MS CHAP V2 authentication failure...

Jon jboast at daemonsync.org
Wed Mar 1 02:39:34 CET 2006


here is [most] of the -X -A output

   rlm_eap: EAP packet type response id 4 length 192
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 4
modcall: group authorize returns updated for request 4
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
   eaptls_verify returned 11
   rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
     TLS_accept: SSLv3 read client key exchange A
   rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
   rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
     TLS_accept: SSLv3 read finished A
   rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
     TLS_accept: SSLv3 write change cipher spec A
   rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
     TLS_accept: SSLv3 write finished A
     TLS_accept: SSLv3 flush data
     (other): SSL negotiation finished successfully
SSL Connection Established
   eaptls_process returned 13
   rlm_eap_peap: EAPTLS_HANDLED
   modcall[authenticate]: module "eap" returns handled for request 4
modcall: group authenticate returns handled for request 4
Sending Access-Challenge of id 0 to 127.0.0.1:1025
         EAP-Message = 
0x0105003119001403010001011603010020f640f17cc4d9b95c689f37535f0c167e7ef85920fa1a584ae45ca46e4e27be88
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0x89c31ab5692851c1b54665f205acfdb1
Finished request 4
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 127.0.0.1:1025, id=0, length=138
         User-Name = "jboast"
         NAS-IP-Address = 127.0.0.1
         Called-Station-Id = "0014bf1c0216"
         Calling-Station-Id = "0090967ee1f9"
         NAS-Identifier = "0014bf1c0216"
         NAS-Port = 38
         Framed-MTU = 1400
         State = 0x89c31ab5692851c1b54665f205acfdb1
         NAS-Port-Type = Wireless-802.11
         EAP-Message = 0x020500061900
         Message-Authenticator = 0x86ad4528b700aed9bb049bed435eeb10
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
   rlm_eap: EAP packet type response id 5 length 6
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 5
modcall: group authorize returns updated for request 5
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
   rlm_eap_tls: ack handshake is finished
   eaptls_verify returned 3
   eaptls_process returned 3
   rlm_eap_peap: EAPTLS_SUCCESS
   modcall[authenticate]: module "eap" returns handled for request 5
modcall: group authenticate returns handled for request 5
Sending Access-Challenge of id 0 to 127.0.0.1:1025
         EAP-Message = 
0x0106002019001703010015c0b9557e082a58271186f1038ce6579a67a52b2c30
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0x4641f1c68dfd842fbecaa2555be47878
Finished request 5
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 127.0.0.1:1025, id=0, length=166
         User-Name = "jboast"
         NAS-IP-Address = 127.0.0.1
         Called-Station-Id = "0014bf1c0216"
         Calling-Station-Id = "0090967ee1f9"
         NAS-Identifier = "0014bf1c0216"
         NAS-Port = 38
         Framed-MTU = 1400
         State = 0x4641f1c68dfd842fbecaa2555be47878
         NAS-Port-Type = Wireless-802.11
         EAP-Message = 
0x0206002219001703010017c6caefa5edac16bea7db9a9ee8f16dec3d5db28d1111ef
         Message-Authenticator = 0xceffd3aede7f9a429813aa64fde5fc65
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
   rlm_eap: EAP packet type response id 6 length 34
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 6
modcall: group authorize returns updated for request 6
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
   eaptls_verify returned 7
   rlm_eap_tls: Done initial handshake
   eaptls_process returned 7
   rlm_eap_peap: EAPTLS_OK
   rlm_eap_peap: Session established.  Decoding tunneled attributes.
   rlm_eap_peap: Identity - jboast
   rlm_eap_peap: Tunneled data is valid.
   PEAP: Got tunneled identity of jboast
   PEAP: Setting default EAP type for tunneled EAP session.
   PEAP: Setting User-Name to jboast
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
   rlm_eap: EAP packet type response id 6 length 11
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 6
modcall: group authorize returns updated for request 6
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
   rlm_eap: EAP Identity
   rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
   modcall[authenticate]: module "eap" returns handled for request 6
modcall: group authenticate returns handled for request 6
   PEAP: Got tunneled Access-Challenge
   modcall[authenticate]: module "eap" returns handled for request 6
modcall: group authenticate returns handled for request 6
Sending Access-Challenge of id 0 to 127.0.0.1:1025
         EAP-Message = 
0x010700371900170301002c822385e6e9fb2b3f8f6155f76311e50bfbdb2a4d27557ae1de8893be311197d14003ff17cb0259d2b452ce2f
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0xb931efb43a135bd61a8d7beedcd95701
Finished request 6
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 127.0.0.1:1025, id=0, length=220
         User-Name = "jboast"
         NAS-IP-Address = 127.0.0.1
         Called-Station-Id = "0014bf1c0216"
         Calling-Station-Id = "0090967ee1f9"
         NAS-Identifier = "0014bf1c0216"
         NAS-Port = 38
         Framed-MTU = 1400
         State = 0xb931efb43a135bd61a8d7beedcd95701
         NAS-Port-Type = Wireless-802.11
         EAP-Message = 
0x020700581900170301004dcd9e19e4f8d3efb85c7af02264394c0effdc9df18751700ce7a51ddb927afa8d37e5e0a96c4dc4e54c62183f32aa2a9af1da58a06434e307bde2540bf10bc20fafbeefd8fbdc591c3a111133f1
         Message-Authenticator = 0x72c9d318441ce6bedfb78bff20d6ef6a
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
   rlm_eap: EAP packet type response id 7 length 88
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 7
modcall: group authorize returns updated for request 7
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
   eaptls_verify returned 7
   rlm_eap_tls: Done initial handshake
   eaptls_process returned 7
   rlm_eap_peap: EAPTLS_OK
   rlm_eap_peap: Session established.  Decoding tunneled attributes.
   rlm_eap_peap: EAP type mschapv2
   rlm_eap_peap: Tunneled data is valid.
   PEAP: Setting User-Name to jboast
   PEAP: Adding old state with 07 73
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
   rlm_eap: EAP packet type response id 7 length 65
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 7
modcall: group authorize returns updated for request 7
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/mschapv2
   rlm_eap: processing type mschapv2
   ERROR: Unknown value specified for Auth-Type.  Cannot perform 
requested action.
   rlm_eap: Freeing handler
   modcall[authenticate]: module "eap" returns reject for request 7
modcall: group authenticate returns reject for request 7
auth: Failed to validate the user.
   PEAP: Tunneled authentication was rejected.
   rlm_eap_peap: FAILURE
   modcall[authenticate]: module "eap" returns handled for request 7
modcall: group authenticate returns handled for request 7
Sending Access-Challenge of id 0 to 127.0.0.1:1025
         EAP-Message = 
0x010800261900170301001bef481fb0682ffedaef80653a2b14e3ce38c357d2ac27693b8b5b7e
         Message-Authenticator = 0x00000000000000000000000000000000
         State = 0xc1d1f811200e081feb3c7e131c64e96b
Finished request 7
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 127.0.0.1:1025, id=0, length=170
         User-Name = "jboast"
         NAS-IP-Address = 127.0.0.1
         Called-Station-Id = "0014bf1c0216"
         Calling-Station-Id = "0090967ee1f9"
         NAS-Identifier = "0014bf1c0216"
         NAS-Port = 38
         Framed-MTU = 1400
         State = 0xc1d1f811200e081feb3c7e131c64e96b
         NAS-Port-Type = Wireless-802.11
         EAP-Message = 
0x020800261900170301001b2e1b4f233395cb709a8d40be375a07c87f3d040c139b8989f41d4e
         Message-Authenticator = 0x8e4f17e45575d244747d1f0d76b2f772
   Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 8
   rlm_eap: EAP packet type response id 8 length 38
   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
   modcall[authorize]: module "eap" returns updated for request 8
modcall: group authorize returns updated for request 8
   rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
   Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 8
   rlm_eap: Request found, released from the list
   rlm_eap: EAP/peap
   rlm_eap: processing type peap
   rlm_eap_peap: Authenticate
   rlm_eap_tls: processing TLS
   eaptls_verify returned 7
   rlm_eap_tls: Done initial handshake
   eaptls_process returned 7
   rlm_eap_peap: EAPTLS_OK
   rlm_eap_peap: Session established.  Decoding tunneled attributes.
   rlm_eap_peap: Received EAP-TLV response.
   rlm_eap_peap: Tunneled data is valid.
   rlm_eap_peap:  Had sent TLV failure, rejecting.
  rlm_eap: Handler failed in EAP/peap
   rlm_eap: Failed in EAP select
   modcall[authenticate]: module "eap" returns invalid for request 8
modcall: group authenticate returns invalid for request 8
auth: Failed to validate the user.
Delaying request 8 for 1 seconds
Finished request 8
Going to the next request
Waking up in 6 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 0 to 127.0.0.1:1025
         EAP-Message = 0x04080004
         Message-Authenticator = 0x00000000000000000000000000000000
Cleaning up request 8 ID 0 with timestamp 4404fa1e
Nothing to do.  Sleeping until we see a request.


im sure it's something simple, i've been working at it all day, i need a 
break, hopefully someone can help.

Thanks
Jon



More information about the Freeradius-Users mailing list