Freeradius doesn't work with ldap

Eduardo Lima duwise2003 at yahoo.com.br
Tue Nov 13 15:22:48 CET 2007


Hi, I've been using Freeradius 1.1.3 with PEAP/MSCHAPv2 authentication with no problem. But now, I need to use it with LDAP too and it doesn't work at all.

The client is windows xp without a domain. The LDAP is for the email directory.

The user should type your user name (email) and password stored in LDAP.

Probably, the error is in:

 Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 6
  rlm_mschap: No User-Password configured.  Cannot create LM-Password.
  rlm_mschap: No User-Password configured.  Cannot create NT-Password.
  rlm_mschap: Told to do MS-CHAPv2 for ducavalcanti with NT-Password
  rlm_mschap: FAILED: No NT/LM-Password.  Cannot perform authentication.
  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
  modcall[authenticate]: module "mschap" returns reject for request 6
modcall: leaving group MS-CHAP (returns reject) for request 6 


The full log is listed below

Starting - reading configuration files ...
reread_config:  reading radiusd.conf
Config:   including file: /etc/raddb/proxy.conf
Config:   including file: /etc/raddb/clients.conf
Config:   including file: /etc/raddb/snmp.conf
Config:   including file: /etc/raddb/eap.conf
 main: prefix = "/usr"
 main: localstatedir = "/var"
 main: logdir = "/var/log/radius"
 main: libdir = "/usr/lib"
 main: radacctdir = "/var/log/radius/radacct"
 main: hostname_lookups = no
 main: snmp = no
 main: max_request_time = 30
 main: cleanup_delay = 5
 main: max_requests = 1024
 main: delete_blocked_requests = 0
 main: port = 0
 main: allow_core_dumps = no
 main: log_stripped_names = no
 main: log_file = "/var/log/radius/radius.log"
 main: log_auth = no
 main: log_auth_badpass = no
 main: log_auth_goodpass = no
 main: pidfile = "/var/run/radiusd/radiusd.pid"
 main: user = "radiusd"
 main: group = "radiusd"
 main: usercollide = no
 main: lower_user = "no"
 main: lower_pass = "no"
 main: nospace_user = "no"
 main: nospace_pass = "no"
 main: checkrad = "/usr/sbin/checkrad"
 main: proxy_requests = yes
 proxy: retry_delay = 5
 proxy: retry_count = 3
 proxy: synchronous = no
 proxy: default_fallback = yes
 proxy: dead_time = 120
 proxy: post_proxy_authorize = no
 proxy: wake_all_if_all_dead = no
 security: max_attributes = 200
 security: reject_delay = 1
 security: status_server = no
 main: debug_level = 0
read_config_files:  reading dictionary
read_config_files:  reading naslist
read_config_files:  reading clients
read_config_files:  reading realms
radiusd:  entering modules setup
Module: Library search path is /usr/lib
Module: Loaded exec 
 exec: wait = yes
 exec: program = "(null)"
 exec: input_pairs = "request"
 exec: output_pairs = "(null)"
 exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec) 
Module: Loaded expr 
Module: Instantiated expr (expr) 
Module: Loaded MS-CHAP 
 mschap: use_mppe = yes
 mschap: require_encryption = yes
 mschap: require_strong = yes
 mschap: with_ntdomain_hack = yes
 mschap: passwd = "(null)"
 mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap) 
Module: Loaded Pam 
 pam: pam_auth = "radiusd"
Module: Instantiated pam (pam) 
Module: Loaded System 
 unix: cache = no
 unix: passwd = "/etc/passwd"
 unix: shadow = "/etc/shadow"
 unix: group = "/etc/group"
 unix: radwtmp = "/var/log/radius/radwtmp"
 unix: usegroup = no
 unix: cache_reload = 600
Module: Instantiated unix (unix) 
Module: Loaded LDAP 
 ldap: server = "ldap.recife.pe.gov.br"
 ldap: port = 389
 ldap: net_timeout = 1
 ldap: timeout = 4
 ldap: timelimit = 3
 ldap: identity = ""
 ldap: tls_mode = no
 ldap: start_tls = yes
 ldap: tls_cacertfile = "/etc/raddb/certs/demoCA/cacert.pem"
 ldap: tls_cacertdir = "/etc/raddb/certs/demoCA"
 ldap: tls_certfile = "/etc/raddb/certs/cert-srv.pem"
 ldap: tls_keyfile = "/etc/raddb/certs/cert-srv.pem"
 ldap: tls_randfile = "/etc/raddb/certs/random"
 ldap: tls_require_cert = "allow"
 ldap: password = ""
 ldap: basedn = "dc=recife"
 ldap: filter = "(uid=%u))"
 ldap: base_filter = "(objectclass=radiusprofile)"
 ldap: default_profile = "(null)"
 ldap: profile_attribute = "(null)"
 ldap: password_header = "(null)"
 ldap: password_attribute = "userPassword"
 ldap: access_attr = "(null)"
 ldap: groupname_attribute = "cn"
 ldap: groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
 ldap: groupmembership_attribute = "(null)"
 ldap: dictionary_mapping = "/etc/raddb/ldap.attrmap"
 ldap: ldap_debug = 0
 ldap: ldap_connections_number = 5
 ldap: compare_check_items = no
 ldap: access_attr_used_for_allow = yes
 ldap: do_xlat = yes
 ldap: set_auth_type = yes
rlm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap
rlm_ldap: reading ldap<->radius mappings from file /etc/raddb/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusAuthType mapped to RADIUS Auth-Type
rlm_ldap: LDAP radiusSimultaneousUse mapped to RADIUS Simultaneous-Use
rlm_ldap: LDAP radiusCalledStationId mapped to RADIUS Called-Station-Id
rlm_ldap: LDAP radiusCallingStationId mapped to RADIUS Calling-Station-Id
rlm_ldap: LDAP sambaLMPassword mapped to RADIUS LM-Password
rlm_ldap: LDAP sambaNTPassword mapped to RADIUS NT-Password
rlm_ldap: LDAP sambaAcctFlags mapped to RADIUS SMB-Account-CTRL-TEXT
rlm_ldap: LDAP radiusExpiration mapped to RADIUS Expiration
rlm_ldap: LDAP radiusNASIpAddress mapped to RADIUS NAS-IP-Address
rlm_ldap: LDAP sambaLMPassword mapped to RADIUS LM-Password
rlm_ldap: LDAP sambaNTPassword mapped to RADIUS NT-Password
rlm_ldap: LDAP radiusServiceType mapped to RADIUS Service-Type
rlm_ldap: LDAP radiusFramedProtocol mapped to RADIUS Framed-Protocol
rlm_ldap: LDAP radiusFramedIPAddress mapped to RADIUS Framed-IP-Address
rlm_ldap: LDAP radiusFramedIPNetmask mapped to RADIUS Framed-IP-Netmask
rlm_ldap: LDAP radiusFramedRoute mapped to RADIUS Framed-Route
rlm_ldap: LDAP radiusFramedRouting mapped to RADIUS Framed-Routing
rlm_ldap: LDAP radiusFilterId mapped to RADIUS Filter-Id
rlm_ldap: LDAP radiusFramedMTU mapped to RADIUS Framed-MTU
rlm_ldap: LDAP radiusFramedCompression mapped to RADIUS Framed-Compression
rlm_ldap: LDAP radiusLoginIPHost mapped to RADIUS Login-IP-Host
rlm_ldap: LDAP radiusLoginService mapped to RADIUS Login-Service
rlm_ldap: LDAP radiusLoginTCPPort mapped to RADIUS Login-TCP-Port
rlm_ldap: LDAP radiusCallbackNumber mapped to RADIUS Callback-Number
rlm_ldap: LDAP radiusCallbackId mapped to RADIUS Callback-Id
rlm_ldap: LDAP radiusFramedIPXNetwork mapped to RADIUS Framed-IPX-Network
rlm_ldap: LDAP radiusClass mapped to RADIUS Class
rlm_ldap: LDAP radiusSessionTimeout mapped to RADIUS Session-Timeout
rlm_ldap: LDAP radiusIdleTimeout mapped to RADIUS Idle-Timeout
rlm_ldap: LDAP radiusTerminationAction mapped to RADIUS Termination-Action
rlm_ldap: LDAP radiusLoginLATService mapped to RADIUS Login-LAT-Service
rlm_ldap: LDAP radiusLoginLATNode mapped to RADIUS Login-LAT-Node
rlm_ldap: LDAP radiusLoginLATGroup mapped to RADIUS Login-LAT-Group
rlm_ldap: LDAP radiusFramedAppleTalkLink mapped to RADIUS Framed-AppleTalk-Link
rlm_ldap: LDAP radiusFramedAppleTalkNetwork mapped to RADIUS Framed-AppleTalk-Network
rlm_ldap: LDAP radiusFramedAppleTalkZone mapped to RADIUS Framed-AppleTalk-Zone
rlm_ldap: LDAP radiusPortLimit mapped to RADIUS Port-Limit
rlm_ldap: LDAP radiusLoginLATPort mapped to RADIUS Login-LAT-Port
rlm_ldap: LDAP radiusReplyMessage mapped to RADIUS Reply-Message
rlm_ldap: LDAP radiusTunnelType mapped to RADIUS Tunnel-Type
rlm_ldap: LDAP radiusTunnelMediumType mapped to RADIUS Tunnel-Medium-Type
rlm_ldap: LDAP radiusTunnelPrivateGroupId mapped to RADIUS Tunnel-Private-Group-Id
conns: 0x85ac160
Module: Instantiated ldap (ldap) 
Module: Loaded eap 
 eap: default_eap_type = "peap"
 eap: timer_expire = 60
 eap: ignore_unknown_eap_types = no
 eap: cisco_accounting_username_bug = no
 tls: rsa_key_exchange = no
 tls: dh_key_exchange = yes
 tls: rsa_key_length = 512
 tls: dh_key_length = 512
 tls: verify_depth = 0
 tls: CA_path = "(null)"
 tls: pem_file_type = yes
 tls: private_key_file = "/etc/raddb/certs/cert-srv.pem"
 tls: certificate_file = "/etc/raddb/certs/cert-srv.pem"
 tls: CA_file = "/etc/raddb/certs/demoCA/cacert.pem"
 tls: private_key_password = "whatever"
 tls: dh_file = "/etc/raddb/certs/dh"
 tls: random_file = "/etc/raddb/certs/random"
 tls: fragment_size = 1024
 tls: include_length = yes
 tls: check_crl = no
 tls: check_cert_cn = "(null)"
 tls: cipher_list = "(null)"
 tls: check_cert_issuer = "(null)"
rlm_eap_tls: Loading the certificate file as a chain
rlm_eap: Loaded and initialized type tls
 peap: default_eap_type = "mschapv2"
 peap: copy_request_to_tunnel = no
 peap: use_tunneled_reply = no
 peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
 mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap) 
Module: Loaded preprocess 
 preprocess: huntgroups = "/etc/raddb/huntgroups"
 preprocess: hints = "/etc/raddb/hints"
 preprocess: with_ascend_hack = no
 preprocess: ascend_channels_per_line = 23
 preprocess: with_ntdomain_hack = no
 preprocess: with_specialix_jetstream_hack = no
 preprocess: with_cisco_vsa_hack = no
 preprocess: with_alvarion_vsa_hack = no
Module: Instantiated preprocess (preprocess) 
Module: Loaded realm 
 realm: format = "suffix"
 realm: delimiter = "@"
 realm: ignore_default = no
 realm: ignore_null = no
Module: Instantiated realm (suffix) 
Module: Loaded files 
 files: usersfile = "/etc/raddb/users"
 files: acctusersfile = "/etc/raddb/acct_users"
 files: preproxy_usersfile = "/etc/raddb/preproxy_users"
 files: compat = "no"
[/etc/raddb/users]:10 WARNING! Check item "Simultaneous-Use" ?found in reply item list for user "cidadao". ?This attribute MUST go on the first line with the other check items
[/etc/raddb/users]:21 WARNING! Check item "Simultaneous-Use" ?found in reply item list for user "ds". ?This attribute MUST go on the first line with the other check items
[/etc/raddb/users]:32 WARNING! Check item "Simultaneous-Use" ?found in reply item list for user "onibus1". ?This attribute MUST go on the first line with the other check items
[/etc/raddb/users]:41 WARNING! Check item "Simultaneous-Use" ?found in reply item list for user "onibus2". ?This attribute MUST go on the first line with the other check items
[/etc/raddb/users]:50 WARNING! Check item "Simultaneous-Use" ?found in reply item list for user "onibus3". ?This attribute MUST go on the first line with the other check items
[/etc/raddb/users]:74 WARNING! Check item "Simultaneous-Use" ?found in reply item list for user "DEFAULT". ?This attribute MUST go on the first line with the other check items
Module: Instantiated files (files) 
Module: Loaded Acct-Unique-Session-Id 
 acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique) 
Module: Loaded detail 
 detail: detailfile = "/var/log/radius/radacct/detail"
 detail: detailperm = 384
 detail: dirperm = 493
 detail: locking = no
Module: Instantiated detail (detail) 
Module: Loaded radutmp 
 radutmp: filename = "/var/log/radius/radutmp"
 radutmp: username = "%{User-Name}"
 radutmp: case_sensitive = yes
 radutmp: check_with_nas = yes
 radutmp: perm = 384
 radutmp: callerid = yes
Module: Instantiated radutmp (radutmp) 
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
rad_recv: Access-Request packet from host 10.0.0.45:1397, id=0, length=215
    Message-Authenticator = 0x97a84f20d4434232cd49ca6d658945d3
    Service-Type = Framed-User
    User-Name = "ducavalcanti"
    Framed-MTU = 1488
    Called-Station-Id = "00-18-6E-8F-7F-C6:Teste_Radius"
    Calling-Station-Id = "00-16-CF-5D-AB-87"
    NAS-Identifier = "3Com Access Point 7760"
    NAS-Port-Type = Wireless-802.11
    Connect-Info = "CONNECT 54Mbps 802.11g"
    EAP-Message = 0x02000011016475636176616c63616e7469
    NAS-IP-Address = 10.0.0.45
    NAS-Port = 3
    NAS-Port-Id = "STA port # 3"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
  modcall[authorize]: module "preprocess" returns ok for request 0
  modcall[authorize]: module "mschap" returns noop for request 0
    rlm_realm: No '@' in User-Name = "ducavalcanti", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 0
  rlm_eap: EAP packet type response id 0 length 17
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 0
    users: Matched entry DEFAULT at line 74
  modcall[authorize]: module "files" returns ok for request 0
modcall: leaving group authorize (returns updated) for request 0
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
  modcall[authenticate]: module "eap" returns handled for request 0
modcall: leaving group authenticate (returns handled) for request 0
Sending Access-Challenge of id 0 to 10.0.0.45 port 1397
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    EAP-Message = 0x010100061920
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0x6e92a11c2e2eb8b0f5a3ef121130cdbe
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.0.45:1397, id=1, length=296
    Message-Authenticator = 0x6f9a9ac031506c58b6c6e44ca2406e45
    Service-Type = Framed-User
    User-Name = "ducavalcanti"
    Framed-MTU = 1488
    State = 0x6e92a11c2e2eb8b0f5a3ef121130cdbe
    Called-Station-Id = "00-18-6E-8F-7F-C6:Teste_Radius"
    Calling-Station-Id = "00-16-CF-5D-AB-87"
    NAS-Identifier = "3Com Access Point 7760"
    NAS-Port-Type = Wireless-802.11
    Connect-Info = "CONNECT 54Mbps 802.11g"
    EAP-Message = 0x0201005019800000004616030100410100003d03014739af68a8f0d6ff21bcf3d70631bff8fd284444e2b706a9bf448ec99da68d9000001600040005000a000900640062000300060013001200630100
    NAS-IP-Address = 10.0.0.45
    NAS-Port = 3
    NAS-Port-Id = "STA port # 3"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
  modcall[authorize]: module "preprocess" returns ok for request 1
  modcall[authorize]: module "mschap" returns noop for request 1
    rlm_realm: No '@' in User-Name = "ducavalcanti", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 1
  rlm_eap: EAP packet type response id 1 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 1
    users: Matched entry DEFAULT at line 74
  modcall[authorize]: module "files" returns ok for request 1
modcall: leaving group authorize (returns updated) for request 1
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0613], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
    TLS_accept: SSLv3 write server done A 
    TLS_accept: SSLv3 flush data 
    TLS_accept:error in SSLv3 read client certificate A 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 1
modcall: leaving group authenticate (returns handled) for request 1
Sending Access-Challenge of id 1 to 10.0.0.45 port 1397
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    EAP-Message = 0x0102040a19c000000670160301004a0200004603014739b155fbba378d8caad6bf3cf2fcd445f60f72624d63cae1e97a280be0f1f620cfffe3e5b1d4493d5a781cdf4f43bed0de241d70bb915648fcd4285ef7b4f58400040016030106130b00060f00060c0002a6308202a23082020ba00302010202090091c3a0bfdd719e76300d06092a864886f70d0101050500307d310b3009060355040613024252311330110603550408130a5065726e616d6275636f310f300d060355040a1306454d5052454c310f300d060355040b1306454d5052454c3110300e060355040313077375706f7274653125302306092a864886f70d01090116167375706f72
    EAP-Message = 0x746540617270736973742e636f6d2e6272301e170d3037313031383132313931315a170d3038313031373132313931315a30818f310b3009060355040613024252311330110603550408130a5065726e616d6275636f3110300e060355040714075c526563696665310f300d060355040a1306454d5052454c310f300d060355040b1306454d5052454c3110300e060355040313077375706f7274653125302306092a864886f70d01090116167375706f72746540617270736973742e636f6d2e627230819f300d06092a864886f70d010101050003818d0030818902818100c493f9d65023f11b86d83e3443a39aa9439dc496752284b2de7376bb59
    EAP-Message = 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
    EAP-Message = 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
    EAP-Message = 0x6e616d6275636f310f300d060355040a1306454d5052
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xfd0beac7b89b40eefff915efd4d9d96a
Finished request 1
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.0.45:1397, id=2, length=222
    Message-Authenticator = 0x17dee25fd4e402e0bce5c2e7c4e06575
    Service-Type = Framed-User
    User-Name = "ducavalcanti"
    Framed-MTU = 1488
    State = 0xfd0beac7b89b40eefff915efd4d9d96a
    Called-Station-Id = "00-18-6E-8F-7F-C6:Teste_Radius"
    Calling-Station-Id = "00-16-CF-5D-AB-87"
    NAS-Identifier = "3Com Access Point 7760"
    NAS-Port-Type = Wireless-802.11
    Connect-Info = "CONNECT 54Mbps 802.11g"
    EAP-Message = 0x020200061900
    NAS-IP-Address = 10.0.0.45
    NAS-Port = 3
    NAS-Port-Id = "STA port # 3"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
  modcall[authorize]: module "preprocess" returns ok for request 2
  modcall[authorize]: module "mschap" returns noop for request 2
    rlm_realm: No '@' in User-Name = "ducavalcanti", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 2
  rlm_eap: EAP packet type response id 2 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 2
    users: Matched entry DEFAULT at line 74
  modcall[authorize]: module "files" returns ok for request 2
modcall: leaving group authorize (returns updated) for request 2
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1 
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 2
modcall: leaving group authenticate (returns handled) for request 2
Sending Access-Challenge of id 2 to 10.0.0.45 port 1397
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    EAP-Message = 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
    EAP-Message = 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
    EAP-Message = 0x017d696503c0542fc2e50360b955027d8cc61908d938a3f351302317774c9840d291fa3e3967b893bdd2c0952e93921be784f66795d6395abc58e10a921a138bc90b252b373ca7ca597bd4838d7f45e7741a5502d91c2ed79df141931fd6816c83978d2c09fca2eae6932ed4e538973e75127f16030100040e000000
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0x2d984a07595e9ac3aa78f16d85c558c6
Finished request 2
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.0.45:1397, id=3, length=408
    Message-Authenticator = 0xba582ade90838a38b10004924ed5e5e7
    Service-Type = Framed-User
    User-Name = "ducavalcanti"
    Framed-MTU = 1488
    State = 0x2d984a07595e9ac3aa78f16d85c558c6
    Called-Station-Id = "00-18-6E-8F-7F-C6:Teste_Radius"
    Calling-Station-Id = "00-16-CF-5D-AB-87"
    NAS-Identifier = "3Com Access Point 7760"
    NAS-Port-Type = Wireless-802.11
    Connect-Info = "CONNECT 54Mbps 802.11g"
    EAP-Message = 0x020300c01980000000b616030100861000008200804d52a6ab167309225ce9a411b4eabf4aa96925f14b8da9bfbc6e89e5410bada5be32d4d918fd13a2c54f0d9bcf03c26280bc3225e5fe83cecec1d6994ba448b5ff1be3cc778d8173d0fb2b9619e586dd2d9603b0128470ad57e0d48ab9ebb91dfa87389335b6ffe3767046a3747f1f53f5bfcc8dc29bbb76679c83c81f46df8914030100010116030100205829fbdf78858311c77221d58efa0a2714ea74c5eb841a7848dbb4256cc344a8
    NAS-IP-Address = 10.0.0.45
    NAS-Port = 3
    NAS-Port-Id = "STA port # 3"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
  modcall[authorize]: module "preprocess" returns ok for request 3
  modcall[authorize]: module "mschap" returns noop for request 3
    rlm_realm: No '@' in User-Name = "ducavalcanti", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 3
  rlm_eap: EAP packet type response id 3 length 192
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 3
    users: Matched entry DEFAULT at line 74
  modcall[authorize]: module "files" returns ok for request 3
modcall: leaving group authorize (returns updated) for request 3
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
    TLS_accept: SSLv3 read client key exchange A 
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]  
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished  
    TLS_accept: SSLv3 read finished A 
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]  
    TLS_accept: SSLv3 write change cipher spec A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished  
    TLS_accept: SSLv3 write finished A 
    TLS_accept: SSLv3 flush data 
    (other): SSL negotiation finished successfully 
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
SSL Connection Established 
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 3
modcall: leaving group authenticate (returns handled) for request 3
Sending Access-Challenge of id 3 to 10.0.0.45 port 1397
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    EAP-Message = 0x010400311900140301000101160301002044268c376c10a7426ec28ac1f70560496dd01442fc1871d4309a231de0cf2fd2
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xeb89542136d6968cc340734f68c628c6
Finished request 3
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.0.45:1397, id=4, length=222
    Message-Authenticator = 0xbe9ec00cfe2576161f6376e77baa9bde
    Service-Type = Framed-User
    User-Name = "ducavalcanti"
    Framed-MTU = 1488
    State = 0xeb89542136d6968cc340734f68c628c6
    Called-Station-Id = "00-18-6E-8F-7F-C6:Teste_Radius"
    Calling-Station-Id = "00-16-CF-5D-AB-87"
    NAS-Identifier = "3Com Access Point 7760"
    NAS-Port-Type = Wireless-802.11
    Connect-Info = "CONNECT 54Mbps 802.11g"
    EAP-Message = 0x020400061900
    NAS-IP-Address = 10.0.0.45
    NAS-Port = 3
    NAS-Port-Id = "STA port # 3"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
  modcall[authorize]: module "preprocess" returns ok for request 4
  modcall[authorize]: module "mschap" returns noop for request 4
    rlm_realm: No '@' in User-Name = "ducavalcanti", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 4
  rlm_eap: EAP packet type response id 4 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 4
    users: Matched entry DEFAULT at line 74
  modcall[authorize]: module "files" returns ok for request 4
modcall: leaving group authorize (returns updated) for request 4
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3 
  eaptls_process returned 3 
  rlm_eap_peap: EAPTLS_SUCCESS
  modcall[authenticate]: module "eap" returns handled for request 4
modcall: leaving group authenticate (returns handled) for request 4
Sending Access-Challenge of id 4 to 10.0.0.45 port 1397
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    EAP-Message = 0x010500201900170301001500822197cc3a4d4115a1707866e50911ccd5fd7153
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xe3eb2c3e8d1e2d49910601e06aad46db
Finished request 4
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.0.45:1397, id=5, length=256
    Message-Authenticator = 0xd469b7f0dc9bceb846ac92b41967a0bd
    Service-Type = Framed-User
    User-Name = "ducavalcanti"
    Framed-MTU = 1488
    State = 0xe3eb2c3e8d1e2d49910601e06aad46db
    Called-Station-Id = "00-18-6E-8F-7F-C6:Teste_Radius"
    Calling-Station-Id = "00-16-CF-5D-AB-87"
    NAS-Identifier = "3Com Access Point 7760"
    NAS-Port-Type = Wireless-802.11
    Connect-Info = "CONNECT 54Mbps 802.11g"
    EAP-Message = 0x020500281900170301001d10537c5025635ceb31f1789dd73ace4a29aca849cc784caf663ca8bad7
    NAS-IP-Address = 10.0.0.45
    NAS-Port = 3
    NAS-Port-Id = "STA port # 3"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
    rlm_realm: No '@' in User-Name = "ducavalcanti", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
  rlm_eap: EAP packet type response id 5 length 40
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    users: Matched entry DEFAULT at line 74
  modcall[authorize]: module "files" returns ok for request 5
modcall: leaving group authorize (returns updated) for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - ducavalcanti
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
    EAP-Message = 0x02050011016475636176616c63616e7469
  PEAP: Got tunneled identity of ducavalcanti
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to ducavalcanti
  PEAP: Sending tunneled request
    EAP-Message = 0x02050011016475636176616c63616e7469
    FreeRADIUS-Proxied-To = 127.0.0.1
    User-Name = "ducavalcanti"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
    rlm_realm: No '@' in User-Name = "ducavalcanti", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
  rlm_eap: EAP packet type response id 5 length 17
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    users: Matched entry DEFAULT at line 74
  modcall[authorize]: module "files" returns ok for request 5
modcall: leaving group authorize (returns updated) for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: EAP Identity
  rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
  PEAP: Got tunneled reply RADIUS code 11
    Simultaneous-Use = 1
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    EAP-Message = 0x010600261a010600211081f8c12bb5d6b67acd534094d559a0c16475636176616c63616e7469
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xf3e601b3722625ab79f99c119a369261
  PEAP: Processing from tunneled session code 0x85c4500 11
    Simultaneous-Use = 1
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    EAP-Message = 0x010600261a010600211081f8c12bb5d6b67acd534094d559a0c16475636176616c63616e7469
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xf3e601b3722625ab79f99c119a369261
  PEAP: Got tunneled Access-Challenge
  modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
Sending Access-Challenge of id 5 to 10.0.0.45 port 1397
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    EAP-Message = 0x0106003d190017030100324053f25612454fd272b962c7131679228164337ddc83ca7f617c0ffb77ec9f6a01b77e338e1878a50ed7740fd57eeec946c7
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xc72085ef2bc63e62f47a3fe126211ebe
Finished request 5
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.0.45:1397, id=6, length=310
    Message-Authenticator = 0x29eaa29601a8e416c9d18bac862e94c0
    Service-Type = Framed-User
    User-Name = "ducavalcanti"
    Framed-MTU = 1488
    State = 0xc72085ef2bc63e62f47a3fe126211ebe
    Called-Station-Id = "00-18-6E-8F-7F-C6:Teste_Radius"
    Calling-Station-Id = "00-16-CF-5D-AB-87"
    NAS-Identifier = "3Com Access Point 7760"
    NAS-Port-Type = Wireless-802.11
    Connect-Info = "CONNECT 54Mbps 802.11g"
    EAP-Message = 0x0206005e1900170301005368c49f7d568b3493615bb4786eb9cbe9add92efec32e3690cbb373dc7230e7cc3b95945d2e9a8305a3197dc9485223992b1e2c7574ebe1a06d7349e036cc82f50c0cb78613bf938941fc7c79df7ef5ad703b4e
    NAS-IP-Address = 10.0.0.45
    NAS-Port = 3
    NAS-Port-Id = "STA port # 3"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: No '@' in User-Name = "ducavalcanti", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
  rlm_eap: EAP packet type response id 6 length 94
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry DEFAULT at line 74
  modcall[authorize]: module "files" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: EAP type mschapv2
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled EAP-Message
    EAP-Message = 0x020600471a0206004231c09d2e726a412f912f80c6c2c24a01cf0000000000000000f03d9d7d5bd85c82c5f72d39aa28929b49b63bf52ecff5cb006475636176616c63616e7469
  PEAP: Setting User-Name to ducavalcanti
  PEAP: Adding old state with f3 e6
  PEAP: Sending tunneled request
    EAP-Message = 0x020600471a0206004231c09d2e726a412f912f80c6c2c24a01cf0000000000000000f03d9d7d5bd85c82c5f72d39aa28929b49b63bf52ecff5cb006475636176616c63616e7469
    FreeRADIUS-Proxied-To = 127.0.0.1
    User-Name = "ducavalcanti"
    State = 0xf3e601b3722625ab79f99c119a369261
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
  modcall[authorize]: module "preprocess" returns ok for request 6
  modcall[authorize]: module "mschap" returns noop for request 6
    rlm_realm: No '@' in User-Name = "ducavalcanti", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 6
  rlm_eap: EAP packet type response id 6 length 71
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 6
    users: Matched entry DEFAULT at line 74
  modcall[authorize]: module "files" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/mschapv2
  rlm_eap: processing type mschapv2
  Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 6
  rlm_mschap: No User-Password configured.  Cannot create LM-Password.
  rlm_mschap: No User-Password configured.  Cannot create NT-Password.
  rlm_mschap: Told to do MS-CHAPv2 for ducavalcanti with NT-Password
  rlm_mschap: FAILED: No NT/LM-Password.  Cannot perform authentication.
  rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
  modcall[authenticate]: module "mschap" returns reject for request 6
modcall: leaving group MS-CHAP (returns reject) for request 6
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns reject for request 6
modcall: leaving group authenticate (returns reject) for request 6
auth: Failed to validate the user.
  PEAP: Got tunneled reply RADIUS code 3
    Simultaneous-Use = 1
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    MS-CHAP-Error = "\006E=691 R=1"
    EAP-Message = 0x04060004
    Message-Authenticator = 0x00000000000000000000000000000000
  PEAP: Processing from tunneled session code 0x85e80e8 3
    Simultaneous-Use = 1
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    MS-CHAP-Error = "\006E=691 R=1"
    EAP-Message = 0x04060004
    Message-Authenticator = 0x00000000000000000000000000000000
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
  modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
Sending Access-Challenge of id 6 to 10.0.0.45 port 1397
    Idle-Timeout = 1200
    Service-Type = Framed-User
    Framed-Protocol = PPP
    Framed-IP-Netmask = 255.255.255.255
    Framed-Routing = None
    Framed-MTU = 1500
    EAP-Message = 0x010700261900170301001b4a225c725a01e1ae8ee997fa96c6065c6c2688941f65cb21b089bd
    Message-Authenticator = 0x00000000000000000000000000000000
    State = 0xb91f907fbd983f95c34961b9e8b8c182
Finished request 6
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.0.45:1397, id=7, length=254
    Message-Authenticator = 0xf4a4b6cf3eda5ad189a531100a4ab76a
    Service-Type = Framed-User
    User-Name = "ducavalcanti"
    Framed-MTU = 1488
    State = 0xb91f907fbd983f95c34961b9e8b8c182
    Called-Station-Id = "00-18-6E-8F-7F-C6:Teste_Radius"
    Calling-Station-Id = "00-16-CF-5D-AB-87"
    NAS-Identifier = "3Com Access Point 7760"
    NAS-Port-Type = Wireless-802.11
    Connect-Info = "CONNECT 54Mbps 802.11g"
    EAP-Message = 0x020700261900170301001beb99d02b18f142827e3a1a0590988723cff7c84b868b96f2c5d2b3
    NAS-IP-Address = 10.0.0.45
    NAS-Port = 3
    NAS-Port-Id = "STA port # 3"
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
  modcall[authorize]: module "preprocess" returns ok for request 7
  modcall[authorize]: module "mschap" returns noop for request 7
    rlm_realm: No '@' in User-Name = "ducavalcanti", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 7
  rlm_eap: EAP packet type response id 7 length 38
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 7
    users: Matched entry DEFAULT at line 74
  modcall[authorize]: module "files" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap: Tunneled data is valid.
  rlm_eap_peap:  Had sent TLV failure.  User was rejcted rejected earlier in this session.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
  modcall[authenticate]: module "eap" returns invalid for request 7
modcall: leaving group authenticate (returns invalid) for request 7
auth: Failed to validate the user.
Delaying request 7 for 1 seconds
Finished request 7
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 10.0.0.45:1397, id=7, length=254
Sending Access-Reject of id 7 to 10.0.0.45 port 1397
    EAP-Message = 0x04070004
    Message-Authenticator = 0x00000000000000000000000000000000
--- Walking the entire request list ---
Waking up in 3 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 0 with timestamp 4739b155
Cleaning up request 1 ID 1 with timestamp 4739b155
Cleaning up request 2 ID 2 with timestamp 4739b155
Cleaning up request 3 ID 3 with timestamp 4739b155
Cleaning up request 4 ID 4 with timestamp 4739b155
Cleaning up request 5 ID 5 with timestamp 4739b155
Cleaning up request 6 ID 6 with timestamp 4739b155
Cleaning up request 7 ID 7 with timestamp 4739b155
Nothing to do.  Sleeping until we see a request.



PLEASE HELP!!



       
---------------------------------
Abra sua conta no Yahoo! Mail, o único sem limite de espaço para armazenamento! 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20071113/0cf84b3f/attachment.html>


More information about the Freeradius-Users mailing list