Referencing a redundant-load-balance set within users file
Tod A. Sandman
sandmant at rice.edu
Fri Nov 14 16:42:42 CET 2008
> Ivan Kalik wrote:
>> Why don't you map that in ldap.attrmap?
Thanks so much. I removed all LDAP settings from users, and I have
TTLS-PAP working fine with redundant LDAP for authorization and
Kerberos for Authentication.
Now I can't get the only other mode we need: PEAP/MSChapv2. LDAP
authorization is working fine, and the ntlm-auth authentication works
fine, but required attributes are not being sent back in the
Access-Accept packet.
Unlike when I connect via TTLS-PAP, the Access-Accept does not include
some required attributes. The debug output shows them getting set
properly within sites-enabled/inner-tunnel and getting updated with
"update outer.reply", but they get dropped before the Access-Accept
packet.
I haven't touched sites-enabled/default.
I enabled ldap in sites-enabled/inner-tunnel, and afterwards I do
an "update outer.reply", i.e.:,
redundant-load-balance redundant_ldap {
ldap1
ldap2
ldap3
}
update outer.reply {
Cisco-AVPair := "%{reply:Connect-Info}"
Class := "OU=%{reply:Connect-Info}"
}
and the debug output shows this working.
But the Access-Accept does not include these attributes as it does
when I use TTLS-PAP.
I tried moving the "update outer.reply" to the post-auth section, but
this did not help.
My config is quite close to the default. The only PEAP related change
I made was to update modules/mschap with the correct ntlm_auth line.
Thanks for any ideas.
Tod Sandman
Sr. Systems Administrator
Middleware Development & Integration
Rice University
-------------- next part --------------
Successfull connect, but Access-Accept missing attributes, and put me on staff
while I'm a grad student.
FreeRADIUS Version 2.1.1, for host i686-pc-linux-gnu, built on Oct 16 2008 at 13:34:21
Copyright (C) 1999-2008 The FreeRADIUS server project and contributors.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License v2.
Starting - reading configuration files ...
including configuration file /etc/opt/freeradius/radiusd.conf
including configuration file /etc/opt/freeradius/proxy.conf
including configuration file /etc/opt/freeradius/clients.conf
including files in directory /etc/opt/freeradius/modules/
including configuration file /etc/opt/freeradius/modules/expr
including configuration file /etc/opt/freeradius/modules/smbpasswd
including configuration file /etc/opt/freeradius/modules/unix
including configuration file /etc/opt/freeradius/modules/mschap
including configuration file /etc/opt/freeradius/modules/preprocess
including configuration file /etc/opt/freeradius/modules/always
including configuration file /etc/opt/freeradius/modules/echo
including configuration file /etc/opt/freeradius/modules/krb5
including configuration file /etc/opt/freeradius/modules/checkval
including configuration file /etc/opt/freeradius/modules/passwd
including configuration file /etc/opt/freeradius/modules/sql_log
including configuration file /etc/opt/freeradius/modules/attr_filter
including configuration file /etc/opt/freeradius/modules/pap
including configuration file /etc/opt/freeradius/modules/logintime
including configuration file /etc/opt/freeradius/modules/perl
including configuration file /etc/opt/freeradius/modules/mac2vlan
including configuration file /etc/opt/freeradius/modules/pam
including configuration file /etc/opt/freeradius/modules/counter
including configuration file /etc/opt/freeradius/modules/ippool
including configuration file /etc/opt/freeradius/modules/detail.example.com
including configuration file /etc/opt/freeradius/modules/files
including configuration file /etc/opt/freeradius/modules/chap
including configuration file /etc/opt/freeradius/modules/inner-eap
including configuration file /etc/opt/freeradius/modules/attr_rewrite
including configuration file /etc/opt/freeradius/modules/detail
including configuration file /etc/opt/freeradius/modules/digest
including configuration file /etc/opt/freeradius/modules/radutmp
including configuration file /etc/opt/freeradius/modules/realm
including configuration file /etc/opt/freeradius/modules/mac2ip
including configuration file /etc/opt/freeradius/modules/ldap
including configuration file /etc/opt/freeradius/modules/linelog
including configuration file /etc/opt/freeradius/modules/exec
including configuration file /etc/opt/freeradius/modules/acct_unique
including configuration file /etc/opt/freeradius/modules/etc_group
including configuration file /etc/opt/freeradius/modules/sradutmp
including configuration file /etc/opt/freeradius/modules/expiration
including configuration file /etc/opt/freeradius/modules/policy
including configuration file /etc/opt/freeradius/modules/wimax
including configuration file /etc/opt/freeradius/modules/detail.log
including configuration file /etc/opt/freeradius/eap.conf
including configuration file /etc/opt/freeradius/policy.conf
including files in directory /etc/opt/freeradius/sites-enabled/
including configuration file /etc/opt/freeradius/sites-enabled/inner-tunnel
including configuration file /etc/opt/freeradius/sites-enabled/default
group = radius
user = radius
including dictionary file /etc/opt/freeradius/dictionary
main {
prefix = "/usr/site/freeradius-2.1.1"
localstatedir = "/var/opt/freeradius"
logdir = "/var/opt/freeradius"
libdir = "/usr/site/freeradius-2.1.1/lib"
radacctdir = "/var/opt/freeradius/radacct"
hostname_lookups = no
max_request_time = 30
cleanup_delay = 5
max_requests = 1024
allow_core_dumps = no
pidfile = "/var/opt/freeradius/run/radiusd.pid"
checkrad = "/usr/site/freeradius-2.1.1/sbin/checkrad"
debug_level = 0
proxy_requests = yes
log {
stripped_names = no
auth = no
auth_badpass = no
auth_goodpass = no
}
security {
max_attributes = 200
reject_delay = 1
status_server = no
}
}
client localhost {
ipaddr = 127.0.0.1
require_message_authenticator = no
secret = "testing123"
nastype = "other"
}
radiusd: #### Loading Realms and Home Servers ####
proxy server {
retry_delay = 5
retry_count = 3
default_fallback = no
dead_time = 120
wake_all_if_all_dead = no
}
home_server localhost {
ipaddr = 127.0.0.1
port = 1812
type = "auth"
secret = "testing123"
response_window = 20
max_outstanding = 65536
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
num_answers_to_alive = 3
num_pings_to_alive = 3
revive_interval = 120
status_check_timeout = 4
}
home_server_pool my_auth_failover {
type = fail-over
home_server = localhost
}
realm example.com {
auth_pool = my_auth_failover
}
realm LOCAL {
}
radiusd: #### Instantiating modules ####
instantiate {
Module: Linked to module rlm_exec
Module: Instantiating exec
exec {
wait = no
input_pairs = "request"
shell_escape = yes
}
Module: Linked to module rlm_expr
Module: Instantiating expr
Module: Linked to module rlm_expiration
Module: Instantiating expiration
expiration {
reply-message = "Password Has Expired "
}
Module: Linked to module rlm_logintime
Module: Instantiating logintime
logintime {
reply-message = "You are calling outside your allowed timespan "
minimum-timeout = 60
}
}
radiusd: #### Loading Virtual Servers ####
server inner-tunnel {
modules {
Module: Checking authenticate {...} for more modules to load
Module: Linked to module rlm_pap
Module: Instantiating pap
pap {
encryption_scheme = "auto"
auto_header = no
}
Module: Linked to module rlm_chap
Module: Instantiating chap
Module: Linked to module rlm_mschap
Module: Instantiating mschap
mschap {
use_mppe = yes
require_encryption = no
require_strong = no
with_ntdomain_hack = no
ntlm_auth = "/usr/site/samba/bin/ntlm_auth --request-nt-key --username=%{mschap:User-Name:-None} --domain=%{mschap:NT-Domain:-ADRICE} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"
}
Module: Linked to module rlm_unix
Module: Instantiating unix
unix {
radwtmp = "/var/opt/freeradius/radwtmp"
}
Module: Linked to module rlm_krb5
Module: Instantiating krb5
krb5 {
keytab = "/etc/opt/heimdal/krb5.keytab"
service_principal = "radius/hidden4.example.com at RICE.EDU"
}
rlm_krb5: krb5_init ok
Module: Linked to module rlm_eap
Module: Instantiating eap
eap {
default_eap_type = "tls"
timer_expire = 120
ignore_unknown_eap_types = no
cisco_accounting_username_bug = no
max_sessions = 2048
}
Module: Linked to sub-module rlm_eap_md5
Module: Instantiating eap-md5
Module: Linked to sub-module rlm_eap_leap
Module: Instantiating eap-leap
Module: Linked to sub-module rlm_eap_gtc
Module: Instantiating eap-gtc
gtc {
challenge = "Password: "
auth_type = "PAP"
}
Module: Linked to sub-module rlm_eap_tls
Module: Instantiating eap-tls
tls {
rsa_key_exchange = no
dh_key_exchange = yes
rsa_key_length = 512
dh_key_length = 512
verify_depth = 0
pem_file_type = yes
private_key_file = "/etc/opt/freeradius/certs/server.pem"
certificate_file = "/etc/opt/freeradius/certs/server.pem"
CA_file = "/etc/opt/freeradius/certs/ca.pem"
private_key_password = "whatever"
dh_file = "/etc/opt/freeradius/certs/dh"
random_file = "/etc/opt/freeradius/certs/random"
fragment_size = 1024
include_length = yes
check_crl = no
cipher_list = "DEFAULT"
make_cert_command = "/etc/opt/freeradius/certs/bootstrap"
cache {
enable = no
lifetime = 24
max_entries = 255
}
}
Module: Linked to sub-module rlm_eap_ttls
Module: Instantiating eap-ttls
ttls {
default_eap_type = "md5"
copy_request_to_tunnel = no
use_tunneled_reply = no
virtual_server = "inner-tunnel"
}
Module: Linked to sub-module rlm_eap_peap
Module: Instantiating eap-peap
peap {
default_eap_type = "mschapv2"
copy_request_to_tunnel = no
use_tunneled_reply = no
proxy_tunneled_request_as_eap = yes
virtual_server = "inner-tunnel"
}
Module: Linked to sub-module rlm_eap_mschapv2
Module: Instantiating eap-mschapv2
mschapv2 {
with_ntdomain_hack = no
}
Module: Checking authorize {...} for more modules to load
Module: Linked to module rlm_realm
Module: Instantiating suffix
realm suffix {
format = "suffix"
delimiter = "@"
ignore_default = no
ignore_null = no
}
Module: Linked to module rlm_files
Module: Instantiating files
files {
usersfile = "/etc/opt/freeradius/users"
acctusersfile = "/etc/opt/freeradius/acct_users"
preproxy_usersfile = "/etc/opt/freeradius/preproxy_users"
compat = "no"
}
Module: Linked to module rlm_ldap
Module: Instantiating ldap1
ldap ldap1 {
server = "hidden1.example.com"
port = 389
password = "CMRh<k=5"
identity = "cn=radius,ou=Service Accounts,dc=rice,dc=edu"
net_timeout = 1
timeout = 4
timelimit = 3
tls_mode = no
start_tls = no
tls_require_cert = "allow"
tls {
start_tls = no
require_cert = "allow"
}
basedn = "ou=People,dc=rice,dc=edu"
filter = "(uid=%{%{Stripped-User-Name}:-%{User-Name}})"
base_filter = "(objectclass=radiusprofile)"
auto_header = no
access_attr = "riceClass"
access_attr_used_for_allow = yes
groupname_attribute = "cn"
groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
dictionary_mapping = "/etc/opt/freeradius/ldap.attrmap"
ldap_debug = 0
ldap_connections_number = 10
compare_check_items = no
do_xlat = yes
set_auth_type = yes
}
rlm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Creating new attribute ldap1-Ldap-Group
rlm_ldap: Registering ldap_groupcmp for ldap1-Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap1
rlm_ldap: Over-riding set_auth_type, as there is no module ldap1 listed in the "authenticate" section.
rlm_ldap: reading ldap<->radius mappings from file /etc/opt/freeradius/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP riceClass mapped to RADIUS Connect-Info
conns: 0x8183ba8
Module: Instantiating ldap2
ldap ldap2 {
server = "hidden2.example.com"
port = 389
password = "CMRh<k=5"
identity = "cn=radius,ou=Service Accounts,dc=rice,dc=edu"
net_timeout = 1
timeout = 4
timelimit = 3
tls_mode = no
start_tls = no
tls_require_cert = "allow"
tls {
start_tls = no
require_cert = "allow"
}
basedn = "ou=People,dc=rice,dc=edu"
filter = "(uid=%{%{Stripped-User-Name}:-%{User-Name}})"
base_filter = "(objectclass=radiusprofile)"
auto_header = no
access_attr = "riceClass"
access_attr_used_for_allow = yes
groupname_attribute = "cn"
groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
dictionary_mapping = "/etc/opt/freeradius/ldap.attrmap"
ldap_debug = 0
ldap_connections_number = 10
compare_check_items = no
do_xlat = yes
set_auth_type = yes
}
rlm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Creating new attribute ldap2-Ldap-Group
rlm_ldap: Registering ldap_groupcmp for ldap2-Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap2
rlm_ldap: Over-riding set_auth_type, as there is no module ldap2 listed in the "authenticate" section.
rlm_ldap: reading ldap<->radius mappings from file /etc/opt/freeradius/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP riceClass mapped to RADIUS Connect-Info
conns: 0x8184320
Module: Instantiating ldap3
ldap ldap3 {
server = "hidden3.example.com"
port = 389
password = "CMRh<k=5"
identity = "cn=radius,ou=Service Accounts,dc=rice,dc=edu"
net_timeout = 1
timeout = 4
timelimit = 3
tls_mode = no
start_tls = no
tls_require_cert = "allow"
tls {
start_tls = no
require_cert = "allow"
}
basedn = "ou=People,dc=rice,dc=edu"
filter = "(uid=%{%{Stripped-User-Name}:-%{User-Name}})"
base_filter = "(objectclass=radiusprofile)"
auto_header = no
access_attr = "riceClass"
access_attr_used_for_allow = yes
groupname_attribute = "cn"
groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
dictionary_mapping = "/etc/opt/freeradius/ldap.attrmap"
ldap_debug = 0
ldap_connections_number = 10
compare_check_items = no
do_xlat = yes
set_auth_type = yes
}
rlm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Creating new attribute ldap3-Ldap-Group
rlm_ldap: Registering ldap_groupcmp for ldap3-Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap3
rlm_ldap: Over-riding set_auth_type, as there is no module ldap3 listed in the "authenticate" section.
rlm_ldap: reading ldap<->radius mappings from file /etc/opt/freeradius/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP riceClass mapped to RADIUS Connect-Info
conns: 0x8184ac0
Module: Linked to module rlm_perl
Module: Instantiating perl
perl {
module = "/etc/opt/freeradius/chksum.pm"
func_authorize = "authorize"
func_authenticate = "authenticate"
func_accounting = "accounting"
func_preacct = "preacct"
func_checksimul = "checksimul"
func_detach = "detach"
func_xlat = "xlat"
func_pre_proxy = "pre_proxy"
func_post_proxy = "post_proxy"
func_post_auth = "post_auth"
}
perl {
max_clones = 32
start_clones = 32
min_spare_clones = 0
max_spare_clones = 32
cleanup_delay = 5
max_request_per_clone = 0
}
Module: Checking session {...} for more modules to load
Module: Linked to module rlm_radutmp
Module: Instantiating radutmp
radutmp {
filename = "/var/opt/freeradius/radutmp"
username = "%{User-Name}"
case_sensitive = yes
check_with_nas = yes
perm = 384
callerid = yes
}
Module: Checking post-proxy {...} for more modules to load
Module: Checking post-auth {...} for more modules to load
Module: Linked to module rlm_attr_filter
Module: Instantiating attr_filter.access_reject
attr_filter attr_filter.access_reject {
attrsfile = "/etc/opt/freeradius/attrs.access_reject"
key = "%{User-Name}"
}
}
}
modules {
Module: Checking authenticate {...} for more modules to load
Module: Checking authorize {...} for more modules to load
Module: Linked to module rlm_preprocess
Module: Instantiating preprocess
preprocess {
huntgroups = "/etc/opt/freeradius/huntgroups"
hints = "/etc/opt/freeradius/hints"
with_ascend_hack = no
ascend_channels_per_line = 23
with_ntdomain_hack = no
with_specialix_jetstream_hack = no
with_cisco_vsa_hack = no
with_alvarion_vsa_hack = no
}
Module: Checking preacct {...} for more modules to load
Module: Linked to module rlm_acct_unique
Module: Instantiating acct_unique
acct_unique {
key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
}
Module: Checking accounting {...} for more modules to load
Module: Linked to module rlm_detail
Module: Instantiating detail
detail {
detailfile = "/var/opt/freeradius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
header = "%t"
detailperm = 384
dirperm = 493
locking = no
log_packet_header = no
}
Module: Instantiating attr_filter.accounting_response
attr_filter attr_filter.accounting_response {
attrsfile = "/etc/opt/freeradius/attrs.accounting_response"
key = "%{User-Name}"
}
Module: Checking session {...} for more modules to load
Module: Checking post-proxy {...} for more modules to load
Module: Checking post-auth {...} for more modules to load
}
radiusd: #### Opening IP addresses and Ports ####
listen {
type = "auth"
ipaddr = *
port = 0
}
listen {
type = "acct"
ipaddr = *
port = 0
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on proxy address * port 1814
Ready to process requests.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=61, length=179
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 0x0202000d0173616e646d616e74
Message-Authenticator = 0x6cb90ae3dfb27eb9c5ab644244b83148
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 13
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[files] users: Matched entry DEFAULT at line 5
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Requiring client certificate
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 61 to 10.4.94.5 port 32770
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
EAP-Message = 0x010300060d20
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x71d989a171da84c36a2af864887ec5fa
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=62, length=190
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 0x020300060319
State = 0x71d989a171da84c36a2af864887ec5fa
Message-Authenticator = 0x53b929e758f817b151233d311b7eb552
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 3 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[files] users: Matched entry DEFAULT at line 5
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP NAK
[eap] EAP-NAK asked for EAP-Type/peap
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 62 to 10.4.94.5 port 32770
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
EAP-Message = 0x010400061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x71d989a170dd90c36a2af864887ec5fa
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=63, length=303
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 0x0204007719800000006d1603010068010000640301491d7b6bd46de6512e8b56cb99bab76931ded4c020e5c3c34d5f1384f7c9a78d000018002f00350005000ac009c00ac013c0140032003800130004010000230000000d000b00000873616e646d616e74000a00080006001700180019000b00020100
State = 0x71d989a170dd90c36a2af864887ec5fa
Message-Authenticator = 0x504d7f84eaaf660ee148a3cb13e97c17
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 4 length 119
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 109
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] (other): before/accept initialization
[peap] TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 0068], ClientHello
[peap] TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello
[peap] TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 084e], Certificate
[peap] TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
[peap] TLS_accept: SSLv3 write server done A
[peap] TLS_accept: SSLv3 flush data
[peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 63 to 10.4.94.5 port 32770
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x973082037fa0030201020201
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x71d989a173dc90c36a2af864887ec5fa
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=64, length=190
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 0x020500061900
State = 0x71d989a173dc90c36a2af864887ec5fa
Message-Authenticator = 0x2a9dbb9a2cf66ae2d1d7a4c7ebf1c90e
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 5 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 64 to 10.4.94.5 port 32770
EAP-Message = 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
EAP-Message = 0x6865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a0282010100c8366e0c6cb5dbb80194533d56cf051a5f34e614f83f3d498f4b51aeefd76d25da9486d7a72ab6215a84c71adbf78366ba95b91133f5ec8e802b199a4494fb259fd8a2c1ac06bae6e5bbac80d5d8a6ad1df7c527193fd84538466962e676c05149986860e2ca96966bc042ac49afbad3c8e3f1ebca2f38
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x9c651e6bd1f54787
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x71d989a172df90c36a2af864887ec5fa
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=65, length=190
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 0x020600061900
State = 0x71d989a172df90c36a2af864887ec5fa
Message-Authenticator = 0x6630f3c3daeced3a4a0e7a2e5a819c9f
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 6 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 65 to 10.4.94.5 port 32770
EAP-Message = 0x010700a5190009b557055ec4951539ce011e6c9d8f87487970d3fd810ce9a2bab97c84cf294c2f4fc91686db7dcbe43ed4efc390b1900a68004c10dd436d5a8d2ede2d8613afe2538be57542e2a2d1e944913729b51ebd2c88efe78411f5e97e79c0a376279693b42bc665064d6cec30ef6a571caef21d2d8bb5983d4e3eeb352d37e1e4293bd509dbe9d1d686fe7a841dbdc386006b23a810d2411016030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x71d989a175de90c36a2af864887ec5fa
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=66, length=522
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 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
EAP-Message = 0xae6315c58a61a5d4a453aa35e038571dfd720cc981fcf3ce14030100010116030100309a43d36ac8068550872ab4ca5fc0d22bb84c1208893e6256543c450c26d78a06bcf823060475a073ca5c9670c469b9ae
State = 0x71d989a175de90c36a2af864887ec5fa
Message-Authenticator = 0xbd121a9f49c72821bdda11b2f98d2835
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 7 length 253
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 326
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange
[peap] TLS_accept: SSLv3 read client key exchange A
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
[peap] <<< TLS 1.0 Handshake [length 0010], Finished
[peap] TLS_accept: SSLv3 read finished A
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
[peap] TLS_accept: SSLv3 write change cipher spec A
[peap] >>> TLS 1.0 Handshake [length 0010], Finished
[peap] TLS_accept: SSLv3 write finished A
[peap] TLS_accept: SSLv3 flush data
[peap] (other): SSL negotiation finished successfully
SSL Connection Established
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 66 to 10.4.94.5 port 32770
EAP-Message = 0x01080041190014030100010116030100306f2ea497585233d6e052d1fd8fa2c858be337517cc65f6d794d870cd83438fc8f7a6b2de2562a2b69bc63783d16b022d
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x71d989a174d190c36a2af864887ec5fa
Finished request 5.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=67, length=190
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 0x020800061900
State = 0x71d989a174d190c36a2af864887ec5fa
Message-Authenticator = 0xa02e258779ca93448b7ffa1863b1fce8
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 8 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3
[peap] eaptls_process returned 3
[peap] EAPTLS_SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 67 to 10.4.94.5 port 32770
EAP-Message = 0x0109002b19001703010020a84751428f91c0666e3f12d24a1d3ad69fbf52637767771db903b42af66a519a
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x71d989a177d090c36a2af864887ec5fa
Finished request 6.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=68, length=227
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 0x0209002b1900170301002004c32f63d773a8a7af999236528a78de128a2718d7b79fb0c66b100a8e804a08
State = 0x71d989a177d090c36a2af864887ec5fa
Message-Authenticator = 0xf5ae11628f0cd23741f167f705410764
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 9 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] Identity - sandmant
[peap] Got tunnled request
EAP-Message = 0x0209000d0173616e646d616e74
server (null) {
PEAP: Got tunneled identity of sandmant
PEAP: Setting default EAP type for tunneled EAP session.
PEAP: Setting User-Name to sandmant
Sending tunneled request
EAP-Message = 0x0209000d0173616e646d616e74
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "sandmant"
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 9 length 13
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] expand: %{Client-IP-Address} -> 10.4.94.5
[files] users: Matched entry DEFAULT at line 14
++[files] returns ok
++- entering redundant-load-balance group redundant_ldap {...}
[ldap3] performing user authorization for sandmant
[ldap3] expand: %{Stripped-User-Name} ->
[ldap3] expand: %{User-Name} -> sandmant
[ldap3] expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) -> (uid=sandmant)
[ldap3] expand: ou=People,dc=rice,dc=edu -> ou=People,dc=rice,dc=edu
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: attempting LDAP reconnection
rlm_ldap: (re)connect to hidden3.example.com:389, authentication 0
rlm_ldap: bind as cn=radius,ou=Service Accounts,dc=rice,dc=edu/CMRh<k=5 to hidden3.example.com:389
rlm_ldap: waiting for bind result ...
rlm_ldap: Bind was successful
rlm_ldap: performing search in ou=People,dc=rice,dc=edu, with filter (uid=sandmant)
[ldap3] checking if remote access for sandmant is allowed by riceClass
[ldap3] looking for check items in directory...
[ldap3] looking for reply items in directory...
rlm_ldap: riceClass -> Connect-Info = "graduate student"
WARNING: No "known good" password was found in LDAP. Are you sure that the user is configured correctly?
[ldap3] user sandmant authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
+++[ldap3] returns ok
++- redundant-load-balance group redundant_ldap returns ok
expand: %{reply:Connect-Info} -> graduate student
expand: %{Connect-Info} ->
++[outer.reply] returns ok
++? if (reply:Connect-Info =~ /[a-z]* student/)
? Evaluating (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++? if (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++- entering if (reply:Connect-Info =~ /[a-z]* student/) {...}
+++[outer.reply] returns ok
++- if (reply:Connect-Info =~ /[a-z]* student/) returns ok
++ ... skipping elsif for request 7: Preceding "if" was taken
perl_pool: item 0x81a33b8 asigned new request. Handled so far: 1
found interpetator at address 0x81a33b8
rlm_perl: Added pair User-Name = sandmant
rlm_perl: Added pair EAP-Message = 0x0209000d0173616e646d616e74
rlm_perl: Added pair EAP-Type = Identity
rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1
rlm_perl: Added pair Connect-Info = graduate student
rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
rlm_perl: Added pair Tunnel-Type = VLAN
rlm_perl: Added pair Tunnel-Private-Group-Id = student07
rlm_perl: Added pair Ldap-UserDn = uid=sandmant, ou=People, dc=rice, dc=edu
rlm_perl: Added pair Auth-Type = EAP
rlm_perl: Added pair Proxy-To-Realm = LOCAL
rlm_perl: Added pair EAP-Type = MS-CHAP-V2
perl_pool total/active/spare [32/0/32]
Unreserve perl at address 0x81a33b8
++[perl] returns updated
expand: %{reply:Tunnel-Private-Group-Id} -> student07
++[outer.reply] returns updated
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
Connect-Info = "graduate student"
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Type:0 = VLAN
Tunnel-Private-Group-Id:0 = "student07"
EAP-Message = 0x010a00221a010a001d1029513f3e30f0f6ba065de8b33d717bd373616e646d616e74
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x6160811d616a9b330ce06b68115ade9f
[peap] Got tunneled reply RADIUS code 11
Connect-Info = "graduate student"
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Type:0 = VLAN
Tunnel-Private-Group-Id:0 = "student07"
EAP-Message = 0x010a00221a010a001d1029513f3e30f0f6ba065de8b33d717bd373616e646d616e74
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x6160811d616a9b330ce06b68115ade9f
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 68 to 10.4.94.5 port 32770
Cisco-AVPair = "graduate student"
Class = 0x4f553d7374756465
Connect-Info = "student"
Tunnel-Private-Group-Id:0 = "student07"
EAP-Message = 0x010a004b19001703010040f24f31548b07401c673432bc27546ef8eaebc3a29948350dad5b2fffa788fe7d079dfe1c0fe3adff7d7849011d6b8f547750002e304efda101bcdbdf71e227d2
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x71d989a176d390c36a2af864887ec5fa
Finished request 7.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=69, length=291
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 0x020a006b1900170301006081b7a7edcceeb48df5a8d5c318311a0d6f2b4b0d44dfff282df72c6e96c7771a88bfe356bda6efd66ffc59c55ff64cd2786cd23a26a2ef8e7d9c37dcc8e94c547e0ddc221bd311d2c5afc77b388c0c995feb83dd3011eb8ed77360ad53a32446
State = 0x71d989a176d390c36a2af864887ec5fa
Message-Authenticator = 0xdf5ffeb755af38218dd46ca0ffff09df
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 10 length 107
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunnled request
EAP-Message = 0x020a00431a020a003e31a9dcc41e7b6d92ddc14c1eeccdadf3fa000000000000000047a83ae19d3ecbb0c76239591a6d830087c3d608b2956fd90073616e646d616e74
server (null) {
PEAP: Setting User-Name to sandmant
Sending tunneled request
EAP-Message = 0x020a00431a020a003e31a9dcc41e7b6d92ddc14c1eeccdadf3fa000000000000000047a83ae19d3ecbb0c76239591a6d830087c3d608b2956fd90073616e646d616e74
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "sandmant"
State = 0x6160811d616a9b330ce06b68115ade9f
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 10 length 67
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] expand: %{Client-IP-Address} -> 10.4.94.5
[files] users: Matched entry DEFAULT at line 14
++[files] returns ok
++- entering redundant-load-balance group redundant_ldap {...}
[ldap2] performing user authorization for sandmant
[ldap2] expand: %{Stripped-User-Name} ->
[ldap2] expand: %{User-Name} -> sandmant
[ldap2] expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) -> (uid=sandmant)
[ldap2] expand: ou=People,dc=rice,dc=edu -> ou=People,dc=rice,dc=edu
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: attempting LDAP reconnection
rlm_ldap: (re)connect to hidden2.example.com:389, authentication 0
rlm_ldap: bind as cn=radius,ou=Service Accounts,dc=rice,dc=edu/CMRh<k=5 to hidden2.example.com:389
rlm_ldap: waiting for bind result ...
rlm_ldap: Bind was successful
rlm_ldap: performing search in ou=People,dc=rice,dc=edu, with filter (uid=sandmant)
[ldap2] checking if remote access for sandmant is allowed by riceClass
[ldap2] looking for check items in directory...
[ldap2] looking for reply items in directory...
rlm_ldap: riceClass -> Connect-Info = "graduate student"
WARNING: No "known good" password was found in LDAP. Are you sure that the user is configured correctly?
[ldap2] user sandmant authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
+++[ldap2] returns ok
++- redundant-load-balance group redundant_ldap returns ok
expand: %{reply:Connect-Info} -> graduate student
expand: %{Connect-Info} ->
++[outer.reply] returns ok
++? if (reply:Connect-Info =~ /[a-z]* student/)
? Evaluating (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++? if (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++- entering if (reply:Connect-Info =~ /[a-z]* student/) {...}
+++[outer.reply] returns ok
++- if (reply:Connect-Info =~ /[a-z]* student/) returns ok
++ ... skipping elsif for request 8: Preceding "if" was taken
perl_pool: item 0x8723dc0 asigned new request. Handled so far: 1
found interpetator at address 0x8723dc0
rlm_perl: Added pair User-Name = sandmant
rlm_perl: Added pair EAP-Message = 0x020a00431a020a003e31a9dcc41e7b6d92ddc14c1eeccdadf3fa000000000000000047a83ae19d3ecbb0c76239591a6d830087c3d608b2956fd90073616e646d616e74
rlm_perl: Added pair EAP-Type = MS-CHAP-V2
rlm_perl: Added pair State = 0x6160811d616a9b330ce06b68115ade9f
rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1
rlm_perl: Added pair Connect-Info = graduate student
rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
rlm_perl: Added pair Tunnel-Type = VLAN
rlm_perl: Added pair Tunnel-Private-Group-Id = student07
rlm_perl: Added pair Ldap-UserDn = uid=sandmant, ou=People, dc=rice, dc=edu
rlm_perl: Added pair Auth-Type = EAP
rlm_perl: Added pair Proxy-To-Realm = LOCAL
perl_pool total/active/spare [32/0/32]
Unreserve perl at address 0x8723dc0
++[perl] returns updated
expand: %{reply:Tunnel-Private-Group-Id} -> student07
++[outer.reply] returns updated
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] +- entering group MS-CHAP {...}
[mschap] No Cleartext-Password configured. Cannot create LM-Password.
[mschap] No Cleartext-Password configured. Cannot create NT-Password.
[mschap] Told to do MS-CHAPv2 for sandmant with NT-Password
[mschap] expand: --username=%{mschap:User-Name:-None} -> --username=sandmant
[mschap] No NT-Domain was found in the User-Name.
[mschap] expand: --domain=%{mschap:NT-Domain:-ADRICE} -> --domain=ADRICE
[mschap] mschap2: 29
[mschap] expand: --challenge=%{mschap:Challenge:-00} -> --challenge=bccb76cc35a2bd84
[mschap] expand: --nt-response=%{mschap:NT-Response:-00} -> --nt-response=47a83ae19d3ecbb0c76239591a6d830087c3d608b2956fd9
Exec-Program output: NT_KEY: 48BE312067001CB407403A0F477DE48A
Exec-Program-Wait: plaintext: NT_KEY: 48BE312067001CB407403A0F477DE48A
Exec-Program: returned: 0
[mschap] adding MS-CHAPv2 MPPE keys
++[mschap] returns ok
MSCHAP Success
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
Connect-Info = "graduate student"
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Type:0 = VLAN
Tunnel-Private-Group-Id:0 = "student07"
EAP-Message = 0x010b00331a030a002e533d35463834343143304635333637333642373341303942454345443041433943463841393335353443
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x6160811d606b9b330ce06b68115ade9f
[peap] Got tunneled reply RADIUS code 11
Connect-Info = "graduate student"
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Type:0 = VLAN
Tunnel-Private-Group-Id:0 = "student07"
EAP-Message = 0x010b00331a030a002e533d35463834343143304635333637333642373341303942454345443041433943463841393335353443
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x6160811d606b9b330ce06b68115ade9f
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 69 to 10.4.94.5 port 32770
Cisco-AVPair = "graduate student"
Class = 0x4f553d7374756465
Connect-Info = "student"
Tunnel-Private-Group-Id:0 = "student07"
EAP-Message = 0x010b005b1900170301005051b354971aac95ff996e2bba913786db5d374b8bff99f040d8ab1963a1a95cb9b9c2193c9103995942772467fcc2175fdb0c1ec8637b95bbb833036b13ac39ed71bf25f4007d905fd01253bdefa3c3fa
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x71d989a179d290c36a2af864887ec5fa
Finished request 8.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=70, length=227
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 0x020b002b19001703010020b7a46bd1e7ca2d4c285dc3777fecb15c9c2cac92c68d35b1f1cd7e42cfdc8fc1
State = 0x71d989a179d290c36a2af864887ec5fa
Message-Authenticator = 0x4c098300db8d51f88c29a607960c9823
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 11 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] EAP type mschapv2
[peap] Got tunnled request
EAP-Message = 0x020b00061a03
server (null) {
PEAP: Setting User-Name to sandmant
Sending tunneled request
EAP-Message = 0x020b00061a03
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "sandmant"
State = 0x6160811d606b9b330ce06b68115ade9f
server inner-tunnel {
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
++[unix] returns notfound
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 11 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] expand: %{Client-IP-Address} -> 10.4.94.5
[files] users: Matched entry DEFAULT at line 14
++[files] returns ok
++- entering redundant-load-balance group redundant_ldap {...}
[ldap2] performing user authorization for sandmant
[ldap2] expand: %{Stripped-User-Name} ->
[ldap2] expand: %{User-Name} -> sandmant
[ldap2] expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) -> (uid=sandmant)
[ldap2] expand: ou=People,dc=rice,dc=edu -> ou=People,dc=rice,dc=edu
rlm_ldap: ldap_get_conn: Checking Id: 0
rlm_ldap: ldap_get_conn: Got Id: 0
rlm_ldap: performing search in ou=People,dc=rice,dc=edu, with filter (uid=sandmant)
[ldap2] checking if remote access for sandmant is allowed by riceClass
[ldap2] looking for check items in directory...
[ldap2] looking for reply items in directory...
rlm_ldap: riceClass -> Connect-Info = "graduate student"
WARNING: No "known good" password was found in LDAP. Are you sure that the user is configured correctly?
[ldap2] user sandmant authorized to use remote access
rlm_ldap: ldap_release_conn: Release Id: 0
+++[ldap2] returns ok
++- redundant-load-balance group redundant_ldap returns ok
expand: %{reply:Connect-Info} -> graduate student
expand: %{Connect-Info} ->
++[outer.reply] returns ok
++? if (reply:Connect-Info =~ /[a-z]* student/)
? Evaluating (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++? if (reply:Connect-Info =~ /[a-z]* student/) -> TRUE
++- entering if (reply:Connect-Info =~ /[a-z]* student/) {...}
+++[outer.reply] returns ok
++- if (reply:Connect-Info =~ /[a-z]* student/) returns ok
++ ... skipping elsif for request 9: Preceding "if" was taken
perl_pool: item 0x893fdb8 asigned new request. Handled so far: 1
found interpetator at address 0x893fdb8
rlm_perl: Added pair User-Name = sandmant
rlm_perl: Added pair EAP-Message = 0x020b00061a03
rlm_perl: Added pair EAP-Type = MS-CHAP-V2
rlm_perl: Added pair State = 0x6160811d606b9b330ce06b68115ade9f
rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1
rlm_perl: Added pair Connect-Info = graduate student
rlm_perl: Added pair Tunnel-Medium-Type = IEEE-802
rlm_perl: Added pair Tunnel-Type = VLAN
rlm_perl: Added pair Tunnel-Private-Group-Id = student07
rlm_perl: Added pair Ldap-UserDn = uid=sandmant, ou=People, dc=rice, dc=edu
rlm_perl: Added pair Auth-Type = EAP
rlm_perl: Added pair Proxy-To-Realm = LOCAL
perl_pool total/active/spare [32/0/32]
Unreserve perl at address 0x893fdb8
++[perl] returns updated
expand: %{reply:Tunnel-Private-Group-Id} -> student07
++[outer.reply] returns updated
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[eap] Freeing handler
++[eap] returns ok
} # server inner-tunnel
[peap] Got tunneled reply code 2
Connect-Info = "graduate student"
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Type:0 = VLAN
Tunnel-Private-Group-Id:0 = "student07"
EAP-Message = 0x030b0004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "sandmant"
[peap] Got tunneled reply RADIUS code 2
Connect-Info = "graduate student"
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Type:0 = VLAN
Tunnel-Private-Group-Id:0 = "student07"
EAP-Message = 0x030b0004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "sandmant"
[peap] Tunneled authentication was successful.
[peap] SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 70 to 10.4.94.5 port 32770
Cisco-AVPair = "graduate student"
Class = 0x4f553d7374756465
Connect-Info = "student"
Tunnel-Private-Group-Id:0 = "student07"
EAP-Message = 0x010c002b19001703010020f492aebcb077483ae92253c796f75b874739b50bc21b158871db1bba4a9abb41
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x71d989a178d590c36a2af864887ec5fa
Finished request 9.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host 10.4.94.5 port 32770, id=71, length=227
User-Name = "sandmant"
Calling-Station-Id = "00-1A-73-BD-6E-58"
Called-Station-Id = "00-0B-85-98-E8-80:Rice-Testing"
NAS-Port = 29
NAS-IP-Address = 10.4.94.5
NAS-Identifier = "WLC4"
Airespace-Wlan-Id = 1
Service-Type = Framed-User
Framed-MTU = 1300
NAS-Port-Type = Wireless-802.11
Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
Tunnel-Private-Group-Id:0 = "740"
EAP-Message = 0x020c002b190017030100200171cffb2f33d228eaff37a177f53578070c5008e5131243cb7517b7937d547f
State = 0x71d989a178d590c36a2af864887ec5fa
Message-Authenticator = 0x6fbae1e6071b80d7288dec550683985d
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "sandmant", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 12 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] Received EAP-TLV response.
[peap] Success
[eap] Freeing handler
++[eap] returns ok
+- entering group post-auth {...}
++[exec] returns noop
Sending Access-Accept of id 71 to 10.4.94.5 port 32770
MS-MPPE-Recv-Key = 0x4a00fb562f5d3b32c23403d20f8da6fbde96e5d068a650911ccc4f751d2c597d
MS-MPPE-Send-Key = 0x8f5acbc6a497eb9a7f3034a870f071cf750b1591161daec411f780843da1091d
EAP-Message = 0x030c0004
Message-Authenticator = 0x00000000000000000000000000000000
User-Name = "sandmant"
Finished request 10.
Going to the next request
Waking up in 4.8 seconds.
Cleaning up request 0 ID 61 with timestamp +33
Cleaning up request 1 ID 62 with timestamp +33
Cleaning up request 2 ID 63 with timestamp +33
Cleaning up request 3 ID 64 with timestamp +33
Cleaning up request 4 ID 65 with timestamp +33
Cleaning up request 5 ID 66 with timestamp +33
Cleaning up request 6 ID 67 with timestamp +33
Cleaning up request 7 ID 68 with timestamp +33
Cleaning up request 8 ID 69 with timestamp +33
Cleaning up request 9 ID 70 with timestamp +33
Cleaning up request 10 ID 71 with timestamp +33
Ready to process requests.
More information about the Freeradius-Users
mailing list