Segmentation fault when use Odyssey Client
Hangjun He
elmerhe at yahoo.com.cn
Tue May 20 10:44:41 CEST 2008
If I select EAP-TTLS + use only my certificate for auth will cause segmentation fault. Others seems OK.
Debug info:
rad_recv: Access-Request packet from host 192.168.200.57:32785, id=95, length=325
User-Name = "bbb"
NAS-IP-Address = 192.168.200.57
NAS-Identifier = "auth_test"
NAS-Port = 0
Called-Station-Id = "00-19-77-02-E6-90:auth-wpa2-tkip-8021x"
Calling-Station-Id = "00-1D-7E-03-2B-CF"
Framed-MTU = 1500
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x0215009015800000008616030100461000004200400d423029041904e4b654b0384c78b56d7490853af607b909c2f54fc376bebac512ebfb7663e9ee2fc7320d175037da31f09e90ad986d539d519d6ef6c39f577914030100010116030100302027f914730434165f520dc31734211631a5c96402b0ddabaf4d815209d07bb6c0f2817ed3a2233822587288715beab6
State = 0x4f6739def5f0e9f45fd60479253cc3cd
Message-Authenticator = 0xe06aac6aeeefc91f7920fd60b05ea9ab
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 9
modcall[authorize]: module "preprocess" returns ok for request 9
modcall[authorize]: module "chap" returns noop for request 9
modcall[authorize]: module "mschap" returns noop for request 9
rlm_realm: No '@' in User-Name = "bbb", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 9
rlm_eap: EAP packet type response id 21 length 144
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 9
rlm_ldap: - authorize
rlm_ldap: performing user authorization for bbb
radius_xlat: '(uid=bbb)'
radius_xlat: 'ou=radius,dc=bestgo,dc=aero'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in ou=radius,dc=bestgo,dc=aero, with filter (uid=bbb)
rlm_ldap: checking if remote access for bbb is allowed by uid
rlm_ldap: No default NMAS login sequence
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding userPassword as User-Password == "1234"
rlm_ldap: looking for reply items in directory...
rlm_ldap: Adding radiusTunnelPrivateGroupId as Tunnel-Private-Group-Id:0 = "1"
rlm_ldap: Adding radiusTunnelMediumType as Tunnel-Medium-Type:0 = IPv4
rlm_ldap: Adding radiusTunnelType as Tunnel-Type:0 = GRE
rlm_ldap: user bbb authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
modcall[authorize]: module "ldap" returns ok for request 9
rlm_pap: Found existing Auth-Type, not changing it.
modcall[authorize]: module "pap" returns noop for request 9
modcall: leaving group authorize (returns updated) for request 9
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 9
rlm_eap: Request found, released from the list
rlm_eap: EAP/ttls
rlm_eap: processing type ttls
rlm_eap_ttls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Length Included
eaptls_verify returned 11
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0046], ClientKeyExchange
TLS_accept: SSLv3 read client key exchange A
rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 read finished A
rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
TLS_accept: SSLv3 write change cipher spec A
rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
TLS_accept: SSLv3 write finished A
TLS_accept: SSLv3 flush data
(other): SSL negotiation finished successfully
SSL Connection Established
eaptls_process returned 13
modcall[authenticate]: module "eap" returns handled for request 9
modcall: leaving group authenticate (returns handled) for request 9
Sending Access-Challenge of id 95 to 192.168.200.57 port 32785
Tunnel-Private-Group-Id:0 = "1"
Tunnel-Medium-Type:0 = IPv4
Tunnel-Type:0 = GRE
EAP-Message = 0x0116004515800000003b1403010001011603010030b081e94e6f9087f3c237216ab3fd9d65fc8311b18e37e66208369fb451d373695f16b167d85e80c870295da3d2f21cf4
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x10aabdcc7ef9ba295475b0706b6e070c
Finished request 9
Going to the next request
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.200.57:32785, id=96, length=187
User-Name = "bbb"
NAS-IP-Address = 192.168.200.57
NAS-Identifier = "auth_test"
NAS-Port = 0
Called-Station-Id = "00-19-77-02-E6-90:auth-wpa2-tkip-8021x"
Calling-Station-Id = "00-1D-7E-03-2B-CF"
Framed-MTU = 1500
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 11Mbps 802.11b"
EAP-Message = 0x021600061500
State = 0x10aabdcc7ef9ba295475b0706b6e070c
Message-Authenticator = 0xa07cb0441d0e9d898030c912f9ae54d3
Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 10
modcall[authorize]: module "preprocess" returns ok for request 10
modcall[authorize]: module "chap" returns noop for request 10
modcall[authorize]: module "mschap" returns noop for request 10
rlm_realm: No '@' in User-Name = "bbb", looking up realm NULL
rlm_realm: No such realm "NULL"
modcall[authorize]: module "suffix" returns noop for request 10
rlm_eap: EAP packet type response id 22 length 6
rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
modcall[authorize]: module "eap" returns updated for request 10
rlm_ldap: - authorize
rlm_ldap: performing user authorization for bbb
radius_xlat: '(uid=bbb)'
radius_xlat: 'ou=radius,dc=bestgo,dc=aero'
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in ou=radius,dc=bestgo,dc=aero, with filter (uid=bbb)
rlm_ldap: checking if remote access for bbb is allowed by uid
rlm_ldap: No default NMAS login sequence
rlm_ldap: looking for check items in directory...
rlm_ldap: Adding userPassword as User-Password == "1234"
rlm_ldap: looking for reply items in directory...
rlm_ldap: Adding radiusTunnelPrivateGroupId as Tunnel-Private-Group-Id:0 = "1"
rlm_ldap: Adding radiusTunnelMediumType as Tunnel-Medium-Type:0 = IPv4
rlm_ldap: Adding radiusTunnelType as Tunnel-Type:0 = GRE
rlm_ldap: user bbb authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
modcall[authorize]: module "ldap" returns ok for request 10
rlm_pap: Found existing Auth-Type, not changing it.
modcall[authorize]: module "pap" returns noop for request 10
modcall: leaving group authorize (returns updated) for request 10
rad_check_password: Found Auth-Type EAP
auth: type "EAP"
Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 10
rlm_eap: Request found, released from the list
rlm_eap: EAP/ttls
rlm_eap: processing type ttls
rlm_eap_ttls: Authenticate
rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
rlm_eap_tls: ack handshake is finished
eaptls_verify returned 3
eaptls_process returned 3
Segmentation fault
John
---------------------------------
雅虎邮箱,您的终生邮箱!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20080520/e10b76e8/attachment.html>
More information about the Freeradius-Users
mailing list