XP windows Validating identity blues

scott woodard jjcheap at yahoo.com
Thu Sep 18 17:21:20 CEST 2008


Hi,

I commented out realms in proxy.conf

This is the output of radiusd -X -z

I am still getting rlm_realm: No '@' in User-Name = "scott", looking up realm NULL..

       Message-Authenticator = 0x1fbb1743154dc6aa8cd2ecbdd581ed69
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 2
  modcall[authorize]: module "preprocess" returns ok for request 2
  modcall[authorize]: module "chap" returns noop for request 2
  modcall[authorize]: module "mschap" returns noop for request 2
    rlm_realm: No '@' in User-Name = "scott", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 2
  rlm_eap: EAP packet type response id 2 length 80
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 2
    users: Matched entry scott at line 3
  modcall[authorize]: module "files" returns ok for request 2
modcall: leaving group authorize (returns updated) for request 2
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 2
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls:  Length Included
  eaptls_verify returned 11
    (other): before/accept initialization
    TLS_accept: before/accept initialization
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0041], ClientHello
    TLS_accept: SSLv3 read client hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
    TLS_accept: SSLv3 write server hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 02a5], Certificate
    TLS_accept: SSLv3 write certificate A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
    TLS_accept: SSLv3 write server done A
    TLS_accept: SSLv3 flush data
    TLS_accept:error in SSLv3 read client certificate A
rlm_eap: SSL error error:00000000:lib(0):func(0):reason(0)
In SSL Handshake Phase
In SSL Accept mode
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
  modcall[authenticate]: module "eap" returns handled for request 2
modcall: leaving group authenticate (returns handled) for request 2
Sending Access-Challenge of id 0 to 10.10.0.201 port 2048
        EAP-Message = 0x010303081900160301004a02000046030148d270a174e83ec6b53b03df4ea22ff71e419b2de79c2a0c4f7e51035129b6982047db479901c5a2b337c7592a6c3e9d73dd65ebaae67c259ac51781e4746abc4e00040016030102a50b0002a100029e00029b3082029730820200a003020102020101300d06092a864886f70d0101050500308184310b3009060355040613025553310d300b0603550408130455746168311730150603550407130e53616c74204c616b6520436974793111300f060355040a1308515349436f72702e3119301706035504031310776966692e717369636f72702e636f6d311f301d06092a864886f70d0109011610726f6f
        EAP-Message = 0x7440717369636f72702e636f6d301e170d3038303931303139313533345a170d3039303931303139313533345a308184310b3009060355040613025553310d300b0603550408130455746168311730150603550407130e53616c74204c616b6520436974793111300f060355040a1308515349436f72702e3119301706035504031310776966692e717369636f72702e636f6d311f301d06092a864886f70d0109011610726f6f7440717369636f72702e636f6d30819f300d06092a864886f70d010101050003818d0030818902818100ea33b7b4a37f308cda4bea2de4254e01abe8e2cea27f7269fa54f4c10a74de86ea229053cf0a57b190951512
        EAP-Message = 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
        EAP-Message = 0x2b9c9d21007d9a2416030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0x8a7dad9c7c57aec946dd0e6e8c74360b

Any suggestions ?

thanks
Scott


--- On Wed, 9/17/08, tnt at kalik.net <tnt at kalik.net> wrote:
From: tnt at kalik.net <tnt at kalik.net>
Subject: Re: XP windows Validating identity blues
To: freeradius-users at lists.freeradius.org
Date: Wednesday, September 17, 2008, 4:01 PM

>    rlm_realm: No '@' in User-Name = "scott", looking
up realm NULL
>    rlm_realm: Found realm "NULL"
>    rlm_realm: Adding Stripped-User-Name = "scott"
>    rlm_realm: Proxying request from user scott to realm NULL
>    rlm_realm: Adding Realm = "NULL"
>    rlm_realm: Preparing to proxy authentication request to realm
"NULL"
>  modcall[authorize]: module "suffix" returns updated for
request 0
>  rlm_eap: Request is supposed to be proxied to Realm NULL.  Not doing
EAP.
>  modcall[authorize]: module "eap" returns noop for request 0

You are using outdated version of the server in which realm NULL is
active in proxy.conf. Update. Processing peap with virtual servers works
great "out of the box". Or comment that entry out and try again.

Ivan Kalik
Kalik Informatika ISP

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



      
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20080918/27bf6ce5/attachment.html>


More information about the Freeradius-Users mailing list