Referencing a redundant-load-balance set within users file

Tod A. Sandman sandmant at rice.edu
Fri Nov 14 16:42:42 CET 2008


> Ivan Kalik wrote:
>> Why don't you map that in ldap.attrmap?

Thanks so much.  I removed all LDAP settings from users, and I have
TTLS-PAP working fine with redundant LDAP for authorization and
Kerberos for Authentication.

Now I can't get the only other mode we need: PEAP/MSChapv2.  LDAP
authorization is working fine, and the ntlm-auth authentication works
fine, but required attributes are not being sent back in the
Access-Accept packet.

Unlike when I connect via TTLS-PAP, the Access-Accept does not include
some required attributes.  The debug output shows them getting set
properly within sites-enabled/inner-tunnel and getting updated with
"update  outer.reply", but they get dropped before the Access-Accept
packet.

I haven't touched sites-enabled/default.

I enabled ldap in sites-enabled/inner-tunnel, and afterwards I do
an "update outer.reply", i.e.:,

    redundant-load-balance redundant_ldap {
            ldap1
            ldap2
            ldap3
    }

    update outer.reply {
      Cisco-AVPair := "%{reply:Connect-Info}"
      Class := "OU=%{reply:Connect-Info}"
    }

and the debug output shows this working.

But the Access-Accept does not include these attributes as it does
when I use TTLS-PAP.

I tried moving the "update outer.reply" to the post-auth section, but
this did not help.

My config is quite close to the default.  The only PEAP related change
I made was to update modules/mschap with the correct ntlm_auth line.

Thanks for any ideas.



Tod Sandman
Sr. Systems Administrator
Middleware Development & Integration
Rice University
-------------- next part --------------
Successfull connect, but Access-Accept missing attributes, and put me on staff
while I'm a grad student.

FreeRADIUS Version 2.1.1, for host i686-pc-linux-gnu, built on Oct 16 2008 at 13:34:21
Copyright (C) 1999-2008 The FreeRADIUS server project and contributors. 
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A 
PARTICULAR PURPOSE. 
You may redistribute copies of FreeRADIUS under the terms of the 
GNU General Public License v2. 
Starting - reading configuration files ...
including configuration file /etc/opt/freeradius/radiusd.conf
including configuration file /etc/opt/freeradius/proxy.conf
including configuration file /etc/opt/freeradius/clients.conf
including files in directory /etc/opt/freeradius/modules/
including configuration file /etc/opt/freeradius/modules/expr
including configuration file /etc/opt/freeradius/modules/smbpasswd
including configuration file /etc/opt/freeradius/modules/unix
including configuration file /etc/opt/freeradius/modules/mschap
including configuration file /etc/opt/freeradius/modules/preprocess
including configuration file /etc/opt/freeradius/modules/always
including configuration file /etc/opt/freeradius/modules/echo
including configuration file /etc/opt/freeradius/modules/krb5
including configuration file /etc/opt/freeradius/modules/checkval
including configuration file /etc/opt/freeradius/modules/passwd
including configuration file /etc/opt/freeradius/modules/sql_log
including configuration file /etc/opt/freeradius/modules/attr_filter
including configuration file /etc/opt/freeradius/modules/pap
including configuration file /etc/opt/freeradius/modules/logintime
including configuration file /etc/opt/freeradius/modules/perl
including configuration file /etc/opt/freeradius/modules/mac2vlan
including configuration file /etc/opt/freeradius/modules/pam
including configuration file /etc/opt/freeradius/modules/counter
including configuration file /etc/opt/freeradius/modules/ippool
including configuration file /etc/opt/freeradius/modules/detail.example.com
including configuration file /etc/opt/freeradius/modules/files
including configuration file /etc/opt/freeradius/modules/chap
including configuration file /etc/opt/freeradius/modules/inner-eap
including configuration file /etc/opt/freeradius/modules/attr_rewrite
including configuration file /etc/opt/freeradius/modules/detail
including configuration file /etc/opt/freeradius/modules/digest
including configuration file /etc/opt/freeradius/modules/radutmp
including configuration file /etc/opt/freeradius/modules/realm
including configuration file /etc/opt/freeradius/modules/mac2ip
including configuration file /etc/opt/freeradius/modules/ldap
including configuration file /etc/opt/freeradius/modules/linelog
including configuration file /etc/opt/freeradius/modules/exec
including configuration file /etc/opt/freeradius/modules/acct_unique
including configuration file /etc/opt/freeradius/modules/etc_group
including configuration file /etc/opt/freeradius/modules/sradutmp
including configuration file /etc/opt/freeradius/modules/expiration
including configuration file /etc/opt/freeradius/modules/policy
including configuration file /etc/opt/freeradius/modules/wimax
including configuration file /etc/opt/freeradius/modules/detail.log
including configuration file /etc/opt/freeradius/eap.conf
including configuration file /etc/opt/freeradius/policy.conf
including files in directory /etc/opt/freeradius/sites-enabled/
including configuration file /etc/opt/freeradius/sites-enabled/inner-tunnel
including configuration file /etc/opt/freeradius/sites-enabled/default
group = radius
user = radius
including dictionary file /etc/opt/freeradius/dictionary
main {
	prefix = "/usr/site/freeradius-2.1.1"
	localstatedir = "/var/opt/freeradius"
	logdir = "/var/opt/freeradius"
	libdir = "/usr/site/freeradius-2.1.1/lib"
	radacctdir = "/var/opt/freeradius/radacct"
	hostname_lookups = no
	max_request_time = 30
	cleanup_delay = 5
	max_requests = 1024
	allow_core_dumps = no
	pidfile = "/var/opt/freeradius/run/radiusd.pid"
	checkrad = "/usr/site/freeradius-2.1.1/sbin/checkrad"
	debug_level = 0
	proxy_requests = yes
 log {
	stripped_names = no
	auth = no
	auth_badpass = no
	auth_goodpass = no
 }
 security {
	max_attributes = 200
	reject_delay = 1
	status_server = no
 }
}
 client localhost {
	ipaddr = 127.0.0.1
	require_message_authenticator = no
	secret = "testing123"
	nastype = "other"
 }
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
	retry_delay = 5
	retry_count = 3
	default_fallback = no
	dead_time = 120
	wake_all_if_all_dead = no
 }
 home_server localhost {
	ipaddr = 127.0.0.1
	port = 1812
	type = "auth"
	secret = "testing123"
	response_window = 20
	max_outstanding = 65536
	zombie_period = 40
	status_check = "status-server"
	ping_interval = 30
	check_interval = 30
	num_answers_to_alive = 3
	num_pings_to_alive = 3
	revive_interval = 120
	status_check_timeout = 4
 }
 home_server_pool my_auth_failover {
	type = fail-over
	home_server = localhost
 }
 realm example.com {
	auth_pool = my_auth_failover
 }
 realm LOCAL {
 }
radiusd: #### Instantiating modules ####
 instantiate {
 Module: Linked to module rlm_exec
 Module: Instantiating exec
  exec {
	wait = no
	input_pairs = "request"
	shell_escape = yes
  }
 Module: Linked to module rlm_expr
 Module: Instantiating expr
 Module: Linked to module rlm_expiration
 Module: Instantiating expiration
  expiration {
	reply-message = "Password Has Expired  "
  }
 Module: Linked to module rlm_logintime
 Module: Instantiating logintime
  logintime {
	reply-message = "You are calling outside your allowed timespan  "
	minimum-timeout = 60
  }
 }
radiusd: #### Loading Virtual Servers ####
server inner-tunnel {
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_pap
 Module: Instantiating pap
  pap {
	encryption_scheme = "auto"
	auto_header = no
  }
 Module: Linked to module rlm_chap
 Module: Instantiating chap
 Module: Linked to module rlm_mschap
 Module: Instantiating mschap
  mschap {
	use_mppe = yes
	require_encryption = no
	require_strong = no
	with_ntdomain_hack = no
	ntlm_auth = "/usr/site/samba/bin/ntlm_auth --request-nt-key --username=%{mschap:User-Name:-None} --domain=%{mschap:NT-Domain:-ADRICE} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"
  }
 Module: Linked to module rlm_unix
 Module: Instantiating unix
  unix {
	radwtmp = "/var/opt/freeradius/radwtmp"
  }
 Module: Linked to module rlm_krb5
 Module: Instantiating krb5
  krb5 {
	keytab = "/etc/opt/heimdal/krb5.keytab"
	service_principal = "radius/hidden4.example.com at RICE.EDU"
  }
rlm_krb5: krb5_init ok
 Module: Linked to module rlm_eap
 Module: Instantiating eap
  eap {
	default_eap_type = "tls"
	timer_expire = 120
	ignore_unknown_eap_types = no
	cisco_accounting_username_bug = no
	max_sessions = 2048
  }
 Module: Linked to sub-module rlm_eap_md5
 Module: Instantiating eap-md5
 Module: Linked to sub-module rlm_eap_leap
 Module: Instantiating eap-leap
 Module: Linked to sub-module rlm_eap_gtc
 Module: Instantiating eap-gtc
   gtc {
	challenge = "Password: "
	auth_type = "PAP"
   }
 Module: Linked to sub-module rlm_eap_tls
 Module: Instantiating eap-tls
   tls {
	rsa_key_exchange = no
	dh_key_exchange = yes
	rsa_key_length = 512
	dh_key_length = 512
	verify_depth = 0
	pem_file_type = yes
	private_key_file = "/etc/opt/freeradius/certs/server.pem"
	certificate_file = "/etc/opt/freeradius/certs/server.pem"
	CA_file = "/etc/opt/freeradius/certs/ca.pem"
	private_key_password = "whatever"
	dh_file = "/etc/opt/freeradius/certs/dh"
	random_file = "/etc/opt/freeradius/certs/random"
	fragment_size = 1024
	include_length = yes
	check_crl = no
	cipher_list = "DEFAULT"
	make_cert_command = "/etc/opt/freeradius/certs/bootstrap"
    cache {
	enable = no
	lifetime = 24
	max_entries = 255
    }
   }
 Module: Linked to sub-module rlm_eap_ttls
 Module: Instantiating eap-ttls
   ttls {
	default_eap_type = "md5"
	copy_request_to_tunnel = no
	use_tunneled_reply = no
	virtual_server = "inner-tunnel"
   }
 Module: Linked to sub-module rlm_eap_peap
 Module: Instantiating eap-peap
   peap {
	default_eap_type = "mschapv2"
	copy_request_to_tunnel = no
	use_tunneled_reply = no
	proxy_tunneled_request_as_eap = yes
	virtual_server = "inner-tunnel"
   }
 Module: Linked to sub-module rlm_eap_mschapv2
 Module: Instantiating eap-mschapv2
   mschapv2 {
	with_ntdomain_hack = no
   }
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_realm
 Module: Instantiating suffix
  realm suffix {
	format = "suffix"
	delimiter = "@"
	ignore_default = no
	ignore_null = no
  }
 Module: Linked to module rlm_files
 Module: Instantiating files
  files {
	usersfile = "/etc/opt/freeradius/users"
	acctusersfile = "/etc/opt/freeradius/acct_users"
	preproxy_usersfile = "/etc/opt/freeradius/preproxy_users"
	compat = "no"
  }
 Module: Linked to module rlm_ldap
 Module: Instantiating ldap1
  ldap ldap1 {
	server = "hidden1.example.com"
	port = 389
	password = "CMRh<k=5"
	identity = "cn=radius,ou=Service Accounts,dc=rice,dc=edu"
	net_timeout = 1
	timeout = 4
	timelimit = 3
	tls_mode = no
	start_tls = no
	tls_require_cert = "allow"
   tls {
	start_tls = no
	require_cert = "allow"
   }
	basedn = "ou=People,dc=rice,dc=edu"
	filter = "(uid=%{%{Stripped-User-Name}:-%{User-Name}})"
	base_filter = "(objectclass=radiusprofile)"
	auto_header = no
	access_attr = "riceClass"
	access_attr_used_for_allow = yes
	groupname_attribute = "cn"
	groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
	dictionary_mapping = "/etc/opt/freeradius/ldap.attrmap"
	ldap_debug = 0
	ldap_connections_number = 10
	compare_check_items = no
	do_xlat = yes
	set_auth_type = yes
  }
rlm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Creating new attribute ldap1-Ldap-Group
rlm_ldap: Registering ldap_groupcmp for ldap1-Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap1
rlm_ldap: Over-riding set_auth_type, as there is no module ldap1 listed in the "authenticate" section.
rlm_ldap: reading ldap<->radius mappings from file /etc/opt/freeradius/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP riceClass mapped to RADIUS Connect-Info
conns: 0x8183ba8
 Module: Instantiating ldap2
  ldap ldap2 {
	server = "hidden2.example.com"
	port = 389
	password = "CMRh<k=5"
	identity = "cn=radius,ou=Service Accounts,dc=rice,dc=edu"
	net_timeout = 1
	timeout = 4
	timelimit = 3
	tls_mode = no
	start_tls = no
	tls_require_cert = "allow"
   tls {
	start_tls = no
	require_cert = "allow"
   }
	basedn = "ou=People,dc=rice,dc=edu"
	filter = "(uid=%{%{Stripped-User-Name}:-%{User-Name}})"
	base_filter = "(objectclass=radiusprofile)"
	auto_header = no
	access_attr = "riceClass"
	access_attr_used_for_allow = yes
	groupname_attribute = "cn"
	groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
	dictionary_mapping = "/etc/opt/freeradius/ldap.attrmap"
	ldap_debug = 0
	ldap_connections_number = 10
	compare_check_items = no
	do_xlat = yes
	set_auth_type = yes
  }
rlm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Creating new attribute ldap2-Ldap-Group
rlm_ldap: Registering ldap_groupcmp for ldap2-Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap2
rlm_ldap: Over-riding set_auth_type, as there is no module ldap2 listed in the "authenticate" section.
rlm_ldap: reading ldap<->radius mappings from file /etc/opt/freeradius/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP riceClass mapped to RADIUS Connect-Info
conns: 0x8184320
 Module: Instantiating ldap3
  ldap ldap3 {
	server = "hidden3.example.com"
	port = 389
	password = "CMRh<k=5"
	identity = "cn=radius,ou=Service Accounts,dc=rice,dc=edu"
	net_timeout = 1
	timeout = 4
	timelimit = 3
	tls_mode = no
	start_tls = no
	tls_require_cert = "allow"
   tls {
	start_tls = no
	require_cert = "allow"
   }
	basedn = "ou=People,dc=rice,dc=edu"
	filter = "(uid=%{%{Stripped-User-Name}:-%{User-Name}})"
	base_filter = "(objectclass=radiusprofile)"
	auto_header = no
	access_attr = "riceClass"
	access_attr_used_for_allow = yes
	groupname_attribute = "cn"
	groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
	dictionary_mapping = "/etc/opt/freeradius/ldap.attrmap"
	ldap_debug = 0
	ldap_connections_number = 10
	compare_check_items = no
	do_xlat = yes
	set_auth_type = yes
  }
rlm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Creating new attribute ldap3-Ldap-Group
rlm_ldap: Registering ldap_groupcmp for ldap3-Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap3
rlm_ldap: Over-riding set_auth_type, as there is no module ldap3 listed in the "authenticate" section.
rlm_ldap: reading ldap<->radius mappings from file /etc/opt/freeradius/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP riceClass mapped to RADIUS Connect-Info
conns: 0x8184ac0
 Module: Linked to module rlm_perl
 Module: Instantiating perl
  perl {
	module = "/etc/opt/freeradius/chksum.pm"
	func_authorize = "authorize"
	func_authenticate = "authenticate"
	func_accounting = "accounting"
	func_preacct = "preacct"
	func_checksimul = "checksimul"
	func_detach = "detach"
	func_xlat = "xlat"
	func_pre_proxy = "pre_proxy"
	func_post_proxy = "post_proxy"
	func_post_auth = "post_auth"
  }
  perl {
	max_clones = 32
	start_clones = 32
	min_spare_clones = 0
	max_spare_clones = 32
	cleanup_delay = 5
	max_request_per_clone = 0
  }
 Module: Checking session {...} for more modules to load
 Module: Linked to module rlm_radutmp
 Module: Instantiating radutmp
  radutmp {
	filename = "/var/opt/freeradius/radutmp"
	username = "%{User-Name}"
	case_sensitive = yes
	check_with_nas = yes
	perm = 384
	callerid = yes
  }
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 Module: Linked to module rlm_attr_filter
 Module: Instantiating attr_filter.access_reject
  attr_filter attr_filter.access_reject {
	attrsfile = "/etc/opt/freeradius/attrs.access_reject"
	key = "%{User-Name}"
  }
 }
}
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_preprocess
 Module: Instantiating preprocess
  preprocess {
	huntgroups = "/etc/opt/freeradius/huntgroups"
	hints = "/etc/opt/freeradius/hints"
	with_ascend_hack = no
	ascend_channels_per_line = 23
	with_ntdomain_hack = no
	with_specialix_jetstream_hack = no
	with_cisco_vsa_hack = no
	with_alvarion_vsa_hack = no
  }
 Module: Checking preacct {...} for more modules to load
 Module: Linked to module rlm_acct_unique
 Module: Instantiating acct_unique
  acct_unique {
	key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
  }
 Module: Checking accounting {...} for more modules to load
 Module: Linked to module rlm_detail
 Module: Instantiating detail
  detail {
	detailfile = "/var/opt/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
	header = "%t"
	detailperm = 384
	dirperm = 493
	locking = no
	log_packet_header = no
  }
 Module: Instantiating attr_filter.accounting_response
  attr_filter attr_filter.accounting_response {
	attrsfile = "/etc/opt/freeradius/attrs.accounting_response"
	key = "%{User-Name}"
  }
 Module: Checking session {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 }
radiusd: #### Opening IP addresses and Ports ####
listen {
	type = "auth"
	ipaddr = *
	port = 0
}
listen {
	type = "acct"
	ipaddr = *
	port = 0
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on proxy address * port 1814
Ready to process requests.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=61, length=179
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 0x0202000d0173616e646d616e74
	Message-Authenticator = 0x6cb90ae3dfb27eb9c5ab644244b83148
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 13
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[files] users: Matched entry DEFAULT at line 5
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user.  Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Requiring client certificate
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 61 to 10.4.94.5 port 32770
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	EAP-Message = 0x010300060d20
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x71d989a171da84c36a2af864887ec5fa
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=62, length=190
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 0x020300060319
	State = 0x71d989a171da84c36a2af864887ec5fa
	Message-Authenticator = 0x53b929e758f817b151233d311b7eb552
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 3 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[files] users: Matched entry DEFAULT at line 5
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user.  Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP NAK
[eap] EAP-NAK asked for EAP-Type/peap
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 62 to 10.4.94.5 port 32770
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	EAP-Message = 0x010400061920
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x71d989a170dd90c36a2af864887ec5fa
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=63, length=303
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 0x0204007719800000006d1603010068010000640301491d7b6bd46de6512e8b56cb99bab76931ded4c020e5c3c34d5f1384f7c9a78d000018002f00350005000ac009c00ac013c0140032003800130004010000230000000d000b00000873616e646d616e74000a00080006001700180019000b00020100
	State = 0x71d989a170dd90c36a2af864887ec5fa
	Message-Authenticator = 0x504d7f84eaaf660ee148a3cb13e97c17
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 4 length 119
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 109
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap]     (other): before/accept initialization 
[peap]     TLS_accept: before/accept initialization 
[peap] <<< TLS 1.0 Handshake [length 0068], ClientHello  
[peap]     TLS_accept: SSLv3 read client hello A 
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello  
[peap]     TLS_accept: SSLv3 write server hello A 
[peap] >>> TLS 1.0 Handshake [length 084e], Certificate  
[peap]     TLS_accept: SSLv3 write certificate A 
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
[peap]     TLS_accept: SSLv3 write server done A 
[peap]     TLS_accept: SSLv3 flush data 
[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase 
In SSL Accept mode  
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 63 to 10.4.94.5 port 32770
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 0x973082037fa0030201020201
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x71d989a173dc90c36a2af864887ec5fa
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=64, length=190
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 0x020500061900
	State = 0x71d989a173dc90c36a2af864887ec5fa
	Message-Authenticator = 0x2a9dbb9a2cf66ae2d1d7a4c7ebf1c90e
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 5 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 64 to 10.4.94.5 port 32770
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 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
	EAP-Message = 0x9c651e6bd1f54787
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x71d989a172df90c36a2af864887ec5fa
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=65, length=190
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 0x020600061900
	State = 0x71d989a172df90c36a2af864887ec5fa
	Message-Authenticator = 0x6630f3c3daeced3a4a0e7a2e5a819c9f
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 6 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 65 to 10.4.94.5 port 32770
	EAP-Message = 0x010700a5190009b557055ec4951539ce011e6c9d8f87487970d3fd810ce9a2bab97c84cf294c2f4fc91686db7dcbe43ed4efc390b1900a68004c10dd436d5a8d2ede2d8613afe2538be57542e2a2d1e944913729b51ebd2c88efe78411f5e97e79c0a376279693b42bc665064d6cec30ef6a571caef21d2d8bb5983d4e3eeb352d37e1e4293bd509dbe9d1d686fe7a841dbdc386006b23a810d2411016030100040e000000
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x71d989a175de90c36a2af864887ec5fa
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=66, length=522
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 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
	EAP-Message = 0xae6315c58a61a5d4a453aa35e038571dfd720cc981fcf3ce14030100010116030100309a43d36ac8068550872ab4ca5fc0d22bb84c1208893e6256543c450c26d78a06bcf823060475a073ca5c9670c469b9ae
	State = 0x71d989a175de90c36a2af864887ec5fa
	Message-Authenticator = 0xbd121a9f49c72821bdda11b2f98d2835
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 7 length 253
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 326
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange  
[peap]     TLS_accept: SSLv3 read client key exchange A 
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]  
[peap] <<< TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 read finished A 
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]  
[peap]     TLS_accept: SSLv3 write change cipher spec A 
[peap] >>> TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 write finished A 
[peap]     TLS_accept: SSLv3 flush data 
[peap]     (other): SSL negotiation finished successfully 
SSL Connection Established 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 66 to 10.4.94.5 port 32770
	EAP-Message = 0x01080041190014030100010116030100306f2ea497585233d6e052d1fd8fa2c858be337517cc65f6d794d870cd83438fc8f7a6b2de2562a2b69bc63783d16b022d
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x71d989a174d190c36a2af864887ec5fa
Finished request 5.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=67, length=190
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 0x020800061900
	State = 0x71d989a174d190c36a2af864887ec5fa
	Message-Authenticator = 0xa02e258779ca93448b7ffa1863b1fce8
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 8 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3 
[peap] eaptls_process returned 3 
[peap] EAPTLS_SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 67 to 10.4.94.5 port 32770
	EAP-Message = 0x0109002b19001703010020a84751428f91c0666e3f12d24a1d3ad69fbf52637767771db903b42af66a519a
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x71d989a177d090c36a2af864887ec5fa
Finished request 6.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=68, length=227
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 0x0209002b1900170301002004c32f63d773a8a7af999236528a78de128a2718d7b79fb0c66b100a8e804a08
	State = 0x71d989a177d090c36a2af864887ec5fa
	Message-Authenticator = 0xf5ae11628f0cd23741f167f705410764
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 9 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Identity - sandmant
[peap] Got tunnled request
	EAP-Message = 0x0209000d0173616e646d616e74
server (null) {
  PEAP: Got tunneled identity of sandmant
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to sandmant
Sending tunneled request
	EAP-Message = 0x0209000d0173616e646d616e74
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "sandmant"
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 9 length 13
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] 	expand: %{Client-IP-Address} -> 10.4.94.5
[files] users: Matched entry DEFAULT at line 14
++[files] returns ok
++- entering redundant-load-balance group redundant_ldap {...}
[ldap3] performing user authorization for sandmant
[ldap3] 	expand: %{Stripped-User-Name} -> 
[ldap3] 	expand: %{User-Name} -> sandmant
[ldap3] 	expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) -> (uid=sandmant)
[ldap3] 	expand: ou=People,dc=rice,dc=edu -> ou=People,dc=rice,dc=edu
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: attempting LDAP reconnection
rlm_ldap: (re)connect to hidden3.example.com:389, authentication 0
rlm_ldap: bind as cn=radius,ou=Service Accounts,dc=rice,dc=edu/CMRh<k=5 to hidden3.example.com:389
rlm_ldap: waiting for bind result ...
rlm_ldap: Bind was successful
rlm_ldap: performing search in ou=People,dc=rice,dc=edu, with filter (uid=sandmant)
[ldap3] checking if remote access for sandmant is allowed by riceClass
[ldap3] looking for check items in directory...
[ldap3] looking for reply items in directory...
rlm_ldap: riceClass -> Connect-Info = "graduate student"
WARNING: No "known good" password was found in LDAP.  Are you sure that the user is configured correctly?
[ldap3] user sandmant authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
+++[ldap3] returns ok
++- redundant-load-balance group redundant_ldap returns ok
	expand: %{reply:Connect-Info} -> graduate student
	expand: %{Connect-Info} -> 
++[outer.reply] returns ok
++? if (reply:Connect-Info =~ /[a-z]* student/)
? Evaluating (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++? if (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++- entering if (reply:Connect-Info =~ /[a-z]* student/) {...}
+++[outer.reply] returns ok
++- if (reply:Connect-Info =~ /[a-z]* student/) returns ok
++ ... skipping elsif for request 7: Preceding "if" was taken
perl_pool: item 0x81a33b8 asigned new request. Handled so far: 1
found interpetator at address 0x81a33b8
rlm_perl: Added pair User-Name = sandmant
rlm_perl: Added pair EAP-Message = 0x0209000d0173616e646d616e74
rlm_perl: Added pair EAP-Type = Identity
rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1
rlm_perl: Added pair Connect-Info = graduate student
rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
rlm_perl: Added pair Tunnel-Type = VLAN
rlm_perl: Added pair Tunnel-Private-Group-Id = student07
rlm_perl: Added pair Ldap-UserDn = uid=sandmant, ou=People, dc=rice, dc=edu
rlm_perl: Added pair Auth-Type = EAP
rlm_perl: Added pair Proxy-To-Realm = LOCAL
rlm_perl: Added pair EAP-Type = MS-CHAP-V2
perl_pool total/active/spare [32/0/32]
Unreserve perl at address 0x81a33b8
++[perl] returns updated
	expand: %{reply:Tunnel-Private-Group-Id} -> student07
++[outer.reply] returns updated
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
	Connect-Info = "graduate student"
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Type:0 = VLAN
	Tunnel-Private-Group-Id:0 = "student07"
	EAP-Message = 0x010a00221a010a001d1029513f3e30f0f6ba065de8b33d717bd373616e646d616e74
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6160811d616a9b330ce06b68115ade9f
[peap] Got tunneled reply RADIUS code 11
	Connect-Info = "graduate student"
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Type:0 = VLAN
	Tunnel-Private-Group-Id:0 = "student07"
	EAP-Message = 0x010a00221a010a001d1029513f3e30f0f6ba065de8b33d717bd373616e646d616e74
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6160811d616a9b330ce06b68115ade9f
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 68 to 10.4.94.5 port 32770
	Cisco-AVPair = "graduate student"
	Class = 0x4f553d7374756465
	Connect-Info = "student"
	Tunnel-Private-Group-Id:0 = "student07"
	EAP-Message = 0x010a004b19001703010040f24f31548b07401c673432bc27546ef8eaebc3a29948350dad5b2fffa788fe7d079dfe1c0fe3adff7d7849011d6b8f547750002e304efda101bcdbdf71e227d2
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x71d989a176d390c36a2af864887ec5fa
Finished request 7.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=69, length=291
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 0x020a006b1900170301006081b7a7edcceeb48df5a8d5c318311a0d6f2b4b0d44dfff282df72c6e96c7771a88bfe356bda6efd66ffc59c55ff64cd2786cd23a26a2ef8e7d9c37dcc8e94c547e0ddc221bd311d2c5afc77b388c0c995feb83dd3011eb8ed77360ad53a32446
	State = 0x71d989a176d390c36a2af864887ec5fa
	Message-Authenticator = 0xdf5ffeb755af38218dd46ca0ffff09df
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 10 length 107
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunnled request
	EAP-Message = 0x020a00431a020a003e31a9dcc41e7b6d92ddc14c1eeccdadf3fa000000000000000047a83ae19d3ecbb0c76239591a6d830087c3d608b2956fd90073616e646d616e74
server (null) {
  PEAP: Setting User-Name to sandmant
Sending tunneled request
	EAP-Message = 0x020a00431a020a003e31a9dcc41e7b6d92ddc14c1eeccdadf3fa000000000000000047a83ae19d3ecbb0c76239591a6d830087c3d608b2956fd90073616e646d616e74
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "sandmant"
	State = 0x6160811d616a9b330ce06b68115ade9f
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 10 length 67
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] 	expand: %{Client-IP-Address} -> 10.4.94.5
[files] users: Matched entry DEFAULT at line 14
++[files] returns ok
++- entering redundant-load-balance group redundant_ldap {...}
[ldap2] performing user authorization for sandmant
[ldap2] 	expand: %{Stripped-User-Name} -> 
[ldap2] 	expand: %{User-Name} -> sandmant
[ldap2] 	expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) -> (uid=sandmant)
[ldap2] 	expand: ou=People,dc=rice,dc=edu -> ou=People,dc=rice,dc=edu
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: attempting LDAP reconnection
rlm_ldap: (re)connect to hidden2.example.com:389, authentication 0
rlm_ldap: bind as cn=radius,ou=Service Accounts,dc=rice,dc=edu/CMRh<k=5 to hidden2.example.com:389
rlm_ldap: waiting for bind result ...
rlm_ldap: Bind was successful
rlm_ldap: performing search in ou=People,dc=rice,dc=edu, with filter (uid=sandmant)
[ldap2] checking if remote access for sandmant is allowed by riceClass
[ldap2] looking for check items in directory...
[ldap2] looking for reply items in directory...
rlm_ldap: riceClass -> Connect-Info = "graduate student"
WARNING: No "known good" password was found in LDAP.  Are you sure that the user is configured correctly?
[ldap2] user sandmant authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
+++[ldap2] returns ok
++- redundant-load-balance group redundant_ldap returns ok
	expand: %{reply:Connect-Info} -> graduate student
	expand: %{Connect-Info} -> 
++[outer.reply] returns ok
++? if (reply:Connect-Info =~ /[a-z]* student/)
? Evaluating (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++? if (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++- entering if (reply:Connect-Info =~ /[a-z]* student/) {...}
+++[outer.reply] returns ok
++- if (reply:Connect-Info =~ /[a-z]* student/) returns ok
++ ... skipping elsif for request 8: Preceding "if" was taken
perl_pool: item 0x8723dc0 asigned new request. Handled so far: 1
found interpetator at address 0x8723dc0
rlm_perl: Added pair User-Name = sandmant
rlm_perl: Added pair EAP-Message = 0x020a00431a020a003e31a9dcc41e7b6d92ddc14c1eeccdadf3fa000000000000000047a83ae19d3ecbb0c76239591a6d830087c3d608b2956fd90073616e646d616e74
rlm_perl: Added pair EAP-Type = MS-CHAP-V2
rlm_perl: Added pair State = 0x6160811d616a9b330ce06b68115ade9f
rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1
rlm_perl: Added pair Connect-Info = graduate student
rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
rlm_perl: Added pair Tunnel-Type = VLAN
rlm_perl: Added pair Tunnel-Private-Group-Id = student07
rlm_perl: Added pair Ldap-UserDn = uid=sandmant, ou=People, dc=rice, dc=edu
rlm_perl: Added pair Auth-Type = EAP
rlm_perl: Added pair Proxy-To-Realm = LOCAL
perl_pool total/active/spare [32/0/32]
Unreserve perl at address 0x8723dc0
++[perl] returns updated
	expand: %{reply:Tunnel-Private-Group-Id} -> student07
++[outer.reply] returns updated
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] +- entering group MS-CHAP {...}
[mschap] No Cleartext-Password configured.  Cannot create LM-Password.
[mschap] No Cleartext-Password configured.  Cannot create NT-Password.
[mschap] Told to do MS-CHAPv2 for sandmant with NT-Password
[mschap] 	expand: --username=%{mschap:User-Name:-None} -> --username=sandmant
[mschap] No NT-Domain was found in the User-Name.
[mschap] 	expand: --domain=%{mschap:NT-Domain:-ADRICE} -> --domain=ADRICE
[mschap]  mschap2: 29
[mschap] 	expand: --challenge=%{mschap:Challenge:-00} -> --challenge=bccb76cc35a2bd84
[mschap] 	expand: --nt-response=%{mschap:NT-Response:-00} -> --nt-response=47a83ae19d3ecbb0c76239591a6d830087c3d608b2956fd9
Exec-Program output: NT_KEY: 48BE312067001CB407403A0F477DE48A 
Exec-Program-Wait: plaintext: NT_KEY: 48BE312067001CB407403A0F477DE48A 
Exec-Program: returned: 0
[mschap] adding MS-CHAPv2 MPPE keys
++[mschap] returns ok
MSCHAP Success 
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
	Connect-Info = "graduate student"
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Type:0 = VLAN
	Tunnel-Private-Group-Id:0 = "student07"
	EAP-Message = 0x010b00331a030a002e533d35463834343143304635333637333642373341303942454345443041433943463841393335353443
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6160811d606b9b330ce06b68115ade9f
[peap] Got tunneled reply RADIUS code 11
	Connect-Info = "graduate student"
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Type:0 = VLAN
	Tunnel-Private-Group-Id:0 = "student07"
	EAP-Message = 0x010b00331a030a002e533d35463834343143304635333637333642373341303942454345443041433943463841393335353443
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6160811d606b9b330ce06b68115ade9f
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 69 to 10.4.94.5 port 32770
	Cisco-AVPair = "graduate student"
	Class = 0x4f553d7374756465
	Connect-Info = "student"
	Tunnel-Private-Group-Id:0 = "student07"
	EAP-Message = 0x010b005b1900170301005051b354971aac95ff996e2bba913786db5d374b8bff99f040d8ab1963a1a95cb9b9c2193c9103995942772467fcc2175fdb0c1ec8637b95bbb833036b13ac39ed71bf25f4007d905fd01253bdefa3c3fa
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x71d989a179d290c36a2af864887ec5fa
Finished request 8.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=70, length=227
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 0x020b002b19001703010020b7a46bd1e7ca2d4c285dc3777fecb15c9c2cac92c68d35b1f1cd7e42cfdc8fc1
	State = 0x71d989a179d290c36a2af864887ec5fa
	Message-Authenticator = 0x4c098300db8d51f88c29a607960c9823
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 11 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunnled request
	EAP-Message = 0x020b00061a03
server (null) {
  PEAP: Setting User-Name to sandmant
Sending tunneled request
	EAP-Message = 0x020b00061a03
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "sandmant"
	State = 0x6160811d606b9b330ce06b68115ade9f
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 11 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] 	expand: %{Client-IP-Address} -> 10.4.94.5
[files] users: Matched entry DEFAULT at line 14
++[files] returns ok
++- entering redundant-load-balance group redundant_ldap {...}
[ldap2] performing user authorization for sandmant
[ldap2] 	expand: %{Stripped-User-Name} -> 
[ldap2] 	expand: %{User-Name} -> sandmant
[ldap2] 	expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) -> (uid=sandmant)
[ldap2] 	expand: ou=People,dc=rice,dc=edu -> ou=People,dc=rice,dc=edu
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in ou=People,dc=rice,dc=edu, with filter (uid=sandmant)
[ldap2] checking if remote access for sandmant is allowed by riceClass
[ldap2] looking for check items in directory...
[ldap2] looking for reply items in directory...
rlm_ldap: riceClass -> Connect-Info = "graduate student"
WARNING: No "known good" password was found in LDAP.  Are you sure that the user is configured correctly?
[ldap2] user sandmant authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
+++[ldap2] returns ok
++- redundant-load-balance group redundant_ldap returns ok
	expand: %{reply:Connect-Info} -> graduate student
	expand: %{Connect-Info} -> 
++[outer.reply] returns ok
++? if (reply:Connect-Info =~ /[a-z]* student/)
? Evaluating (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++? if (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++- entering if (reply:Connect-Info =~ /[a-z]* student/) {...}
+++[outer.reply] returns ok
++- if (reply:Connect-Info =~ /[a-z]* student/) returns ok
++ ... skipping elsif for request 9: Preceding "if" was taken
perl_pool: item 0x893fdb8 asigned new request. Handled so far: 1
found interpetator at address 0x893fdb8
rlm_perl: Added pair User-Name = sandmant
rlm_perl: Added pair EAP-Message = 0x020b00061a03
rlm_perl: Added pair EAP-Type = MS-CHAP-V2
rlm_perl: Added pair State = 0x6160811d606b9b330ce06b68115ade9f
rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1
rlm_perl: Added pair Connect-Info = graduate student
rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
rlm_perl: Added pair Tunnel-Type = VLAN
rlm_perl: Added pair Tunnel-Private-Group-Id = student07
rlm_perl: Added pair Ldap-UserDn = uid=sandmant, ou=People, dc=rice, dc=edu
rlm_perl: Added pair Auth-Type = EAP
rlm_perl: Added pair Proxy-To-Realm = LOCAL
perl_pool total/active/spare [32/0/32]
Unreserve perl at address 0x893fdb8
++[perl] returns updated
	expand: %{reply:Tunnel-Private-Group-Id} -> student07
++[outer.reply] returns updated
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[eap] Freeing handler
++[eap] returns ok
} # server inner-tunnel
[peap] Got tunneled reply code 2
	Connect-Info = "graduate student"
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Type:0 = VLAN
	Tunnel-Private-Group-Id:0 = "student07"
	EAP-Message = 0x030b0004
	Message-Authenticator = 0x00000000000000000000000000000000
	User-Name = "sandmant"
[peap] Got tunneled reply RADIUS code 2
	Connect-Info = "graduate student"
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Type:0 = VLAN
	Tunnel-Private-Group-Id:0 = "student07"
	EAP-Message = 0x030b0004
	Message-Authenticator = 0x00000000000000000000000000000000
	User-Name = "sandmant"
[peap] Tunneled authentication was successful.
[peap] SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 70 to 10.4.94.5 port 32770
	Cisco-AVPair = "graduate student"
	Class = 0x4f553d7374756465
	Connect-Info = "student"
	Tunnel-Private-Group-Id:0 = "student07"
	EAP-Message = 0x010c002b19001703010020f492aebcb077483ae92253c796f75b874739b50bc21b158871db1bba4a9abb41
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x71d989a178d590c36a2af864887ec5fa
Finished request 9.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=71, length=227
	User-Name = "sandmant"
	Calling-Station-Id = "00-1A-73-BD-6E-58"
	Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
	NAS-Port = 29
	NAS-IP-Address = 10.4.94.5
	NAS-Identifier = "WLC4"
	Airespace-Wlan-Id = 1
	Service-Type = Framed-User
	Framed-MTU = 1300
	NAS-Port-Type = Wireless-802.11
	Tunnel-Type:0 = VLAN
	Tunnel-Medium-Type:0 = IEEE-802
	Tunnel-Private-Group-Id:0 = "740"
	EAP-Message = 0x020c002b190017030100200171cffb2f33d228eaff37a177f53578070c5008e5131243cb7517b7937d547f
	State = 0x71d989a178d590c36a2af864887ec5fa
	Message-Authenticator = 0x6fbae1e6071b80d7288dec550683985d
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 12 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Received EAP-TLV response.
[peap] Success
[eap] Freeing handler
++[eap] returns ok
+- entering group post-auth {...}
++[exec] returns noop
Sending Access-Accept of id 71 to 10.4.94.5 port 32770
	MS-MPPE-Recv-Key = 0x4a00fb562f5d3b32c23403d20f8da6fbde96e5d068a650911ccc4f751d2c597d
	MS-MPPE-Send-Key = 0x8f5acbc6a497eb9a7f3034a870f071cf750b1591161daec411f780843da1091d
	EAP-Message = 0x030c0004
	Message-Authenticator = 0x00000000000000000000000000000000
	User-Name = "sandmant"
Finished request 10.
Going to the next request
Waking up in 4.8 seconds.
Cleaning up request 0 ID 61 with timestamp +33
Cleaning up request 1 ID 62 with timestamp +33
Cleaning up request 2 ID 63 with timestamp +33
Cleaning up request 3 ID 64 with timestamp +33
Cleaning up request 4 ID 65 with timestamp +33
Cleaning up request 5 ID 66 with timestamp +33
Cleaning up request 6 ID 67 with timestamp +33
Cleaning up request 7 ID 68 with timestamp +33
Cleaning up request 8 ID 69 with timestamp +33
Cleaning up request 9 ID 70 with timestamp +33
Cleaning up request 10 ID 71 with timestamp +33
Ready to process requests.


More information about the Freeradius-Users mailing list