a newbie testing freeradius need help

jennie susan jennie_susan at yahoo.com
Mon Apr 28 09:30:31 CEST 2008


Hi all,

I have succeed in configuring the server again with correct openssl libraries and development headers, the eapol_test is halfway successful, the tunnel was established, but i dont know why its didnt succeed after that, can you give me an hint please.

Thank you all for helping me out.

Br,
Jreubens

HERE IS MY RADIUSD OUTPUT

        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x0200000e01616e6f6e796d6f7573
        Message-Authenticator = 0x7a6034cf7717a391ed27b2009f6183e6
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
  rlm_eap: EAP packet type response id 0 length 14
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
rlm_pap: WARNING! No "known good" password found for the user.  Authentication may fail because of this.
++[pap] returns noop
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: EAP Identity
  rlm_eap: processing type md5
rlm_eap_md5: Issuing Challenge
++[eap] returns handled
        EAP-Message = 0x010100160410b08675566bb4374960f4ad3d016012d5
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd60df96dd60cfd7fbb716c33077b06cd
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
        User-Name = "anonymous"
        NAS-IP-Address = 127.0.0.1
        Calling-Station-Id = "02-00-00-00-00-01"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020100060319
        State = 0xd60df96dd60cfd7fbb716c33077b06cd
        Message-Authenticator = 0x9ceebff3658f100773d5a1128d1eef4b
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
  rlm_eap: EAP packet type response id 1 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
rlm_pap: WARNING! No "known good" password found for the user.  Authentication may fail because of this.
++[pap] returns noop
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP NAK
 rlm_eap: EAP-NAK asked for EAP-Type/peap
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
++[eap] returns handled
        EAP-Message = 0x010200061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd60df96dd70fe07fbb716c33077b06cd
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
        User-Name = "anonymous"
        NAS-IP-Address = 127.0.0.1
        Calling-Station-Id = "02-00-00-00-00-01"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x0202005e190016030100530100004f0301481576fea1a0e81ff55753b5a3d70b37d5fb619e00eda78395931584ff53904400002800390038003500160013000a00330032002f000700050004001500120009001400110008000600030100
        State = 0xd60df96dd70fe07fbb716c33077b06cd
        Message-Authenticator = 0x6e3b249941b1fb3f187b9e295b1aab5a
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
  rlm_eap: EAP packet type response id 2 length 94
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
    (other): before/accept initialization 
    TLS_accept: before/accept initialization 
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0053], ClientHello  
    TLS_accept: SSLv3 read client hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello  
    TLS_accept: SSLv3 write server hello A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 085e], Certificate  
    TLS_accept: SSLv3 write certificate A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange  
    TLS_accept: SSLv3 write key exchange A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
    TLS_accept: SSLv3 write server done A 
    TLS_accept: SSLv3 flush data 
    TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase 
In SSL Accept mode  
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
        EAP-Message = 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
        EAP-Message = 0x03131d4578616d706c6520436572746966696361746520417574686f72697479301e170d3038303432383036333831395a170d3039303432383036333831395a307c310b3009060355040613024652310f300d0603550408130652616469757331153013060355040a130c4578616d706c6520496e632e312330210603550403131a4578616d706c65205365727665722043657274696669636174653120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d30820122300d06092a864886f70d01010105000382010f003082010a0282010100b73f813e1c4513114fd57681f95a589ec71dd5233fec6d297528e304db12
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 0x6f0bc4e9c50fdfa906951ba1
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd60df96dd40ee07fbb716c33077b06cd
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
        User-Name = "anonymous"
        NAS-IP-Address = 127.0.0.1
        Calling-Station-Id = "02-00-00-00-00-01"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020300061900
        State = 0xd60df96dd40ee07fbb716c33077b06cd
        Message-Authenticator = 0x8cbd5dacf77784d94a31d5221b737d9f
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
  rlm_eap: EAP packet type response id 3 length 6
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1 
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 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
        EAP-Message = 0x1392a18199a48196308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f72697479820900d2e1c94d8db8983e300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100c1008469b9fc28bc657c258af579f60aeb738ba818035517718f49abcfa20e8aa84df50f56f1bf8bb7b4bf8aa1073647342c
        EAP-Message = 0x05bb4ff107d513af
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd60df96dd509e07fbb716c33077b06cd
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
        User-Name = "anonymous"
        NAS-IP-Address = 127.0.0.1
        Calling-Station-Id = "02-00-00-00-00-01"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020400061900
        State = 0xd60df96dd509e07fbb716c33077b06cd
        Message-Authenticator = 0x66db1b3ebb30646425959e855b852f33
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
  rlm_eap: EAP packet type response id 4 length 6
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1 
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
        EAP-Message = 0x010502e719003d546bfed8f35aacef395f9a61ef442a7372bb7df2328c16a9dffc1e24291fba4aa6c130a659283e18b202088b2c1d351918ced264a395283361c835aa69754efe70ab3a4e2198bdb9b2cc72a1649861c94f4358b26e6169374c06dddab84b54f746353ae2485085f39e93d5d1aa469f46b5dca9b2b4ed1365ac6a6f40deffca9ff774b47c3033ff7acecf106b4c99217988413d946a858ed3fc61ece78ca0eb09a6e5d586101dc4a4e31749fed4eaa24c1d8b85ab49ecbfce570656a319f733f0309dc98323160301020d0c0002090080b99e959ee2f52c1df2f11189b1c93b75c38311ddeddd851167d62779412cb845f39e3cd3b2b6
        EAP-Message = 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
        EAP-Message = 0x584f2e693e8db16a2e821ea87e12f2bbda45bda0cde2bb00fec3d22b4154202d018484c0745a20b1a58453f3a6144af2d6983f406e4841627daca4017fbafaedeb27bbc69ec3bd8831b0fa60106fa754fca1af63e3208ba1c3642cc6000efcb062730633c164d421c50eeafd78b73273ff2433362473d5d676b25e651f30daf7967ccd80c2a45efd2f7b2929ce4a9ff371d4f72d671958f60db52f7b0ff564848510141ddd6af08fac70e7e3cc7c803d7373645255e30a091e8bcb2db0bffeb8775cc81842afa24f20a5b178cc52f4957ef5eb32c7852aa0b077f4a81da001e1377a816716030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd60df96dd208e07fbb716c33077b06cd
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
        User-Name = "anonymous"
        NAS-IP-Address = 127.0.0.1
        Calling-Station-Id = "02-00-00-00-00-01"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020500cc1900160301008610000082008088a0c83ed9fff3d6c1cd3387dc6fcaccd44290777eb6eedd45e55c77171a709d8b22224f12e88b763daf1d5a5759ded7e3213da767a2ddb251105985b1594cacf74e80d5b638d765ee5d6b04323d0e4674e9c7d2c0a768ba70597484d81747e369be44cfe95e3d0d8145d1331b813c2629ea68cc6ad66d2c0124f46c6a72aea61403010001011603010030d00fd85fa77486333f9d28409d029b72081bdc7ab031d26b82a5eaf4f79307f6c7e6f52f9acae6f54e2c74338731ec9e
        State = 0xd60df96dd208e07fbb716c33077b06cd
        Message-Authenticator = 0x3d3b5ab6c6eff675275c9be53d1962bb
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
  rlm_eap: EAP packet type response id 5 length 204
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
    TLS_accept: SSLv3 read client key exchange A 
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]  
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished  
    TLS_accept: SSLv3 read finished A 
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]  
    TLS_accept: SSLv3 write change cipher spec A 
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished  
    TLS_accept: SSLv3 write finished A 
    TLS_accept: SSLv3 flush data 
    (other): SSL negotiation finished successfully 
SSL Connection Established 
  eaptls_process returned 13 
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
        EAP-Message = 0x010600411900140301000101160301003085527844557527b77fe0ec6a25eb0afcb093f067e3db28fead4a48eec10face50f0da001f236cf4950d82995f676b544
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd60df96dd30be07fbb716c33077b06cd
Finished request 5.
Going to the next request
Waking up in 4.9 seconds.
        User-Name = "anonymous"
        NAS-IP-Address = 127.0.0.1
        Calling-Station-Id = "02-00-00-00-00-01"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x020600061900
        State = 0xd60df96dd30be07fbb716c33077b06cd
        Message-Authenticator = 0x07f8b9d3f401d0c77b4f4915d71e0cc5
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
  rlm_eap: EAP packet type response id 6 length 6
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3 
  eaptls_process returned 3 
  rlm_eap_peap: EAPTLS_SUCCESS
++[eap] returns handled
        EAP-Message = 0x0107002b190017030100202b0249c2f447cef8bda6f3224fa8fe081f2c3f7023634612e1ebb286a0d24f66
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd60df96dd00ae07fbb716c33077b06cd
Finished request 6.
Going to the next request
Waking up in 4.9 seconds.
        User-Name = "anonymous"
        NAS-IP-Address = 127.0.0.1
        Calling-Station-Id = "02-00-00-00-00-01"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x0207005019001703010020a3c24219d2d7538038cf9b5b6d7074617a8a27b72a997ffb9222bbc99a926acf1703010020e42a4ec295bb3220f5cf014ba10eaccb4d66d36049fcf540c2edcfee58b254fe
        State = 0xd60df96dd00ae07fbb716c33077b06cd
        Message-Authenticator = 0x193fe8df30309c4c39fdf59c84b0ed77
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
  rlm_eap: EAP packet type response id 7 length 80
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - testuser
  PEAP: Got tunneled identity of testuser
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to testuser
auth: No authenticate method (Auth-Type) configuration found for the request: Rejecting the user
auth: Failed to validate the user.
Login incorrect: [testuser/<no User-Password attribute>] (from client localhost port 0)
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
++[eap] returns handled
        EAP-Message = 0x0108002b19001703010020780d7d621e66a7b28ed554db2b02d0f6148e695d4e72e2cb21e5d2d9f1861fa1
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xd60df96dd105e07fbb716c33077b06cd
Finished request 7.
Going to the next request
Waking up in 4.8 seconds.
        User-Name = "anonymous"
        NAS-IP-Address = 127.0.0.1
        Calling-Station-Id = "02-00-00-00-00-01"
        Framed-MTU = 1400
        NAS-Port-Type = Wireless-802.11
        Connect-Info = "CONNECT 11Mbps 802.11b"
        EAP-Message = 0x02080050190017030100208e89b5ad71f59acce21781ba90062f7b2eae1d2dde31e725035fa48bba1a087b170301002009b75048e477fab4d8cba9d8da02baa314106bce519ebcbb1c196f22e964ca83
        State = 0xd60df96dd105e07fbb716c33077b06cd
        Message-Authenticator = 0xbd49953b548d48fc48da3e10aa48ddf1
+- entering group authorize
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "anonymous", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
  rlm_eap: EAP packet type response id 8 length 80
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7 
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7 
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap:  Had sent TLV failure.  User was rejected earlier in this session.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
++[eap] returns invalid
auth: Failed to validate the user.
Login incorrect: [anonymous/<via Auth-Type = EAP>] (from client localhost port 0 cli 02-00-00-00-00-01)
  Found Post-Auth-Type Reject
+- entering group REJECT
        expand: %{User-Name} -> anonymous
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 8 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 8
        EAP-Message = 0x04080004
        Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.8 seconds.
Cleaning up request 0 ID 0 with timestamp +58
Cleaning up request 1 ID 1 with timestamp +58
Cleaning up request 2 ID 2 with timestamp +58
Cleaning up request 3 ID 3 with timestamp +58
Cleaning up request 4 ID 4 with timestamp +58
Cleaning up request 5 ID 5 with timestamp +58
Cleaning up request 6 ID 6 with timestamp +58
Cleaning up request 7 ID 7 with timestamp +58
Waking up in 1.0 seconds.
Cleaning up request 8 ID 8 with timestamp +58
Ready to process requests.
Ready to process requests.
Exiting...


Alan DeKok <aland at deployingradius.com> wrote: jreubens wrote:
> I am newbie trying to test free radius for my master thesis, i installed
> free radius two days ago and did some initial testing, the initial test was
> through so the radius server is running properly, before i move on i wanted
> to test the eap modules, so i tried to test with the help of eapol_test tool
> that comes with the wpasupplicant, i cannot succeed i get failure message.
...
>  rlm_eap: NAK asked for unsupported type 25

  The system does not have the proper OpenSSL libraries installed.

  Install OpenSSL, and the development headers.  Then re-build the
server, and PEAP will work.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html


       
---------------------------------
Be a better friend, newshound, and know-it-all with Yahoo! Mobile.  Try it now.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20080428/a5851f3a/attachment.html>


More information about the Freeradius-Users mailing list