Help me please!!
Edvin Seferovic
edvin.seferovic at kolp.at
Mon Feb 4 08:01:20 CET 2008
What do you want to do? What do you want to achieve? What authentication are
you planning to use ?
Regards,
E:S
From: freeradius-users-bounces+edvin.seferovic=kolp.at at lists.freeradius.org
[mailto:freeradius-users-bounces+edvin.seferovic=kolp.at at lists.freeradius.or
g] On Behalf Of aziz yucelen
Sent: Montag, 04. Februar 2008 07:35
To: freeradius-users at lists.freeradius.org
Subject: Help me please!!
Hi..Image removed by sender. Font Size
I am receiving this "Access-Challenge " message.I dont know what I
do.Please help me. Thanks...
----------------------------------------------------------------------------
--------------------------------
> rad_recv: Access-Request packet from host 10.1.254.38 port 49155, id=0,
> length=73
> Threads: total/active/spare threads = 5/0/5
> Thread 2 got semaphore
> Thread 2 handling request 0, (1 handled so far)
> NAS-IP-Address = 10.1.254.38
> NAS-Port-Type = Ethernet
> NAS-Port = 17
> User-Name = "test"
> EAP-Message = 0x020100090174657374
> Message-Authenticator = 0x40b01c65697a037c2aec79069d28d709
> +- entering group authorize
> ++[preprocess] returns ok
> ++[chap] returns noop
> ++[mschap] returns noop
> Waking up in 0.9 seconds.
> ++[unix] returns notfound
> rlm_realm: No '@' in User-Name = "test", looking up realm NULL
> rlm_realm: No such realm "NULL"
> ++[suffix] returns noop
> rlm_eap: EAP packet type response id 1 length 9
> rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
> ++[eap] returns updated
> users: Matched entry test at line 93
> expand: Hello, %{User-Name} -> Hello, test
> ++[files] returns ok
> ++[expiration] returns noop
> ++[logintime] returns noop
> rlm_pap: Found existing Auth-Type, not changing it.
> ++[pap] returns noop
> rad_check_password: Found Auth-Type EAP
> auth: type "EAP"
> +- entering group authenticate
> rlm_eap: EAP Identity
> rlm_eap: processing type tls
> rlm_eap_tls: Initiate
> rlm_eap_tls: Start returned 1
> ++[eap] returns handled
> Sending Access-Challenge of id 0 to 10.1.254.38 port 49155
> Reply-Message = "Hello, test"
> EAP-Message = 0x010200061920
> Message-Authenticator = 0x00000000000000000000000000000000
> State = 0xf779e639f77bff0d3d2c202f1c7a8b9c
> Finished request 0.
> Going to the next request
> Thread 2 waiting to be assigned a request
> rad_recv: Access-Request packet from host 10.1.254.38 port 49155, id=0,
> length=162
> Cleaning up request 0 ID 0 with timestamp +553
> Waking up in 0.9 seconds.
> Thread 3 got semaphore
> Thread 3 handling request 1, (1 handled so far)
> NAS-IP-Address = 10.1.254.38
> NAS-Port-Type = Ethernet
> NAS-Port = 17
> User-Name = "test"
> State = 0xf779e639f77bff0d3d2c202f1c7a8b9c
> EAP-Message =
>
0x0202005019800000004616030100410100003d030147ac558d77684de77a5d4e927a0c8abb
d79d3e8c289aa3006aa63ea402fae95c00001600040005000a00090064006200030006001300
1200630100
> Message-Authenticator = 0xb38e6c9574648ff3b9b43230ab24f470
> +- entering group authorize
> ++[preprocess] returns ok
> ++[chap] returns noop
> ++[mschap] returns noop
> ++[unix] returns notfound
> rlm_realm: No '@' in User-Name = "test", looking up realm NULL
> rlm_realm: No such realm "NULL"
> ++[suffix] returns noop
> rlm_eap: EAP packet type response id 2 length 80
> rlm_eap: Continuing tunnel setup.
> ++[eap] returns ok
> rad_check_password: Found Auth-Type EAP
> auth: type "EAP"
> +- entering group authenticate
> rlm_eap: Request found, released from the list
> rlm_eap: EAP/peap
> rlm_eap: processing type peap
> rlm_eap_peap: Authenticate
> rlm_eap_tls: processing TLS
> TLS Length 70
> rlm_eap_tls: Length Included
> eaptls_verify returned 11
> (other): before/accept initialization
> TLS_accept: before/accept initialization
> rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
> TLS_accept: SSLv3 read client hello A
> rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
> TLS_accept: SSLv3 write server hello A
> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0589], Certificate
> TLS_accept: SSLv3 write certificate A
> rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
> TLS_accept: SSLv3 write server done A
> TLS_accept: SSLv3 flush data
> TLS_accept: Need to read more data: SSLv3 read client certificate A
> In SSL Handshake Phase
> In SSL Accept mode
> eaptls_process returned 13
> rlm_eap_peap: EAPTLS_HANDLED
> ++[eap] returns handled
> Sending Access-Challenge of id 0 to 10.1.254.38 port 49155
> EAP-Message =
>
0x0103040019c0000005e6160301004a02000046030147a319d725ef54f7b8675834e9966206
0c8f0d046180fc473283e66e4672c67a205ba7f2ccb2f755a847a0e47c06522a98b521b9d02f
e5a07f13bc49b5cb49637800040016030105890b00058500058200029730820293308201fca0
03020102020101300d06092a864886f70d01010505003078310b300906035504061302545231
0d300b0603550408130454524e4331153013060355040a0c0c44c384c2b0434c452042494d31
0c300a060355040b130342494d3110300e0603550403130742494d484f53543123302106092a
864886f70d010901161463636f736b756e406469636c652e6564
> EAP-Message =
>
0x752e7472301e170d3038303230313132353931325a170d3039303133313132353931325a30
818d310b3009060355040613025452310d300b0603550408130454524e433113301106035504
07130a646979617262616b697231153013060355040a0c0c44c384c2b0434c452042494d310c
300a060355040b130342494d3110300e0603550403130742494d484f53543123302106092a86
4886f70d010901161463636f736b756e406469636c652e6564752e747230819f300d06092a86
4886f70d010101050003818d0030818902818100b45cb01aaa76827408cd147b1e395998e31c
e1fb2124f5f199f8bf9ba98c85b87dc6f425eafd260829153b36
> EAP-Message =
>
0x1ed91744ac08f259793c02c6033d4bcb7c443b5d01e179b81f19182a4f6fbe212616e54184
512b813d0f7fa7b71cd0a0b8f479a3841e079339f070594cc15799cb20cb370aa6ad5e1bb607
676186a80c40145e1b0203010001a317301530130603551d25040c300a06082b060105050703
01300d06092a864886f70d0101050500038181003e369a0269de8132e852e07c3e8d41ca9a8f
eabbddbec18ba7d87c8a93c8f711d84485d528c1e52db85d6d233eae7f08fc9d45579ba7dd8b
7eb0a9864dfd88eda4d5eead488dddb371af95a81d786abd18a1950fce63c9872c6c6e874983
090b85578bba6a2a4fc523b36e463b78cd5d9de64abbf462ef0a
> EAP-Message =
>
0x18c65cf0625345740002e5308202e13082024aa003020102020100300d06092a864886f70d
01010505003078310b3009060355040613025452310d300b0603550408130454524e43311530
13060355040a0c0c44c384c2b0434c452042494d310c300a060355040b130342494d3110300e
0603550403130742494d484f53543123302106092a864886f70d010901161463636f736b756e
406469636c652e6564752e7472301e170d3038303230313132343535315a170d313130313331
3132343535315a3078310b3009060355040613025452310d300b0603550408130454524e4331
153013060355040a0c0c44c384c2b0434c452042494d310c300a
> EAP-Message = 0x060355040b130342494d3110
> Message-Authenticator = 0x00000000000000000000000000000000
> State = 0xf779e639f67aff0d3d2c202f1c7a8b9c
> Finished request 1.
> Going to the next request
> Thread 3 waiting to be assigned a request
> rad_recv: Access-Request packet from host 10.1.254.38 port 49155, id=0,
> length=88
> Cleaning up request 1 ID 0 with timestamp +553
> Waking up in 0.9 seconds.
> Thread 5 got semaphore
> Thread 5 handling request 2, (1 handled so far)
> NAS-IP-Address = 10.1.254.38
> NAS-Port-Type = Ethernet
> NAS-Port = 17
> User-Name = "test"
> State = 0xf779e639f67aff0d3d2c202f1c7a8b9c
> EAP-Message = 0x020300061900
> Message-Authenticator = 0xf30dca65a4d02ac05f72f49a8c603c32
> +- entering group authorize
> ++[preprocess] returns ok
> ++[chap] returns noop
> ++[mschap] returns noop
> ++[unix] returns notfound
> rlm_realm: No '@' in User-Name = "test", looking up realm NULL
> rlm_realm: No such realm "NULL"
> ++[suffix] returns noop
> rlm_eap: EAP packet type response id 3 length 6
> rlm_eap: Continuing tunnel setup.
> ++[eap] returns ok
> rad_check_password: Found Auth-Type EAP
> auth: type "EAP"
> +- entering group authenticate
> rlm_eap: Request found, released from the list
> rlm_eap: EAP/peap
> rlm_eap: processing type peap
> rlm_eap_peap: Authenticate
> rlm_eap_tls: processing TLS
> rlm_eap_tls: Received EAP-TLS ACK message
> rlm_eap_tls: ack handshake fragment handler
> eaptls_verify returned 1
> eaptls_process returned 13
> rlm_eap_peap: EAPTLS_HANDLED
> ++[eap] returns handled
> Sending Access-Challenge of id 0 to 10.1.254.38 port 49155
> EAP-Message =
>
0x010401f61900300e0603550403130742494d484f53543123302106092a864886f70d010901
161463636f736b756e406469636c652e6564752e747230819f300d06092a864886f70d010101
050003818d0030818902818100c74f8084794bb5e24142b92ed730c80507ff7a16fbb013b222
787dd18b7d1f9d19d72ba7c41da18a32b32db41ae6de80c3113a615ff7016120b14dddbc5f2a
5b696e501ff9f317a000448de5c9e60ab6f6ce295538591c208504cc3f9ec6dc0703c92372b4
f98189b57c20a7a78edc18ef58627aa1e789fad4f7f7a8bccbd5910203010001a37b30793009
0603551d1304023000302c06096086480186f842010d041f161d
> EAP-Message =
>
0x4f70656e53534c2047656e657261746564204365727469666963617465301d0603551d0e04
160414a6a25d7143fd89ada9d0a8b9e6b09f25fe26c8b0301f0603551d23041830168014a6a2
5d7143fd89ada9d0a8b9e6b09f25fe26c8b0300d06092a864886f70d010105050003818100a5
3c167b89b48d0b030926b38a337e7ac9e65f3bd4f788f2e7d132859059ddd63ca436149dd929
ff168de011bf53e5b5a51189c44467589c4eabfef504c25507510a3749e2e8fa3189f5a57126
0458fbf2d4e58b3857a1726a0af4a21c5539472e24e96f7678256e32141babf86921d8c7f57a
5b92790a5782c7d232fadbd3bc16030100040e000000
> Message-Authenticator = 0x00000000000000000000000000000000
> State = 0xf779e639f57dff0d3d2c202f1c7a8b9c
> Finished request 2.
> Going to the next request
> Thread 5 waiting to be assigned a request
> rad_recv: Access-Request packet from host 10.1.254.38 port 49155, id=0,
> length=88
> Cleaning up request 2 ID 0 with timestamp +553
> Waking up in 0.9 seconds.
> Thread 4 got semaphore
> Thread 4 handling request 3, (1 handled so far)
> NAS-IP-Address = 10.1.254.38
> NAS-Port-Type = Ethernet
> NAS-Port = 17
> User-Name = "test"
> State = 0xf779e639f57dff0d3d2c202f1c7a8b9c
> EAP-Message = 0x020400061900
> Message-Authenticator = 0x7011b465e9976763874b73745ac1d791
> +- entering group authorize
> ++[preprocess] returns ok
> ++[chap] returns noop
> ++[mschap] returns noop
> ++[unix] returns notfound
> rlm_realm: No '@' in User-Name = "test", looking up realm NULL
> rlm_realm: No such realm "NULL"
> ++[suffix] returns noop
> rlm_eap: EAP packet type response id 4 length 6
> rlm_eap: Continuing tunnel setup.
> ++[eap] returns ok
> rad_check_password: Found Auth-Type EAP
> auth: type "EAP"
> +- entering group authenticate
> rlm_eap: Request found, released from the list
> rlm_eap: EAP/peap
> rlm_eap: processing type peap
> rlm_eap_peap: Authenticate
> rlm_eap_tls: processing TLS
> rlm_eap_tls: Received EAP-TLS ACK message
> rlm_eap_tls: ack handshake fragment handler
> eaptls_verify returned 1
> eaptls_process returned 13
> rlm_eap_peap: EAPTLS_HANDLED
> ++[eap] returns handled
> Sending Access-Challenge of id 0 to 10.1.254.38 port 49155
> EAP-Message = 0x010500061900
> Message-Authenticator = 0x00000000000000000000000000000000
> State = 0xf779e639f47cff0d3d2c202f1c7a8b9c
> Finished request 3.
> Going to the next request
> Thread 4 waiting to be assigned a request
> Waking up in 4.0 seconds.
_____
Need to know the score, the latest news, or you need your HotmailR-get your
"fix". Check it out. <http://www.msnmobilefix.com/Default.aspx>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20080204/7e0008c6/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.jpg
Type: image/jpeg
Size: 1250 bytes
Desc: not available
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20080204/7e0008c6/attachment.jpg>
More information about the Freeradius-Users
mailing list