Invalid reply digest received? Password encryption?
Jim Whitescarver
jimscarver at gmail.com
Thu Jun 9 23:11:14 CEST 2011
Freeradius reports "Sending Access-Accept " (see log below) but we are
getting the message on our Cisco VPN box
"Radius: Invalid reply digest received; the shared-secret may be incorrect"
We have triple checked the shared secrete and it is correct. With the
wrong secrete it does not authenticate at all. Any ideas on what else
might be causing that?
Also, the password comes from the Cisco VPN to freeradius encrypted.
I had to resort to including the token in the userid field to make it
work. Any ideas how to decrypt the password? I have tried some tools
on the net like cisco-decrypt but it says the encrypted password I
give it is invalid. I notice users in the users file are
authenticated properly although the password is encrytped. I need
to decrypt the password in my python module.
Thanks,
Jim
Ready to process requests.
rad_recv: Access-Request packet from host 135.207.5.9 port 1936,
id=173, length=133
User-Name = "jw701e%1307649138237"
User-Password = "||\027\327j=\225\035|\376\0221\376j\366`"
NAS-Port = 2017
Service-Type = Framed-User
Framed-Protocol = PPP
Called-Station-Id = "204.178.3.9"
Calling-Station-Id = "204.178.9.131"
Tunnel-Client-Endpoint:0 = "204.178.9.131"
NAS-IP-Address = 135.207.5.9
NAS-Port-Type = Virtual
# Executing section authorize from file
/usr/local/etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "jw701e%1307649138237", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] No EAP-Message, not doing EAP
++[eap] returns noop
*** authorize ***
*** RADlog call in authorize ***
(('User-Name', '"jw701e%1307649138237"'), ('User-Password',
'"||\\027\\327j=\\225\\035|\\376\\0221\\376j\\366`"'), ('NAS-Port',
'2017'), ('Service-Type', 'Framed-User'), ('Framed-Protocol', 'PPP'),
('Called-Station-Id', '"204.178.3.9"'), ('Calling-Station-Id',
'"204.178.9.131"'), ('Tunnel-Client-Endpoint:0', '"204.178.9.131"'),
('NAS-IP-Address', '135.207.5.9'), ('NAS-Port-Type', 'Virtual'))
User-Name: "jw701e%1307649138237"
User-Password: "||\027\327j=\225\035|\376\0221\376j\366`"
NAS-Port: 2017
Service-Type: Framed-User
Framed-Protocol: PPP
Called-Station-Id: "204.178.3.9"
Calling-Station-Id: "204.178.9.131"
Tunnel-Client-Endpoint:0: "204.178.9.131"
NAS-IP-Address: 135.207.5.9
NAS-Port-Type: Virtual
User: jw701e%1307649138237 Pwd: ||\027\327j=\225\035|\376\0221\376j\366`
Userid: jw701e at research.att.com Pwd: 1307649138237
Authenticate User: jw701e
SAFE authentication successful: jw701e
++[python] returns ok
[files] users: Matched entry DEFAULT at line 1
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user.
Authentication may fail because of this.
++[pap] returns noop
Found Auth-Type = PYTHON
# Executing group from file /usr/local/etc/raddb/sites-enabled/default
+- entering group PYTHON {...}
++[python] returns ok
# Executing section post-auth from file
/usr/local/etc/raddb/sites-enabled/default
+- entering group post-auth {...}
++[exec] returns noop
Sending Access-Accept of id 173 to 135.207.5.9 port 1936
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
Cleaning up request 0 ID 173 with timestamp +13
Ready to process requests.
More information about the Freeradius-Users
mailing list