Proxying PEAP/MSCHAPv2 to NPS errors

Seth Lampman sethklampman at gmail.com
Mon Nov 19 18:42:45 CET 2012


I've been to that site and looked around before as well as countless Google
searches.  The only thing remotely close to my issue is the certificate and
windows XP issue.  I rebuilt my environment and this time used the sample
certs that according to the readme, are created with the correct attributes
when the freeradius -X debug mode is enabled.  

This is my error that I get most of the time, segmentation fault

rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=163,
length=69
	User-Name = "seth"
	Calling-Station-Id = "0000005e5578"
	EAP-Message = 0x020000090173657468
	Message-Authenticator = 0xbc17ddf7a88642004721cbce9340ac69
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "seth", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 0 length 9
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
++[files] returns noop
++[expiration] returns noop
++[logintime] returns noop
[pap] WARNING! No "known good" password found for the user.  Authentication
may fail because of this.
++[pap] returns noop
Found Auth-Type = EAP
# Executing group from file /etc/freeradius/sites-enabled/default
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type tls
[tls] Initiate
[tls] Start returned 1
++[eap] returns handled
Sending Access-Challenge of id 163 to 172.16.0.5 port 50001
	EAP-Message = 0x010100061920
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xb3f7fb74b3f6e22ff520fc1c1d318d6d
Finished request 0.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=164,
length=294
	User-Name = "seth"
	Calling-Station-Id = "0000005e5578"
	EAP-Message =
0x020100d8190016030100cd010000c9030150aa6d36e34704b816ecbf8ba93a0a218168c856
300e80f647154d9f91e5250700005cc014c00a0039003800880087c00fc00500350084c012c0
0800160013c00dc003000ac013c00900330032009a009900450044c00ec004002f0096004100
07c011c007c00cc002000500040015001200090014001100080006000300ff01000044000b00
0403000102000a00340032000100020003000400050006000700080009000a000b000c000d00
0e000f001000110012001300140015001600170018001900230000
	Message-Authenticator = 0x8eb56515952e384336bc5ae2817cf375
	State = 0xb3f7fb74b3f6e22ff520fc1c1d318d6d
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "seth", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 1 length 216
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/freeradius/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap]     (other): before/accept initialization
[peap]     TLS_accept: before/accept initialization
[peap] <<< TLS 1.0 Handshake [length 00cd], ClientHello  
[peap]     TLS_accept: SSLv3 read client hello A
[peap] >>> TLS 1.0 Handshake [length 0031], ServerHello  
[peap]     TLS_accept: SSLv3 write server hello A
[peap] >>> TLS 1.0 Handshake [length 02b4], Certificate  
[peap]     TLS_accept: SSLv3 write certificate A
[peap] >>> TLS 1.0 Handshake [length 020d], ServerKeyExchange  
[peap]     TLS_accept: SSLv3 write key exchange A
[peap] >>> TLS 1.0 Handshake [length 0004], ServerHelloDone  
[peap]     TLS_accept: SSLv3 write server done A
[peap]     TLS_accept: SSLv3 flush data
[peap]     TLS_accept: Need to read more data: SSLv3 read client certificate
A
In SSL Handshake Phase 
In SSL Accept mode  
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 164 to 172.16.0.5 port 50001
	EAP-Message =
0x0102040019c00000050a16030100310200002d030150aa6d2183ad3f781358ecb038c84aa5
3d8ecdbaae608ee5fb06a14cbe534e7a000039000005ff0100010016030102b40b0002b00002
ad0002aa308202a63082018e020900ec3ae1766fcc1e58300d06092a864886f70d0101050500
3015311330110603550403130a46524545524144495553301e170d3132313131393132333234
365a170d3232313131373132333234365a3015311330110603550403130a4652454552414449
555330820122300d06092a864886f70d01010105000382010f003082010a0282010100ad2f22
a51811df31b40221b1c484460547f03549615668c1c9925ed33a
	EAP-Message =
0xc57811b046051eb5a8c3e8d5439e955d098320136f13d98d7be0d4681a9259b07cb65ff88c
d05bfb0ee0ffc6896c506f3094dca3194c84cdc8ca0868a40dbc9f952ed4302303cd014a6333
4a3ef77d403245cc68c701809a26fb4e1e2f14b4855e75f2163a67693cc92ba0de98abd49e3a
57ba78c6be7afd6de760fcd2ac492ef2cde96961440e06af7ea294f16a00133a9daa4ceadb43
2a543340fcc35ebe2c153f128220380ab9495928eb792aac36367d2438ad7b5a6422efa0f9b7
80481ff5dce1161c17df10ae0460debaf6e7dd19de58510dba5807897b4590dd49f5f2074fb1
0203010001300d06092a864886f70d010105050003820101006f
	EAP-Message =
0x0f28b6c3f62e6ff85a23bc18537b888884499b4804bc075330eeeadf52814d0a6bf66e6486
f0c0aee368b8b832ae7e25998d3bea7588de8db72a36072b5d6655810b9c44e31c37357530df
6a7806c1d0fef5998c53b4dcc651cd32c6389361bf2fb4171432a9b353c2aaa767bd47ab9046
c2b349d4abab2c1358ec711687e1abfa000904df25baebdf4a3bf314a35e49dd3886e2078140
c3897425d1df13c244d32bf35d7ba7a0dcfc52583b62492e4c2f24dc5c0c895587975ba59d41
9836c9b444b33ee8c3a705b2fa42abcb1e558731ef77da6dcd41e01641cdab1b5896dff9f3f5
2da01680f0b2a463a3d153ea8dd12603093db20314a36da34c66
	EAP-Message =
0x9ee1160301020d0c00020900809a9e58f82faf6e17e7ba9255156a584b7719f94b9fb5c434
222600ed1d577c73555bf5da1862faa858342f92c09c11939e07d568f9d6e6de29ad61711040
04316d4b294d479e940e83115b7ff42946a073ffb68f390c21a818ed3f30655f3a797836139b
16045513ab4274a64e1bc89e55dc8b001f9ea450f428e1790844b2d3000102008049ad739880
e60cd5ab6cbfb975e09c7be684be43e60ca36bea77b864a676aeaf0b1a7d0735442b2e4cf9e4
ab09db8e571436d50c07755af1f1fdf2f2f26ea48ec68ea3bbf03341079c7e4be60a920838b6
59371aaa0b0eddde3071c434048106856c487571bdb60c8daacd
	EAP-Message = 0xeea8af6be108602a972da786
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xb3f7fb74b2f5e22ff520fc1c1d318d6d
Finished request 1.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=165,
length=84
	User-Name = "seth"
	Calling-Station-Id = "0000005e5578"
	EAP-Message = 0x020200061900
	Message-Authenticator = 0xda9c475758c7e807e5258014a244ebc0
	State = 0xb3f7fb74b2f5e22ff520fc1c1d318d6d
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "seth", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 2 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/freeradius/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake fragment handler
[peap] eaptls_verify returned 1 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 165 to 172.16.0.5 port 50001
	EAP-Message =
0x0103011a1900933f108371577c78a801000c1860fa6efc03a1a3e8a32626f84bc2ae2546c8
1f310d24a501c85e20dca446334a853b6362810a97c1448258628f25dfb7d26d1343c139b14c
000fc5d8a6ab9297a022dd6187a99e2459ff68ee85d0207091ba50f4dfd7b6be7ec7f12c04dc
caacbdb0da838456d46c0590c7861f786643cf7162f5a37c5f1a206f6bec3b09f5e9f815f435
66253f39feb1efd37f50678c9c91b898f5eff1e34ce36b578d342a5cd70d45a7c43f8e166ed2
af85cd905dbaeaf34c39fb7c68cc4510a9326bdcb4b5b043ea143a0ce70b6ac5c451701eadc9
43cf2f646258a1367367a2aed101650e201ae76588b345cb9a7d
	EAP-Message =
0xe838bb5b00d5f6336bb64efa1a7c23de45225a2b16030100040e000000
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xb3f7fb74b1f4e22ff520fc1c1d318d6d
Finished request 2.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=166,
length=282
	User-Name = "seth"
	Calling-Station-Id = "0000005e5578"
	EAP-Message =
0x020300cc190016030100861000008200805019c0695be0e54a719c0242ef0aace901421719
825c01f28d1d4f081451e0bfe6cb42c8d454eba6fd94c1c6e846ccf81059cce89960000a0c7f
fffece9b16e0059cf5c6d0f0db0e11fe56010957b6d21f45a8fb7b8035a281bb9c9abfef1c60
e34542f3cab9d30a61749bc4bb60a4dd11fe8f415089f5b5362dea5c3ec5245e140301000101
1603010030ee97b56ff364cd0b1c7cee916614ba9e8737b23efd37470c47faeca770d34b592c
07d3b723dc135fcff01fc5c6fd863a
	Message-Authenticator = 0x3b338d63e94f7486a21cc273de803835
	State = 0xb3f7fb74b1f4e22ff520fc1c1d318d6d
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "seth", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 3 length 204
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/freeradius/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] <<< TLS 1.0 Handshake [length 0086], ClientKeyExchange  
[peap]     TLS_accept: SSLv3 read client key exchange A
[peap] <<< TLS 1.0 ChangeCipherSpec [length 0001]  
[peap] <<< TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 read finished A
[peap] >>> TLS 1.0 ChangeCipherSpec [length 0001]  
[peap]     TLS_accept: SSLv3 write change cipher spec A
[peap] >>> TLS 1.0 Handshake [length 0010], Finished  
[peap]     TLS_accept: SSLv3 write finished A
[peap]     TLS_accept: SSLv3 flush data
[peap]     (other): SSL negotiation finished successfully
SSL Connection Established 
[peap] eaptls_process returned 13 
[peap] EAPTLS_HANDLED
++[eap] returns handled
Sending Access-Challenge of id 166 to 172.16.0.5 port 50001
	EAP-Message =
0x010400411900140301000101160301003043c4e00f2601293467b6fb58f047ef50ee7dde9f
f4b97b7a8e86954b458914794445b936597275f225b4719401ed1b36
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xb3f7fb74b0f3e22ff520fc1c1d318d6d
Finished request 3.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=167,
length=84
	User-Name = "seth"
	Calling-Station-Id = "0000005e5578"
	EAP-Message = 0x020400061900
	Message-Authenticator = 0xab23e1b9844cfa58d3307f9ebc20385d
	State = 0xb3f7fb74b0f3e22ff520fc1c1d318d6d
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "seth", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 4 length 6
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/freeradius/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] Received TLS ACK
[peap] ACK handshake is finished
[peap] eaptls_verify returned 3 
[peap] eaptls_process returned 3 
[peap] EAPTLS_SUCCESS
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state TUNNEL ESTABLISHED
++[eap] returns handled
Sending Access-Challenge of id 167 to 172.16.0.5 port 50001
	EAP-Message =
0x0105002b19001703010020c710eafcfd876aa9316fcc41e5e905f791a021460fe3850a7e99
28d6cfa8305b
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xb3f7fb74b7f2e22ff520fc1c1d318d6d
Finished request 4.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=168,
length=158
	User-Name = "seth"
	Calling-Station-Id = "0000005e5578"
	EAP-Message =
0x02050050190017030100202c5ac8e99adca13b1a6c098ea6dc0cb178d151dfc43cdf970544
c3e2e9e3b1ec170301002015109a5fcbcd44cbca1dd5dd6673304998bd2492a440c94848652e
2f1a035e9c
	Message-Authenticator = 0x213122e61bf7a8bc3e6bff3be796d62f
	State = 0xb3f7fb74b7f2e22ff520fc1c1d318d6d
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "seth", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 5 length 80
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/freeradius/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state WAITING FOR INNER IDENTITY
[peap] Identity - seth
[peap] Got inner identity 'seth'
[peap] Setting default EAP type for tunneled EAP session.
[peap] Got tunneled request
	EAP-Message = 0x020500090173657468
server  {
  PEAP: Setting User-Name to seth
Sending tunneled request
	EAP-Message = 0x020500090173657468
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "seth"
	Calling-Station-Id = "0000005e5578"
	NAS-IP-Address = 172.16.0.5
server inner-tunnel {
# Executing section authorize from file
/etc/freeradius/sites-enabled/inner-tunnel
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "seth", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 5 length 9
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry DEFAULT at line 2
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
} # server inner-tunnel
[peap] Got tunneled reply code 0
  PEAP: Calling authenticate in order to initiate tunneled EAP session.
# Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
+- entering group authenticate {...}
[eap] EAP Identity
[eap] processing type mschapv2
rlm_eap_mschapv2: Issuing Challenge
++[eap] returns handled
    PEAP: Cancelling proxy to realm Safeword until the tunneled EAP session
has been established
[peap] Got tunneled reply RADIUS code 11
	EAP-Message =
0x0106001e1a01060019107aeaed2dcb79f4fb0ee4cdb4dc8d670673657468
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0x69fe80c169f89a9253f2ef21c2e94100
[peap] Got tunneled Access-Challenge
++[eap] returns handled
Sending Access-Challenge of id 168 to 172.16.0.5 port 50001
	EAP-Message =
0x0106003b190017030100308bc2f072cb4578e12d618bb6e2a69569b23eda4f9faa20ef5422
ba59802274a06ccc253658006784b09cb70a2c8aaa4c
	Message-Authenticator = 0x00000000000000000000000000000000
	State = 0xb3f7fb74b6f1e22ff520fc1c1d318d6d
Finished request 5.
Going to the next request
Waking up in 4.9 seconds.
rad_recv: Access-Request packet from host 172.16.0.5 port 50001, id=169,
length=206
	User-Name = "seth"
	Calling-Station-Id = "0000005e5578"
	EAP-Message =
0x020600801900170301002015bf4b731b9f75694b700d2ea5ea707c6de1cc4e6e54bfd9ccda
2482d5a6baa2170301005067f8a3546cb54746390681b138e7b238e2a9d55db4953363c729ef
946bf26d8be2406ab290dfd965ee9e18d6bc1d42d9b433675817b5c34958f22b142fc17b2c7a
8e637482fd2a2d0878226c5b9303a1
	Message-Authenticator = 0xc83ab7bcbdc56f1cc6c953dd563e473f
	State = 0xb3f7fb74b6f1e22ff520fc1c1d318d6d
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "seth", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
[eap] EAP packet type response id 6 length 128
[eap] Continuing tunnel setup.
++[eap] returns ok
Found Auth-Type = EAP
# Executing group from file /etc/freeradius/sites-enabled/default
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/peap
[eap] processing type peap
[peap] processing EAP-TLS
[peap] eaptls_verify returned 7 
[peap] Done initial handshake
[peap] eaptls_process returned 7 
[peap] EAPTLS_OK
[peap] Session established.  Decoding tunneled attributes.
[peap] Peap state phase2
[peap] EAP type mschapv2
[peap] Got tunneled request
	EAP-Message =
0x0206003f1a0206003a3190378276dcde5c5ff6a54ad1eb9cf4bd0000000000000000554292
e609cc06712699b8aa934a67af0fe4041f8280bde30073657468
server  {
  PEAP: Setting User-Name to seth
Sending tunneled request
	EAP-Message =
0x0206003f1a0206003a3190378276dcde5c5ff6a54ad1eb9cf4bd0000000000000000554292
e609cc06712699b8aa934a67af0fe4041f8280bde30073657468
	FreeRADIUS-Proxied-To = 127.0.0.1
	User-Name = "seth"
	State = 0x69fe80c169f89a9253f2ef21c2e94100
	Calling-Station-Id = "0000005e5578"
	NAS-IP-Address = 172.16.0.5
server inner-tunnel {
# Executing section authorize from file
/etc/freeradius/sites-enabled/inner-tunnel
+- entering group authorize {...}
++[chap] returns noop
++[mschap] returns noop
[suffix] No '@' in User-Name = "seth", looking up realm NULL
[suffix] No such realm "NULL"
++[suffix] returns noop
++[control] returns noop
[eap] EAP packet type response id 6 length 63
[eap] No EAP Start, assuming it's an on-going EAP conversation
++[eap] returns updated
[files] users: Matched entry DEFAULT at line 2
++[files] returns ok
++[expiration] returns noop
++[logintime] returns noop
++[pap] returns noop
} # server inner-tunnel
[peap] Got tunneled reply code 0
  PEAP: Calling authenticate in order to initiate tunneled EAP session.
# Executing group from file /etc/freeradius/sites-enabled/inner-tunnel
+- entering group authenticate {...}
[eap] Request found, released from the list
[eap] EAP/mschapv2
[eap] processing type mschapv2
[eap]   Not-EAP proxy set.  Not composing EAP
++[eap] returns handled
  PEAP: Tunneled authentication will be proxied to Safeword
  PEAP: Remembering to do EAP-MS-CHAP-V2 post-proxy.
[eap]   Tunneled session will be proxied.  Not doing EAP.
++[eap] returns handled
  WARNING: Empty pre-proxy section.  Using default return values.
Sending Access-Request of id 169 to 172.16.0.15 port 1812
	User-Name = "seth"
	Calling-Station-Id = "0000005e5578"
	NAS-IP-Address = 172.16.0.5
	MS-CHAP-Challenge = 0x7aeaed2dcb79f4fb0ee4cdb4dc8d6706
	MS-CHAP2-Response =
0x066590378276dcde5c5ff6a54ad1eb9cf4bd0000000000000000554292e609cc06712699b8
aa934a67af0fe4041f8280bde3
	Proxy-State = 0x313639
Proxying request 6 to home server 172.16.0.15 port 1812
Sending Access-Request of id 169 to 172.16.0.15 port 1812
	User-Name = "seth"
	Calling-Station-Id = "0000005e5578"
	NAS-IP-Address = 172.16.0.5
	MS-CHAP-Challenge = 0x7aeaed2dcb79f4fb0ee4cdb4dc8d6706
	MS-CHAP2-Response =
0x066590378276dcde5c5ff6a54ad1eb9cf4bd0000000000000000554292e609cc06712699b8
aa934a67af0fe4041f8280bde3
	Proxy-State = 0x313639
Going to the next request
Waking up in 0.9 seconds.
rad_recv: Access-Accept packet from host 172.16.0.15 port 1812, id=169,
length=230
	Proxy-State = 0x313639
	Framed-Protocol = PPP
	Service-Type = Framed-User
	Class =
0xce510b870000013700010200ac10000f00000000c1f0b6db791d9ba301cdc5f9ffdd9c5000
00000000000016
	MS-MPPE-Recv-Key = 0xd4fda3950a54e46e9f1d2100f5fd2849
	MS-MPPE-Send-Key = 0xe32328a8112e1ff06f5dba33df953287
	MS-CHAP2-Success =
0x06533d46443130454631324241314635313645354433383831304430423639384344433645
453141383734
	MS-CHAP-Domain = "\006SKL"
# Executing section post-proxy from file
/etc/freeradius/sites-enabled/default
+- entering group post-proxy {...}
[eap] Doing post-proxy callback
[eap] Passing reply from proxy back into the tunnel.
server inner-tunnel {
[eap] Passing reply back for EAP-MS-CHAP-V2
# Executing section post-proxy from file
/etc/freeradius/sites-enabled/inner-tunnel
+- entering group post-proxy {...}
++[eap] returns noop
  WARNING: Empty post-auth section.  Using default return values.
# Executing section post-auth from file
/etc/freeradius/sites-enabled/inner-tunnel
} # server inner-tunnel
[eap] Final reply from tunneled session code 2
	Proxy-State = 0x313639
	Framed-Protocol = PPP
	Service-Type = Framed-User
	Class =
0xce510b870000013700010200ac10000f00000000c1f0b6db791d9ba301cdc5f9ffdd9c5000
00000000000016
	MS-MPPE-Recv-Key = 0xd4fda3950a54e46e9f1d2100f5fd2849
	MS-MPPE-Send-Key = 0xe32328a8112e1ff06f5dba33df953287
	MS-CHAP2-Success =
0x06533d46443130454631324241314635313645354433383831304430423639384344433645
453141383734
	MS-CHAP-Domain = "\006SKL"
[eap] Got reply 2
Segmentation fault

-----Original Message-----
From: freeradius-users-bounces+sethklampman=gmail.com at lists.freeradius.org
[mailto:freeradius-users-bounces+sethklampman=gmail.com at lists.freeradius.org
] On Behalf Of Alan DeKok
Sent: Monday, November 19, 2012 12:17 PM
To: FreeRadius users mailing list
Subject: Re: Proxying PEAP/MSCHAPv2 to NPS errors

Seth Lampman wrote:
> It's a VM and my third one I have created so I am not sure it would be 
> the memory?  I am currently using Ubuntu would trying another OS be of any
help?
> 
> I don't always get the mutex, 99% of the time I get segmentation fault.
> 
> Where do I find docs/bugs?  Forgive the noob question but I have 
> looked all over and cant seem to find anything

  It's in the distribution "tar" file.

  See also https://github.com/FreeRADIUS/freeradius-server

  You can wander through the files there.

  Alan DeKok.
-
List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html



More information about the Freeradius-Users mailing list