Perl/Peap-MSChapV2 Issues

Adam W. Sewell awsewell at catawba.edu
Thu Mar 19 21:31:04 CET 2009


Ok, I've made a little progress. The perl script is now being called 
correctly and returning the correct data. There seems to be something 
else now.

Thanks for the help!

I added DEFAULT Auth-Type = Perl Fall-Through = 1 to users, I think 
that's what you were wanting.


Inner-tunnel authorize
------------------------------
Authorize {

	Mschap
	Suffix
	Update control {
		Proxy-To-Realm := LOCAL
	}
	Eap {
		Ok=return
	}
	Perl
	Expiration
	Logintime
	Pap
}

	

Log:
-----------------------------------------
Ready to process requests.
rad_recv: Access-Request packet from host 192.168.240.78 port 2676, 
id=2, length=152
        Message-Authenticator = 0xcea30489b92c26ffdaa8fdb6da8efae0
        User-Name = "testUser"
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        EAP-Message = 0x0201000d016c6a61636b736f6e
        Framed-MTU = 1000
        Called-Station-Id = "0001F4-B6-1B-80\0004"
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
  rlm_eap: EAP packet type response id 1 length 13
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: EAP Identity
  rlm_eap: processing type tls
  rlm_eap_tls: Initiate
  rlm_eap_tls: Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 2 to 192.168.240.78 port 2676
        EAP-Message = 0x010200061920
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe12d310ae12f28a1800156155aa34531
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2676, 
id=3, length=249
        Message-Authenticator = 0x467724da1090475e0f600ab2cb4381ad
        User-Name = "testUser"
        State = 0xe12d310ae12f28a1800156155aa34531
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 
0x0202005c190016030100510100004d030149c2aa62e5b90d83cec04128bd232e5827f8
075bed072a76f61960ee34f465cb00002600390038003500160013000a00330032002f00
050004001500120009001400110008000600030100
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
  rlm_eap: EAP packet type response id 2 length 92
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
    (other): before/accept initialization
    TLS_accept: before/accept initialization
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0051], ClientHello
    TLS_accept: SSLv3 read client hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 004a], ServerHello
    TLS_accept: SSLv3 write server hello A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 085e], Certificate
    TLS_accept: SSLv3 write certificate A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange
    TLS_accept: SSLv3 write key exchange A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
    TLS_accept: SSLv3 write server done A
    TLS_accept: SSLv3 flush data
    TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 3 to 192.168.240.78 port 2676
        EAP-Message = 
0x010303e419c000000acd160301004a02000046030149c2956da03287d649f047c44cec
a603858ff8c65ebdfa6e815377215d9e4fb7201cc450e78d0b149401ea7fda15a2461da3
49131ba90f408400edf975dde9ce60003900160301085e0b00085a0008570003a6308203
a23082028aa003020102020101300d06092a864886f70d0101040500308193310b300906
0355040613024652310f300d060355040813065261646975733112301006035504071309
536f6d65776865726531153013060355040a130c4578616d706c6520496e632e3120301e
06092a864886f70d010901161161646d696e406578616d706c652e636f6d312630240603
5504
        EAP-Message = 
0x03131d4578616d706c6520436572746966696361746520417574686f72697479301e17
0d3039303232363138313530335a170d3130303232363138313530335a307c310b300906
0355040613024652310f300d0603550408130652616469757331153013060355040a130c
4578616d706c6520496e632e312330210603550403131a4578616d706c65205365727665
722043657274696669636174653120301e06092a864886f70d010901161161646d696e40
6578616d706c652e636f6d30820122300d06092a864886f70d01010105000382010f0030
82010a0282010100af91ce4cc96ce447a1b9ce6a3c8d5cee06559ffe5d6c58649c8af10c
f4d8
        EAP-Message = 
0x2196a122f04a957a7ca72043e3f61c0e4149a18d32bea21f5807e44e710762d5ede33f
41f89e5238ba8ec146775ec45f90335564a0ccdf9d7332b714993b527776d70068a939f5
8c7475e677850446ef1de2427a39b1469d4707f59723cc3c5c432426f51d899e3df16df4
8641151eb1a34b9aacf00fb3380f43db62d6efe38255abd22667ba5a4a4d0de897d955eb
54532c642b009994eb1d4353ab340852d9a2db429111f08e31dc5a5c063a1b4625023d21
496f55717d44b2ef1638b6cce64bf716e719d885f20b305fed4e6d94a8ecb1201d43389c
bbd9e48328d7f8850641d50203010001a317301530130603551d25040c300a06082b0601
0505
        EAP-Message = 
0x070301300d06092a864886f70d010104050003820101005e3f3bed588f5e438581d8ab
df869d6e5b9751c0407043ba804bae8a935f2ccfda3e106c7b9bd3c41e3baa1e6bea239a
7878a67fa523f76e9207640ce1900a71ee645e0a200007826520944b15177a2d855ba97f
35b5484cc4476b4c49bbcc55fa40b919506eb73e3f6f35c87ed3d38fca2b33a82d541a10
8e60a54b958ebab48dbcbed264380c05df5c4e8839169ade9bed2cde41faa08755b53dfe
9a4a8fe7417795f1149529d9e2ad6c0c6f610a12772c3a5b1dca9826bc8e55ba4d17bd2e
60db88e70bb9f66b22433be9a9d28522870278805bab
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe12d310ae02e28a1800156155aa34531
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2676, 
id=4, length=163
        Message-Authenticator = 0xeb4220c6485e44c1057f2a57e9ac463c
        User-Name = "testUser"
        State = 0xe12d310ae02e28a1800156155aa34531
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 0x020300061900
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
  rlm_eap: EAP packet type response id 3 length 6
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 4 to 192.168.240.78 port 2676
        EAP-Message = 
0x010403e01940192b141d954ba5dad16f574bfa9c6f1069e1fda082afc3ba1fc97a0d15
1f664e5dd53aed97cf332119fe0004ab308204a73082038fa003020102020900bad26bfd
4ce6479b300d06092a864886f70d0101050500308193310b300906035504061302465231
0f300d060355040813065261646975733112301006035504071309536f6d657768657265
31153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d01
0901161161646d696e406578616d706c652e636f6d312630240603550403131d4578616d
706c6520436572746966696361746520417574686f72697479301e170d30393032323631
3831
        EAP-Message = 
0x3530315a170d3039303332383138313530315a308193310b3009060355040613024652
310f300d060355040813065261646975733112301006035504071309536f6d6577686572
6531153013060355040a130c4578616d706c6520496e632e3120301e06092a864886f70d
010901161161646d696e406578616d706c652e636f6d312630240603550403131d457861
6d706c6520436572746966696361746520417574686f7269747930820122300d06092a86
4886f70d01010105000382010f003082010a0282010100c005918d15156e31de5cad4be4
3bcee9a30544cbd7814d9e8b125c6aefc9a71a5c8d815d1cc12b0f37be7b2b30abd5cb4c
696e
        EAP-Message = 
0x9f5aa45dd330796a68c9440b1114f9181342ef7006f2ca01e8805e580f4505da0d6b20
c3e5ec1c85ac9473c4ce52cbba3917612d45f3d2ddcd0a7da895a57d4ef7defd41353010
449e124599e5d3115874e99c358e6448a5b78d84626d9b4479134e2fe45407e7088bf193
0a59b64aa4d17dc992cd317ea3ace04b31064a61647847ad710d6f458d128810e2152bc4
60182cf327c63cf30639c3072fbd5ac302e525319efdb02c7e3a33026e7228186d464695
aa1e00e461fc004d86f4aabb8be9f06db98714d5ef63b51c433d0203010001a381fb3081
f8301d0603551d0e04160414d00f03b207edebc2780daafc959d2c27157dcad13081c806
0355
        EAP-Message = 
0x1d230481c03081bd8014d00f03b207edebc2780daafc959d2c27157dcad1a18199a481
96308193310b3009060355040613024652310f300d060355040813065261646975733112
301006035504071309536f6d65776865726531153013060355040a130c4578616d706c65
20496e632e3120301e06092a864886f70d010901161161646d696e406578616d706c652e
636f6d312630240603550403131d4578616d706c65204365727469666963617465204175
74686f72697479820900bad26bfd4ce6479b300c0603551d13040530030101ff300d0609
2a864886f70d01010505000382010100183c
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe12d310ae32928a1800156155aa34531
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2676, 
id=5, length=163
        Message-Authenticator = 0x55e17dd633cdf932066dc762b88e60fd
        User-Name = "testUser"
        State = 0xe12d310ae32928a1800156155aa34531
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 0x020400061900
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
  rlm_eap: EAP packet type response id 4 length 6
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake fragment handler
  eaptls_verify returned 1
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 5 to 192.168.240.78 port 2676
        EAP-Message = 
0x0105031f19005647775d06a03ebb8b89c3256914ceac4171e7ee41b3bb5f8497c3f7ee
a643ac0637116e282046f3611e910dcf39d779ad13a14a68e75e9c416af68cb8474782e1
d77d20cbb4785c40d8b36de0f2caca1c5a477b3a09c488d3065b0865e63b546965fa1bc7
0c89f578eb1c88bcd329c3afb49730d0af199bf022be1f0cb74f71fde6d6be2f23af396c
883b5411c107b4d6fc51bc2bc07534c6d6d352c9afde1cb48565b9b669489403d0940d0d
a70125b2073f724b7d1e3cd7cf5f31432eb7a659105af9fb92e5f67d36ad6c15321a218a
34f89235844c88cc09f44d39151cbbc12c70d4f6dba5f9e80cbfb2af15bb644c7749a3b3
4a57
        EAP-Message = 
0x50b8f96e2da78c160301020d0c000209008095c28ea954c729df2931ea0e63d9b9ab25
cdacbad88a7ded24c19ae298dddfd9b9b2dfba285398d544e1aebe2e6fd4302399a2a156
a1be615d6b7579973fe3323c4f65428282088b141e06ee2d99144c7b458bb1da4ec85778
a8806b2e9183475abdc4707fd70974a7bfeb9068894e5b15a6a576a266a6ccf9e439a224
28445300010200801308bbde6226911ca6943b37850b3b02d9dd833b1517de45c8be3634
857aaf575b4ffabee15bb724649094dfd87ed6d3bf87564bd3dbc833c5743de333a9ff8a
18a2f80f2f84bfb2fec2e00182db1b8b155fae381bae60352d7cac18a2e8d259285b145a
4e51
        EAP-Message = 
0x8117e6a04420b63c3d8c81d07d27116572faf695499e1c6c1377010049efc786aa1134
fe95ce9eb0a916a1644dd0b4700544abcccf6e281ad9ebbb55f0cf7b02f0fd1740afd1a9
cce73c0fe892dc057f873ee0fe7fa155585e1110ccfa1cae02536eecde4028047cbec5ec
2538f57e3dad476782098b4b39f8488364839bb1c38fb524331059ded76b48598e6e3099
60cacb84315aeb40af30506a4eff27775e3a5ad4777b6dbd663bb6c036f4e640f07ee382
450277b57f16df0c5d40c2ab3de425a63dab7973ddc6c32272dca051cd76165a76d96d5c
c732c35ab3bcba3324a48300d4e1ba8a4f852f0629bd894ee22671c76fe3e4b714b0e313
17ee
        EAP-Message = 
0x94975d58e13f02fc8637f4f3816e5baf32fb1af4832dfa51a731403a270f1716030100
040e000000
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe12d310ae22828a1800156155aa34531
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2676, 
id=6, length=361
        Message-Authenticator = 0xbdafc2bc53bf68eb96b1c2f303a2bfa6
        User-Name = "testUser"
        State = 0xe12d310ae22828a1800156155aa34531
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 
0x020500cc19001603010086100000820080937ab2b395e302774e2543db590e4f963705
96383d5f905bab039212df1166766326aaeead86e1d424d42fe72b1584eb0014ba852cd1
4aee5b185382c3b319c6e85a736058eb4519e1dad1b4541d0ffe1f516e52a99d1ddc785d
22ae0309f278db5cc0d7fa2b85f99315ccddbe2a1284d2fcaaa30918d45032a30f4261ba
8151140301000101160301003034a7b9154ffb6c518b9b8e5beb1584208f9d39cb8338e9
110462d5d96f2412b6ff68ea2b28256d8765f961a899d8cb63
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
  rlm_eap: EAP packet type response id 5 length 204
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange
    TLS_accept: SSLv3 read client key exchange A
  rlm_eap_tls: <<< TLS 1.0 ChangeCipherSpec [length 0001]
  rlm_eap_tls: <<< TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 read finished A
  rlm_eap_tls: >>> TLS 1.0 ChangeCipherSpec [length 0001]
    TLS_accept: SSLv3 write change cipher spec A
  rlm_eap_tls: >>> TLS 1.0 Handshake [length 0010], Finished
    TLS_accept: SSLv3 write finished A
    TLS_accept: SSLv3 flush data
    (other): SSL negotiation finished successfully
SSL Connection Established
  eaptls_process returned 13
  rlm_eap_peap: EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 6 to 192.168.240.78 port 2676
        EAP-Message = 
0x0106004119001403010001011603010030b2aa75db0294be14dbad42e7d280a17e7642
51f1106d834a7e73853d4a59774f3792a559a7bc9f129bf0a350563bffb2
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe12d310ae52b28a1800156155aa34531
Finished request 4.
Going to the next request
Waking up in 4.8 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2676, 
id=7, length=163
        Message-Authenticator = 0x6ebdb3150f738501452ca7704f020fc5
        User-Name = "testUser"
        State = 0xe12d310ae52b28a1800156155aa34531
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 0x020600061900
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
  rlm_eap: EAP packet type response id 6 length 6
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3
  eaptls_process returned 3
  rlm_eap_peap: EAPTLS_SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 7 to 192.168.240.78 port 2676
        EAP-Message = 
0x0107002b19001703010020262f5d1ef7c9637ebfeaa6a61f9d46ea483f8abb5219ac95
4bb8bf083f2bd30f
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe12d310ae42a28a1800156155aa34531
Finished request 5.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2676, 
id=8, length=237
        Message-Authenticator = 0x4433c3b27733a2cfcd22453efa771bbc
        User-Name = "testUser"
        State = 0xe12d310ae42a28a1800156155aa34531
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 
0x020700501900170301002064809e7864415dff87c39c6eed9a2f5732d409cb4ac76856
1c64046e8528b4e0170301002077245235776f36367afffb0670d56f2f0dd3b502a0c64d
de4c3ca6a3e307a27f
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
  rlm_eap: EAP packet type response id 7 length 80
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - testUser
  PEAP: Got tunneled identity of testUser
  PEAP: Setting default EAP type for tunneled EAP session.
  PEAP: Setting User-Name to testUser
+- entering group authorize
++[mschap] returns noop
    rlm_realm: No '@' in User-Name = "testUser", looking up realm NULL
    rlm_realm: No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
  rlm_eap: Request is supposed to be proxied to Realm LOCAL.  Not doing 
EAP.
++[eap] returns noop
perl_pool: item 0x8192020 asigned new request. Handled so far: 1
found interpetator at address 0x8192020
rlm_perl: Added pair User-Name = testUser
rlm_perl: Added pair EAP-Message = 0x0207000d016c6a61636b736f6e
rlm_perl: Added pair EAP-Type = Identity
rlm_perl: Added pair FreeRADIUS-Proxied-To = 127.0.0.1
rlm_perl: Added pair Filter-Id = Enterasys:version=1:policy=CCP_Student
rlm_perl: Added pair Cleartext-Password = password09
rlm_perl: Added pair Proxy-To-Realm = LOCAL
rlm_perl: Added pair EAP-Type = MS-CHAP-V2
perl_pool total/active/spare [64/0/64]
Unreserve perl at address 0x8192020
++[perl] returns ok
++[expiration] returns noop
++[logintime] returns noop
rlm_pap: No clear-text password in the request.  Not performing PAP.
++[pap] returns noop
  WARNING: You set Proxy-To-Realm = LOCAL, but the realm does not exist! 
 Cancelling invalid proxy request.
auth: type Local
auth: No User-Password or CHAP-Password attribute in the request
auth: Failed to validate the user.
Login incorrect: [testUser] (from client DORMTEST2_M80 port 0 via TLS 
tunnel)
  PEAP: Tunneled authentication was rejected.
  rlm_eap_peap: FAILURE
++[eap] returns handled
Sending Access-Challenge of id 8 to 192.168.240.78 port 2676
        EAP-Message = 
0x0108002b19001703010020c8c3e314046ffe680fd1481d456600797f4dfe80167c6667
cf4a842f7dcf9dd3
        Message-Authenticator = 0x00000000000000000000000000000000
        State = 0xe12d310ae72528a1800156155aa34531
Finished request 6.
Going to the next request
Waking up in 4.7 seconds.
rad_recv: Access-Request packet from host 192.168.240.78 port 2676, 
id=9, length=237
        Message-Authenticator = 0x14c8457bb68aa004ba68900830473021
        User-Name = "testUser"
        State = 0xe12d310ae72528a1800156155aa34531
        NAS-IP-Address = 192.168.240.78
        NAS-Port = 4
        NAS-Port-Type = Ethernet
        Calling-Station-Id = "00-16-D3-30-E5-74"
        Called-Station-Id = "00-01-F4-B6-1B-80"
        Framed-MTU = 1000
        EAP-Message = 
0x0208005019001703010020eb13f254dedc7bf752d0c616f6cdfcf92e50268d310f3f34
f114e08421261fcf170301002048fe1b9393fbb14bb637edacb92d74a1ffc680992e2ede
85f97a1ecd021b2fba
        NAS-Identifier = "HOKDORM_01953_M48"
        NAS-Port-Id = "fe.0.4"
+- entering group authorize
++[preprocess] returns ok
++[mschap] returns noop
  rlm_eap: EAP packet type response id 8 length 80
  rlm_eap: Continuing tunnel setup.
++[eap] returns ok
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
+- entering group authenticate
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Received EAP-TLV response.
  rlm_eap_peap:  Had sent TLV failure.  User was rejected earlier in 
this session.
 rlm_eap: Handler failed in EAP/peap
  rlm_eap: Failed in EAP select
++[eap] returns invalid
auth: Failed to validate the user.
Login incorrect: [testUser] (from client DORMTEST2_M80 port 4 cli 
00-16-D3-30-E5-74)
  Found Post-Auth-Type Reject
+- entering group REJECT
        expand: %{User-Name} -> testUser
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Sending Access-Reject of id 9 to 192.168.240.78 port 2676
        EAP-Message = 0x04080004
        Message-Authenticator = 0x00000000000000000000000000000000
Finished request 7.
Going to the next request
Waking up in 4.7 seconds.

-----Original Message-----
From: tnt at kalik.net [mailto:tnt at kalik.net] 
Sent: Thursday, March 19, 2009 2:04 PM
To: FreeRadius users mailing list
Subject: RE: Perl/Peap-MSChapV2 Issues

>I've taken out all perl references from the sites-enabled/default and
>moved them to sites-enabled/inner-tunnel
>

I don't see perl being called:

>  rlm_eap_peap: Session established.  Decoding tunneled attributes.
>  rlm_eap_peap: Identity - 192.168.
>  PEAP: Got tunneled identity of 192.168.
>  PEAP: Setting default EAP type for tunneled EAP session.
>  PEAP: Setting User-Name to 192.168.
>+- entering group authorize
>++[mschap] returns noop
>    rlm_realm: No '@' in User-Name = "192.168.", looking up realm NULL
>    rlm_realm: No such realm "NULL"
>++[suffix] returns noop
>++[control] returns noop
>  rlm_eap: Request is supposed to be proxied to Realm LOCAL.  Not doing
>EAP.
>++[eap] returns noop
>++? if (EAP-Message)
>? Evaluating (EAP-Message) -> TRUE
>++? if (EAP-Message) -> TRUE
>++- entering if (EAP-Message)
>+++[noop] returns noop
>++- if (EAP-Message) returns noop
>++ ... skipping elsif for request 6: Preceding "if" was taken
>++ ... skipping elsif for request 6: Preceding "if" was taken
>++[expiration] returns noop
>++[logintime] returns noop
>++[pap] returns noop
>  WARNING: You set Proxy-To-Realm = LOCAL, but the realm does not 
exist!
> Cancelling invalid proxy request.
>auth: No authenticate method (Auth-Type) configuration found for the
>request: Rejecting the user

Post the inner-tunnel authorize section.

>>I assume you hardcoded that in perl sub authorize. That's a good place
>>for it. Put it back.
>
>I'm not sure what you mean.
>

You need to set Auth-Type perl somewhere: users file or perl sub
authorize.

Ivan Kalik
Kalik Informatika ISP

-
List info/subscribe/unsubscribe? See 
http://www.freeradius.org/list/users.html






More information about the Freeradius-Users mailing list