Can't get LEAP working [beginner]

David Jea dcjea.ee at gmail.com
Sat Oct 30 00:50:46 CEST 2010


Hmmm. probably not the case, here is my 'users' file:

=================
root at djea-ubuntu:/usr/local/etc/raddb#
root at djea-ubuntu:/usr/local/etc/raddb# more users
#
#    Please read the documentation file ../doc/processing_users_file,
#    or 'man 5 users' (after installing the server) for more information.
#
#    This file contains authentication security and configuration
#    information for each user.  Accounting requests are NOT processed
#    through this file.  Instead, see 'acct_users', in this directory.
#
#    The first field is the user's name and can be up to
#    253 characters in length.  This is followed (on the same line) with
#    the list of authentication requirements for that user.  This can
#    include password, comm server name, comm server port number, protocol
#    type (perhaps set by the "hints" file), and huntgroup name (set by
#    the "huntgroups" file).
#
#    If you are not sure why a particular reply is being sent by the
#    server, then run the server in debugging mode (radiusd -X), and
#    you will see which entries in this file are matched.
#
#    When an authentication request is received from the comm server,
#    these values are tested. Only the first match is used unless the
#    "Fall-Through" variable is set to "Yes".
#
#    A special user named "DEFAULT" matches on all usernames.
#    You can have several DEFAULT entries. All entries are processed
#    in the order they appear in this file. The first entry that
#    matches the login-request will stop processing unless you use
#    the Fall-Through variable.
#
#    If you use the database support to turn this file into a .db or .dbm
#    file, the DEFAULT entries _have_ to be at the end of this file and
#    you can't have multiple entries for one username.
#
#    Indented (with the tab character) lines following the first
#    line indicate the configuration values to be passed back to
#    the comm server to allow the initiation of a user session.
#    This can include things like the PPP configuration values
#    or the host to log the user onto.
#
#    You can include another `users' file with `$INCLUDE users.other'
#

#
#    For a list of RADIUS attributes, and links to their definitions,
#    see:
#
#    http://www.freeradius.org/rfc/attributes.html
#

#
# Deny access for a specific user.  Note that this entry MUST
# be before any other 'Auth-Type' attribute which results in the user
# being authenticated.
#
# Note that there is NO 'Fall-Through' attribute, so the user will not
# be given any additional resources.
#
#lameuser    Auth-Type := Reject
#        Reply-Message = "Your account has been disabled."

#
# Deny access for a group of users.
#
# Note that there is NO 'Fall-Through' attribute, so the user will not
# be given any additional resources.
#
#DEFAULT    Group == "disabled", Auth-Type := Reject
#        Reply-Message = "Your account has been disabled."
#

#
# This is a complete entry for "steve". Note that there is no Fall-Through
# entry so that no DEFAULT entry will be used, and the user will NOT
# get any attributes in addition to the ones listed here.
#
#steve    Cleartext-Password := "testing"
#    Service-Type = Framed-User,
#    Framed-Protocol = PPP,
#    Framed-IP-Address = 172.16.3.33,
#    Framed-IP-Netmask = 255.255.255.0,
#    Framed-Routing = Broadcast-Listen,
#    Framed-Filter-Id = "std.ppp",
#    Framed-MTU = 1500,
#    Framed-Compression = Van-Jacobsen-TCP-IP

#
# This is an entry for a user with a space in their name.
# Note the double quotes surrounding the name.
#
#"John Doe"    Cleartext-Password := "hello"
#        Reply-Message = "Hello, %{User-Name}"

#
# Dial user back and telnet to the default host for that port
#
#Deg    Cleartext-Password := "ge55ged"
#    Service-Type = Callback-Login-User,
#    Login-IP-Host = 0.0.0.0,
#    Callback-Number = "9,5551212",
#    Login-Service = Telnet,
#    Login-TCP-Port = Telnet

#
# Another complete entry. After the user "dialbk" has logged in, the
# connection will be broken and the user will be dialed back after which
# he will get a connection to the host "timeshare1".
#
#dialbk    Cleartext-Password := "callme"
#    Service-Type = Callback-Login-User,
#    Login-IP-Host = timeshare1,
#    Login-Service = PortMaster,
#    Callback-Number = "9,1-800-555-1212"

#
# user "swilson" will only get a static IP number if he logs in with
# a framed protocol on a terminal server in Alphen (see the huntgroups
file).
#
# Note that by setting "Fall-Through", other attributes will be added from
# the following DEFAULT entries
#
#swilson    Service-Type == Framed-User, Huntgroup-Name == "alphen"
#        Framed-IP-Address = 192.168.1.65,
#        Fall-Through = Yes

#
# If the user logs in as 'username.shell', then authenticate them
# using the default method, give them shell access, and stop processing
# the rest of the file.
#
#DEFAULT    Suffix == ".shell"
#        Service-Type = Login-User,
#        Login-Service = Telnet,
#        Login-IP-Host = your.shell.machine


#
# The rest of this file contains the several DEFAULT entries.
# DEFAULT entries match with all login names.
# Note that DEFAULT entries can also Fall-Through (see first entry).
# A name-value pair from a DEFAULT entry will _NEVER_ override
# an already existing name-value pair.
#

#
# Set up different IP address pools for the terminal servers.
# Note that the "+" behind the IP address means that this is the "base"
# IP address. The Port-Id (S0, S1 etc) will be added to it.
#
#DEFAULT    Service-Type == Framed-User, Huntgroup-Name == "alphen"
#        Framed-IP-Address = 192.168.1.32+,
#        Fall-Through = Yes

#DEFAULT    Service-Type == Framed-User, Huntgroup-Name == "delft"
#        Framed-IP-Address = 192.168.2.32+,
#        Fall-Through = Yes

#
# Sample defaults for all framed connections.
#
#DEFAULT    Service-Type == Framed-User
#    Framed-IP-Address = 255.255.255.254,
#    Framed-MTU = 576,
#    Service-Type = Framed-User,
#    Fall-Through = Yes

#
# Default for PPP: dynamic IP address, PPP mode, VJ-compression.
# NOTE: we do not use Hint = "PPP", since PPP might also be auto-detected
#    by the terminal server in which case there may not be a "P" suffix.
#    The terminal server sends "Framed-Protocol = PPP" for auto PPP.
#
DEFAULT    Framed-Protocol == PPP
    Framed-Protocol = PPP,
    Framed-Compression = Van-Jacobson-TCP-IP

#
# Default for CSLIP: dynamic IP address, SLIP mode, VJ-compression.
#
DEFAULT    Hint == "CSLIP"
    Framed-Protocol = SLIP,
    Framed-Compression = Van-Jacobson-TCP-IP

#
# Default for SLIP: dynamic IP address, SLIP mode.
#
DEFAULT    Hint == "SLIP"
    Framed-Protocol = SLIP

#
# Last default: rlogin to our main server.
#
#DEFAULT
#    Service-Type = Login-User,
#    Login-Service = Rlogin,
#    Login-IP-Host = shellbox.ispdomain.com

# #
# # Last default: shell on the local terminal server.
# #
# DEFAULT
#     Service-Type = Administrative-User

# On no match, the user is denied access.

steve    Cleartext-Password := "testing"
test    Cleartext-Password := "test"


root at djea-ubuntu:/usr/local/etc/raddb#


===============

Thanks,
David





On Fri, Oct 29, 2010 at 2:45 PM, William Burnett <burnett.w at gmail.com>wrote:

> It appears you have your Auth-Type set to EAP (Auth-Type = EAP) in
> your users file.. Do not set the Auth-Type, the RADIUS server is smart
> enough to figure it out based on the Access-Request packet.
>
> Just set your user w/ the following:
>
> UserName Cleartext-Password := "password"
>        <any additional attributes you require>
>
> Sincerely,
>
> William Burnett
> burnett.w at gmail.com
>
>
>
> On Fri, Oct 29, 2010 at 11:57 AM, David Jea <dcjea.ee at gmail.com> wrote:
> > Hi,
> >
> > I installed freeradius and have radtest passed. Playing with it with
> Cisco
> > gears. The system includes freeRadius (ip: 60.60.0.9 on vlan 660) and
> Cisco
> > controller(ip: 60.62.0.11)/AP (on vlan 662). Using a Windows 7 laptop +
> > Intel 6200 wifi chipset as the client.
> >
> > I understand LEAP is not secure, but it is simple, so this is just hope
> see
> > if they can all work together.  However, client was unable to connect.
> Here
> > are the debug outputs from 'radiusd -X'. Please let me know if you have
> some
> > clues on what might go wrong.
> >
> > Thank you,
> >
> > David
> > ================================
> >
> > root at djea-ubuntu:/usr/local/etc/raddb#
> > root at djea-ubuntu:/usr/local/etc/raddb# radiusd -X
> > FreeRADIUS Version 2.1.10, for host i686-pc-linux-gnu, built on Oct 27
> 2010
> > at 00:44:31
> > Copyright (C) 1999-2009 The FreeRADIUS server project and contributors.
> > There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
> > PARTICULAR PURPOSE.
> > You may redistribute copies of FreeRADIUS under the terms of the
> > GNU General Public License v2.
> > Starting - reading configuration files ...
> > including configuration file /usr/local/etc/raddb/radiusd.conf
> > including configuration file /usr/local/etc/raddb/proxy.conf
> > including configuration file /usr/local/etc/raddb/clients.conf
> > including files in directory /usr/local/etc/raddb/modules/
> > including configuration file /usr/local/etc/raddb/modules/exec
> > including configuration file /usr/local/etc/raddb/modules/etc_group
> > including configuration file /usr/local/etc/raddb/modules/pam
> > including configuration file /usr/local/etc/raddb/modules/krb5
> > including configuration file /usr/local/etc/raddb/modules/detail
> > including configuration file /usr/local/etc/raddb/modules/counter
> > including configuration file /usr/local/etc/raddb/modules/realm
> > including configuration file /usr/local/etc/raddb/modules/always
> > including configuration file /usr/local/etc/raddb/modules/ippool
> > including configuration file /usr/local/etc/raddb/modules/cui
> > including configuration file /usr/local/etc/raddb/modules/sradutmp
> > including configuration file /usr/local/etc/raddb/modules/smsotp
> > including configuration file /usr/local/etc/raddb/modules/ntlm_auth
> > including configuration file /usr/local/etc/raddb/modules/opendirectory
> > including configuration file /usr/local/etc/raddb/modules/otp
> > including configuration file /usr/local/etc/raddb/modules/preprocess
> > including configuration file /usr/local/etc/raddb/modules/files
> > including configuration file /usr/local/etc/raddb/modules/passwd
> > including configuration file /usr/local/etc/raddb/modules/pap
> > including configuration file /usr/local/etc/raddb/modules/checkval
> > including configuration file /usr/local/etc/raddb/modules/digest
> > including configuration file /usr/local/etc/raddb/modules/unix
> > including configuration file /usr/local/etc/raddb/modules/radutmp
> > including configuration file /usr/local/etc/raddb/modules/linelog
> > including configuration file /usr/local/etc/raddb/modules/perl
> > including configuration file /usr/local/etc/raddb/modules/
> detail.example.com
> > including configuration file
> > /usr/local/etc/raddb/modules/sqlcounter_expire_on_login
> > including configuration file /usr/local/etc/raddb/modules/echo
> > including configuration file /usr/local/etc/raddb/modules/inner-eap
> > including configuration file /usr/local/etc/raddb/modules/sql_log
> > including configuration file /usr/local/etc/raddb/modules/attr_rewrite
> > including configuration file /usr/local/etc/raddb/modules/ldap
> > including configuration file /usr/local/etc/raddb/modules/dynamic_clients
> > including configuration file /usr/local/etc/raddb/modules/expiration
> > including configuration file /usr/local/etc/raddb/modules/wimax
> > including configuration file /usr/local/etc/raddb/modules/expr
> > including configuration file /usr/local/etc/raddb/modules/mschap
> > including configuration file /usr/local/etc/raddb/modules/smbpasswd
> > including configuration file /usr/local/etc/raddb/modules/chap
> > including configuration file /usr/local/etc/raddb/modules/mac2vlan
> > including configuration file /usr/local/etc/raddb/modules/acct_unique
> > including configuration file /usr/local/etc/raddb/modules/attr_filter
> > including configuration file /usr/local/etc/raddb/modules/mac2ip
> > including configuration file /usr/local/etc/raddb/modules/policy
> > including configuration file /usr/local/etc/raddb/modules/detail.log
> > including configuration file /usr/local/etc/raddb/modules/logintime
> > including configuration file /usr/local/etc/raddb/eap.conf
> > including configuration file /usr/local/etc/raddb/policy.conf
> > including files in directory /usr/local/etc/raddb/sites-enabled/
> > including configuration file
> /usr/local/etc/raddb/sites-enabled/inner-tunnel
> > including configuration file
> > /usr/local/etc/raddb/sites-enabled/control-socket
> > including configuration file /usr/local/etc/raddb/sites-enabled/default
> > main {
> >     allow_core_dumps = no
> > }
> > including dictionary file /usr/local/etc/raddb/dictionary
> > main {
> >     prefix = "/usr/local"
> >     localstatedir = "/usr/local/var"
> >     logdir = "/usr/local/var/log/radius"
> >     libdir = "/usr/local/lib"
> >     radacctdir = "/usr/local/var/log/radius/radacct"
> >     hostname_lookups = no
> >     max_request_time = 30
> >     cleanup_delay = 5
> >     max_requests = 1024
> >     pidfile = "/usr/local/var/run/radiusd/radiusd.pid"
> >     checkrad = "/usr/local/sbin/checkrad"
> >     debug_level = 0
> >     proxy_requests = yes
> >  log {
> >     stripped_names = no
> >     auth = no
> >     auth_badpass = no
> >     auth_goodpass = no
> >  }
> >  security {
> >     max_attributes = 200
> >     reject_delay = 1
> >     status_server = yes
> >  }
> > }
> > radiusd: #### Loading Realms and Home Servers ####
> >  proxy server {
> >     retry_delay = 5
> >     retry_count = 3
> >     default_fallback = no
> >     dead_time = 120
> >     wake_all_if_all_dead = no
> >  }
> >  home_server localhost {
> >     ipaddr = 127.0.0.1
> >     port = 1812
> >     type = "auth"
> >     secret = "testing123"
> >     response_window = 20
> >     max_outstanding = 65536
> >     require_message_authenticator = yes
> >     zombie_period = 40
> >     status_check = "status-server"
> >     ping_interval = 30
> >     check_interval = 30
> >     num_answers_to_alive = 3
> >     num_pings_to_alive = 3
> >     revive_interval = 120
> >     status_check_timeout = 4
> >     irt = 2
> >     mrt = 16
> >     mrc = 5
> >     mrd = 30
> >  }
> >  home_server_pool my_auth_failover {
> >     type = fail-over
> >     home_server = localhost
> >  }
> >  realm example.com {
> >     auth_pool = my_auth_failover
> >  }
> >  realm LOCAL {
> >  }
> > radiusd: #### Loading Clients ####
> >  client localhost {
> >     ipaddr = 127.0.0.1
> >     require_message_authenticator = no
> >     secret = "testing123"
> >     nastype = "other"
> >  }
> >  client 60.62.0.11 {
> >     require_message_authenticator = no
> >     secret = "abcd"
> >     shortname = "TalwarDjea"
> >     nastype = "other"
> >  }
> > radiusd: #### Instantiating modules ####
> >  instantiate {
> >  Module: Linked to module rlm_exec
> >  Module: Instantiating module "exec" from file
> > /usr/local/etc/raddb/modules/exec
> >   exec {
> >     wait = no
> >     input_pairs = "request"
> >     shell_escape = yes
> >   }
> >  Module: Linked to module rlm_expr
> >  Module: Instantiating module "expr" from file
> > /usr/local/etc/raddb/modules/expr
> >  Module: Linked to module rlm_expiration
> >  Module: Instantiating module "expiration" from file
> > /usr/local/etc/raddb/modules/expiration
> >   expiration {
> >     reply-message = "Password Has Expired  "
> >   }
> >  Module: Linked to module rlm_logintime
> >  Module: Instantiating module "logintime" from file
> > /usr/local/etc/raddb/modules/logintime
> >   logintime {
> >     reply-message = "You are calling outside your allowed timespan  "
> >     minimum-timeout = 60
> >   }
> >  }
> > radiusd: #### Loading Virtual Servers ####
> > server inner-tunnel { # from file
> > /usr/local/etc/raddb/sites-enabled/inner-tunnel
> >  modules {
> >  Module: Checking authenticate {...} for more modules to load
> >  Module: Linked to module rlm_pap
> >  Module: Instantiating module "pap" from file
> > /usr/local/etc/raddb/modules/pap
> >   pap {
> >     encryption_scheme = "auto"
> >     auto_header = no
> >   }
> >  Module: Linked to module rlm_chap
> >  Module: Instantiating module "chap" from file
> > /usr/local/etc/raddb/modules/chap
> >  Module: Linked to module rlm_mschap
> >  Module: Instantiating module "mschap" from file
> > /usr/local/etc/raddb/modules/mschap
> >   mschap {
> >     use_mppe = yes
> >     require_encryption = no
> >     require_strong = no
> >     with_ntdomain_hack = no
> >   }
> >  Module: Linked to module rlm_unix
> >  Module: Instantiating module "unix" from file
> > /usr/local/etc/raddb/modules/unix
> >   unix {
> >     radwtmp = "/usr/local/var/log/radius/radwtmp"
> >   }
> >  Module: Linked to module rlm_eap
> >  Module: Instantiating module "eap" from file
> /usr/local/etc/raddb/eap.conf
> >   eap {
> >     default_eap_type = "md5"
> >     timer_expire = 60
> >     ignore_unknown_eap_types = no
> >     cisco_accounting_username_bug = no
> >     max_sessions = 4096
> >   }
> >  Module: Linked to sub-module rlm_eap_md5
> >  Module: Instantiating eap-md5
> >  Module: Linked to sub-module rlm_eap_leap
> >  Module: Instantiating eap-leap
> >  Module: Linked to sub-module rlm_eap_gtc
> >  Module: Instantiating eap-gtc
> >    gtc {
> >     challenge = "Password: "
> >     auth_type = "PAP"
> >    }
> > Ignoring EAP-Type/tls because we do not have OpenSSL support.
> > Ignoring EAP-Type/ttls because we do not have OpenSSL support.
> > Ignoring EAP-Type/peap because we do not have OpenSSL support.
> >  Module: Linked to sub-module rlm_eap_mschapv2
> >  Module: Instantiating eap-mschapv2
> >    mschapv2 {
> >     with_ntdomain_hack = no
> >    }
> >  Module: Checking authorize {...} for more modules to load
> >  Module: Linked to module rlm_realm
> >  Module: Instantiating module "suffix" from file
> > /usr/local/etc/raddb/modules/realm
> >   realm suffix {
> >     format = "suffix"
> >     delimiter = "@"
> >     ignore_default = no
> >     ignore_null = no
> >   }
> >  Module: Linked to module rlm_files
> >  Module: Instantiating module "files" from file
> > /usr/local/etc/raddb/modules/files
> >   files {
> >     usersfile = "/usr/local/etc/raddb/users"
> >     acctusersfile = "/usr/local/etc/raddb/acct_users"
> >     preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"
> >     compat = "no"
> >   }
> >  Module: Checking session {...} for more modules to load
> >  Module: Linked to module rlm_radutmp
> >  Module: Instantiating module "radutmp" from file
> > /usr/local/etc/raddb/modules/radutmp
> >   radutmp {
> >     filename = "/usr/local/var/log/radius/radutmp"
> >     username = "%{User-Name}"
> >     case_sensitive = yes
> >     check_with_nas = yes
> >     perm = 384
> >     callerid = yes
> >   }
> >  Module: Checking post-proxy {...} for more modules to load
> >  Module: Checking post-auth {...} for more modules to load
> >  Module: Linked to module rlm_attr_filter
> >  Module: Instantiating module "attr_filter.access_reject" from file
> > /usr/local/etc/raddb/modules/attr_filter
> >   attr_filter attr_filter.access_reject {
> >     attrsfile = "/usr/local/etc/raddb/attrs.access_reject"
> >     key = "%{User-Name}"
> >   }
> >  } # modules
> > } # server
> > server { # from file /usr/local/etc/raddb/radiusd.conf
> >  modules {
> >  Module: Checking authenticate {...} for more modules to load
> >  Module: Linked to module rlm_digest
> >  Module: Instantiating module "digest" from file
> > /usr/local/etc/raddb/modules/digest
> >  Module: Checking authorize {...} for more modules to load
> >  Module: Linked to module rlm_preprocess
> >  Module: Instantiating module "preprocess" from file
> > /usr/local/etc/raddb/modules/preprocess
> >   preprocess {
> >     huntgroups = "/usr/local/etc/raddb/huntgroups"
> >     hints = "/usr/local/etc/raddb/hints"
> >     with_ascend_hack = no
> >     ascend_channels_per_line = 23
> >     with_ntdomain_hack = no
> >     with_specialix_jetstream_hack = no
> >     with_cisco_vsa_hack = no
> >     with_alvarion_vsa_hack = no
> >   }
> >  Module: Checking preacct {...} for more modules to load
> >  Module: Linked to module rlm_acct_unique
> >  Module: Instantiating module "acct_unique" from file
> > /usr/local/etc/raddb/modules/acct_unique
> >   acct_unique {
> >     key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address,
> > NAS-Port"
> >   }
> >  Module: Checking accounting {...} for more modules to load
> >  Module: Linked to module rlm_detail
> >  Module: Instantiating module "detail" from file
> > /usr/local/etc/raddb/modules/detail
> >   detail {
> >     detailfile =
> > "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
> >     header = "%t"
> >     detailperm = 384
> >     dirperm = 493
> >     locking = no
> >     log_packet_header = no
> >   }
> >  Module: Instantiating module "attr_filter.accounting_response" from file
> > /usr/local/etc/raddb/modules/attr_filter
> >   attr_filter attr_filter.accounting_response {
> >     attrsfile = "/usr/local/etc/raddb/attrs.accounting_response"
> >     key = "%{User-Name}"
> >   }
> >  Module: Checking session {...} for more modules to load
> >  Module: Checking post-proxy {...} for more modules to load
> >  Module: Checking post-auth {...} for more modules to load
> >  } # modules
> > } # server
> > radiusd: #### Opening IP addresses and Ports ####
> > listen {
> >     type = "auth"
> >     ipaddr = *
> >     port = 0
> > }
> > listen {
> >     type = "acct"
> >     ipaddr = *
> >     port = 0
> > }
> > listen {
> >     type = "control"
> >  listen {
> >     socket = "/usr/local/var/run/radiusd/radiusd.sock"
> >  }
> > }
> > listen {
> >     type = "auth"
> >     ipaddr = 127.0.0.1
> >     port = 18120
> > }
> > Listening on authentication address * port 1812
> > Listening on accounting address * port 1813
> > Listening on command file /usr/local/var/run/radiusd/radiusd.sock
> > Listening on authentication address 127.0.0.1 port 18120 as server
> > inner-tunnel
> > Listening on proxy address * port 1814
> > Ready to process requests.
> > rad_recv: Access-Request packet from host 60.62.0.11 port 32768, id=64,
> > length=171
> >     User-Name = "test"
> >     Calling-Station-Id = "00-23-14-52-b6-48"
> >     Called-Station-Id = "00-22-90-96-74-d0:roam1x"
> >     NAS-Port = 13
> >     NAS-IP-Address = 60.62.0.11
> >     NAS-Identifier = "TalwarDjea"
> >     Airespace-Wlan-Id = 2
> >     Service-Type = Framed-User
> >     Framed-MTU = 1300
> >     NAS-Port-Type = Wireless-802.11
> >     Tunnel-Type:0 = VLAN
> >     Tunnel-Medium-Type:0 = IEEE-802
> >     Tunnel-Private-Group-Id:0 = "662"
> >     EAP-Message = 0x020200090174657374
> >     Message-Authenticator = 0x43b27fa1904d094c72f283b626235ede
> > # Executing section authorize from file
> > /usr/local/etc/raddb/sites-enabled/default
> > +- entering group authorize {...}
> > ++[preprocess] returns ok
> > ++[chap] returns noop
> > ++[mschap] returns noop
> > ++[digest] returns noop
> > [suffix] No '@' in User-Name = "test", looking up realm NULL
> > [suffix] No such realm "NULL"
> > ++[suffix] returns noop
> > [eap] EAP packet type response id 2 length 9
> > [eap] No EAP Start, assuming it's an on-going EAP conversation
> > ++[eap] returns updated
> > [files] users: Matched entry test at line 206
> > ++[files] returns ok
> > ++[expiration] returns noop
> > ++[logintime] returns noop
> > [pap] WARNING: Auth-Type already set.  Not setting to PAP
> > ++[pap] returns noop
> > Found Auth-Type = EAP
> > # Executing group from file /usr/local/etc/raddb/sites-enabled/default
> > +- entering group authenticate {...}
> > [eap] EAP Identity
> > [eap] processing type md5
> > rlm_eap_md5: Issuing Challenge
> > ++[eap] returns handled
> > Sending Access-Challenge of id 64 to 60.62.0.11 port 32768
> >     EAP-Message = 0x010300160410a79c9f15ab9b61db3cbbea86ccff0cdc
> >     Message-Authenticator = 0x00000000000000000000000000000000
> >     State = 0xde34e188de37e54e1627fcd7f780c535
> > Finished request 0.
> > Going to the next request
> > Waking up in 4.9 seconds.
> > rad_recv: Access-Request packet from host 60.62.0.11 port 32768, id=65,
> > length=186
> >     User-Name = "test"
> >     Calling-Station-Id = "00-23-14-52-b6-48"
> >     Called-Station-Id = "00-22-90-96-74-d0:roam1x"
> >     NAS-Port = 13
> >     NAS-IP-Address = 60.62.0.11
> >     NAS-Identifier = "TalwarDjea"
> >     Airespace-Wlan-Id = 2
> >     Service-Type = Framed-User
> >     Framed-MTU = 1300
> >     NAS-Port-Type = Wireless-802.11
> >     Tunnel-Type:0 = VLAN
> >     Tunnel-Medium-Type:0 = IEEE-802
> >     Tunnel-Private-Group-Id:0 = "662"
> >     EAP-Message = 0x020300060311
> >     State = 0xde34e188de37e54e1627fcd7f780c535
> >     Message-Authenticator = 0x86143f5b448d061ce4685385e73a01b4
> > # Executing section authorize from file
> > /usr/local/etc/raddb/sites-enabled/default
> > +- entering group authorize {...}
> > ++[preprocess] returns ok
> > ++[chap] returns noop
> > ++[mschap] returns noop
> > ++[digest] returns noop
> > [suffix] No '@' in User-Name = "test", looking up realm NULL
> > [suffix] No such realm "NULL"
> > ++[suffix] returns noop
> > [eap] EAP packet type response id 3 length 6
> > [eap] No EAP Start, assuming it's an on-going EAP conversation
> > ++[eap] returns updated
> > [files] users: Matched entry test at line 206
> > ++[files] returns ok
> > ++[expiration] returns noop
> > ++[logintime] returns noop
> > [pap] WARNING: Auth-Type already set.  Not setting to PAP
> > ++[pap] returns noop
> > Found Auth-Type = EAP
> > # Executing group from file /usr/local/etc/raddb/sites-enabled/default
> > +- entering group authenticate {...}
> > [eap] Request found, released from the list
> > [eap] EAP NAK
> > [eap] EAP-NAK asked for EAP-Type/leap
> > [eap] processing type leap
> >   rlm_eap_leap: Stage 2
> >   rlm_eap_leap: Issuing AP Challenge
> >   rlm_eap_leap: Successfully initiated
> > ++[eap] returns handled
> > Sending Access-Challenge of id 65 to 60.62.0.11 port 32768
> >     EAP-Message = 0x01040014110100085a49dd53258088a974657374
> >     Message-Authenticator = 0x00000000000000000000000000000000
> >     State = 0xde34e188df30f04e1627fcd7f780c535
> > Finished request 1.
> > Going to the next request
> > Waking up in 4.9 seconds.
> > rad_recv: Access-Request packet from host 60.62.0.11 port 32768, id=66,
> > length=216
> >     User-Name = "test"
> >     Calling-Station-Id = "00-23-14-52-b6-48"
> >     Called-Station-Id = "00-22-90-96-74-d0:roam1x"
> >     NAS-Port = 13
> >     NAS-IP-Address = 60.62.0.11
> >     NAS-Identifier = "TalwarDjea"
> >     Airespace-Wlan-Id = 2
> >     Service-Type = Framed-User
> >     Framed-MTU = 1300
> >     NAS-Port-Type = Wireless-802.11
> >     Tunnel-Type:0 = VLAN
> >     Tunnel-Medium-Type:0 = IEEE-802
> >     Tunnel-Private-Group-Id:0 = "662"
> >     EAP-Message =
> >
> 0x0204002411010018f84b7c6e4beaad41a5f1c179c35507c688576b2d4431d8b574657374
> >     State = 0xde34e188df30f04e1627fcd7f780c535
> >     Message-Authenticator = 0xdab956d032f1cdc8b7519647c512e4ef
> > # Executing section authorize from file
> > /usr/local/etc/raddb/sites-enabled/default
> > +- entering group authorize {...}
> > ++[preprocess] returns ok
> > ++[chap] returns noop
> > ++[mschap] returns noop
> > ++[digest] returns noop
> > [suffix] No '@' in User-Name = "test", looking up realm NULL
> > [suffix] No such realm "NULL"
> > ++[suffix] returns noop
> > [eap] EAP packet type response id 4 length 36
> > [eap] No EAP Start, assuming it's an on-going EAP conversation
> > ++[eap] returns updated
> > [files] users: Matched entry test at line 206
> > ++[files] returns ok
> > ++[expiration] returns noop
> > ++[logintime] returns noop
> > [pap] WARNING: Auth-Type already set.  Not setting to PAP
> > ++[pap] returns noop
> > Found Auth-Type = EAP
> > # Executing group from file /usr/local/etc/raddb/sites-enabled/default
> > +- entering group authenticate {...}
> > [eap] Request found, released from the list
> > [eap] EAP/leap
> > [eap] processing type leap
> >   rlm_eap_leap: Stage 4
> >   rlm_eap_leap: NtChallengeResponse from AP is valid
> > [eap] Underlying EAP-Type set EAP ID to 5
> > ++[eap] returns ok
> > # Executing section post-auth from file
> > /usr/local/etc/raddb/sites-enabled/default
> > +- entering group post-auth {...}
> > ++[exec] returns noop
> > Sending Access-Challenge of id 66 to 60.62.0.11 port 32768
> >     EAP-Message = 0x03050004
> >     Message-Authenticator = 0x00000000000000000000000000000000
> >     State = 0xde34e188dc31f04e1627fcd7f780c535
> > Finished request 2.
> > Going to the next request
> > Waking up in 4.9 seconds.
> > Cleaning up request 0 ID 64 with timestamp +306
> > Cleaning up request 1 ID 65 with timestamp +306
> > Cleaning up request 2 ID 66 with timestamp +306
> > Ready to process requests.
> >
> >
> >
> >
> >
> > -
> > List info/subscribe/unsubscribe? See
> > http://www.freeradius.org/list/users.html
> >
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20101029/4d010f53/attachment.html>


More information about the Freeradius-Users mailing list