Calling-Station-Id problem
Rob
robwro at gmail.com
Mon Mar 3 18:49:41 CET 2008
While I am using Calling-Station-Id freeradius does not authenicate
user. Without calling-station-id (user Rob) works Ok. Can anybody
point me where is the problem?
Checkval exists in radiusd.conf.
Freeradius 1.1.7
user file:
"Alan" User-Password == "12345", Calling-Station-Id == "000d88b7c2de"
"Rob" User-Password == "123456"
DEFAULT Auth-Type = EAP,EAP-Type == PEAP, Proxy-To-Realm = LOCAL
Log from radius -X:
Starting - reading configuration files ...
reread_config: reading radiusd.conf
Config: including file: /etc/raddb/clients.conf
Config: including file: /etc/raddb/eap.conf
Config: including file: /etc/raddb/sql.conf
main: prefix = "/usr"
main: localstatedir = "/var"
main: logdir = "/var/log/freeradius"
main: libdir = "/usr/lib/freeradius"
main: radacctdir = "/var/log/freeradius/radacct"
main: hostname_lookups = no
main: max_request_time = 130
main: cleanup_delay = 10
main: max_requests = 1024
main: delete_blocked_requests = 0
main: port = 0
main: allow_core_dumps = no
main: log_stripped_names = yes
main: log_file = "/var/log/freeradius/radius.log"
main: log_auth = yes
main: log_auth_badpass = yes
main: log_auth_goodpass = yes
main: pidfile = "/var/run/freeradius/radiusd.pid"
main: user = "radius"
main: group = "radius"
main: usercollide = no
main: lower_user = "no"
main: lower_pass = "no"
main: nospace_user = "no"
main: nospace_pass = "no"
main: checkrad = "/usr/sbin/checkrad"
main: proxy_requests = no
security: max_attributes = 200
security: reject_delay = 1
security: status_server = no
main: debug_level = 0
read_config_files: reading dictionary
read_config_files: reading naslist
Using deprecated naslist file. Support for this will go away soon.
read_config_files: reading clients
read_config_files: reading realms
radiusd: entering modules setup
Module: Library search path is /usr/lib/freeradius
Module: Loaded exec
exec: wait = yes
exec: program = "(null)"
exec: input_pairs = "request"
exec: output_pairs = "(null)"
exec: packet_type = "(null)"
rlm_exec: Wait=yes but no output defined. Did you mean output=none?
Module: Instantiated exec (exec)
Module: Loaded expr
Module: Instantiated expr (expr)
Module: Loaded MS-CHAP
mschap: use_mppe = yes
mschap: require_encryption = yes
mschap: require_strong = yes
mschap: with_ntdomain_hack = no
mschap: passwd = "(null)"
mschap: ntlm_auth = "(null)"
Module: Instantiated mschap (mschap)
Module: Loaded System
unix: cache = no
unix: passwd = "(null)"
unix: shadow = "(null)"
unix: group = "(null)"
unix: radwtmp = "/var/log/freeradius/radwtmp"
unix: usegroup = no
unix: cache_reload = 600
Module: Instantiated unix (unix)
Module: Loaded eap
eap: default_eap_type = "peap"
eap: timer_expire = 60
eap: ignore_unknown_eap_types = no
eap: cisco_accounting_username_bug = no
rlm_eap: Loaded and initialized type md5
gtc: challenge = "Password: "
gtc: auth_type = "PAP"
rlm_eap: Loaded and initialized type gtc
tls: rsa_key_exchange = no
tls: dh_key_exchange = yes
tls: rsa_key_length = 512
tls: dh_key_length = 512
tls: verify_depth = 0
tls: CA_path = "(null)"
tls: pem_file_type = yes
tls: private_key_file = "/etc/raddb/certs/cert-srv.pem"
tls: certificate_file = "/etc/raddb/certs/cert-srv.pem"
tls: CA_file = "/etc/raddb/certs/demoCA/cacert.pem"
tls: private_key_password = "whatever"
tls: dh_file = "/etc/raddb/certs/dh"
tls: random_file = "/dev/urandom"
tls: fragment_size = 1024
tls: include_length = yes
tls: check_crl = no
tls: check_cert_cn = "(null)"
tls: cipher_list = "(null)"
tls: check_cert_issuer = "(null)"
rlm_eap_tls: Loading the certificate file as a chain
rlm_eap: Loaded and initialized type tls
peap: default_eap_type = "mschapv2"
peap: copy_request_to_tunnel = no
peap: use_tunneled_reply = no
peap: proxy_tunneled_request_as_eap = yes
rlm_eap: Loaded and initialized type peap
mschapv2: with_ntdomain_hack = no
rlm_eap: Loaded and initialized type mschapv2
Module: Instantiated eap (eap)
Module: Loaded preprocess
preprocess: huntgroups = "/etc/raddb/huntgroups"
preprocess: hints = "/etc/raddb/hints"
preprocess: with_ascend_hack = no
preprocess: ascend_channels_per_line = 23
preprocess: with_ntdomain_hack = no
preprocess: with_specialix_jetstream_hack = no
preprocess: with_cisco_vsa_hack = no
preprocess: with_alvarion_vsa_hack = no
Module: Instantiated preprocess (preprocess)
Module: Loaded realm
realm: format = "suffix"
realm: delimiter = "@"
realm: ignore_default = no
realm: ignore_null = no
Module: Instantiated realm (suffix)
Module: Loaded files
files: usersfile = "/etc/raddb/users"
files: acctusersfile = "/etc/raddb/acct_users"
files: preproxy_usersfile = "/etc/raddb/preproxy_users"
files: compat = "no"
Module: Instantiated files (files)
Module: Loaded Acct-Unique-Session-Id
acct_unique: key = "User-Name, Acct-Session-Id, NAS-IP-Address,
Client-IP-Address, NAS-Port"
Module: Instantiated acct_unique (acct_unique)
Module: Loaded detail
detail: detailfile =
"/var/log/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
detail: detailperm = 384
detail: dirperm = 493
detail: locking = no
Module: Instantiated detail (detail)
Module: Loaded radutmp
radutmp: filename = "/var/log/freeradius/radutmp"
radutmp: username = "%{User-Name}"
radutmp: case_sensitive = yes
radutmp: check_with_nas = yes
radutmp: perm = 384
radutmp: callerid = yes
Module: Instantiated radutmp (radutmp)
Listening on authentication *:1812
Listening on accounting *:1813
Ready to process requests.
rad_recv: Access-Request packet from host 172.31.24.5:3072, id=251, length=165
User-Name = "Alan"
NAS-IP-Address = 172.31.24.5
NAS-Port = 0
Called-Station-Id = "004f620bb571"
Calling-Station-Id = "000d88b7c2de"
NAS-Identifier = "Realtek Access Point. 8181"
Framed-MTU = 1400
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x0200000901416c616e
Message-Authenticator = 0x36f26f3a7c8b798487109763eb96cd27
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
modcall[authorize]: module "preprocess" returns ok for request 0
modcall[authorize]: module "mschap" returns noop for request 0
rlm_realm: No '@' in User-Name = "Alan", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 0
rlm_eap: EAP packet type response id 0 length 9
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 0
users: Matched entry Alan at line 1
modcall[authorize]: module "files" returns ok for request 0
modcall: leaving group authorize (returns updated) for request 0
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 0
rlm_eap: EAP Identity
rlm_eap: processing type tls
rlm_eap_tls: Initiate
rlm_eap_tls: Start returned 1
modcall[authenticate]: module "eap" returns handled for request 0
modcall: leaving group authenticate (returns handled) for request 0
Sending Access-Challenge of id 251 to 172.31.24.5 port 3072
EAP-Message = 0x010100061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x854dad26886ed00ab4b5e6f6d19f6522
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 11 seconds...
rad_recv: Access-Request packet from host 172.31.24.5:3072, id=252, length=248
User-Name = "Alan"
NAS-IP-Address = 172.31.24.5
NAS-Port = 0
Called-Station-Id = "004f620bb571"
Calling-Station-Id = "000d88b7c2de"
NAS-Identifier = "Realtek Access Point. 8181"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x0201005019800000004616030100410100003d030147cc3736db5e9f7b74ca06e03b0928e1538c857753c00714d5b6172b83a2f1c700001600040005000a000900640062000300060013001200630100
State = 0x854dad26886ed00ab4b5e6f6d19f6522
Message-Authenticator = 0xc0a2e10327eb7fd02dce5466a383720f
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 1
modcall[authorize]: module "preprocess" returns ok for request 1
modcall[authorize]: module "mschap" returns noop for request 1
rlm_realm: No '@' in User-Name = "Alan", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 1
rlm_eap: EAP packet type response id 1 length 80
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 1
users: Matched entry Alan at line 1
modcall[authorize]: module "files" returns ok for request 1
modcall: leaving group authorize (returns updated) for request 1
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 1
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
(other): before/accept initialization
TLS_accept: before/accept initialization
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
TLS_accept: SSLv3 read client hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
TLS_accept: SSLv3 write server hello A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 068c], Certificate
TLS_accept: SSLv3 write certificate A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
TLS_accept: SSLv3 write server done A
TLS_accept: SSLv3 flush data
TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 1
modcall: leaving group authenticate (returns handled) for request 1
Sending Access-Challenge of id 252 to 172.31.24.5 port 3072
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xfdf337efd1037903b93cbe136a0ec7cb824e8c1f24bf4a42730fe0a102999d005dbd9290d73e34408f73538f14f1637c0d0a94fa0003bc308203b830820321a003020102020900fe302b7473e56e25300d06092a864886f70d010104050030819a310b30090603550406130243413111300f0603550408130850726f76696e63653112301006035504071309536f6d65204369747931153013060355040a130c4f7267616e697a6174696f6e310d300b060355040b1304776f6c66311b301906035504031312436c69656e742063657274696669636174653121301f06092a864886f70d0109011612636c69656e74406578616d706c652e636f6d301e
EAP-Message = 0x170d3038303231333137343931375a170d3130303231
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x225dc9b0f53c788ee6abf494669e4a97
Finished request 1
Going to the next request
Waking up in 11 seconds...
rad_recv: Access-Request packet from host 172.31.24.5:3072, id=253, length=174
User-Name = "Alan"
NAS-IP-Address = 172.31.24.5
NAS-Port = 0
Called-Station-Id = "004f620bb571"
Calling-Station-Id = "000d88b7c2de"
NAS-Identifier = "Realtek Access Point. 8181"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020200061900
State = 0x225dc9b0f53c788ee6abf494669e4a97
Message-Authenticator = 0xfddbf430d42c394438bf81081d3258d4
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
modcall[authorize]: module "preprocess" returns ok for request 2
modcall[authorize]: module "mschap" returns noop for request 2
rlm_realm: No '@' in User-Name = "Alan", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 2
rlm_eap: EAP packet type response id 2 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 2
users: Matched entry Alan at line 1
modcall[authorize]: module "files" returns ok for request 2
modcall: leaving group authorize (returns updated) for request 2
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake fragment handler
eaptls_verify returned 1
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 2
modcall: leaving group authenticate (returns handled) for request 2
Sending Access-Challenge of id 253 to 172.31.24.5 port 3072
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x311b301906035504031312436c69656e742063657274696669636174653121301f06092a864886f70d0109011612636c69656e74406578616d706c652e636f6d820900fe302b7473e56e25300c0603551d13040530030101ff300d06092a864886f70d0101040500038181003acdd2bd80994ed5ed556511893b756096f2e04a68bd76d3c808b863eefcdb336643503a98e703f236847ba53ef7d0fb3acb336d0ececfbe4db288b1e5dd761be647f6c41758a25d29893da193cf283927412d1f43a14732538fb6561f75053b8f614e405915f7e3a644a668fb0678b943a70267918a66253ac66ef2eb91946e16030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x138e1ae94954e4ecf35ede84440ca72a
Finished request 2
Going to the next request
Waking up in 11 seconds...
rad_recv: Access-Request packet from host 172.31.24.5:3072, id=254, length=360
User-Name = "Alan"
NAS-IP-Address = 172.31.24.5
NAS-Port = 0
Called-Station-Id = "004f620bb571"
Calling-Station-Id = "000d88b7c2de"
NAS-Identifier = "Realtek Access Point. 8181"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020300c01980000000b61603010086100000820080d24cb08b0f54f55d667b22fa12fd17d8734c9f72f3bc1bc6194e7f06aa6049cce9a80537ba8e7a04c4b747f76d73369088d075e849121ae9671089615253f14b57fd288c87a3005b06f6892d2d5298c99805904b22a2a4d70e5b0a1043934edee17fb0fa87428da856994528c894bd334efc954a6ded4c2225dec522a919ac901403010001011603010020910db96549a895936f5a838ac163a5477eda49b8db627bf8f950e186af38b879
State = 0x138e1ae94954e4ecf35ede84440ca72a
Message-Authenticator = 0x09248c2d678d08f21c7e6f1c709919b0
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 3
modcall[authorize]: module "preprocess" returns ok for request 3
modcall[authorize]: module "mschap" returns noop for request 3
rlm_realm: No '@' in User-Name = "Alan", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 3
rlm_eap: EAP packet type response id 3 length 192
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 3
users: Matched entry Alan at line 1
modcall[authorize]: module "files" returns ok for request 3
modcall: leaving group authorize (returns updated) for request 3
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 3
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
TLS_accept: SSLv3 read client key exchange A
rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 read finished A
rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
TLS_accept: SSLv3 write change cipher spec A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 write finished A
TLS_accept: SSLv3 flush data
(other): SSL negotiation finished successfully
SSL Connection Established
eaptls_process returned 13
rlm_eap_peap: EAPTLS_HANDLED
modcall[authenticate]: module "eap" returns handled for request 3
modcall: leaving group authenticate (returns handled) for request 3
Sending Access-Challenge of id 254 to 172.31.24.5 port 3072
EAP-Message = 0x010400311900140301000101160301002091832d731f9b611bad4849aa4b434dbe7a007f1b27c22eabfd50186def05aa59
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xb28e18e11971bea114c5f33d9553be94
Finished request 3
Going to the next request
Waking up in 11 seconds...
rad_recv: Access-Request packet from host 172.31.24.5:3072, id=255, length=174
User-Name = "Alan"
NAS-IP-Address = 172.31.24.5
NAS-Port = 0
Called-Station-Id = "004f620bb571"
Calling-Station-Id = "000d88b7c2de"
NAS-Identifier = "Realtek Access Point. 8181"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020400061900
State = 0xb28e18e11971bea114c5f33d9553be94
Message-Authenticator = 0x25028b760b874b24fa5b230f2845c1e9
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 4
modcall[authorize]: module "preprocess" returns ok for request 4
modcall[authorize]: module "mschap" returns noop for request 4
rlm_realm: No '@' in User-Name = "Alan", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 4
rlm_eap: EAP packet type response id 4 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 4
users: Matched entry Alan at line 1
modcall[authorize]: module "files" returns ok for request 4
modcall: leaving group authorize (returns updated) for request 4
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 4
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake is finished
eaptls_verify returned 3
eaptls_process returned 3
rlm_eap_peap: EAPTLS_SUCCESS
modcall[authenticate]: module "eap" returns handled for request 4
modcall: leaving group authenticate (returns handled) for request 4
Sending Access-Challenge of id 255 to 172.31.24.5 port 3072
EAP-Message = 0x010500201900170301001503c7d257d00c2a8b66e61da33ac90e9f46e64008eb
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x63a9a011cb440f1764c400829d620784
Finished request 4
Going to the next request
Waking up in 11 seconds...
rad_recv: Access-Request packet from host 172.31.24.5:3072, id=0, length=200
User-Name = "Alan"
NAS-IP-Address = 172.31.24.5
NAS-Port = 0
Called-Station-Id = "004f620bb571"
Calling-Station-Id = "000d88b7c2de"
NAS-Identifier = "Realtek Access Point. 8181"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x02050020190017030100158062f4e6f0f82657148b728a47b27a1668346620a6
State = 0x63a9a011cb440f1764c400829d620784
Message-Authenticator = 0x667309eff9ae4429e7cb839d004862d2
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
modcall[authorize]: module "preprocess" returns ok for request 5
modcall[authorize]: module "mschap" returns noop for request 5
rlm_realm: No '@' in User-Name = "Alan", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 5
rlm_eap: EAP packet type response id 5 length 32
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 5
users: Matched entry Alan at line 1
modcall[authorize]: module "files" returns ok for request 5
modcall: leaving group authorize (returns updated) for request 5
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_peap: Identity - Alan
rlm_eap_peap: Tunneled data is valid.
PEAP: Got tunneled identity of Alan
PEAP: Setting default EAP type for tunneled EAP session.
PEAP: Setting User-Name to Alan
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
modcall[authorize]: module "preprocess" returns ok for request 5
modcall[authorize]: module "mschap" returns noop for request 5
rlm_realm: No '@' in User-Name = "Alan", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 5
rlm_eap: EAP packet type response id 5 length 9
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 5
modcall[authorize]: module "files" returns notfound for request 5
modcall: leaving group authorize (returns updated) for request 5
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
rlm_eap: EAP Identity
rlm_eap: processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
PEAP: Got tunneled Access-Challenge
modcall[authenticate]: module "eap" returns handled for request 5
modcall: leaving group authenticate (returns handled) for request 5
Sending Access-Challenge of id 0 to 172.31.24.5 port 3072
EAP-Message = 0x010600351900170301002abf681cc96b5bfd18d9bd68643881c983e41fe0edd6db70cfda44a15d69331e6dc098430e91f0507a2fef
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x5c95c2cb158dbcc00d17949a40db79e4
Finished request 5
Going to the next request
--- Walking the entire request list ---
Waking up in 10 seconds...
rad_recv: Access-Request packet from host 172.31.24.5:3072, id=1, length=254
User-Name = "Alan"
NAS-IP-Address = 172.31.24.5
NAS-Port = 0
Called-Station-Id = "004f620bb571"
Calling-Station-Id = "000d88b7c2de"
NAS-Identifier = "Realtek Access Point. 8181"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020600561900170301004b280de7cbc04e2a2d0b5780a2d1191499d9c94090d976c0b7838820b67e679a5c9cfc45fdf68f26c79f6e0708ef896ad40f4d24e6054373546f84e2bdf063d2c882493b635280d29843d891
State = 0x5c95c2cb158dbcc00d17949a40db79e4
Message-Authenticator = 0x527e8d41e5049a9fd0cfd322f8f751e6
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
modcall[authorize]: module "preprocess" returns ok for request 6
modcall[authorize]: module "mschap" returns noop for request 6
rlm_realm: No '@' in User-Name = "Alan", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 6
rlm_eap: EAP packet type response id 6 length 86
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 6
users: Matched entry Alan at line 1
modcall[authorize]: module "files" returns ok for request 6
modcall: leaving group authorize (returns updated) for request 6
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_peap: EAP type mschapv2
rlm_eap_peap: Tunneled data is valid.
PEAP: Setting User-Name to Alan
PEAP: Adding old state with 30 1d
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 6
modcall[authorize]: module "preprocess" returns ok for request 6
modcall[authorize]: module "mschap" returns noop for request 6
rlm_realm: No '@' in User-Name = "Alan", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 6
rlm_eap: EAP packet type response id 6 length 63
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 6
modcall[authorize]: module "files" returns notfound for request 6
modcall: leaving group authorize (returns updated) for request 6
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 6
rlm_eap: Request found, released from the list
rlm_eap: EAP/mschapv2
rlm_eap: processing type mschapv2
Processing the authenticate section of radiusd.conf
modcall: entering group MS-CHAP for request 6
rlm_mschap: No User-Password configured. Cannot create LM-Password.
rlm_mschap: No User-Password configured. Cannot create NT-Password.
rlm_mschap: Told to do MS-CHAPv2 for Alan with NT-Password
rlm_mschap: FAILED: No NT/LM-Password. Cannot perform authentication.
rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
modcall[authenticate]: module "mschap" returns reject for request 6
modcall: leaving group MS-CHAP (returns reject) for request 6
rlm_eap: Freeing handler
modcall[authenticate]: module "eap" returns reject for request 6
modcall: leaving group authenticate (returns reject) for request 6
auth: Failed to validate the user.
Login incorrect: [Alan/<no User-Password attribute>] (from client
localhost port 0)
PEAP: Tunneled authentication was rejected.
rlm_eap_peap: FAILURE
modcall[authenticate]: module "eap" returns handled for request 6
modcall: leaving group authenticate (returns handled) for request 6
Sending Access-Challenge of id 1 to 172.31.24.5 port 3072
EAP-Message = 0x010700261900170301001bfa287419faaafdfc0c9559ffeac779d87e28498f8290d2471d1cb8
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x0756170755ef1f11e470046fdd2ddb21
Finished request 6
Going to the next request
Waking up in 10 seconds...
rad_recv: Access-Request packet from host 172.31.24.5:3072, id=2, length=206
User-Name = "Alan"
NAS-IP-Address = 172.31.24.5
NAS-Port = 0
Called-Station-Id = "004f620bb571"
Calling-Station-Id = "000d88b7c2de"
NAS-Identifier = "Realtek Access Point. 8181"
NAS-Port-Type = Wireless-802.11
Service-Type = Framed-User
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x020700261900170301001b93d5724aed8c5542d7a5fa3ea9f781fb2aabf96b257048b2a6167e
State = 0x0756170755ef1f11e470046fdd2ddb21
Message-Authenticator = 0x1fd54e8a78f50995009d1cb56386a5af
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 7
modcall[authorize]: module "preprocess" returns ok for request 7
modcall[authorize]: module "mschap" returns noop for request 7
rlm_realm: No '@' in User-Name = "Alan", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 7
rlm_eap: EAP packet type response id 7 length 38
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 7
users: Matched entry Alan at line 1
modcall[authorize]: module "files" returns ok for request 7
modcall: leaving group authorize (returns updated) for request 7
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 7
rlm_eap: Request found, released from the list
rlm_eap: EAP/peap
rlm_eap: processing type peap
rlm_eap_peap: Authenticate
rlm_eap_tls: processing TLS
eaptls_verify returned 7
rlm_eap_tls: Done initial handshake
eaptls_process returned 7
rlm_eap_peap: EAPTLS_OK
rlm_eap_peap: Session established. Decoding tunneled attributes.
rlm_eap_peap: Received EAP-TLV response.
rlm_eap_peap: Tunneled data is valid.
rlm_eap_peap: Had sent TLV failure. User was rejcted rejected
earlier in this session.
rlm_eap: Handler failed in EAP/peap
rlm_eap: Failed in EAP select
modcall[authenticate]: module "eap" returns invalid for request 7
modcall: leaving group authenticate (returns invalid) for request 7
auth: Failed to validate the user.
Login incorrect: [Alan/<no User-Password attribute>] (from client
Wifi2 port 0 cli 000d88b7c2de)
Delaying request 7 for 1 seconds
Finished request 7
Going to the next request
Waking up in 10 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 2 to 172.31.24.5 port 3072
EAP-Message = 0x04070004
Message-Authenticator = 0x00000000000000000000000000000000
Cleaning up request 0 ID 251 with timestamp 47cc3735
Cleaning up request 1 ID 252 with timestamp 47cc3735
Cleaning up request 2 ID 253 with timestamp 47cc3735
Cleaning up request 3 ID 254 with timestamp 47cc3735
Cleaning up request 4 ID 255 with timestamp 47cc3735
Waking up in 1 seconds...
--- Walking the entire request list ---
Cleaning up request 5 ID 0 with timestamp 47cc3736
Cleaning up request 6 ID 1 with timestamp 47cc3736
Cleaning up request 7 ID 2 with timestamp 47cc3736
Nothing to do. Sleeping until we see a request.
More information about the Freeradius-Users
mailing list