
         Framed-Compression = Van-Jacobson-TCP-IP
         EAP-Message = 0x01060020190017030100153b60c494388f8168550229442e6f575b8efa2eee31
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0xe5aab6b483e096944c4c374392e35c98
Finished request 4
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 172.25.16.9:1230, id=90, length=254
         Framed-MTU = 1480
         NAS-IP-Address = 172.25.16.9
         NAS-Identifier = "hp-50-9"
         User-Name = "MALACHITE\\gaa"
         Service-Type = Framed-User
         Framed-Protocol = PPP
         NAS-Port = 1
         NAS-Port-Type = Ethernet
         NAS-Port-Id = "1"
         Called-Station-Id = "00-11-85-40-71-ff"
         Calling-Station-Id = "00-14-22-dc-9b-16"
         Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
         Tunnel-Type:0 = VLAN
         Tunnel-Medium-Type:0 = IEEE-802
         Tunnel-Private-Group-Id:0 = "50"
         State = 0xe5aab6b483e096944c4c374392e35c98
         EAP-Message = 0x020600291900170301001eab64380cecc1f7985fde402c803b5802088d260b7fb1fe361005032f4c0d
         Message-Authenticator = 0xe357fd824a4477214b07ff0fcad1828f
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
   modcall[authorize]: module "preprocess" returns ok for request 5
   modcall[authorize]: module "chap" returns noop for request 5
   modcall[authorize]: module "mschap" returns noop for request 5
rlm_ldap: - authorize
rlm_ldap: performing user authorization for MALACHITE\gaa
radius_xlat: Running registered xlat function of module exec for string '/etc/ulcmit/raddb/nodomain %{User-Name}'
rlm_exec (exec): Executing /etc/ulcmit/raddb/nodomain %{User-Name}
radius_xlat:  '/etc/ulcmit/raddb/nodomain MALACHITE\\gaa'
Exec-Program: /etc/ulcmit/raddb/nodomain MALACHITE\\gaa
Exec-Program output: gaa
Exec-Program-Wait: plaintext: gaa
Exec-Program: returned: 0
rlm_exec (exec): result 0
radius_xlat:  '(&(objectclass=person)(uid=gaa))'
radius_xlat:  'dc=ulticom,dc=com'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=ulticom,dc=com, with filter (&(objectclass=person)(uid=gaa))
rlm_ldap: checking if remote access for MALACHITE\gaa is allowed by uid
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaAcctFlags as SMB-Account-CTRL-TEXT, value [U & op=21
rlm_ldap: Adding sambaNTPassword as NT-Password, value E6DEABE732705BC462E2195793EDAF37 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value D388721E3CDDC12DAAD3B435B51404EE & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user MALACHITE\gaa authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns ok for request 5
   rlm_eap: EAP packet type response id 6 length 41
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 5
     users: Matched entry DEFAULT at line 153
     users: Matched entry DEFAULT at line 176
     users: Matched entry DEFAULT at line 188
   modcall[authorize]: module "files" returns ok for request 5
modcall: group authorize returns updated for request 5
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
   eaptls_verify returned 7
   rlm_eap_tls: Done initial handshake
   eaptls_process returned 7
   rlm_eap_peap: EAPTLS_OK
   rlm_eap_peap: Session established.  Decoding tunneled attributes.
   rlm_eap_peap: Identity - MALACHITE\gaa
   rlm_eap_peap: Tunneled data is valid.
   PEAP: Got tunneled EAP-Message
         EAP-Message = 0x02060012014d414c4143484954455c676161
   PEAP: Got tunneled identity of MALACHITE\gaa
   PEAP: Setting default EAP type for tunneled EAP session.
   PEAP: Setting User-Name to MALACHITE\gaa
   PEAP: Sending tunneled request
         EAP-Message = 0x02060012014d414c4143484954455c676161
         FreeRADIUS-Proxied-To = 127.0.0.1
         User-Name = "MALACHITE\\gaa"
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
   modcall[authorize]: module "preprocess" returns ok for request 5
   modcall[authorize]: module "chap" returns noop for request 5
   modcall[authorize]: module "mschap" returns noop for request 5
rlm_ldap: - authorize
rlm_ldap: performing user authorization for MALACHITE\gaa
radius_xlat: Running registered xlat function of module exec for string '/etc/ulcmit/raddb/nodomain %{User-Name}'
rlm_exec (exec): Executing /etc/ulcmit/raddb/nodomain %{User-Name}
radius_xlat:  '/etc/ulcmit/raddb/nodomain MALACHITE\\gaa'
Exec-Program: /etc/ulcmit/raddb/nodomain MALACHITE\\gaa
Exec-Program output: gaa
Exec-Program-Wait: plaintext: gaa
Exec-Program: returned: 0
rlm_exec (exec): result 0
radius_xlat:  '(&(objectclass=person)(uid=gaa))'
radius_xlat:  'dc=ulticom,dc=com'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=ulticom,dc=com, with filter (&(objectclass=person)(uid=gaa))
rlm_ldap: checking if remote access for MALACHITE\gaa is allowed by uid
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaAcctFlags as SMB-Account-CTRL-TEXT, value [U & op=21
rlm_ldap: Adding sambaNTPassword as NT-Password, value E6DEABE732705BC462E2195793EDAF37 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value D388721E3CDDC12DAAD3B435B51404EE & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user MALACHITE\gaa authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns ok for request 5
   rlm_eap: EAP packet type response id 6 length 18
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 5
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 5
modcall: group authorize returns updated for request 5
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
   rlm_eap: EAP Identity
   rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
   modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
   PEAP: Got tunneled reply RADIUS code 11
         EAP-Message = 0x010700271a010700221038ab51172b080f7780d8377e3294d6904d414c4143484954455c676161
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0x44291341705504e0490ffb683cbdcc1d
   PEAP: Processing from tunneled session code 14ff38 11
         EAP-Message = 0x010700271a010700221038ab51172b080f7780d8377e3294d6904d414c4143484954455c676161
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0x44291341705504e0490ffb683cbdcc1d
   PEAP: Got tunneled Access-Challenge
   modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
Sending Access-Challenge of id 90 to 172.25.16.9:1230
         Framed-IP-Address = 255.255.255.254
         Framed-MTU = 576
         Service-Type = Framed-User
         Framed-Protocol = PPP
         Framed-Compression = Van-Jacobson-TCP-IP
         EAP-Message = 0x0107003e1900170301003385e6247dbf02066d6ab45d4545985a79f7c28211fabcccb73f103eecfc028e95c15
cabfd387fc1b9bb1559c9c52c251e4eabc2
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0x46cf8fa85528152e10d8974266365efd
Finished request 5
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 172.25.16.9:1230, id=91, length=308
         Framed-MTU = 1480
         NAS-IP-Address = 172.25.16.9
         NAS-Identifier = "hp-50-9"
         User-Name = "MALACHITE\\gaa"
         Service-Type = Framed-User
         Framed-Protocol = PPP
         NAS-Port = 1
         NAS-Port-Type = Ethernet
         NAS-Port-Id = "1"
         Called-Station-Id = "00-11-85-40-71-ff"
         Calling-Station-Id = "00-14-22-dc-9b-16"
         Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
         Tunnel-Type:0 = VLAN
         Tunnel-Medium-Type:0 = IEEE-802
         Tunnel-Private-Group-Id:0 = "50"
         State = 0x46cf8fa85528152e10d8974266365efd
         EAP-Message = 0x0207005f19001703010054b53b33a93bff2ba1d6471508b12db69f2e1a45317218bc2c1077ed89ddd0f950bf8
74424af9c20676b66bbf453479c7460ea52ba0c2d4aad001b99663187561a812eafe2266556d6f76e93ccad61748a509c24d5
         Message-Authenticator = 0xee7a225857e3d13f27a7e7580b60f627
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
   modcall[authorize]: module "preprocess" returns ok for request 6
   modcall[authorize]: module "chap" returns noop for request 6
   modcall[authorize]: module "mschap" returns noop for request 6
rlm_ldap: - authorize
rlm_ldap: performing user authorization for MALACHITE\gaa
radius_xlat: Running registered xlat function of module exec for string '/etc/ulcmit/raddb/nodomain %{User-Name}'
rlm_exec (exec): Executing /etc/ulcmit/raddb/nodomain %{User-Name}
radius_xlat:  '/etc/ulcmit/raddb/nodomain MALACHITE\\gaa'
Exec-Program: /etc/ulcmit/raddb/nodomain MALACHITE\\gaa
Exec-Program output: gaa
Exec-Program-Wait: plaintext: gaa
Exec-Program: returned: 0
rlm_exec (exec): result 0
radius_xlat:  '(&(objectclass=person)(uid=gaa))'
radius_xlat:  'dc=ulticom,dc=com'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=ulticom,dc=com, with filter (&(objectclass=person)(uid=gaa))
rlm_ldap: checking if remote access for MALACHITE\gaa is allowed by uid
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaAcctFlags as SMB-Account-CTRL-TEXT, value [U & op=21
rlm_ldap: Adding sambaNTPassword as NT-Password, value E6DEABE732705BC462E2195793EDAF37 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value D388721E3CDDC12DAAD3B435B51404EE & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user MALACHITE\gaa authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns ok for request 6
   rlm_eap: EAP packet type response id 7 length 95
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 6
     users: Matched entry DEFAULT at line 153
     users: Matched entry DEFAULT at line 176
     users: Matched entry DEFAULT at line 188
   modcall[authorize]: module "files" returns ok for request 6
modcall: group authorize returns updated for request 6
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
   eaptls_verify returned 7
   rlm_eap_tls: Done initial handshake
   eaptls_process returned 7
   rlm_eap_peap: EAPTLS_OK
   rlm_eap_peap: Session established.  Decoding tunneled attributes.
   rlm_eap_peap: EAP type mschapv2
   rlm_eap_peap: Tunneled data is valid.
   PEAP: Got tunneled EAP-Message
         EAP-Message = 0x020700481a02070043313e60a45540ab5f7c421378d3c273a6bf00000000000000006b001b6efee1b5e7988dc
e396f73e31d055c512861885cfa004d414c4143484954455c676161
   PEAP: Setting User-Name to MALACHITE\gaa
   PEAP: Adding old state with 44 29
   PEAP: Sending tunneled request
         EAP-Message = 0x020700481a02070043313e60a45540ab5f7c421378d3c273a6bf00000000000000006b001b6efee1b5e7988dc
e396f73e31d055c512861885cfa004d414c4143484954455c676161
         FreeRADIUS-Proxied-To = 127.0.0.1
         User-Name = "MALACHITE\\gaa"
         State = 0x44291341705504e0490ffb683cbdcc1d
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
   modcall[authorize]: module "preprocess" returns ok for request 6
   modcall[authorize]: module "chap" returns noop for request 6
   modcall[authorize]: module "mschap" returns noop for request 6
rlm_ldap: - authorize
rlm_ldap: performing user authorization for MALACHITE\gaa
radius_xlat: Running registered xlat function of module exec for string '/etc/ulcmit/raddb/nodomain %{User-Name}'
rlm_exec (exec): Executing /etc/ulcmit/raddb/nodomain %{User-Name}
radius_xlat:  '/etc/ulcmit/raddb/nodomain MALACHITE\\gaa'
Exec-Program: /etc/ulcmit/raddb/nodomain MALACHITE\\gaa
Exec-Program output: gaa
Exec-Program-Wait: plaintext: gaa
Exec-Program: returned: 0
rlm_exec (exec): result 0
radius_xlat:  '(&(objectclass=person)(uid=gaa))'
radius_xlat:  'dc=ulticom,dc=com'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=ulticom,dc=com, with filter (&(objectclass=person)(uid=gaa))
rlm_ldap: checking if remote access for MALACHITE\gaa is allowed by uid
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaAcctFlags as SMB-Account-CTRL-TEXT, value [U & op=21
rlm_ldap: Adding sambaNTPassword as NT-Password, value E6DEABE732705BC462E2195793EDAF37 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value D388721E3CDDC12DAAD3B435B51404EE & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user MALACHITE\gaa authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns ok for request 6
   rlm_eap: EAP packet type response id 7 length 72
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 6
     users: Matched entry DEFAULT at line 153
   modcall[authorize]: module "files" returns ok for request 6
modcall: group authorize returns updated for request 6
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/mschapv2
   rlm_eap: processing type mschapv2
   Processing the authenticate section of radiusd.conf
modcall: entering group Auth-Type for request 6
   rlm_mschap: Found LM-Password
   rlm_mschap: Found NT-Password
   rlm_mschap: NT Domain delimeter found, should we have enabled with_ntdomain_hack?
   rlm_mschap: Told to do MS-CHAPv2 for MALACHITE\gaa with NT-Password
   rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
   modcall[authenticate]: module "mschap" returns reject for request 6
modcall: group Auth-Type returns reject for request 6
   rlm_eap: Freeing handler
   modcall[authenticate]: module "eap" returns reject for request 6
modcall: group authenticate returns reject for request 6
auth: Failed to validate the user.
   PEAP: Got tunneled reply RADIUS code 3
         MS-CHAP-Error = "\007E=691 R=1"
         EAP-Message = 0x04070004
         Message-Authenticator = 0x00000000000000000000000000000000
   PEAP: Processing from tunneled session code 150d40 3
         MS-CHAP-Error = "\007E=691 R=1"
         EAP-Message = 0x04070004
         Message-Authenticator = 0x00000000000000000000000000000000
   PEAP: Tunneled authentication was rejected.
   rlm_eap_peap: FAILURE
   modcall[authenticate]: module "eap" returns handled for request 6
modcall: group authenticate returns handled for request 6
Sending Access-Challenge of id 91 to 172.25.16.9:1230
         Framed-IP-Address = 255.255.255.254
         Framed-MTU = 576
         Service-Type = Framed-User
         Framed-Protocol = PPP
         Framed-Compression = Van-Jacobson-TCP-IP
         EAP-Message = 0x010800261900170301001b80744293aa74be02bac75f0751b543b5c4a3da2b05405537e1d50b
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0x5c53e02f3defbe5281c56129dbab5ac0
Finished request 6
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 172.25.16.9:1230, id=92, length=251
         Framed-MTU = 1480
         NAS-IP-Address = 172.25.16.9
         NAS-Identifier = "hp-50-9"
         User-Name = "MALACHITE\\gaa"
         Service-Type = Framed-User
         Framed-Protocol = PPP
         NAS-Port = 1
         NAS-Port-Type = Ethernet
         NAS-Port-Id = "1"
         Called-Station-Id = "00-11-85-40-71-ff"
         Calling-Station-Id = "00-14-22-dc-9b-16"
         Connect-Info = "CONNECT Ethernet 100Mbps Full duplex"
         Tunnel-Type:0 = VLAN
         Tunnel-Medium-Type:0 = IEEE-802
         Tunnel-Private-Group-Id:0 = "50"
         State = 0x5c53e02f3defbe5281c56129dbab5ac0
         EAP-Message = 0x020800261900170301001bb607670cf9aa0e0f599f7dc939230f500eae9fca26c1ebd07f758e
         Message-Authenticator = 0xd6b2998526c8831e8d7e1df1ce0fb09d
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
   modcall[authorize]: module "preprocess" returns ok for request 7
   modcall[authorize]: module "chap" returns noop for request 7
   modcall[authorize]: module "mschap" returns noop for request 7
rlm_ldap: - authorize
rlm_ldap: performing user authorization for MALACHITE\gaa
radius_xlat: Running registered xlat function of module exec for string '/etc/ulcmit/raddb/nodomain %{User-Name}'
rlm_exec (exec): Executing /etc/ulcmit/raddb/nodomain %{User-Name}
radius_xlat:  '/etc/ulcmit/raddb/nodomain MALACHITE\\gaa'
Exec-Program: /etc/ulcmit/raddb/nodomain MALACHITE\\gaa
Exec-Program output: gaa
Exec-Program-Wait: plaintext: gaa
Exec-Program: returned: 0
rlm_exec (exec): result 0
radius_xlat:  '(&(objectclass=person)(uid=gaa))'
radius_xlat:  'dc=ulticom,dc=com'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in dc=ulticom,dc=com, with filter (&(objectclass=person)(uid=gaa))
rlm_ldap: checking if remote access for MALACHITE\gaa is allowed by uid
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding sambaAcctFlags as SMB-Account-CTRL-TEXT, value [U & op=21
rlm_ldap: Adding sambaNTPassword as NT-Password, value E6DEABE732705BC462E2195793EDAF37 & op=21
rlm_ldap: Adding sambaLMPassword as LM-Password, value D388721E3CDDC12DAAD3B435B51404EE & op=21
rlm_ldap: looking for reply items in directory...
rlm_ldap: user MALACHITE\gaa authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
   modcall[authorize]: module "ldap" returns ok for request 7
   rlm_eap: EAP packet type response id 8 length 38
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 7
     users: Matched entry DEFAULT at line 153
     users: Matched entry DEFAULT at line 176
     users: Matched entry DEFAULT at line 188
   modcall[authorize]: module "files" returns ok for request 7
modcall: group authorize returns updated for request 7
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
   eaptls_verify returned 7
   rlm_eap_tls: Done initial handshake
   eaptls_process returned 7
   rlm_eap_peap: EAPTLS_OK
   rlm_eap_peap: Session established.  Decoding tunneled attributes.
   rlm_eap_peap: Received EAP-TLV response.
   rlm_eap_peap: Tunneled data is valid.
   rlm_eap_peap:  Had sent TLV failure, rejecting.
  rlm_eap: Handler failed in EAP/peap
   rlm_eap: Failed in EAP select
   modcall[authenticate]: module "eap" returns invalid for request 7
modcall: group authenticate returns invalid for request 7
auth: Failed to validate the user.
Delaying request 7 for 1 seconds
Finished request 7
Going to the next request
Waking up in 5 seconds...
rad_recv: Access-Request packet from host 172.25.16.9:1230, id=92, length=251
Sending Access-Reject of id 92 to 172.25.16.9:1230
         EAP-Message = 0x04080004
         Message-Authenticator = 0x00000000000000000000000000000000
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 85 with timestamp 43c2a6d8
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 1 ID 86 with timestamp 43c2a6d9
Cleaning up request 2 ID 87 with timestamp 43c2a6d9
Cleaning up request 3 ID 88 with timestamp 43c2a6d9
Cleaning up request 4 ID 89 with timestamp 43c2a6d9
Cleaning up request 5 ID 90 with timestamp 43c2a6d9
Cleaning up request 6 ID 91 with timestamp 43c2a6d9
Cleaning up request 7 ID 92 with timestamp 43c2a6d9
Nothing to do.  Sleeping until we see a request.
-------------------------------------------------------------------

> 
>   If all you do is look at the last line or two, you're guaranteed to
> not see what's going on.
> 
>   Alan DeKok.
> 
> - 
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

-- 
Gary Algier, WB2FWZ          gaa at ulticom.com             +1 856 787 2758
Ulticom Inc., 1020 Briggs Rd, Mt. Laurel, NJ 08054      Fax:+1 856 866 2033

Nielsen's First Law of Computer Manuals:
     People don't read documentation voluntarily.



More information about the Freeradius-Users mailing list