a newbie testing freeradius need help
jennie susan
jennie_susan at yahoo.com
Mon Apr 28 09:30:31 CEST 2008
Hi all,
I have succeed in configuring the server again with correct openssl libraries and development headers, the eapol_test is halfway successful, the tunnel was established, but i dont know why its didnt succeed after that, can you give me an hint please.
Thank you all for helping me out.
Br,
Jreubens
HERE IS MY RADIUSD OUTPUT
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x0200000e01616e6f6e796d6f7573
Message-Authenticator = 0x7a6034cf7717a391ed27b2009f6183e6
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
rlm_realm: No such realm "NULL"
++[suffix] returns noop
rlm_eap: EAP packet type response id 0 length 14
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
rlm_pap: WARNING! No "known good" password found for the user. Authentication may fail because of this.
++[pap] returns noop
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: EAP Identity
rlm_eap: processing type md5
rlm_eap_md5: Issuing Challenge
++[eap] returns handled
EAP-Message = 0x010100160410b08675566bb4374960f4ad3d016012d5
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd60df96dd60cfd7fbb716c33077b06cd
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
User-Name = "anonymous"
NAS-IP-Address = 127.0.0.1
Calling-Station-Id = "02-00-00-00-00-01"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020100060319
State = 0xd60df96dd60cfd7fbb716c33077b06cd
Message-Authenticator = 0x9ceebff3658f100773d5a1128d1eef4b
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
rlm_realm: No such realm "NULL"
++[suffix] returns noop
rlm_eap: EAP packet type response id 1 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
rlm_pap: WARNING! No "known good" password found for the user. Authentication may fail because of this.
++[pap] returns noop
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: Request found, released from the list
rlm_eap: EAP NAK
rlm_eap: EAP-NAK asked for EAP-Type/peap
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
++[eap] returns handled
EAP-Message = 0x010200061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd60df96dd70fe07fbb716c33077b06cd
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
User-Name = "anonymous"
NAS-IP-Address = 127.0.0.1
Calling-Station-Id = "02-00-00-00-00-01"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x0202005e190016030100530100004f0301481576fea1a0e81ff55753b5a3d70b37d5fb619e00eda78395931584ff53904400002800390038003500160013000a00330032002f000700050004001500120009001400110008000600030100
State = 0xd60df96dd70fe07fbb716c33077b06cd
Message-Authenticator = 0x6e3b249941b1fb3f187b9e295b1aab5a
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
rlm_realm: No such realm "NULL"
++[suffix] returns noop
rlm_eap: EAP packet type response id 2 length 94
rlm_eap: Continuing tunnel setup.
++[eap] returns ok
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
(other): before/accept initialization
TLS_accept: before/accept initialization
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0053], ClientHello
TLS_accept: SSLv3 read client hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
TLS_accept: SSLv3 write server hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 085e], Certificate
TLS_accept: SSLv3 write certificate A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
TLS_accept: SSLv3 write key exchange A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
TLS_accept: SSLv3 write server done A
TLS_accept: SSLv3 flush data
TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
EAP-Message = 0x0103040019c000000acd160301004a020000460301481576fe4a42616ff1aa3c3e368c47f1953d4e395c016e0afaa80d8002d893f620bfc7267d47f0cb52cdb9e750d6c49bc36b41fe8174d2252b5ba9014a0d6da991003900160301085e0b00085a0008570003a6308203a23082028aa003020102020101300d06092a864886f70d0101040500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d3126302406035504
EAP-Message = 0x03131d4578616d706c6520436572746966696361746520417574686f72697479301e170d3038303432383036333831395a170d3039303432383036333831395a307c310b3009060355040613024652310f300d0603550408130652616469757331153013060355040a130c4578616d706c6520496e632e312330210603550403131a4578616d706c65205365727665722043657274696669636174653120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d30820122300d06092a864886f70d01010105000382010f003082010a0282010100b73f813e1c4513114fd57681f95a589ec71dd5233fec6d297528e304db12
EAP-Message = 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
EAP-Message = 0x070301300d06092a864886f70d010104050003820101009eb8a287c4e90fea0927e476c47dd0f316e268bfb6ea7506615621bb3ebdaba3a3b2e9501406ae953d2ef55cfddd74b6ba82c513913b1c3e48f837d3e71b83202d3043fff035ac4dfb1020680ead19485e661f39ab380d2ef4fca3966188908209db546d9e98edd56b6e33adf38bc690d5d3b58d60c3d08753013162bfdc86ca4007eeadd6995fd779e67407a7ebcccb332c00b82609a603737badd5be659a8d2b12071b4c3225c075743998bf504ca558959fc94affb2507e2d1df57f1c481d7309c351ce0a826c686009540f45a8c0b298e8218d164ac1eb5b85e7bfe90fed6c6496721dc8
EAP-Message = 0x6f0bc4e9c50fdfa906951ba1
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd60df96dd40ee07fbb716c33077b06cd
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
User-Name = "anonymous"
NAS-IP-Address = 127.0.0.1
Calling-Station-Id = "02-00-00-00-00-01"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020300061900
State = 0xd60df96dd40ee07fbb716c33077b06cd
Message-Authenticator = 0x8cbd5dacf77784d94a31d5221b737d9f
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
rlm_realm: No such realm "NULL"
++[suffix] returns noop
rlm_eap: EAP packet type response id 3 length 6
rlm_eap: Continuing tunnel setup.
++[eap] returns ok
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
EAP-Message = 0x010403fc194038f0229704270e800da08c5ede3a0004ab308204a73082038fa003020102020900d2e1c94d8db8983e300d06092a864886f70d0101050500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f72697479301e170d3038303432383036333831385a170d3038303532383036333831385a308193310b30090603
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x05bb4ff107d513af
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd60df96dd509e07fbb716c33077b06cd
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
User-Name = "anonymous"
NAS-IP-Address = 127.0.0.1
Calling-Station-Id = "02-00-00-00-00-01"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020400061900
State = 0xd60df96dd509e07fbb716c33077b06cd
Message-Authenticator = 0x66db1b3ebb30646425959e855b852f33
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
rlm_realm: No such realm "NULL"
++[suffix] returns noop
rlm_eap: EAP packet type response id 4 length 6
rlm_eap: Continuing tunnel setup.
++[eap] returns ok
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x584f2e693e8db16a2e821ea87e12f2bbda45bda0cde2bb00fec3d22b4154202d018484c0745a20b1a58453f3a6144af2d6983f406e4841627daca4017fbafaedeb27bbc69ec3bd8831b0fa60106fa754fca1af63e3208ba1c3642cc6000efcb062730633c164d421c50eeafd78b73273ff2433362473d5d676b25e651f30daf7967ccd80c2a45efd2f7b2929ce4a9ff371d4f72d671958f60db52f7b0ff564848510141ddd6af08fac70e7e3cc7c803d7373645255e30a091e8bcb2db0bffeb8775cc81842afa24f20a5b178cc52f4957ef5eb32c7852aa0b077f4a81da001e1377a816716030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd60df96dd208e07fbb716c33077b06cd
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
User-Name = "anonymous"
NAS-IP-Address = 127.0.0.1
Calling-Station-Id = "02-00-00-00-00-01"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020500cc1900160301008610000082008088a0c83ed9fff3d6c1cd3387dc6fcaccd44290777eb6eedd45e55c77171a709d8b22224f12e88b763daf1d5a5759ded7e3213da767a2ddb251105985b1594cacf74e80d5b638d765ee5d6b04323d0e4674e9c7d2c0a768ba70597484d81747e369be44cfe95e3d0d8145d1331b813c2629ea68cc6ad66d2c0124f46c6a72aea61403010001011603010030d00fd85fa77486333f9d28409d029b72081bdc7ab031d26b82a5eaf4f79307f6c7e6f52f9acae6f54e2c74338731ec9e
State = 0xd60df96dd208e07fbb716c33077b06cd
Message-Authenticator = 0x3d3b5ab6c6eff675275c9be53d1962bb
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
rlm_realm: No such realm "NULL"
++[suffix] returns noop
rlm_eap: EAP packet type response id 5 length 204
rlm_eap: Continuing tunnel setup.
++[eap] returns ok
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
TLS_accept: SSLv3 read client key exchange A
rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 read finished A
rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
TLS_accept: SSLv3 write change cipher spec A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 write finished A
TLS_accept: SSLv3 flush data
(other): SSL negotiation finished successfully
SSL Connection Established
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
EAP-Message = 0x010600411900140301000101160301003085527844557527b77fe0ec6a25eb0afcb093f067e3db28fead4a48eec10face50f0da001f236cf4950d82995f676b544
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd60df96dd30be07fbb716c33077b06cd
Finished request 5.
Going to the next request
Waking up in 4.9 seconds.
User-Name = "anonymous"
NAS-IP-Address = 127.0.0.1
Calling-Station-Id = "02-00-00-00-00-01"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020600061900
State = 0xd60df96dd30be07fbb716c33077b06cd
Message-Authenticator = 0x07f8b9d3f401d0c77b4f4915d71e0cc5
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
rlm_realm: No such realm "NULL"
++[suffix] returns noop
rlm_eap: EAP packet type response id 6 length 6
rlm_eap: Continuing tunnel setup.
++[eap] returns ok
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake is finished
eaptls_verify returned 3
eaptls_process returned 3
rlm_eap_peap: EAPTLS_SUCCESS
++[eap] returns handled
EAP-Message = 0x0107002b190017030100202b0249c2f447cef8bda6f3224fa8fe081f2c3f7023634612e1ebb286a0d24f66
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd60df96dd00ae07fbb716c33077b06cd
Finished request 6.
Going to the next request
Waking up in 4.9 seconds.
User-Name = "anonymous"
NAS-IP-Address = 127.0.0.1
Calling-Station-Id = "02-00-00-00-00-01"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x0207005019001703010020a3c24219d2d7538038cf9b5b6d7074617a8a27b72a997ffb9222bbc99a926acf1703010020e42a4ec295bb3220f5cf014ba10eaccb4d66d36049fcf540c2edcfee58b254fe
State = 0xd60df96dd00ae07fbb716c33077b06cd
Message-Authenticator = 0x193fe8df30309c4c39fdf59c84b0ed77
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
rlm_realm: No such realm "NULL"
++[suffix] returns noop
rlm_eap: EAP packet type response id 7 length 80
rlm_eap: Continuing tunnel setup.
++[eap] returns ok
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_peap: Identity - testuser
PEAP: Got tunneled identity of testuser
PEAP: Setting default EAP type for tunneled EAP session.
PEAP: Setting User-Name to testuser
auth: No authenticate method (Auth-Type) configuration found for the request: Rejecting the user
auth: Failed to validate the user.
Login incorrect: [testuser/<no User-Password attribute>] (from client localhost port 0)
PEAP: Tunneled authentication was rejected.
rlm_eap_peap: FAILURE
++[eap] returns handled
EAP-Message = 0x0108002b19001703010020780d7d621e66a7b28ed554db2b02d0f6148e695d4e72e2cb21e5d2d9f1861fa1
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xd60df96dd105e07fbb716c33077b06cd
Finished request 7.
Going to the next request
Waking up in 4.8 seconds.
User-Name = "anonymous"
NAS-IP-Address = 127.0.0.1
Calling-Station-Id = "02-00-00-00-00-01"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x02080050190017030100208e89b5ad71f59acce21781ba90062f7b2eae1d2dde31e725035fa48bba1a087b170301002009b75048e477fab4d8cba9d8da02baa314106bce519ebcbb1c196f22e964ca83
State = 0xd60df96dd105e07fbb716c33077b06cd
Message-Authenticator = 0xbd49953b548d48fc48da3e10aa48ddf1
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
rlm_realm: No such realm "NULL"
++[suffix] returns noop
rlm_eap: EAP packet type response id 8 length 80
rlm_eap: Continuing tunnel setup.
++[eap] returns ok
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_peap: Received EAP-TLV response.
rlm_eap_peap: Had sent TLV failure. User was rejected earlier in this session.
rlm_eap: Handler failed in EAP/peap
rlm_eap: Failed in EAP select
++[eap] returns invalid
auth: Failed to validate the user.
Login incorrect: [anonymous/<via Auth-Type = EAP>] (from client localhost port 0 cli 02-00-00-00-00-01)
Found Post-Auth-Type Reject
+- entering group REJECT
expand: %{User-Name} -> anonymous
attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 8 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 8
EAP-Message = 0x04080004
Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.8 seconds.
Cleaning up request 0 ID 0 with timestamp +58
Cleaning up request 1 ID 1 with timestamp +58
Cleaning up request 2 ID 2 with timestamp +58
Cleaning up request 3 ID 3 with timestamp +58
Cleaning up request 4 ID 4 with timestamp +58
Cleaning up request 5 ID 5 with timestamp +58
Cleaning up request 6 ID 6 with timestamp +58
Cleaning up request 7 ID 7 with timestamp +58
Waking up in 1.0 seconds.
Cleaning up request 8 ID 8 with timestamp +58
Ready to process requests.
Ready to process requests.
Exiting...
Alan DeKok <aland at deployingradius.com> wrote: jreubens wrote:
> I am newbie trying to test free radius for my master thesis, i installed
> free radius two days ago and did some initial testing, the initial test was
> through so the radius server is running properly, before i move on i wanted
> to test the eap modules, so i tried to test with the help of eapol_test tool
> that comes with the wpasupplicant, i cannot succeed i get failure message.
...
> rlm_eap: NAK asked for unsupported type 25
The system does not have the proper OpenSSL libraries installed.
Install OpenSSL, and the development headers. Then re-build the
server, and PEAP will work.
Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
---------------------------------
Be a better friend, newshound, and know-it-all with Yahoo! Mobile. Try it now.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20080428/a5851f3a/attachment.html>
More information about the Freeradius-Users
mailing list