radius dont work
Aziz YÜCELEN
ayucelen at msn.com
Thu Jul 8 09:33:19 CEST 2010
> Aziz YÜCELEN wrote:
> > I am setup freeradius again and not edit default configuration, I am
> > trying configure inner-tunnel but result didn't change. How to configure
> > inner-tunnel file for ttls thanks.
>
> You don't configure it. The default installation of the server
> configures it.
>
> The debug log shows that it's loading and using the inner-tunnel
> virtual server. It also shows that the inner-tunnel virtual server is
> *empty*.
>
> The *only* way for it to be empty is if you deleted the contents.
Hi
I am setup again and dont configure defaullts.Run radiusd -X and receive user reject, output is below. Thanks for all.
Waking up in 3.4 seconds.
rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=228, length=229
User-Name = "deneme"
NAS-IP-Address = 10.1.1.252
NAS-Port = 0
Called-Station-Id = "00-30-4F-44-3D-C1"
Calling-Station-Id = "00-18-DE-88-62-77"
NAS-Identifier = "WirelessAccessPoint"
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x020c005019800000004616030100410100003d03014c3589c63051541afb7d63785038b2b416e66676504baf594c8d48c83b74954500001600040005000a000900640062000300060013001200630100
State = 0xeccff048edc3e9d4d10018a42bd2d5e3
Message-Authenticator = 0x243675fbd3453868f365dda2997fab4f
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "deneme", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 12 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 70
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] (other): before/accept initialization
[peap] TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 0041], ClientHello
[peap] TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 002a], ServerHello
[peap] TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 0945], Certificate
[peap] TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone
[peap] TLS_accept: SSLv3 write server done A
[peap] TLS_accept: SSLv3 flush data
[peap] TLS_accept: Need to read more data: SSLv3 read client certificate A
In SSL Handshake Phase
In SSL Accept mode
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 228 to 10.1.1.252 port 1206
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0xb020c38e936b9e9a04df30ee
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xeccff048eec2e9d4d10018a42bd2d5e3
Finished request 11.
Going to the next request
Waking up in 2.8 seconds.
rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=229, length=155
User-Name = "deneme"
NAS-IP-Address = 10.1.1.252
NAS-Port = 0
Called-Station-Id = "00-30-4F-44-3D-C1"
Calling-Station-Id = "00-18-DE-88-62-77"
NAS-Identifier = "WirelessAccessPoint"
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x020d00061900
State = 0xeccff048eec2e9d4d10018a42bd2d5e3
Message-Authenticator = 0x49ed19f32e533c2e2e6212cbefba06ea
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "deneme", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 13 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 229 to 10.1.1.252 port 1206
EAP-Message = 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
EAP-Message = 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
EAP-Message = 0x76657273697479206f66204469636c652043657274696669636174655f417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a0282010100d77da96a17a6149943cb99cfcf69462800160a68bfacfa0db9f7db970ea7f31c837f97271d9ed68bbb009eb51e4cafc21cf088e50778d141b190deb43d75b7e01e9dc29bd77a647570a308e1c0ab13c2970fed26b5687eb7038725626ddf2e242abd9b3991a2b7853ff86189d8cbe13ed1a2ba351baa5f30236f09653a83c69ab3e3c86a9374853e9e1587065eac334345888405705ff11515c9dbb079e57cd1b661c75f2cb6fec8e44f63f3568507a5d8f58b6e4af7
EAP-Message = 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
EAP-Message = 0x2049736c656d311f
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xeccff048efc1e9d4d10018a42bd2d5e3
Finished request 12.
Going to the next request
Waking up in 0.8 seconds.
Cleaning up request 9 ID 226 with timestamp +38
Cleaning up request 10 ID 227 with timestamp +38
Waking up in 2.1 seconds.
rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=230, length=155
User-Name = "deneme"
NAS-IP-Address = 10.1.1.252
NAS-Port = 0
Called-Station-Id = "00-30-4F-44-3D-C1"
Calling-Station-Id = "00-18-DE-88-62-77"
NAS-Identifier = "WirelessAccessPoint"
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x020e00061900
State = 0xeccff048efc1e9d4d10018a42bd2d5e3
Message-Authenticator = 0x2a1aed16f39db7a2c6ff51380ae5b702
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "deneme", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 14 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 230 to 10.1.1.252 port 1206
EAP-Message = 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
EAP-Message = 0x70c350ca71cd31a2cb47886bd8cb17551ed454271f457402946307396ac5d2bcc0ae40f920447cd8b7fd06d90118e3f64110cadabd454dfea392b75ebeb229719b4f3f344b2aa44a8694c8140de515a8aa11c80befb98b7f3992094520e5c91cde62ddc42a466d5e3761e2153d6ea34d061eef597e0584d29870b35488e7f9f2a17f00c70e641d2b4aaf0202e07225eea1c8b9fbe65416030100040e000000
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xeccff048e8c0e9d4d10018a42bd2d5e3
Finished request 13.
Going to the next request
Waking up in 1.0 seconds.
Cleaning up request 11 ID 228 with timestamp +40
Waking up in 1.9 seconds.
rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=231, length=471
User-Name = "deneme"
NAS-IP-Address = 10.1.1.252
NAS-Port = 0
Called-Station-Id = "00-30-4F-44-3D-C1"
Calling-Station-Id = "00-18-DE-88-62-77"
NAS-Identifier = "WirelessAccessPoint"
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 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
EAP-Message = 0xf0afc29d9bb8b7d1ec48f850e8300dcad9c77b1d47498ebb1403010001011603010020ac341fafef579e9fbb39c8442996ebcd927065bcd3cee79a61d41a9d87cc9c6f
State = 0xeccff048e8c0e9d4d10018a42bd2d5e3
Message-Authenticator = 0xd1383f8c741d2eee900c243621c0f38c
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "deneme", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 15 length 253
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
TLS Length 310
[peap] Length Included
[peap] eaptls_verify returned 11
[peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange
[peap] TLS_accept: SSLv3 read client key exchange A
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]
[peap] <<< TLS 1.0 Handshake [length 0010], Finished
[peap] TLS_accept: SSLv3 read finished A
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]
[peap] TLS_accept: SSLv3 write change cipher spec A
[peap] >>> TLS 1.0 Handshake [length 0010], Finished
[peap] TLS_accept: SSLv3 write finished A
[peap] TLS_accept: SSLv3 flush data
[peap] (other): SSL negotiation finished successfully
SSL Connection Established
[peap] eaptls_process returned 13
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 231 to 10.1.1.252 port 1206
EAP-Message = 0x0110003119001403010001011603010020946ea9a56d5a8869d64c550c5ec39e505de969b8abcdb94ef288f5981910b1b5
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xeccff048e9dfe9d4d10018a42bd2d5e3
Finished request 14.
Going to the next request
Waking up in 1.0 seconds.
Cleaning up request 12 ID 229 with timestamp +42
Waking up in 1.9 seconds.
rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=232, length=155
User-Name = "deneme"
NAS-IP-Address = 10.1.1.252
NAS-Port = 0
Called-Station-Id = "00-30-4F-44-3D-C1"
Calling-Station-Id = "00-18-DE-88-62-77"
NAS-Identifier = "WirelessAccessPoint"
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x021000061900
State = 0xeccff048e9dfe9d4d10018a42bd2d5e3
Message-Authenticator = 0x1e040ebf6b6f48cb08b525fac4f2f46c
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "deneme", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 16 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3
[peap] eaptls_process returned 3
[peap] EAPTLS_SUCCESS
++[eap] returns handled
Sending Access-Challenge of id 232 to 10.1.1.252 port 1206
EAP-Message = 0x01110020190017030100157296c0b71e3823192738b1788c4fe0467dec236310
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xeccff048eadee9d4d10018a42bd2d5e3
Finished request 15.
Going to the next request
Waking up in 1.0 seconds.
Cleaning up request 13 ID 230 with timestamp +44
Waking up in 2.0 seconds.
rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=233, length=183
User-Name = "deneme"
NAS-IP-Address = 10.1.1.252
NAS-Port = 0
Called-Station-Id = "00-30-4F-44-3D-C1"
Calling-Station-Id = "00-18-DE-88-62-77"
NAS-Identifier = "WirelessAccessPoint"
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x0211002219001703010017e6bc773d8860f3b0fbab0544be27f962e06f2e53070cf6
State = 0xeccff048eadee9d4d10018a42bd2d5e3
Message-Authenticator = 0xb6519fa20a989d07f8aef6ebf8f8c0c1
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "deneme", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 17 length 34
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] Identity - deneme
[peap] Got tunneled request
EAP-Message = 0x0211000b0164656e656d65
server {
PEAP: Got tunneled identity of deneme
PEAP: Setting default EAP type for tunneled EAP session.
PEAP: Setting User-Name to deneme
Sending tunneled request
EAP-Message = 0x0211000b0164656e656d65
FreeRADIUS-Proxied-To = 127.0.0.1
User-Name = "deneme"
server inner-tunnel {
No authenticate method (Auth-Type) configuration found for the request: Rejecting the user
Failed to authenticate the user.
} # server inner-tunnel
[peap] Got tunneled reply code 3
[peap] Got tunneled reply RADIUS code 3
[peap] Tunneled authentication was rejected.
[peap] FAILURE
++[eap] returns handled
Sending Access-Challenge of id 233 to 10.1.1.252 port 1206
EAP-Message = 0x011200261900170301001be3df65e7ef7891a373fd7d2794b88bd42ad9d6e7f59c7b1a517a52
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xeccff048ebdde9d4d10018a42bd2d5e3
Finished request 16.
Going to the next request
Waking up in 1.0 seconds.
Cleaning up request 14 ID 231 with timestamp +46
Waking up in 1.9 seconds.
rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=234, length=187
User-Name = "deneme"
NAS-IP-Address = 10.1.1.252
NAS-Port = 0
Called-Station-Id = "00-30-4F-44-3D-C1"
Calling-Station-Id = "00-18-DE-88-62-77"
NAS-Identifier = "WirelessAccessPoint"
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x021200261900170301001b93c4b2b3423ed61a39a34d66343fdf250f095be821d8f8286720c3
State = 0xeccff048ebdde9d4d10018a42bd2d5e3
Message-Authenticator = 0x899e7167d55a08b8fe446be283c442b3
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "deneme", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 18 length 38
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7
[peap] Done initial handshake
[peap] eaptls_process returned 7
[peap] EAPTLS_OK
[peap] Session established. Decoding tunneled attributes.
[peap] Received EAP-TLV response.
[peap] Had sent TLV failure. User was rejected earlier in this session.
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Using Post-Auth-Type Reject
+- entering group REJECT {...}
[attr_filter.access_reject] expand: %{User-Name} -> deneme
attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 17 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 17
Sending Access-Reject of id 234 to 10.1.1.252 port 1206
EAP-Message = 0x04120004
Message-Authenticator = 0x00000000000000000000000000000000
Cleaning up request 15 ID 232 with timestamp +48
Waking up in 2.0 seconds.
Cleaning up request 16 ID 233 with timestamp +50
Waking up in 2.9 seconds.
rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=235, length=142
User-Name = "deneme"
NAS-IP-Address = 10.1.1.252
NAS-Port = 0
Called-Station-Id = "00-30-4F-44-3D-C1"
Calling-Station-Id = "00-18-DE-88-62-77"
NAS-Identifier = "WirelessAccessPoint"
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x0213000b0164656e656d65
Message-Authenticator = 0xa423f6547bd5227868a4c6c352b61371
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "deneme", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 19 length 11
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[files] users: Matched entry deneme at line 1
[files] expand: MERHABA DOSTUM , %{User-Name} -> MERHABA DOSTUM , deneme
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type md5
rlm_eap_md5: Issuing Challenge
++[eap] returns handled
Sending Access-Challenge of id 235 to 10.1.1.252 port 1206
Reply-Message = "MERHABA DOSTUM , deneme"
EAP-Message = 0x011400160410af2b28a6d3df0c45072b82f0a142941b
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xf4615f8cf4755bc39cf766e7435b4d60
Finished request 18.
Going to the next request
Waking up in 1.0 seconds.
rad_recv: Access-Request packet from host 10.1.1.252 port 1206, id=236, length=155
User-Name = "deneme"
NAS-IP-Address = 10.1.1.252
NAS-Port = 0
Called-Station-Id = "00-30-4F-44-3D-C1"
Calling-Station-Id = "00-18-DE-88-62-77"
NAS-Identifier = "WirelessAccessPoint"
Framed-MTU = 1380
NAS-Port-Type = Wireless-802.11
EAP-Message = 0x021400060319
State = 0xf4615f8cf4755bc39cf766e7435b4d60
Message-Authenticator = 0x0376988d55b546c2ce24d98616953f3d
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "deneme", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 20 length 6
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[unix] returns notfound
[files] users: Matched entry deneme at line 1
[files] expand: MERHABA DOSTUM , %{User-Name} -> MERHABA DOSTUM , deneme
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] Found existing Auth-Type, not changing it.
++[pap] returns noop
Found Auth-Type = EAP
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP NAK
[eap] EAP-NAK asked for EAP-Type/peap
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 236 to 10.1.1.252 port 1206
Reply-Message = "MERHABA DOSTUM , deneme"
EAP-Message = 0x011500061920
Message-Authenticator = 0x00000000000000000000000000000000
State = 0xf4615f8cf57446c39cf766e7435b4d60
Finished request 19.
Going to the next request
_________________________________________________________________
Yeni Windows 7: Size en uygun bilgisayarı bulun. Daha fazla bilgi edinin.
http://windows.microsoft.com/shop
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20100708/ebae16fb/attachment.html>
More information about the Freeradius-Users
mailing list