Perl/Peap-MSChapV2 Issues

Adam W. Sewell awsewell at catawba.edu
Thu Mar 19 15:18:27 CET 2009


I'm trying to get Perl authentication setup along with Peap/MSChapV2. I 
have a perl script that I wish to use to authenticate the user but for 
some reason, it does not look like the perl script is even being called 
at the point where it needs to. See below for the log. I could be wrong, 
but the issue seems to be here:

------------------------------------------------
  WARNING: You set Proxy-To-Realm = LOCAL, but the realm does not exist! 
 Cancel                                                                  
            ling invalid proxy request.
auth: No authenticate method (Auth-Type) configuration found for the 
request: Re                                                              
                jecting the user
auth: Failed to validate the user.
Login incorrect: [testUser] (from client DORMTEST2_M80 port 0 via TLS 
tunnel)
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
++[eap] returns handled
--------------------------------------------------
If I need to provide any config files, please just say so. I'm not sure 
which ones to include here. Version is 2.0.5

Thanks.
-Adam Sewell


Log:
--------------------------------------------------

rad_recv: Access-Request packet from host 192.168.240.78 port 2372, 
id=131, lengt                                                            
                  h=152
        Message-Authenticator = 0xede4cc6e1f95787b1f2f1eb7172fdf44
        User-Name = "testUser"
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        EAP-Message = 0x0207000d016c6a61636b736f6e
        Framed-MTU = 1000
        Called-Station-Id = "0001F4-B6-1B-80\0004"
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
    users: Matched entry DEFAULT at line 189
++[files] returns ok
  rlm_eap: EAP packet type response id 7 length 13
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++? if (EAP-Message)
? Evaluating (EAP-Message) -> TRUE
++? if (EAP-Message) -> TRUE
++- entering if (EAP-Message)
+++[noop] returns noop
++- if (EAP-Message) returns noop
++ ... skipping elsif for request 0: Preceding "if" was taken
++ ... skipping elsif for request 0: Preceding "if" was taken
  rad_check_password:  Found Auth-Type Perl
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'testUser'
auth: type "EAP"
+- entering group authenticate
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 131 to 192.168.240.78 port 2372
        EAP-Message = 0x010800061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xbd856426bd8d7d24113b1577a1fc0b35
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2372, 
id=132, lengt                                                            
                  h=249
        Message-Authenticator = 0xff045bcad52434215028c1d31990ae00
        User-Name = "testUser"
        State = 0xbd856426bd8d7d24113b1577a1fc0b35
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 
0x0208005c190016030100510100004d030149c2516a7d86eed958cf9d               
                                                               
bcc1b3a313d5271a03db4f39f3ce88760640dfaabc00002600390038003500160013000a
00330032                                                                 
             002f00050004001500120009001400110008000600030100
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
    users: Matched entry DEFAULT at line 189
++[files] returns ok
  rlm_eap: EAP packet type response id 8 length 92
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type Perl
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'testUser'
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
    (other): before/accept initialization
    TLS_accept: before/accept initialization
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0051], ClientHello
    TLS_accept: SSLv3 read client hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
    TLS_accept: SSLv3 write server hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 085e], Certificate
    TLS_accept: SSLv3 write certificate A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
    TLS_accept: SSLv3 write key exchange A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
    TLS_accept: SSLv3 write server done A
    TLS_accept: SSLv3 flush data
    TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 132 to 192.168.240.78 port 2372
        EAP-Message = 
0x010903e419c000000acd160301004a02000046030149c23c6e6f3afe               
                                                               
ce786b5cb656f4566f4b9ab71a9b123a9ee0c351d3cacad44a20e9c2f3afa8b7e0eeb081
288ac57e                                                                 
             
9975f411c844194714ff16f15cde4ad2f3ae003900160301085e0b00085a0008570003a6
308203a2                                                                 
             
3082028aa003020102020101300d06092a864886f70d0101040500308193310b30090603
55040613                                                                 
             
024652310f300d060355040813065261646975733112301006035504071309536f6d6577
68657265                                                                 
             
31153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d01
09011611                                                                 
             61646d696e406578616d706c652e636f6d3126302406035504
        EAP-Message = 
0x03131d4578616d706c6520436572746966696361746520417574686f               
                                                               
72697479301e170d3039303232363138313530335a170d3130303232363138313530335a
307c310b                                                                 
             
3009060355040613024652310f300d060355040813065261646975733115301306035504
0a130c45                                                                 
             
78616d706c6520496e632e312330210603550403131a4578616d706c6520536572766572
20436572                                                                 
             
74696669636174653120301e06092a864886f70d010901161161646d696e406578616d70
6c652e63                                                                 
             
6f6d30820122300d06092a864886f70d01010105000382010f003082010a0282010100af
91ce4cc9                                                                 
             6ce447a1b9ce6a3c8d5cee06559ffe5d6c58649c8af10cf4d8
        EAP-Message = 
0x2196a122f04a957a7ca72043e3f61c0e4149a18d32bea21f5807e44e               
                                                               
710762d5ede33f41f89e5238ba8ec146775ec45f90335564a0ccdf9d7332b714993b5277
76d70068                                                                 
             
a939f58c7475e677850446ef1de2427a39b1469d4707f59723cc3c5c432426f51d899e3d
f16df486                                                                 
             
41151eb1a34b9aacf00fb3380f43db62d6efe38255abd22667ba5a4a4d0de897d955eb54
532c642b                                                                 
             
009994eb1d4353ab340852d9a2db429111f08e31dc5a5c063a1b4625023d21496f55717d
44b2ef16                                                                 
             
38b6cce64bf716e719d885f20b305fed4e6d94a8ecb1201d43389cbbd9e48328d7f88506
41d50203                                                                 
             010001a317301530130603551d25040c300a06082b06010505
        EAP-Message = 
0x070301300d06092a864886f70d010104050003820101005e3f3bed58               
                                                               
8f5e438581d8abdf869d6e5b9751c0407043ba804bae8a935f2ccfda3e106c7b9bd3c41e
3baa1e6b                                                                 
             
ea239a7878a67fa523f76e9207640ce1900a71ee645e0a200007826520944b15177a2d85
5ba97f35                                                                 
             
b5484cc4476b4c49bbcc55fa40b919506eb73e3f6f35c87ed3d38fca2b33a82d541a108e
60a54b95                                                                 
             
8ebab48dbcbed264380c05df5c4e8839169ade9bed2cde41faa08755b53dfe9a4a8fe741
7795f114                                                                 
             
9529d9e2ad6c0c6f610a12772c3a5b1dca9826bc8e55ba4d17bd2e60db88e70bb9f66b22
433be9a9                                                                 
             d28522870278805bab
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xbd856426bc8c7d24113b1577a1fc0b35
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2372, 
id=133, lengt                                                            
                  h=163
        Message-Authenticator = 0x1a136248076ddec3dfa07234893eb3fb
        User-Name = "testUser"
        State = 0xbd856426bc8c7d24113b1577a1fc0b35
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 0x020900061900
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
    users: Matched entry DEFAULT at line 189
++[files] returns ok
  rlm_eap: EAP packet type response id 9 length 6
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type Perl
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'testUser'
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 133 to 192.168.240.78 port 2372
        EAP-Message = 
0x010a03e01940192b141d954ba5dad16f574bfa9c6f1069e1fda082af               
                                                               
c3ba1fc97a0d151f664e5dd53aed97cf332119fe0004ab308204a73082038fa003020102
020900ba                                                                 
             
d26bfd4ce6479b300d06092a864886f70d0101050500308193310b300906035504061302
4652310f                                                                 
             
300d060355040813065261646975733112301006035504071309536f6d65776865726531
15301306                                                                 
             
0355040a130c4578616d706c6520496e632e3120301e06092a864886f70d010901161161
646d696e                                                                 
             
406578616d706c652e636f6d312630240603550403131d4578616d706c65204365727469
66696361                                                                 
             746520417574686f72697479301e170d303930323236313831
        EAP-Message = 
0x3530315a170d3039303332383138313530315a308193310b30090603               
                                                               
55040613024652310f300d06035504081306526164697573311230100603550407130953
6f6d6577                                                                 
             
6865726531153013060355040a130c4578616d706c6520496e632e3120301e06092a8648
86f70d01                                                                 
             
0901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d
706c6520                                                                 
             
436572746966696361746520417574686f7269747930820122300d06092a864886f70d01
01010500                                                                 
             
0382010f003082010a0282010100c005918d15156e31de5cad4be43bcee9a30544cbd781
4d9e8b12                                                                 
             5c6aefc9a71a5c8d815d1cc12b0f37be7b2b30abd5cb4c696e
        EAP-Message = 
0x9f5aa45dd330796a68c9440b1114f9181342ef7006f2ca01e8805e58               
                                                               
0f4505da0d6b20c3e5ec1c85ac9473c4ce52cbba3917612d45f3d2ddcd0a7da895a57d4e
f7defd41                                                                 
             
353010449e124599e5d3115874e99c358e6448a5b78d84626d9b4479134e2fe45407e708
8bf1930a                                                                 
             
59b64aa4d17dc992cd317ea3ace04b31064a61647847ad710d6f458d128810e2152bc460
182cf327                                                                 
             
c63cf30639c3072fbd5ac302e525319efdb02c7e3a33026e7228186d464695aa1e00e461
fc004d86                                                                 
             
f4aabb8be9f06db98714d5ef63b51c433d0203010001a381fb3081f8301d0603551d0e04
160414d0                                                                 
             0f03b207edebc2780daafc959d2c27157dcad13081c8060355
        EAP-Message = 
0x1d230481c03081bd8014d00f03b207edebc2780daafc959d2c27157d               
                                                               
cad1a18199a48196308193310b3009060355040613024652310f300d0603550408130652
61646975                                                                 
             
733112301006035504071309536f6d65776865726531153013060355040a130c4578616d
706c6520                                                                 
             
496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e63
6f6d3126                                                                 
             
30240603550403131d4578616d706c6520436572746966696361746520417574686f7269
74798209                                                                 
             
00bad26bfd4ce6479b300c0603551d13040530030101ff300d06092a864886f70d010105
05000382                                                                 
             010100183c
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xbd856426bf8f7d24113b1577a1fc0b35
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2372, 
id=134, lengt                                                            
                  h=163
        Message-Authenticator = 0xfe56a2125a6096f339b3c22ce587817b
        User-Name = "testUser"
        State = 0xbd856426bf8f7d24113b1577a1fc0b35
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 0x020a00061900
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
    users: Matched entry DEFAULT at line 189
++[files] returns ok
  rlm_eap: EAP packet type response id 10 length 6
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type Perl
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'testUser'
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 134 to 192.168.240.78 port 2372
        EAP-Message = 
0x010b031f19005647775d06a03ebb8b89c3256914ceac4171e7ee41b3               
                                                               
bb5f8497c3f7eea643ac0637116e282046f3611e910dcf39d779ad13a14a68e75e9c416a
f68cb847                                                                 
             
4782e1d77d20cbb4785c40d8b36de0f2caca1c5a477b3a09c488d3065b0865e63b546965
fa1bc70c                                                                 
             
89f578eb1c88bcd329c3afb49730d0af199bf022be1f0cb74f71fde6d6be2f23af396c88
3b5411c1                                                                 
             
07b4d6fc51bc2bc07534c6d6d352c9afde1cb48565b9b669489403d0940d0da70125b207
3f724b7d                                                                 
             
1e3cd7cf5f31432eb7a659105af9fb92e5f67d36ad6c15321a218a34f89235844c88cc09
f44d3915                                                                 
             1cbbc12c70d4f6dba5f9e80cbfb2af15bb644c7749a3b34a57
        EAP-Message = 
0x50b8f96e2da78c160301020d0c000209008095c28ea954c729df2931               
                                                               
ea0e63d9b9ab25cdacbad88a7ded24c19ae298dddfd9b9b2dfba285398d544e1aebe2e6f
d4302399                                                                 
             
a2a156a1be615d6b7579973fe3323c4f65428282088b141e06ee2d99144c7b458bb1da4e
c85778a8                                                                 
             
806b2e9183475abdc4707fd70974a7bfeb9068894e5b15a6a576a266a6ccf9e439a22428
44530001                                                                 
             
0200807016d2ffeeac20415bd5e3d06f5d56797b894340ba4cfa86b7c249d7a19f4a30a1
50166a1c                                                                 
             
ad77dc80946762574bbe839165a11847955d822c7618609cb0823aa6fbfa3fde5ac1689d
e3992cc7                                                                 
             7b62ed0f56f46e72899d535b2a7686b42a23879e2e43b31ebe
        EAP-Message = 
0x1436022c138e7ea74e034cd234eed9bf9e88a34b36dcf47a567b0100               
                                                               
5ecc0ea78b9c0878dfc0795293d10b08dd9bd428ded50b9ee6e466268adcefea9d179f53
f109cdb2                                                                 
             
1a8e7a3db6b0968211beffd26709bdfd941711deeadcfcdb3070a225778a47dd4d37e189
b12514b4                                                                 
             
002bee6009872c50d6fba56fc0a687d4d6d4db9e034ce2679d03a28d2b3cc2cdee4c2107
7e7c41aa                                                                 
             
15a5e1cb08fa98e01ad0c70248712e18b4e491dc63d54c1e0e4276997f834f02a76138e4
ecc3cf95                                                                 
             
2f47659401e312bc4e3a1f7fad06988938bb26f6e16261603f793c33220772ae205cdab2
7d1b7271                                                                 
             846bf24a154840e38af13a8be8e8b37245599708ee3458d84d
        EAP-Message = 
0xf119be8b5c51d006e288aa595c249249489b1c5e01ba8561fac3ff17               
                                                               
13e15416030100040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xbd856426be8e7d24113b1577a1fc0b35
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2372, 
id=135, lengt                                                            
                  h=361
        Message-Authenticator = 0xaadc7c7cbfc2e4703d87937b07653f56
        User-Name = "testUser"
        State = 0xbd856426be8e7d24113b1577a1fc0b35
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 
0x020b00cc1900160301008610000082008034b73538e4af77762136cf               
                                                               
968dff3f35c0d7d26816075e8acf59f85a9ea17d2d2bdaba8c52bf8b73ca5e4cf1b3f41d
df18b7b3                                                                 
             
445bd77cd43505da9d00164b0b4e910aaa253aa28e96c2b434a5bffc9676162be91af163
ed23925d                                                                 
             
1d81ba43067a5a8745490c4084d009852adf47e9378c5449fc0ec305b358ee2bbfae681f
04140301                                                                 
             
0001011603010030c008d2eb665cdccc20489b58aef27cf392e5c948d673fb629ba7c518
b1b5639c                                                                 
             a046ccb28c891a79e2fedb7bc1b55850
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
    users: Matched entry DEFAULT at line 189
++[files] returns ok
  rlm_eap: EAP packet type response id 11 length 204
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type Perl
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'testUser'
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
    TLS_accept: SSLv3 read client key exchange A
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 read finished A
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
    TLS_accept: SSLv3 write change cipher spec A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 write finished A
    TLS_accept: SSLv3 flush data
    (other): SSL negotiation finished successfully
SSL Connection Established
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 135 to 192.168.240.78 port 2372
        EAP-Message = 
0x010c0041190014030100010116030100309920be9ebe8f52fa4ed630               
                                                               
8ada16be1cd50eec4ec78738d17b4397acff90fd2bf52e77f77ceb28a8acacd32c82e092
ab
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xbd856426b9897d24113b1577a1fc0b35
Finished request 4.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2372, 
id=136, lengt                                                            
                  h=163
        Message-Authenticator = 0xcfaba03208b5391f2170865024c7b4d2
        User-Name = "testUser"
        State = 0xbd856426b9897d24113b1577a1fc0b35
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 0x020c00061900
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
    users: Matched entry DEFAULT at line 189
++[files] returns ok
  rlm_eap: EAP packet type response id 12 length 6
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type Perl
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'testUser'
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3
  eaptls_process returned 3
  rlm_eap_peap: EAPTLS_SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 136 to 192.168.240.78 port 2372
        EAP-Message = 
0x010d002b19001703010020eaa91fa81f90eda46f466f7882f677ea9e               
                                                               
bcc91b987231d339cf0aa989cf0c54
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xbd856426b8887d24113b1577a1fc0b35
Finished request 5.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2372, 
id=137, lengt                                                            
                  h=237
        Message-Authenticator = 0xa9aedf5cd00f0ac40e58d97685afb53c
        User-Name = "testUser"
        State = 0xbd856426b8887d24113b1577a1fc0b35
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 
0x020d00501900170301002057cb0d149913d21e3bf3fef3c63273735c               
                                                               
374f1f98a48743223f9256cf517be31703010020a85accc63c089e33310a616953971ec9
20520cb9                                                                 
             8fe0d3244b4bd8ce10aaa739
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
    users: Matched entry DEFAULT at line 189
++[files] returns ok
  rlm_eap: EAP packet type response id 13 length 80
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type Perl
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'testUser'
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - testUser
  PEAP: Got tunneled identity of testUser
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to testUser
+- entering group authorize
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "testUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
  rlm_eap: Request is supposed to be proxied to Realm LOCAL.  Not doing 
EAP.
++[eap] returns noop
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
  WARNING: You set Proxy-To-Realm = LOCAL, but the realm does not exist! 
 Cancel                                                                  
            ling invalid proxy request.
auth: No authenticate method (Auth-Type) configuration found for the 
request: Re                                                              
                jecting the user
auth: Failed to validate the user.
Login incorrect: [testUser] (from client DORMTEST2_M80 port 0 via TLS 
tunnel)
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
++[eap] returns handled
Sending Access-Challenge of id 137 to 192.168.240.78 port 2372
        EAP-Message = 
0x010e002b190017030100200dbc1fdc99ce198e1395aaf13395f18c2a               
                                                               
d4deecf9025e18d3a17e85698aba58
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xbd856426bb8b7d24113b1577a1fc0b35
Finished request 6.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2372, 
id=138, lengt                                                            
                  h=237
        Message-Authenticator = 0xc55c7e9c1e86cc3723640d1d5ca4ed5e
        User-Name = "testUser"
        State = 0xbd856426bb8b7d24113b1577a1fc0b35
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 
0x020e00501900170301002059f4b1892fa7f016f7576a058660d11c7d               
                                                               
8064c436922e0ce4963588c05be5be1703010020d23026f856c74389b87ecbb68d220a7f
215ee0f5                                                                 
             1ed4cd4746cfdb39c6180a48
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
    users: Matched entry DEFAULT at line 189
++[files] returns ok
  rlm_eap: EAP packet type response id 14 length 80
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type Perl
  rad_check_password:  Found Auth-Type EAP
Warning:  Found 2 auth-types on request for user 'testUser'
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap:  Had sent TLV failure.  User was rejected earlier in 
this sessio                                                              
                n.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
++[eap] returns invalid
auth: Failed to validate the user.
Login incorrect: [testUser] (from client DORMTEST2_M80 port 4 cli 
00-16-D3-30-E5                                                           
                   -74)
  Found Post-Auth-Type Reject
+- entering group REJECT
        expand: %{User-Name} -> testUser
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Sending Access-Reject of id 138 to 192.168.240.78 port 2372
        EAP-Message = 0x040e0004
        Message-Authenticator = 0x00000000000000000000000000000000
Finished request 7.
Going to the next request
Waking up in 4.7 seconds.
Cleaning up request 0 ID 131 with timestamp +1335
Cleaning up request 1 ID 132 with timestamp +1335
Cleaning up request 2 ID 133 with timestamp +1335
Cleaning up request 3 ID 134 with timestamp +1335
Waking up in 0.1 seconds.
Cleaning up request 4 ID 135 with timestamp +1336
Cleaning up request 5 ID 136 with timestamp +1336
Cleaning up request 6 ID 137 with timestamp +1336
Cleaning up request 7 ID 138 with timestamp +1336
Ready to process requests.





More information about the Freeradius-Users mailing list