Getting NT_STATUS_WRONG_PASSWORD: Wrong Password (0xc000006a) when using ntlm_auth

lint lint at pillclan.com
Thu Dec 8 00:11:30 CET 2011


Alan, here is the output of everything with a failed request:

FreeRADIUS Version 2.1.11, for host x86_64-redhat-linux-gnu, built on Sep 20
2011 at 13:55:32
Copyright (C) 1999-2009 The FreeRADIUS server project and contributors. 
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A 
PARTICULAR PURPOSE. 
You may redistribute copies of FreeRADIUS under the terms of the 
GNU General Public License v2. 
Starting - reading configuration files ...
including configuration file /etc/raddb/radiusd.conf
including configuration file /etc/raddb/proxy.conf
including configuration file /etc/raddb/clients.conf
including files in directory /etc/raddb/modules/
including configuration file /etc/raddb/modules/smbpasswd
including configuration file /etc/raddb/modules/mac2vlan
including configuration file /etc/raddb/modules/exec
including configuration file /etc/raddb/modules/realm
including configuration file /etc/raddb/modules/logintime
including configuration file /etc/raddb/modules/unix
including configuration file /etc/raddb/modules/linelog
including configuration file /etc/raddb/modules/detail.example.com
including configuration file /etc/raddb/modules/echo
including configuration file /etc/raddb/modules/detail
including configuration file /etc/raddb/modules/pap
including configuration file /etc/raddb/modules/dynamic_clients
including configuration file /etc/raddb/modules/always
including configuration file /etc/raddb/modules/sqlcounter_expire_on_login
including configuration file /etc/raddb/modules/redis
including configuration file /etc/raddb/modules/chap
including configuration file /etc/raddb/modules/passwd
including configuration file /etc/raddb/modules/otp
including configuration file /etc/raddb/modules/files
including configuration file /etc/raddb/modules/attr_filter
including configuration file /etc/raddb/modules/sradutmp
including configuration file /etc/raddb/modules/etc_group
including configuration file /etc/raddb/modules/mschap.org
including configuration file /etc/raddb/modules/wimax
including configuration file /etc/raddb/modules/checkval
including configuration file /etc/raddb/modules/sql_log
including configuration file /etc/raddb/modules/detail.log
including configuration file /etc/raddb/modules/pam
including configuration file /etc/raddb/modules/mac2ip
including configuration file /etc/raddb/modules/replicate
including configuration file /etc/raddb/modules/preprocess
including configuration file /etc/raddb/modules/opendirectory
including configuration file /etc/raddb/modules/digest
including configuration file /etc/raddb/modules/radutmp
including configuration file /etc/raddb/modules/cui
including configuration file /etc/raddb/modules/policy
including configuration file /etc/raddb/modules/ippool
including configuration file /etc/raddb/modules/rediswho
including configuration file /etc/raddb/modules/ntlm_auth
including configuration file /etc/raddb/modules/acct_unique
including configuration file /etc/raddb/modules/soh
including configuration file /etc/raddb/modules/perl.rpmnew
including configuration file /etc/raddb/modules/counter
including configuration file /etc/raddb/modules/expr
including configuration file /etc/raddb/modules/perl
including configuration file /etc/raddb/modules/inner-eap
including configuration file /etc/raddb/modules/smsotp
including configuration file /etc/raddb/modules/mschap
including configuration file /etc/raddb/modules/attr_rewrite
including configuration file /etc/raddb/modules/expiration
including configuration file /etc/raddb/eap.conf
including configuration file /etc/raddb/sql.conf
including configuration file /etc/raddb/sql/mysql/packetfence.conf
including configuration file /etc/raddb/policy.conf
including files in directory /etc/raddb/sites-enabled/
including configuration file /etc/raddb/sites-enabled/packetfence
including configuration file /etc/raddb/sites-enabled/packetfence-tunnel
including configuration file /etc/raddb/sites-enabled/control-socket
including configuration file /etc/raddb/sites-enabled/default
including configuration file /etc/raddb/sites-enabled/inner-tunnel
main {
	user = "radiusd"
	group = "radiusd"
	allow_core_dumps = no
}
including dictionary file /etc/raddb/dictionary
main {
	name = "radiusd"
	prefix = "/usr"
	localstatedir = "/var"
	sbindir = "/usr/sbin"
	logdir = "/var/log/radius"
	run_dir = "/var/run/radiusd"
	libdir = "/usr/lib64/freeradius"
	radacctdir = "/var/log/radius/radacct"
	hostname_lookups = no
	max_request_time = 30
	cleanup_delay = 5
	max_requests = 1024
	pidfile = "/var/run/radiusd/radiusd.pid"
	checkrad = "/usr/sbin/checkrad"
	debug_level = 0
	proxy_requests = yes
 log {
	stripped_names = no
	auth = no
	auth_badpass = no
	auth_goodpass = no
 }
 security {
	max_attributes = 200
	reject_delay = 1
	status_server = yes
 }
}
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
	retry_delay = 5
	retry_count = 3
	default_fallback = no
	dead_time = 120
	wake_all_if_all_dead = no
 }
 home_server localhost {
	ipaddr = 127.0.0.1
	port = 1812
	type = "auth"
	secret = "testing123"
	response_window = 20
	max_outstanding = 65536
	require_message_authenticator = yes
	zombie_period = 40
	status_check = "status-server"
	ping_interval = 30
	check_interval = 30
	num_answers_to_alive = 3
	num_pings_to_alive = 3
	revive_interval = 120
	status_check_timeout = 4
  coa {
	irt = 2
	mrt = 16
	mrc = 5
	mrd = 30
  }
 }
 home_server_pool my_auth_failover {
	type = fail-over
	home_server = localhost
 }
 realm example.com {
	auth_pool = my_auth_failover
 }
 realm LOCAL {
 }
radiusd: #### Loading Clients ####
 client localhost {
	ipaddr = 127.0.0.1
	require_message_authenticator = no
	secret = "testing123"
	nastype = "other"
 }
 client 10.10.20.62 {
	ipaddr = 10.10.20.62
	require_message_authenticator = no
	secret = "testing123"
	shortname = "ap-tech01"
 }
 client 10.10.10.248 {
	ipaddr = 10.10.10.248
	require_message_authenticator = no
	secret = "testing123"
	shortname = "wl-mgmt"
 }
 client 10.10.20.6 {
	ipaddr = 10.10.20.6
	require_message_authenticator = no
	secret = "testing123"
	shortname = "testswitch"
 }
radiusd: #### Instantiating modules ####
 instantiate {
 Module: Linked to module rlm_exec
 Module: Instantiating module "exec" from file /etc/raddb/modules/exec
  exec {
	wait = no
	input_pairs = "request"
	shell_escape = yes
  }
 Module: Linked to module rlm_expr
 Module: Instantiating module "expr" from file /etc/raddb/modules/expr
 Module: Linked to module rlm_expiration
 Module: Instantiating module "expiration" from file
/etc/raddb/modules/expiration
  expiration {
	reply-message = "Password Has Expired  "
  }
 Module: Linked to module rlm_logintime
 Module: Instantiating module "logintime" from file
/etc/raddb/modules/logintime
  logintime {
	reply-message = "You are calling outside your allowed timespan  "
	minimum-timeout = 60
  }
 }
radiusd: #### Loading Virtual Servers ####
server { # from file /etc/raddb/radiusd.conf
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_pap
 Module: Instantiating module "pap" from file /etc/raddb/modules/pap
  pap {
	encryption_scheme = "auto"
	auto_header = no
  }
 Module: Linked to module rlm_chap
 Module: Instantiating module "chap" from file /etc/raddb/modules/chap
 Module: Linked to module rlm_mschap
 Module: Instantiating module "mschap" from file
/etc/raddb/modules/mschap.org
  mschap {
	use_mppe = yes
	require_encryption = no
	require_strong = no
	with_ntdomain_hack = no
	allow_retry = yes
  }
 Module: Linked to module rlm_digest
 Module: Instantiating module "digest" from file /etc/raddb/modules/digest
 Module: Linked to module rlm_unix
 Module: Instantiating module "unix" from file /etc/raddb/modules/unix
  unix {
	radwtmp = "/var/log/radius/radwtmp"
  }
 Module: Instantiating module "ntlm_auth" from file
/etc/raddb/modules/ntlm_auth
  exec ntlm_auth {
	wait = yes
	program = "/usr/bin/ntlm_auth --request-nt-key --domain=domain.net
--username=%{mschap:User-Name} --password=%{User-Password}"
	input_pairs = "request"
	shell_escape = yes
  }
 Module: Linked to module rlm_eap
 Module: Instantiating module "eap" from file /etc/raddb/eap.conf
  eap {
	default_eap_type = "peap"
	timer_expire = 60
	ignore_unknown_eap_types = no
	cisco_accounting_username_bug = no
	max_sessions = 2048
  }
 Module: Linked to sub-module rlm_eap_md5
 Module: Instantiating eap-md5
 Module: Linked to sub-module rlm_eap_tls
 Module: Instantiating eap-tls
   tls {
	rsa_key_exchange = no
	dh_key_exchange = yes
	rsa_key_length = 512
	dh_key_length = 512
	verify_depth = 0
	pem_file_type = yes
	private_key_file = "/usr/local/pf/conf/ssl/server.key"
	certificate_file = "/usr/local/pf/conf/ssl/server.crt"
	dh_file = "/etc/raddb/certs/dh"
	random_file = "/dev/urandom"
	fragment_size = 1024
	include_length = yes
	check_crl = no
	cipher_list = "DEFAULT"
	make_cert_command = "/etc/raddb/certs/bootstrap"
    cache {
	enable = no
	lifetime = 24
	max_entries = 255
    }
   }
 Module: Linked to sub-module rlm_eap_ttls
 Module: Instantiating eap-ttls
   ttls {
	default_eap_type = "peap"
	copy_request_to_tunnel = yes
	use_tunneled_reply = yes
	virtual_server = "packetfence-tunnel"
	include_length = yes
   }
 Module: Linked to sub-module rlm_eap_peap
 Module: Instantiating eap-peap
   peap {
	default_eap_type = "mschapv2"
	copy_request_to_tunnel = yes
	use_tunneled_reply = yes
	proxy_tunneled_request_as_eap = yes
	virtual_server = "packetfence-tunnel"
	soh = no
   }
 Module: Linked to sub-module rlm_eap_mschapv2
 Module: Instantiating eap-mschapv2
   mschapv2 {
	with_ntdomain_hack = no
	send_error = no
   }
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_preprocess
 Module: Instantiating module "preprocess" from file
/etc/raddb/modules/preprocess
  preprocess {
	huntgroups = "/etc/raddb/huntgroups"
	hints = "/etc/raddb/hints"
	with_ascend_hack = no
	ascend_channels_per_line = 23
	with_ntdomain_hack = no
	with_specialix_jetstream_hack = no
	with_cisco_vsa_hack = no
	with_alvarion_vsa_hack = no
  }
 Module: Linked to module rlm_realm
 Module: Instantiating module "suffix" from file /etc/raddb/modules/realm
  realm suffix {
	format = "suffix"
	delimiter = "@"
	ignore_default = no
	ignore_null = no
  }
 Module: Linked to module rlm_files
 Module: Instantiating module "files" from file /etc/raddb/modules/files
  files {
	usersfile = "/etc/raddb/users"
	acctusersfile = "/etc/raddb/acct_users"
	preproxy_usersfile = "/etc/raddb/preproxy_users"
	compat = "no"
  }
 Module: Checking preacct {...} for more modules to load
 Module: Linked to module rlm_acct_unique
 Module: Instantiating module "acct_unique" from file
/etc/raddb/modules/acct_unique
  acct_unique {
	key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address,
NAS-Port"
  }
 Module: Checking accounting {...} for more modules to load
 Module: Linked to module rlm_detail
 Module: Instantiating module "detail" from file /etc/raddb/modules/detail
  detail {
	detailfile =
"/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
	header = "%t"
	detailperm = 384
	dirperm = 493
	locking = no
	log_packet_header = no
  }
 Module: Linked to module rlm_radutmp
 Module: Instantiating module "radutmp" from file /etc/raddb/modules/radutmp
  radutmp {
	filename = "/var/log/radius/radutmp"
	username = "%{User-Name}"
	case_sensitive = yes
	check_with_nas = yes
	perm = 384
	callerid = yes
  }
 Module: Linked to module rlm_attr_filter
 Module: Instantiating module "attr_filter.accounting_response" from file
/etc/raddb/modules/attr_filter
  attr_filter attr_filter.accounting_response {
	attrsfile = "/etc/raddb/attrs.accounting_response"
	key = "%{User-Name}"
  }
 Module: Checking session {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 Module: Instantiating module "attr_filter.access_reject" from file
/etc/raddb/modules/attr_filter
  attr_filter attr_filter.access_reject {
	attrsfile = "/etc/raddb/attrs.access_reject"
	key = "%{User-Name}"
  }
 } # modules
} # server
server packetfence { # from file /etc/raddb/sites-enabled/packetfence
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_perl
 Module: Instantiating module "perl" from file
/etc/raddb/modules/perl.rpmnew
  perl {
	module = "/etc/raddb/example.pl"
	func_authorize = "authorize"
	func_authenticate = "authenticate"
	func_accounting = "accounting"
	func_preacct = "preacct"
	func_checksimul = "checksimul"
	func_detach = "detach"
	func_xlat = "xlat"
	func_pre_proxy = "pre_proxy"
	func_post_proxy = "post_proxy"
	func_post_auth = "post_auth"
	func_recv_coa = "recv_coa"
	func_send_coa = "send_coa"
  }
 Module: Checking preacct {...} for more modules to load
 Module: Checking accounting {...} for more modules to load
 Module: Linked to module rlm_sql
 Module: Instantiating module "sql" from file /etc/raddb/sql.conf
  sql {
	driver = "rlm_sql_mysql"
	server = "localhost"
	port = ""
	login = "pf"
	password = "pfz3n"
	radius_db = "pf"
	read_groups = yes
	sqltrace = no
	sqltracefile = "/var/log/radius/sqltrace.sql"
	readclients = yes
	deletestalesessions = yes
	num_sql_socks = 5
	lifetime = 0
	max_queries = 0
	sql_user_name = "%{User-Name}"
	default_user_profile = ""
	nas_query = "SELECT id, nasname, shortname, type, secret FROM radius_nas"
	authorize_check_query = "SELECT id, username, attribute, value, op          
FROM radcheck           WHERE username = '%{SQL-User-Name}'           ORDER
BY id"
	authorize_reply_query = "SELECT id, username, attribute, value, op          
FROM radreply           WHERE username = '%{SQL-User-Name}'           ORDER
BY id"
	authorize_group_check_query = "SELECT id, groupname, attribute,          
Value, op           FROM radgroupcheck           WHERE groupname =
'%{Sql-Group}'           ORDER BY id"
	authorize_group_reply_query = "SELECT id, groupname, attribute,          
value, op           FROM radgroupreply           WHERE groupname =
'%{Sql-Group}'           ORDER BY id"
	accounting_onoff_query = "          UPDATE radacct           SET             
acctstoptime       =  '%S',              acctsessiontime    = 
unix_timestamp('%S') -                                   
unix_timestamp(acctstarttime),              acctterminatecause = 
'%{Acct-Terminate-Cause}',              acctstopdelay      = 
%{%{Acct-Delay-Time}:-0}           WHERE acctstoptime IS NULL           AND
nasipaddress      =  '%{NAS-IP-Address}'           AND acctstarttime     <=
'%S'"
	accounting_update_query = "	 CALL acct_update ( 		'%S',
'%{Acct-Session-Time}', 		'%{%{Acct-Input-Gigawords}:-0}'  << 32 |
'%{%{Acct-Input-Octets}:-0}', 		'%{%{Acct-Output-Gigawords}:-0}' << 32 |
'%{%{Acct-Output-Octets}:-0}', 		'%{Acct-Session-Id}', '%{SQL-User-Name}',
'%{NAS-IP-Address}', '%{Framed-IP-Address}', '%{Acct-Status-Type}')"
	accounting_update_query_alt = "           INSERT INTO radacct            
(acctsessionid,    acctuniqueid,      username,              realm,           
nasipaddress,      nasportid,              nasporttype,      acctstarttime,    
acctsessiontime,              acctauthentic,    connectinfo_start,
acctinputoctets,              acctoutputoctets, calledstationid,  
callingstationid,              servicetype,      framedprotocol,   
framedipaddress,              acctstartdelay,   xascendsessionsvrkey)          
VALUES             ('%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}',             
'%{SQL-User-Name}',              '%{Realm}', '%{NAS-IP-Address}',
'%{NAS-Port}',              '%{NAS-Port-Type}',              DATE_SUB('%S',                      
INTERVAL (%{%{Acct-Session-Time}:-0} +                                
%{%{Acct-Delay-Time}:-0}) SECOND),                      
'%{Acct-Session-Time}',              '%{Acct-Authentic}', '',             
'%{%{Acct-Input-Gigawords}:-0}' << 32 |             
'%{%{Acct-Input-Octets}:-0}',              '%{%{Acct-Output-Gigawords}:-0}'
<< 32 |              '%{%{Acct-Output-Octets}:-0}',             
REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''),             
'%{Service-Type}', '%{Framed-Protocol}',             
'%{Framed-IP-Address}',              '0', '%{X-Ascend-Session-Svr-Key}')"
	accounting_start_query = " 	  CALL acct_start (            
'%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}',            
'%{SQL-User-Name}',             '%{Realm}', '%{NAS-IP-Address}',
'%{NAS-Port}',             '%{NAS-Port-Type}', '%S', NULL,             '0',
'%{Acct-Authentic}', '%{Connect-Info}',             '', '0', '0',            
REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''), '',            
'%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}',            
'%{%{Acct-Delay-Time}:-0}', '0', '%{X-Ascend-Session-Svr-Key}',
'%{Acct-Status-Type}')"
	accounting_start_query_alt = "           UPDATE radacct SET             
acctstarttime     = '%S',              acctstartdelay    =
'%{%{Acct-Delay-Time}:-0}',              connectinfo_start =
'%{Connect-Info}'           WHERE acctsessionid  = '%{Acct-Session-Id}'          
AND username         = '%{SQL-User-Name}'           AND nasipaddress     =
'%{NAS-IP-Address}'"
	accounting_stop_query = " 	  CALL acct_stop ( 	     '%S',             
'%{Acct-Session-Time}',              '%{%{Acct-Input-Gigawords}:-0}' << 32 |
'%{%{Acct-Input-Octets}:-0}',              '%{%{Acct-Output-Gigawords}:-0}'
<< 32 | '%{%{Acct-Output-Octets}:-0}',             
'%{Acct-Terminate-Cause}',              '%{%{Acct-Delay-Time}:-0}',             
'%{Connect-Info}',              '%{Acct-Session-Id}',             
'%{SQL-User-Name}',              '%{NAS-IP-Address}',             
'%{Acct-Status-Type}')"
	accounting_stop_query_alt = "           INSERT INTO radacct            
(acctsessionid, acctuniqueid, username,              realm, nasipaddress,
nasportid,              nasporttype, acctstarttime, acctstoptime,             
acctsessiontime, acctauthentic, connectinfo_start,             
connectinfo_stop, acctinputoctets, acctoutputoctets,             
calledstationid, callingstationid, acctterminatecause,             
servicetype, framedprotocol, framedipaddress,              acctstartdelay,
acctstopdelay)           VALUES             ('%{Acct-Session-Id}',
'%{Acct-Unique-Session-Id}',              '%{SQL-User-Name}',             
'%{Realm}', '%{NAS-IP-Address}', '%{NAS-Port}',             
'%{NAS-Port-Type}',              DATE_SUB('%S',                  INTERVAL
(%{%{Acct-Session-Time}:-0} +                  %{%{Acct-Delay-Time}:-0})
SECOND),              '%S', '%{Acct-Session-Time}', '%{Acct-Authentic}', '',             
'%{Connect-Info}',              '%{%{Acct-Input-Gigawords}:-0}' << 32 |             
'%{%{Acct-Input-Octets}:-0}',              '%{%{Acct-Output-Gigawords}:-0}'
<< 32 |              '%{%{Acct-Output-Octets}:-0}',             
REPLACE(REPLACE('%{Called-Station-Id}','-',''),':',''),
REPLACE(REPLACE('%{Calling-Station-Id}','-',''),':',''),             
'%{Acct-Terminate-Cause}',              '%{Service-Type}',
'%{Framed-Protocol}', '%{Framed-IP-Address}',              '0',
'%{%{Acct-Delay-Time}:-0}')"
	group_membership_query = "SELECT groupname           FROM radusergroup          
WHERE username = '%{SQL-User-Name}'           ORDER BY priority"
	connect_failure_retry_delay = 60
	simul_count_query = ""
	simul_verify_query = "SELECT radacctid, acctsessionid, username,                               
nasipaddress, nasportid, framedipaddress,                               
callingstationid, framedprotocol                                FROM radacct                               
WHERE username = '%{SQL-User-Name}'                                AND
acctstoptime IS NULL"
	postauth_query = "INSERT INTO radpostauth                          
(username, pass, reply, authdate)                           VALUES (                          
'%{User-Name}',                          
'%{%{User-Password}:-%{Chap-Password}}',                          
'%{reply:Packet-Type}', '%S')"
	safe-characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
  }
rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
rlm_sql (sql): Attempting to connect to pf at localhost:/pf
rlm_sql (sql): starting 0
rlm_sql (sql): Attempting to connect rlm_sql_mysql #0
rlm_sql_mysql: Starting connect to MySQL server for #0
rlm_sql (sql): Connected new DB handle, #0
rlm_sql (sql): starting 1
rlm_sql (sql): Attempting to connect rlm_sql_mysql #1
rlm_sql_mysql: Starting connect to MySQL server for #1
rlm_sql (sql): Connected new DB handle, #1
rlm_sql (sql): starting 2
rlm_sql (sql): Attempting to connect rlm_sql_mysql #2
rlm_sql_mysql: Starting connect to MySQL server for #2
rlm_sql (sql): Connected new DB handle, #2
rlm_sql (sql): starting 3
rlm_sql (sql): Attempting to connect rlm_sql_mysql #3
rlm_sql_mysql: Starting connect to MySQL server for #3
rlm_sql (sql): Connected new DB handle, #3
rlm_sql (sql): starting 4
rlm_sql (sql): Attempting to connect rlm_sql_mysql #4
rlm_sql_mysql: Starting connect to MySQL server for #4
rlm_sql (sql): Connected new DB handle, #4
rlm_sql (sql): Processing generate_sql_clients
rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname,
shortname, type, secret FROM radius_nas
rlm_sql (sql): Reserving sql socket id: 4
rlm_sql (sql): Read entry
nasname=10.0.10.2,shortname=10.0.10.2,secret=s3cr3t
rlm_sql (sql): Adding client 10.0.10.2 (10.0.10.2, server=<none>) to clients
list
rlm_sql (sql): Read entry
nasname=10.0.10.3,shortname=10.0.10.3,secret=s3cr3t
rlm_sql (sql): Adding client 10.0.10.3 (10.0.10.3, server=<none>) to clients
list
rlm_sql (sql): Released sql socket id: 4
 Module: Checking session {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 } # modules
} # server
server packetfence-tunnel { # from file
/etc/raddb/sites-enabled/packetfence-tunnel
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Checking authorize {...} for more modules to load
 Module: Checking session {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 } # modules
} # server
server inner-tunnel { # from file /etc/raddb/sites-enabled/inner-tunnel
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Checking authorize {...} for more modules to load
 Module: Checking session {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 } # modules
} # server
radiusd: #### Opening IP addresses and Ports ####
listen {
	type = "auth"
	virtual_server = "packetfence"
	ipaddr = *
	port = 0
}
listen {
	type = "acct"
	virtual_server = "packetfence"
	ipaddr = *
	port = 0
}
listen {
	type = "control"
 listen {
	socket = "/var/run/radiusd/radiusd.sock"
 }
}
listen {
	type = "auth"
	ipaddr = 127.0.0.1
	port = 18120
}
 ... adding new socket proxy address * port 55126
Listening on authentication address * port 1812 as server packetfence
Listening on accounting address * port 1813 as server packetfence
Listening on command file /var/run/radiusd/radiusd.sock
Listening on authentication address 127.0.0.1 port 18120 as server
inner-tunnel
Listening on proxy address * port 1814
Ready to process requests.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=61,
length=147
	NAS-Port-Id = "AP106/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-5D-44:SISD-Network"
	Service-Type = Framed-User
	EAP-Message = 0x0201000901726f6f74
	User-Name = "root"
	NAS-Port = 34226
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x67b17e9993463e70db7e096dd5d4b3b6
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 1 length 9
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
rlm_perl: Added pair Service-Type = Framed-User
rlm_perl: Added pair Called-Station-Id = 00-1F-DA-26-5D-44:SISD-Network
rlm_perl: Added pair Calling-Station-Id = 00-16-EA-B9-D1-CC
rlm_perl: Added pair Message-Authenticator =
0x67b17e9993463e70db7e096dd5d4b3b6
rlm_perl: Added pair User-Name = root
rlm_perl: Added pair NAS-Identifier = nortel
rlm_perl: Added pair EAP-Message = 0x0201000901726f6f74
rlm_perl: Added pair EAP-Type = Identity
rlm_perl: Added pair NAS-Port = 34226
rlm_perl: Added pair NAS-IP-Address = 10.10.10.248
rlm_perl: Added pair NAS-Port-Id = AP106/1
rlm_perl: Added pair Auth-Type = EAP
++[perl] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 61 to 10.10.10.248 port 20002
	EAP-Message = 0x010200061920
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xaf36b0c2af34a91245e3660c64ffaedc
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=62,
length=261
	NAS-Port-Id = "AP106/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-5D-44:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34226
	State = 0xaf36b0c2af34a91245e3660c64ffaedc
	EAP-Message =
0x0202006919800000005f160301005a0100005603014edff0b468a58899972e56fbb9f1b99c921d470fe5329bcfe95178b01e4edac000002800390038003500160013000a00330032002f000500040015001200090014001100080006000300ff020100000400230000
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x0892c5e18f0c208992ade2392662cb3e
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 2 length 105
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 95
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap]     (other): before/accept initialization
[peap]     TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 005a], ClientHello  
[peap]     TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 0031], ServerHello  
[peap]     TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 03c6], Certificate  
[peap]     TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 018d], ServerKeyExchange  
[peap]     TLS_accept: SSLv3 write key exchange A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
[peap]     TLS_accept: SSLv3 write server done A
[peap]     TLS_accept: SSLv3 flush data
[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate
A
In SSL Handshake Phase 
In SSL Accept mode  
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 62 to 10.10.10.248 port 20002
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message = 0xfaab6e6afe7983e3ceb172c2
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xaf36b0c2ae35a91245e3660c64ffaedc
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=63,
length=162
	NAS-Port-Id = "AP106/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-5D-44:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34226
	State = 0xaf36b0c2ae35a91245e3660c64ffaedc
	EAP-Message = 0x020300061900
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0xe38005c4b1706e6a7e29a119271fbb9e
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 3 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 63 to 10.10.10.248 port 20002
	EAP-Message =
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
	EAP-Message =
0xf9fbfb95f4a13a08d42df26a32d8c926d3d72c0664126521b6c8bf232d5fd69e315a8851008003f9499c227efa3b95e285c45357685011aeb0beaa2c0422378382e88ee3f4258da149c67ce3e8584ef76f70ee947ab2da275ccf031e413417ab72d8889d93af4f1ca17a0c9a21a09147110d1fc789055030d32d86da39ba23c42ffb72b59d159bf5ec4172dc15965514614648754da6b0902e80b27a837b8918608e6d8e318516030100040e000000
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xaf36b0c2ad32a91245e3660c64ffaedc
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=64,
length=364
	NAS-Port-Id = "AP106/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-5D-44:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34226
	State = 0xaf36b0c2ad32a91245e3660c64ffaedc
	EAP-Message =
0x020400d01980000000c6160301008610000082008092b9a410e808d237744779f110f70552b38ec2d4dd188e21575b6d5f7cd22b1e6db23b4dda7b1cfb9b4a6772c0c03c5640162592d066de5a1bcb4b79e21a960fe4990db86f7e568f68050e56a3bc56b0c745068ad73fa850fc347a1eba7646e2294d733ced97b62ae5b7404dd98cf9df9d8f2596151f5298f2f4bdd099799ec51403010001011603010030df577db3d91d6a53405732e0a7eba3f6ab6cc4cf6552e5016328c539cf31f675ffd998f533fdd5093095bf248045b523
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0xf5d9553516cf0faaec30deb3e79c929f
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 4 length 208
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 198
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
[peap]     TLS_accept: SSLv3 read client key exchange A
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]  
[peap] <<< TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 read finished A
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]  
[peap]     TLS_accept: SSLv3 write change cipher spec A
[peap] >>> TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 write finished A
[peap]     TLS_accept: SSLv3 flush data
[peap]     (other): SSL negotiation finished successfully
SSL Connection Established 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 64 to 10.10.10.248 port 20002
	EAP-Message =
0x0105004119001403010001011603010030e4e932ca10085dc09c1bd1acfe0bdc87b26add99901309336399b1d80dbfbb63852a27a2e9c1675864720e1427e77fc3
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xaf36b0c2ac33a91245e3660c64ffaedc
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=65,
length=162
	NAS-Port-Id = "AP106/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-5D-44:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34226
	State = 0xaf36b0c2ac33a91245e3660c64ffaedc
	EAP-Message = 0x020500061900
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0xbf3a9673681c3544660979bcfdd9b7c6
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 5 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3 
[peap] eaptls_process returned 3 
[peap] EAPTLS_SUCCESS
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state TUNNEL ESTABLISHED
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 65 to 10.10.10.248 port 20002
	EAP-Message =
0x0106002b19001703010020e87c17e1cbf292b1387072fbf82e0f8306925df48600f6024d353ad9f0515980
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xaf36b0c2ab30a91245e3660c64ffaedc
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=66,
length=236
	NAS-Port-Id = "AP106/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-5D-44:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34226
	State = 0xaf36b0c2ab30a91245e3660c64ffaedc
	EAP-Message =
0x0206005019001703010020b98b473f80dcbe37e138317408332995274dc8832866adbe5d4578824a37c13f1703010020f13c60a3f1a6e62bc66ffc2b4cd9be5d37bc5eb4e3a394945dce930a1710683a
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x8c20eac6c85651df81786df0a66c9542
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 6 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state WAITING FOR INNER IDENTITY
[peap] Identity - root
[peap] Got inner identity 'root'
[peap] Setting default EAP type for tunneled EAP session.
[peap] Got tunneled request
	EAP-Message = 0x0206000901726f6f74
server packetfence {
[peap] Setting User-Name to root
Sending tunneled request
	EAP-Message = 0x0206000901726f6f74
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "root"
	NAS-Port-Id = "AP106/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-5D-44:SISD-Network"
	Service-Type = Framed-User
	NAS-Port = 34226
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
server packetfence-tunnel {
# Executing section authorize from file
/etc/raddb/sites-enabled/packetfence-tunnel
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 6 length 9
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence-tunnel
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server packetfence-tunnel
[peap] Got tunneled reply code 11
	EAP-Message =
0x0107001e1a0107001910fb87d2354d16a17ba3aa64af6c95fb27726f6f74
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6b88b6ab6b8facaa14b7c1873fd1677f
[peap] Got tunneled reply RADIUS code 11
	EAP-Message =
0x0107001e1a0107001910fb87d2354d16a17ba3aa64af6c95fb27726f6f74
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x6b88b6ab6b8facaa14b7c1873fd1677f
[peap] Got tunneled Access-Challenge
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 66 to 10.10.10.248 port 20002
	EAP-Message =
0x0107004b190017030100405fec8f8ae5015542f5e084b6b4f67293733c2effe80335b42743c49489a6062d535d6117ce761ac83a5410e80e61932c3f93f9678abe00b4265416ca3be08e8e
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xaf36b0c2aa31a91245e3660c64ffaedc
Finished request 5.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=67,
length=300
	NAS-Port-Id = "AP106/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-5D-44:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34226
	State = 0xaf36b0c2aa31a91245e3660c64ffaedc
	EAP-Message =
0x02070090190017030100206596115f207417624f7e845470af0daba727efb425ba1ff92e5a84387bce9dbb170301006074f16a40d50bc69b19aaedcb83bd9c7f621b74124c7931f77f8de496e0acc65855ed639549468d8c377d9fa5f38b6bef176bf360b3ce0680441a3cfd90303fd0761c3fa4ee743750b7a04401b06dbc39a90553bdb8b9c9d22ea0af456dfacd33
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x46167adc047836922a303f08d753acd6
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 7 length 144
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state phase2
[peap] EAP type mschapv2
[peap] Got tunneled request
	EAP-Message =
0x0207003f1a0207003a310bda09a2bb62b8ca9a94e214e64373b20000000000000000c89da9ba6263f2d4df64b83fd944c0a92235c071adacb59400726f6f74
server packetfence {
[peap] Setting User-Name to root
Sending tunneled request
	EAP-Message =
0x0207003f1a0207003a310bda09a2bb62b8ca9a94e214e64373b20000000000000000c89da9ba6263f2d4df64b83fd944c0a92235c071adacb59400726f6f74
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "root"
	State = 0x6b88b6ab6b8facaa14b7c1873fd1677f
	NAS-Port-Id = "AP106/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-5D-44:SISD-Network"
	Service-Type = Framed-User
	NAS-Port = 34226
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
server packetfence-tunnel {
# Executing section authorize from file
/etc/raddb/sites-enabled/packetfence-tunnel
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 7 length 63
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence-tunnel
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] # Executing group from file
/etc/raddb/sites-enabled/packetfence-tunnel
[mschapv2] +- entering group MS-CHAP {...}
[mschap] No Cleartext-Password configured.  Cannot create LM-Password.
[mschap] No Cleartext-Password configured.  Cannot create NT-Password.
[mschap] Creating challenge hash with username: root
[mschap] Told to do MS-CHAPv2 for root with NT-Password
[mschap] FAILED: No NT/LM-Password.  Cannot perform authentication.
[mschap] FAILED: MS-CHAP2-Response is incorrect
++[mschap] returns reject
[eap] Freeing handler
++[eap] returns reject
Failed to authenticate the user.
} # server packetfence-tunnel
[peap] Got tunneled reply code 3
	MS-CHAP-Error = "\007E=691 R=1"
	EAP-Message = 0x04070004
	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Got tunneled reply RADIUS code 3
	MS-CHAP-Error = "\007E=691 R=1"
	EAP-Message = 0x04070004
	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Tunneled authentication was rejected.
[peap] FAILURE
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 67 to 10.10.10.248 port 20002
	EAP-Message =
0x0108003b19001703010030d18b45652351f7055aa8417380e76fce9407bb8e74b1d976dd08afaef470ff74b1270a5c085e0741cee95216b810a5b7
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xaf36b0c2a93ea91245e3660c64ffaedc
Finished request 6.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=68,
length=252
	NAS-Port-Id = "AP106/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-5D-44:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34226
	State = 0xaf36b0c2a93ea91245e3660c64ffaedc
	EAP-Message =
0x0208006019001703010020b867c7f00506b3da75ae1601e918021a86f57769a75309e0fb9a3bab27747d01170301003043ca211c07014d4bb70d4cf6f6ef8a6a734c407f18a53e60231a8576d3be6a38093d4c8d9e955cf6f82095aca0af0849
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x959967d9d0f9546b78e7b41e418ebb0f
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 8 length 96
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state send tlv failure
[peap] Received EAP-TLV response.
[peap]  The users session was previously rejected: returning reject (again.)
[peap]  *** This means you need to read the PREVIOUS messages in the debug
output
[peap]  *** to find out the reason why the user was rejected.
[peap]  *** Look for "reject" or "fail".  Those earlier messages will tell
you.
[peap]  *** what went wrong, and how to fix the problem.
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
} # server packetfence
Using Post-Auth-Type Reject
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group REJECT {...}
[attr_filter.access_reject] 	expand: %{User-Name} -> root
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 7 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 7
Sending Access-Reject of id 68 to 10.10.10.248 port 20002
	EAP-Message = 0x04080004
	Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.9 seconds.
Cleaning up request 0 ID 61 with timestamp +24
Cleaning up request 1 ID 62 with timestamp +24
Cleaning up request 2 ID 63 with timestamp +24
Cleaning up request 3 ID 64 with timestamp +24
Cleaning up request 4 ID 65 with timestamp +24
Cleaning up request 5 ID 66 with timestamp +24
Cleaning up request 6 ID 67 with timestamp +24
Waking up in 1.0 seconds.
Cleaning up request 7 ID 68 with timestamp +24
Ready to process requests.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=69,
length=146
	NAS-Port-Id = "AP10/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-13-84:SISD-Network"
	Service-Type = Framed-User
	EAP-Message = 0x0201000901726f6f74
	User-Name = "root"
	NAS-Port = 34227
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x0b98b579a67fd329b8eada71c739bd17
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 1 length 9
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
rlm_perl: Added pair NAS-Port-Type = Wireless-802.11
rlm_perl: Added pair Service-Type = Framed-User
rlm_perl: Added pair Called-Station-Id = 00-1F-DA-26-13-84:SISD-Network
rlm_perl: Added pair Calling-Station-Id = 00-16-EA-B9-D1-CC
rlm_perl: Added pair Message-Authenticator =
0x0b98b579a67fd329b8eada71c739bd17
rlm_perl: Added pair User-Name = root
rlm_perl: Added pair NAS-Identifier = nortel
rlm_perl: Added pair EAP-Message = 0x0201000901726f6f74
rlm_perl: Added pair EAP-Type = Identity
rlm_perl: Added pair NAS-Port = 34227
rlm_perl: Added pair NAS-IP-Address = 10.10.10.248
rlm_perl: Added pair NAS-Port-Id = AP10/1
rlm_perl: Added pair Auth-Type = EAP
++[perl] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 69 to 10.10.10.248 port 20002
	EAP-Message = 0x010200061920
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4c55c4024c57ddad96cddff26bead54e
Finished request 8.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=70,
length=260
	NAS-Port-Id = "AP10/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-13-84:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34227
	State = 0x4c55c4024c57ddad96cddff26bead54e
	EAP-Message =
0x0202006919800000005f160301005a0100005603014edff0c206fa4aebac77ea7287a730712aa02a639261fb9263a31f4dba9570f500002800390038003500160013000a00330032002f000500040015001200090014001100080006000300ff020100000400230000
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x65754af26fd67660dc824381a2234e2c
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 2 length 105
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 95
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap]     (other): before/accept initialization
[peap]     TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 005a], ClientHello  
[peap]     TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 0031], ServerHello  
[peap]     TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 03c6], Certificate  
[peap]     TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 018d], ServerKeyExchange  
[peap]     TLS_accept: SSLv3 write key exchange A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
[peap]     TLS_accept: SSLv3 write server done A
[peap]     TLS_accept: SSLv3 flush data
[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate
A
In SSL Handshake Phase 
In SSL Accept mode  
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 70 to 10.10.10.248 port 20002
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message =
0x10300e060355040a1307496e766572736531123010060355040b13095a656e2047726f75703121301f0603550403131870662d7a656e2e7061636b657466656e63652e6c6f63616c311e301c06092a864886f70d010901160f696e666f40696e76657273652e6361820900d7e5a8b062d02a9d300c0603551d13040530030101ff300d06092a864886f70d010105050003818100c09312319dccad1bfec206a62c9c77bbb74656590be5a561286a908164511222d6e6186469f138ea8a3fd6c8275c52099e8fe3cc320f6608ac985aa708e12849557fe2eaeab145218b564afe1912e89598827acb8a8a9a6470c5ef9069a850a8b4e385247883b1ac7d
	EAP-Message = 0xfaab6e6afe7983e3ceb172c2
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4c55c4024d56ddad96cddff26bead54e
Finished request 9.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=71,
length=161
	NAS-Port-Id = "AP10/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-13-84:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34227
	State = 0x4c55c4024d56ddad96cddff26bead54e
	EAP-Message = 0x020300061900
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x9ebd80fc54e21300c0a0c31f86904746
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 3 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 71 to 10.10.10.248 port 20002
	EAP-Message =
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
	EAP-Message =
0x75885183faccf5b044eb1d954ddabd1fcd4d14311bc82bfc2b5e2d1cd95b68c6288f374400807831af77278bd0b8487c1c60d50ede5c2ec2fbd25d49dec7c19d8cfa8e46d2479b221b7d5a70bd05605c30d8fdb3ba549b42d35969e24c7e6a406fc82d60892b44d6adee4c5191249dda21449bca7bc287c8669f2093b152f4f2b8c106bbb8d0d6016d5ae05036beda4dc63499631556bda3e6ebf0e212f3d6ca95a748127c6a16030100040e000000
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4c55c4024e51ddad96cddff26bead54e
Finished request 10.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=72,
length=363
	NAS-Port-Id = "AP10/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-13-84:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34227
	State = 0x4c55c4024e51ddad96cddff26bead54e
	EAP-Message =
0x020400d01980000000c616030100861000008200809707ada8891b5b8732d3e2e6559732053186f9906caa95a932f689aea84078bd551a4a2baa584897609c49fccf18bc33be35937af45b0d14ef022875b0476b38ea7bf21a008e759a80a09f0b3a4d29924ac4e1e99e927449c86087a548bcf7a092678598c01337502582d857e25516653b95288b7b04f9f34ff0dfae4faf40b514030100010116030100301a93526835d73374242910e3a1d44b77c8e1b4f07a71e1cdf93e8cdbef044ee21b5f77354378c203d53c1b6384766313
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x4573cb2feb18e1ae10b45140dfb491f0
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 4 length 208
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 198
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
[peap]     TLS_accept: SSLv3 read client key exchange A
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]  
[peap] <<< TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 read finished A
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]  
[peap]     TLS_accept: SSLv3 write change cipher spec A
[peap] >>> TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 write finished A
[peap]     TLS_accept: SSLv3 flush data
[peap]     (other): SSL negotiation finished successfully
SSL Connection Established 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 72 to 10.10.10.248 port 20002
	EAP-Message =
0x0105004119001403010001011603010030b7f2dda2141908d5c00b03a993ecf65d0e8276aeaa704260fdc3510379f0268dcdde58ee9c33dac7cbeaeea0a2d67583
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4c55c4024f50ddad96cddff26bead54e
Finished request 11.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=73,
length=161
	NAS-Port-Id = "AP10/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-13-84:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34227
	State = 0x4c55c4024f50ddad96cddff26bead54e
	EAP-Message = 0x020500061900
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0xd00e6c4f35ab22f0edcef9c920f9a16e
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 5 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3 
[peap] eaptls_process returned 3 
[peap] EAPTLS_SUCCESS
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state TUNNEL ESTABLISHED
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 73 to 10.10.10.248 port 20002
	EAP-Message =
0x0106002b190017030100205512c1050028141dad167996c3a6213ffa391c6bd74751fe66b0e4ff7adc0cf3
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4c55c4024853ddad96cddff26bead54e
Finished request 12.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=74,
length=235
	NAS-Port-Id = "AP10/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-13-84:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34227
	State = 0x4c55c4024853ddad96cddff26bead54e
	EAP-Message =
0x020600501900170301002000f271c8996a0ca382e1f1b06f30848c5d9abfc6eee88c4e59fe2dcb6025d0ae17030100208db10d6e4050fa30653e9a7d3d4319ac5d8629475ba86712a3abd58204b85309
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x40afcade72b64e4ac74db86f50cf49f0
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 6 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state WAITING FOR INNER IDENTITY
[peap] Identity - root
[peap] Got inner identity 'root'
[peap] Setting default EAP type for tunneled EAP session.
[peap] Got tunneled request
	EAP-Message = 0x0206000901726f6f74
server packetfence {
[peap] Setting User-Name to root
Sending tunneled request
	EAP-Message = 0x0206000901726f6f74
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "root"
	NAS-Port-Id = "AP10/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-13-84:SISD-Network"
	Service-Type = Framed-User
	NAS-Port = 34227
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
server packetfence-tunnel {
# Executing section authorize from file
/etc/raddb/sites-enabled/packetfence-tunnel
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 6 length 9
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence-tunnel
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server packetfence-tunnel
[peap] Got tunneled reply code 11
	EAP-Message =
0x0107001e1a01070019103c00ea0133661772652dfb87862e4efd726f6f74
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xfe4925f9fe4e3f08e2a0212b65b17789
[peap] Got tunneled reply RADIUS code 11
	EAP-Message =
0x0107001e1a01070019103c00ea0133661772652dfb87862e4efd726f6f74
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xfe4925f9fe4e3f08e2a0212b65b17789
[peap] Got tunneled Access-Challenge
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 74 to 10.10.10.248 port 20002
	EAP-Message =
0x0107004b19001703010040d6434d09c133555bd4d8867f97f04b1963209c2643ae362557c20a6ebdc0903deff56d1dfb16bd0aa2c98a8568fccd2d9242ae292398f19acd4616129bca8687
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4c55c4024952ddad96cddff26bead54e
Finished request 13.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=75,
length=283
	NAS-Port-Id = "AP10/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-13-84:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34227
	State = 0x4c55c4024952ddad96cddff26bead54e
	EAP-Message =
0x0207008019001703010020459b689e94fcfd2a88456d0ede1bab1721702871480871c66851ab0277cd9aad170301005017ff917d7bd7d65f4fac6bc5853dfc80aa95c3ec2695db019b324735ff3ebabf4cfe58c0af3b9267144f70adacd1f63c6dbbe8df1e9586949355c8e16e6294cadf57f022ed2bee71ae73d8b2b22936b1
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x246fc719dd9f9021625e84eacb4fbe15
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 7 length 128
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state phase2
[peap] EAP type mschapv2
[peap] Got tunneled request
	EAP-Message =
0x0207003f1a0207003a311f382a1292c90e9994672e496c68b35900000000000000004570058d9c93331e2bb40eb615aebd08af8d2b07e989150b00726f6f74
server packetfence {
[peap] Setting User-Name to root
Sending tunneled request
	EAP-Message =
0x0207003f1a0207003a311f382a1292c90e9994672e496c68b35900000000000000004570058d9c93331e2bb40eb615aebd08af8d2b07e989150b00726f6f74
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "root"
	State = 0xfe4925f9fe4e3f08e2a0212b65b17789
	NAS-Port-Id = "AP10/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-13-84:SISD-Network"
	Service-Type = Framed-User
	NAS-Port = 34227
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
server packetfence-tunnel {
# Executing section authorize from file
/etc/raddb/sites-enabled/packetfence-tunnel
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 7 length 63
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence-tunnel
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] # Executing group from file
/etc/raddb/sites-enabled/packetfence-tunnel
[mschapv2] +- entering group MS-CHAP {...}
[mschap] No Cleartext-Password configured.  Cannot create LM-Password.
[mschap] No Cleartext-Password configured.  Cannot create NT-Password.
[mschap] Creating challenge hash with username: root
[mschap] Told to do MS-CHAPv2 for root with NT-Password
[mschap] FAILED: No NT/LM-Password.  Cannot perform authentication.
[mschap] FAILED: MS-CHAP2-Response is incorrect
++[mschap] returns reject
[eap] Freeing handler
++[eap] returns reject
Failed to authenticate the user.
} # server packetfence-tunnel
[peap] Got tunneled reply code 3
	MS-CHAP-Error = "\007E=691 R=1"
	EAP-Message = 0x04070004
	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Got tunneled reply RADIUS code 3
	MS-CHAP-Error = "\007E=691 R=1"
	EAP-Message = 0x04070004
	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Tunneled authentication was rejected.
[peap] FAILURE
++[eap] returns handled
} # server packetfence
Sending Access-Challenge of id 75 to 10.10.10.248 port 20002
	EAP-Message =
0x0108003b19001703010030f23ec13089472e78eb2bbf1832ccd10aacee066f33334760c631b443d839d475eeb2154f7fd7cfb7a8fc15d49c0f1726
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x4c55c4024a5dddad96cddff26bead54e
Finished request 14.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.248 port 20002, id=76,
length=251
	NAS-Port-Id = "AP10/1"
	Calling-Station-Id = "00-16-EA-B9-D1-CC"
	Called-Station-Id = "00-1F-DA-26-13-84:SISD-Network"
	Service-Type = Framed-User
	User-Name = "root"
	NAS-Port = 34227
	State = 0x4c55c4024a5dddad96cddff26bead54e
	EAP-Message =
0x0208006019001703010020d0a076e0886ed8f711e2d9f2db9c6a6771d313da2404188e915fda4f1037106f170301003027d03276b097f867ad673c482e27ab904084d0aaa8b5ca189cc35d2324a22d895883dae6632429c25bffb5dd5c9e7e6b
	NAS-Port-Type = Wireless-802.11
	NAS-IP-Address = 10.10.10.248
	NAS-Identifier = "nortel"
	Message-Authenticator = 0x58010b5c4b58602e6d1a9ee4ae7e4b38
server packetfence {
# Executing section authorize from file /etc/raddb/sites-enabled/packetfence
+- entering group authorize {...}
[suffix] No '@' in User-Name = "root", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[preprocess] returns ok
[eap] EAP packet type response id 8 length 96
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state send tlv failure
[peap] Received EAP-TLV response.
[peap]  The users session was previously rejected: returning reject (again.)
[peap]  *** This means you need to read the PREVIOUS messages in the debug
output
[peap]  *** to find out the reason why the user was rejected.
[peap]  *** Look for "reject" or "fail".  Those earlier messages will tell
you.
[peap]  *** what went wrong, and how to fix the problem.
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
} # server packetfence
Using Post-Auth-Type Reject
# Executing group from file /etc/raddb/sites-enabled/packetfence
+- entering group REJECT {...}
[attr_filter.access_reject] 	expand: %{User-Name} -> root
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 15 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 15
Sending Access-Reject of id 76 to 10.10.10.248 port 20002
	EAP-Message = 0x04080004
	Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 3.9 seconds.
Cleaning up request 8 ID 69 with timestamp +39
Cleaning up request 9 ID 70 with timestamp +39
Cleaning up request 10 ID 71 with timestamp +39
Cleaning up request 11 ID 72 with timestamp +39
Cleaning up request 12 ID 73 with timestamp +39
Cleaning up request 13 ID 74 with timestamp +39
Cleaning up request 14 ID 75 with timestamp +39
Waking up in 1.0 seconds.
Cleaning up request 15 ID 76 with timestamp +39
Ready to process requests.

--
View this message in context: http://freeradius.1045715.n5.nabble.com/Getting-NT-STATUS-WRONG-PASSWORD-Wrong-Password-0xc000006a-when-using-ntlm-auth-tp5040204p5057256.html
Sent from the FreeRadius - User mailing list archive at Nabble.com.



More information about the Freeradius-Users mailing list