Problem with log and PEAP/MS-CHAPv2

Andrea Gabellini andrea.gabellini at telecomitalia.sm
Wed Apr 12 13:34:14 CEST 2017


Hi,

mschapv2 {
   send_error = no
}

solves the problem... I changed it from the default and I forgot it :-(

Now in the log, with the login incorrect, I found:

Apr 12 13:31:28 radius31 radiusd[19562]: (8)   Login incorrect (mschap:
MS-CHAP2-Response is incorrect): [testuser] (from client wlc_wifi_tim
port 0 via TLS tunnel)
Apr 12 13:31:28 radius31 radiusd[19562]: (9) eap_peap:   This means you
need to read the PREVIOUS messages in the debug output
Apr 12 13:31:28 radius31 radiusd[19562]: (9) eap_peap:   to find out the
reason why the user was rejected
Apr 12 13:31:28 radius31 radiusd[19562]: (9) eap_peap:   Look for
"reject" or "fail".  Those earlier messages will tell you
Apr 12 13:31:28 radius31 radiusd[19562]: (9) eap_peap:   what went
wrong, and how to fix the problem
Apr 12 13:31:28 radius31 radiusd[19562]: (9) Login incorrect (eap_peap:
The users session was previously rejected: returning reject (again.)):
[testuser] (from client wlc_wifi_tim port 0 cli E8-3A-12-EF-30-CE)

The eap_peap logs seems a debug log. Is it corect?

Thanks,
Andrea


Il 12/04/2017 11:37, Andrea Gabellini ha scritto:
> Hi,
>
> I'm trying to setup a PEAP-MS-CHAPv2 tunnel with FR 3.0.13. It works
> fine but I have a little problem with the log. When a user logs in
> correctly I have the usual Login OK. But if the user uses a wrong
> password or if the username doesn't exist, I don't have any logs of it.
> Testing the inner tunnel with radtest logs correctly.
>
> The configuration of the server and the inner tunnel. Users are on
> "files" module:
> server wifi_tim {
>     authorize {
>         filter_username
>         auth_log
>         chap
>         mschap
>         eap {
>             ok = return
>         }
>         wifi_tim_files
>         pap
>     }
>     authenticate {
>         Auth-Type PAP {
>             pap
>         }
>         Auth-Type CHAP {
>             chap
>         }
>         Auth-Type MS-CHAP {
>             mschap
>         }
>         mschap
>         eap
>     }
>     preacct {
>     }
>     accounting {
>     }
>     session {
>     }
>     post-auth {
>         update {
>             &reply: += &session-state:
>         }
>         reply_log
>         remove_reply_message_if_eap
>         Post-Auth-Type REJECT {
>             attr_filter.access_reject
>             eap
>             remove_reply_message_if_eap
>         }
>         Post-Auth-Type Challenge {
>         }
>     }
>     pre-proxy {
>     }
>     post-proxy {
>     }
> }
>
> server wifi_tim_inner_tunnel {
>     listen {
>            ipaddr = 127.0.0.1
>            port = 11812
>            type = auth
>     }
>     authorize {
>         filter_username
>         chap
>         mschap
>         eap {
>             ok = return
>         }
>         wifi_tim_files
>         pap
>     }
>     authenticate {
>         Auth-Type PAP {
>             pap
>         }
>         Auth-Type CHAP {
>             chap
>         }
>         Auth-Type MS-CHAP {
>             mschap
>         }
>         mschap
>    
>         eap
>     }
>     session {
>     }
>     post-auth {
>         Post-Auth-Type REJECT {
>             attr_filter.access_reject
>             update outer.session-state {
>                 &Module-Failure-Message := &request:Module-Failure-Message
>             }
>         }
>     }
>     pre-proxy {
>     }
>     post-proxy {
>     }
> }
>
> eap {
>     default_eap_type = peap
>     timer_expire     = 60
>     ignore_unknown_eap_types = no
>     cisco_accounting_username_bug = no
>     max_sessions = ${max_requests}
>     tls-config tls-common {
>         private_key_password = whatever
>         private_key_file = ${certdir}/server.pem
>         certificate_file = ${certdir}/server.pem
>         ca_file = ${cadir}/ca.pem
>         dh_file = ${certdir}/dh
>         ca_path = ${cadir}
>         cipher_list = "ALL:!LOW:!SSLv2:!EXP:!aNULL"
>         cipher_server_preference = yes
>         ecdh_curve = "prime256v1"
>         cache {
>             enable = no
>             max_entries = 255
>         }
>         ocsp {
>             enable = no
>             override_cert_url = yes
>             url = "http://127.0.0.1/ocsp/"
>         }
>     }
>     peap {
>         tls = tls-common
>         default_eap_type = mschapv2
>         copy_request_to_tunnel = no
>         use_tunneled_reply = no
>         virtual_server = "wifi_tim_inner_tunnel"
>     }
>     mschapv2 {
>         send_error = yes
>         identity = "Tism Access Server"
>     }
> }
>
> Logs with radtest:
> Apr 12 10:47:25 radius31 radiusd[28822]: (1) Login OK: [testuser] (from
> client localhost port 0)
>
> Apr 12 10:47:35 radius31 radiusd[28822]: (2) Login incorrect (mschap:
> MS-CHAP2-Response is incorrect): [testuser] (from client localhost port 0)
> Apr 12 10:47:35 radius31 radiusd[28822]: (2) Rejected in post-auth:
> [testuser] (from client localhost port 0)
>
> Apr 12 10:55:02 radius31 radiusd[28822]: (16) Login incorrect (mschap:
> FAILED: No NT/LM-Password.  Cannot perform authentication): [testuserx]
> (from client localhost port 0)
> Apr 12 10:55:02 radius31 radiusd[28822]: (16) Rejected in post-auth:
> [testuserx] (from client localhost port 0)
>
> Debug with EAP and wrong password:
> (162) Wed Apr 12 11:30:39 2017: Debug: Received Access-Request Id 7 from
> 194.183.95.46:55808 to 194.183.95.46:1812 length 276
> (162) Wed Apr 12 11:30:39 2017: Debug:   User-Name = "testuser"
> (162) Wed Apr 12 11:30:39 2017: Debug:   Calling-Station-Id =
> "E8-3A-12-EF-30-CE"
> (162) Wed Apr 12 11:30:39 2017: Debug:   Framed-MTU = 1400
> (162) Wed Apr 12 11:30:39 2017: Debug:   NAS-Port-Type = Wireless-802.11
> (162) Wed Apr 12 11:30:39 2017: Debug:   Connect-Info = "rad_eap_test +
> eapol_test"
> (162) Wed Apr 12 11:30:39 2017: Debug:   NAS-IP-Address = 172.16.0.4
> (162) Wed Apr 12 11:30:39 2017: Debug:   EAP-Message =
> 0x02070090190017030100207ca8e68f9cc0712a093735da2c9a7a8f8880c35df3bb05407fc2ca022b33575d1703010060960e2f55b1a94c96a4197759099aaafdcabbaa6c6c0583b1c26e354da196fc30abcab796cdf83f4bc110a14559904b992bdfff46e30d60b9d6548342b5ea2fa87d4fbd3392353b
> (162) Wed Apr 12 11:30:39 2017: Debug:   State =
> 0xe50e637de3097a45c917c73821ab3033
> (162) Wed Apr 12 11:30:39 2017: Debug:   Message-Authenticator =
> 0x79e6229a110fd499293f527c2f93be25
> (162) Wed Apr 12 11:30:39 2017: Debug: session-state: No cached attributes
> (162) Wed Apr 12 11:30:39 2017: Debug: # Executing section authorize
> from file /usr/local/freeradius/etc/raddb/sites-enabled/wifi_tim
> (162) Wed Apr 12 11:30:39 2017: Debug:   authorize {
> (162) Wed Apr 12 11:30:39 2017: Debug:     policy filter_username {
> (162) Wed Apr 12 11:30:39 2017: Debug:       if (&User-Name) {
> (162) Wed Apr 12 11:30:39 2017: Debug:       if (&User-Name)  -> TRUE
> (162) Wed Apr 12 11:30:39 2017: Debug:       if (&User-Name)  {
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name =~ / /) {
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name =~ / /) 
> -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name =~
> /@[^@]*@/ ) {
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name =~
> /@[^@]*@/ )  -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name =~ /\.\./ ) {
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name =~ /\.\./
> )  -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:         if ((&User-Name =~ /@/)
> && (&User-Name !~ /@(.+)\.(.+)$/))  {
> (162) Wed Apr 12 11:30:39 2017: Debug:         if ((&User-Name =~ /@/)
> && (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name =~ /\.$/)  {
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name =~
> /\.$/)   -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name =~ /@\./)  {
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name =~
> /@\./)   -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:       } # if (&User-Name)  = notfound
> (162) Wed Apr 12 11:30:39 2017: Debug:     } # policy filter_username =
> notfound
> (162) Wed Apr 12 11:30:39 2017: Debug: auth_log: EXPAND
> /var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d
> (162) Wed Apr 12 11:30:39 2017: Debug: auth_log:    -->
> /var/log/radius/radacct/194.183.95.46/auth-detail-20170412
> (162) Wed Apr 12 11:30:39 2017: Debug: auth_log:
> /var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d
> expands to /var/log/radius/radacct/194.183.95.46/auth-detail-20170412
> (162) Wed Apr 12 11:30:39 2017: Debug: auth_log: EXPAND %t
> (162) Wed Apr 12 11:30:39 2017: Debug: auth_log:    --> Wed Apr 12
> 11:30:39 2017
> (162) Wed Apr 12 11:30:39 2017: Debug:     [auth_log] = ok
> (162) Wed Apr 12 11:30:39 2017: Debug:     [chap] = noop
> (162) Wed Apr 12 11:30:39 2017: Debug:     [mschap] = noop
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Peer sent EAP Response (code
> 2) ID 7 length 144
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Continuing tunnel setup
> (162) Wed Apr 12 11:30:39 2017: Debug:     [eap] = ok
> (162) Wed Apr 12 11:30:39 2017: Debug:   } # authorize = ok
> (162) Wed Apr 12 11:30:39 2017: Debug: Found Auth-Type = eap
> (162) Wed Apr 12 11:30:39 2017: Debug: # Executing group from file
> /usr/local/freeradius/etc/raddb/sites-enabled/wifi_tim
> (162) Wed Apr 12 11:30:39 2017: Debug:   authenticate {
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Expiring EAP session with
> state 0xcb16895fcb11935b
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Finished EAP session with
> state 0xe50e637de3097a45
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Previous EAP request found
> for state 0xe50e637de3097a45, released from the list
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Peer sent packet with method
> EAP PEAP (25)
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Calling submodule eap_peap
> to process data
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: Continuing EAP-TLS
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: [eaptls verify] = ok
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: Done initial handshake
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: [eaptls process] = ok
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: Session established. 
> Decoding tunneled attributes
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: PEAP state phase2
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: EAP method MSCHAPv2 (26)
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: Got tunneled request
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap:   EAP-Message =
> 0x020700431a0207003e31b91e9f531a076d578b11807fa0c5e5570000000000000000c26b0fb3fc605a0e49b6dfc821e07a674b6f65c9e16dd07b007465737475736572
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: Setting User-Name to
> testuser
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: Sending tunneled
> request to wifi_tim_inner_tunnel
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap:   EAP-Message =
> 0x020700431a0207003e31b91e9f531a076d578b11807fa0c5e5570000000000000000c26b0fb3fc605a0e49b6dfc821e07a674b6f65c9e16dd07b007465737475736572
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap:   FreeRADIUS-Proxied-To
> = 127.0.0.1
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap:   User-Name = "testuser"
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap:   State =
> 0xcb16895fcb11935b1be4d67ff3649f78
> (162) Wed Apr 12 11:30:39 2017: Debug: Virtual server
> wifi_tim_inner_tunnel received request
> (162) Wed Apr 12 11:30:39 2017: Debug:   EAP-Message =
> 0x020700431a0207003e31b91e9f531a076d578b11807fa0c5e5570000000000000000c26b0fb3fc605a0e49b6dfc821e07a674b6f65c9e16dd07b007465737475736572
> (162) Wed Apr 12 11:30:39 2017: Debug:   FreeRADIUS-Proxied-To = 127.0.0.1
> (162) Wed Apr 12 11:30:39 2017: Debug:   User-Name = "testuser"
> (162) Wed Apr 12 11:30:39 2017: Debug:   State =
> 0xcb16895fcb11935b1be4d67ff3649f78
> (162) Wed Apr 12 11:30:39 2017: WARNING: Outer and inner identities are
> the same.  User privacy is compromised.
> (162) Wed Apr 12 11:30:39 2017: Debug: server wifi_tim_inner_tunnel {
> (162) Wed Apr 12 11:30:39 2017: Debug:   session-state: No cached attributes
> (162) Wed Apr 12 11:30:39 2017: Debug:   # Executing section authorize
> from file
> /usr/local/freeradius/etc/raddb/sites-enabled/wifi_tim_inner_tunnel
> (162) Wed Apr 12 11:30:39 2017: Debug:     authorize {
> (162) Wed Apr 12 11:30:39 2017: Debug:       policy filter_username {
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name) {
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name)  -> TRUE
> (162) Wed Apr 12 11:30:39 2017: Debug:         if (&User-Name)  {
> (162) Wed Apr 12 11:30:39 2017: Debug:           if (&User-Name =~ / /) {
> (162) Wed Apr 12 11:30:39 2017: Debug:           if (&User-Name =~ / /) 
> -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:           if (&User-Name =~
> /@[^@]*@/ ) {
> (162) Wed Apr 12 11:30:39 2017: Debug:           if (&User-Name =~
> /@[^@]*@/ )  -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:           if (&User-Name =~
> /\.\./ ) {
> (162) Wed Apr 12 11:30:39 2017: Debug:           if (&User-Name =~
> /\.\./ )  -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:           if ((&User-Name =~ /@/)
> && (&User-Name !~ /@(.+)\.(.+)$/))  {
> (162) Wed Apr 12 11:30:39 2017: Debug:           if ((&User-Name =~ /@/)
> && (&User-Name !~ /@(.+)\.(.+)$/))   -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:           if (&User-Name =~ /\.$/)  {
> (162) Wed Apr 12 11:30:39 2017: Debug:           if (&User-Name =~
> /\.$/)   -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:           if (&User-Name =~ /@\./)  {
> (162) Wed Apr 12 11:30:39 2017: Debug:           if (&User-Name =~
> /@\./)   -> FALSE
> (162) Wed Apr 12 11:30:39 2017: Debug:         } # if (&User-Name)  =
> notfound
> (162) Wed Apr 12 11:30:39 2017: Debug:       } # policy filter_username
> = notfound
> (162) Wed Apr 12 11:30:39 2017: Debug:       [chap] = noop
> (162) Wed Apr 12 11:30:39 2017: Debug:       [mschap] = noop
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Peer sent EAP Response (code
> 2) ID 7 length 67
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: No EAP Start, assuming it's
> an on-going EAP conversation
> (162) Wed Apr 12 11:30:39 2017: Debug:       [eap] = updated
> (162) Wed Apr 12 11:30:39 2017: Debug: wifi_tim_files: users: Matched
> entry testuser at line 13
> (162) Wed Apr 12 11:30:39 2017: Debug:       [wifi_tim_files] = ok
> (162) Wed Apr 12 11:30:39 2017: WARNING: pap: Auth-Type already set. 
> Not setting to PAP
> (162) Wed Apr 12 11:30:39 2017: Debug:       [pap] = noop
> (162) Wed Apr 12 11:30:39 2017: Debug:     } # authorize = updated
> (162) Wed Apr 12 11:30:39 2017: Debug:   Found Auth-Type = eap
> (162) Wed Apr 12 11:30:39 2017: Debug:   # Executing group from file
> /usr/local/freeradius/etc/raddb/sites-enabled/wifi_tim_inner_tunnel
> (162) Wed Apr 12 11:30:39 2017: Debug:     authenticate {
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Expiring EAP session with
> state 0xcb16895fcb11935b
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Finished EAP session with
> state 0xcb16895fcb11935b
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Previous EAP request found
> for state 0xcb16895fcb11935b, released from the list
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Peer sent packet with method
> EAP MSCHAPv2 (26)
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Calling submodule
> eap_mschapv2 to process data
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_mschapv2: # Executing group
> from file
> /usr/local/freeradius/etc/raddb/sites-enabled/wifi_tim_inner_tunnel
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_mschapv2:   authenticate {
> (162) Wed Apr 12 11:30:39 2017: Debug: mschap: Found Cleartext-Password,
> hashing to create NT-Password
> (162) Wed Apr 12 11:30:39 2017: Debug: mschap: Found Cleartext-Password,
> hashing to create LM-Password
> (162) Wed Apr 12 11:30:39 2017: Debug: mschap: Creating challenge hash
> with username: testuser
> (162) Wed Apr 12 11:30:39 2017: Debug: mschap: Client is using MS-CHAPv2
> (162) Wed Apr 12 11:30:39 2017: ERROR: mschap: MS-CHAP2-Response is
> incorrect
> (162) Wed Apr 12 11:30:39 2017: Debug:     [mschap] = reject
> (162) Wed Apr 12 11:30:39 2017: Debug:   } # authenticate = reject
> (162) Wed Apr 12 11:30:39 2017: Debug: MSCHAP-Error: E=691 R=1
> C=1474492f8f426051613ac0fd4afe37b8 V=3 M=Authentication failed
> (162) Wed Apr 12 11:30:39 2017: Debug: Found new challenge from
> MS-CHAP-Error: err=691 retry=1 challenge=1474492f8f426051613ac0fd4afe37b8
> (162) Wed Apr 12 11:30:39 2017: ERROR: MSCHAP Failure
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Sending EAP Request (code 1)
> ID 8 length 81
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: EAP session adding
> &reply:State = 0xcb16895fca1e935b
> (162) Wed Apr 12 11:30:39 2017: Debug:       [eap] = handled
> (162) Wed Apr 12 11:30:39 2017: Debug:     } # authenticate = handled
> (162) Wed Apr 12 11:30:39 2017: Debug: } # server wifi_tim_inner_tunnel
> (162) Wed Apr 12 11:30:39 2017: Debug: Virtual server sending reply
> (162) Wed Apr 12 11:30:39 2017: Debug:   EAP-Message =
> 0x010800511a0407004c453d36393120523d3120433d313437343439326638663432363035313631336163306664346166653337623820563d33204d3d41757468656e7469636174696f6e206661696c6564
> (162) Wed Apr 12 11:30:39 2017: Debug:   Message-Authenticator =
> 0x00000000000000000000000000000000
> (162) Wed Apr 12 11:30:39 2017: Debug:   State =
> 0xcb16895fca1e935b1be4d67ff3649f78
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: Got tunneled reply code 11
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap:   EAP-Message =
> 0x010800511a0407004c453d36393120523d3120433d313437343439326638663432363035313631336163306664346166653337623820563d33204d3d41757468656e7469636174696f6e206661696c6564
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap:   Message-Authenticator
> = 0x00000000000000000000000000000000
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap:   State =
> 0xcb16895fca1e935b1be4d67ff3649f78
> (162) Wed Apr 12 11:30:39 2017: Debug: eap_peap: Got tunneled
> Access-Challenge
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: Sending EAP Request (code 1)
> ID 8 length 123
> (162) Wed Apr 12 11:30:39 2017: Debug: eap: EAP session adding
> &reply:State = 0xe50e637de2067a45
> (162) Wed Apr 12 11:30:39 2017: Debug:     [eap] = handled
> (162) Wed Apr 12 11:30:39 2017: Debug:   } # authenticate = handled
> (162) Wed Apr 12 11:30:39 2017: Debug: Using Post-Auth-Type Challenge
> (162) Wed Apr 12 11:30:39 2017: Debug: # Executing group from file
> /usr/local/freeradius/etc/raddb/sites-enabled/wifi_tim
> (162) Wed Apr 12 11:30:39 2017: Debug:   Challenge { ... } # empty
> sub-section is ignored
> (162) Wed Apr 12 11:30:39 2017: Debug: Sent Access-Challenge Id 7 from
> 194.183.95.46:1812 to 194.183.95.46:55808 length 0
> (162) Wed Apr 12 11:30:39 2017: Debug:   EAP-Message =
> 0x0108007b19001703010070ebc34da12bb045acd32080fe40bc92495c6593a5e40589775105ef0f5c76cffda64ca3039931242118be0db1a39bdd811a876d7bc9e111e9e28ee633e50ceae1b4a66367000e3990c542a0aa3227b3673d58dd69d1b006db31a8859ae1fe63416e1253dec50b6fb4959a4e51
> (162) Wed Apr 12 11:30:39 2017: Debug:   Message-Authenticator =
> 0x00000000000000000000000000000000
> (162) Wed Apr 12 11:30:39 2017: Debug:   State =
> 0xe50e637de2067a45c917c73821ab3033
> (162) Wed Apr 12 11:30:39 2017: Debug: Finished request
>
> no more packets are exchanged...
>
> Thanks,
> Andrea
>

-- 
----------------------------------------------------------------
Be a good listener. Your ears will never get you in trouble.

----------------------------------------------------------------

Ing. Andrea Gabellini
Email: andrea.gabellini at telecomitalia.sm
Skype: andreagabellini
Tel: (+378) 0549 886111
Fax: (+378) 0549 886188

Telecom Italia San Marino S.p.A.
Via XXVIII Luglio, 212 - Piano -2
47893 Borgo Maggiore
Republic of San Marino

http://www.telecomitalia.sm



More information about the Freeradius-Users mailing list