Reject problems w/ v 2.1.3
Chhaya, Harshal
hchhaya at ti.com
Fri Mar 6 03:05:34 CET 2009
Hi,
I need to upgrade our freeRADIUS 1.1.7 config to 2.1.3 on
an embedded Linux platform.
I can build everything just fine but all our authentication
attempts are rejected. I didn't do the 1.1.7 work so I am
sure I am missing something simple.
This is for a private wireless network using WPA2-PEAP.
Looks like a config screwup somewhere but I can't figure out
which specific config is causing this to fail.
The users file is:
"000000093701a89d" Cleartext-Password == "66e3c1cd773f487d"
(It used to be: "000000093701a89d" User-Password == "66e3c1cd773f487d")
The log from 'radiusd -X' is below:
(Apologies for the long log but I didn't know which stuff is
important and which isn't)
Thanks for your patience and help,
- Harshal
FreeRADIUS Version 2.1.3, for host arm-unknown-linux-gnu, built on Mar 5 2009 at 05:10:53
Copyright (C) 1999-2008 The FreeRADIUS server project and contributors.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License v2.
Starting - reading configuration files ...
including configuration file /usr/etc/raddb/radiusd.conf
including configuration file /usr/etc/raddb/proxy.conf
including configuration file /usr/etc/raddb/clients.conf
including files in directory /usr/etc/raddb/modules/
including configuration file /usr/etc/raddb/modules/passwd
including configuration file /usr/etc/raddb/modules/expiration
including configuration file /usr/etc/raddb/modules/checkval
including configuration file /usr/etc/raddb/modules/acct_unique
including configuration file /usr/etc/raddb/modules/mac2vlan
including configuration file /usr/etc/raddb/modules/echo
including configuration file /usr/etc/raddb/modules/etc_group
including configuration file /usr/etc/raddb/modules/perl
including configuration file /usr/etc/raddb/modules/expr
including configuration file /usr/etc/raddb/modules/krb5
including configuration file /usr/etc/raddb/modules/smbpasswd
including configuration file /usr/etc/raddb/modules/exec
including configuration file /usr/etc/raddb/modules/mschap
including configuration file /usr/etc/raddb/modules/unix
including configuration file /usr/etc/raddb/modules/linelog
including configuration file /usr/etc/raddb/modules/pam
including configuration file /usr/etc/raddb/modules/detail.example.com
including configuration file /usr/etc/raddb/modules/policy
including configuration file /usr/etc/raddb/modules/sql_log
including configuration file /usr/etc/raddb/modules/always
including configuration file /usr/etc/raddb/modules/logintime
including configuration file /usr/etc/raddb/modules/chap
including configuration file /usr/etc/raddb/modules/preprocess
including configuration file /usr/etc/raddb/modules/attr_rewrite
including configuration file /usr/etc/raddb/modules/inner-eap
including configuration file /usr/etc/raddb/modules/wimax
including configuration file /usr/etc/raddb/modules/mac2ip
including configuration file /usr/etc/raddb/modules/radutmp
including configuration file /usr/etc/raddb/modules/detail
including configuration file /usr/etc/raddb/modules/ldap
including configuration file /usr/etc/raddb/modules/detail.log
including configuration file /usr/etc/raddb/modules/attr_filter
including configuration file /usr/etc/raddb/modules/pap
including configuration file /usr/etc/raddb/modules/ippool
including configuration file /usr/etc/raddb/modules/realm
including configuration file /usr/etc/raddb/modules/digest
including configuration file /usr/etc/raddb/modules/counter
including configuration file /usr/etc/raddb/modules/sqlcounter_expire_on_login
including configuration file /usr/etc/raddb/modules/files
including configuration file /usr/etc/raddb/modules/sradutmp
including configuration file /usr/etc/raddb/eap.conf
including configuration file /usr/etc/raddb/sql.conf
including configuration file /usr/etc/raddb/sql/mysql/dialup.conf
including configuration file /usr/etc/raddb/sql/mysql/counter.conf
including configuration file /usr/etc/raddb/policy.conf
including files in directory /usr/etc/raddb/sites-enabled/
including configuration file /usr/etc/raddb/sites-enabled/default
including configuration file /usr/etc/raddb/sites-enabled/inner-tunnel
including dictionary file /usr/etc/raddb/dictionary
main {
prefix = "/usr"
localstatedir = "/tmp"
logdir = "/tmp"
libdir = "/usr/lib"
radacctdir = "/tmp/radacct"
hostname_lookups = no
max_request_time = 30
cleanup_delay = 5
max_requests = 1024
allow_core_dumps = no
pidfile = "/tmp/radiusd.pid"
checkrad = "/usr/sbin/checkrad"
debug_level = 0
proxy_requests = yes
log {
stripped_names = no
auth = no
auth_badpass = no
auth_goodpass = no
}
security {
max_attributes = 200
reject_delay = 1
status_server = yes
}
}
client localhost {
ipaddr = 127.0.0.1
require_message_authenticator = no
secret = "testing123"
nastype = "other"
}
client 192.168.0.232/24 {
require_message_authenticator = no
secret = "testing123"
shortname = "test-net"
}
radiusd: #### Loading Realms and Home Servers ####
proxy server {
retry_delay = 5
retry_count = 3
default_fallback = no
dead_time = 120
wake_all_if_all_dead = no
}
home_server localhost {
ipaddr = 127.0.0.1
port = 1812
type = "auth"
secret = "testing123"
response_window = 20
max_outstanding = 65536
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
num_answers_to_alive = 3
num_pings_to_alive = 3
revive_interval = 120
status_check_timeout = 4
}
home_server_pool my_auth_failover {
type = fail-over
home_server = localhost
}
realm example.com {
auth_pool = my_auth_failover
}
realm LOCAL {
}
radiusd: #### Instantiating modules ####
instantiate {
Module: Linked to module rlm_exec
Module: Instantiating exec
exec {
wait = no
input_pairs = "request"
shell_escape = yes
}
Module: Linked to module rlm_expr
Module: Instantiating expr
Module: Linked to module rlm_expiration
Module: Instantiating expiration
expiration {
reply-message = "Password Has Expired "
}
Module: Linked to module rlm_logintime
Module: Instantiating logintime
logintime {
reply-message = "You are calling outside your allowed timespan "
minimum-timeout = 60
}
}
radiusd: #### Loading Virtual Servers ####
server inner-tunnel {
modules {
Module: Checking authenticate {...} for more modules to load
Module: Linked to module rlm_pap
Module: Instantiating pap
pap {
encryption_scheme = "auto"
auto_header = yes
}
Module: Linked to module rlm_chap
Module: Instantiating chap
Module: Linked to module rlm_mschap
Module: Instantiating mschap
mschap {
use_mppe = yes
require_encryption = yes
require_strong = yes
with_ntdomain_hack = no
}
Module: Linked to module rlm_unix
Module: Instantiating unix
unix {
radwtmp = "/tmp/radwtmp"
}
Module: Linked to module rlm_eap
Module: Instantiating eap
eap {
default_eap_type = "peap"
timer_expire = 60
ignore_unknown_eap_types = no
cisco_accounting_username_bug = no
max_sessions = 2048
}
Module: Linked to sub-module rlm_eap_md5
Module: Instantiating eap-md5
Module: Linked to sub-module rlm_eap_leap
Module: Instantiating eap-leap
Module: Linked to sub-module rlm_eap_gtc
Module: Instantiating eap-gtc
gtc {
challenge = "Password: "
auth_type = "PAP"
}
Module: Linked to sub-module rlm_eap_tls
Module: Instantiating eap-tls
tls {
rsa_key_exchange = no
dh_key_exchange = yes
rsa_key_length = 512
dh_key_length = 512
verify_depth = 0
pem_file_type = yes
private_key_file = "/usr/etc/raddb/certs/server.pem"
certificate_file = "/usr/etc/raddb/certs/server.pem"
CA_file = "/usr/etc/raddb/certs/ca.pem"
private_key_password = "whatever"
dh_file = "/usr/etc/raddb/certs/dh"
random_file = "/usr/etc/raddb/certs/random"
fragment_size = 1024
include_length = yes
check_crl = no
cipher_list = "DEFAULT"
make_cert_command = "/usr/etc/raddb/certs/bootstrap"
cache {
enable = no
lifetime = 24
max_entries = 255
}
}
Module: Linked to sub-module rlm_eap_ttls
Module: Instantiating eap-ttls
ttls {
default_eap_type = "md5"
copy_request_to_tunnel = no
use_tunneled_reply = no
virtual_server = "inner-tunnel"
}
Module: Linked to sub-module rlm_eap_peap
Module: Instantiating eap-peap
peap {
default_eap_type = "mschapv2"
copy_request_to_tunnel = no
use_tunneled_reply = no
proxy_tunneled_request_as_eap = yes
virtual_server = "inner-tunnel"
}
Module: Linked to sub-module rlm_eap_mschapv2
Module: Instantiating eap-mschapv2
mschapv2 {
with_ntdomain_hack = no
}
Module: Checking authorize {...} for more modules to load
Module: Linked to module rlm_realm
Module: Instantiating suffix
realm suffix {
format = "suffix"
delimiter = "@"
ignore_default = no
ignore_null = no
}
Module: Linked to module rlm_files
Module: Instantiating files
files {
usersfile = "/tmp/users"
acctusersfile = "/usr/etc/raddb/acct_users"
preproxy_usersfile = "/usr/etc/raddb/preproxy_users"
compat = "no"
}
Module: Checking session {...} for more modules to load
Module: Linked to module rlm_radutmp
Module: Instantiating radutmp
radutmp {
filename = "/tmp/radutmp"
username = "%{User-Name}"
case_sensitive = yes
check_with_nas = yes
perm = 384
callerid = yes
}
Module: Checking post-proxy {...} for more modules to load
}
}
modules {
Module: Checking authenticate {...} for more modules to load
Module: Checking authorize {...} for more modules to load
Module: Linked to module rlm_preprocess
Module: Instantiating preprocess
preprocess {
huntgroups = "/usr/etc/raddb/huntgroups"
hints = "/usr/etc/raddb/hints"
with_ascend_hack = no
ascend_channels_per_line = 23
with_ntdomain_hack = no
with_specialix_jetstream_hack = no
with_cisco_vsa_hack = no
with_alvarion_vsa_hack = no
}
Module: Checking preacct {...} for more modules to load
Module: Linked to module rlm_acct_unique
Module: Instantiating acct_unique
acct_unique {
key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
}
Module: Checking accounting {...} for more modules to load
Module: Linked to module rlm_detail
Module: Instantiating detail
detail {
detailfile = "/tmp/radacct/%{Client-IP-Address}/detail-%Y%m%d"
header = "%t"
detailperm = 384
dirperm = 493
locking = no
log_packet_header = no
}
Module: Linked to module rlm_attr_filter
Module: Instantiating attr_filter.accounting_response
attr_filter attr_filter.accounting_response {
attrsfile = "/usr/etc/raddb/attrs.accounting_response"
key = "%{User-Name}"
}
Module: Checking session {...} for more modules to load
Module: Checking post-proxy {...} for more modules to load
Module: Checking post-auth {...} for more modules to load
Module: Instantiating attr_filter.access_reject
attr_filter attr_filter.access_reject {
attrsfile = "/usr/etc/raddb/attrs.access_reject"
key = "%{User-Name}"
}
}
radiusd: #### Opening IP addresses and Ports ####
listen {
type = "auth"
ipaddr = *
port = 0
}
listen {
type = "acct"
ipaddr = *
port = 0
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on proxy address * port 1814
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.0.232 port 1095, id=185, length=212
Message-Authenticator = 0xe0f835e34ec645b5600372b7db84b633
Service-Type = Framed-User
User-Name = "000000093701b60b"
Framed-MTU = 1488
Called-Station-Id = "001E2AFFFED9:TI-NAV-N-001E2AFFFED9"
Calling-Station-Id = "00093701B60B"
NAS-Identifier = "netgearfffed8"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x020100150130303030303030393337303162363062
NAS-IP-Address = 192.168.0.232
NAS-Port = 2
NAS-Port-Id = "STA port # 2"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "000000093701b60b", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 1 length 21
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 185 to 192.168.0.232 port 1095
EAP-Message = 0x010200061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xa0b48160a0b698cec6597cf0a57b9d1c
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1095, id=186, length=295
Message-Authenticator = 0x5d895818b52213e57ca6df8ee6e2d19c
Service-Type = Framed-User
User-Name = "000000093701b60b"
Framed-MTU = 1488
State = 0xa0b48160a0b698cec6597cf0a57b9d1c
Called-Station-Id = "001E2AFFFED9:TI-NAV-N-001E2AFFFED9"
Calling-Station-Id = "00093701B60B"
NAS-Identifier = "netgearfffed8"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x0202005619800000004c16030100470100004303014598559d10840d3a4766c7b1ae31ba3b92bc5b690c2b8c52eaabcda9d5727fcb00001c0016000a0005000400640062006100600015000900140008000600030100
NAS-IP-Address = 192.168.0.232
NAS-Port = 2
NAS-Port-Id = "STA port # 2"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "000000093701b60b", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 86
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 76
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] (other): before/accept initialization
[peap] TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 0047], ClientHello
[peap] TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello
[peap] TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 085e], Certificate
[peap] TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
[peap] TLS_accept: SSLv3 write key exchange A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
[peap] TLS_accept: SSLv3 write server done A
[peap] TLS_accept: SSLv3 flush data
[peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 186 to 192.168.0.232 port 1095
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xa73082038fa0030201020209
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xa0b48160a1b798cec6597cf0a57b9d1c
Finished request 1.
Going to the next request
Waking up in 3.5 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1095, id=186, length=295
Sending duplicate reply to client test-net port 1095 - ID: 186
Sending Access-Challenge of id 186 to 192.168.0.232 port 1095
Waking up in 3.5 seconds.
Cleaning up request 0 ID 185 with timestamp +0
Waking up in 1.4 seconds.
Cleaning up request 1 ID 186 with timestamp +0
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.0.232 port 1096, id=187, length=212
Message-Authenticator = 0x4c97bf19ac4fa2df52ab10ad61de5c03
Service-Type = Framed-User
User-Name = "000000093701b6c7"
Framed-MTU = 1488
Called-Station-Id = "001E2AFFFED9:TI-NAV-N-001E2AFFFED9"
Calling-Station-Id = "00093701B6C7"
NAS-Identifier = "netgearfffed8"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x020000150130303030303030393337303162366337
NAS-IP-Address = 192.168.0.232
NAS-Port = 1
NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "000000093701b6c7", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 0 length 21
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 187 to 192.168.0.232 port 1096
EAP-Message = 0x010100061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x3b2107603b201e8dfa81b0190ae2e8a5
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1098, id=188, length=212
Message-Authenticator = 0x73ebf1ad24a8f0ecd41f0e7474a09497
Service-Type = Framed-User
User-Name = "000000093701b5fc"
Framed-MTU = 1488
Called-Station-Id = "001E2AFFFED9:TI-NAV-N-001E2AFFFED9"
Calling-Station-Id = "00093701B5FC"
NAS-Identifier = "netgearfffed8"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x020000150130303030303030393337303162356663
NAS-IP-Address = 192.168.0.232
NAS-Port = 2
NAS-Port-Id = "STA port # 2"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "000000093701b5fc", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 0 length 21
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 188 to 192.168.0.232 port 1098
EAP-Message = 0x010100061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xb31e13c2b31f0a5eb51d4c7224b622d0
Finished request 3.
Going to the next request
Waking up in 2.7 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1098, id=189, length=295
Message-Authenticator = 0x23515616db771204a7e6e4d055914ad8
Service-Type = Framed-User
User-Name = "000000093701b5fc"
Framed-MTU = 1488
State = 0xb31e13c2b31f0a5eb51d4c7224b622d0
Called-Station-Id = "001E2AFFFED9:TI-NAV-N-001E2AFFFED9"
Calling-Station-Id = "00093701B5FC"
NAS-Identifier = "netgearfffed8"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x0201005619800000004c160301004701000043030145985554e52452470f4e2c04745d0cca702792aa39a859c218edd113a11f3a2d00001c0016000a0005000400640062006100600015000900140008000600030100
NAS-IP-Address = 192.168.0.232
NAS-Port = 2
NAS-Port-Id = "STA port # 2"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "000000093701b5fc", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 1 length 86
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 76
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] (other): before/accept initialization
[peap] TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 0047], ClientHello
[peap] TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello
[peap] TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 085e], Certificate
[peap] TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
[peap] TLS_accept: SSLv3 write key exchange A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
[peap] TLS_accept: SSLv3 write server done A
[peap] TLS_accept: SSLv3 flush data
[peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 189 to 192.168.0.232 port 1098
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xf7f53983ae58c057a8a2195d095e28bb493fa2d8d4a610b39eebd98334c9d2d7a2419c04e0566be6a0cd4a9523e72a43c24408fe3f044aac2b83e36e6d9038cb0ebd6d4c2e59757be53b3adfe9961b87546fdff6e7506aa1f9fa0204967dec51f231e9d1f58a63b372dd711b01aa00b967df311fa2b2475149cde315893f6f35b7046754213bb7c205f2b86ad00acda93880facc007128428490812980fb13a37a38a158bdd447aac18cfbd0482d93796593cdb1567b23c649a07586b797c6716aab0203010001a317301530130603551d25040c300a06082b06010505070301300d06092a864886f70d0101040500038201010044bd7a3fc8d0e35086
EAP-Message = 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
EAP-Message = 0xa73082038fa0030201020209
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xb31e13c2b21c0a5eb51d4c7224b622d0
Finished request 4.
Going to the next request
Waking up in 1.3 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1099, id=190, length=212
Message-Authenticator = 0x10ff6939a7c6ffe69cd1d3d6895eeb1b
Service-Type = Framed-User
User-Name = "000000093701b6c7"
Framed-MTU = 1488
Called-Station-Id = "001E2AFFFED9:TI-NAV-N-001E2AFFFED9"
Calling-Station-Id = "00093701B6C7"
NAS-Identifier = "netgearfffed8"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x020000150130303030303030393337303162366337
NAS-IP-Address = 192.168.0.232
NAS-Port = 1
NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "000000093701b6c7", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 0 length 21
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user. Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 190 to 192.168.0.232 port 1099
EAP-Message = 0x010100061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x312aaba3312bb29dfc0d1b7d8db54603
Finished request 5.
Going to the next request
Waking up in 1.3 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1098, id=189, length=295
Sending duplicate reply to client test-net port 1098 - ID: 189
Sending Access-Challenge of id 189 to 192.168.0.232 port 1098
Waking up in 1.3 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1099, id=190, length=212
Sending duplicate reply to client test-net port 1099 - ID: 190
Sending Access-Challenge of id 190 to 192.168.0.232 port 1099
Waking up in 1.3 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1098, id=191, length=215
Message-Authenticator = 0xd3d1056071526cfbe28d928a9921fa5b
Service-Type = Framed-User
User-Name = "000000093701b5fc"
Framed-MTU = 1488
State = 0xb31e13c2b21c0a5eb51d4c7224b622d0
Called-Station-Id = "001E2AFFFED9:TI-NAV-N-001E2AFFFED9"
Calling-Station-Id = "00093701B5FC"
NAS-Identifier = "netgearfffed8"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x020200061900
NAS-IP-Address = 192.168.0.232
NAS-Port = 2
NAS-Port-Id = "STA port # 2"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "000000093701b5fc", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 191 to 192.168.0.232 port 1098
EAP-Message = 0x010303fc194000d393d4c53e72cbea300d06092a864886f70d0101050500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f72697479301e170d3039303330353134343933355a170d3130303330353134343933355a308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xb783ee1113f440de
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xb31e13c2b11d0a5eb51d4c7224b622d0
Finished request 6.
Going to the next request
Waking up in 1.3 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1099, id=192, length=295
Message-Authenticator = 0xbca1640ffe29b5a484f5efb0f693ecf0
Service-Type = Framed-User
User-Name = "000000093701b6c7"
Framed-MTU = 1488
State = 0x312aaba3312bb29dfc0d1b7d8db54603
Called-Station-Id = "001E2AFFFED9:TI-NAV-N-001E2AFFFED9"
Calling-Station-Id = "00093701B6C7"
NAS-Identifier = "netgearfffed8"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x0201005619800000004c16030100470100004303014598557f1545d6afb7fb247f29f88c5e6da59eb6d4dc04037d9f0bfe8eaf4ffb00001c0016000a0005000400640062006100600015000900140008000600030100
NAS-IP-Address = 192.168.0.232
NAS-Port = 1
NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "000000093701b6c7", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 1 length 86
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 76
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] (other): before/accept initialization
[peap] TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 0047], ClientHello
[peap] TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello
[peap] TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 085e], Certificate
[peap] TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
[peap] TLS_accept: SSLv3 write key exchange A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
[peap] TLS_accept: SSLv3 write server done A
[peap] TLS_accept: SSLv3 flush data
[peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 192 to 192.168.0.232 port 1099
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xa73082038fa0030201020209
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x312aaba33028b29dfc0d1b7d8db54603
Finished request 7.
Going to the next request
Cleaning up request 2 ID 187 with timestamp +14
rad_recv: Access-Request packet from host 192.168.0.232 port 1098, id=193, length=215
Message-Authenticator = 0x66e1f59e297af70248ffd9279fa7cacb
Service-Type = Framed-User
User-Name = "000000093701b5fc"
Framed-MTU = 1488
State = 0xb31e13c2b11d0a5eb51d4c7224b622d0
Called-Station-Id = "001E2AFFFED9:TI-NAV-N-001E2AFFFED9"
Calling-Station-Id = "00093701B5FC"
NAS-Identifier = "netgearfffed8"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x020300061900
NAS-IP-Address = 192.168.0.232
NAS-Port = 2
NAS-Port-Id = "STA port # 2"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "000000093701b5fc", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 3 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 193 to 192.168.0.232 port 1098
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xb5e77fa88a6af1cbe3f6a47981179cc3654b3a61dc86a456bbc0561bf228bd4e392e94cc6991894b9666cc2e54a2bb7f9b0ef14468dbe78a25931eb0304bf369bb77e7a56d914a5dccc5dcbb26444d3c8b42280bb339013f1ea7f52fccb11064c5cb1eca5010db732ee1976f0a715228e440c897379c09b3d3f3288aa184a7303052e8a9434704f31df0c06dce3c16d158b13ddeacc57ffb24143caa7ac492a3e6d6b41263547ba5050f7647aa8bafc23a4e5b7839e57f56aecf2fba7ec8ccf3cf071eed16030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xb31e13c2b01a0a5eb51d4c7224b622d0
Finished request 8.
Going to the next request
Waking up in 2.1 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1098, id=193, length=215
Sending duplicate reply to client test-net port 1098 - ID: 193
Sending Access-Challenge of id 193 to 192.168.0.232 port 1098
Waking up in 2.1 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1099, id=192, length=295
Sending duplicate reply to client test-net port 1099 - ID: 192
Sending Access-Challenge of id 192 to 192.168.0.232 port 1099
Waking up in 2.1 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1099, id=194, length=215
Message-Authenticator = 0x2ccfb642b8b05cf81b5180d2af7be0d2
Service-Type = Framed-User
User-Name = "000000093701b6c7"
Framed-MTU = 1488
State = 0x312aaba33028b29dfc0d1b7d8db54603
Called-Station-Id = "001E2AFFFED9:TI-NAV-N-001E2AFFFED9"
Calling-Station-Id = "00093701B6C7"
NAS-Identifier = "netgearfffed8"
NAS-Port-Type = Wireless-802.11
Connect-Info = "CONNECT 54Mbps 802.11g"
EAP-Message = 0x020200061900
NAS-IP-Address = 192.168.0.232
NAS-Port = 1
NAS-Port-Id = "STA port # 1"
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "000000093701b6c7", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 194 to 192.168.0.232 port 1099
EAP-Message = 0x010303fc194000d393d4c53e72cbea300d06092a864886f70d0101050500308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504071309536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d706c6520436572746966696361746520417574686f72697479301e170d3039303330353134343933355a170d3130303330353134343933355a308193310b3009060355040613024652310f300d060355040813065261646975733112301006035504
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xb783ee1113f440de
Message-Authenticator = 0x00000000000000000000000000000000
State = 0x312aaba33329b29dfc0d1b7d8db54603
Finished request 9.
Going to the next request
Waking up in 2.0 seconds.
rad_recv: Access-Request packet from host 192.168.0.232 port 1099, id=195, length=215
Message-Authenticator = 0x68144a1161a125be6469c57a96d7c4a4
Service-Type = Framed-User
User-Name = "000000093701b6c7"
Framed-MTU = 1488
State = 0x312aaba33329b29dfc0d1b7d8db54603
EAP-Message = 0x020300061900
More information about the Freeradius-Users
mailing list