Freeradius + Fedora-DS + EAP-MSCHAPv2 for WIFI/AP authentication

Sallee, Stephen (Jake) Jake.Sallee at umhb.edu
Tue Sep 20 01:15:01 CEST 2011


If I understand your question correctly you want to use FR to authenticate users against a Microsoft AD server, that the clients themselves are windows based or not is not altogether too important.

If this is indeed what you are trying to do, is there any reason you are not able to use NTLM?  It makes the actual authentication portion VERY easy, you can then do any fancy stuff with LDAP searches for group memberships, etc. knowing that the user IS an authenticated user.  NTLM will allow your users to do PEAP/MSCHAPv2 authentication, the catch is that they need to have the cert for the FR server installed OR do some manual tweaking of the interface.  We worked around this by writing a simple program to install the server cert and configure the wifi interface for the user.

The cert issue is a limitation of Windows NOT FR!  MS claims it is for security reasons, but in truth it is just a foolish blunder.  3rd party supplicants will do the trick but they area pain to  deploy to assets that you do not manage.  Long story short: on Windows, there is NO way to use PEAP/MSCHAPv2 (or indeed any cert based auth method)   without installing the server cert or manually tweaking the interface config, or using  a less broken supplicant ... sorry.

If someone can prove me wrong, please, please, PLEASE, tell me, this has been a huge pain for us!

Jake Sallee
Godfather of Bandwidth
System Engineer
University of Mary Hardin-Baylor
900 College St.
Belton, Texas
76513
Fone: 254-295-4658
Phax: 254-295-4221

-----Original Message-----
From: freeradius-users-bounces+jake.sallee=umhb.edu at lists.freeradius.org [mailto:freeradius-users-bounces+jake.sallee=umhb.edu at lists.freeradius.org] On Behalf Of uselessidbr
Sent: Monday, September 19, 2011 5:19 PM
To: freeradius-users at lists.freeradius.org
Subject: Freeradius + Fedora-DS + EAP-MSCHAPv2 for WIFI/AP authentication

Hello.

People, i've read a lot about the WIFI/AP authentication over Freeradius
using LDAP but it seems i cannot make it work unless i use clear-text
password or Nt/Lmpassword which as far as i know implies in Samba + LDAP
integration.

My question is, is that really the only way to make freeradius authenticate
users using a LDAP database?

Do i need to have samba + ldap to authenticate WIFI users using freeradius +
LDAP with EAP-MSCHAPv2?

If so, is there any other solution to authenticate Windows WIFI users
without using a 3rd party wifi supplicant? 

Definetely, theres no other way i can use freeradius and fedora-ds without
Samba/clear-text password OR a 3rd party supplicant that supports EAP/PAP?

With my current configuration i was able to authenticate LDAP users with
clear-text password but thats not i really want as a WIFI authentication
solution. My goal is to use freeradius to authenticate WIFI users using a
LDAP database and without the need of use a non-native Windows application.


Here goes my debug using a encrypted user password (which fails):

*FreeRADIUS Version 2.1.10, for host x86_64-redhat-linux-gnu, built on Mar
25 2011 at 10:54:38
Copyright (C) 1999-2009 The FreeRADIUS server project and contributors. 
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A 
PARTICULAR PURPOSE. 
You may redistribute copies of FreeRADIUS under the terms of the 
GNU General Public License v2. 
Starting - reading configuration files ...
including configuration file /etc/raddb/radiusd.conf
including configuration file /etc/raddb/proxy.conf
including configuration file /etc/raddb/clients.conf
including files in directory /etc/raddb/modules/
including configuration file /etc/raddb/modules/pap
including configuration file /etc/raddb/modules/mac2vlan
including configuration file /etc/raddb/modules/sradutmp
including configuration file /etc/raddb/modules/pam
including configuration file /etc/raddb/modules/exec
including configuration file /etc/raddb/modules/radutmp
including configuration file /etc/raddb/modules/mschap
including configuration file /etc/raddb/modules/ldap
including configuration file /etc/raddb/modules/ippool
including configuration file /etc/raddb/modules/wimax
including configuration file /etc/raddb/modules/smbpasswd
including configuration file /etc/raddb/modules/attr_filter
including configuration file /etc/raddb/modules/realm
including configuration file /etc/raddb/modules/detail.log
including configuration file /etc/raddb/modules/passwd
including configuration file /etc/raddb/modules/perl
including configuration file /etc/raddb/modules/inner-eap
including configuration file /etc/raddb/modules/ntlm_auth
including configuration file /etc/raddb/modules/sql_log
including configuration file /etc/raddb/modules/dynamic_clients
including configuration file /etc/raddb/modules/otp
including configuration file /etc/raddb/modules/cui
including configuration file /etc/raddb/modules/expiration
including configuration file /etc/raddb/modules/opendirectory
including configuration file /etc/raddb/modules/unix
including configuration file /etc/raddb/modules/attr_rewrite
including configuration file /etc/raddb/modules/linelog
including configuration file /etc/raddb/modules/checkval
including configuration file /etc/raddb/modules/detail.example.com
including configuration file /etc/raddb/modules/policy
including configuration file /etc/raddb/modules/acct_unique
including configuration file /etc/raddb/modules/chap
including configuration file /etc/raddb/modules/expr
including configuration file /etc/raddb/modules/smsotp
including configuration file /etc/raddb/modules/logintime
including configuration file /etc/raddb/modules/sqlcounter_expire_on_login
including configuration file /etc/raddb/modules/etc_group
including configuration file /etc/raddb/modules/always
including configuration file /etc/raddb/modules/mac2ip
including configuration file /etc/raddb/modules/counter
including configuration file /etc/raddb/modules/preprocess
including configuration file /etc/raddb/modules/echo
including configuration file /etc/raddb/modules/digest
including configuration file /etc/raddb/modules/files
including configuration file /etc/raddb/modules/detail
including configuration file /etc/raddb/eap.conf
including configuration file /etc/raddb/policy.conf
including files in directory /etc/raddb/sites-enabled/
including configuration file /etc/raddb/sites-enabled/inner-tunnel
including configuration file /etc/raddb/sites-enabled/default
including configuration file /etc/raddb/sites-enabled/control-socket
main {
	user = "radiusd"
	group = "radiusd"
	allow_core_dumps = no
}
including dictionary file /etc/raddb/dictionary
main {
	prefix = "/usr"
	localstatedir = "/var"
	logdir = "/var/log/radius"
	libdir = "/usr/lib64/freeradius"
	radacctdir = "/var/log/radius/radacct"
	hostname_lookups = no
	max_request_time = 30
	cleanup_delay = 5
	max_requests = 1024
	pidfile = "/var/run/radiusd/radiusd.pid"
	checkrad = "/usr/sbin/checkrad"
	debug_level = 0
	proxy_requests = yes
 log {
	stripped_names = no
	auth = no
	auth_badpass = no
	auth_goodpass = no
 }
 security {
	max_attributes = 200
	reject_delay = 1
	status_server = yes
 }
}
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
	retry_delay = 5
	retry_count = 3
	default_fallback = no
	dead_time = 120
	wake_all_if_all_dead = no
 }
 home_server localhost {
	ipaddr = 127.0.0.1
	port = 1812
	type = "auth"
	secret = "testing123"
	response_window = 20
	max_outstanding = 65536
	require_message_authenticator = yes
	zombie_period = 40
	status_check = "status-server"
	ping_interval = 30
	check_interval = 30
	num_answers_to_alive = 3
	num_pings_to_alive = 3
	revive_interval = 120
	status_check_timeout = 4
	irt = 2
	mrt = 16
	mrc = 5
	mrd = 30
 }
 home_server_pool my_auth_failover {
	type = fail-over
	home_server = localhost
 }
 realm example.com {
	auth_pool = my_auth_failover
 }
 realm LOCAL {
 }
 realm mydomain {
	authhost = LOCAL
	accthost = LOCAL
 }
 realm host {
	authhost = LOCAL
	accthost = LOCAL
 }
 realm teste {
	authhost = LOCAL
	accthost = LOCAL
 }
radiusd: #### Loading Clients ####
 client localhost {
	ipaddr = 127.0.0.1
	require_message_authenticator = no
	secret = "testing123"
	nastype = "other"
 }
 client 10.10.10.1 {
	require_message_authenticator = no
	secret = "password"
	shortname = "AP1"
 }
 client 10.10.10.2 {
	require_message_authenticator = no
	secret = "password"
	shortname = "AP2"
 }
 
radiusd: #### Instantiating modules ####
 instantiate {
 Module: Linked to module rlm_exec
 Module: Instantiating module "exec" from file /etc/raddb/modules/exec
  exec {
	wait = no
	input_pairs = "request"
	shell_escape = yes
  }
 Module: Linked to module rlm_expr
 Module: Instantiating module "expr" from file /etc/raddb/modules/expr
 Module: Linked to module rlm_expiration
 Module: Instantiating module "expiration" from file
/etc/raddb/modules/expiration
  expiration {
	reply-message = "Password Has Expired  "
  }
 Module: Linked to module rlm_logintime
 Module: Instantiating module "logintime" from file
/etc/raddb/modules/logintime
  logintime {
	reply-message = "You are calling outside your allowed timespan  "
	minimum-timeout = 60
  }
 }
radiusd: #### Loading Virtual Servers ####
server inner-tunnel { # from file /etc/raddb/sites-enabled/inner-tunnel
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_pap
 Module: Instantiating module "pap" from file /etc/raddb/modules/pap
  pap {
	encryption_scheme = "auto"
	auto_header = no
  }
 Module: Linked to module rlm_chap
 Module: Instantiating module "chap" from file /etc/raddb/modules/chap
 Module: Linked to module rlm_mschap
 Module: Instantiating module "mschap" from file /etc/raddb/modules/mschap
  mschap {
	use_mppe = yes
	require_encryption = no
	require_strong = no
	with_ntdomain_hack = yes
  }
 Module: Linked to module rlm_unix
 Module: Instantiating module "unix" from file /etc/raddb/modules/unix
  unix {
	radwtmp = "/var/log/radius/radwtmp"
  }
 Module: Linked to module rlm_ldap
 Module: Instantiating module "ldap" from file /etc/raddb/modules/ldap
  ldap {
	server = "10.10.10.15"
	port = 389
	password = "mypassword"
	identity = "cn=user,dc=domain"
	net_timeout = 1
	timeout = 4
	timelimit = 3
	tls_mode = no
	start_tls = no
	tls_require_cert = "allow"
   tls {
	start_tls = no
	cacertfile = "/etc/raddb/cacert.pem"
	cacertdir = "/etc/raddb/"
	certfile = "/etc/raddb/server.pem"
	keyfile = "/etc/raddb/certs/server.key"
	randfile = "/dev/urandom"
	require_cert = "allow"
   }
	basedn = "ou=User,dc=domain"
	filter = "(uid=%{%{Stripped-User-Name}:-%{User-Name}})"
	base_filter = "(objectclass=radiusprofile)"
	password_attribute = "userPassword"
	auto_header = no
	access_attr_used_for_allow = yes
	groupname_attribute = "cn"
	groupmembership_filter =
"(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
	dictionary_mapping = "/etc/raddb/ldap.attrmap"
	ldap_debug = 0
	ldap_connections_number = 5
	compare_check_items = no
	do_xlat = yes
	set_auth_type = yes
  }
rlm_ldap: Registering ldap_groupcmp for Ldap-Group
rlm_ldap: Registering ldap_xlat with xlat_name ldap
rlm_ldap: reading ldap<->radius mappings from file /etc/raddb/ldap.attrmap
rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$
rlm_ldap: LDAP radiusAuthType mapped to RADIUS Auth-Type
rlm_ldap: LDAP radiusSimultaneousUse mapped to RADIUS Simultaneous-Use
rlm_ldap: LDAP radiusCalledStationId mapped to RADIUS Called-Station-Id
rlm_ldap: LDAP radiusCallingStationId mapped to RADIUS Calling-Station-Id
rlm_ldap: LDAP lmPassword mapped to RADIUS LM-Password
rlm_ldap: LDAP ntPassword mapped to RADIUS NT-Password
rlm_ldap: LDAP sambaLmPassword mapped to RADIUS LM-Password
rlm_ldap: LDAP sambaNtPassword mapped to RADIUS NT-Password
rlm_ldap: LDAP dBCSPwd mapped to RADIUS LM-Password
rlm_ldap: LDAP userPassword mapped to RADIUS Password-With-Header
rlm_ldap: LDAP acctFlags mapped to RADIUS SMB-Account-CTRL-TEXT
rlm_ldap: LDAP radiusExpiration mapped to RADIUS Expiration
rlm_ldap: LDAP radiusNASIpAddress mapped to RADIUS NAS-IP-Address
rlm_ldap: LDAP radiusServiceType mapped to RADIUS Service-Type
rlm_ldap: LDAP radiusFramedProtocol mapped to RADIUS Framed-Protocol
rlm_ldap: LDAP radiusFramedIPAddress mapped to RADIUS Framed-IP-Address
rlm_ldap: LDAP radiusFramedIPNetmask mapped to RADIUS Framed-IP-Netmask
rlm_ldap: LDAP radiusFramedRoute mapped to RADIUS Framed-Route
rlm_ldap: LDAP radiusFramedRouting mapped to RADIUS Framed-Routing
rlm_ldap: LDAP radiusFilterId mapped to RADIUS Filter-Id
rlm_ldap: LDAP radiusFramedMTU mapped to RADIUS Framed-MTU
rlm_ldap: LDAP radiusFramedCompression mapped to RADIUS Framed-Compression
rlm_ldap: LDAP radiusLoginIPHost mapped to RADIUS Login-IP-Host
rlm_ldap: LDAP radiusLoginService mapped to RADIUS Login-Service
rlm_ldap: LDAP radiusLoginTCPPort mapped to RADIUS Login-TCP-Port
rlm_ldap: LDAP radiusCallbackNumber mapped to RADIUS Callback-Number
rlm_ldap: LDAP radiusCallbackId mapped to RADIUS Callback-Id
rlm_ldap: LDAP radiusFramedIPXNetwork mapped to RADIUS Framed-IPX-Network
rlm_ldap: LDAP radiusClass mapped to RADIUS Class
rlm_ldap: LDAP radiusSessionTimeout mapped to RADIUS Session-Timeout
rlm_ldap: LDAP radiusIdleTimeout mapped to RADIUS Idle-Timeout
rlm_ldap: LDAP radiusTerminationAction mapped to RADIUS Termination-Action
rlm_ldap: LDAP radiusLoginLATService mapped to RADIUS Login-LAT-Service
rlm_ldap: LDAP radiusLoginLATNode mapped to RADIUS Login-LAT-Node
rlm_ldap: LDAP radiusLoginLATGroup mapped to RADIUS Login-LAT-Group
rlm_ldap: LDAP radiusFramedAppleTalkLink mapped to RADIUS
Framed-AppleTalk-Link
rlm_ldap: LDAP radiusFramedAppleTalkNetwork mapped to RADIUS
Framed-AppleTalk-Network
rlm_ldap: LDAP radiusFramedAppleTalkZone mapped to RADIUS
Framed-AppleTalk-Zone
rlm_ldap: LDAP radiusPortLimit mapped to RADIUS Port-Limit
rlm_ldap: LDAP radiusLoginLATPort mapped to RADIUS Login-LAT-Port
rlm_ldap: LDAP radiusReplyMessage mapped to RADIUS Reply-Message
rlm_ldap: LDAP radiusTunnelType mapped to RADIUS Tunnel-Type
rlm_ldap: LDAP radiusTunnelMediumType mapped to RADIUS Tunnel-Medium-Type
rlm_ldap: LDAP radiusTunnelPrivateGroupId mapped to RADIUS
Tunnel-Private-Group-Id
conns: 0x7fbe6f08c1d0
 Module: Linked to module rlm_eap
 Module: Instantiating module "eap" from file /etc/raddb/eap.conf
  eap {
	default_eap_type = "peap"
	timer_expire = 60
	ignore_unknown_eap_types = no
	cisco_accounting_username_bug = no
	max_sessions = 4096
  }
 Module: Linked to sub-module rlm_eap_md5
 Module: Instantiating eap-md5
 Module: Linked to sub-module rlm_eap_leap
 Module: Instantiating eap-leap
 Module: Linked to sub-module rlm_eap_gtc
 Module: Instantiating eap-gtc
   gtc {
	challenge = "Password: "
	auth_type = "PAP"
   }
 Module: Linked to sub-module rlm_eap_tls
 Module: Instantiating eap-tls
   tls {
	rsa_key_exchange = no
	dh_key_exchange = yes
	rsa_key_length = 512
	dh_key_length = 512
	verify_depth = 0
	CA_path = "/etc/raddb/certs"
	pem_file_type = yes
	private_key_file = "/etc/raddb/certs/server.key"
	certificate_file = "/etc/raddb/certs/server.pem"
	CA_file = "/etc/raddb/certs/ca.pem"
	private_key_password = "password"
	dh_file = "/etc/raddb/certs/dh"
	random_file = "/dev/urandom"
	fragment_size = 1024
	include_length = yes
	check_crl = no
	cipher_list = "DEFAULT"
    cache {
	enable = no
	lifetime = 24
	max_entries = 255
    }
    verify {
    }
   }
 Module: Linked to sub-module rlm_eap_ttls
 Module: Instantiating eap-ttls
   ttls {
	default_eap_type = "md5"
	copy_request_to_tunnel = yes
	use_tunneled_reply = no
	virtual_server = "inner-tunnel"
	include_length = yes
   }
 Module: Linked to sub-module rlm_eap_peap
 Module: Instantiating eap-peap
   peap {
	default_eap_type = "mschapv2"
	copy_request_to_tunnel = yes
	use_tunneled_reply = yes
	proxy_tunneled_request_as_eap = yes
	virtual_server = "inner-tunnel"
   }
 Module: Linked to sub-module rlm_eap_mschapv2
 Module: Instantiating eap-mschapv2
   mschapv2 {
	with_ntdomain_hack = no
   }
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_realm
 Module: Instantiating module "IPASS" from file /etc/raddb/modules/realm
  realm IPASS {
	format = "prefix"
	delimiter = "/"
	ignore_default = no
	ignore_null = no
  }
 Module: Instantiating module "suffix" from file /etc/raddb/modules/realm
  realm suffix {
	format = "suffix"
	delimiter = "@"
	ignore_default = no
	ignore_null = no
  }
 Module: Instantiating module "ntdomain" from file /etc/raddb/modules/realm
  realm ntdomain {
	format = "prefix"
	delimiter = "\"
	ignore_default = no
	ignore_null = no
  }
 Module: Linked to module rlm_files
 Module: Instantiating module "files" from file /etc/raddb/modules/files
  files {
	usersfile = "/etc/raddb/users"
	acctusersfile = "/etc/raddb/acct_users"
	preproxy_usersfile = "/etc/raddb/preproxy_users"
	compat = "no"
  }
 Module: Checking session {...} for more modules to load
 Module: Linked to module rlm_radutmp
 Module: Instantiating module "radutmp" from file /etc/raddb/modules/radutmp
  radutmp {
	filename = "/var/log/radius/radutmp"
	username = "%{User-Name}"
	case_sensitive = yes
	check_with_nas = yes
	perm = 384
	callerid = yes
  }
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 Module: Linked to module rlm_attr_filter
 Module: Instantiating module "attr_filter.access_reject" from file
/etc/raddb/modules/attr_filter
  attr_filter attr_filter.access_reject {
	attrsfile = "/etc/raddb/attrs.access_reject"
	key = "%{User-Name}"
  }
 } # modules
} # server
server { # from file /etc/raddb/radiusd.conf
 modules {
 Module: Checking authenticate {...} for more modules to load
 Module: Linked to module rlm_digest
 Module: Instantiating module "digest" from file /etc/raddb/modules/digest
 Module: Checking authorize {...} for more modules to load
 Module: Linked to module rlm_preprocess
 Module: Instantiating module "preprocess" from file
/etc/raddb/modules/preprocess
  preprocess {
	huntgroups = "/etc/raddb/huntgroups"
	hints = "/etc/raddb/hints"
	with_ascend_hack = no
	ascend_channels_per_line = 23
	with_ntdomain_hack = no
	with_specialix_jetstream_hack = no
	with_cisco_vsa_hack = no
	with_alvarion_vsa_hack = no
  }
 Module: Checking preacct {...} for more modules to load
 Module: Linked to module rlm_acct_unique
 Module: Instantiating module "acct_unique" from file
/etc/raddb/modules/acct_unique
  acct_unique {
	key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address,
NAS-Port"
  }
 Module: Checking accounting {...} for more modules to load
 Module: Linked to module rlm_detail
 Module: Instantiating module "detail" from file /etc/raddb/modules/detail
  detail {
	detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
	header = "%t"
	detailperm = 384
	dirperm = 493
	locking = no
	log_packet_header = no
  }
 Module: Instantiating module "attr_filter.accounting_response" from file
/etc/raddb/modules/attr_filter
  attr_filter attr_filter.accounting_response {
	attrsfile = "/etc/raddb/attrs.accounting_response"
	key = "%{User-Name}"
  }
 Module: Checking session {...} for more modules to load
 Module: Checking post-proxy {...} for more modules to load
 Module: Checking post-auth {...} for more modules to load
 } # modules
} # server
radiusd: #### Opening IP addresses and Ports ####
listen {
	type = "auth"
	ipaddr = *
	port = 0
}
listen {
	type = "acct"
	ipaddr = *
	port = 0
}
listen {
	type = "control"
 listen {
	socket = "/var/run/radiusd/radiusd.sock"
 }
}
listen {
	type = "auth"
	ipaddr = 127.0.0.1
	port = 18120
}
Listening on authentication address * port 1812
Listening on accounting address * port 1813
Listening on command file /var/run/radiusd/radiusd.sock
Listening on authentication address 127.0.0.1 port 18120 as server
inner-tunnel
Listening on proxy address * port 1814
Ready to process requests.
rad_recv: Access-Request packet from host 10.10.10.1 port 42873, id=254,
length=214
	User-Name = "teste2"
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
	EAP-Message = 0x0200000b01746573746532
	Message-Authenticator = 0xcd3cde11fdb9c9e173401a1ab63137d0
# Executing section authorize from file /etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
[eap] EAP packet type response id 0 length 11
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
[ldap] performing user authorization for teste2
[ldap] 	expand: %{Stripped-User-Name} -> 
[ldap] 	... expanding second conditional
[ldap] 	expand: %{User-Name} -> teste2
[ldap] 	expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) -> (uid=teste2)
[ldap] 	expand: ou=Users,dc=domain -> ou=Users,dc=domain
  [ldap] ldap_get_conn: Checking Id: 0
  [ldap] ldap_get_conn: Got Id: 0
  [ldap] attempting LDAP reconnection
  [ldap] (re)connect to 10.10.10.15:389, authentication 0
  [ldap] setting TLS CACert File to /etc/raddb/cacert.pem
  [ldap] setting TLS CACert Directory to /etc/raddb/
  [ldap] setting TLS Cert File to /etc/raddb/server.pem
  [ldap] setting TLS Key File to /etc/raddb/certs/server.key
  [ldap] setting TLS Key File to /dev/urandom
  [ldap] bind as cn=user,dc=domain/password to 10.10.10.15:389
  [ldap] waiting for bind result ...
  [ldap] Bind was successful
  [ldap] performing search in ou=Users,dc=domain, with filter (uid=teste2)
[ldap] Added User-Password = {SHA}lqYsqYvex/VTQ/jPpZQ3m9unbMk= in check
items
[ldap] looking for check items in directory...
  [ldap] userPassword -> Password-With-Header ==
"{SHA}lqYsqYvex/VTQ/jPpZQ3m9unbMk="
[ldap] looking for reply items in directory...
[ldap] user teste2 authorized to use remote access
  [ldap] ldap_release_conn: Release Id: 0
++[ldap] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING: Auth-Type already set.  Not setting to PAP
++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 254 to 10.10.10.1 port 42873
	EAP-Message = 0x010100061920
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xf7c592a0f7c48bb76be870fae22db0ee
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.1 port 42873, id=254,
length=326
Cleaning up request 0 ID 254 with timestamp +15
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
WARNING: !! EAP session for state 0xf7c592a0f7c48bb7 did not finish!
WARNING: !! Please read http://wiki.freeradius.org/Certificate_Compatibility
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
	User-Name = "teste2"
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
	EAP-Message =
0x0201006919800000005f160301005a0100005603014e77ac4ef302031ce6cf78b5efa69c7b099159b307be6b4012f60c9ce315c67a000018002f00350005000ac013c014c009c00a003200380013000401000015ff01000100000a0006000400170018000b00020100
	State = 0xf7c592a0f7c48bb76be870fae22db0ee
	Message-Authenticator = 0xcc0f4382d29993c82ea7d5f28d83ec6d
# Executing section authorize from file /etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
[eap] EAP packet type response id 1 length 105
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 95
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap]     (other): before/accept initialization
[peap]     TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 005a], ClientHello  
[peap]     TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 0031], ServerHello  
[peap]     TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 084e], Certificate  
[peap]     TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
[peap]     TLS_accept: SSLv3 write server done A
[peap]     TLS_accept: SSLv3 flush data
[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate
A
In SSL Handshake Phase 
In SSL Accept mode  
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 254 to 10.10.10.1 port 42873
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message = 0x0389a003020102020900e0c2
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xf7c592a0f6c78bb76be870fae22db0ee
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.1 port 42873, id=254,
length=227
Cleaning up request 1 ID 254 with timestamp +15
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
WARNING: !! EAP session for state 0xf7c592a0f6c78bb7 did not finish!
WARNING: !! Please read http://wiki.freeradius.org/Certificate_Compatibility
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
	User-Name = "teste2"
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
	EAP-Message = 0x020200061900
	State = 0xf7c592a0f6c78bb76be870fae22db0ee
	Message-Authenticator = 0x841c3e3abcb3dae6bd7e27170021ad46
# Executing section authorize from file /etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
[eap] EAP packet type response id 2 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 254 to 10.10.10.1 port 42873
	EAP-Message =
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
	EAP-Message =
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
	EAP-Message =
0x5c57ffd578b66a5b47e07deeeeee9a85f242afd159a8bf47ce89c3932d1f0d685969b032a7db9ff5b234d576dc9d88359c72e9bc0265a2dbc7eed1c28dfab6adea4b8c19c663e2bd146db6545040406a63adfa9821d5f4fc898d495b19814a858776bfeef089f2f3d017c546f63384dc597e3733746e944b70f352f0aaa1f61d620fdfd2f4aa3767874d0203010001a381f93081f6301d0603551d0e041604146b9a8e7c8a45dd05ff8c4dddfa1fd3f7208c50bb3081c60603551d230481be3081bb80146b9a8e7c8a45dd05ff8c4dddfa1fd3f7208c50bba18197a48194308191310b3009060355040613024252311730150603550408130e53616e74
	EAP-Message =
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
	EAP-Message = 0x80dc01dc76af44cc
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xf7c592a0f5c68bb76be870fae22db0ee
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.1 port 42873, id=254,
length=227
Cleaning up request 2 ID 254 with timestamp +15
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
WARNING: !! EAP session for state 0xf7c592a0f5c68bb7 did not finish!
WARNING: !! Please read http://wiki.freeradius.org/Certificate_Compatibility
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
	User-Name = "teste2"
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
	EAP-Message = 0x020300061900
	State = 0xf7c592a0f5c68bb76be870fae22db0ee
	Message-Authenticator = 0x0a39b42d7de2a7b38ed8cf7b807d341c
# Executing section authorize from file /etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
[eap] EAP packet type response id 3 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 254 to 10.10.10.1 port 42873
	EAP-Message =
0x010400ac1900952b3388d9fc8a18902a7ca2464057045b225266793cad184508c644fc450b67d8d016c13e1a97223a5527ed1dd363c511abe6d9e39ea657cf521efa4088ec8560b1fb3bc99c16291861233ee7991f1190ff7ad5dceda93c0806e1d53fd3a51f26ea62917bf1129cd8cf3641e8bfa4578aaf5b05faef5dbe70f444573b7771bcaccffcb6dcb83f3c4219f8a51e65b18379a9a234940a859e6796bbc39816030100040e000000
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xf7c592a0f4c18bb76be870fae22db0ee
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.1 port 42873, id=254,
length=559
Cleaning up request 3 ID 254 with timestamp +15
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
WARNING: !! EAP session for state 0xf7c592a0f4c18bb7 did not finish!
WARNING: !! Please read http://wiki.freeradius.org/Certificate_Compatibility
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
	User-Name = "teste2"
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
	EAP-Message =
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
	EAP-Message =
0x023c90c2eaa483212cd56dee5f2eb41ce20867c910eac4920114030100010116030100302bdb38b496d679466f1893edff2f8eb093624b411c47368c13c583a737d0bec2f68dd3e7d53b98d27dfbc986248cb05f
	State = 0xf7c592a0f4c18bb76be870fae22db0ee
	Message-Authenticator = 0xa522fecab2ac7eca750166755205bf27
# Executing section authorize from file /etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
[eap] EAP packet type response id 4 length 252
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
  TLS Length 326
[peap] Length Included
[peap] eaptls_verify returned 11 
[peap] <<< TLS 1.0 Handshake [length 0106], ClientKeyExchange  
[peap]     TLS_accept: SSLv3 read client key exchange A
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]  
[peap] <<< TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 read finished A
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]  
[peap]     TLS_accept: SSLv3 write change cipher spec A
[peap] >>> TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 write finished A
[peap]     TLS_accept: SSLv3 flush data
[peap]     (other): SSL negotiation finished successfully
SSL Connection Established 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 254 to 10.10.10.1 port 42873
	EAP-Message =
0x0105004119001403010001011603010030d1e5dba0e82d06aa0efc4287843d8208d124a58d449a582c793dc50977fc3d0b85c0aef80bfc5e004d93ae6ce60d0ed5
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xf7c592a0f3c08bb76be870fae22db0ee
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.1 port 42873, id=254,
length=227
Cleaning up request 4 ID 254 with timestamp +15
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
WARNING: !! EAP session for state 0xf7c592a0f3c08bb7 did not finish!
WARNING: !! Please read http://wiki.freeradius.org/Certificate_Compatibility
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
	User-Name = "teste2"
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
	EAP-Message = 0x020500061900
	State = 0xf7c592a0f3c08bb76be870fae22db0ee
	Message-Authenticator = 0x0b80ba1e60a27eeb5eb41f1458465a19
# Executing section authorize from file /etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
[eap] EAP packet type response id 5 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3 
[peap] eaptls_process returned 3 
[peap] EAPTLS_SUCCESS
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state TUNNEL ESTABLISHED
++[eap] returns handled
Sending Access-Challenge of id 254 to 10.10.10.1 port 42873
	EAP-Message =
0x0106002b190017030100205764f8ef2b3b7d310fa296587d149cb2a3f7ed99b582d06f9083773de55dc14d
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xf7c592a0f2c38bb76be870fae22db0ee
Finished request 5.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.1 port 42873, id=254,
length=264
Cleaning up request 5 ID 254 with timestamp +15
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
WARNING: !! EAP session for state 0xf7c592a0f2c38bb7 did not finish!
WARNING: !! Please read http://wiki.freeradius.org/Certificate_Compatibility
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
	User-Name = "teste2"
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
	EAP-Message =
0x0206002b190017030100207dea7432b1b04d11512baf1695f76ff6b7b9ce4b2b3ae758c52da2236bbfc395
	State = 0xf7c592a0f2c38bb76be870fae22db0ee
	Message-Authenticator = 0x85cf9261aac6080e4048a0b9d23c7176
# Executing section authorize from file /etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
[eap] EAP packet type response id 6 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state WAITING FOR INNER IDENTITY
[peap] Identity - teste2
[peap] Got inner identity 'teste2'
[peap] Setting default EAP type for tunneled EAP session.
[peap] Got tunneled request
	EAP-Message = 0x0206000b01746573746532
server  {
  PEAP: Setting User-Name to teste2
Sending tunneled request
	EAP-Message = 0x0206000b01746573746532
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "teste2"
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
server inner-tunnel {
# Executing section authorize from file
/etc/raddb/sites-enabled/inner-tunnel
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
++[control] returns noop
[eap] EAP packet type response id 6 length 11
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
[ldap] performing user authorization for teste2
[ldap] 	expand: %{Stripped-User-Name} -> 
[ldap] 	... expanding second conditional
[ldap] 	expand: %{User-Name} -> teste2
[ldap] 	expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) -> (uid=teste2)
[ldap] 	expand: ou=Users,dc=domain -> ou=Users,dc=domain
  [ldap] ldap_get_conn: Checking Id: 0
  [ldap] ldap_get_conn: Got Id: 0
  [ldap] performing search in ou=Users,dc=domain, with filter (uid=teste2)
[ldap] Added User-Password = {SHA}lqYsqYvex/VTQ/jPpZQ3m9unbMk= in check
items
[ldap] looking for check items in directory...
  [ldap] userPassword -> Password-With-Header ==
"{SHA}lqYsqYvex/VTQ/jPpZQ3m9unbMk="
[ldap] looking for reply items in directory...
[ldap] user teste2 authorized to use remote access
  [ldap] ldap_release_conn: Release Id: 0
++[ldap] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING: Auth-Type already set.  Not setting to PAP
++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/inner-tunnel
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
} # server inner-tunnel
[peap] Got tunneled reply code 11
	EAP-Message =
0x010700201a0107001b103a5115f773349150b9b5946cfbff32d0746573746532
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xbe0fa53abe08bf4800211b259017b493
[peap] Got tunneled reply RADIUS code 11
	EAP-Message =
0x010700201a0107001b103a5115f773349150b9b5946cfbff32d0746573746532
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xbe0fa53abe08bf4800211b259017b493
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 254 to 10.10.10.1 port 42873
	EAP-Message =
0x0107004b1900170301004042ba4c5209794b623511eacc7f0bb8ee3e5bb95842822987291efd1f421464113439a4b10135432498834418ec8a98a86a81aa45f7acfe3832bbb6f8322e7977
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xf7c592a0f1c28bb76be870fae22db0ee
Finished request 6.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.1 port 42873, id=254,
length=328
Cleaning up request 6 ID 254 with timestamp +15
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
WARNING: !! EAP session for state 0xf7c592a0f1c28bb7 did not finish!
WARNING: !! Please read http://wiki.freeradius.org/Certificate_Compatibility
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
	User-Name = "teste2"
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
	EAP-Message =
0x0207006b1900170301006081c9d132cfa04368529dade57d67641e7fd3b378acac26d660c7a84c45a8f53ad96d366b40632a6fa8edaf935b809d4470016bde67708bbb5c33faa93f9a7f7df7e87f30fb963c0bd4c0e435206f2e235c56100377c8acba97ab332b6b7cff4e
	State = 0xf7c592a0f1c28bb76be870fae22db0ee
	Message-Authenticator = 0xca3d17d60332ac20951db7bde6f666a0
# Executing section authorize from file /etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
[eap] EAP packet type response id 7 length 107
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state phase2
[peap] EAP type mschapv2
[peap] Got tunneled request
	EAP-Message =
0x020700411a0207003c3166967fb6fe3977d049f2c9bc6916ed8c000000000000000088e0c96ae4e8b5f451d108eff34d695a452a9b67e1348db400746573746532
server  {
  PEAP: Setting User-Name to teste2
Sending tunneled request
	EAP-Message =
0x020700411a0207003c3166967fb6fe3977d049f2c9bc6916ed8c000000000000000088e0c96ae4e8b5f451d108eff34d695a452a9b67e1348db400746573746532
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "teste2"
	State = 0xbe0fa53abe08bf4800211b259017b493
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
server inner-tunnel {
# Executing section authorize from file
/etc/raddb/sites-enabled/inner-tunnel
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
++[control] returns noop
[eap] EAP packet type response id 7 length 65
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
[ldap] performing user authorization for teste2
[ldap] 	expand: %{Stripped-User-Name} -> 
[ldap] 	... expanding second conditional
[ldap] 	expand: %{User-Name} -> teste2
[ldap] 	expand: (uid=%{%{Stripped-User-Name}:-%{User-Name}}) -> (uid=teste2)
[ldap] 	expand: ou=Users,dc=domain -> ou=Users,dc=domain
  [ldap] ldap_get_conn: Checking Id: 0
  [ldap] ldap_get_conn: Got Id: 0
  [ldap] performing search in ou=Users,dc=domain, with filter (uid=teste2)
[ldap] Added User-Password = {SHA}lqYsqYvex/VTQ/jPpZQ3m9unbMk= in check
items
[ldap] looking for check items in directory...
  [ldap] userPassword -> Password-With-Header ==
"{SHA}lqYsqYvex/VTQ/jPpZQ3m9unbMk="
[ldap] looking for reply items in directory...
[ldap] user teste2 authorized to use remote access
  [ldap] ldap_release_conn: Release Id: 0
++[ldap] returns ok
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING: Auth-Type already set.  Not setting to PAP
++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/inner-tunnel
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[mschapv2] # Executing group from file /etc/raddb/sites-enabled/inner-tunnel
[mschapv2] +- entering group MS-CHAP {...}
[mschap] No Cleartext-Password configured.  Cannot create LM-Password.
[mschap] No Cleartext-Password configured.  Cannot create NT-Password.
[mschap] Creating challenge hash with username: teste2
[mschap] Told to do MS-CHAPv2 for teste2 with NT-Password
[mschap] FAILED: No NT/LM-Password.  Cannot perform authentication.
[mschap] FAILED: MS-CHAP2-Response is incorrect
++[mschap] returns reject
[eap] Freeing handler
++[eap] returns reject
Failed to authenticate the user.
} # server inner-tunnel
[peap] Got tunneled reply code 3
	MS-CHAP-Error = "\007E=691 R=1"
	EAP-Message = 0x04070004
	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Got tunneled reply RADIUS code 3
	MS-CHAP-Error = "\007E=691 R=1"
	EAP-Message = 0x04070004
	Message-Authenticator = 0x00000000000000000000000000000000
[peap] Tunneled authentication was rejected.
[peap] FAILURE
++[eap] returns handled
Sending Access-Challenge of id 254 to 10.10.10.1 port 42873
	EAP-Message =
0x0108002b190017030100201e991601faad6e17dbd36948aaa0ffa54bab24d9694a5f874f454b3c9068678f
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xf7c592a0f0cd8bb76be870fae22db0ee
Finished request 7.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 10.10.10.1 port 42873, id=254,
length=264
Cleaning up request 7 ID 254 with timestamp +15
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
WARNING: !! EAP session for state 0xf7c592a0f0cd8bb7 did not finish!
WARNING: !! Please read http://wiki.freeradius.org/Certificate_Compatibility
WARNING:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
	User-Name = "teste2"
	NAS-IP-Address = 10.10.10.2
	NAS-Port = 51
	Framed-MTU = 1400
	Called-Station-Id = "00:04:96:32:c1:bd"
	Calling-Station-Id = "74:f0:6d:0a:ce:4f"
	NAS-Port-Type = Wireless-802.11
	NAS-Identifier = "teste"
	Extreme-Attr-3 = 0x31303030303038303144303831323937
	Extreme-Attr-2 = 0x544943
	Extreme-Attr-4 = 0x7465737465
	Extreme-Attr-5 = 0x7465737465
	Extreme-Attr-6 = 0x30303a30343a39363a33323a63313a6264
	EAP-Message =
0x0208002b190017030100200f24e2e08569178721784c13cfa2fed7b033940f2b653d7616966358be7e87eb
	State = 0xf7c592a0f0cd8bb76be870fae22db0ee
	Message-Authenticator = 0x775b3a54b6f3809cbff7365813a3ae59
# Executing section authorize from file /etc/raddb/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[IPASS] No '/' in User-Name = "teste2", looking up realm NULL
[IPASS] No such realm "NULL"
++[IPASS] returns noop
[suffix] No '@' in User-Name = "teste2", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[ntdomain] No '\' in User-Name = "teste2", looking up realm NULL
[ntdomain] No such realm "NULL"
++[ntdomain] returns noop
[eap] EAP packet type response id 8 length 43
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state send tlv failure
[peap] Received EAP-TLV response.
[peap]  The users session was previously rejected: returning reject (again.)
[peap]  *** This means you need to read the PREVIOUS messages in the debug
output
[peap]  *** to find out the reason why the user was rejected.
[peap]  *** Look for "reject" or "fail".  Those earlier messages will tell
you.
[peap]  *** what went wrong, and how to fix the problem.
[eap] Handler failed in EAP/peap
[eap] Failed in EAP select
++[eap] returns invalid
Failed to authenticate the user.
Using Post-Auth-Type Reject
# Executing group from file /etc/raddb/sites-enabled/default
+- entering group REJECT {...}
[attr_filter.access_reject] 	expand: %{User-Name} -> teste2
 attr_filter: Matched entry DEFAULT at line 11
++[attr_filter.access_reject] returns updated
Delaying reject of request 8 for 1 seconds
Going to the next request
Waking up in 0.9 seconds.
Sending delayed reject for request 8
Sending Access-Reject of id 254 to 10.10.10.1 port 42873
	EAP-Message = 0x04080004
	Message-Authenticator = 0x00000000000000000000000000000000
Waking up in 4.9 seconds.*


Thanks in advance,
Gustavo.

--
View this message in context: http://freeradius.1045715.n5.nabble.com/Freeradius-Fedora-DS-EAP-MSCHAPv2-for-WIFI-AP-authentication-tp4820687p4820687.html
Sent from the FreeRadius - User mailing list archive at Nabble.com.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html




More information about the Freeradius-Users mailing list